diff --git a/test/.DS_Store b/test/.DS_Store new file mode 100644 index 0000000000000000000000000000000000000000..411347d58a0dd30913f93fd1b3fe05fef354a955 Binary files /dev/null and b/test/.DS_Store differ diff --git a/test/Academic_disciplines/Anthropocene_Working_Group.json b/test/Academic_disciplines/Anthropocene_Working_Group.json new file mode 100644 index 0000000000000000000000000000000000000000..af08a107322372b5a761e9e044dcb605a80ade28 --- /dev/null +++ b/test/Academic_disciplines/Anthropocene_Working_Group.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Anthropocene Working Group (AWG) is an interdisciplinary research group dedicated to the study of the Anthropocene as a geological time unit. It was established in 2009 as part of the Subcommission on Quaternary Stratigraphy (SQS), a constituent body of the International Commission on Stratigraphy (ICS). As of 2021, the research group features 37 members, with the physical geographer Simon Turner as Secretary and the geologist Colin Neil Waters as chair of the group. The late Nobel Prize-winning Paul Crutzen, who popularized the word 'Anthropocene' in 2000, had also been a member of the group until he died on January 28, 2021. The main goal of the AWG is providing scientific evidence robust enough for the Anthropocene to be formally ratified by the International Union of Geological Sciences (IUGS) as an epoch within the Geologic time scale.\nPrior to the establishment of the Anthropocene Working Group in 2009, no research program dedicated to the formalization of the Anthropocene in the geologic time scale existed. The idea of naming the current epoch 'Anthropocene' rather than using its formal time unit, the Holocene, became popular after Paul Crutzen and Eugene Stoermer published in May 2000 an article on the IGBP Global Change Newsletter called \"The 'Anthropocene'.\" Later in 2002, Crutzen published a commentary on Nature titled \"Geology of Mankind\" where he further stressed the idea \"to assign the term ‘Anthropocene’ to the present, in many ways human-dominated, geological epoch, supplementing the Holocene,\" with starting date in the late 18th century (at the onset of the Industrial Revolution). Soon after Paul Crutzen published his influential articles, a debate over the beginning of the Anthropocene took place between supporters of the Early Anthropocene Hypothesis, a thesis originally promoted in 2003 by the palaeoclimatologist William Ruddiman dating the beginning of the Anthropocene as far back as the Neolithic Revolution, and supporters of more recent starting dates, from European Colonization of the Americas, to the late 18th century, to the post-WWII Great Acceleration.The discussion over the beginning of the Anthropocene was crucial for the 'stratigraphic turn' that the Anthropocene debate took in the following years. In February 2008, Jan Zalasiewicz and other members of the Stratigraphy Commission of the Geological Society of London published a paper that considered the possibility to \"amplify and extend the discussion of the effects referred to by Crutzen and then apply the same criteria used to set up new epochs to ask whether there really is justification or need for a new term, and if so, where and how its boundary might be placed.\" The article raised the possibility of studying the Anthropocene as a discrete geological unit—a possibility that later led to the establishment of the AWG.\nIn 2009, the Subcommission on Quaternary Stratigraphy established an Anthropocene Working Group to \"examine the status, hierarchical level and definition of the Anthropocene as a potential new formal division of the Geological Time Scale.\" Some authors have labelled this moment as 'stratigraphic turn' or 'geological turn', in that the establishment of the AWG acknowledged the Anthropocene as an object of geological interest in the scientific community. The AWG has been actively publishing ever since then.\nThe first in-person meeting of the AWG took place in October 2014 at Haus der Kulturen der Welt, Berlin (HKW), with several other work meetings at HKW to follow in subsequent years. The AWG became a close collaborator of the HKW's and Max Planck Institute for the History of Science's decade long Anthropocene Project. Within the framework of that project, HKW was able to acquired in 2018 financial support for a systematic assessment of potential candidates for the Anthropocene's Global boundary Stratotype Section and Point (GSSP) by the AWG through means of a special appropriation from the German Bundestag.\nIn 2020, Colin Waters, previously secretary of the AWG, became the new chair, replacing the paleobiologist Jan Zalasiewicz who had previously been chair of the AWG from 2009 to 2020, while Simon Turner became the new secretary of the group.\nThe Anthropocene Working Group is one of four workings groups part of the Subcommission on Quaternary Stratigraphy (the other three being the Pleistocene:Holocene boundary working group, Middle/Late Pleistocene boundary working group, and Early/Middle Pleistocene boundary working group). The AWG members (including Paul Crutzen, who was awarded the Nobel prize for chemistry in 1995 for his researcher on ozone depletion; John McNeill, a pioneering researcher in the field of environmental history; and Naomi Oreskes, author of the book Merchants of Doubt) have diverse disciplinary backgrounds, ranging from international law, archaeology, and history to philosophy, natural science, and geography. Since no direct funding supports the research program, communication among members happens mostly through email, whereas meetings are usually founded by hosting institutions.As for most of the epochs in the Phanerozoic (the current Eon, starting 539 million years ago), determining the beginning of the Anthropocene by locating and agreeing upon its lower boundary is a necessary step in its process of formal recognition as a geochronological/chronostratigraphic unit. A lower boundary is defined by locating a GSSP (informally known as 'golden spike') in the stratigraphic section of a stage, the chronostratigraphic taxonomic equivalent of an epoch. Alternatively, if a 'golden spike' cannot be located, a GSSA can be agreed upon, although this methodology is usually implemented for Precambrian boundaries. There is a specific set of rules that a GSSP must fulfill in order to be recognized as a valid primary geologic marker.\nA central object of research for the AWG is establishing when, where, and how to locate the lower boundary of the Anthropocene. This means assigning a starting date to the Anthropocene (and an end to the Holocene), locating primary as well as auxiliary markers defining Anthropocene geologic record, and determining the proper methodology to implement in the overall process of formalization (GSSP or GSSA, what proxies to use as markers, etc.). Although debates on the taxonomical level of the Anthropocene in the chronostratigraphic chart / geologic time scale (Stage/Age, Series/Epoch, or System/Period) have occurred, the AWG has been considering the Anthropocene to best fit the requirements to be taxonomically recognized as an epoch.\nIn January 2014, the Geological Society of London published A Stratigraphical Basis for the Anthropocene, a collection of scientific essays dedicated to assessing and analyzing the anthropogenic signatures defining the Anthropocene, and its requirements to be recognized as a distinct chronostratigraphic unit from the Holocene. The volume constitutes a landmark publication for the AWG, collecting a preliminary body of scientific evidence for the Anthropocene, and establishing research areas and trajectories retraced in the following years.\nIn February 2019, the AWG published The Anthropocene as a Geological Time Unit: A Guide to the Scientific Evidence and Current Debate. It represents an extensive summary of evidence collected supporting the case of formalization of the Anthropocene as a geological time unit. The synthesis comprehends evidence ranging from stratigraphy, lithostratigraphy, mineralogy, biostratigraphy, chemostratigraphy, to climatology, Earth system science, and archaeology. The monograph also links the Anthropocene to the question concerning anthropogenic climate change, and the role of human technology and the technosphere in impacting the functioning of the Earth system. In the first chapter, the authors also provide a genealogy of the term 'Anthropocene,' and a statement of the role of the AWG as a scientific research program.\nIn May, 2019, the AWG completed a binding vote determining two major research questions:\n\"Should the Anthropocene be treated as a formal chrono-stratigraphic unit defined by a GSSP?\"\n\"Should the primary guide for the base of the Anthropocene be one of the stratigraphic signals around the mid-twentieth century of the Common Era?\"\nBoth questions received a positive response, with 29 votes in favor, 4 votes against, and no abstention (33 votes received out of 34 potential voting members).\nOn July 11, 2023, the AWG proposed Crawford Lake, Canada as GSSP candidate site of the Anthropocene series in a joint press conference with the Max Planck Society.\nIn 2016 seven prominent members of the AWG : Erle Ellis, John McNeill, Eric Odada, Andrew Revkin, Will Steffen, Davor Vidas and Jan Zalasiewicz : were interviewed in the feature documentary Anthropocene which showed on campuses and at film festivals worldwide and helped the term gain public attention. The documentary was the first feature-length film about the new epoch, and was described by Earth.com as one of the top ten documentaries to help raise environmental awareness. While the seven AWG members formed a broad consensus about the Anthropocene's history and the term's significance, they took contrasting views when invited by director Steve Bradshaw to consider the Anthropocene either as a tragedy : with extinctions and upheavals : or as a dark comedy.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_0" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Applied_history.json b/test/Academic_disciplines/Applied_history.json new file mode 100644 index 0000000000000000000000000000000000000000..2a7d2731ab78be8f27ca4e5d65d76ac766f7f897 --- /dev/null +++ b/test/Academic_disciplines/Applied_history.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Applied history is the effort to apply insights grounded in the study of the past to the challenges of the present, particularly in the area of policy-making. Applied history is closely associated with the field of public history, and the terms today are sometimes used interchangeably, though historically, public history has been a more encompassing term, engaging a broad range of audiences, subjects and methods, while applied history has been more narrowly focused on work associated with the development of domestic and foreign policy.\nThe term \"applied history\" was coined in 1909 by political scientist and historian Benjamin Shambaugh (1871-1940). A founding member of the Mississippi Valley Historical Association (today the Organization of American Historians), Shambaugh edited its proceedings from 1909 to 1914 and served as its president in 1909-1910. In 1912, Shambaugh, then superintendent of the State Historical Society of Iowa, launched the publication Applied History, a series that ran until 1930. Shambaugh defined applied history as \"the use of the scientific knowledge of history and experience in efforts to solve present problems of human betterment.\" Examples included legislative reference work and policy analysis, as well as the creation and stewardship of public archives, and the practice of state and local history.The Applied History series, and related efforts, lost funding during the Great Depression, and \"applied history\" as an enterprise receded until the 1970s, when it re-emerged in new contexts and forms. In 1974, Harvard University historian Ernest R. May published 'Lessons of the Past': The Use and Abuse Of History in American Foreign Policy, which argues that more substantive engagement with the discipline of history would improve policymaking. May together with Richard Neustadt taught courses in which students were invited to apply historical insight to contemporary social issues; in 1986 May and Neustadt published Thinking in Time: The Uses of History for Decision-Makers. In 1975, historians Joel Tarr and Peter Stearns launched an Applied History program at Carnegie-Mellon University in Pittsburgh. This Ph.D. program aimed to prepare students for jobs in a variety of public and private educational institutions. In the 1980s, the program changed its name from \"Applied History\" to \"History and Policy\".\nToday there are a number of academic programs in applied history. Shippensburg University hosts a Center for Applied History, and there is an Applied History Project at Harvard Kennedy School's Belfer Center for Science and International Affairs. In Flanders, KU Leuven and the State Archives of Belgium host project Corvus, which uses its research in applied history to develop, test and evaluate different types of historical consultancy. In November 2018, Dutch Historians Harm Kaal (Radboud University) and Jelle van Lottum (Huygens Institute for the History of the Netherlands) founded the Journal of Applied History, published by academic publisher Brill Publishers.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_1" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Bolognese_bell_ringing.json b/test/Academic_disciplines/Bolognese_bell_ringing.json new file mode 100644 index 0000000000000000000000000000000000000000..5b4335e50b13fd033bd5648097db8493bbe63ade --- /dev/null +++ b/test/Academic_disciplines/Bolognese_bell_ringing.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Bolognese bell ringing is a tradition of ringing bells that developed in Bologna, present day Italy. A form of full circle ringing, it entails swinging bells to develop rhythmic patterns.\nDuring the 16th century there was a competitive spirit between Rome and Bologna. At that time the Basilica of San Petronio in Bologna was still under construction, and was intended to be greater than St. Peter's Basilica in Rome. Both cities were part of the Papal States, and both were considered capital cities of art and music.There was also competition between two teams of bell ringers; from Bologna's Basilica of San Petronio and from Rome's Santa Cecilia's Church. Eager to prove their skills, the Bolognese bell ringers devised a regular and accurate method of ringing: each bell would have to ring once per rotation. This method soon spread through the city and its many bell towers, and reached nearby cities such as Ferrara, Modena and Faenza.\nThis bellringing system was originally designed for an ensemble of four or five bells. Nowadays it is also sometimes used for a set of six bells.The bells are never counterbalanced. They are mounted on a wooden structure called the castle, and flanked by a wooden support called the goat. The bells are not very heavy, as the rotation has to be fast. Generally, every bell that weighs less than 800 kg (16 cwt) is rung by one person. The heaviest bell used with this system is in Bologna Cathedral, and is called la Nonna (\"the Granny\") and weighs 3.3 tonnes. Thirteen people are needed to ring a scappata or a calata with it.\nIn this method, the bell ringers have to be at the top of the bell tower, in contact with the bells. Mechanical devices are not allowed.\nBell ringers can ring in two different positions:\nwithin the castle (in front of the bells), pulling the ropes and controlling the clapper\nabove the castle, where they can help to raise the bell with their feet and then move it by pulling and pushing the goat. These ringers are called travaroli, because they stand on travi, girders.\nIn Bolognese bell ringing, sets of bells are rung in four different techniques: scampanio ('chime'), doppio a cappio ('double loop'), tirate basse ('low pulls'), and doppio a trave ('double beam').In scampanio, the bells are hung stationary with the mouth facing downwards. The clappers are attached to ropes that the bellringer can control using both hands and feet. This enables the ringing of complex melodies and harmonies. A fundamental melody is martellata di Chiesa, which consists of variations to invoke themes of the 18th century.\nIn doppio a cappio, a set of bells, beginning in the resting position with the mouth facing downwards, are swung using short ropes tied to the goat. The bellringers begin swinging the bells in, sometimes pushing or pulling the clapper to ring the bell when the rotation is not yet sufficient. Using increasingly wide swings, they gradually bring the bell into a \"standing position\" in which the bell is balancing at the top of its axis with the mouth facing upwards. At this point, the bellringers play a pezzo in piedi ('standing piece') : a rhythmic ringing pattern. At the end of the standing piece, the bells are then swung freely, gradually slowing until they return to the resting position.\nIn tirate basse, the bells are swung continuously with a low enough amplitude that the clapper does not ring the bell. The bellringers rhythmically increase the amplitude of individual rotations to obtain a pattern of notes from the swinging bells.\nIn doppio a trave, probably the oldest of the techniques, the bells are arranged with their mouths facing upwards and thrown into a full swing by the bellringers in a rhythmic pattern. They are caught following each full swing.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_2" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Cylinder_Audio_Archive.json b/test/Academic_disciplines/Cylinder_Audio_Archive.json new file mode 100644 index 0000000000000000000000000000000000000000..d79c9f411d129e5426f47306589a2bdc0c9deed5 --- /dev/null +++ b/test/Academic_disciplines/Cylinder_Audio_Archive.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Cylinder Audio Archive is a free digital collection maintained by the University of California, Santa Barbara Library with streaming and downloadable versions of over 10,000 phonograph cylinders manufactured between 1893 and the mid-1920s. The Archive began in November 2003 as the successor of the earlier Cylinder Preservation and Digitization Pilot Project.\nThe pilot project began in 2002 to test the feasibility of digitizing cylinder recordings on a large scale for preservation and public access and explore issues related to the preservation and digitization of cylinder records. In 2003, the Institute for Museum and Library Services funded the Archive with a grant for $205,000 and between 2003 and 2005 UCSB library staff cataloged and digitized over 6,000 of the cylinder recordings in the library's collection using an archéophone, a modern electrical cylinder player designed in France by Henri Chamoux. The website was released to the public on November 16, 2005. Since outside project funding has ended a further 4,000 cylinders have been added to the archive.The Archive consists of a broad range of cylinder records manufactured between 1893 and the mid-1920s. The majority were produced by Edison Records in Orange, New Jersey, but the Archive also contains cylinders produced by the Columbia Phonograph Co., Indestructible Records and other companies. The majority of the cylinders feature music and include band recordings, popular songs, vaudeville, opera arias, and music for solo instruments such as banjo, violin and accordion, but the Archive also contains speeches, comedic monologues and home recordings.The Archive currently holds only the cylinders in the collection of the UCSB Libraries. Other libraries, including the Library of Congress and Bowling Green State University, have contributed cylinders for preservation and digitization, as have private collectors. The Archive accepts donations of cylinders but at present does not add digital files of cylinders from other collections, the one exception being cylinders in the collection of John Levin.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_3" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Drug_education.json b/test/Academic_disciplines/Drug_education.json new file mode 100644 index 0000000000000000000000000000000000000000..b5d5923b3ed74bbe584f86eb0dc2898a221b63cd --- /dev/null +++ b/test/Academic_disciplines/Drug_education.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Drug education is the planned provision of information, guidelines, resources, and skills relevant to living in a world where psychoactive substances are widely available and commonly used for a variety of both medical and non-medical purposes, some of which may lead to harms such as overdose, injury, infectious disease (such as HIV or hepatitis C), or addiction. The two primary approaches to drug education are harm-reduction education and abstinence-based education.\nAbstinence-based drug education began with the anti-alcohol \"temperance education\" programmes of the Woman's Christian Temperance Union in the United States and Canada in the late 19th century. In many respects, the WCTU's progressive education agenda set the template for much of what has been done since in the name of drug education.Abstinence-based education programs aim to inform adolescents of illicit drug use in an effort to prevent illegal drug use while highlighting the dangers of problematic substance use and strongly emphasizing abstinence.\nMany studies have found that school-based abstinence education programs such as D.A.R.E. did not lead to a reduction in substance use, and one study discovered that suburban students who went through the D.A.R.E. program were actually significantly more likely to engage in drug use.\nThe Australian Government has implemented a range of drug education programs through the National Drug Education Strategy (NDES) by providing schools with effective drug education programs. The program aims to manage drug related issues and incidents within schools. The Australian Government Department of Health's Positive Choices portal, released in response to a National Ice Taskforce report, facilitates access to interactive evidence-based drug education resources and prevention programs for school communities. It builds on existing drug education resources developed by researchers at the National Drug and Alcohol Research Centre such as the Climate Schools (now called OurFutures\n) programs that have been proven to reduce alcohol and drug related harms and increase student well-being.\nIn addition to government-funded programs, a number of not-for-profit organisations such as Life Education Australia provide drug education programs to adolescents. These preventative programs aim to deliver a progressive approach that will motivate and encourage young people to make positive decisions in life. Emphasis within these programs is also placed in focusing on deterring peer pressure as a means of empowering adolescents and promoting autonomy. This approach reaches 750,000 primary and secondary students in Australia each year.\nThe prevalence of abstinence-based programs declined throughout the early 21st-century following an uptick in substance use and the rise of the opioid epidemic. School-based drug education programs have declined alongside it. In a 2021 survey, only 60% of American 12-17 year-olds reported seeing drug and alcohol preventing messaging in school.\nD.A.R.E. (Drug Abuse Resistance Education) is a program in the United States implemented in 5th grade school classrooms to educate students on the effects of drugs and temptations they may encounter, particularly in later education. The police officers who administer the program can also serve as community models for students. There is no scientific evidence that preventive drug education such as D.A.R.E. is effective, and some evidence that it may actually increase substance use rates in suburban teenagers.Harm reduction education emerged as an alternative to abstinence-based education in the late 20th-century and early 21st-century. Rather than encouraging complete abstinence and aiming to completely eradicate drug use in society, harm reduction education accepts that drug use is inevitable in modern society. It aims to reduce the harms associated with drug use by providing individuals with comprehensive information about the nature of substance use. Harm reduction education aims to improve health, social, and economic measurements rather than aiming primarily to reduce the rate of drug consumption.In the late 1990s and early 2000s, websites dedicated to harm reduction education such as the educational database Erowid and the harm reduction forum Bluelight emerged. Erowid hosts information about hundreds of psychoactive plants and substances, while Bluelight is an online forum on which users discuss harm reduction and drug use. Both sites collectively host about 100,000 experience reports.\nBy the early 2020s, many organizations such as the US government's SAMHSA had shifted from abstinence-based education to harm reduction-based education.\nA systematic review of abstinence-based school drug education published in 2003 found mixed results on its effectiveness.Many studies conducted in the early 2000s found that school-based abstinence education programs such as D.A.R.E. did not lead to a reduction in substance use, and one study concluded that suburban students who went through the D.A.R.E. program were actually significantly more likely to engage in drug use.\nA 2012 study published in the journal of Drugs: Education, Prevention & Policy came to the conclusion that students aged 13 to 15 who completed a drug and alcohol prevention program were less likely to develop a drug or alcohol problem.\nDrug education can also occur through public campaigns rather than education programs. Examples include advertising campaigns focused on raising awareness such as the UK Government's FRANK campaign or the US \"media campaign\". In efforts to prevent substance abuse, drug education may counter-productively perpetuate myths and stereotypes about psychoactive substances and people who use them.Indirect drug education programs such as the UK government's Positive Futures Program may utilize activities such as sports and the arts to indirectly steer young people away from drug use. These programs aim to engage young people by relating to them and putting them in contact with positive role models (coaches/trained youth workers). After building a trusting relationship with a young person, these role models can gradually change attitudes towards drug use and steer the young person back into education, training and employment. This approach reaches young people who have dropped out of mainstream education. It also benefits local communities by reducing crime and anti-social behaviour.\nPast research into drug education has indicated that effective drug education must involve engaging, interactive learning strategies that stimulate higher-order thinking, promote learning and be transferable to real life circumstances.Studies on school-based programs indicated that professional training and support may be required to increase the effectiveness of teaching staff and the uniform implementation of drug curriculum.\nA study in 2017 on youth-targeted harm reduction education found that effective harm reduction programming must utilize relatable and meaningful approaches and be connected to youth's lived experience.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_4" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Environmental_studies.json b/test/Academic_disciplines/Environmental_studies.json new file mode 100644 index 0000000000000000000000000000000000000000..b73401ba33c5c0902ea2fef4a24a44ef003f771a --- /dev/null +++ b/test/Academic_disciplines/Environmental_studies.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Environmental studies (EVS or EVST) is a multidisciplinary academic field which systematically studies human interaction with the environment. Environmental studies connects principles from the physical sciences, commerce/economics, the humanities, and social sciences to address complex contemporary environmental issues. It is a broad field of study that includes the natural environment, the built environment, and the relationship between them. The field encompasses study in basic principles of ecology and environmental science, as well as associated subjects such as ethics, geography, anthropology, public policy (environmental policy), education, political science (environmental politics), urban planning, law, economics, philosophy, sociology and social justice, planning, pollution control, and natural resource management. There are many Environmental Studies degree programs, including a Master's degree and a Bachelor's degree. Environmental Studies degree programs provide a wide range of skills and analytical tools needed to face the environmental issues of our world head on. Students in Environmental Studies gain the intellectual and methodological tools to understand and address the crucial environmental issues of our time and the impact of individuals, society, and the planet. Environmental education's main goal is to instill in all members of society a pro-environmental thinking and attitude. This will help to create environmental ethics and raise people's awareness of the importance of environmental protection and biodiversity.\nThe New York State College of Forestry at Syracuse University established a BS in environmental studies degree in the 1950s, awarding its first degree in 1956. Middlebury College established the major there in 1965.The Environmental Studies Association of Canada (ESAC) was established in 1993 \"to further research and teaching activities in areas related to environmental studies in Canada\". ESAC was officially integrated in 1994, and the first convention for ESAC was held at the Learned Societies Conference in Calgary the same year. ESAC's magazine, A\\J: Alternatives Journal was first published by Robert A. Paehlke on 4 July 1971.\nIn 2008, The Association for Environmental Studies and Sciences (AESS) was founded as the first professional association in the interdisciplinary field of environmental studies in the United States. The AESS is also the publisher for the Journal of Environmental Studies and Sciences (JESS), which aims to allow researchers in various disciplinarians related to environmental sciences to have base for researchers to use and publish new information related to environmental studies. In 2010, the National Council for Science and the Environment (NCSE) agreed to advise and support the association. In March 2011, The association's scholarly journal, the Journal of Environmental Studies and Sciences (JESS), commenced publication.\nEnvironmental Studies in U.S. Universities\nIn the United States, many high school students are able to take environmental science as a college-level course. Over 500 colleges and universities in the United States offer environmental studies as a degree. The University of California, Berkeley has awarded the most degrees in environmental studies for U.S. universities, with 409 degrees awarded in 2019. The universities in the United States that have the highest percentage of degrees awarded is Antioch University-New England, where nearly 35% of degrees awarded in 2019 were in environmental studies.\nWorldwide, programs in environmental studies may be offered through colleges of liberal arts, life science, social science, or agriculture. Students of environmental studies use what they learn from the sciences, social sciences, and humanities to better understand environmental problems and potentially offer solutions to them. Students look at how we interact with the natural world and come up with ideas to prevent its destruction.In the 1960s, the word \"environment\" became one of the most commonly used in educational discourse in the United Kingdom. Educationists were becoming increasingly worried about the influence of the environment on children as well as the school's usage of the environment. The attempt to define the field of environmental studies has resulted in a discussion over its role in the curriculum. The use of the environment is one of the teaching approaches used in today's schools to carry on the legacy of educational philosophy known as 'Progressive education' or 'New education' in the first part of the twentieth century. The primary goal of environmental studies is to assist children in understanding the processes that influence their surroundings so that they do not stay a passive, and often befuddled, observer of the environment, but rather become knowledgeable active mediators of it. The study of the environment can be considered to offer unique chances for the development and exercise of the general cognitive skills that Piaget's work has made educators aware of. Environmental studies are increasingly being viewed as a long-term preparation for higher environmental studies such as Sociology, Archaeology, or Historical Geography.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_5" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Essay_on_a_Course_of_Liberal_Education_for_Civil_and_Active_Life.json b/test/Academic_disciplines/Essay_on_a_Course_of_Liberal_Education_for_Civil_and_Active_Life.json new file mode 100644 index 0000000000000000000000000000000000000000..5327155d41ea7b343ad4d386ca764eb0e45ff7cd --- /dev/null +++ b/test/Academic_disciplines/Essay_on_a_Course_of_Liberal_Education_for_Civil_and_Active_Life.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Essay on a Course of Liberal Education for Civil and Active Life (1765) is an educational treatise by the 18th-century British polymath Joseph Priestley.\nDedicated to the governing board of Warrington Academy at which Priestley was a tutor, the treatise argues that the education of young people should anticipate their practical needs, something Priestley accused the current universities, Dissenting and Establishment alike, of failing to do. In Priestley's eyes, the contemporary focus on a traditional classical education prevented students from acquiring useful skills. This principle of utility guided his unconventional curricular choices for Warrington's aspiring middle-class businessmen. He proposed that students should study the English language and the modern languages instead of the classical languages, learn practical mathematics, read modern history rather than ancient history, and study the constitution and laws of England. He believed that these topics would prepare his students for the commercial middle-class life that most of them would live; he did not believe that the poor people should receive this same education, arguing \"it could be of no service to their country, and often a real detriment to themselves.\"The board was convinced and in 1766 Warrington Academy replaced its classical curriculum with Priestley's liberal arts model.Some scholars of education have argued that this work and Priestley's later Miscellaneous Observations relating to Education (1778) (often reprinted with the Essay on Education) made Priestley the \"most considerable English writer on educational philosophy\" between the 17th-century John Locke and the 19th-century Herbert Spencer.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_6" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Legal_archaeology.json b/test/Academic_disciplines/Legal_archaeology.json new file mode 100644 index 0000000000000000000000000000000000000000..b3f17604577dbe35ea0f49d3ad1019554ed68555 --- /dev/null +++ b/test/Academic_disciplines/Legal_archaeology.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Legal archaeology is an area of legal scholarship \"involving detailed historical reconstruction and analysis of important cases.\"\nWhile most legal scholars confine their research to published opinions of court cases, legal archaeologists examine the historical and social context in which a court case was decided. These facts may show what social and cultural forces were at work in a particular case. Professors can use legal archaeology to \"sensitize students as to how inequality, specifically with regard to race, gender and class affects what occurs throughout the cases they study.\" A legal archaeologist may also research biographical material on the judges, attorneys, and parties to a court case. Such information may show whether a judge held particular biases in a case, or whether one party had superior legal representation that caused the party to prevail in a case.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_7" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Literary_nonsense.json b/test/Academic_disciplines/Literary_nonsense.json new file mode 100644 index 0000000000000000000000000000000000000000..620df06c99495101c974bf69e508f47366afba74 --- /dev/null +++ b/test/Academic_disciplines/Literary_nonsense.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Literary nonsense (or nonsense literature) is a broad categorization of literature that balances elements that make sense with some that do not, with the effect of subverting language conventions or logical reasoning. Even though the most well-known form of literary nonsense is nonsense verse, the genre is present in many forms of literature.\nThe effect of nonsense is often caused by an excess of meaning, rather than a lack of it. Its humor is derived from its nonsensical nature, rather than wit or the \"joke\" of a punch line.\nLiterary nonsense, as recognized since the nineteenth century, comes from a combination of two broad artistic sources. The first and older source is the oral folk tradition, including games, songs, dramas, and rhymes, such as the nursery rhyme \"Hey Diddle Diddle\". The literary figure Mother Goose represents common incarnations of this style of writing.The second, newer source of literary nonsense is in the intellectual absurdities of court poets, scholars, and intellectuals of various kinds. These writers often created sophisticated nonsense forms of Latin parodies, religious travesties, and political satire, though these texts are distinguished from more pure satire and parody by their exaggerated nonsensical effects.\nToday's literary nonsense comes from a combination of both sources. Though not the first to write this hybrid kind of nonsense, Edward Lear developed and popularized it in his many limericks (starting with A Book of Nonsense, 1846) and other famous texts such as \"The Owl and the Pussycat\", \"The Dong with a Luminous Nose\", \"The Jumblies\" and \"The Story of the Four Little Children Who Went Around the World\". Lewis Carroll continued this trend, making literary nonsense a worldwide phenomenon with Alice's Adventures in Wonderland (1865) and Through the Looking-Glass (1871). Carroll's poem \"Jabberwocky\", which appears in the latter book, is often considered quintessential nonsense literature.\nIn literary nonsense, certain formal elements of language and logic that facilitate meaning are balanced by elements that negate meaning. These formal elements include semantics, syntax, phonetics, context, representation, and formal diction. The genre is most easily recognizable by the various techniques or devices it uses to create this balance of meaning and lack of meaning, such as faulty cause and effect, portmanteau, neologism, reversals and inversions, imprecision (including gibberish), simultaneity, picture/text incongruity, arbitrariness, infinite repetition, negativity or mirroring, and misappropriation. Nonsense tautology, reduplication, and absurd precision have also been used in the nonsense genre. For a text to be within the genre of literary nonsense, it must have an abundance of nonsense techniques woven into the fabric of the piece. If the text employs only occasional nonsense devices, then it may not be classified as literary nonsense, though there may be a nonsensical effect to certain portions of the work. Laurence Sterne's Tristram Shandy, for instance, employs the nonsense device of imprecision by including a blank page, but this is only one nonsense device in a novel that otherwise makes sense. In Flann O'Brien's The Third Policeman, on the other hand, many of the devices of nonsense are present throughout, and thus it could be considered a nonsense novel.Gibberish, light verse, fantasy, and jokes and riddles are sometimes mistaken for literary nonsense, and the confusion is greater because nonsense can sometimes inhabit these (and many other) forms and genres.Pure gibberish, as in the \"hey diddle diddle\" of nursery rhyme, is a device of nonsense, but it does not make a text, overall, literary nonsense. If there is not significant sense to balance out such devices, then the text dissolves into literal (as opposed to literary) nonsense.\nLight verse, which is generally speaking humorous verse meant to entertain, may share humor, inconsequentiality, and playfulness with nonsense, but it usually has a clear point or joke and does not have the requisite tension between meaning and lack of meaning.\nNonsense is distinct from fantasy, though there are sometimes resemblances between them. While nonsense may employ the strange creatures, other worldly situations, magic, and talking animals of fantasy, these supernatural phenomena are not nonsensical if they have a discernible logic supporting their existence. The distinction lies in the coherent and unified nature of fantasy. Everything follows logic within the rules of the fantasy world; the nonsense world, on the other hand, has no comprehensive system of logic, although it may imply the existence of an inscrutable one, just beyond our grasp. The nature of magic within an imaginary world is an example of this distinction. Fantasy worlds employ the presence of magic to logically explain the impossible. In nonsense literature, magic is rare but when it does occur, its nonsensical nature only adds to the mystery rather than logically explaining anything. An example of nonsensical magic occurs in Carl Sandburg's Rootabaga Stories, when Jason Squiff, in possession of a magical \"gold buckskin whincher\", has his hat, mittens, and shoes turn into popcorn because, according to the \"rules\" of the magic, \"You have a letter Q in your name and because you have the pleasure and happiness of having a Q in your name you must have a popcorn hat, popcorn mittens and popcorn shoes\".\nRiddles only appear to be nonsense until the answer is found. The most famous nonsense riddle is only so because it originally had no answer. In Carroll's Alice in Wonderland, the Mad Hatter asks Alice \"Why is a raven like a writing-desk?\" When Alice gives up, the Hatter replies that he does not know either, creating a nonsensical riddle. Some seemingly nonsense texts are actually riddles, such as the popular 1940s song Mairzy Doats, which at first appears to have little discernible meaning but has a discoverable message. Jokes are not nonsense because their humor comes from their making sense, from our \"getting\" it, while nonsense is funny because it does not make sense, we do not \"get\" it.\nWhile most contemporary nonsense has been written for children, the form has an extensive history in adult configurations before the nineteenth century. Figures such as John Hoskyns, Henry Peacham, John Sandford, and John Taylor lived in the early seventeenth century and were noted nonsense authors in their time. Nonsense was also an important element in the works of Flann O'Brien and Eugène Ionesco. Literary nonsense, as opposed to the folk forms of nonsense that have always existed in written history, was only first written for children in the early nineteenth century. It was popularized by Edward Lear and then later by Lewis Carroll. Today, literary nonsense enjoys a shared audience of adults and children.None of these writers is considered exclusively a \"nonsense writer\". Some of them wrote texts considered to be in the genre (such as Lear, Carroll, Gorey, Lennon, Sandburg), while others only use nonsense as an occasional device (such as Joyce, Juster). All of these writers wrote outside of the nonsense genre also.Bob Dylan wrote some lyrics that contain nonsense techniques, especially around the mid-1960s, in songs like \"Bob Dylan's 115th Dream\" and \"Tombstone Blues\".David Byrne, of the art rock/new wave group Talking Heads, employed nonsensical techniques in songwriting. Byrne often combined coherent yet unrelated phrases to make up nonsensical lyrics in songs such as: \"Burning Down the House\", \"Making Flippy Floppy\" and \"Girlfriend Is Better\". This tendency formed the basis of the title for the Talking Heads concert movie, Stop Making Sense. More recently, Byrne published Arboretum (2006), a volume of tree-like diagrams that are \"mental maps of imaginary territory\". He continues, explaining the aspect of nonsense: \"Irrational logic : [...]. The application of logical scientific rigor and form to basically irrational premises. To proceed, carefully and deliberately, from nonsense, with a straight face, often arriving at a new kind of sense.\"\nSyd Barrett, founder of Pink Floyd, was known for his often nonsensical songwriting influenced by Lear and Carroll that featured heavily on Pink Floyd's first album, The Piper at the Gates of Dawn.\nThe cartoonist Glen Baxter's comic work is often nonsense, relying on the baffling interplay between word and image.\nThe Tomfoolery Show was an American cartoon comedy television series based on the nonsense works of Edward Lear, Lewis Carroll, and others.\nZippy the Pinhead, by Bill Griffith, is an American strip that mixes philosophy, including what has been called \"Heideggerian disruptions\", and pop culture in its nonsensical processes.\nNick Kershaw unintentionally created a nonsensical riddle with his single \"The Riddle\". He originally wrote gibberish lyrics as a placeholder, but decided to keep them. After the release the public thought the lyrics contained a real riddle, and MCA marketing went along with it, creating widespread fruitless speculation.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_8" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Master_of_Environmental_Management.json b/test/Academic_disciplines/Master_of_Environmental_Management.json new file mode 100644 index 0000000000000000000000000000000000000000..58edb44e5c1003c3e28499cb5ab92f1c50f87ad7 --- /dev/null +++ b/test/Academic_disciplines/Master_of_Environmental_Management.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The M.E.M. (Master of Environmental Management) is a degree designed for students with primary interests in careers in environmental policy and analysis, stewardship, education, consulting, or management dealing with natural resource or environmental issues. The program requires course work in both the natural and social sciences, with a particular focus on the relationship among science, management, and policy. The ultimate purpose of the degree program is to prepare students to address ecological and social systems with scientific understanding and an ability to make sense of the complex underlying social and ecological context.\nThe value of an interdisciplinary environmental degree is best espoused by Aldo Leopold, who obtained a Master of Forestry degree.\n\"One of the requisites for an ecological comprehension of land is an understanding of ecology, and this is by no means co-extensive with 'education'; in fact, much higher education seems deliberately to avoid ecological concepts. An understanding of ecology does not necessarily originate in courses bearing ecological labels; it is quite as likely to be labeled geography, botany, agronomy, history, or economics. This is as it should be...\". \nThe \"Big Four\" Master of Environmental Management programs are:\nUniversity of California, Santa Barbara - Bren School of Environmental Science and Management\nDuke University - Nicholas School of the Environment and Earth and Ocean Sciences\nUniversity of Michigan - School of Natural Resources and Environment\nYale University - School of Forestry and Environmental Studies\nOther programs include:\nPortland State University - College of Liberal Arts & Sciences\nUniversity of San Francisco - Master of Science in Environmental Management\nUniversity of Maryland University College - Master of Science in Environmental Management\nWestern Colorado University - Master in Environmental Management\nUniversity of Connecticut - Master of Energy and Environmental Management : Online\nMany of these schools also offer joint degrees, where the MEM is paired with an MBA, MPP, JD, or M.Div.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_9" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Philosophy_of_design.json b/test/Academic_disciplines/Philosophy_of_design.json new file mode 100644 index 0000000000000000000000000000000000000000..dea75c1de90759413935e15ff1bb78b8d07e81d2 --- /dev/null +++ b/test/Academic_disciplines/Philosophy_of_design.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "Philosophy of design is the study of definitions of design, and the assumptions, foundations, and implications of design. The field, which is mostly a sub-discipline of aesthetics, is defined by an interest in a set of problems, or an interest in central or foundational concerns in design. In addition to these central problems for design as a whole, many philosophers of design consider these problems as they apply to particular disciplines (e.g. philosophy of art).\nAlthough most practitioners are philosophers specialized in aesthetics (i.e., aestheticians), several prominent designers and artists have contributed to the field. For an introduction to the philosophy of design see the article by Per Galle at the Royal Danish Academy of Art.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_10" +} \ No newline at end of file diff --git a/test/Academic_disciplines/The_Art_Assignment.json b/test/Academic_disciplines/The_Art_Assignment.json new file mode 100644 index 0000000000000000000000000000000000000000..6034c2e8395101ea63ddf610ed98bcbcaeb033e9 --- /dev/null +++ b/test/Academic_disciplines/The_Art_Assignment.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Art Assignment is a PBS Digital Studios webseries focused on contemporary art that debuted in February 2014. The Art Assignment is hosted by Sarah Urist Green who was a curator of contemporary art for the Indianapolis Museum of Art from 2007 to 2013.\nGreen's goal for this web series is to demystify the art making process and educate people on contemporary art and how it can be “accessible and social, rather than distant or intimidating”. Green travels the United States to meet and talk with various artists about their art; the artists then give an \"assignment\" to the audience. The series teaches its audience about contemporary art while providing historical context for the art. The audience is asked to participate by completing the \"assignments\" and continuing the conversation about art in the comments and on social media. The artists included in the series explore art history through the lens of the present with framing by Green. These artists include: Jesse Sugarmann, Alex Soth, Sonja Clark, Hope Ginsburg, Maria Gaspar, Molly Springfield, Michelle Grabner, Kim Beck, Jon Rubin, Jonn Herschend & Will Rogan, Allison Smith, Tameka Norris, Lee Boroson, Nina Katchadourian, Kate Gilmore, and Deb Sokolow.\nGreen's husband John Green is executive producer of the series.\nThere are over 50 videos in the Assignment Episodes playlist, and each one features one or more artists, their styles, and a brief biography of how they developed their particular aesthetic. Their assignments relate to either their style or a valuable topic to them. Each video features a clip called \"Who's Done Stuff Like This Before\" to examine the art history behind the ideas the contemporary artists present. The audience sees what the artists did as their assignment, from the methodology to the execution and final result. The artists often reflect on their choices and the trial and error process in the project. The final step in each assignment is to document the experience in any form, and upload it to any form of social media with the hashtag #TheArtAssignment, and it could be featured in the show.Episode 1: Meet in the Middle with Douglas Paulson and Christopher RobbinsThe first official Assignment in which Sarah Urist Green and John Green introduce artists Douglas Paulson and Christopher Robbins. The two artists have collaborated in the past, and the video mentions their previous work and how they met personally. The instructions are to pick a friend, and calculate the exact midpoint between the two participants. After participants decide on a date and time to meet, they don't communicate until then, and document the experience using any medium of their choice.\nEpisode 2: Stakeout! with Deb Sokolow\nGreen talks with the Chicago-based artist Deb Sokolow about her style and how she developed it over time. Her pieces are huge and layered with text, images, and diagrams to tangle and de-tangle stories. This assignment plays with the relationship between the observer and the observed. The instructions are to find an object, place it in a public spot so strangers can interact with it, and pick a location to observe. Similar to the first episode, people record their observations using any medium of their choice.\nThis video series features various artists and art movements and delves into the impact and value they have in history. The narrator includes how the style of a movement or individual creators began and the following positive and negative reception. This segment covers artists from both past and present stemming from various ethnicities and nationalities. The videos cover a wide range of mediums, and the playlist includes minimalism, abstraction, and performance art and highlights creative minds such as Andy Warhol, Mark Rothko, Kanye West, Yoko Ono, and Ai Weiwei.Another playlist called Art Trip delves into the art history and culture in cities around the world. Currently the Art Assignment team has visited London, Tijuana, Los Angeles, Richmond, Washington D.C., the Twin Cities, and Chicago. The videos overview many national and local museums, current exhibits, and local artists.This playlist is a collection of miscellaneous topics and behind the scenes videos. Some deconstruct a bit of the mystery within the art world such as \"What's a Curator?\" and \"How to Learn About Contemporary Art\" while others give tips for art assignments and showcase a variety of artists like \"Fierce Women of Art 1\".This segment has an \"art hotline\" with an actual phone so viewers can call in their questions about art. The number is 901-602-ARTY (2789). The questions range from personal advice to opinions on current issues in the art world and much more.There are 24 assignment response videos which can feature over a hundred creations per video. The Phoenix New Times and Indianapolis Star both covered the show after the first episode aired on February 20, 2014. Despite its birth on the internet, The Art Assignment made it into real life with a physical exhibit in August 2016 that NUVO reviewed. It featured the work of three Indianapolis artists : Brian McCutcheon, Nathaniel Russel, and Lauren Zoll : who have previously given out assignments.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_11" +} \ No newline at end of file diff --git a/test/Academic_disciplines/The_Problems_of_Genocide.json b/test/Academic_disciplines/The_Problems_of_Genocide.json new file mode 100644 index 0000000000000000000000000000000000000000..da1d168960a45f531faa646f44f67a2f9a55d24c --- /dev/null +++ b/test/Academic_disciplines/The_Problems_of_Genocide.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Problems of Genocide: Permanent Security and the Language of Transgression is a 2021 book by Australian historian A. Dirk Moses. The book explores what Moses sees as flaws in the concept of genocide, which he argues allows killings of civilians that do not resemble the Holocaust to be ignored. Moses proposes \"permanent security\" as an alternative to the concept of genocide. The book was described as important, but his emphasis on security is considered only one factor to be causing mass violence.\nA. Dirk Moses is an Australian historian, much of whose work has focused on genocide studies, including editing the Journal of Genocide Research. According to Moses, he decided to write the book in the mid-2000s to express his misgivings about the concept of genocide, in the form of \"A non-teleological intellectual history... that exposed genocide’s problematic function in obscuring the logic of 'permanent security' in what I call the 'language of transgression'.\" The book draws on Moses' earlier work on settler colonialism, liberal imperialism, comparative genocide studies, and the history of violence. Moses is not the first to propose alternatives to genocide; historian Christian Gerlach coined the term \"extremely violent societies\" to broaden attention from genocide as a state crime. The book was published about the same time as Moses initiated the catechism debate, arguing that German Holocaust remembrance has shut down criticism of colonialism and racism.Moses argues that genocide is not just a problem because of the human suffering inherent in the phenomenon, but also how the concept of genocide, because of its position as the \"crime of crimes\", \"blinds us to other types of humanly caused civilian death, like bombing cities and the 'collateral damage' of missile and drone strikes, blockades, and sanctions\".Moses introduces the concept of \"permanent security\", which is distinguished from other security imperatives by being anticipatory and characterized by a paranoid threat perception. Moses distinguishes two types of permanent security, illiberal and liberal. Illiberal permanent security \"entails preventative killing of presumed future threats to a particular ethnos, nation, or religion, in a bounded 'territoriality'\". Liberal permanent security often develops in opposition to illiberal permanent security, and aims to secure the entire world in the name of humanity. Moses argues that permanent security underpins the three mass atrocity crimes of genocide, crimes against humanity, and war crimes, because prejudice does not cause violence without the securitization of the other. He argues that permanent security should be criminalized.\nThe third section of the book covers Holocaust memory and comparative genocide studies. Moses argues that the concept of genocide depoliticized earlier ways of talking about mass violence (the language of transgression), and the ongoing view of genocide as a depoliticized crime normalizes types of violence that cannot be analogized to the Holocaust.\nSinja Graf praised the book as \"written from an unrelenting concern for the sanctity of human lives\" and \"a landmark study that redefines perspectives on mass atrocities across political science, history, and international law\". Syrian dissident Yassin al-Haj Saleh considers the book important and relevant for Syria and the Arab world, advocating translation into Arabic. However, he considers Moses' proposal to criminalize permanent security not feasible. Historian Taner Akcam calls the book \"the most comprehensive critiqueproduced thus far on the concept of genocide\" and a foundational work.\nHistorian Omer Bartov described the book as \"an erudite, complex, and in many parts quite fascinating read\", but says that Moses fails to propose a viable alternative to the concept of genocide. Some Holocaust historians accused Moses of promoting a conspiracy theory by which Raphael Lemkin, a major supporter for the inclusion of genocide in international law, was a Jewish exclusivist and only concerned regarding the Jews under Nazi rule. However, according to Dan Stone, Moses' reading, although debatable, \"is well within the norms of intellectual history\"; furthermore, it is not the focus of the book. \nSecurity studies researcher Beatrice de Graaf says that the book is \"crucially important in shattering consolidated legal, political scientific and historiographical positions on genocide, international law and security\". Nevertheless, she is critical of Moses' conception of permanent security, arguing that he overlooks earlier work in historical and critical security studies exploring the totalizing instinct of state security in general, and his argument would be stronger if he covered the origins of the preventative security paradigm in Europe around 1800. According to reviewer Ulrike von Hirschhausen, Moses ignores recent research on how indigenous people used the \"language of transgression\" to resist colonialism, and flattens the complicated reality of historical empires by presenting them as totalizing, when in fact these empires attempted to manage difference, not wipe it out. \nFurthermore, Moses' focus on security has recognized as a significant factor in incidents of genocidal violence, but is a monocausal explanation that cannot explain genocidal violence by itself. Von Hirschhausen states, \"In the age of nationalism however, both colonisers and the colonised turned ethnicity, not security, into the most effective means to mobilise intervention in favour of or against imperial rule.\" The obsession of Nazis and other antisemites with \"racial hygiene\" and the euthanasia killings cannot be explained through a securitization framework. Moses does not engage with the argument of Götz Aly that greed and acquisitiveness, both in terms of individual perpetrators enriching themselves and Germany's desire to dominate Europe and live on plunder, were among the primary motivators of Nazi criminality.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_12" +} \ No newline at end of file diff --git a/test/Academic_disciplines/The_Sexual_Contract.json b/test/Academic_disciplines/The_Sexual_Contract.json new file mode 100644 index 0000000000000000000000000000000000000000..a20613667ed5998bc92909536d297b23f007057e --- /dev/null +++ b/test/Academic_disciplines/The_Sexual_Contract.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Sexual Contract is a 1988 non-fiction book by British feminist and political theorist Carole Pateman which was published through Polity Press. This book is a seminal work which discusses how contract theory continues to affirm the patriarchy through methods of contractual submission where there is ultimately a power imbalance from systemic sexism. The focus of The Sexual Contract is on rebutting the idea that a post-patriarchal or anti-patriarchal society presently exists as a result of the conception of a civil society. Instead, Pateman argues that civil society continues to aid feminine oppression and that the orthodoxy of contracts such as marriage cannot become equitable to both women and men. Pateman uses a feminist lens when rationalising the argument proposed in The Sexual Contract through the use of works by classic political and liberal philosophers Thomas Hobbes, John Locke, Jean-Jacques Rousseau and later interpreted by the Founding Fathers whom Pateman has before critiqued as being responsible for the development of modern rights and freedoms derived from archaic standards of contract that are deeply embedded within Western Spheres, particularly America, England and Australia, which are the focus areas for her work.\nCarole Pateman when writing The Sexual Contract used her previous background in political theory as support to substantiate a feminist commentary and critique on the nature of contracts as tools to control womanhood establishing how \"the original contract constitutes men's freedom and women's subjection\". Pateman writes within the confines of the Western Tradition which presents both how this tradition excludes women and how it fundamentally supported female oppression in western political and legal thought. Pateman elucidates how The Sexual Contract as a theory is rooted in how the period of enlightenment was essentially led by men for the liberation of men with the quote Liberté, égalité, fraternité excluding the liberation of women through language used within this period, effectively fashioning the beginnings of modern patriarchy. Pateman voices this in order to demonstrate her point that social contracts based upon these ideas of liberty are inherently skewed to favor the sex-right of men and the subordination of women to sustain social contract therefore becoming a sexual contract which inhibits the autonomy of women.The Sexual Contract is divided into eight chapters. Pateman utilizes 'feminist storytelling' structures to illustrate contract theory from its origins to its contemporary implications. Pateman displays how contracts affect womanhood in a multitude of ways such as economic and sexual capitalisation, that is exploited from women through marriage, prostitution and surrogacy. The Sexual Contract reveals the complications associated with contract theory and how \"Feminists therefore cannot 'reform' those parts of political theory, they must start anew and from scratch\".The articulation throughout the book is that contractarian theory cannot be amended in a progressive manner. Contracts always initiate a political right entailing an intrinsically dominant and subordinate party. Moreover, The Sexual Contract explores how the basis of Western society is built upon the contractual oppression of women in order to uphold a patriarchal regime, depicting how in the wake of social contract between enlightened men there exists \"another contract, the sexual contract, by which men gain possession of women.\"\nPateman pays close attention to the contract obligations associated with marriage: \"Women are incorporated into society via the marriage contract but they may enter such a contract not as equal individuals but as natural subordinate\". Marriage acts as a way to gain \"sexual access\" to a woman's body and the \"labour\" she provides as a wife.\" It is regarded as a major institution in society: \"the institution of marriage gives each husband the capacity, if he so wishes, to ill-treat his wife.\" The institution of marriage is established as \"legal prostitution\", an entity comparable to a labour contract, wherein the master (husband) enters into this contract with the servant (housewife) as a subordinate. According to Thomas Hobbes' state of nature, the \"conquering\" of a woman within the marriage contract leads to the wife's submission as a sexual servant, rendering her the property of the husband who is recognised as the proper member of civil and contractual society. Pateman's issue with marriage begins with how institutionally becoming a 'husband' gives patriarchal right over the 'wife'.The example of prostitution is utilised by Pateman to explain how the patriarchy manages to create sexual capital off the sexual labour of women. Using the 'story' of the sexual contract, it becomes apparent that \"prostitution is part of the exercise of the law of male sex-right\" ensuring continued access to women's bodies. 'The prostitution contract' is outlined by Pateman to be an example of an 'original' sexual contract, becoming a precursor to the metaphorical prostituting of the worker for capital, within civil patriarchal society. Pateman deduces that contractarians defend prostitution as a form of labour explaining that prostitution contracts are similar to employment contracts. This, Pateman shows, is a rationale for enduring affirmation of male sex-right and the monetization of women's bodies, legitimising how prostitution affirms patriarchal status.Surrogacy as an example is used throughout The Sexual Contract to create a dialogue on how women's bodies have become legitimized capital in contemporary society. Pateman outlines how this is a result of the sexual contract imposed onto women similar to the contracts associated with prostitution. The surrogacy contract is another facet of the sexual contract providing a new form of access to women's bodies. The issue within the surrogacy contract is that its aspects are inherently class-based, that is, working-class women are attracted to the financial aspect of this contract, but are ultimately not equal to the party that benefits from the time and nature of the service they are providing. Pateman uses the words of John Locke as an example on the differences between a surrogacy contract and prostitution contract, where although men don't use direct sexual use of a woman's body for surrogacy, the 'mixing of the man's seed' with the 'woman's uterus' if performed 'faithfully' results in a child essentially owned by the male party. Patemans argues the intervention of women within civil society demonstrates how the surrogacy contract remains a part of a dependence on female sexuality and how it is not the discretion of the woman which is valued in the contract but instead her body which is used by society.The Sexual Contract concludes with Pateman stating how the original contract is a political fiction that belongs to modern patriarchy. There is no true origin to the original contract; instead, it exists as a progression to liberty but only the liberty of certain individuals. The crux of the issue as outlined by Pateman is that political and legal liberty need to be discussed and explored from a perspective different from a traditionalist one. Pateman seeks in her work to elaborate more thoroughly on the issues with civil society and how it cannot be established as equal because of its patriarchal origins. It instead must be dismissed and re-established to become equitable between the sexes. Women can never truly become individuals because their bodies cannot be forgotten by their male counterparts. A contract between men and women is influenced because of the ideal of embodied feminine beings which can never truly exist, as individuals like men can, with civil society.The Sexual Contract received the 2005 Benjamin E. Lippincott Award, sponsored by the American Political Science Association, 17 years after it was initially published. The book has been widely used as an example of work that transcends mainstream academic work being called a \"challenging and thought-provoking\" work, it has been cited in a number of journals on political theory and feminism and translated into Polish, French, Turkish, Portuguese, Spanish, Croatian and Slovak. The Sexual Contract has remained a relevant and valid addition to feminist theory and is still a work often referenced across many fields of discipline. Thirty years after its initial publication, an anniversary edition of The Sexual Contract was published to celebrate the impact it had on political and feminist theory with the addition of a new preface from the author.Pateman states how The Sexual Contract was written specifically with Anglo countries in mind, directly addressing the common-law traditions present within these spheres; however, it has become evident that Pateman's work speaks to a number of experiences from different cultures. An issue in criticisms directed at The Sexual Contract is a contextual problem from when Pateman was writing : the issue of essentialism, taking her nuanced arguments from specific portions of the work without concern for the uniting thread on how The Sexual Contract is most importantly a portrait on how \"sexual difference as political difference\" between the sexes, is based within the knowledge and works of classic theorists.The Sexual Contract has become an important work within the context of understanding the intersection between womanhood and political and legal theories with Pateman's work, becoming an entity which \"challenges assumptions made in political theory and it has become a classic second-wave feminist text\". Pateman's work manages to continue to establish how modern society continues to support the institutional contract which ultimately continues to oppress women. Even with the social change that has occurred over the past thirty years, the increase in migration and the radical changes in working-class industries such as mining and printing, The Sexual Contract with its subsequent theories endures the passage of time with relative ease. The Sexual Contract \"has been informed by her [Pateman's] understanding of feminism as a call to keep focused on the big picture, speaking truth to power.\" Its impact on understandings of law and gender has reached beyond its initial 1988 release. It continues to be consistent with issues within modern movements such as the #MeToo movement which highlights the struggle of supported celebrity women, but skips over women unable to voice their experiences of harassment in case of retaliation from social and economic spheres. This is where Pateman's text supports the idea on how \"the un-silencing of women in contemporary society is only partial.\"The criticisms of Pateman's argument have focused on her emphasis on the argument of the sexual contract, and the relationship this has with Hobbes' and Locke's views on contract theory, \"making Hobbes more theoretically consistent and Locke less overtly patriarchal\". Pateman also continually ignores the consensual entering of women into these contracts, or how \"female sexual desire\" fits into the dominating patriarchal society that Pateman outlines in her work. The Sexual Contract also lacks the nuances of how race and class intersect with social/sexual contract theory, particularly the lack of analysis on how this dynamic works between black individuals or how Pateman's exclusionary approach to sex, race and class threatens to defy the hegemonic narrative Pateman constructs.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_13" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Xanadu_Houses.json b/test/Academic_disciplines/Xanadu_Houses.json new file mode 100644 index 0000000000000000000000000000000000000000..eae3706c6ab54ca37694c19e40386aeb91d1a3a7 --- /dev/null +++ b/test/Academic_disciplines/Xanadu_Houses.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Xanadu Houses were a series of experimental homes built to showcase examples of computers and automation in the home in the United States. The architectural project began in 1979, and during the early 1980s three houses were built in different parts of the United States: one each in Kissimmee, Florida; Wisconsin Dells, Wisconsin; and Gatlinburg, Tennessee. The houses included novel construction and design techniques, and became popular tourist attractions during the 1980s.\nThe Xanadu Houses were notable for their easy, fast, and cost-effective construction as self-supporting monolithic domes of polyurethane foam without using concrete. They were ergonomically designed, and contained some of the earliest home automation systems. The Kissimmee Xanadu, designed by Roy Mason, was the most popular, and at its peak was attracting 1000 visitors every day. The Wisconsin Dells and Gatlinburg houses were closed and demolished in the early 1990s; the Kissimmee Xanadu House was closed in 1996 and demolished in October 2005.\nBob Masters was an early pioneer of houses built of rigid insulation. Before conceiving the Xanadu House concept, Masters designed and created inflatable balloons to be used in the construction of houses. He was inspired by architect Stan Nord Connolly's Kesinger House in Denver, Colorado, one of the earliest homes built from insulation. Masters built his first balloon-constructed house exterior in 1969 in less than three days during a turbulent snowstorm, using the same methods later used to build the Xanadu houses.Masters was convinced that these dome-shaped homes built of foam could work for others, so he decided to create a series of show homes in the United States. Masters's business partner Tom Gussel chose the name \"Xanadu\" for the homes, a reference to Xanadu, the summer capital of Yuan, which is prominently featured in Samuel Taylor Coleridge's famous poem Kubla Khan. The first Xanadu House opened in Wisconsin Dells, Wisconsin. It was designed by architect Stewart Gordon and constructed by Masters in 1979. It was 4,000 square feet (370 m2) in area, and featured a geodesic greenhouse. 100,000 people visited the new attraction in its first summer.\nThe most popular Xanadu house was the second house, designed by architect Roy Mason. Masters met Mason in 1980 at a futures conference in Toronto. Mason had worked on a similar project prior to his involvement in the creation of the Kissimmee Xanadu House — an \"experimental school\" on a hill in Virginia which was also a foam structure. Both Mason and Masters were influenced by other experimental houses and building concepts which emphasized ergonomics, usability, and energy efficiency. These included apartments designed by architect Kisho Kurokawa featuring detachable building modules and more significant designs including a floating habitat made of fiberglass designed by Jacques Beufs for living on water surfaces, concepts for living underwater by architect Jacques Rougerie and the Don Metz house built in the 1970s which took advantage of the earth as insulation. Fifty years before Xanadu House, another house from the 1933 Homes of Tomorrow Exhibition at the Century of Progress Exposition in Chicago introduced air conditioning, forced air heating, circuit breakers and electric eye doors.Mason believed Xanadu House would alter people's views of houses as little more than inanimate, passive shelters against the elements. \"No one's really looked at the house as a total organic system\", said Mason, who was also the architecture editor of The Futurist magazine. \"The house can have intelligence and each room can have intelligence.\" The estimated cost of construction for one home was $300,000. Roy Mason also planned a low cost version which would cost $80,000, to show that homes using computers do not have to be expensive. The low cost Xanadu was never built. Approximately 1,000 homes were built using this type of construction.\nThe Walt Disney Company opened Epcot Center in Florida on October 1, 1982 (originally envisioned as the Experimental Prototype Community of Tomorrow). Masters, fellow Aspen High School teacher, Erik V Wolter, and Mason decided to open a Xanadu House several miles away in Kissimmee. It eventually opened in 1983, after several years of research into the concepts Xanadu would use. It was over 6,000 square feet (560 m2) in size, considerably larger than the average house because it was built as a showcase. At its peak in the 1980s, under the management of Wolter, more than 1,000 people visited the new Kissimmee attraction every day. A third Xanadu House was built in Gatlinburg, Tennessee. Shortly after the Xanadu Houses were built and opened as visitor attractions, tourism companies began to advertise them as the \"home of the future\" in brochures encouraging people to visit.\nBy the early 1990s, the Xanadu houses began to lose popularity because the technology they used was quickly becoming obsolete, and as a result the houses in Wisconsin and Tennessee were demolished, while the Xanadu House in Kissimmee continued to operate as a public visitor attraction until it was closed in 1996. It was consequently put up for sale in 1997 and was sold for office and storage use. By 2001, the Kissimmee house had suffered greatly from mold and mildew throughout the interior due to a lack of maintenance since being used as a visitor attraction, it was put up for sale again for an asking price of US$2 million. By October 2005, the last of the Xanadu houses had been demolished, following years of abandonment and use by the homeless.The Kissimmee house was featured in the 2007 movie Urban Explorers: Into the Darkness. It showed the house in disrepair with doors wide open, mold growing everywhere and a homeless man living inside. The \"explorers\" walked through the house filming the decay firsthand as the homeless man slept in a chair on the main floor. At the end of the segment, the man wakes up and threatens the \"explorers\" telling them to leave his home.\nConstruction of the Xanadu house in Kissimmee, Florida, began with the pouring of a concrete slab base and the erection of a tension ring 40 feet (12 m) in diameter to anchor the domed roof of what would become the \"Great Room\" of the house. A pre-shaped vinyl balloon was formed and attached to the ring, and then inflated by air pressure from large fans. Once the form was fully inflated, its surface was sprayed with quick-hardening polyurethane plastic foam. The foam, produced by the sudden mixture of two chemicals that expand on contact to 30 times their original volume, hardened almost instantly. Repeated spraying produced a five-to-six-inch-thick structurally sound shell within a few hours. Once the foam cured, the plastic balloon form was removed to be used again. Once the second dome was completed and the balloon form removed, the two rooms were joined by wire mesh which was also sprayed with foam to form a connecting gallery or hall. This process was repeated until the house was complete. Window, skylight, and door openings were cut and the frames foamed into place. Finally, the interior of the entire structure was sprayed with a 3⁄4 inch (1.9 cm) coating of fireproof material that also provided a smooth, easy-to-clean finish for walls and ceilings. The exterior was given a coat of white elastomeric paint as the final touch.A Xanadu House was ergonomically designed, with future occupants in mind. It used curved walls, painted concrete floors rather than carpets, a light color scheme featuring cool colors throughout, and an open-floor plan linking rooms together without the use of doors. It had at least two entrances, and large porthole-type windows. The interior of the house was cave-like, featuring cramped rooms and low ceilings, although it is not clear whether these accounts describe the same Xanadu House with a thirty-foot dome. The interiors used a cream color for the walls, and a pale green for the floor.The Xanadu house in Kissimmee, Florida used an automated system controlled by Commodore microcomputers. The house had fifteen rooms; of these the kitchen, party room, health spa, and bedrooms all used computers and other electronic equipment heavily in their design. The automation concepts which Xanadu House used are based on original ideas conceived in the 1950s and earlier. The Xanadu Houses aimed to bring the original concepts into a finished and working implementation. Inside the house, there was an electronic tour guide for the benefit of visitors, and the family room featured video screens that displayed computer-graphics art. These art displays were constantly changing, being displayed on video screens as opposed to static mediums.\n The home also featured fire and security systems, along with a master bath that included adjustable weather conditions and a solar-heated steam bath.\nAt the center of the house was the \"great room\", the largest in the house. It featured a large false tree supporting the roof, and also acted as part of the built-in heating system. The great room also included a fountain, small television set, and a video projector. Nearby was the dining room, featuring a glass table with a curved seat surrounding it; behind the seats was a large window covering the entire wall. The family room featured walls covered with television monitors and other electronic equipment. The entertainment center in the family room was described as an \"electronic hearth\" by the home's builders. It was planned as a gathering place for family members and relatives along the same lines as a traditional hearth with a fireplace.\nThe kitchen was automated by \"autochef\", an electronic dietitian which planned well-balanced meals. Meals could be cooked automatically at a set date and time. If new food was required, it could either be obtained via tele-shopping through the computer system or from Xanadu's own greenhouse. The kitchen's computer terminal could also be used for the household calendar, records, and home bookkeeping.\nThe Xanadu homes also suggested a way to do business at home with the office room and the use of computers for electronic mail, access to stock and commodities trading, and news services.\nComputers in the master bedroom allowed for other parts of the house to be controlled. This eliminated chores such as having to go downstairs to turn off the coffee pot after one had gone to bed. The children's bedroom featured the latest in teaching microcomputers and \"videotexture\" windows, whose realistic computer-generated landscapes could shift in a flash from scenes of real places anywhere in the world to imaginary scenes. The beds at the right of the room retreated into the wall to save space and cut down on clutter; the study niches were just the right size for curling up all alone with a pocket computer game or a book.\nIn the spa, people could relax in a whirlpool, sun sauna, and environmentally-controlled habitat, and exercise with the assistance of spa monitors. One of the advantages of using computers in the home includes security. In Xanadu House, a HAL-type voice spoke when someone entered to make the intruder think someone was home.\nAn initial concern was that electricity costs would be excessive, since several computers would be operating continuously. Mason figured that a central computer could control the energy consumption of all the other computers in the house.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_14" +} \ No newline at end of file diff --git a/test/Academic_disciplines/Yessiey_Award.json b/test/Academic_disciplines/Yessiey_Award.json new file mode 100644 index 0000000000000000000000000000000000000000..845079ff71b88b4dd56048446d17a69bcb96ef9e --- /dev/null +++ b/test/Academic_disciplines/Yessiey_Award.json @@ -0,0 +1,71 @@ +{ + "domain": "Academic_disciplines", + "document": "The Yessiey Awards formerly known as Yessiey Magazine Awards is an annual accolade presented by Yessiey Magazine to honour writers, actors, humanitarian, art, entrepreneurs, and journalists. The award recognizes exemplary contributions.\nYessiey Awards is presented annually by Yessiey Magazine owned by Oluwaseun Olaegbe. To be considered for a Yessiey Award, a media piece or person must go through an entry process. The award also involves a voting process where nominees are selected, and winners are determined through public voting.\nThe name Yessiey was coined from the slogan which states “YES! Stay Informed”. In 2022, the Award was renamed the Yessiey award and the Award is an annual awards ceremony celebrating achievements in the field of acting, writing, journalism, humanitarian, business and arts. The winners of each category were voted for by members of the public, and were announced at the awards ceremony.The Yessiey Awards also organizes the Yessiey Africa 100 Most Influential People award, which highlights individuals who have made impactful contributions to their fields and the wider community.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "FieldOfWork", + "Uses", + "MaintainedBy", + "ExecutiveProducer", + "RatifiedBy", + "TypeOfElectrification", + "Acknowledged", + "ContributedToCreativeWork", + "HasList", + "ReviewedBy", + "TakesPlaceInFictionalUniverse", + "Occupation", + "ProducedSound", + "LocatedIn", + "Event", + "Weight", + "MayPrevent", + "Country", + "PartOf", + "Founded", + "Origin", + "DesignedBy", + "Author", + "Partner", + "EducatedAt", + "MemberOf", + "PublishedIn", + "FollowedBy", + "NotableWork" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Academic_disciplines_15" +} \ No newline at end of file diff --git a/test/Business/Application_for_employment.json b/test/Business/Application_for_employment.json new file mode 100644 index 0000000000000000000000000000000000000000..0335148c18b4caafc64b0819f6862fb7e8c98137 --- /dev/null +++ b/test/Business/Application_for_employment.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "An application for employment is a standard business document that is prepared with questions deemed relevant by employers. It is used to determine the best candidate to fill a specific role within the company. Most companies provide such forms to anyone upon request, at which point it becomes the responsibility of the applicant to complete the form and return it to the employer for consideration. The completed and returned document notifies the company of the applicant's availability and desire to be employed as well as their qualifications and background so that a determination can be made as to the candidate's suitability to the position.\nFrom the employer's perspective, the application serves a number of purposes. These vary depending on the nature of the job and the preferences of the person responsible for hiring, as \"each organization should have an application form that reflects its own environment\". At a minimum, an application usually requires the applicant to provide information sufficient to demonstrate that they are legally permitted to be employed. The typical application also requires the applicant to provide information regarding relevant skills, education, and experience (previous employment or volunteer work). The application itself is a minor test of the applicant's literacy, penmanship, and communication skills. A careless job applicant might disqualify themselves with a poorly filled-out application.The application may also require the applicant to disclose any criminal record and to provide information sufficient to enable the employer to conduct an appropriate background check. For a business that employs workers on a part-time basis, the application may inquire as to the applicant's availability at specific times and/or days and preferences in this regard. Employers may be prohibited from asking applicants about characteristics that are not relevant to the job, such as their political view or sexual orientation.\nFor white collar jobs, particularly those requiring communication skills, the employer will typically require applicants to accompany the form with a cover letter and a résumé. However, even employers who accept a cover letter and résumé will frequently also require the applicant to complete an application form, as the other documents may neglect to mention specific details of importance to the employer. In some instances, an application is effectively used to dissuade \"walk-in\" applicants, serving as a barrier between the applicant and a job interview with the person who has the authority to hire.\nFor many businesses, applications for employment can be filled out online, rather than submitted in person. However, it is still recommended that applicants bring a printed copy of their application to an interview.\nApplication forms are the second most common hiring instrument next to personal interviews. Companies will occasionally use two types of application forms, short and long. They help companies with initial screening and the longer form can be used for other purposes as well. The answers that applicants choose to submit are helpful to the company because they can potentially become an interview question for that applicant.\nThe employment application is not a standardized form, so every company may create its own as long as regulations set by the government are adhered to.At a minimum, applications usually ask the applicant for their name, phone number, and address. In addition, applications may also ask for previous employment information, educational background, emergency contacts, and references, as well as any special skills the applicant might have.The three categories of information that application fields are very useful for discovering are physical characteristics, experience, and environmental factors.\nIf the company has a bona fide occupational qualification (BFOQ) to ask regarding a physical condition, they may ask questions about it. For example:The job requires a lot of physical labor. Do you have any physical problems that may interfere with this job?\nExperience requirements can be separated into two groups on an application: work experience and educational background. Educational background is important because it allows a potential employer to evaluate an applicants' performance in school as well as make determinations as to personality and intelligence. Work experience is important because it will inform a potential employer if the applicant meets their specific needs. Companies are usually interested when applicants were unemployed, when/why the applicant left their previous job and their highest position at their previous job.Companies may be interested in the applicant's social environment because it can inform them of their personality, interests, and qualities. For example, if they are extremely active within an organization, that may demonstrate their ability to communicate well with others. Being in management may demonstrate their leadership ability as well as their determination.Customs vary from country to country when it comes to the inclusion or non-inclusion of a photograph of the applicant. In many English-speaking countries, notably the United States, this is not customary, and books or websites giving recommendations about how to design an application typically advise against it unless explicitly requested by the employer. In other countries (for instance, Germany), the inclusion of a photograph of the applicant is still common, and many employers would consider an application incomplete without it.In France, the 2006 Equal Opportunities Act requires companies with more than 50 employees to request an anonymous application (CV anonyme).The job application is called Bewerbung in Germany and usually consists of three parts: the Anschreiben (cover letter), the Lebenslauf (curriculum vitae (CV)) and the Zeugnisse (references). The Anschreiben is used to convince the employer to submit an invitation for a job interview. It must be in paper size DIN A4, not exceed one page, have a handwritten signature, and be accompanied by a Lebenslauf and Zeugnisse. The Lebenslauf is documented in reverse chronological order and should give information on work experience, education and professional training as well as an applicant's skills. In Germany, the Lebenslauf usually includes a photograph called Bewerbungsfoto. Some employers, mainly governmental organisations, deliberately neglect the photograph to ensure a higher degree of objectivity in the course of assessment procedures. The Lebenslauf should be two pages long. In general, there are two options of submitting a job application in Germany: a job application folder (Bewerbungsmappe) or online (Onlinebewerbung). According to a study, the Onlinebewerbung was more favored in Germany than the Bewerbungsmappe by 2012.The CV is the most important part of the application and should not be longer than two to three pages. It is divided into three areas:In chronological order:\nPersonal details (Informazioni personal)\nSchool and education (Studi e Formazione)\nIn reverse chronological order:\nAdditional capabilities/skills (Altre conoscenze)\nExperience (Esperienze professional). As a graduate, this section is omitted. Brief information on the application motivations may be mentioned here.\nThe cover letter (La Lettera di accompagnamento al curriculum) is relatively short, polite and formal in Italian applications. Long versions and extensively explained motivations, as well as photos and copies of certificates, are presented only at the interview.\nIn Spain, the application consists of two parts: the cover letter (Carta de Candidatura) and the CV. No work or training certificates are attached. The cover letter should be short and contain the reason for applying. The CV should be structured in a tabular form. In Spain, multiple job interviews with the same company are common.Job applications are known to be used by hackers to get employees to open attachments or links or connect USB sticks with malware. As companies typically have more financial resources than private individuals, they are often a target of cyberextortion. Ransomware such as \"Petya\" and \"GoldenEye\" were discovered to exploit job applications. Cyberespionage and attacks on critical infrastructure-related companies may be other reasons for such attacks and other than ransomware attacks may leave employees in the dark about their computer or network infection. The best method for mitigating such risks would be to have the HR department use a separate computer for job applications that is entirely disconnected from the internal network, on which no confidential or valuable information is stored and to which no portable devices such as USB sticks that may get connected to other computers of the company are connected.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_0" +} \ No newline at end of file diff --git a/test/Business/Blame_in_organizations.json b/test/Business/Blame_in_organizations.json new file mode 100644 index 0000000000000000000000000000000000000000..0f0d2e04600d452413e9e44ceca401765b03d361 --- /dev/null +++ b/test/Business/Blame_in_organizations.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "Blame in organizations may flow between management and staff, or laterally between professionals or partner organizations. In a blame culture, problem-solving is replaced by blame-avoidance. Blame shifting may exist between rival factions. Maintaining one's reputation may be a key factor explaining the relationship between accountability and blame avoidance. The blame culture is a serious issue in certain sectors such as safety-critical domains.\nThe flow of blame in an organization may be a primary indicator of that organization's robustness and integrity. Blame flowing downwards, from management to staff, or laterally between professionals or partner organizations, indicates organizational failure. In a blame culture, problem-solving is replaced by blame-avoidance. Blame coming from the top generates \"fear, malaise, errors, accidents, and passive-aggressive sometimes actual aggressive responses from the bottom\", with those at the bottom feeling powerless and lacking emotional safety. Employees have expressed that organizational blame culture made them fear prosecution for errors, accidents and thus unemployment, which may make them more reluctant to report accidents, since trust is crucial to encourage accident reporting. This makes it less likely that weak indicators of safety threats get picked up, thus preventing the organization from taking adequate measures to prevent minor problems from escalating into uncontrollable situations. Several issues identified in organizations with a blame culture contradicts high reliability organizations best practices. Organisational chaos, such as confused roles and responsibilities, is strongly associated with blame culture and workplace bullying. Blame culture promotes a risk aversive approach, which prevent from adequately assessing risks.When an accident happens in an organization, its reaction tends to favor the individual blame logic, focusing on finding the employees who made the most prominent mistake, often those on the frontline, rather than an organization function logic, which consists in assessing the organization functioning to identify the factors which favored such an accident, despite the latter being more efficient to learn from errors and accidents. A systematic review with nurses found similar results, with a blame culture negatively affecting the nurse's willingness to report errors, increase turnover and stress. Another common strategy when several organizations work together is to blame accidents and failures on each other, or to the last echelon such as the implementing actors. Several authors suggest that this blame culture in organizations is in line and thus favored by the western legal system, where safety is a matter of individual responsibility. Economic pressure is another factor associated with blame culture. Some authors argue that no system is error-free, and thus focusing efforts in blaming individuals can only prevent actual understanding of the various processes that led to the fault.\nA study found that the perception of injustice is influenced by both the individuals assertions of their morality domain, and by their identification to the organization: the higher one identifies with the organization, the less likely one will see the organization's actions as unjust. Individuals were also increasingly suspicious when observing their peers being affected by injustices, which is a behavior in line with deontic ethics.\nAccording to Mary Douglas, blame is systematically used in the micro politics of institutions, with three latent functions: explaining disasters; justifying allegiances, and stabilizing existing institutional regimes. Within a politically stable regime, blame tends to be asserted on the weak or unlucky one, but in a less stable regime, blame shifting may involve a battle between rival factions. Douglas was interested in how blame stabilizes existing power structures within institutions or social groups. She devised a two-dimensional typology of institutions, the first attribute being named \"group\", which is the strength of boundaries and social cohesion, the second \"grid\", the degree and strength of the hierarchy.According to Douglas, blame will fall on different entities depending on the institutional type. For markets, blame is used in power struggles between potential leaders. In bureaucracies, blame tends to flow downwards and is attributed to a failure to follow rules. In a clan, blame is asserted on outsiders or involves allegations of treachery, to suppress dissidence and strengthen the group's ties. In the 4th type, isolation, the individuals are facing the competitive pressures of the marketplace alone, in other words there is a condition of fragmentation with a loss of social cohesion, potentially leading to feelings of powerlessness and fatalism, and this type was renamed by various other authors into \"donkey jobs\". It is suggested that the progressive changes in managerial practices in healthcare is leading to an increase in donkey jobs. The group and hierarchy strength may also explain why healthcare experts, who often devise clinical procedures on the field, may be refractory to new safety guidelines from external regulators, perceiving them as competing procedures changing cultures and imposing new lines of authority.\nThe requirement of accountability and transparency, assumed to be key for good governance, worsen the behaviors of blame avoidance, both at the individual and institutional levels, as is observed in various domains such as politics and healthcare. Indeed, institutions tend to be risk-averse and blame-averse, and where the management of societal risks (the threats to society) and institutional risks (threats to the organizations managing the societal risks) are not aligned, there may be organizational pressures to prioritize the management of institutional risks at the expense of societal risks. Furthermore, \"blame-avoidance behaviour at the expense of delivering core business is a well-documented organizational rationality\". The willingness of maintaining one's reputation may be a key factor explaining the relationship between accountability and blame avoidance. This may produce a \"risk colonization\", where institutional risks are transferred to societal risks, as a strategy of risk management. Some researchers argue that there is \"no risk-free lunch\" and \"no blame-free risk\", an analogy to the \"no free lunch\" adage.Blame culture is a serious issue in safety-critical domains, where human errors can have dire consequences, for instance in hospitals and in aviation. However, as several healthcare organizations were raising concerns, studies found that increasing regulatory transparency in health care had the unintended consequence of increasing defensive practice and blame shifting, for example by obfuscating errors reporting. Following rare but high-profile scandals, there are political incentives for a \"self-interested blame business\" promoting a presumption of \"guilty until proven innocent\" A literature review found that human resource management plays an important role in health care organizations: when such organizations rely predominantly on a hierarchical, compliance-based management system, blame culture is more likely to happen, whereas when employees involvement in decision making is more elicited, a just or learning culture is more likely.Blame culture has been suggested as a major source of medical errors. The World Health Organization, the United States' Agency for Healthcare Research and Quality and United Kingdom's National Health Service recognize the issue of blame culture in healthcare organizations, and recommends to promote a no-blame culture, or just culture, in order to increase patients' safety, which is the prevention of errors and adverse effects to patients. Other authors suggest to also provide emotional support to help healthcare professionals deal with the emotions elicited by their patients. Yet others have pointed out the lack of nomination among healthcare staff as directors, so that those on the field are excluded from the decision processes, and thus lack intrinsic motivation to enhance patients safety processes.\nIn the United Kingdom, a 2018 survey of 7887 doctors found that 78% said the NHS resources are inadequate to ensure patients safety and quality of services, 95% are fearful of making a medical error and that the fear has increased in the past 5 years, 55% worry they may be unfairly blamed for errors due to systems failings and pressures, and 49% said they practice defensively. A sizeable proportion of these doctors recognized the issue of bullying, harassment or undermining, 29% declaring it was sometimes an issue and 10% saying it was often an issue. Dozens of UK doctors under fitness-to-practice investigations committed suicide.\nIn 2018, an investigation into the cases of 11 deaths in Gosport War Memorial Hospital led to the discovery of an institutionally-wide inappropriate administration of powerful painkillers without medical justification, leading to the death of hundreds of patients since the 1990s. This scandal is often described as an example of the consequences blame culture, with the NHS pressuring whistleblowers, which prompted officials to address more actively this issue to avoid seeing it repeated elsewhere.\nAviation pioneered the shift from individual blaming to systems failure investigation, and incentivized it with the Aviation Safety Reporting System, a platform to self-report safety incidents in exchange of immunity from prosecution. Since 15 November 2015, the European Occurrence Reporting Regulation (EU Reg. 376/2014) exhorts the aviation industry to implement a just culture systematically.Blame avoidance is an often observed behavior in politics, which is worsened when meeting the doctrine of transparency, assumed to be key for good governance.When politicians shift blames under polarized conditions, the public sector organizations are often the target.\nFor social workers, by emphasizing the professional as being autonomous and accountable, they are considered as individual workers with full agency, which occludes the structural constraints and influences of their organizations, thus promoting a blame culture on the individuals. This emphasis on individual's accountability is similarly observed in healthcare. In UK, blame culture prevented the adequate collaboration necessary between social workers and healthcare providers.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_1" +} \ No newline at end of file diff --git a/test/Business/Business_architecture.json b/test/Business/Business_architecture.json new file mode 100644 index 0000000000000000000000000000000000000000..b875801ca3153de4afbee27c1b131e9dbcf6ea51 --- /dev/null +++ b/test/Business/Business_architecture.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "In the business sector, business architecture is a discipline that \"represents holistic, multidimensional business views of: capabilities, end-to-end value delivery, information, and organizational structure; and the relationships among these business views and strategies, products, policies, initiatives, and stakeholders.\"\nIn application, business architecture provides a bridge between an enterprise business model and enterprise strategy on one side, and the business functionality of the enterprise on the other side. It often enables the Strategy to Execution methodology.\nPeople who develop and maintain business architecture are known as business architects.\nThe term \"business architecture\" is often used to mean an architectural description of an enterprise or a business unit, an architectural model, or the profession itself. The Business Architecture Working Group of the Object Management Group (OMG) (2010) describes it as \"a blueprint of the enterprise that provides a common understanding of the organization and is used to align strategic objectives and tactical demands.\" According to the OMG, a blueprint of this type describes \"the structure of the enterprise in terms of its governance structure, business processes, and business information.\" As such, the profession of business architecture primarily focuses on the motivational, operational, and analysis frameworks that link these aspects of the enterprise together.The key characteristic of the business architecture is that it represents real world aspects of a business, along with how they interact. It is developed by an interdisciplinary practice area focused on defining and analyzing concerns of what business does, how it does it, how it is organized, and how it realizes value. Recent research by O'Higgins (2023) demonstrates the importance of aligning business architecture practices with organizational strategy to improve efficiency and service delivery, particularly in digital transformation contexts. It is used to design competitive structures and processes, leverage existing strengths, and identify potential investment opportunities that advance the business's objectives and drive innovation. Products of this business architecture efforts are used to develop plans, make business decisions and guide their implementations.\nIn practice, business architecture effort is conducted on its own or as part of an enterprise architecture. While an enterprise architecture practice in the past had focused primarily on the technological aspects of change, the practice is quickly evolving to use a rigorous business architecture approach to address the organizational and motivational aspects of change as well. The alignment between business architecture and enterprise architecture is a natural architectural alignment of two related disciplines. Business architecture represents a business in the absence of any IT architecture while enterprise architecture provides an overarching framework for business and IT architecture.\nThe history of business architecture has its origins in the 1980s. In the next decades business architecture has developed into a discipline of \"cross-organizational design of the business as a whole\" closely related to enterprise architecture. The concept of business architecture has been proposed as a blueprint of the enterprise, as business strategy, and also as the representation of business design.The concept of business architecture has evolved over the years. It was introduced in the 1980s as architectural domains and as activity of business design. In the 2000s the study and concept development of business architecture accelerated. By the end of the 2000s the first handbooks on business architecture were published, separate frameworks for business architecture were being developed, separate views and models for business architecture were further under construction, the business architect as a profession evolved, and an increasing number of businesses added business architecture to their agenda.\nBy 2015 business architecture has evolved into a common practice. The business architecture body of knowledge has been developed and is updated multiple times each year, and the interest from the academic world and from top management is growing.\nIn order to develop an integrated view of an enterprise, many different views of an organization are typically developed. Each \"view\" is typically a diagram that illustrates a way of understanding the enterprise by highlighting specific information about it. The key views of the enterprise that may be provided by business architecture address several aspects of the enterprise; they are summarized by the Object Management Group (2012) as follows:The Business Strategy view captures the tactical and strategic goals that drive an organization forward...\nThe Business Capabilities view describes the primary business functions of an enterprise and the pieces of the organization that perform those functions...\nThe Value Stream view defines the end-to-end set of activities that deliver value to external and internal stakeholders...\nThe Business Knowledge view establishes the shared semantics (e.g., customer, order, and supplier) within an organization and relationships between those semantics (e.g., customer name, order date, supplier name)...\nThe Organizational view captures the relationships among roles, capabilities and business units, the decomposition of those business units into subunits, and the internal or external management of those units.\n \nIn addition to the above views of the enterprise, the relationships that connect the aforementioned views form the foundation of the business architecture implementation. This foundation provides the framework that supports the achievement of key goals; planning and execution of various business scenarios; and delivery of bottom-line business value. Further research from O'Higgins (2024) emphasizes that tailoring business architecture to factors such as industry sector, geographic region, and organizational size significantly enhances its effectiveness in achieving strategic goals.\nIn the 2006 article \"Business Architecture: A new paradigm to relate business strategy to ICT,\" Versteeg & Bouwman explained the relation between business strategy and business architecture. They wrote:Business Architecture is directly based on business strategy. It is the foundation for subsequent architectures (strategy embedding), where it is detailed into various aspects and disciplines. The business strategy can consist of elements like strategy statements, organizational goals and objectives, generic and/or applied business models, etc. The strategic statements are analyzed and arranged hierarchically, through techniques like qualitative hierarchical cluster analysis. Based on this hierarchy the initial business architecture is further developed, using general organizational structuring methods and business administration theory, like theories on assets and resources and theories on structuring economic activity.\nVersteeg & Bouwman further stipulated, that \"the perspectives for subsequent design next to organization are more common: information architecture, technical architecture, process architecture. The various parts (functions, concepts and processes) of the business architecture act as a compulsory starting point for the different subsequent architectures. It pre-structures other architectures. Business architecture models shed light on the scantly elaborated relationships between business strategy and business design.\"\nThe primary purpose of the Business Architecture Guild is \"to promote best practices and expand the knowledge-base of the business architecture discipline.\" The Guild is a non-profit, international membership organization for practitioners and others interested in the developing the field of business architecture. With members on six continents, a strong Advisory Board and a growing number of business partners, the Guild positions itself as a focal point for the evolving practices and disciplines of business architecture.Founded in late 2010, the Guild opened up membership in the fall of 2011 based on the initial release of A Guide to the Business \nArchitecture Body of Knowledge(R) (BIZBOK(R) Guide). BIZBOK(R), currently at version 13, is a \"practical guide for business architecture practitioners and individuals who wish to use business architecture to address business challenges. This practical guide comes in the form of best practices, gleaned from numerous companies and business architecture leaders.\".\nThe Business Architecture Association started as a DePaul based organization where practitioners came together to share and explore new ideas around Business Architecture. It later formalized itself into a formal organization that looked to build local chapters where practitioners could gather and share their ideas around Business Architecture. In addition, to building a chapter based organization, the Business Architecture Association coalesced a group of strong practitioners to put together the first practitioner exam. Eventually, the Business Architecture Association formalized the exam and it became the beta version of certified practitioner exam. In 2014, the Business Architecture Guild and the Business Architecture Association, joined forces where the beta exam became cornerstone of the certification program of the Business Architecture Guild looking to solidify the practice of Business Architecture in the marketplace.The ASATE Group Business Capability Framework relies on business capabilities and the eight types of building blocks that make them up (processes, functions, organizational units, know-how assets, information assets, technology assets, brands and natural resource deposits) to model a business architecture. This framework was devised with five criteria in mind: (1) must be aligned with the ANSI/IEEE 1471-2000 standard definition of architecture; (2) must share an anchor point with business strategy, namely capabilities; (3) must rely on common business terms and definitions thereof; (4) must comprise all building block types necessary to model a complete business architecture; and (5) must not be burdened with unnecessary building blocks types.The Zachman Framework is a popular enterprise architecture framework used by business architects. The framework provides ontology of fundamental enterprise concepts that are defined from the intersection of six interrogative categories: What, How, Where, Who, When, Why, and six perspectives: Executive, Business Management, Architect, Engineer, Technician, and Enterprise. Typically, business architects are interested in the concepts associated with the top two perspectives: Executive and Business Management. The Executive perspective is concerned with the scope and context of the business. The Business Management perspective is concerned with business definition models.\nModeling standards of the Object Management Group (OMG), including the Unified Modeling Language (UML), Model Driven Architecture (MDA), Business Motivation Model (BMM), Semantics of Business Vocabulary and Rules (SBVR) and the Business Process Modeling Notation (BPMN), and the Decision Model and Notation (DMN) enable powerful visual design, execution and maintenance of software and other processes, including IT Systems Modeling and Business Process Management. Currently, OMG works on the Value Delivery Modeling Language (VDML), a standard modeling language for analysis and design of the operation of an enterprise with particular focus on the creation and exchange of valueThe Open Group Architecture Framework (TOGAF) of The Open Group is a community-based standards effort for describing methods and tools used by architecture. It is being developed and continuously improved by the Open Group, a consortium of interested individuals and companies involved in information technology.According to TOGAF, Business Architecture \"defines the business strategy, governance, organization, and key business processes\". TOGAF refers to Business Architecture as one of the four architecture domains, which represent the subsets of the overall enterprise architecture with the other three architecture domains being Application Architecture, Data Architecture, and Technology Architecture. The key element of TOGAF, Architecture Development Method, identifies development of Business Architecture as necessary prerequisite for developing other architecture domains and provides guidance in regard to development steps and common artifacts.\nIndustry reference models are frameworks or models that provide a best practice off-the-shelf set of structures, processes, activities, knowledge and skills. The Business Architecture Guild provides reference models for many industries, including government, financial services, insurance, transportation, and healthcare, as well as a common reference model. Other organizations are also beginning to develop complementary models for additional industries.Many additional business models exist that can be related to business architecture, but are derived from other approaches, such as operating models and lower-level process frameworks. Examples of these include:The Business Process Framework (eTOM), published by the TM Forum, describes the full scope of business processes required by a service provider in the telecommunications industry, and defines key elements and how they interact.\nProcess Classification Framework (PCF), published by APQC, creates a common language for organizations to communicate and define work processes comprehensively and without redundancies. Organizations are using it to support benchmarking, manage content, and perform other important performance management activities.\nThe Supply-Chain Operations Reference (SCOR) was a proprietary process reference model, published by Supply-Chain Council. Supply-Chain Council merged with APICS in 2014.\nOpenReference is an Open, editable reference for business terms, building towards a common language to describe business performance, processes, practices and terms. The reference is maintained by volunteers of the OpenReference Initiative.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_2" +} \ No newline at end of file diff --git a/test/Business/Communities_of_innovation.json b/test/Business/Communities_of_innovation.json new file mode 100644 index 0000000000000000000000000000000000000000..cc50cb5ead08dac6c6c44903ccba57cca8600ee9 --- /dev/null +++ b/test/Business/Communities_of_innovation.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "Communities that support innovation have been referred to as communities of innovation (CoI), communities for innovation, innovation communities, open innovation communities, and communities of creation.\nLim and Ong (2019) defined a community of innovation (CoI) as a group of people with a sense of camaraderie, belonging and a collective identity who are jointly facilitating innovation.CoIs are groups made up of motivated individuals working together towards a common goal because they are convinced of their common cause.\nCoakes and Smith (2007) defined communities of innovation (CoIs) as a form of communities of practice dedicated to the support of innovation.\nSawhney and Prandelli (2000) proposed the model of communities of creation as a new governance mechanism for managing knowledge found in different companies for the purpose of innovation. In CoIs, intellectual property rights are considered to be owned by the entire community, although the community is governed by a central firm which acts as the sponsor and defines the ground rules for participation. This model lies between the closed hierarchical model and the open market-based model.\nQuoting Mintzberg (2009), Lim and Ong (2019) points out that managers need to re-discover the essence of communities in the organizations in order to appropriately manage people within the organizations, who are not simply an organizational resource to be exploited, but who are the very organization itself. In other words, employees who feel they are valued and fairly treated by their organizations will usually work generously and in times of need, sacrificially for the success of the organization of which they feel they are a part of. However, employees who perceive themselves as being exploited, or possibly next on the retrenchment list, will more often than not put in only minimal work for the organization.Stacey (1969) observed that the term ‘community’ has been used by some to connote social relations in a defined geographical area, and by others to stress the feeling of belonging to a group.Innovation is the development and implementation of a new idea (Van de Ven, 1986).\nCollaboration contributes to innovation (Pouwels and Koster, 2017).\nLim and Ong (2019) observed three macro-processes, the first macro-process pertaining to having a relax and conducive environment for interaction and innovation, a second macro-process centering on the need for recognition and organizational resources to sustain the innovation process and a third macro-process of narrowing down the choices and implementation of the innovation. Building on the literature on innovation, they termed the first and third macro-processes the divergence (knowledge sharing, search activities, exploratory, and idea generation) and convergence (elimination of alternatives and narrowing down towards a choice, implementation, exploitation, and commercialization of ideas) macro-processes of community innovation. They termed the second macro-process the gateway macro-process (evaluation of new knowledge creation, selection, prioritization, control, idea screening and advocacy) as they observed that it consists of the critical processes which the organization uses to choose ideas to endorse for further development. It is the gateway through which informal communities of innovation may enter to become formal communities of innovation within the organization.The macro-process of divergence management begins with individuals within the community of innovation building trust, sharing and discussing ideas, agreeing to develop ideas together and to seek recognition or funding from their organization. The macro-process of gateway management then evaluates the preliminary results for recognition or funding with the outcome as either funding approved or not approved for the development of the new products or services. Finally, if the funding is approved, the group dynamics of the community of innovation then becomes formalized within the organization, bringing about the development and implementation of new products or services within the macro-process of convergence management.\nLim and Ong (2019) observed that in contrast to communities of practice, communities of innovation may emerge by themselves or be cultivated; they usually exist for a narrower purpose of producing a new service or product over a shorter life span; they are made up of participants from either one or more functions; they require a higher level of trust between participants to be effective; there is a higher cost to their participants; and the potential benefit to the organization may be greater when they are successfully implemented. They also noted that a community of innovation (COI) may be specialized in one function like a community of practice (COP). An example is an innovation project which involves only staff from the engineering department. It is also possible for communities of innovation to be cross-functional (e.g. involving 2-3 functions). An example is an innovation project which involves staff from two functions, the business department and the environmental science department. In their research, they observed that cross-functional communities of innovation were able to consider problems from more perspectives and come up with more varied solutions. However, cross-functional communities of innovation usually require more time for discussions due to the difference in the members’ level of knowledge concerning different topics and their associated jargons.\nAccording to Etienne Wenger, a community of practice (CoP) is a group composed of people who are interested in the same topic and often interact with each other in order to increase their knowledge in this topic. CoPs are very similar to CoIs; however, the two differ in a number of critical ways. They can be easily confused between.\nA CoP is able to connect the attitudes and values of dissimilar organizations. For example, a researcher may have a similar skill-set as someone working at a corporation; however, they may have very different tacit knowledge and motivation. The formation of a CoP can bring these separate groups with different motivations to form a beneficial partnership.\nCoPs and CoIs share many traits and are closely related : so much so that a CoI can be deemed to be a type of CoP. CoIs are, however, different in certain critical ways not routinely addressed by CoPs, ways that are vital in the process of innovation. CoIs are focused on innovation, and while skills and processes can be transplanted across organizations, innovation processes and methods cannot, without significant customization and adaptation.\nAnother element that separates a CoI is \"inspiration to action\", which refers to the relationships formed between kindred spirits : relationships providing support and inspiration for taking on the uphill battle of creating significant change and embarking on new possibilities. In contrast, this process of innovation and bringing about significant change : is not well integrated with corporate strategy.\nDrivers of organizational innovativeness include team processes and external knowledge (Rose et al., 2016) and networking (Lewis et al., 2018).Successful COIs increase innovations within an organization. They, therefore, have the potential to contribute to organizational ambidexterity, which refers to the organization's dual capabilities of managing the current business and being flexible and adaptable to meet future changes and demands.Examples of communities of innovation in history include the communities behind steam engines, iron and steel production, and textile machinery. The Pig Iron industry of Cleveland in the UK during 1850:1870 is a prime example of it.In recent decades, the software industry has exhibited the most significant presence of CoIs. 96% of software products developed in 2016 used open source software. Particularly, in software that runs the computing infrastructure of the internet, open source is ubiquitous. Prime examples of open source software created through communities of innovation include OpenOffice, Python, Blender, GIMP, GNOME, Apache, PostgreSQL and PHP, besides Linux.\nTraditionally, the company is the most efficient means of managing knowledge belonging to different people. The primary motivation is job security, career advancement and recognition. Lee and Cole (2003) argue for a community structure for knowledge creation that crosses firms boundaries. To substantiate their argument they put forth the case of how \"thousands of talented volunteers, dispersed across organizational and geographical boundaries, collaborate via the Internet to produce a knowledge-intensive, innovative product of high quality\": the Linux kernel (Lee and Cole 2003, p. 633). The Linux community has proved to be a very efficient mean of managing knowledge belonging to different people. The primary motivation is a value system, recognition, and potential career advancement or hop. Lee and Cole (2003) argue that research on knowledge management has to date focused on hierarchy and therefore has not adequately addressed the mobilization of distributed knowledge, the knowledge that is dispersed among many people. They note that, as illustrated by the Linux case, \"the advent of the Internet and Web-based technologies has enabled specialized communities to convene, interact, and share resources extensively via electronic interfaces,\" even across firms' boundaries (Lee and Cole 2003, p. 633). People are able to contribute effectively outside their working hours. Coordination of the work (including feedback) is possible even when people are working from different locations. The catchment area is therefore much larger and the critical mass of software engineers required to develop and maintain the Linux project was therefore achievable.According to Henry Chesbrough, over the twentieth century, the closed innovation paradigm was overtaken by the theory of open innovation, which emphasizes the significantly higher importance of external resources : thanks to an increasing trend towards globalization, new market participants, and simultaneously shorter product life cycles with correspondingly increasing R&D costs.Innovation through CoIs has many benefits when compared to proprietary or closed-off product development. Particularly, individual innovators and small and medium-sized enterprises (SMEs) are expected to gain most from open innovation collaborations due to their inherently limited capabilities.\nWhen the most popular Open Source tools and applications : developed through collaboration among their respective communities of innovation (such as software like Linux, Apache Web Server, PostgresSQL and PHP) were compared with similar proprietary software, Gartner found that open source bested or equaled the quality of their proprietary cousins and that many open source developers and advocates are gainfully employed and at very little risk of losing future work prospects. Open source products development has proven to be an efficient way of exhibiting skills.\nAccording to the Technology and Innovation Management Review, open innovation generally provides the following benefits: Broader base of ideas, Technological synergy, Improvement of the internal learning capacity through the transfer of external knowledge and learning routines and Use of intellectual property as strategic assets.\nHowever, open innovation is also associated with a slow or delayed development Pace.\nAlso, over time it has been proven : especially in the case of communities of innovation in the software industry : that due to the nature of patent and intellectual property law, the dream of open source software as advanced by its advocates : has failed. It was believed that democratization of software would result in shared ownership of its intellectual property, but that hasn't happened. Software built using open source software : is then patented and closed to external collaboration by wealthy companies, who profit much more from the results than the communities of innovation involved in developing the underlying technologies. This leads to greater wealth inequality, as opposed to social good.\nAccording to an article in Technology and Innovation Management Review, open innovation generally suffers from the following disadvantages: strong dependence on external knowledge; loss of key knowledge control; loss of flexibility, creativity, and strategic power.\nThere is evidence that, contrary to the popular belief, communities of innovation such as those in open source software, are not a recent development. There are many examples in history in which innovators have used collective invention as in the cases of textile machinery, steam engines, and the production of iron and steel. In these cases, the innovators' behavior was largely dependent on public policy that accommodated knowledge sharing to foster cumulative innovation. Sometimes, knowledge sharing coexisted with patenting.Despite the historical precedent, today knowledge sharing among innovators is generally regarded as a modern development. The cost for information exchange has drastically decreased due, in a large part, to breakthroughs within the information and communication fields. According to Henry Chesborough (2003), modern open innovation is often seen as, \"a sharp break from the paradigm of the early twentieth century when research labs were largely self sufficient : only occasionally receiving outside visitors, and researchers would seldom venture out to visit universities or scientific expositions\". In history, the \"heroic inventor\" is shown greater consideration than the cooperation of innovators.\nStories of innovative heroes were believed to be more fascinating than other narratives, such as the stories of often nameless farmers, who created and shared new types of wheat on the Great Plains. This demonstrates the cultural shift that caused the \"heroic inventor\" to be nationally celebrated in Britain and all Western countries.\nKnowledge sharing often occurred in the past, though there is not enough evidence to prove whether or not it occurs more frequently today. However, it is known that tension has existed for some time between the depth and scope of open knowledge sharing and the patent system.\nAmong the foremost examples of collective innovation in the past is Cleveland's Pig Iron industry in the UK during 1850:1870. This industry experienced a \"free exchange of information about new techniques and plant designs among firms in an industry\". According to economic historian Robert Allen, the proliferation of knowledge sharing in the iron district had two plausible reasons. First, afterword traveled of a prosperous blast furnace design, the reputations of engineers grew to be more positive. This only increased profits and allowed engineers to improve their careers. Second, such disclosures could cause the value of the revealing party's assets to decrease. Improving the blast furnace designs, in turn, led to an increase in the values of iron ore deposits, because these Cleveland ore mines were often owned by the blast furnace firms. This possibly made revealing technical information freely a profitable activity from the individual firm's point of view. Similarities can be drawn to today's communities of innovation, where the primary motivation for participants is recognition and potential career advancement, and for participating firms is related profit.\nIt is yet to be understood how the rivalry between firms and innovators (that caused knowledge sharing to exist) came to be, while which conditions actually lead to aggressive rivalry and patenting. Bessen and Nuvolari (2011) mention that \"... as the technology matures, the nature of firms rivalry, their willingness to share knowledge and their use of patents correspondingly change. In particular, knowledge sharing is more likely to occur during the early phases of technology or where local innovation has little effect on worldwide prices.\"\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_3" +} \ No newline at end of file diff --git a/test/Business/Company.json b/test/Business/Company.json new file mode 100644 index 0000000000000000000000000000000000000000..f7b3a60e446361b43300bbc48babe24f5d324385 --- /dev/null +++ b/test/Business/Company.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "A company, abbreviated as co., is a legal entity representing an association of legal people, whether natural, juridical or a mixture of both, with a specific objective. Company members share a common purpose and unite to achieve specific, declared goals.\nOver time, companies have evolved to have the following features: \"separate legal personality, limited liability, transferable shares, investor ownership, and a managerial hierarchy\". The company, as an entity, was created by the state which granted the privilege of incorporation.\nCompanies take various forms, such as:\nvoluntary associations, which may include nonprofit organizations\nbusiness entities, whose aim is to generate sales, revenue, and profit\nfinancial entities and banks\nprograms or educational institutions\nA company can be created as a legal person so that the company itself has limited liability as members perform or fail to discharge their duties according to the publicly declared incorporation published policy. When a company closes, it may need to be liquidated to avoid further legal obligations. Companies may associate and collectively register themselves as new companies; the resulting entities are often known as corporate groups.\nA company can be defined as an \"artificial person\", invisible, intangible, created by or under law, with a discrete legal capacity (or \"personality\"), perpetual succession, and a common seal. Except for some senior positions, companies remain unaffected by the death, insanity, or insolvency of an individual member.The English word, \"company\", has its origins in the Old French term compagnie (first recorded in 1150), meaning \"society, friendship, intimacy; body of soldiers\", which came from the Late Latin word companio (\"one who eats bread with you\"), first attested in the Salic law (c. AD 500) as a calque of the Germanic expression gahlaibo (literally, \"with bread\"), related to Old High German galeipo (\"companion\") and to Gothic gahlaiba (\"messmate\").By 1303, the word company referred to trade guilds. The usage of the term company to mean \"business association\" was first recorded in 1553,and the abbreviation \"co.\" dates from 1769.\nAccording to the Company Law of the People's Republic of China, companies include the limited liability company and joint-stock limited company which founded in the mainland China.In English law and in legal jurisdictions based upon it, a company is a body corporate or corporation company registered under the Companies Acts or under similar legislation. Common forms include:Private companies limited by guarantee\nCommunity interest company\nCharitable incorporated organisation\nPrivate companies limited by shares - the most common form of company\nPublic limited companies - companies, usually large, which are permitted to (but do not have to) offer their shares to the public, for example on a stock exchange\nIn the United Kingdom, a partnership is not legally a company, but may sometimes be referred to (informally) as a \"company\". It may be referred to as a \"firm\".\nIn the United States, a company is not necessarily a corporation. For example, a company may be a \"corporation, partnership, association, joint-stock company, trust, fund, or organized group of persons, whether incorporated or not, and (in an official capacity) any receiver, trustee in bankruptcy, or similar official, or liquidating agent, for any of the foregoing\".A company limited by guarantee (CLG): Commonly used where companies are formed for non-commercial purposes, such as clubs or charities. The members guarantee the payment of certain (usually nominal) amounts if the company goes into insolvent liquidation, but otherwise, they have no economic rights in relation to the company. This type of company is common in England. A company limited by guarantee may be with or without having share capital.A company limited by shares: The most common form of the company used for business ventures. Specifically, a limited company is a \"company in which the liability of each shareholder is limited to the amount individually invested\" with corporations being \"the most common example of a limited company\". This type of company is common in England and many English-speaking countries. A company limited by shares may be a publicly traded company or a privately held company.\nA company limited by guarantee with a share capital: A hybrid entity, usually used where the company is formed for non-commercial purposes, but the activities of the company are partly funded by investors who expect a return. This type of company may no longer be formed in the UK, although provisions still exist in law for them to exist.\nA limited liability company: \"A company—statutorily authorized in certain states—that is characterized by limited liability, management by members or managers, and limitations on ownership transfer\", i.e., L.L.C. LLC structure has been called \"hybrid\" in that it \"combines the characteristics of a corporation and of a partnership or sole proprietorship\". Like a corporation, it has limited liability for members of the company, and like a partnership it has \"flow-through taxation to the members\" and must be \"dissolved upon the death or bankruptcy of a member\".\nAn unlimited company with or without a share capital: A hybrid entity, a company where the liability of members or shareholders for the debts (if any) of the company are not limited. In this case, the doctrine of a veil of incorporation does not apply.\nLess common types of companies are:\nCompanies formed by letters patent: Most corporations by letters patent are corporations sole and not companies as the term is commonly understood today.\nRoyal charter corporations: In middle-ages Europe, before the passing of modern companies legislation, these were the only types of companies. Now they are relatively rare, except for very old companies that still survive (particularly many British banks), or modern societies that fulfill a quasi-regulatory function (for example, the Bank of England is a corporation formed by a modern charter).\nStatutory companies: Relatively rare today, certain companies have been formed by a private statute passed in the relevant jurisdiction.\nWhen \"Ltd\" is placed after the company's name, it signifies a limited company, and \"PLC\" (public limited company) indicates that its shares are widely held.\nIn the legal context, the owners of a company are normally referred to as the \"members\". In a company limited or unlimited by shares (formed or incorporated with a share capital), this will be the shareholders. In a company limited by guarantee, this will be the guarantors. Some offshore jurisdictions have created special forms of offshore company in a bid to attract business for their jurisdictions. Examples include segregated portfolio companies and restricted purpose companies.\nHowever, there are many sub-categories of company types that can be formed in various jurisdictions in the world.\nCompanies are also sometimes distinguished for legal and regulatory purposes between public companies and private companies. Public companies are companies whose shares can be publicly traded, often (although not always) on a stock exchange which imposes listing requirements/Listing Rules as to the issued shares, the trading of shares and future issue of shares to help bolster the reputation of the exchange or particular market of an exchange. Private companies do not have publicly traded shares, and often contain restrictions on transfers of shares. In some jurisdictions, private companies have maximum numbers of shareholders.\nA parent company is a company that owns enough voting stock in another firm to control management and operations by influencing or electing its board of directors; the second company being deemed a subsidiary of the parent company. The definition of a parent company differs by jurisdiction, with the definition normally being defined by way of laws dealing with companies in that jurisdiction.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_4" +} \ No newline at end of file diff --git a/test/Business/Desktop_outsourcing.json b/test/Business/Desktop_outsourcing.json new file mode 100644 index 0000000000000000000000000000000000000000..f64c70dde247808fb1c4fd809b3fda34efbe7678 --- /dev/null +++ b/test/Business/Desktop_outsourcing.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "Desktop outsourcing is the process in which an organization contracts a third party to maintain and manage parts of its IT infrastructure. Contracts vary in depth and can range from Computer hard- and software maintenance to Desktop virtualisation, SaaS-implementations and Helpdesk operation. It is estimated, that 32% of U.S. and Canadian IT organisations make use of desktop outsourcing in 2014. Recent market reports suggest the adoption of BYOD policies to allow the end-user a free choice of devices in their working environment may increase this market share.\nJustification for desktop outsourcing could include shifting focus and energy to areas of core competency, reducing staffing costs, and the routine maintenance, upgrades, and repairs associated with managing multitudes of PC systems and servers. (Applegate et al. 2007). Managers may also seek desktop outsourcing as a method of simplifying organisational structures to cut costs associated with them. For smaller companies it might also be more viable financially to outsource their desktop at a set price per machine, rather than creating an entire internal IT department. Recent market growth can also be attributed to the decreasing price of hardware, making replacement more favourable than repairs. Possible risks when desktop outsourcing are ensuring continued support for old and unique systems the company depends on, specifically if any of the systems in question were internally developed. This may cause the contractor to be unable to fulfill their contractual obligations, as in the case of the US Navy outsourcing their IT systems to EDS in 2003.A 2012 TechNavio market report forecasts that the desktop outsourcing market will grow by 4.65% yearly, between 2012 and 2016. Atos, CSC, HP and IBM are considered the leading desktop outsourcing vendors for that time frame. A Gartner report from 2013, however, considers the desktop outsourcing market to be in decline, with growth only occurring on the Latin American and Asia/Pacific markets.While consolidating School Districts in 2003, New York City brought in Dell to assess and consolidate their IT systems. At the time it was unclear how many devices actually existed in the network. Being largely successful, this netted Dell a $20 million yearly contract to keep on managing the School Districts systems.NASA's Kennedy Space Center had its IT services, approximately 22,000 devices, outsourced in 1998 for $30 million a year on a 3-year contract.\nThe US Treasury outsourced their 1643 desktop and 700 portable seats in 1999 for around $27 million yearly.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_5" +} \ No newline at end of file diff --git a/test/Business/Global_Entrepreneurship_Week.json b/test/Business/Global_Entrepreneurship_Week.json new file mode 100644 index 0000000000000000000000000000000000000000..95e07bb140ecf0e66d5bb40c8bfb3ff052c4e455 --- /dev/null +++ b/test/Business/Global_Entrepreneurship_Week.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "Global Entrepreneurship Week (GEW) is an international initiative that introduces entrepreneurship to young people in six continents. GEW emerged in 2008 as a result of Enterprise Week UK and Entrepreneurship Week USA 2007. Since its creation, more than 10 million people from roughly 170 countries have participated in entrepreneurship-related events, activities and competitions during GEW.\nThis annual event occurs over the span of one week and includes the participation of millions of entrepreneurs, investors, policymakers, researchers, educators, entrepreneurship support organizations and interested individuals. Currently, 165 countries celebrate Global Entrepreneurship Week running national campaigns that generate approximately 35,000 events, activities and competitions.\nThe Ewing Marion Kauffman Foundation is a non-profit foundation based in Kansas City, Missouri, established in the mid-1960s by the late entrepreneur and philanthropist Ewing Marion Kauffman. The Kauffman Foundation’s mission is to create “a society of economically independent individuals who are engaged citizens, contributing to the improvement of their communities.” Their two main areas of focus are: advancing entrepreneurship and improving the education of children and youth.Enterprise Week UK is Enterprise UK's campaign to connect youth, women, homeworkers, people from ethnic minorities to entrepreneurial opportunities. It was founded in 2004 by the British Chambers of Commerce, the Confederation of British Industry, the Institute of Directors and the Federation of Small Businesses.\nEach country that participates in Global Entrepreneurship Week designates a host organization to lead the campaign (in rare instances, two or more organizations share this responsibility). Host organizations are responsible for galvanizing the momentum of their national GEW campaign—building a network of partner organizations to run events and activities during GEW and supporters to help promote the national campaign. Below is a list of participating countries, along with some of their past respective host organization(s).A global partner is any organization that agrees to host one or more activities during Global Entrepreneurship Week. These organizations include:Business Council for International Understanding (BCIU)\nDepartment for Business, Innovation and Skills, UK\nDECA\nEndeavor\nJunior Achievement\nEntrepreneurs' Organization\nNational Foundation for Teaching Entrepreneurship (NFTE)\nTechnoServe\nEuropean Confederation of Young Entrepreneurs (YES for Europe)\nYouth Entrepreneurship and Sustainability (YES, Inc.)\nThe Prince's Youth Business International\n4th annual Race to Entrepreneurship: This event is held by the St. Louis Regional Entrepreneurship Educators (STLREE). Teams must “think like an entrepreneur” as they follow a packet of clues and use public transportation to locate and photograph entrepreneurial landmarks in St. Louis.NFTE students at Shaw High School in East Cleveland, Ohio compete in the GoVenture Lemonade Stand business simulation after-school. They record their scores after select \"open days\" and the top earners win a prize.\nUniversity of Virginia Cup Entrepreneurial Concept Competition: Students submit a 3 page \"business concept\" and compete in the first round against students within their school or department. In the second round, the winners from each school or department compete against one another until a winning team receives the UVA Cup. Heads of schools can participate in a bet, the one who loses gets his/her head shaved on The Lawn. Additional competitions at UVA include YouTube video submissions, designs for the UVA Cup Trophy, and ideas for “game-changing”.\nYouth Lunch'N Learn: This event is hosted by the Asset Building Center. Local entrepreneurs share success stories and business-starting fundamentals to an audience of students.\nYouthpreneur: KooDooZ holds this program for 5th through 10th graders challenges them to make a social impact through tried methodologies. The students’ progress will be documented and interactive online webinars will be posted on KooDooZ's YouTube channel.\nThe Global Cleantech Open Ideas Competition: A challenge created for green innovators. The goal of the competition is to produce clean technology ideas and collaborate with investors and CEO’s. The winning idea receives $100,000 in legal, marketing, and public relations support.551 Speednetwork the Globe: A networking event hosted by YES for Europe in which entrepreneurs meet and speak with others in timed intervals to brainstorm and share ideas.\nMentoring Madness: An event sponsored by NYSE Euronext. Students posed their entrepreneurial questions to a panel headed by Snoop Dogg. Winners were awarded $25,000 in startup funds.\nThe Global Innovation Tournament: An event targeted towards saving money. Teams were asked to create innovated ideas to make saving money fun. Ideas were judged on innovation and novelty of the idea, how fun it was, and whether the idea created a positive impact.\nThe GEW logo is multi-colored compass with rounded typeface of ‘Global Entrepreneurship Week’ coming from the top right section. The color spectrum, which includes 26 colors, represents GEW’s international span. The compass shape adheres to the notion of navigation and the direction of entrepreneurship in the future. Many of GEW’s partners fuse their own logo with the compass in order to demonstrate a joint collaboration towards a global initiative.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_6" +} \ No newline at end of file diff --git a/test/Business/News_values.json b/test/Business/News_values.json new file mode 100644 index 0000000000000000000000000000000000000000..80a0e180bcd54bc9f5f28b576c1b5636783995ab --- /dev/null +++ b/test/Business/News_values.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "News values are \"criteria that influence the selection and presentation of events as published news.\" These values help explain what makes something \"newsworthy.\"\nNews values are not universal and can vary between different cultures. Among the many lists of news values that have been drawn up by scholars and journalists, some attempt to describe news practices across cultures, while others have become remarkably specific to the press of particular (often Western) nations. In the Western tradition, decisions on the selection and prioritization of news are made by editors on the basis of their experience and intuition, although analysis by Galtung and Ruge showed that several factors are consistently applied across a range of news organizations. Their theory was tested on the news presented in four different Norwegian newspapers from the Congo and Cuban crisis of July 1960 and the Cyprus crisis of March:April 1964. Results were mainly consistent with their theory and hypotheses. Johan Galtung later said that the media have misconstrued his work and become far too negative, sensational, and adversarial.\nMethodologically and conceptually, news values can be approached from four different perspectives: material (focusing on the material reality of events), cognitive (focusing on people's beliefs and value systems), social (focusing on journalistic practice), and discursive (focusing on the discourse). A discursive perspective tries to systematically examine how news values such as Negativity, Proximity, Eliteness, and others, are constructed through words and images in published news stories. This approach is influenced by linguistics and social semiotics, and is called \"discursive news values analysis\" (DNVA). It focuses on the \"distortion\" step in Galtung and Ruge's chain of news communication, by analysing how events are discursively constructed as newsworthy.\nInitially labelled \"news factors,\" news values are widely credited to Johan Galtung and Mari Holmboe Ruge. In their seminal 1965 study, Galtung and Ruge put forward a system of twelve factors describing events that together are used as defining \"newsworthiness.\" Focusing on newspapers and broadcast news, Galtung and Ruge devised a list describing what they believed were significant contributing factors as to how the news is constructed. They proposed a \"chain of news communication,\"  which involves processes of selection (the more an event satisfies the \"news factors,\" the more likely it is selected as news), distortion (accentuating the newsworthy factors of the event, once it has been selected), and replication (selection and distortion are repeated at all steps in the chain from event to reader). Furthermore, three basic hypotheses are presented by Galtung and Ruge: the additivity hypothesis that the more factors an event satisfies, the higher the probability that it becomes news; the complementary hypothesis that the factors will tend to exclude each other; and the exclusion hypothesis that events that satisfy none or very few factors will not become news.In 2001, the influential 1965 study was updated by Tony Harcup and Deirdre O'Neill, in a study of the British press. The findings of a content analysis of three major national newspapers in the UK were used to critically evaluate Galtung and Ruge's original criteria and to propose a contemporary set of news values. Forty years on, they found some notable differences, including the rise of celebrity news and that good news (as well as bad news) was a significant news value, as well as the newspaper's own agenda. They examined three tabloid newspapers.\nIn a rapidly evolving market, achieving relevance, giving audiences the news they want and find interesting, is an increasingly important goal for media outlets seeking to maintain market share. This has made news organizations more open to audience input and feedback, and forced them to adopt and apply news values that attract and keep audiences. Given these changes and the rapid rise of digital technology in recent years, Harcup and O’Neill updated their 2001 study in 2016, while other scholars have analysed news values in viral news shared via social media. The growth of interactive media and citizen journalism is fast altering the traditional distinction between news producer and passive audience and may in future lead to a redefinition of what \"news\" means and the role of the news industry.A variety of external and internal pressures influence journalistic decisions during the news-making process, which can sometimes lead to bias or unethical reporting. Many different factors have the potential to influence whether an event is first noticed by a news organisation, second whether a story will be written about that event, third, how that story is written, and fourth whether this story will end up being published as news and if so, where it is placed. Therefore, \"there is no end to lists of news criteria.\" There are multiple competing lists of news values (including Galtung & Ruge's news factors, and others put forward by Schlesinger, Bell, Bednarek & Caple), with considerable overlap but also disagreement as to what should be included.News values can relate to aspects of events and actors, or to aspects of news gathering and processing:\nValues in news actors and events:\nFrequency: Events that occur suddenly and fit well with the news organization's schedule are more likely to be reported than those that occur gradually or at inconvenient times of day or night. Long-term trends are not likely to receive much coverage.\nTimeliness: Events that have only just happened, are current, ongoing, or are about to happen are newsworthy.\nFamiliarity: To do with people or places close to the target audience. Others prefer the term Proximity for this news value, which includes geographical and cultural proximity (see \"meaningfulness\").\nNegativity: Bad news is more newsworthy than good news. Sometimes described as \"the basic news value.\" Conversely, it has also been suggested that Positivity is a news value in certain cases (such as sports news, science news, feel-good tabloid stories).\nConflict: Opposition of people or forces resulting in a dramatic effect. Events with conflict are often quite newsworthy. Sometimes included in Negativity rather than listed as a separate news value.\nUnexpectedness: Events that are out of the ordinary, unexpected, or rare are more newsworthy than routine, unsurprising events.\nUnambiguity: Events whose implications are clear make for better copy than those that are open to more than one interpretation, or where any understanding of the implications depends on first understanding the complex background in which the events take place.\nPersonalization: Events that can be portrayed as the actions of individuals will be more attractive than one in which there is no such \"human interest.\" Personalization is about whether an event can be contextualised in personal terms (affecting or involving specific, \"ordinary\" people, not the generalised masses).\nMeaningfulness: This relates to the sense of identification the audience has with the topic. \"Cultural proximity\" is a factor here—events concerned with people who speak the same language, look the same, and share the same preoccupations as the audience receive more coverage than those concerned with people who speak different languages, look different and have different preoccupations. A related term is Relevance, which is about the relevance of the event as regards the target readers/viewers own lives or how close it is to their experiences. Impact refers more generally to an event's impact, on the target audience, or on others. An event with significant consequences (high impact) is newsworthy.\nEliteness: Events concerned with global powers receive more attention than those concerned with less influential nations. Events concerned with the rich, powerful, famous and infamous get more coverage. Also includes the eliteness of sources : sometimes called Attribution.\nSuperlativeness: Events with a large scale or scope or with high intensity are newsworthy.\nConsonance: Events that fit with the media's expectations and preconceptions receive more coverage than those that defy them (and for which they are thus unprepared). Note this appears to conflict with unexpectedness above. However, consonance really refers to the media's readiness to report an item. Consonance has also been defined as relating to editors' stereotypes and their mental scripts for how events typically proceed.\nValues in the news process:\nContinuity: A story that is already in the news gathers a kind of inertia. This is partly because the media organizations are already in place to report the story, and partly because previous reportage may have made the story more accessible to the public (making it less ambiguous).\nComposition: Stories must compete with one another for space in the media. For instance, editors may seek to provide a balance of different types of coverage, so that if there is an excess of foreign news for instance, the least important foreign story may have to make way for an item concerned with the domestic news. In this way the prominence given to a story depends not only on its own news values but also on those of competing stories.\nCompetition: Commercial or professional competition between media may lead journalists to endorse the news value given to a story by a rival.\nCo-option: A story that is only marginally newsworthy in its own right may be covered if it is related to a major running story.\nPrefabrication: A story that is marginal in news terms but written and available may be selected ahead of a much more newsworthy story that must be researched and written from the ground up.\nPredictability: An event is more likely to be covered if it has been pre-scheduled.\nStory impact: The impact of a published story (not the event), for example whether it is being shared widely (sometimes called Shareability), read, liked, commented-on. To be qualified as shareable, a story arguably has to be simple, emotional, unexpected and triggered. Engaging with such analytics is now an important part of newsroom practice.\nTime constraints: Traditional news media such as radio, television and daily newspapers have strict deadlines and a short production cycle, which selects for items that can be researched and covered quickly.\nLogistics: Although eased by the availability of global communications even from remote regions, the ability to deploy and control production and reporting staff, and functionality of technical resources can determine whether a story is covered.\nData: Media need to back up all of their stories with data in order to remain relevant and reliable. Reporters prefer to look at raw data in order to be able to take an unbiased perspective. An alternative term is Facticity : the favouring of facts and figures in hard news.\nOne of the key differences in relation to these news values is whether they relate to events or stories. For example, composition and co-option both relate to the published news story. These are news values that concern how news stories fit with the other stories around them. The aim here is to ensure a balanced spread of stories with minimal duplication across a news program or edition. Such news values are qualitatively different from news values that relate to aspects of events, such as Eliteness (the elite status of news actors or sources) or Proximity (the closeness of the event's location to the target audience).\nConventional models concentrate on what the journalist perceives as news. But the news process is a two-way transaction, involving both news producer (the journalist) and the news receiver (the audience), although the boundary between the two is rapidly blurring with the growth of citizen journalism and interactive media. Little has been done to define equivalent factors that determine audience perception of news. This is largely because it would appear impossible to define a common factor, or factors, that generate interest in a mass audience. Basing his judgement on many years as a newspaper journalist Hetherington states that: \"...anything which threatens people's peace, prosperity and well being is news and likely to make headlines.\"Whyte-Venables suggests audiences may interpret news as a risk signal. Psychologists and primatologists have shown that apes and humans constantly monitor the environment for information that may signal the possibility of physical danger or threat to the individual's social position. This receptiveness to risk signals is a powerful and virtually universal survival mechanism. A \"risk signal\" is characterized by two factors, an element of change (or uncertainty) and the relevance of that change to the security of the individual. The same two conditions are observed to be characteristic of news. The news value of a story, if defined in terms of the interest it carries for an audience, is determined by the degree of change it contains and the relevance that change has for the individual or group. Analysis shows that journalists and publicists manipulate both the element of change and relevance ('security concern') to maximize, or some cases play down, the strength of a story.\nSecurity concern is proportional to the relevance of the story for the individual, his or her family, social group and societal group, in declining order. At some point there is a Boundary of Relevance, beyond which the change is no longer perceived to be relevant, or newsworthy. This boundary may be manipulated by journalists, power elites and communicators seeking to encourage audiences to exclude, or embrace, certain groups: for instance, to distance a home audience from the enemy in time of war, or conversely, to highlight the plight of a distant culture so as to encourage support for aid programs.\nIn 2018, Hal Pashler and Gail Heriot published a study showing that perceptions of newsworthiness tend to be contaminated by a political usefulness bias. In other words, individuals tend to view stories that give them \"ammunition\" for their political views as more newsworthy. They give credence to their own views.\nAn evolutionary psychology explanation for why negative news have a higher news value than positive news starts with the empirical observation that the human perceptive system and lower level brain functions have difficulty distinguishing between media stimuli and real stimuli. These lower level brain mechanisms which function on a subconscious level make basic evaluations of perceptive stimuli, focus attention on important stimuli, and start basic emotional reactions. Research has also found that the brain differentiates between negative and positive stimuli and reacts quicker and more automatically to negative stimuli which are also better remembered. This likely has evolutionary explanations with it often being important to quickly focus attention on, evaluate, and quickly respond to threats. While the reaction to a strong negative stimulus is to avoid, a moderately negative stimulus instead causes curiosity and further examination. Negative media news is argued to fall into the latter category which explains their popularity. Lifelike audiovisual media are argued to have particularly strong effects compared to reading.Women have on average stronger avoidance reactions to moderately negative stimuli. Men and women also differ on average in how they enjoy, evaluate, remember, comprehend, and identify with the people in news depending on if the news are negatively or positively framed. The stronger avoidance reaction to moderately negative stimuli has been explained as it being the role of men in evolutionary history to investigate and potentially respond aggressively to threats while women and children withdrew. It has been claimed that negative news are framed according to male preferences by the often male journalists who cover such news and that a more positive framing may attract a larger female audience. However, other scholars have urged caution as regards evolutionary psychology's claims about gender differences.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_7" +} \ No newline at end of file diff --git a/test/Business/Road_warrior_(computing).json b/test/Business/Road_warrior_(computing).json new file mode 100644 index 0000000000000000000000000000000000000000..ee2311c8a76ba625df678f3072b16aa34e2945f4 --- /dev/null +++ b/test/Business/Road_warrior_(computing).json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "In business travel, a road warrior is a remote worker that uses mobile devices such as tablet computers, laptops, smartphones, and Internet access while traveling to conduct business. The term has often been used with regard to salespeople who travel often and who seldom are in the office. Today it is used for anyone who works outside the office and travels for business. Unlike digital nomads, road warriors do not necessarily choose to travel; it is part of their work duties.\nThe term is believed to originate in the Mel Gibson movie Mad Max 2:The Road Warrior (1981).In the pre-mobile technology era, road warriors were people whose jobs required a lot of travel, either by car or plane. The majority of this group were salespeople and professionals that needed to be with clients such as accountants, consultants, etc. They typically would need to come back to their company's office for administrative duties. The office held limited resources (phones, fax machine, computers, etc.) that were best used by centralizing them.\nAs both computer and telecommunication technologies became more portable and less expensive, the need for Road Warriors to come back to offices for use of limited and costly resources began to wane.\nThe term Road Warrior has been credited to the 1981 movie Mad Max 2 sub-titled \"Road Warrior\" starring Mel Gibson. Its harsh road life in a post-apocalyptic world was used to symbolize the hardship of modern business travel.The 2009 movie \"Up in the Air\" starred George Clooney as a person who fully lives the Road Warrior life to the extreme.\nRoad Warriors use mobile devices and laptop computers that connect to companies' information systems. Specialized applications from Software as a Service (SaaS) providers are often used in order to conduct their work duties.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_8" +} \ No newline at end of file diff --git a/test/Business/Vanpool.json b/test/Business/Vanpool.json new file mode 100644 index 0000000000000000000000000000000000000000..a4265273da9d495b8b505830bb418b55ee1a2933 --- /dev/null +++ b/test/Business/Vanpool.json @@ -0,0 +1,48 @@ +{ + "domain": "Business", + "document": "Vanpools or vanpooling is an element of the transit system that allow groups of people to share the ride similar to a carpool, but on a larger scale with concurrent savings in fuel and vehicle operating costs and thus usually a lower cost to the rider. Vanpools have a lower operating and capital cost than most transit vehicles in the United States, but due to their relatively low capacity, vanpools often require subsidies comparable to conventional bus service.\nVehicles may be provided by individuals, individuals in cooperation with various public and private support programs, through a program operated by or on behalf of an element of government, or a program operated by or on behalf of an employer.\nThe key concept is that people share the ride from home or one or more common meeting locations and travel together to a common destination or work center.\nA number of programs exist (within the United States) to help lower the cost of that shared ride to the end user. Among these are traditional funding available to public agencies, public-private partnerships, and the Best Work Places for Commuters (Commuter Choice Programs). A tax benefit is available under 26 U.S.C. §132(f) Qualified Transportation Fringe Benefit allowances. These public transportation programs seek to reduce the number of cars on the road (with all the attendant environmental benefits).\nAdditional benefits include:\nSpeed: The van can use the HOV (High Occupancy Vehicle) lanes because normally more than 2-3 people ride.\nFixed schedule (makes transit more predictable).\nSaving the cost of gasoline (in some cases, it is part of the program).\nRiders often can have significant reductions in the cost of personal automobile insurance (insurance for the rideshare component is usually provided as part of the vanpool program).\nIncentives from local/federal transportation authorities offset cost.\nIn many cases, an employer may elect to subsidize the cost of the vanpool and the vehicles' maintenance. In some cases, the vehicles are provided and maintained by the municipality; in others, they are provided in partnership with or by a third-party provider. For example, UCLA operates an extensive network of vans in which faculty, staff, and students are eligible for discounted rates, although anyone commuting to the Westwood area is allowed to participate, with drivers receiving the highest discounts. The vans are centrally maintained, fueled, and cleaned.\nThe King County Metro Vanpool Program is a successful demand responsive transport program in the Puget Sound area, specifically in King County, Washington. Other successful programs are operated by Pace in Illinois and Utah Transit Authority in Utah.\nVanpooling was begun in the early nineteen seventies by a company called People’s Vans by founder Victor Paglia in 1972 to address the need for people to acquire affordable travel cross country. Reference May 14 article in the Travel section of the New York Times\nThe oldest multi-employer vanpool program in the country is in Treasure Valley, Idaho. For over 30 years Ada County Highway District’s Commuteride Vanpools have been crisscrossing the Valley helping commuters go to and from work, with their numerous vanpool routes traveling throughout the Treasure Valley. The Vanpools also service the Military at Gowen Field and Mountain Home Air Force Base (MHAFB) with multiple routes to and from Ada and Canyon County. ACHD Commuteride serves the cities, Boise, Meridian, Kuna, Garden City, Eagle and Star as well as Ada County.\nPrivate firms operate vanpools for individuals, as well as in cooperation with employers or under contract. \nAnother notable example is Swvl, a NASDAQ publicly held company, that is providing Vanpooling services in 18 countries.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "Uses", + "UsedBy", + "HasQuality", + "Promoted", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Business_9" +} \ No newline at end of file diff --git a/test/Communication/Automatic_curb_sender.json b/test/Communication/Automatic_curb_sender.json new file mode 100644 index 0000000000000000000000000000000000000000..8fdd5c247f317af61cd45492fc3ba573f2946cd2 --- /dev/null +++ b/test/Communication/Automatic_curb_sender.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "The automatic curb sender was a kind of telegraph key, invented by William Thomson, 1st Baron Kelvin for sending messages on a submarine communications cable, as the well-known Wheatstone transmitter sends them on a land line.\nIn both instruments, the signals are sent by means of a perforated ribbon of paper but the cable sender was the more complicated, because the cable signals are formed by both positive and negative currents, and not merely by a single current, whether positive or negative. Moreover, to curb the prolongation of the signals due to electromagnetic induction, each signal was made by two opposite currents in succession: a positive followed by a negative, or a negative followed by a positive. The aftercurrent had the effect of \"curbing\" its precursor.\nFor some time, it was the only instrument delicate enough to receive the signals transmitted through a long cable.\nThis self-acting cable key was brought out in 1876, and tried on the lines of the Eastern Telegraph Company.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_0" +} \ No newline at end of file diff --git a/test/Communication/Biocommunication_(science).json b/test/Communication/Biocommunication_(science).json new file mode 100644 index 0000000000000000000000000000000000000000..c4ae9c81b35f86a84796732275617a0802f9f829 --- /dev/null +++ b/test/Communication/Biocommunication_(science).json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "In the study of the biological sciences, biocommunication is any specific type of communication within (intraspecific) or between (interspecific) species of plants, animals, fungi, protozoa and microorganisms. Communication means sign-mediated interactions following three levels of rules (syntactic, pragmatic and semantic). Signs in most cases are chemical molecules (semiochemicals), but also tactile, or as in animals also visual and auditive. Biocommunication of animals may include vocalizations (as between competing bird species), or pheromone production (as between various species of insects), chemical signals between plants and animals (as in tannin production used by vascular plants to warn away insects), and chemically mediated communication between plants and within plants.\nBiocommunication of fungi demonstrates that mycelia communication integrates interspecific sign-mediated interactions between fungal organisms, soil bacteria and plant root cells without which plant nutrition could not be organized. Biocommunication of Ciliates identifies the various levels and motifs of communication in these unicellular eukaryotes. Biocommunication of Archaea represents key levels of sign-mediated interactions in the evolutionarily oldest akaryotes. Biocommunication of phages demonstrates that the most abundant living agents on this planet coordinate and organize by sign-mediated interactions. Biocommunication is the essential tool to coordinate behavior of various cell types of immune systems.\nBiocommunication theory may be considered to be a branch of biosemiotics. Whereas biosemiotics studies the production and interpretation of signs and codes, biocommunication theory investigates concrete interactions mediated by signs. Accordingly, syntactic, semantic, and pragmatic aspects of biocommunication processes are distinguished. Biocommunication specific to animals (animal communication) is considered a branch of zoosemiotics. The semiotic study of molecular genetics, can be considered a study of biocommunication at its most basic level.Interpreting stimuli from the environment is an essential part of life for any organism. Abiotic things that an organism must interpret include climate (weather, temperature, rainfall), geology (rocks, soil type), and geography (location of vegetation communities, exposure to elements, location of food and water sources relative to shelter sites).Birds, for example, migrate using cues such as the approaching weather or seasonal day length cues. Birds also migrate from areas of low or decreasing resources to areas of high or increasing resources, most commonly food or nesting locations. Birds that nest in the Northern Hemisphere tend to migrate north in the spring due to the increase in insect population, budding plants and the abundance of nesting locations. During the winter birds will migrate south to not only escape the cold, but find a sustainable food source.\nSome plants will bloom and attempt to reproduce when they sense days getting shorter. If they cannot fertilize before the seasons change and they die then they do not pass on their genes. Their ability to recognize a change in abiotic factors allow them to ensure reproduction.\nTrans-organismic communication is when organisms of different species interact. In biology the relationships formed between different species is known as symbiosis. These relationships come in two main forms - mutualistic and parasitic. Mutualistic relationships are when both species benefit from their interactions. For example, pilot fish gather around sharks, rays, and sea turtles to eat various parasites from the surface of the larger organism. The fish obtain food from following the sharks, and the sharks receive a cleaning in return.Parasitic relationships are where one organism benefits off of the other organism at a cost. For example, in order for mistletoe to grow it must leach water and nutrients from a tree or shrub. \nCommunication between species is not limited to securing sustenance. Many flowers rely on bees to spread their pollen and facilitate floral reproduction. To allow this, many flowers evolved bright, attractive petals and sweet nectar to attract bees. In a 2010 study, researchers at the University of Buenos Aires examined a possible relationship between fluorescence and attraction. The study concluded that reflected light was much more important in pollinator attraction than fluorescence. \nCommunicating with other species allows organisms to form relationships that are advantageous in survival, and all of these relationships are all based on some form of trans-organismic communication.\nInter-organismic communication is communication between organisms of the same species (conspecifics). Inter-organismic communication includes human speech, which is key to maintaining social structures.Dolphins communicate with one another in a number of ways by creating sounds, making physical contact with one another and through the use of body language. Dolphins communicate vocally through clicking sounds and pitches of whistling specific to only one individual. The whistling helps communicate the individual's location to other dolphins. For example, if a mother loses sight of her offspring, or when two familiar individuals cannot find each other, their individual pitches help navigate back into a group. Body language can be used to indicate numerous things such as a nearby predator, to indicate to others that food has been found, and to demonstrate their level of attractiveness in order to find a mating partner, and even more.\nHowever, mammals such as dolphins and humans are not alone communicating within their own species. Peacocks can fan their feathers in order to communicate a territorial warning. Bees can tell other bees when they have found nectar by performing a dance when they return to the hive. Deer may flick their tails to warn others in their trail that danger is approaching.\nIntra-organismic communication is not solely the passage of information within an organism, but also concrete interaction between and within cells of an organism, mediated by signs. This could be on a cellular and molecular level. An organism's ability to interpret its own biotic information is extremely important. If the organism is injured, falls ill, or must respond to danger, it needs to be able to process that physiological information and adjust its behavior.For example, when the human body starts to overheat, specialized glands release sweat, which absorbs the heat and then evaporates.\nThis communication is imperative to survival in many species including plant life. Plants lack a central nervous system so they rely on a decentralized system of chemical messengers. This allows them to grow in response to factors such as wind, light and plant architecture. Using these chemical messengers, they can react to the environment and assess the best growth pattern. Essentially, plants grow to optimize their metabolic efficiency.\nHumans also rely on chemical messengers for survival. Epinephrine, also known as adrenaline, is a hormone that is secreted during times of great stress. It binds to receptors on the surface of cells and activates a pathway that alters the structure of glucose. This causes a rapid increase in blood sugar. Adrenaline also activates the central nervous system increasing heart rate and breathing rate. This prepares the muscles for the body's natural fight-or-flight response. \nOrganisms rely on many different means of intra-organismic communication. Whether it is through neural connections, chemical messengers, or hormones, these all evolved to respond to threats, maintain homeostasis and ensure self preservation.\nGiven the complexity and range of biological organisms and the further complexity within the neural organization of any particular animal organism, a variety of biocommunication languages exists.A hierarchy of biocommunication languages in animals has been proposed by Subhash Kak: these languages, in order of increasing generality, are associative, re-organizational, and quantum. The three types of formal languages of the Chomsky hierarchy map into the associative language class, although context-free languages as proposed by Chomsky do not exist in real life interactions.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_1" +} \ No newline at end of file diff --git a/test/Communication/China_Internet_Network_Information_Center.json b/test/Communication/China_Internet_Network_Information_Center.json new file mode 100644 index 0000000000000000000000000000000000000000..51c7b8ba8374f4527423172b849fa6807ab6b5e1 --- /dev/null +++ b/test/Communication/China_Internet_Network_Information_Center.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "The China Internet Network Information Center (CNNIC; 中国互联网络信息中心) is a public institution affiliated with the Ministry of Industry and Information Technology. Founded on 3 June 1997 and based in Zhongguancun, Beijing, the center manages the country code top-level domain name of the People's Republic of China, namely the .cn domain name.\nCNNIC is responsible for operating and administering China’s domain name registry. CNNIC manages both the \".cn\" country code top level domain and the Chinese domain name system (internationalized domain names that contain Chinese characters). As of April 2017, the total number of Chinese domain names was about 21 million.As of January 2017, CNNIC only opened the CN domain to registered businesses, required supporting documentations for domain registration such as business license or personal ID, and suspended overseas registrars even for domestic registrants. CNNIC denied that it mandated existing personal domain names to be transferred to businesses. Trend Micro suggested this move was still not enough to stop modern security threats from the .cn domain.\nCNNIC allocates Internet Protocol (IP) addresses and AS Numbers to domestic ISPs and users. CNNIC is a National Internet Registry (NIR) acknowledged by the Asia-Pacific Network Information Center (APNIC). In late 2004 CNNIC launched an “IP Allocation Alliance” which simplified the procedures for obtaining IP addresses.CNNIC is responsible for the creation and maintenance of the state top-level network catalog database. This database provides information on Internet users, web addresses, domain names, and AS numbers.CNNIC conducts technical research and undertakes state technical projects based on its administrative and practical network technology experience.CNNIC has conducted, and continues to conduct, surveys of Internet information resources. CNNIC maintains statistics on topics such as Internet bandwidth in China, Domain Name registrations, and Internet Development in China.As the national Network Information Center (NIC), CNNIC maintains cooperative relationships with other International Internet Communities, and works closely with NICs of other countries.CNNIC serves as the Secretariat of the Internet Society of China’s Internet Policy and Resource Committee. The Policy and Resource committee is in charge of tasks such as providing policy and legislation oriented suggestions to promote the growth of China’s internet, facilitating the development and application of Internet resources and relevant technologies, and actively participating in the research work of domestic Internet development and administration policies.In July 2008, a broad alliance of Chinese online commerce stakeholders, including CNNIC, all major Chinese commercial banks and web hosting companies, founded the Anti-Phishing Alliance of China (APAC) in order to tackle phishing activities that abuse .cn sub-domain names. CNNIC also functions as the secretariat of APAC.In 2015, Google discovered that CNNIC had issued an intermediate CA certificate to an Egypt-based firm that used CNNIC's keys to impersonate Google domains. Google responded by removing CNNIC's root certificate from the certificate store in Google Chrome and all of Google's products.Mozilla responded to the incident, stating that \"The Mozilla CA team believes that CNNIC’s actions amount to egregious behaviour, and the violations of policy are greater in severity than those in previous incidents. CNNIC’s decision to violate their own Certification Practice Statement is especially serious, and raises concerns that go beyond the immediate scope of the misissued intermediate certificate. After public discussion... we are planning to change Firefox’s certificate validation code such that it refuses to trust any certificate issued by a CNNIC root with a notBefore date on or after 1 April 2015.\"\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_2" +} \ No newline at end of file diff --git a/test/Communication/Environmental_communication.json b/test/Communication/Environmental_communication.json new file mode 100644 index 0000000000000000000000000000000000000000..00ec42e01cb6c894020effbbbe71c20788287012 --- /dev/null +++ b/test/Communication/Environmental_communication.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "Environmental communication is \"the dissemination of information and the implementation of communication practices that are related to the environment. In the beginning, environmental communication was a narrow area of communication; however, nowadays, it is a broad field that includes research and practices regarding how different actors (e.g., institutions, states, people) interact with regard to topics related to the environment and how cultural products influence society toward environmental issues\".\nEnvironmental communication also includes human interactions with the environment. This includes a wide range of possible interactions, from interpersonal communication and virtual communities to participatory decision-making and environmental media coverage. From the perspective of practice, Alexander Flor defines environmental communication as the application of communication approaches, principles, strategies, and techniques to environmental management and protection.\nEnvironmental Communication, breaking off from traditional rhetorical theory, emerged in the United States around the 1980s. Researchers began studying environmental communication as a stand-alone theory because of the way environmental activists used images and wording to persuade their public's. Since then, environmental communication theory has reached multiple milestones including the creation of the journal of environmental communication in 2007.As an academic field, environmental communication emerged from interdisciplinary work involving communication, environmental studies, environmental science, risk analysis and management, sociology, and political ecology.In his 2004 textbook, Alexander Flor considers environmental communication to be a significant element in the environmental sciences, which he believes to be transdisciplinary. He begins his textbook on environmental communication with a declarative statement: \"Environmentalism as we know it today began with environmental communication. The environmental movement was ignited by a spark from a writer’s pen, or more specifically and accurately, Rachel Carson’s typewriter.\" According to Flor, environmental communication has six essentials: knowledge of ecological laws; sensitivity to the cultural dimension; ability to network effectively; efficiency in using media for social agenda setting; appreciation and practice of environmental ethics; and conflict resolution, mediation and arbitration. In an earlier book published in 1993, Flor and colleague Ely Gomez explore the development of an environmental communication curriculum from the perspectives of practitioners from the government, the private sector, and the academe.\nThe role of Environmental Communication in education and academia is centered around goals through pedagogy. These are aimed at trying to increase ecological wakefulness, support a variety of practice-based ways of learning and building a relationship of being environmental change advocates.\nIn general, Environmental skepticism is an increasing challenge for environmental rhetoric.\nThe technological breakthroughs empowered by the appearance of the Internet are also contributing to environmental problems. Air pollution, acid rain, global warming, and the reduction of natural sources are also an outcome of online technologies. Netcraft argued that in the world, there are 7,290,968 web-facing computers, 214,036,874 unique domain names, and 1,838,596,056 websites leading to significant power consumption. Therefore, notions such as “Green Websites” have emerged for helping to tackle this issue. “Green Websites” is “associated with the climate-friendly policies and aims to improve the natural habitat of Earth. Renewable sources, the use of black color, and the highlight of the environmental news are some of the easiest and cheapest ways to contribute positively to climate issues”. The aforementioned term is under the umbrella of “Green Computing,” which is aiming to limit the carbon footprints, energy consumption and benefit the computing performance. Information and Communications technology aka ICT, has an obsessive amount of environment impacts through different types of disposal of devices and equipment that have been portrayed to give off harmful gasses and Bluetooth waves into the atmosphere that increase the carbon emissions. This has also shown that the technology has been used to minimize energy use, society always wants new technology no matter if it affects the environment good or not, but ICT has been cutting back and putting out better technology for our environment while still being able to communicate through society.\nEnvironmental communication is also a type of symbolic action that serves two functions: Environmental human communication is pragmatic because it helps individuals and organizations to accomplish goals and do things through communication. Examples include educating, alerting, persuading, and collaborating. Environmental human communication is constitutive because it helps shape human understanding of environmental issues, themselves, and nature. Examples include values, attitudes, and ideologies regarding nature and environmental issues.In the book Pragmatic Environmentalism: Towards a Rhetoric of Eco-Justice, environmental philosopher Shane Ralston criticizes Cox's pragmatic function of environmental communication for being too shallow and instrumental, recommending instead a deeper account borrowed from Pragmatism: \"[A]n even better way to move beyond a conception of pragmatic rhetoric as shallow instrumentalism and deepen the meaning of pragmatic[...] is to look instead to philosophical pragmatism’s other rich resources, for instance, to its fallibilism, experimentalism, and meliorism.\"\nEnvironmental nature communication occurs when plants actually communicate within ecosystems: \"A plant injured on one leaf by a nibbling insect can alert its other leaves to begin anticipatory defense responses.\" Furthermore, \"plant biologists have discovered that when a leaf gets eaten, it warns other leaves by using some of the same signals as animals\". The biologists are \"starting to unravel a long-standing mystery about how different parts of a plant communicate with one another.\"\nAll beings are connected by the Systems Theory, which submits that one of the three critical functions of living systems is the exchange of information with its environment and with other living systems (the other two being the exchange of materials and the exchange of energy). Flor extends this argument, saying: \"All living systems, from the simplest to the most complex, are equipped to perform these critical functions. They are called critical because they are necessary for the survival of the living system. Communication is nothing more than the exchange of information. Hence, at its broadest sense, environmental communication is necessary for the survival of every living system, be it an organism, an ecosystem, or (even) a social system.\"\nEnvironmental Communication plays an integral role in sustainability science. By taking knowledge and putting it into action. Since Environmental Communication is focused on everyday practices of speaking and collaborating, it has a deep understanding in the public discussion of environmental policy. Something that sustainability science has a shortcoming of. Sustainability science requires cooperation between stakeholders and thus requires constructive communication between those stakeholders to create sustainable change.\nRobert Cox is a leader in the discipline of environmental communication and its role in the public sphere. Cox covers the importance of Environmental Communication and the role it plays in policy-making processes, advocacy campaigns, journalism, and environmental movements. Something that Cox overlooks in the importance of Environmental communication in the Public Sphere is the role visual and aural communication, electronic and digital media, and perhaps most glaringly, popular culture. Along with the aforementioned limitations the media plays a major role in the conversation around the environment because of the framing effect and the impact that it has on the overall perception of the environment and the discussion surrounding it. Framing is something that has been important to many movements in the past but it is more than just creating slogans and the like. George Lakoff argues in favor of a social movement approach similar to the feminist movement or the civil rights movement.The field of Environmental Communication also faces challenges of being silenced and invalidated by governments. Environmental communication like many disciplines had challenges with people with opposing views points that make it difficult to spread a certain message. Environmental Communication like many highly polarized topics is prone to confirmation bias which makes it difficult to have compromises in the world of policy making for the environmental crisis. Along with confirmation bias, Echo chambers do much the same thing and are discussed by Christel van Eck who says with respect to environmental communication that echo chambers can reinforce preexisting climate change perceptions. which serve to make it more difficult to engage in real conversations about the topic. Another reason that it can be difficult to communicate about these things is that many people try to use directional motivated reasoning in which they try to find evidence to push a specific narrative on the topic. The effect that this has had on communicating this idea is examined by Robin Bayes and others who say that it can be very detrimental and divisive. One of the things that makes environmental narratives so dangerous is that it changes so often that it is very difficult to keep the information the same as it travels. This according to Miyase Christensen makes it so that the spreading of these narratives can be dangerous.\nEnvironmental Communication faces a variety of challenges in the political environment due to increased polarization. People often feel threatened by arguments that do not align with their beliefs (boomerang effect). These can lead to psychological reactance, counter-arguing, and anxiety. This can cause difficulty in making progress in political change regarding environmental issues. When it comes to the increased polarization of movements regarding the environment some people point to the impact of identity campaigns because of the argument that fear is counterproductive. Robert Brulle argues this point and calls for a shift away from these identity campaigns and moving towards challenge campaigns.\nAnother limitation of the conversation regarding the environment is the fact that there are multiple agendas being set by different groups in China and the fact that they are different from one another. Along with this the idea that these two different groups are in some sort of a discussion is presented by Xiaohui Wang et. al.\nA culture centered approach has been suggested by some like Debashish Munshi. These people argue for enacting change based on the knowledge of older cultures however it has to exist in a way that does not abuse the relationship between the older cultures and our current one which according to Munshi makes it very difficult to enact.\nTo understand the ways in which environmental communication has an effect on individuals, researchers believe that one's view on the environment shapes their views in a variety of ways. The overall study of environmental communication consists of the idea that nature \"speaks.\" In this field, theories exist in an effort to understand the basis of environmental communication.Researchers view environmental communication as symbolic and material. They argue that the material world helps shape communication as communication helps shape the world. The word environment, a primary symbol in western culture, is used to shape cultural understandings of the material world. This understanding gives researchers the ability to study how cultures react to the environment around them.Humans react and form opinions based on the environment around them. Nature plays a role in human relations. This theory strives to make a connection between human and nature relations. This belief is at the core of environmental communication because it seeks to understand how nature affects human behavior and identity. Researchers point out that there can be a connection made with this theory and phenomenology.It is difficult to avoid the \"call to action\" when talking about environmental communication because it is directly linked with issues such as climate change, endangered animals, and pollution. Scholars find it difficult to publish objective studies in this field. However, others argue that it is their ethical duty to inform the public on environmental change while providing solutions to these issues. This idea that it can be damaging to a scientist's reputation to offer up opinions or solutions to the problem of Climate Change has been furthered by research done by Doug Cloud who had findings affirming this idea.As the following section suggests, there are many divisions of studies and practices in the field of environmental communication, one of which being social marketing and advocacy campaigns. Though this is a broad topic, a key aspect of successful environmental campaigns is the language used in campaign material. Researchers have found that when individuals are concerned & interested about environmental actions, they take well to messages with assertive language; However, individuals who are less concerned & interested about environmental stances, are more receptive to less assertive messages. Although communications on environmental issues often aim to push into action consumers who already perceive the issue being promoted as important, it is important for such message producers to analyze their target audience and tailor messages accordingly.\nWhile there are some findings that there is a problem with scientists advocating for certain positions in a study conducted by John Kotcher and others it was found that there was no real difference between the credibility of scientists regardless of their advocacy unless they directly tried to argue in favor a specific solution to the problem.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_3" +} \ No newline at end of file diff --git a/test/Communication/Facial_Action_Coding_System.json b/test/Communication/Facial_Action_Coding_System.json new file mode 100644 index 0000000000000000000000000000000000000000..3eba767bdcff488267ab6b133ce28376cab553cd --- /dev/null +++ b/test/Communication/Facial_Action_Coding_System.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "The Facial Action Coding System (FACS) is a system to taxonomize human facial movements by their appearance on the face, based on a system originally developed by a Swedish anatomist named Carl-Herman Hjortsjö. It was later adopted by Paul Ekman and Wallace V. Friesen, and published in 1978. Ekman, Friesen, and Joseph C. Hager published a significant update to FACS in 2002. Movements of individual facial muscles are encoded by the FACS from slight different instant changes in facial appearance. It has proven useful to psychologists and to animators.\nIn 2009, a study was conducted to study spontaneous facial expressions in sighted and blind judo athletes. They discovered that many facial expressions are innate and not visually learned.Using the FACS human coders can manually code nearly any anatomically possible facial expression, deconstructing it into the specific \"action units\" (AU) and their temporal segments that produced the expression. As AUs are independent of any interpretation, they can be used for any higher order decision making process including recognition of basic emotions, or pre-programmed commands for an ambient intelligent environment. The FACS manual is over 500 pages in length and provides the AUs, as well as Ekman's interpretation of their meanings.The FACS defines AUs, as contractions or relaxations of one or more muscles. It also defines a number of \"action descriptors\", which differ from AUs in that the authors of the FACS have not specified the muscular basis for the action and have not distinguished specific behaviors as precisely as they have for the AUs.\nFor example, the FACS can be used to distinguish two types of smiles as follows:\nthe insincere and voluntary Pan-Am smile: contraction of zygomatic major alone\nthe sincere and involuntary Duchenne smile: contraction of zygomatic major and inferior part of orbicularis oculi.\nThe FACS is designed to be self-instructional. People can learn the technique from a number of sources including manuals and workshops, and obtain certification through testing.\nAlthough the labeling of expressions currently requires trained experts, researchers have had some success in using computers to automatically identify the FACS codes. One obstacle to automatic FACS code recognition is a shortage of manually coded ground truth data.\nThe use of the FACS has been proposed for use in the analysis of depression, and the measurement of pain in patients unable to express themselves verbally.The original FACS has been modified to analyze facial movements in several non-human primates, namely chimpanzees, rhesus macaques, gibbons and siamangs, and orangutans. More recently, it was developed also for domestic species, including dogs, horses and cats. Similarly to the human FACS, the animal FACS has manuals available online for each species with the respective certification tests.Thus, the FACS can be used to compare facial repertoires across species due to its anatomical basis. A study conducted by Vick and others (2006) suggests that the FACS can be modified by taking differences in underlying morphology into account. Such considerations enable a comparison of the homologous facial movements present in humans and chimpanzees, to show that the facial expressions of both species result from extremely notable appearance changes. The development of FACS tools for different species allows the objective and anatomical study of facial expressions in communicative and emotional contexts. Furthermore, a cross-species analysis of facial expressions can help to answer interesting questions, such as which emotions are uniquely human.\nThe Emotional Facial Action Coding System (EMFACS) and the Facial Action Coding System Affect Interpretation Dictionary (FACSAID) consider only emotion-related facial actions. Examples of these are:\nFACS coding is also used extensively in computer animation, in particular for computer facial animation, with facial expressions being expressed as vector graphics of AUs. FACS vectors are used as weights for blend shapes corresponding to each AU, with the resulting face mesh then being used to render the finished face. Deep learning techniques can be used to determine the FACS vectors from face images obtained during motion capture acting, facial motion capture or other performances.For clarification, the FACS is an index of facial expressions, but does not actually provide any bio-mechanical information about the degree of muscle activation. Though muscle activation is not part of the FACS, the main muscles involved in the facial expression have been added here.Action units (AUs) are the fundamental actions of individual muscles or groups of muscles.\nAction descriptors (ADs) are unitary movements that may involve the actions of several muscle groups (e.g., a forward‐thrusting movement of the jaw). The muscular basis for these actions has not been specified and specific behaviors have not been distinguished as precisely as for the AUs.\nFor the most accurate annotation, the FACS suggests agreement from at least two independent certified FACS encoders.\nIntensities of the FACS are annotated by appending letters A:E (for minimal-maximal intensity) to the action unit number (e.g. AU 1A is the weakest trace of AU 1 and AU 1E is the maximum intensity possible for the individual person).", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_4" +} \ No newline at end of file diff --git a/test/Communication/Global_information_system.json b/test/Communication/Global_information_system.json new file mode 100644 index 0000000000000000000000000000000000000000..85cfefbc29ea6fa27bd9274b1b3cfbec0da41e8c --- /dev/null +++ b/test/Communication/Global_information_system.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "Global information system is an information system which is developed and / or used in a global context. Some examples of GIS are SAP, The Global Learning Objects Brokered Exchange and other systems.\nThere are a variety of definitions and understandings of a global information system (GIS, GLIS), such asA global information system (GIS) is an information system which is developed and / or used in a global context.\nA global information system (GIS) is any information system which attempts to deliver the totality of measurable data worldwide within a defined context.\nCommon to this class of information systems is that the context is a global setting, either for its use or development process. This means that it highly relates to distributed systems / distributed computing where the distribution is global. The term also incorporates aspects of global software development and there outsourcing (when the outsourcing locations are globally distributed) and offshoring aspects. A specific aspect of global information systems is the case (domain) of global software development. A main research aspect in this field concerns the coordination of and collaboration between virtual teams. Further important aspects are the internationalization and language localization of system components.\nCritical tasks in designing global information systems are Process and system design: How are the processes between distributed actors organized, how are the systems distributed / integrated.\nTechnical architecture: What is the technical infrastructure enabling actors to collaborate?\nSupport mechanisms: How are actors in the process of communication, collaboration, and cooperation supported?\nA variety of examples can be given. Basically every multi-lingual website can be seen as a global information system. However, mostly the term GLIS is used to refer to a specific system developed or used in a global context.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_5" +} \ No newline at end of file diff --git a/test/Communication/History_of_the_concept_of_creativity.json b/test/Communication/History_of_the_concept_of_creativity.json new file mode 100644 index 0000000000000000000000000000000000000000..3ad61ed806d6d00442d583f6e230e30c31767e41 --- /dev/null +++ b/test/Communication/History_of_the_concept_of_creativity.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "The ways in which societies have perceived the concept of creativity have changed throughout history, as has the term itself. The ancient Greek concept of art (in Greek, \"techne\"—the root of \"technique\" and \"technology\"), with the exception of poetry, involved not freedom of action but subjection to rules. In Rome, the Greek concept was partly shaken, and visual artists were viewed as sharing, with poets, imagination and inspiration.\nUnder medieval Christianity, the Latin \"creatio\" came to designate God's act of \"creatio ex nihilo\" (\"creation from nothing\"); thus \"creatio\" ceased to apply to human activities. The Middle Ages, however, went even further than antiquity, when they revoked poetry's exceptional status: it, too, was an art and therefore craft and not creativity.\nRenaissance men sought to voice their sense of their freedom and creativity. The first to apply the word \"creativity\", however, was the 17th-century Polish poet Maciej Kazimierz Sarbiewski—but he applied it only to poetry. For over a century and a half, the idea of human creativity met with resistance, because the term \"creation\" was reserved for creation \"from nothing\".\nNineteenth century religious skepticism allowed for a change in definition: now not only was art recognized as creativity, but it alone was. And at the turn of the 20th century, when there began to be discussion as well of creativity in the sciences and in nature, this was taken as the transference, to the sciences and to nature, of concepts that were proper to art.\nThe ancient Greeks had no terms corresponding to \"to create\" or \"creator.\" The expression \"poiein\" (\"to make\") was applied specifically to poiesis (poetry) and to the poietes (poet, or \"maker\") who made it rather than to art in general in its modern understanding. For example, Plato asks in The Republic, \"Will we say, of a painter, that he makes something?\" and answers, \"Certainly not, he merely imitates.\" To the ancient Greeks, the concept of a creator and of creativity implied freedom of action, whereas the Greeks' concept of art involved subjection to laws and rules. Art (in Greek, \"techne\") was \"the making of things, according to rules.\" It contained no creativity, and it would have been—in the Greeks' view—a bad state of affairs if it had.This understanding of art had a distinct premise: Nature is perfect and is subject to laws, therefore man ought to discover its laws and submit to them, and not seek freedom, which will deflect him from that optimum which he can attain. The artist was a discoverer, not an inventor.\nThe sole exception to this Greek view—a great exception—was poetry. The poet made new things—brought to life a new world—while the artist merely imitated. And the poet, unlike the artist, was not bound by laws. There were no terms corresponding to \"creativity\" or \"creator,\" but in reality the poet was understood to be one who creates. And only he was so understood. In music, there was no freedom: melodies were prescribed, particularly for ceremonies and entertainments, and were known tellingly as \"nomoi\" (\"laws\"). In the visual arts, freedom was limited by the proportions that Polyclitus had established for the human frame, and which he called \"the canon\" (meaning, \"measure\"). Plato argued in Timaeus that, to execute a good work, one must contemplate an eternal model. Later the Roman, Cicero, would write that art embraces those things \"of which we have knowledge\" (\"quae sciuntur\").\nPoets saw things differently. Book I of the Odyssey asks, \"Why forbid the singer to please us with singing as he himself will?\" Aristotle had doubts as to whether poetry was imitation of reality, and as to whether it required adherence to truth: it was, rather, the realm of that \"which is neither true nor false.\"\nIn the Roman era, these Greek concepts were partly challenged. Horace wrote that not only poets but painters as well were entitled to the privilege of daring whatever they wished to (\"quod libet audendi\"). In the declining period of antiquity, Philostratus wrote that \"one can discover a similarity between poetry and art and find that they have imagination in common.\" Callistratos averred that \"Not only is the art of the poets and prosaists inspired, but likewise the hands of sculptors are gifted with the blessing of divine inspiration.\" This was something new: classical Greeks had not applied the concepts of imagination and inspiration to the visual arts but had restricted them to poetry. Latin was richer than Greek: it had a term for \"creating\" (\"creatio\") and for \"creator,\" and had two expressions—\"facere\" and \"creare\"—where Greek had but one, \"poiein.\" Still, the two Latin terms meant much the same thing.A fundamental change, however, came in the Christian period: \"creatio\" came to designate God's act of \"creation from nothing\" (\"creatio ex nihilo\"). \"Creatio\" thus took on a different meaning than \"facere\" (\"to make\"), and ceased to apply to human functions. As the 6th-century Roman official and literary figure Cassiodorus wrote, \"things made and created differ, for we can make, who cannot create.\"\nAlongside this new, religious interpretation of the expression, there persisted the ancient view that art is not a domain of creativity. This is seen in two early and influential Christian writers, Pseudo-Dionysius and St. Augustine. Later medieval men such as Hraban the Moor, and Robert Grosseteste in the 13th century, thought much the same way. The Middle Ages here went even further than antiquity; they made no exception of poetry: it too had its rules, was an art, and was therefore craft and not creativity.\nThe Renaissance saw a change in perspective. The philosopher Marsilio Ficino wrote that the artist \"thinks up\" (\"excogitatio\") his works; the theoretician of architecture and painting, Leon Battista Alberti, that he \"preordains\" (\"preordinazione\"); Raphael, that he shapes a painting according to his idea; Leonardo da Vinci, that he employs \"shapes that do not exist in nature\"; Michelangelo, that the artist realizes his vision rather than imitating nature; Giorgio Vasari, that \"nature is conquered by art\"; the Venetian art theoretician, Paolo Pino, that painting is \"inventing what is not\"; Paolo Veronese, that painters avail themselves of the same liberties as do poets and madmen; Federico Zuccari (1542:1609), that the artist shapes \"a new world, new paradises\"; Cesare Cesariano (1483:1541), that architects are \"demi-gods.\" Among musicians, the Flemish composer and musicologist Johannes Tinctoris (1446:1511) demanded novelty in what a composer did, and defined a composer as \"one who produces new songs.\"Still more emphatic were those who wrote about poetry: G.P. Capriano held (1555) that the poet's invention springs \"from nothing.\" Francesco Patrizi (1586) saw poetry as \"fiction,\" \"shaping,\" \"transformation.\"\nPossibly the first to recognisably use the word \"creation\" in terms of human creativity was the 17th-century Polish poet and theoretician of poetry, Maciej Kazimierz Sarbiewski (1595:1640), known as \"the last Latin poet.\" In his treatise, De perfecta poesi, he not only wrote that a poet \"invents,\" \"after a fashion builds,\" but also that the poet \"creates anew\" (\"de novo creat\"). Sarbiewski even added: \"in the manner of God\" (\"instar Dei\").Sarbiewski, however, regarded creativity as the exclusive privilege of poetry; creativity was not open to visual artists. \"Other arts merely imitate and copy but do not create, because they assume the existence of the material from which they create or of the subject.\" As late as the end of the 17th century, André Félibien (1619:75) would write that the painter is \"so to speak [a] creator.\" The Spanish Jesuit Baltasar Gracián (1601:58) wrote similarly as Sarbiewski: \"Art is the completion of nature, as it were a second Creator...\"\nBy the 18th century, the concept of creativity was appearing more often in art theory. It was linked with the concept of imagination, which was on all lips. Joseph Addison wrote that the imagination \"has something in it like creation.\" Voltaire declared (1740) that \"the true poet is creative.\" With both these authors, however, this was rather only a comparison of poet with creator.Other writers took a different view. Denis Diderot felt that imagination is merely \"the memory of forms and contents,\" and \"creates nothing\" but only combines, magnifies or diminishes. It was precisely in 18th-century France, indeed, that the idea of man's creativity met with resistance. Charles Batteux wrote that \"The human mind cannot create, strictly speaking; all its products bear the stigmata of their model; even monsters invented by an imagination unhampered by laws can only be composed of parts taken from nature.\" Luc de Clapiers, marquis de Vauvenargues (1715:47), and Étienne Bonnot de Condillac (1715:80) spoke to a similar effect.\nTheir resistance to the idea of human creativity had a triple source. The expression, \"creation,\" was then reserved for creation ex nihilo (Latin: from nothing), which was inaccessible to man. Second, creation is a mysterious act, and Enlightenment psychology did not admit of mysteries. Third, artists of the age were attached to their rules, and creativity seemed irreconcilable with rules. The latter objection was the weakest, as it was already beginning to be realized (e.g., by Houdar de la Motte, 1715) that rules ultimately are a human invention.\nIn the 19th century, art took its compensation for the resistance of preceding centuries against recognizing it as creativity. Now not only was art regarded as creativity, but it alone was. The art critic John Ruskin has often been referred to in the context of the transition to self-expression in the history of art education, though some scholars believe this to be a misreading.\nAt the turn of the 20th century, when there began to be discussion as well of creativity in the sciences (e.g., Jan Łukasiewicz, 1878:1956) and in nature (e.g., Henri Bergson), this was generally taken as the transference, to the sciences and to nature, of concepts proper to art.\nThe start of the scientific study of creativity is sometimes taken as J. P. Guilford's 1950 address to the American Psychological Association, which helped popularize the subject.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_6" +} \ No newline at end of file diff --git a/test/Communication/Regulatory_focus_theory.json b/test/Communication/Regulatory_focus_theory.json new file mode 100644 index 0000000000000000000000000000000000000000..82129bf887e014c523b176b0bc5fd2393f10267b --- /dev/null +++ b/test/Communication/Regulatory_focus_theory.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "Regulatory focus theory (RFT) is a theory of goal pursuit  formulated by Columbia University psychology professor and researcher E. Tory Higgins regarding people's motivations and perceptions in judgment and decision making processes. RFT examines the relationship between the motivation of a person and the way in which they go about achieving their goal. RFT posits two separate and independent self-regulatory orientations: prevention and promotion (Higgins, 1997).\nThis psychological theory, like many others, is applied in communication, specifically in the subfields of nonverbal communication and persuasion. Chronic regulatory focus is measured using the Regulatory Focus Questionnaire (Higgins et al., 2001) or the Regulatory Strength measure. Momentary regulatory focus can be primed or induced.\nTo understand RFT, it is important to understand another of E. Tory Higgins' theories: regulatory fit theory. When a person believes that there is \"fit\", they will involve themselves more in what they are doing and \"feel right\" about it.  Regulatory fit should not directly affect the hedonic occurrence of a thing or occasion, but should influence a person's assurance in their reaction to the object or event.Regulatory fit theory suggests that a match between orientation to a goal and the means used to approach that goal produces a state of regulatory fit that both creates a feeling of rightness about the goal pursuit and increases task engagement (Higgins, 2001, 2005). Regulatory fit intensifies responses, such as the value of a chosen object, persuasion, and job satisfaction.\nRegulatory fit does not increase the assessment of a decision; instead when someone feels \"right\" about their decision, the experience of \"correctness and importance\" is transferred to the ensuing assessment of the chosen object, increasing its superficial worth. Research suggests that the \"feeling right\" experience can then sway retrospective or prospective evaluations. Regulatory fit can be manipulated incidentally (outside the context of interest) or integrally (within the context of interest).\nRFT refers to when a person pursues a goal in a way that maintains the person's own personal values and beliefs, also known as regulatory orientation. This theory operates on the basic principle that people embrace pleasure but avoid pain, and they then maintain their regulatory fit based on this standard.The regulatory focus is basically the way in which someone approaches pleasure but avoids pain. An individual's regulatory focus concentrates on desired end-states, and the approach motivation used to go from the current state to the desired end-state. This theory differentiates between a promotion-focus on hopes and accomplishments, also known as gains. This focus is more concerned with higher level gains such as advancement and accomplishment.\nAnother focus is the prevention-focus based on safety and responsibilities, also known as non-losses. This focus emphasizes security and safety by following the guidelines and the rules.\nThese two regulatory focuses regulate the influences that a person would be exposed to in the decision-making process, and determine the different ways they achieve their goal, as discussed by RFT. An individual's regulatory orientation is not necessarily fixed. While individuals have chronic tendencies towards either promotion or prevention, these preferences may not hold for all situations. Furthermore, a specific regulatory focus can be induced.\nThe value taken from interaction and goal attainment can be either positive or negative. The decision has positive value when people attempt to attain their goal in a way that fits their regulatory orientation and it will have negative value when people attempt to attain their goal in a way that does not fit their regulatory orientation. Regulatory fit allows value to be created by intensifying the commitment, based on one of the regulatory focus orientations. Making choices and fulfilling objectives are considered as activities, and with any activity, people can be more or less involved. When this involvement is strong, it can intensify the feelings and values about this activity, and the approach to the activity determines whether they are or are not satisfied with the outcome and method of achieving the outcome.\nThis theory has noteworthy implications for increasing the value of life. For example, in interpersonal conflict, if each person experiences \"fit\", each one will be satisfied with and committed to the outcome. In the broad sense, for people to appreciate their own lives, they need to be satisfied and \"feel right\" about what they are doing, and the way they are doing it.  If it is not satisfying, it is known as \"non-fit\", and they will not reach their desired goal.\nRegulatory focus theory, according to Higgins, views motivation in a way that allows an understanding of the foundational ways we approach a task or a goal. Different factors can motivate people during goal pursuit, and we self-regulate our methods and processes during our goal pursuit. RFT proposes that motivational strength is enhanced when the manner in which people work toward a goal sustains their regulatory orientation. Achieving a goal in a way that is consistent to a person's regulatory orientation leads to an individual sense of importance to the event. The impact of motivation is considered calculated and this creates a greater sense of commitment to the goal. The more strongly an individual is engaged (i.e., involved, occupied, fully engrossed) in an activity, the more intense the motivational force experienced. Engagement is of great importance to attain and motivate in order to reach a goal. Engagement serves as intensifier of the directional component of the value experience. An individual who is strongly engaged in a goal pursuits will experience a positive target more positively and a negative target more negatively.Individuals can pursue different goals with diverse regulatory orientations and in unlike ways. There are two different kinds of regulatory orientations that people use to obtain their goals: promotion-focus orientation and prevention-focus orientation. These terms are derived from E. Tory Higgins's Theory of Regulatory Focus. In which, he adds to the notion that people regulate their goal-oriented behavior in two very distinct ways, coined promotion-focus orientation and prevention-focus orientation\nE. Tory Higgins uses this example: there is Student A and Student B, and they both have the shared goal to make an A in a class they are both taking in college. Student A uses a promotion-focus orientation which slants them towards achieving their goal and towards advancement, growth and life accomplishment. This would cause Student A to view the goal as an ideal that satisfies their need for accomplishment. Student B uses a prevention-focus orientation where the goal is something that should be realized because it fulfills their need for security, protection and prevention of negative outcomes. Student A uses an eager approach where they read extra materials to obtain their goal of an A. Student B uses a vigilant approach where they become more detail oriented and pay careful attention to completing all of the course requirements.\nBoth forms of regulatory orientation can work to fulfill goals, but the choice of orientation is based on individual preferences and style. When a person pursues their goal in the focus that fits their regulatory orientation, they are more likely to pursue their goal more eagerly and aggressively than if they were using the other focus. In this case each student has different styles. They both feel more comfortable in persuading their goal. The outcome in this experiment would have been different if the students were given an undesirable choice.\nWhen people make decisions, they often envision the possible \"pleasure or pain\" of the possible outcomes that the focus orientation will produce.  A person imagining making a pleasing choice is more likely to engage in promotion-focus orientation because envisioning the possible outcome of success maintains eagerness about the outcome but does not place importance on vigilance. A person imagining the possible pain by making an undesirable choice maintains more vigilance but less eagerness.\nA person with promotion-focus orientation is more likely to remember the occasions where the goal is pursued by using eagerness approaches and less likely to remember occasions where the goal is pursued by vigilance approaches. A person with prevention-focus orientation is more likely to remember events where the goal is pursued by means of vigilance than if it was pursued using eagerness approaches.\nWhen relating regulatory focus theory to persuasion, it is important to remember that RFT is a goal-attainment theory, and that RFT can spawn feelings of rightness/wrongness which in turn may produce formulations for judgments.The feelings of rightness give an individual more commitment to the information coming in and therefore can avoid endangering their regulatory fit which in turn changes their regulatory focus and accepting a probable motive to change. If a person experiences feelings of wrongness they will suffer negative emotions and deem the experience \nand information as a threat to their regulatory fit and therefore a threat to their regulatory focus and their goal.\nStudies have been done where fit and focus have been applied to show their applicability to consumer purchasing, health advisories, and social policy issues.  To be persuaded is to change your prior feelings, actions, and/or beliefs on a matter to where you agree with the persuader.\nThe \"fit\" involved in RFT plays a large role in such issues and stories because it can be a device to help an individual receive and review the experience during a particular message delivery. Positive reinforcement and feelings of rightness while decoding the message creates a stronger engagement and relationship with processing the message, and negative reinforcement and feelings of wrongness lessens the engagement and attachment. \nResearchers found that targeting the two different regulatory focus orientations, and their coinciding types of fit, works as an effective process to aid in persuasive charm or pull when they introduced a manner of persuasion where the framing of the message was everything and the content was irrelevant to uphold or interrupt a person's regulatory fit and follow the pattern of logic used in regulatory orientation. \nLee and Aaker (2004) conducted an experiment that involved whether or not to give their information in a prevention-focus- or promotion-focus-concerning way. The study involved an advertisement for a grape juice drink, which they split into two to create prevention-focus concerns (disease-preventing) and then promotion-focus concerns (energy enhancement).  In doing so, they demonstrated that rather than trying to know each individual recipient's qualities, one needs only to start by nailing the focus (prevention/promotion) and then framing the message so that it creates that \"rightness\".\nSome may confuse RFT with regulatory fit, regulatory relevance, message matching, and source attractiveness in such an example. The extent of similarities between closely related theories of RFT, such as ones stated above, make it hard to clarify when this theory is applicable or apparent in respect to the persuasion process.\nRFT can be a useful outline for a better understanding of the effects of nonverbal cues in persuasion and impression formation. Regulatory Fit Theory suggests that the effect of a cue cannot be understood without remembering what the cue means given a recipient's focus orientation. Nonverbal cues can be used by the message source to vary delivery style, more specifically to convey eagerness or vigilance, of a given message in a way that will produce regulatory fit in message recipients of different focus orientations.\nAdvancement implies eager movement forward, so eagerness is conveyed by gestures that involve animated, broad opening movements such as hand movements projecting outward, forward leaning body positions, fast body movement, and fast speech rate. Caution implies vigilant carefulness, so vigilance should be conveyed by gestures that show precision like slightly backward-leaning body positions, slower body movement, and slower speech rate.\nAn eager nonverbal delivery style will result in greater message effectiveness for promotion-focus recipients than for prevention-focus recipients, while the opposite is true for a vigilant nonverbal style.\nThere are various aspects, which may contribute to whether or not a message's persuasive element is successful. One aspect is the effect of nonverbal cues and their association with persuasive appeals based on the message recipient's motivational regulatory orientation. This determines the recipient's impression of the source during impression formation.\nResearch has found that nonverbal cues are an essential element of most persuasive appeals. RFT creates the background that allows a prediction for when and for whom a nonverbal cue can have an effect on persuasion. When nonverbal cues and signals are used appropriately, they increase the effectiveness of persuasion.\nRFT has also been applied within moral psychology to the topic of moral judgment, contrasting the notions of \"oughts\" and \"ideals.\"", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_7" +} \ No newline at end of file diff --git a/test/Communication/Safety_sign.json b/test/Communication/Safety_sign.json new file mode 100644 index 0000000000000000000000000000000000000000..e6e0297660ccf84ccca963a6b395652623f33065 --- /dev/null +++ b/test/Communication/Safety_sign.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "A safety sign is a sign designed to warn of hazards, indicate mandatory actions or required use of personal protective equipment, prohibit actions or objects, identify the location of firefighting or safety equipment, or marking of exit routes.\nIn addition to being encountered in industrial facilities; safety signs are also found in public places and communities, at electrical pylons and electrical substations, cliffs, beaches, bodies of water, on motorized equipment, such as lawn mowers, and areas closed for construction or demolition.\nOne of the earliest attempts to standardize safety signage in the United States was the 1914 Universal Safety Standards. The signs were fairly simple in nature, consisting of an illuminated board with \"DANGER\" in white letters on a red field. An arrow was added to draw attention to the danger if it was less obvious. Signs indicating exits, first aid kits consisted of a green board, with white letters. The goal with signs was to inform briefly.\nThe next major standards to follow were ASA Z35.1 in 1941, revised in 1959, 1968, and 1972.\nThe Occupational Safety and Health Administration devised their requirements from ASA Z35.1-1968 in the development of their rules, OSHA §1910.145 for the usage of safety signage in workplaces.\nIn the 1980s, American National Standards Institute formed a committee to update the Z53 and Z35 standards. In 1991, ANSI Z535 was introduced, which was intended to modernize signage through increased use of symbols, the introduction of a new header, 'Warning' and requiring that wording not just state the hazard, but also the possible harm the hazard could inflict and how to avoid the hazard. Until 2013, OSHA regulations technically required usage of signage prescribed in OSHA §1910.145, based on the standard ASA Z35.1-1968. Regulation changes and clarification of the law now allow usage of signs complying with either OSHA §1910.145 or ANSI Z535 designs.Prior to widespread globalization and adoption of standards from the ISO, most countries developed their own standards for safety signage. Text only signs were common prior to introduction of European Council Directive 77/576/EEC on 25 July 1977, which required member states to have policies in place to ensure that \"safety signs at all places of work conform to the principles laid down in Annex I\", which required color coding and symbols.In 1992, the European Council Directive 92/58/EEC replaced EEC 77/576/EEC. The new directive included improved information on how to utilize safety signage effectively. Beyond safety signs, EEC Directive 92/58/EEC standardize markings for fire equipment, acoustic signals, verbal and hand signals for vehicle movements.\nIn 2013, the European Union adopted ISO 7010 to replace the symbols provided previously, adopting them as European Norm (EN) ISO 7010, standardizing symbols among the EU countries. Prior to this, while symbols were provided, symbols were permitted to vary in appearance \"provided that they convey the same meaning and that no difference or adaptation obscures the meaning\".\nAustralian safety signage started in 1952 as CZ4-1952: Safety signs for the occupational environment. It revised and redesignated as AS1319-1972 in 1972, with further revisions taking place in 1979, 1983 and 1994. In August 2018, AS1319-1994 was reconfirmed as still being valid and not in need of major revisions.Japanese safety signage is notable for its clear visual differences from international norms, such as use of square 'no symbols', vertical formatting of sign text. Safety sign standards are regulated by Japanese Industrial Standards through standards JIS Z9101 (Workplace and public area safety signs) JIS Z 9103 (Safety sign colors) and JIS Z 9104 (Safety signs - General specifications). While design trends have been moving towards international norms of ISO standards, differences are still present such as the use of symbols unique to the JIS standards, using colors differently from ISO standards.In addition to typical safety sign standards, Japan introduced JIS Z 9098 in 2016 specifically addressing emergency management needs: informing people of areas susceptible to natural disasters, evacuation routes and safe shelters from disasters. The standard's more unique aspect is the usage of maps and diagrams to provide more detailed information about the area's hazards, shelters and evacuation routes.\nChinese safety signage is regulated by Standardization Administration of China using GB standards 2893-2008 and 2894-2008, which all safety signs are legally required to comply with. Designs are similar to ISO 3864 and uses older ISO 7010 symbols, while adding several additional symbols covering a wider range of prohibitions and hazards.Modern signage design typically consists of a symbol, warning text, and in the United States, Canada, Australia a header consisting of a signal word.North American and some Australian safety signage utilize distinctive headers to draw attention to the risk of harm from a hazard. Headers have guidelines for usage, where conditions must be met to dictate which header must be used for a sign.The 2007 revisions to ANSI Z353.4 allowed for the 'safety alert symbol' found on 'Danger', Warning' and 'Caution' headers to be replaced with the ISO 7010 \"W001 - General warning\" symbol to enable compliance with ISO 3864-1 for signs used in international situations or equipment being exported abroad. \nAdditional headers designs exist, Z53.1-1968 prescribed a magenta and yellow 'Radiation' header for radiation hazards. Other headers have been created by sign manufacturers for various situations not covered Z53.1 standard, such as \"Security Notice\", \"Biohazard\", \"Restricted Area\".\nAs a means of overcoming language and literacy barriers, symbols depicting the hazards, required action or equipment, prohibited actions or items and safety equipment were introduced to safety signage during the 1990s. Globalization and increased international trade helped push this development, as a means of reducing costs associated with needing signage multiple languages. Increasingly, countries are adopting symbols used by ISO 7010 and UN Globally Harmonized System of Classification and Labelling of Chemicals, that harmonizes symbols internationally to reduce confusion, and bring themselves into compliance with international standards.For temporary situations such as wet floors, portable signs are used. They are designed to be self supporting and relatively easy to move once the task is complete. The 1914 Universal Safety Standards provided for a portable 'Danger' sign suitable for both hard floors and soft dirt. Portable signs can take a variety of forms, from a traffic cone with stick on letters, plastic a-frame signs, to safety signs mounted on poles with bases that enable movement.Wet floor signs are also intended to avoid legal liability from injury due failing to warn of an unsafe condition. They are usually yellow. The warning is sometimes enhanced with new technology to provide audible warnings. Robotic cleaning equipment can use wet floor signs with sonar gadgetry to know when its job is finished.\nSince the late 1980s, more emphasis has been put on testing signage for clarity and to eliminate possible misunderstandings. Researchers have examined the impacts of using different signal words, inclusion of borders and color contrast with text and symbols against sign backgrounds. In 1999, a group of designers were tasked with creating standardized warning labels for personal watercraft. The group devised several versions of the same warning label using different symbols, wording and emphasis of key phrases through use of underlining, bold fonts and capitalizing. The label designs were reviewed by the United States Coast Guard, United States Power Squadron, industry representatives and subjected to ease of comprehension and readability tests. Results of these reviews and tests lead to further revisions of words and redesigning of some symbols. The resulting labels are still applied to personal watercraft nearly 20 years after their initial design.Placement of signs also affects the effectiveness of signs. A 1993 study tested compliance with a warning against loading the top drawer of a filing cabinet first. The warning was least effective when it was only placed on the shipping box, but most effective when placed as part of a removable cardboard sleeve that physically obstructed the top drawer, interfering with adding files to the drawer.\nSign effectiveness can be reduced from a number of factors, including information overload, where the sheer amount of information is presented in a manner that a reader is unable process it adequately, such as being confronted by a sign consisting of dozens of words with no paragraph breaks, or excessive amounts of unnecessary information. This can be prevented through simplifying warnings down to their key points, with supplementary manuals or training covering the more nuanced and minor information. Overwarning is a related problem, where warnings are overlooked by people due to the sheer number of warnings, such as placing many safety signs together, redundant or obvious warnings. Effectiveness can be reduced through conditions such as poor maintenance, placing a sign too high or low, or in a way that requires excessive effort to read.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_8" +} \ No newline at end of file diff --git a/test/Communication/Video_feedback.json b/test/Communication/Video_feedback.json new file mode 100644 index 0000000000000000000000000000000000000000..28af8f7b6dc9310270f7f9eb21ca15ec30600ae8 --- /dev/null +++ b/test/Communication/Video_feedback.json @@ -0,0 +1,46 @@ +{ + "domain": "Communication", + "document": "Video feedback is the process that starts and continues when a video camera is pointed at its own playback video monitor. The loop delay from camera to display back to camera is at least one video frame time, due to the input and output scanning processes; it can be more if there is more processing in the loop.\nFirst discovered shortly after Charlie Ginsburg invented the first video recorder for Ampex in 1956, video feedback was considered a nuisance and unwanted noise. Technicians and studio camera operators were chastised for allowing a video camera to see its own monitor as the overload of self-amplified video signal caused significant problems with the 1950s video pickup, often ruining the pickup. It could also cause screen burn-in on television screens and monitors of the time as well, by generating static brightly illuminated display patterns.In the 1960s early examples of video feedback art became introduced into the psychedelic art scene in New York City. Nam June Paik is often cited as the first video artist; he had clips of video feedback on display in New York City at the Greenwich Cafe in the mid 1960s. \nEarly video feedback works were produced by media artist experimenters on the East and West Coasts of North America in the late 1960s and early 1970s. Video feedback artists Steina and Woody Vasulka, with Richard Lowenberg and others, formed The Kitchen, which was located in the kitchen of a broken-down hotel in lower Manhattan; while Skip Sweeney and others founded Video Free America in San Francisco, to nurture their video art and feedback experiments.\nDavid Sohn mentions video feedback in his 1970 book Film, the Creative Eye. This book was part of the base curriculum for Richard Lederer of St. Paul's School in Concord, New Hampshire, when he made video feedback part of an English curriculum in his 1970s course Creative Eye in Film. Several students in this class participated regularly in the making and recording of video feedback. Sony had released the VuMax series of recording video cameras and manually \"hand-looped\" video tape decks by this time which did two things: it increased the resolution of the video image, which improved picture quality, and it made video tape recording technology available to the general public for the first time and allowed for such video experimentation by anyone.\nDuring the 1980s and into the 1990s video technology became enhanced and evolved into high quality, high definition video recording. Michael C. Andersen generated the first known mathematical formula of the video feedback process, and he has also generated a Mendeleev's square to show the gradual progressive formulaic change of the video image as certain parameters are adjusted.\nIn the 1990s the rave scene and a social return to art of a more psychedelic nature brought back displays of video feedback on large disco dance floor video screens around the world. There are filters for Adobe Photoshop and non-linear video editors that often have video feedback as the filter description, or as a setting on a filter. These filter types either mimic or directly utilize video feedback for its result effect and can be recognized by its vortex, phantasmagoric manipulation of the original recorded image.\nMany artists have used optical feedback. A famous example is Queen's music video for \"Bohemian Rhapsody\" (1975). The effect (in this simple case) can be compared to looking at oneself between two mirrors.This technique—under the name \"howl-around\"—was employed for the opening titles sequence for the British science fiction series Doctor Who, which employed this technique from 1963 to 1973.Initially this was in black and white, and redone in 1967 to showcase the show's new 625-line broadcast resolution and feature the Doctor's face (Patrick Troughton at that time). It was redone again, in colour this time, in 1970. The next title sequence for the show, which debuted in 1973, abandoned this technique in favour of slit-scan photography.\nAn example of optical feedback in science is the optical cavity found in almost every laser, which typically consists of two mirrors between which light is amplified. In the late 1990s it was found that so-called unstable-cavity lasers produce light beams whose cross-section present a fractal pattern.Optical feedback in science is often closely related to video feedback, so an understanding of video feedback can be useful for other applications of optical feedback. Video feedback has been used to explain the essence of fractal structure of unstable-cavity laser beams. \nVideo feedback is also useful as an experimental-mathematics tool. Examples of its use include the making of Fractal patterns using multiple monitors, and multiple images produced using mirrors.\nOptical feedback is also found in the image intensifier tube and its variants. Here the feedback is usually an undesirable phenomenon, where the light generated by the phosphor screen \"feeds back\" to the photocathode, causing the tube to oscillate, and ruining the image. This is typically suppressed by an aluminum reflective screen deposited on the back of the phosphor screen, or by incorporating a microchannel plate detector.\nOptical feedback has been used experimentally in these tubes to amplify an image, in the manner of the cavity laser, but this technique has had limited use.\nOptical feedback has also been experimented with as an electron source, since a photocathode-phosphor cell will 'latch' when triggered, providing a steady stream of electrons. See US Patent 4,531,122 for a typical application.\nDouglas Hofstadter discusses video feedback in his book I Am a Strange Loop about the human mind and consciousness. He devotes a chapter to describing his experiments with video feedback.At some point during the session, I accidentally stuck my hand momentarily in front of the camera's lens. Of course the screen went all dark, but when I removed my hand, the previous pattern did not just pop right back onto the screen, as expected. Instead I saw a different pattern on the screen, but this pattern, unlike anything I'd seen before, was not stationary.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "InfluencedBy", + "Uses", + "TypeOfElectrification", + "UsedBy", + "HasQuality", + "AppliesToPeople", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "FoundedBy", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Communication_9" +} \ No newline at end of file diff --git a/test/Culture/Artificial_plants.json b/test/Culture/Artificial_plants.json new file mode 100644 index 0000000000000000000000000000000000000000..c628e17065c9040dd9529b9735f26597457fceb1 --- /dev/null +++ b/test/Culture/Artificial_plants.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Artificial plants are imitations of natural plants used for commercial or residential decoration. They are sometimes made for scientific purposes (the collection of glass flowers at Harvard University, for example, illustrates the flora of the United States). Artificial plants vary widely from mass-produced varieties that are distinguishable from real plants by casual observation to highly detailed botanical or artistic specimens.\nMaterials used in their manufacture have included painted linen and shavings of stained horn in ancient Egypt, gold and silver in ancient Rome, rice-paper in China, silkworm cocoons in Italy, colored feathers in South America, and wax and tinted shells. Modern techniques involve carved or formed soap, nylon netting stretched over wire frames, ground clay, and mass-produced injection plastic mouldings. Polyester has been the main material for manufacturing artificial flowers since the 1970s. Most artificial flowers in the market nowadays are made of polyester fabric and plastic.\nThe industry is now highly specialized with several different manufacturing processes. Hundreds of artificial flower factories in the Pearl River delta area of Guangdong province in China have been built since the early 1980s. Thousands of 40-foot containers of polyester flowers and plants are exported to many countries every year.Five main processes may be distinguished:The first step consists of putting the polyester fabric in gelatine in order to stiffen it.\nThe second consists of cutting up the various polyester fabrics and materials employed into shapes suitable for forming the leaves, petals, etc.; this may be done with scissors, but is more often done with stamps that can cut through a dozen or more thicknesses at one blow.\nNext, the veins of the leaves are impressed by means of silk screen printing with a dye, and the petals are given their natural rounded forms by goffering irons of various shapes.\nThe next step is to assemble the petals and other parts of the flower, which is built up from the center outwards.\nThe fifth is to mount the flower on a stalk of brass or iron wire wrapped with suitably colored material, and to add the leaves to complete the spray.\nWhile the material most often used to make artificial flowers is polyester fabric, both paper and cloth flowers are also made with origami.\nThe art of nylon flower making is an easy to learn craft which uses simple tools and inexpensive material to achieve stunning results. Nylon flower making enjoyed a brief popularity in the United States in the 1970s and soon became very popular in Japan. In recent years, the craft's popularity has spread Asia, Europe and Australia. With the advent of new colors and materials, the art has expanded to infinite new possibilities of nylon flower making.The basic materials needed to make nylon flowers include: wire, stem wire, nylon stocking, nylon threading, floral tape and stamen. Some flowers require cotton balls or sheets (or batting), white glue, acrylic paint and paint brushes.\nSilk flowers are crafted from a protein fibre spun by the silk worm, producing lifelike flowers. Flowers described as being made of silk with a \"real touch technique\" are not made of silk, but rather are made of polyester, polymers and plastics. Moreover, textile items made of polyester but marketed as \"silk\" violate the US federal law : specifically the 1959 Textile Fiber Products Identification Act.There are two methods:Carved: A bar with layered coloured soap is mounted in a lathe, and circular grooves are chiseled into it. The finished flower is symmetric and regular, but the flowers are not identical and can be called handmade.\nMoulded: An oil-less soap milled to a powder is mixed with water, and the paste is used as a modelling material. Leaf and petal textures are stamped or rolled onto the soap. This is an expensive, labour-intensive process.\nClay flowers are made by hand from special air-dry polymer clay or cold porcelain, steel wire, paint, glue, tape and sometimes paper and foam as a filler.With the help of cutters, where each flower has its own cutter set, the parts are cut from the still soft clay and then formed with specially designed tools. After drying, these parts are, when needed, painted with precision and then very precisely assembled into a whole flower. When made by a skilful artisan, clay flowers can be very realistic. From Thailand, where this art is very popular, it has spread to Europe, Russia and the US.\nGlass is melted and blown by hand into flower shapes. Working with glass at high temperatures to form a flower is very difficult, which is why glass flowers are much more expensive than typical artificial flowers.Injection moulding is used for mass manufacture of plastic flowers. Plastic is injected into a preformed metal die.The journal Ethnobotany Research and Applications published a tongue-in-cheek paper that claims to be the culmination of a six-year project in the exhaustive taxonomy of artificial plants, and lumped the group into a single family called the Simulacraceae (\"the family of simulated plants\").Floral wreaths made by the ancient Egyptians were formed from thin plates of horn stained in different colors. They also sometimes consisted of leaves of copper, gilt or were silvered over. The ancient Romans excelled in the art of imitating flowers in wax and in this branch of the art attained a degree of perfection which has not been approached in modern times. Crassus, renowned for his wealth, gave to the victors in the games he celebrated at Rome crowns of artificial leaves made of gold and silver.In more recent times, Italians were the first to acquire celebrity for the skill and taste they displayed in this manufacture. Later English, American, and especially French manufactures were celebrated. The Chinese and Japanese show great dexterity in this work. These early artificial flowers were made out of many-coloured ribbons which were twisted together and attached to small pieces of wire. But these first attempts were decidedly crude.\nIn the first half of the 19th century, the Swedish artist Emma Fürstenhoff became internationally renowned in Europe for her artificial flower arrangements of wax in a technique regarded as a novelty in contemporary Europe. Wax flower sculptures were popular in the 1840s and 1850s in Britain, with noted sculptors including the London-based Emma Peachey and the Mintorn family.\nIn the 1910s, Beat-Sofi Granqvist studied the manufacture of artificial flowers in Germany. After returning to Finland, she founded Finland's first artificial flower factory, next to her apartment at Pieni Roobertinkatu 4-6.\nIn the course of time feathers were substituted for ribbons, a more delicate material, but one to which it was not so easy to give the requisite shades of color. The plumage of the birds of South America was adapted for artificial flowers on account of the brilliancy and permanence of the tints, and the natives of that continent long practised with success the making of feather flowers. The London Zoo contains a collection of artificial flowers made out of the feathers of hummingbirds.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_0" +} \ No newline at end of file diff --git a/test/Culture/Born_Sexy_Yesterday.json b/test/Culture/Born_Sexy_Yesterday.json new file mode 100644 index 0000000000000000000000000000000000000000..c7224737eac080249d8754a70ad2c82f8b73da11 --- /dev/null +++ b/test/Culture/Born_Sexy_Yesterday.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "\"Born Sexy Yesterday\" is a trope that describes a character, typically a woman, who is physically attractive yet portrayed as childlike or naive, often with a level of intelligence or maturity that contradicts her appearance or behavior. These characters typically lack real-world experience, creating a dynamic where their sexual appeal contrasts with their innocence and unfamiliarity with social norms. This trope is prevalent in science fiction and gained critical attention after a 2017 video essay by YouTuber Jonathan McIntosh, known as Pop Culture Detective.\nThe Born Sexy Yesterday trope has persisted for decades but has recently gained critical attention, particularly following a 2017 video by YouTuber Jonathan McIntosh, known as Pop Culture Detective. Coined from the 1950 film Born Yesterday, where two men educate a naive showgirl, the term describes a common narrative device in science fiction, among other genres. Female characters are typically stunning yet childlike, embodying a paradox of adult sexuality paired with social naivety, and are often even artificially created. They often awaken in new and confusing worlds, relying on male counterparts for guidance. A prime example is Leeloo from The Fifth Element, who behaves and speaks like a baby, crafted to be \"perfect,\" naive, and whimsical while being sexualized without her awareness. Other examples include characters from Tron: Legacy, Splash, and Enchanted, who cater to a male fantasy of innocence and sexual purity, positioning their male guides as \"the most extraordinary man\" in their lives. These characters may take forms such as robots, mermaids, or otherworldly beings, consistently displaying childlike innocence despite their mature appearances. While these characters often serve as heroines, their portrayal perpetuates harmful stereotypes about female innocence and male dominance. McIntosh's video highlights the prevalence of the trope in various films, exposing its underlying sexism and paedophilic implications.The Born Sexy Yesterday trope features female characters who blend childlike innocence with adult physicality, often serving as love interests for male protagonists. A central element of this trope is the female character's ignorance, which allows the male protagonist to adopt a teacher-like role, guiding her in social norms and romantic interactions. He instructs her on socially acceptable behavior and guides her in romance and sex, despite lacking any qualifications beyond being the first person she becomes close to, leading her to idolize and fall in love with him. This dynamic, frequently described as \"mansplaining,\" stems from deep-seated male insecurities about sex and relationships. As McIntosh notes:\"The crux of the trope is a fixation on male superiority. A fixation with holding power over an innocent girl. To make this dynamic socially acceptable, science fiction often places a girl's mind in a sexualized adult woman's body. It’s a fantasy based on fear—fear of women who are men's equals in sexual experience and romantic history, and fear of losing the intellectual upper hand to women.\"The trope can take various forms, including pixies, mermaids, and dream girls, ultimately portraying a child trapped in an adult's body. Despite their innocence, these characters often excel in areas like combat or intellect, appealing to heterosexual male audiences. These women are naïve and unaware of the implications of nudity, sex, romance, or sexual interactions, and the male gaze in these films exploits this innocence. McIntosh highlights that the male lead is often a disenfranchised, “straight, red-blooded” man who struggles to connect with women of equal standing. Meanwhile, the female character, characterized by her naivety, falls for him simply because he exhibits basic human behavior, which she lacks. The women are depicted as untouched by other men’s attention, which allows the male characters to avoid comparison and the necessity for self-improvement. To legitimize this dynamic, the love interest is often represented as a grown woman.While the trope thrives in the science fiction, it is not confined to it, and although McIntosh examines this trope within the genre, he recognizes its roots in older, racist narratives where white male adventurers \"discover\" indigenous women. In science fiction, colonialism is replaced by traditional masculine ideologies, with the heterosexual male hero guiding the young woman and educating her about the world, including sex and romance. His infatuation is masked as a teaching role, justifying his actions.\nMcIntosh likens the Born Sexy Yesterday trope to the Manic Pixie Dream Girl archetype, noting that both involve disenfranchised men meeting naive women. However, he emphasizes that the Born Sexy Yesterday trope intensifies the dynamic by positioning women as submissive rather than equal partners.\nMcIntosh argues that the Born Sexy Yesterday trope reveals deep male insecurities regarding sex and relationships, reflecting a desire to control female identities and a fear of female agency. This trope embodies an obsession with power over innocent women, normalizing real-world sexism within the sci-fi and fantasy genres.\nThe Born Sexy Yesterday trope is prevalent in numerous female characters across various media, including Star Trek, Sheena, Planet of the Apes, Passengers, and Fifty Shades of Grey. While some narratives attempt to subvert its inherent sexism, the trope's presence remains evident prior to any potential subversion. Even in Patty Jenkins’ Wonder Woman, which was celebrated as a feminist film, Diana remains sexually inexperienced and unaware of her appeal, relying on Steve for guidance.Historically, the Born Sexy Yesterday trope is not new. The trope's roots can be traced to classic films such as Forbidden Planet and The Time Machine. It appears in Japanese anime, indigenous narratives, and classic Hollywood sci-fi films like The New World. In Forbidden Planet, for instance, the character Alta is deceived into kissing John under the guise of it being essential for her health, echoing manipulative grooming tactics. Other examples include Quorra from Tron Legacy, described as “profoundly naive [yet] unimaginably wise.”\nLeeloo from The Fifth Element is described as \"probably the most quintessential example\" of the Born Sexy Yesterday trope by Jonathan McIntosh. As the human vessel of a Supreme Being sent to combat the \"Great Evil,\" her body is celebrated by male characters, with one scientist expressing a desire to photograph her naked form after she is created. Leeloo, unaware of her own sex appeal, inadvertently undresses in public. She doesn’t speak English, instead communicating in childish gibberish and emotional outbursts. Korben responds to her naïveté—such as her inability to use a camera or dry herself—with condescension. While she is a powerful character capable of great destruction, her ignorance of the world often undermines her agency.\nMihaela Mihailova, an Assistant Professor in the School of Cinema at San Francisco State University, observes that Alita, the cyborg in Alita: Battle Angel, embodies the Born Sexy Yesterday trope in both her design and behavior. After being revived by Dr. Dyson Ido from a scrapyard, Alita's wide-eyed, innocent look emphasizes her naïveté as she navigates her new life with the guidance of her father figure and love interest.\nTelevision shows like Game of Thrones (with Daenerys and Viserys) and Stranger Things (featuring Mike and Eleven) exemplify the trope. The stereotype of the socially awkward \"nerd\" is also prevalent in The Big Bang Theory, where characters like Penny and the female guest stars exhibit Born Sexy Yesterday traits while Leonard and Howard embody the dominant creator role.\nThe Born Sexy Yesterday trope can also manifest in reverse, although male representations within the trope's framework are scarce, given its connections to insecurities surrounding masculinity. Typically, these male characters are depicted as naïve and socially awkward, making them less attractive as sexual interests. Unlike their female counterparts, they are not objectified; their ineptitude is framed humorously rather than pitiably. In films like Big and Blast from the Past, male characters display similar traits but often become the punchlines. This discrepancy may arise from the general lack of appeal for women regarding inexperienced adolescent boys. While films such as Edward Scissorhands and The Shape of Water feature male characters with naïveté, they lack the sexualized portrayal characteristic of female Born Sexy Yesterday figures. For instance, in Edward Scissorhands, Edward engages in genuine love without deception, with relationships developing in spite of his inexperience.Hot Frosty, a film about a snowman coming to life, is an example of a movie in which the Born Sexy Yesterday trope is applied to a male character without losing its highly sexualized aspects.\nAccording to writer Elvia Wilk, the Born Sexy Yesterday trope can be contrasted with Lynn Hershman Leeson's works, which explore themes of identity and agency in innovative ways. Her characters often embody a more complex understanding of femininity, as seen in Teknolust, where the protagonist, Ruby, not only seduces men but also teaches them, signifying sexual liberation rather than dependence.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_1" +} \ No newline at end of file diff --git a/test/Culture/Civilization_state.json b/test/Culture/Civilization_state.json new file mode 100644 index 0000000000000000000000000000000000000000..ac5a203b29e607d4b7c9eec22f016f141eec9551 --- /dev/null +++ b/test/Culture/Civilization_state.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "A civilization state, or civilizational state, is a country that aims to represent not just a historical territory, ethnolinguistic group, or body of governance, but a unique civilization in its own right. It is distinguished from the concept of a nation state by describing a country's dominant sociopolitical modes as constituting a category larger than a single nation. When classifying states as civilization states, emphasis is often placed on a country's historical continuity and cultural unity across a large geographic region.\nThe term was first coined in the 1990s as a way to describe China and later India, but has also been used to describe countries such as Egypt, Russia, Turkey, Iran and the United States.\nThe term has been popularized by Bruno Maçães in a series of essays since 2018.\nThe term \"civilization-state\" was first used by American political scientist Lucian Pye in 1990 to categorize China as having a distinct sociopolitical character, as opposed to viewing it as a nation state in the European model. The use of this new term implies that China was and still is an \"empire state\" with a unique political tradition and governmental structure, and its proponents asserted that the nation state model fails to properly describe the evolution of the Chinese state. Proponents of the label describe China as having a unique historical and cultural unity, derived from a continuous process of cultural syncretism. The term was further popularized by its use in When China Rules the World by British political scientist Martin Jacques.According to Li Xing and Timothy M. Shaw, the central feature of analyzing China as a civilization state is the view that the Chinese state derives its legitimacy from the continuation of a sociopolitical order which posits that the state maintains natural authority over its subjects, and that it is the \"guardian\" of both its citizens and their society, a view of the state that is completely distinct from the Westphalian nation-state model. Other scholars make the case that the key features of a civilization-state are the maintenance of an ethos of cultural unity despite displaying significant cultural diversity, across centuries of history and a large geographic space. Some specifically draw attention to the longevity of the Chinese writing system, or describe China's existence as being uniquely and inexorably tied to the past.\nGuang Xia pushes back on the idea of the uniqueness of a Chinese civilization-state. Xia argues that civilization-state discourse in China studies is an important and positive development, as it allows for characteristics of the modern Chinese state to be properly analyzed in the context of their history. However, Xia concludes that ultimately, all civilizations must reinvent themselves in the context of their history, and that it is a mistake to view China as a static entity or to portray it as being more tied to its past than the rest of the world.\nIndia is another example of a civilization state, with political commentators arguing that a shared Indian identity predates British colonization and Islamic invasions. India as a Hindu majority state, is perhaps the only nation that still follows a Bronze Age religion, i.e. Hinduism. It is suggested by some scholars, taking support of archaeological evidences together with analogy of later cult divinities and religious practices, that roots of Hinduism could be diagnosed in the Bronze Age civilization.By creating a civilizational continuation between ancient Egypt and contemporary Egypt with its Muslim characteristics, Egypt is another example of a civilization state that centers its continuous historical and cultural identity and tradition that contrast the West's global cultural dominance.Vladimir Putin's administration has at times embraced the rhetoric of portraying Russia as a distinct Eurasian civilization-state.British journalist Gideon Rachman argued in a 2019 article that the concept of a civilization state is at odds with modern conceptions of universal human rights and common democratic standards, and is inherently exclusive to minority groups who do not share the feature(s) that define a particular civilization state (for example, they may have a different religion).", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_2" +} \ No newline at end of file diff --git a/test/Culture/Clothing_physiology.json b/test/Culture/Clothing_physiology.json new file mode 100644 index 0000000000000000000000000000000000000000..2c631fa6a334c0e7fa115b1a8bc4fba1de717464 --- /dev/null +++ b/test/Culture/Clothing_physiology.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Clothing physiology is a branch of science that studies the interaction between clothing and the human body, with a particular focus on how clothing affects the physiological and psychological responses of individuals to different environmental conditions. The goal of clothing physiology research is to develop a better understanding of how clothing can be designed to optimize comfort, performance, and protection for individuals in various settings, including outdoor recreation, occupational environments, and medical contexts.\nHuman clothing motives are frequently oversimplified in cultural and sociological theories, with the assumption that they are solely motivated by modesty, adornment, protection, or sex. However, clothing is primarily motivated by the environment, with its form being influenced by human characteristics and traits, as well as physical and social factors such as sex relations, costume, caste, class, and religion. Ultimately, clothing must be comfortable in various environmental conditions to support physiological behavior. The concept of clothing has been aptly characterized as a quasi-physiological system that interacts with the human body.Clothing can be considered as a quasi-physiological system that interacts with the body in different ways, just like the distinct physiological systems of the human body, such as digestive system and nervous system, which can be analyzed systematically.The acceptance and perceived comfort of a garment cannot be attributed solely to its thermal properties. Rather, the sensation of comfort when wearing a garment is associated with various factors, including the fit of the garment, its moisture buffering properties, and the mechanical characteristics of the fibers and fabrics used in its construction.The field of clothing physiology concerns the complex interplay between the human body, environmental conditions, and clothing. Through the use of scientific methods, it is possible to accurately measure and quantify the effects of clothing on wearer comfort and overall well-being.\nLouis Newburgh is widely recognized among thermal physiologists primarily due to his role as the editor of \"Physiology of Heat Regulation and the Science of Clothing\". \nFrom a physiological perspective, the purpose of clothing is to shield the body from extreme temperatures, whether they be hot or cold. The role of clothing in affecting the wearer's comfort can be described as the connection between the body and the surroundings. When engaged in outdoor activities, the individual's comfort level is influenced by various environmental factors, such as air temperature, humidity, solar radiation, atmospheric and ground thermal radiation. The wearer's posture, metabolic rate, sweating rate, and bodily processes such as moisture absorption, sweat evaporation, and heat loss through conduction and convection via blood, are among additional factors that also play a role in determining the individual's comfort level.\nThe contact between clothing and skin facilitates the regulation of body temperature through the control of blood flow and sweat evaporation in localized areas. However, the design of functional fabrics that efficiently regulate skin temperature must take into account crucial factors such as age, gender, and activity level.The skin plays a vital role in safeguarding the body's homeostasis by performing a variety of crucial protective functions. Clothing and other textiles interact dynamically with the skin's functions, and the mechanical properties of the fabric, such as its surface roughness, can lead to non-specific skin reactions, such as wool intolerance or keratosis follicularis.\nIt's common to express metabolic activity in terms of heat production. A resting adult typically generates 100 W of heat, with a significant amount dissipating through the skin. Heat production per unit area of skin, referred to as 1 met, is around 58 W/m2 for a resting individual, based on the average male European's skin surface area of approximately 1.8 m2. The average female European's skin surface area is 1.6 m2 for comparison.Skin temperatures that correspond to comfort during stationary activities range from 91.4°F to 93.2°F (33°C to 34°C), and these temperatures decrease as the level of physical activity increases. Skin temperature that exceeds 45°C or falls below 18°C induces a sensation of pain. Internal temperatures increase with activity. The brain's temperature regulatory center is around 36.8°C when at rest and rises to about 37.4°C when walking and 37.9°C when jogging. A temperature below 28°C can cause fatal cardiac arrhythmia, while a temperature above 43°C can result in permanent brain damage. Thus, it's crucial to regulate body temperature carefully for both comfort and health.\nClothing insulation can be denoted using the unit of measurement called clo. In the absence of clothing, a thin layer of static air known as the boundary layer forms in close proximity to the skin, acting as an insulating layer that restricts heat exchange between the skin and the surrounding environment. This layer typically offers approximately 0.8 clo units of insulation in a motionless state. It's difficult to apply this generalization to very thin fabric layers or underwear, as they occupy an existing static air layer of no more than 0.5 cm thickness. Consequently, these thin layers offer minimal contribution to the clothing's intrinsic insulation.\nThe standard measure for clothing insulation is 1.57 clo·cm-1 in thickness, which is equivalent to 4 clo·inch-1.\nThe advancements in fibers, textiles, electronics, functional finishing, and clothing physiology are anticipated to improve human life in numerous areas such as medicine, military, firefighting, extreme sports, and other apparel applications. The study of clothing physiology has been prompted by the need to design effective clothing systems for various specialized environments such as space, polar regions, underwater operations, and industrial settings.Comfort is a multifaceted concept that encompasses various perceptions, including physiological, social, and psychological needs. After sustenance, clothing is one of the most vital objects that can satisfy comfort requirements. This is because clothing offers a range of benefits, including aesthetic, tactile, thermal, moisture, and pressure comfort.The clothing physiology comfort of an athlete is significantly influenced by the compression effect exerted by their garments. The degree of compression load exerted by the clothing has a direct correlation with the intensity of sweating and the resulting elevation in skin temperature. Specifically, a greater compression load on the body results in a higher degree of sweating and increased skin temperature.Thermophysiological models have become a prevalent tool for forecasting human physiological reactions in varying environmental and clothing conditions.Clothing physiology can be assessed through the utilization of various advanced instruments, including: Sherlock is a thermal manikin test device developed by the Hohenstein Institutes to evaluate clothing physiology, and it is equipped with perspiration simulation capabilities.\nIn the SpaceTex experiment, novel fabrics were evaluated for their ability to enhance heat transfer and manage sweat during physical activity, based on their antibacterial properties. Quick-drying T-shirts made from such fabrics would be advantageous to athletes, firefighters, miners, and military personnel. This marks the first experiment in clothing physiology conducted in microgravity, with sportswear manufacturers aiming to improve their products accordingly. In fact, a modified polyester has already been developed for use by the Swiss military.The integumentary system is a significant immune organ, possessing both specific and non-specific activities related to immunity. Antimicrobial fabrics could potentially disrupt the skin's non-specific defense mechanisms such as antimicrobial peptides or the resident microflora.The social psychology of dress entails comprehending the interconnections that exist between attire and human conduct.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_3" +} \ No newline at end of file diff --git a/test/Culture/Consensus_reality.json b/test/Culture/Consensus_reality.json new file mode 100644 index 0000000000000000000000000000000000000000..3a8207eb331c7b01b4867e3ec0ab69594cfe3045 --- /dev/null +++ b/test/Culture/Consensus_reality.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Consensus reality refers to the generally agreed-upon version of reality within a community or society, shaped by shared experiences and understandings. This understanding arises from the inherent differences in individual perspectives or subjectivities relating to knowledge or ontology, leading to uncertainties about what is real. While various viewpoints exist, people strive to establish a consensus, serving as a pragmatic guide for social norms. The term carries both positive and negative connotations, as it is viewed critically by anti-realist theorists but recognized for its practical benefits in fostering shared beliefs. Consensus reality differs from consensual reality, with the former representing mutual agreement about what is true. Artists and thinkers have challenged consensus reality, aiming to disrupt established norms and question the authenticity of the world's reality.\nChildren have sometimes been described or viewed as \"inexperience[d] with consensus reality,\" though are described as such with the expectation that their perspective will progressively form closer to the consensus reality of their society as they age.\nIn considering the nature of reality, two broad approaches exist: the realist approach, in which there is a single, objective, overall reality believed to exist irrespective of the perceptions of any given individual, and the idealistic approach, in which it is considered that an individual can verify nothing except their own experience of the world, and can never directly know the truth of the world independent of that.Berger and Luckmann argue that \"reality is socially constructed and that the sociology of knowledge must analyze the process in which this occurs\". Rather than being a purely philosophical topic, the question of reality includes, for them, the sociological study of consensus reality.\nConsider this example: consensus reality for people who follow a particular theocentric religion is different from consensus reality for those who follow another theocentric religion, or from those that eschew theocentric religions in favor of science alone, for explaining life and the universe.\nIn societies where theocentric religions are dominant, the religious understanding of existence would be the consensus reality. In a predominantly secular society, where the consensus reality is grounded in science alone, the religious worldview would be the non-consensus (or alternative) reality.\nIn this way, different individuals and communities have fundamentally different world views, with fundamentally different comprehensions of the world around them, and of the constructs within which they live. Thus, a society that is, for example, completely secular and one which believes every eventuality to be subject to metaphysical influence will have very different consensus realities, and many of their beliefs on broad issues such as science, slavery, and human sacrifice may differ in direct consequence of the differences in the perceived nature of the world they live in.\nCharles Tart in his book \"The Awakening\" proposed an alternative term - \"conditioned reality \" (conditioned or conditional reality), pointing out the inaccuracy of the term \"consensus reality\", since no one asks an individual for consent whether he wants to live in a \"generally accepted reality\", because he is accustomed to it through “ conditioning ” - the development of conditioned reflexes in the process of education and socialization.\nSome idealists (subjective idealists) hold the view that there isn't one particular way things are, but rather that each person's personal reality is unique. Such idealists have the world view which says that we each create our own reality, and while most people may be in general agreement (consensus) about what reality is like, they might live in a different (or nonconsensus) reality.Materialists may not accept the idea of there being different possible realities for different people, rather than different beliefs about one reality. So for them only the first usage of the term reality would make sense. To them, someone believing otherwise, where the facts have been properly established, might be considered delusional.The connotation of the term \"consensus reality\" is usually disparaging: it is usually employed by idealist, surrealist and other anti-realist theorists opposing or hostile to this \"reality,\" with the implication that this consensus reality is, to a greater or lesser extent, created by those who experience it. (The phrase \"consensus reality\" may be used more loosely to refer to any generally accepted set of beliefs.) However, there are those who use the term approvingly for the practical benefits of all agreeing on a common set of assumptions or experiences.Consensus reality is related to, but distinct from, consensual reality. The difference between these terms is that whereas consensus reality describes a state of mutual agreement about what is true (consensus is a noun), consensual reality describes a type of agreement about what is true (consensual is an adjective). In other words, reality may also be non-consensual, as when one person's preferred version of reality conflicts with another person's preferred version of reality. Consensual reality is relevant to understanding a variety of social phenomena, such as deception.Artists, writers, and theorists have attempted to oppose or undermine consensus reality while others have declared that they are \"ignoring\" it. For example, Salvador Dalí intended by his paranoiac-critical method to \"systematize confusion thanks to a paranoia and active process of thought and so assist in discrediting completely the world of reality\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_4" +} \ No newline at end of file diff --git a/test/Culture/John_Hopkins_(political_activist).json b/test/Culture/John_Hopkins_(political_activist).json new file mode 100644 index 0000000000000000000000000000000000000000..a8d155252348ee5a7b675a417914c0b88909b9da --- /dev/null +++ b/test/Culture/John_Hopkins_(political_activist).json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "John Victor Lindsay \"Hoppy\" Hopkins (15 August 1937 : 30 January 2015) was a British photographer, journalist, researcher and political activist, and \"one of the best-known underground figures of 'Swinging London' \" in the late 1960s.\nHopkins was born on 15 August 1937 in Slough, Buckinghamshire, England.After attending Felsted School in Essex, Hopkins went on to graduate in 1958 with a degree in physics and mathematics from Emmanuel College, Cambridge, which he had entered on a scholarship in 1955, and he began to work as a laboratory technician at the Atomic Energy Research Establishment at Harwell, Oxfordshire. When he took a trip to Moscow to attend a Communist youth festival, his security clearance was revoked. Hopkins then re-located to London at the beginning of 1960, and began to work as a photographer for newspapers and music magazines including Jazz News, The Guardian, Melody Maker and Peace News. He photographed many of the leading musicians of the period, including The Beatles and the Rolling Stones. Hopkins also recorded the seedier side of London, with photographs of tattoo parlours, cafés, prostitutes and fetishists.\nBy the mid-1960s, he was at the centre of London's emerging underground scene and recorded many peace marches, poetry readings and \"happenings\", as well as photographing leading counter-cultural figures, including Allen Ginsberg and Malcolm X. Hopkins compiled and stencil-duplicated the names, contact details and interests of all of London's \"movers and shakers\". He then gave all of them a copy. This action is credited with greatly boosting the 1960s London-based underground movement.\nIn 1966, with Rhaune Laslett and others, he helped set up the London Free School in Notting Hill. This in turn led to the establishment of the Notting Hill carnival, first organised by Laslett with the guidance of local activists including Michael X. As an extension of the Free School news-sheet The Gate, in 1966 Hopkins and Barry Miles co-founded the influential magazine International Times (IT). Hopkins also set up the UFO Club with Joe Boyd, with Pink Floyd as the resident band.\nArrested for cannabis possession, Hopkins elected for trial by jury. In court on 1 June 1967, he claimed that cannabis was harmless and that the law should be changed. The judge, describing Hopkins as \"a pest to society\", sentenced him to nine months in prison for keeping premises for the smoking of cannabis and possession of cannabis, although Hopkins served only six months. He was jailed at HM Prison Wormwood Scrubs. A \"Free Hoppy\" movement sprang up and, as one particular consequence, Stephen Abrams began co-ordinating a campaign for the liberalisation of the law on cannabis. This led to the publication in The Times on 24 July of a full-page advertisement that described the existing law as \"immoral in principle and unworkable in practice\", signed by Francis Crick, George Melly, Jonathan Miller and the Beatles. Paul McCartney, initially clandestinely, arranged the funding for this advertisement as a tribute to Hoppy, at the instigation of Barry Miles.\nHopkins remained a member of IT′s editorial board and a major contributor, and founded BIT as an information and agitprop arm. Hopkins favoured the more anarchistic elements in the \"underground\" centred on Ladbroke Grove, such as former UFO doorman Mick Farren, who by 1967 was also working at the IT newspaper.\nIn the 1970s, Hopkins was involved in researching the social uses of video for UNESCO, the Arts Council of Great Britain, the Home Office and others, and edited the Journal of the Centre for Advanced TV Studies. Later, he worked as a technical journalist in the video trade press, and co-authored distance learning video training courses. Subsequently, he took and exhibited macro photography of flowers and other plants, and co-authored papers on plant biochemistry at the University of Westminster. He also exhibited his photographs of events and personalities in the 1960s. \nHopkins died at the age of 77 on 30 January 2015.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_5" +} \ No newline at end of file diff --git a/test/Culture/Pet_culture.json b/test/Culture/Pet_culture.json new file mode 100644 index 0000000000000000000000000000000000000000..398c3077d269633d9e86936f1d2e70586748448f --- /dev/null +++ b/test/Culture/Pet_culture.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Pet culture refers to the culture revolving around the interaction of humans and pets.\nModern day society has integrated animals into their everyday lives. Today, American families have said that their non-working, indoor animals are close enough to call them family. Many owners post photos and videos of their pets on social media to entertain other animal lovers. The relationship between sharing and watching has shown an increase in interest for pet owning. This increase in pet owning has impacted cat and dog populations within the animal community. Within mid-1960’s century America, their population has grown an impeccable amount compared to the human population. An average of 63% of American households have one pet, while 45% have multiple. Increase in pets have impacted the increasing number of veterinarians.Before the 1900’s, ownership of a pet was restricted to certain social classes who had the income to care for it. With modern day technology and medicine, the average lifespan of pets has changed. Indoor cats, on average, will live up to 13:14 years. While indoor dogs, on average, will live up to 6:10 years. Pet-keeping can be cost heavy. Throughout the average life of a pet in the United States, the owner may spend on average between $8,000 to $13,000. Pets may be kept for either nothing more than companionship or to also serve as working animals.\nPets have also gained more popularity in places of employment. Office pets are animals that live in or visit the workplace. Usually office pets belong to the company but may also be the personal pet of the CEO or owner, office manager, or another employee. In addition to office pets, there are also Pet-friendly work environments, where employees can bring their pets from home to work with them.The practice of having office pets and/or pet-friendly work environments has been known to occur in big businesses, medium-sized businesses, and small businesses. Reasons as to why a business would have an office pet include boosting employee morale, reducing stress and improving health, drawing in and recruiting new employees, improving communication and collaboration between coworkers, attracting customers and clients, and improving public relations between the business and the community. Additionally, business leaders have cited multiple advantages to having pet-friendly work environments such as improving company culture, boosting productivity, reducing employee turnover, boosting employer brand, improving employee satisfaction, boosting the mental and physical health of workers and giving employees more flexibility.\nIn the United States, the estimate of households that have dogs as pet is about 69 million. Nowadays, owners that have dogs have considered them their best friend and a part of their family. Owners that have suffered from mental illness, loneliness, and distress have lightly eased with the help of their dogs. Human and dog relationships have now been more emotional than practical. In the past, humans owned dogs for work purpose. Small dogs were used to scare off pest, while larger dogs were used for protection and identify danger. Other important jobs that people have used dogs to perform include, among other things, hunting for game, search and rescue for missing persons, herding of livestock and serving as therapy dogs for people.In the United States, there is an estimate of 45.3 million households that own a cat. In the past, humans owned cats for work purposes. The most common job for cats is killing or scaring off vermin such as pigeons and rodents. Additionally, cats (particularly puppy cats) have also been used as protection animals for their owners. Another job cats have been known to perform for humans is serving as therapy cats for people. Between cats and dogs, cats have been known to be the opposite of how dogs act. Cats are seen to be more independent and tend to themselves. Many believe that cats are only with humans for their own benefits, such as eating. Nowadays, this idea has changed as cats are known to change their performance based on how their owners act towards them. The type of cat, character, and its history impacts their behavior.In the United States, there is an estimate of 5.3 million households that have rodents as pets. Additionally, rats have also been used for work purpose as well such as bomb detection, laying computer link cables or serving as therapy animals for people. In the past, rodents were considered vermin that spread disease and were a threat to crops, as a result the practice of keeping small mammals as pets, is a relatively recent development, arising only after large-scale industrialization.In the United States, there is an estimate of 6.0 million households that own birds. As with other domestic animals, birds have been used to perform roles and tasks such as delivering messages, pigeon racing or falconry. Usually, ownership of birds requires an enclosure (such as a birdcages) or a tether (such as a jess) to keep the birds from getting loose.In the United States, an estimate of 11.8 million households who own a pet, own a fish. Humans that rent homes that cannot own dogs and/or cats look towards the option of owning a fish. This could also be true to those who have a serious health issue or extreme asthma. Owning a fish has little evidence of allergies, and overall extremely little danger compared to owning dogs or cats. There are bacterial risks, such as infection, when it comes to fish water, but can be prevented with proper cleaning care. Those that do own a fish with an aquarium believe it has beneficial properties, such as relaxation and a distraction from everyday life.Pet owning in America may cause trouble to the public. Owners may have to face the consequences of pets that misbehave. It may result in pressure and distress to their owners and nearby neighbors. Each year in the United States alone, the Centers for Disease Control (CDC) found that an average of 4.5 million people are attacked by a dog. Within those attacks, around 900,000 of them are serious and need immediate attention. Many pets are also known to carry diseases. Dogs, one of the most common pets in America, are known to transmit rabies to humans primarily through biting. Cats are carriers of Toxoplasma gondii, a parasite that enters the brain and may cause toxoplasmosis. Pets are also known to cause people allergies. They could also trigger an asthma attack, for those who are allergic.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_6" +} \ No newline at end of file diff --git a/test/Culture/Repurposing.json b/test/Culture/Repurposing.json new file mode 100644 index 0000000000000000000000000000000000000000..3d938d0618fb23cb17c8e16eaff2f4450a19ccc8 --- /dev/null +++ b/test/Culture/Repurposing.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Repurposing is the process by which an object with one use value is transformed or redeployed as an object with an alternative use value.\nRepurposing is as old as human civilization, with many contemporary scholars investigating how different societies re-appropriate the artifacts of older cultures in new and creative ways. More recently, repurposing has been celebrated by 21st century hobbyists and arts-and-crafts organizations such as Instructables and other Maker culture communities as a means of creatively responding to the ecological and economic crises of the 21st century. Recent scholarship has attempted to relate these activities to American left- and right-libertarianism.Repurposing is the use of a tool being re-channeled into being another tool, usually for a purpose unintended by the original tool-maker. Typically, repurposing is done using items usually considered to be junk, garbage, or obsolete. A good example of this would be the Earthship style of house, that uses tires as insulating walls and bottles as glass walls. Reuse is not limited to repeated uses for the same purpose. Examples of repurposing include using tires as boat fenders and steel drums or plastic drums as feeding troughs and/or composting bins. Incinerator and power plant exhaust stack fly-ash is used extensively as an additive to concrete, providing increased strength. This type of reuse can sometimes make use of items which are no longer usable for their original purposes, for example using worn-out clothes as rags.\nAppropriation (art) is the repurposing of pre-existing objects or images with little or no transformation applied to them. The use of appropriation has played a significant role in the history of the arts (audiovisual, literary, musical and performing arts). In the audiovisual arts, to appropriate means to properly adopt, borrow, recycle or sample aspects (or the entire form) of human-made audiovisual culture. Notable in this respect are the Readymades of Marcel Duchamp and sampling in Hip Hop music.Steelpan drums are created from oil drums\nFull-size vans from the Big Three which have been used for airport shuttle service have been repurposed as church vans mainly because of some depreciation to facilitate affordable cost for thrifty church groups.A USB dead drop can be mounted on a brick wall since this gives an opportunity to repurpose older USB flash drives with obsolete capacities to continue service for file transfer (especially anonymous ones) that don't demand more than one gigabyte.Everdrive and other flash video game cartridges have offered opportunities to download ROM images of video game cartridges onto SD cards while offering opportunities to repurpose real vintage video game consoles for retro gameplay.\nOld Android smartphones, which tend to have little computing resources yet which are unused and probably contain a triaxial accelerometer of decent specifications, can be used as an amateur seismograph node for a distributed seismography project, e.g., Quake-Catcher Network.\nDiscarded or new consumer COTS surplus parabolic reflectors intended for use for C band satellite TV reception can be repurposed for a wide gamut of applications for which a consumer-grade reflector of low gain is adequate, incl. amateur microwave SETI (mainly Project Argus), Wi-Fi links, and microwave amateur radio radio beacons.\nRight-hand-drive Jeep brand vehicles, such as the Jeep Wrangler, which are initially slated for import to right-hand-drive countries, have had some specially designed versions repurposed for US and Canada postal service mail carrying, in which this tactic of repurposing can consolidate the overhead of retooling for specialty manufacturing of the vehicle.Reusable packaging can be reused for a wide variety of other purposes.Recycling can also involve repurposing of materials, such as products using recycled paper.\nDrug repositioning (also known as \"drug repurposing\" or \"therapeutic switching\") is the application of known drugs and compounds to treat new diseases. Examples include Pfizer's Viagra for erectile dysfunction and Celgene's thalidomide for cancer.Real estate, including land and buildings, is routinely adaptive reused for other purposes, both short-term and long-term, due to its high fixed cost. An example is conversion of old industrial mills.Scrap metal has countless applications for repurposing.Furniture has countless applications for repurposing.\nKitchen utensils have many unique repurposing opportunities.\nBeverage bottles: Water bottles may be repurposed for solar water disinfection. Wat Pa Maha Chedi Kaew is a Buddhist temple in Thailand made from one million discarded beer bottles.\nRemoved house parts, like doors, also have countless potential repurposing applications.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_7" +} \ No newline at end of file diff --git a/test/Culture/The_Triple_Package.json b/test/Culture/The_Triple_Package.json new file mode 100644 index 0000000000000000000000000000000000000000..4169f1cbd2674d31c10525df6ca80ddd72416f81 --- /dev/null +++ b/test/Culture/The_Triple_Package.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "The Triple Package: How Three Unlikely Traits Explain the Rise and Fall of Cultural Groups in America is a book published in 2014 by two professors at Yale Law School, Amy Chua and her husband, Jed Rubenfeld. Amy Chua is also the author of the 2011 international bestseller, Battle Hymn of the Tiger Mother.\nAccording to the preface, the authors find that \"certain groups do much better in America than others—as measured by various socioeconomic indicators such as income, occupational status, job prestige, test scores, and so on— [which] is difficult to talk about. In large part this is because the topic feels racially charged.\" Nevertheless, the book attempts to debunk racial stereotypes by focusing on three \"cultural traits\" that attribute to success in the United States.\nFollowing Battle Hymn of the Tiger Mother in 2011, Chua wrote this book with her husband Jed Rubenfeld after observing a more prevalent trend of students from specific ethnic groups achieving better academic results than other ethnic groups. For example, a striking demographic pattern that more Mormon students in Yale are emerging than a couple years ago. According to an interview conducted by Harry Kreisler from the Institute of International Studies, UC Berkeley, the authors explained such phenomenon prompted them to \"look further into how those groups perform outside of school, and come to a conclusion that for some reasons, those groups have a tendency to experience most upward social mobility than others.\"Before its publication, The Triple Package drew attention for its highly controversial assertion that though with tough economy, shrinking opportunity, and rising economic inequality, certain communities are outperforming the national average, experiencing upward mobility and educational attainment at dramatically high rates, and that this success has to do with certain inherent characteristics belonging to these cultural groups. This led critics to note the book was \"sure to garner just as much (if not more) controversy as her first book did.\"\nThe central argument of the book is that various ethnic groups that are \"starkly outperforming\" the rest in America possess three distinct traits. These virtues are the presence of a superiority complex, the simultaneous existence of a sense of insecurity, and a marked capacity for impulse control.By definition, superiority is \"a deeply internalized belief in your group's specialness, exceptionality, or superiority.\" The authors claim that this element is derived from various sources. First, from a religious perspective, Mormons are introduced to their people's magnificent history and civilization. Second, from a social viewpoint, Nigerian immigrants belonging to the prestige entrepreneurial Igbo people. Third, a mixture of both: for example, Jews as \"chosen people\", and \"a moral people, a people of law and intellect, a people of survivors.\"The authors define insecurity as a species of discontent : an anxious uncertainty about your worth or place in society, a feeling or worry that you or what you've done or what you have is in some fundamental way not good enough.\" Immigrants for example are prone to insecurity because of social and financial anxiety, resulting in the sense of being discriminated against; a perception of danger; feelings of inadequacy and angst of losing their established social standing and possession.The authors refer to impulse control as \"the ability to resist temptation, especially the temptation to give up in the face of hardship or quit instead of persevering at a difficult task.\" For instance, Mormon culture celebrates strict self-discipline with their temperance, two-year mission, and abstinence from sexual relations before marriage. Chua compares that with the Marshmallow Experiment, where a child can either enjoy a piece of marshmallow instantly or wait and have twice as much of the treat later. She concludes that delayed gratification is one of the most important elements in the Triple Package.The authors add that a superiority complex and insecurity are not mutually exclusive. The coexistence of both qualities \"lies at the heart of every Triple Package culture\", producing a need to be recognized and an \"I'll show them\" mentality because the superiority a person has is not acknowledged by the society. Namely, immigrants suffer status collapse though moving up the economic ladder. Thus, this circumstance results in anxiety but also \"a drive and jaw-dropping accomplishment.\"\nThe book categorizes the cultural groups regarding their religion, national origin, and ethnic group. By cultural groups, they refer that as members of the group that tend to be united or pass on a certain sense of outlooks and cultural values to their next generations.During an interview with Harry Kreisler, the authors explained how they collected the data by going through months of Census data, all available economic data, and from personal experience; and at last narrowed down to the eight cultural groups listed as the successful groups in the United States: Chinese, Jewish, Indian, Iranian, Lebanese, Nigerians, Cuban exiles and Mormons.\nAs both authors belong to one of the above groups and coming from an immigrant family, namely Chua being Chinese and Rubenfeld being Jewish, Chua further claims that \"Chinese Americans are three generations behind the Jews\" as both Jewish Americans and Chinese Americans share many similar behaviors like being instructed to learn how to play a musical instrument when they were little and encouraged to become a doctor, teacher or a lawyer.\nThe book has received polarized reviews from critics and public. Since Chua has been seen as a provocative figure who sparked a tense debate about parenting with Battle Hymn, this book certainly attracted much attention with its racially charged arguments. Alicia W. Stewart, writing for CNN, claims that \"it's no surprise that her latest book about success and cultural groups was given a bit of side-eye, even before it published.\"Some critics admired the book for \"meticulously document[ing]\" how some groups are more high-achieving. but others described it as an exercise in \"pop sociology\". The Independent (UK) gave a mixed review, concluding that \"the book is not racist; it is well written and seductive. But its premise is flawed, arguments pernicious and methods disingenuous. And there is a whiff of aromatic complacency on every page.\"\nIn general, positive reviews praised the book for tackling a controversial and complicated socioeconomic and cultural question and for creating a unified theory of success in America, while negative reviews criticized it for ignoring intergenerational wealth transmission as well as selection effects due to the subset of people from different regions who are able to emigrate.\nPublishers Weekly reviewed the book, concluding: \"This comprehensive, lucid sociological study balances its findings with a probing look at the downsides of the triple package—the burden of carrying a family's expectations, and deep insecurities that come at a psychological price.\"The Guardian commended the book for \"draw[ing] on eye-opening studies of the influence of stereotypes and expectations on various ethnic and cultural groups ... The authors' willingness to pursue an intellectual inquiry that others wouldn't is bracing.\"\nThe Kirkus Reviews review of the book concluded: \"On a highly touchy subject, the authors tread carefully, backing their assertions with copious notes. Though coolly and cogently argued, this book is bound to be the spark for many potentially heated discussions.\"\nAllison Pearson reviewed the book favorably for The Telegraph, calling it \"Powerful, passionate and very entertaining.\"\nLogan Beirne, published an article titled \"What George Washington teaches us about success\" in Fox News Opinion, that this book is \"filled with surprising statistics and sociological research […] Triple Package contends that success is driven not by inborn biology, but is instead propelled by qualities that can be cultivated by all Americans. The book serves as an opportunity to discuss what has helped drive America's triumphs in the past : and how we might harness this knowledge for our future.\"\nJ. D. Vance, writing in the National Review Online, described the book as \"sometimes funny, sometimes academic, and always interesting study of the cultural traits that make some groups outperform others in America. . . . [The Triple Package] asks a very important question: why are some of us doing so much better (or worse) than others? . . . I'm not sure that Chua and Rubenfeld have all the right answers. But I do know that by focusing on people—and the cultures that support and affect them—they're asking the right questions. That's more than I can say for most of the social policy experts occupying the airwaves today.\"\nLucy Kellaway, writing for Financial Times, called it \"the best universal theory of success I've seen.\"\nJennifer Lee, a sociologist and a professor at the University of California, Irvine, whose work has been quoted in The Triple Package, criticized the book in the online publication Zócalo Public Square. In her article, she asserts that Chua and Rubenfeld overlooked institutional and structural factors and asks \"But what happens if you measure success not just by where people end up—the cars in their garages, the degrees on their walls—but by taking into account where they started?\" Lee concludes that after controlling parental accomplishment and education levels, people of Mexican origin are more successful in the U.S. than people of Chinese origin.Colin Woodard wrote a critical review of the book for the Washington Post, saying that the thesis of the book was constructed on \"methodological quicksand\" that was revealed by the case of the people of Appalachia. Also, he shares the same concern most critics have with this book, questioning \"might the successes of the exiles have more to do with their relative class, education and social advantages than the Triple Package?\", concluding that while people are told an A-minus is a bad grade in Battle Hymn, \"one wonders what Chua and Rubenfeld will make of an F.\"\nMaureen Callahan wrote an article titled \"Tiger Mom: Some cultural groups are superior\" for New York Post, generated heated debate in the public with its incendiary topic, calling the book \"a series of shock-arguments wrapped in self-help tropes, and it's meant to do what racist arguments do: scare people.\" She claims that Chua repeated the same argument from her previous book, Battle Hymn, the rise and ultimate supremacy of China : and this time, \"so well timed to deep economic anxiety, to the collective fear that the American middle class is about to disappear, for good.\"\nAlicia Stewart who wrote for CNN sums up several controversial issues in the book: namely, the definition of success is not universal; the traits of success are not a pattern; Triple package cultures highlight relatively less successful cultural groups; over-generalizing and honing in on groups promote a 'new racism'; the notion of the American dream is undermined.\nKhanh Ho was highly critical of the book in an article for the Huffington Post, concluding: \nI do have this question: If you arrive in the United States as part of the 1 percent that drained off all the resources from a latter-day colony is it any surprise that you were able to leverage your fortune into a career at a top-notch university? If you inherited your status, wealth, privilege, connections and all it got you was a well-paying job does it at all reflect your innate superiority? Or is your so-called success simply the logical conclusion to the fact that you simply started off better?\nJohn Crace wrote a satirical review-cum-summary of the book for The Guardian, citing one of the Triple Package Traits : Impulse control is to \"resist this book.\"\nThe book was also negatively reviewed in Boston Globe, saying that \"if the book [did not] structured to focus on an underdeveloped notion that feels intentionally provocative, it would have been a lot better.\"\nJaya Sundaresh, writing for The Aerogram, claims that the authors by singling out eight cultural groups that they claim are \"exceptional\", \"leading us to wonder what is so wrong with other groups in America,\" suggesting that \"this kind of analysis smacks of cultural essentialism.\"\nWriting in Slate Magazine, Daria Roithmayr asserted that the book's argument \"doesn't hold water\" for several reasons, including avoidance of \"the pesky issue of race\", not adequately acknowledging \"first-wave advantage\", and noting that the authors \"are forced now to slice and dice the argument\" in order to explain away exceptions.\nBefore the book's publication, New York Post published an article titled \"Tiger Mom: Some cultural groups are superior\" which sparked controversy, including people using social media to voice their concerns. For example, David Leonard, a historian, tweeted \"Dear Amy Chua & Jed Rubenfeld, the 1920s called and want their (racial) theories back.\" Matt O'Brien tweeted \"The Return of the Troll\"; and Ellen Wu tweeted \"cringe worthy and racist.\"Israeli newspaper Haaretz published an article based on an interview of the authors about the book. An audio interview of the authors was published by Slate Magazine. Amy Chua was also interviewed in The Irish Times, where she emphasized that the book is \"about the rise and fall of cultural groups.\" The article notes that in spite of the success of Asian-American students, they have the lowest reported self-esteem. Chua stresses that the thesis of the book is \"intended to be a nuanced idea, not some superficial celebration. It can be very painful to be driven.\"", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_8" +} \ No newline at end of file diff --git a/test/Culture/Xeer.json b/test/Culture/Xeer.json new file mode 100644 index 0000000000000000000000000000000000000000..27d8ec52b59ada08a3ea970398ca614ac55c9182 --- /dev/null +++ b/test/Culture/Xeer.json @@ -0,0 +1,65 @@ +{ + "domain": "Culture", + "document": "Xeer (pronounced [ħeːr]) is the traditional legal system used by Somalis in Somalia, Djibouti, Somali Region of Ethiopia, and the North Eastern Province in Kenya. It is one of the three systems from which formal Somali law draws its inspiration, the others being civil law and Islamic law. It is believed to pre-date Islam. However, Islam influenced it, with Xeer incorporating many Islamic legal principles. Under this system, the elders, known as the xeer begti, serve as mediator judges and help settle court cases, taking precedent and custom into account. Xeer is polycentric in that different groups within Somali society have different interpretations of xeer.\nSomali society is traditionally structured around a patriarchal clan based system, subdivided into sub-clans, then lineages, and finally mag groupings. These groups are bound together either by family ties or contract. Xeer justice usually revolves around the latter groups, as these are the smallest. In these groups, each member is responsible aiding in the payment for the crimes of another and must accordingly bear some fraction of any decided punishment if the accused cannot afford to do so themselves. Within this system, only the victim or immediate family of a victim can bring criminal proceedings to xeer mediation. If the victim is a man, his father, brothers, or uncles can bring complaints. If the victim is a woman, complaints can be brought forward by the men in her family or the men in her husband's family.In xeer, crimes are transgressions against property rights. Justice is directed in the form of material compensation to the victim. If the accused is found guilty, some material restitution must be paid. If restitution cannot be given, mag retribution is due, measured in terms of livestock (usually healthy female camels), to be paid to the victim or the victim's family. There is no concept of imprisonment under xeer. In some cases, elders may advise that neither side seeks restitution or retribution. The verdict is enforced by the victim's family or else by all able-bodied clansmen within the area wherein the verdict is to be executed.\nXeer judges are made up of the heads of extended families. These family heads are chosen for their knowledge of the law and wisdom, but otherwise, there is no formal training, and each judge is allowed to formulate their own doctrines and legal principles. Multiple judges are chosen to preside over each case by the involved parties, with this delegation being called an \"ergo\". The number of judges involved in a case is usually around ten, though it can be as few as two.\nIn each case, the goal is to reach consensus between the parties. Arbitration traditionally takes place under a large tree, and the mediators ask each party to submit to the judge's ruling. In modern times, meeting halls are often used instead of sitting under a tree. Each party has the right to appoint a representative to speak on its behalf while a recorder loudly repeats any important points that are made. If a fact is disputed, its veracity must be obtained by the testimony of three witnesses. If this cannot be done, an oath must be sworn. Should proceedings become heated, the presiding judge may order a recess, wherein both parties discuss issues relating to the case in small informal groups. Once the mediation has been decided, an appeal may be requested, although all parties must agree.\nDifferent groups within Somali society undertake oral agreements with each other to define xeer law. Despite this informal nature, there is a series of generally accepted principles, agreements, and ideas that constitute xeer, referred to collectively as \"xissi adkaaday\". These are:the payment of mag by the collective group (clan, sub-clan, lineage, or mag group) from which an offender originates as compensation for the crimes of murder, bodily assault, theft, rape, and defamation of character, given to the victim or victim's family;\nthe protection of vulnerable or respected members of society such as older adults, women, children, poets, guests and religious people\nobligations to the family such as the payment of a dowry to a bride\nthe rights of a widower to marry the dead wife's sister and the inheritance of a widow by the dead man's brother\nthe punishments for elopement\nand the division and use of natural resources like water and land.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "InfluencedBy", + "SignificantEvent", + "NotableWork", + "FieldOfWork", + "Uses", + "SetInPeriod", + "ReviewedBy", + "Represents", + "UsedBy", + "SupportsProgrammingLanguage", + "HasQuality", + "Occupation", + "DateOfDeath", + "LocatedIn", + "Causes", + "GeneralAffiliation", + "Founded", + "HasCause", + "HasEffect", + "Author", + "FoundedBy", + "StudiedBy", + "DateOfBirth", + "PublishedIn", + "PrimeFactor", + "contains the administrative territorial entity", + "DiplomaticRelation", + "SharesBorderWith", + "Employer", + "HasWrittenFor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Culture_9" +} \ No newline at end of file diff --git a/test/Economy/Bare_minimum_Monday.json b/test/Economy/Bare_minimum_Monday.json new file mode 100644 index 0000000000000000000000000000000000000000..3679aa44a449db04c1f2f0ff80efac7e55c65021 --- /dev/null +++ b/test/Economy/Bare_minimum_Monday.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Bare minimum Monday (BMM), also known as minimum effort Monday or minimal Mondays refers to an initiative by employees to do the minimal amount of work necessary on Mondays, which mark the start of the work week. This may also involve starting the work day later and prioritizing self-care activities. In doing so, employees alleviate the stress and anxiety associated with the beginning of the work week by making Mondays more manageable and less overwhelming.\nThe term was coined in 2022 by Marisa Jo Mayes on TikTok under the username \"itsmarisajo\" in response to occupational burnout from the Sunday scaries, hustle culture, and worker exploitation.\nBare minimum Monday has been criticized as an antiwork effort and that employee disengagement could lead to termination of employment. Bare minimum Monday is not compatible with company cultures that promote presenteeism.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_0" +} \ No newline at end of file diff --git a/test/Economy/Central_bank_independence.json b/test/Economy/Central_bank_independence.json new file mode 100644 index 0000000000000000000000000000000000000000..8907f912f83ba014e531f646e956136f03551fec --- /dev/null +++ b/test/Economy/Central_bank_independence.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Central bank independence refers to the degree of autonomy and freedom a central bank has in conducting its monetary policy and managing the financial system. It is a key aspect of modern central banking, and has its roots in the recognition that monetary policy decisions should be based on the best interests of the economy as a whole, rather than being influenced by short-term political considerations.\nThe concept of central bank independence emerged in the 1920s and was broadly approved by the conclusions of the Brussels International Financial Conference (1920). Since the 1980s, there has been a substantial increase in central bank independence worldwide.\nThe purpose of central bank independence is to enhance the effectiveness of monetary policy and ensure the stability of the financial system. Independent central banks are better able to carry out their mandates, which include maintaining price stability, ensuring the stability of the financial system, and implementing monetary policy. By being free from political influence, central banks can focus on long-term goals, such as controlling inflation and ensuring stability, rather than responding to short-term political pressures.\nCentral bank independence can be classified in various ways. One common classification is based on the extent of the central bank's autonomy, which can be either formal or actual. Formal independence refers to the legal provisions that guarantee the central bank's autonomy, such as its mandate, its organizational structure, and the procedures for appointing its leaders. Actual independence refers to the practical independence that the central bank enjoys in practice, taking into account factors such as its political and institutional environment, its relationship with the government, and the level of transparency and accountability in its operations.\nAnother common classification of central bank independence is based on the extent to which the central bank is free from government control. This can be either formal or actual, and ranges from complete independence to significant government control, with several intermediate levels in between. The People's Bank of China is an example of a central bank subject to Chinese Communist Party control.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_1" +} \ No newline at end of file diff --git a/test/Economy/Consumer_economy.json b/test/Economy/Consumer_economy.json new file mode 100644 index 0000000000000000000000000000000000000000..f4607e3f1f79d43d111a9a43305e08d0f6e4559f --- /dev/null +++ b/test/Economy/Consumer_economy.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "A consumer economy describes an economy driven by consumer spending as a high percent of its gross domestic product (GDP), as opposed to other major components of GDP (gross private domestic investment, government spending, and imports netted against exports).\nIn the U.S., it is usually said by economists, including in Henry Hazlitt's \"Economics in One Lesson\" that 70% of spending is consumer-based, but this number is disputed by economists like Businessweek columnist Michael Mandel.\nThe absolute income hypothesis argues that income and demand generate consumption, and that the rise in GDP gives life to a rise in consumption. It was popularized by Keynes.Milton Friedman argues for a permanent income hypothesis, that consumption spending is a function of how rich you are.\nAbsolute income was theorized by Keynes. Its model is Ct=λYt. He believed that consumption at a certain time could be determined by marginal propensity to consume multiplied by income at that particular time.Permanent income was theorized by Friedman. Instead of marginal propensity to consume, it theorizes \"consumption smoothing\", where people spread out changes in income using borrowing (e.g., credit cards).Charles Hugh Smith, writing for Business Insider, argues that while the use of credit has positive features in low amounts, but that the consumer economy and its expansion of credit produces consumer ennui because there is a marginal return to consumption, and that hyperinflation experts recommended investment in tangible goods.Smith raises the issues of storage and maintenance of goods as limitations and problems of the consumer economy, as demand will eventually have to stagnate and credit will one day be denied.\nMany capitalist countries have an economy that is driven by the economic activities of its constituents. England and America have particularly influential economies.The consumer revolution in England is generally understood to have been in the eighteenth century, although the concept of consumerism was perceived to have appeared in the late 1500s and 1600s. Prior to this, the Middle Ages were understood to have been a time of perpetual material poverty, in which the concept of the commodity or the concept of the consumer did not exist. Maryanne Kowaleski argues against this view, arguing that medieval charity, instructional guidebooks, and population growth (paralleled by that of currency), created a consumer economy in the pre-Great Famine era Research by people like Britnell and Campbell suggest commercialization first appeared in the medieval period, and researchers like Christopher Woolgar have studied consumption practices in elite households.In their economy, they had many exotic items (because of the imperial conquests of the British Empire) and it created an environment for a desire-based mode of shopping that was pleasurable, not mundane.\nRomantic literary critic Andrea K. Henderson argued that this influenced Romantic-era poetry because the poets were often part of an urban society. desiring things that could not be easily attained and were unavailable. This influenced their interpretation of things like the past, and the non-urban natural world, because they had to construct narratives to understand things that were inaccessible to them.\nIn an essay for the book \"An Emotional History of the United States\", Susan J. Matt describes \"aspirational envy\" within the middle class toward the \"bourgeois\", during a period with a pool of goods that was growing rather than remaining finite.The US consumer economy in the 1920s included many leisure items and products that improved housework. They introduced advertising to sell goods and department stores were created. They introduced lines of credit and installment plans to consumers who could or would not buy things immediately.\nConsumer spending in the US rose from about 62% of GDP in 1960, where it stayed until about 1981, and has since risen to 71% in 2013.In the first economic quarter of 2010, a report from the Bureau of Economic Analysis in the U.S. Department of Commerce stated that real gross domestic product rose by about 3.2 percent, and that this represents a difference from the fourth quarter of 2009. In that fourth quarter real GDP increased by 5.4 percent. It states that \"[t]he increase in real GDP in the first quarter primarily reflected positive contributions from\npersonal consumption expenditures (PCE), private inventory investment, exports, and nonresidential fixed investment that were partly offset by decreases in state and local government spending and in residential fixed investment.\"\nAccording to Kevin O'Marah of Forbes magazine, Africa's consumer economies remained \"buoyant\" despite the worldwide collapse in the commodity industry, despite the fact that commodity extraction industries have long dominated the region.Some analysts, including an anonymous columnist at The Economist stated in 2014 and early 2015 that China was likely to become a consumer economy. They regarded it as the second biggest consumer.After 10 years of development in China, the growth rate of consumption level of rural residents has gradually surpassed that of urban residents. On the other hand, the consumption structure between the two is also slowly assimilating.\nIn the end of 2021, McKinsey & Company, a global management consultancy, estimated China to be the largest consumer economy today as measured in purchasing power parity (PPP) terms. It projected that over the next decade, China might add more consumption than any other country and was expected to generate more than one-quarter of all global consumption growth. In 2022, under the influence of the COVID pandemic and the global economic slowdown, Chinese consumers in 2022 grew more cautious in spending and strengthened their intent to put their money in the bank. That said, McKinsey still observed resilience in China's economy, with a rise of 5.3% in the nominal disposable income per capita and a minimal consumer price inflation of 2.0%.\nThe GDP in the country grew 6.3% in 2015. Their inflation rate was about 1.4%, and the service sector had grown, becoming a large part of GDP. The economy did not generate a large amount of savings, despite the fact that the 6% growth during the economic recovery of the 3rd and 4th quarter was largely driven by consumer spending.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_2" +} \ No newline at end of file diff --git a/test/Economy/Consumer_education.json b/test/Economy/Consumer_education.json new file mode 100644 index 0000000000000000000000000000000000000000..f2cfdf9d28cdf1dc7453323f34d71ed1ec2fbc44 --- /dev/null +++ b/test/Economy/Consumer_education.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Consumer education is the preparation of an individual to be capable of making informed decisions when it comes to purchasing products in a consumer culture. It generally covers various consumer goods and services, prices, what the consumer can expect, standard trade practices, etc. While consumer education can help consumers to make more informed decisions, some researchers have found that its effects can drop off over time, suggesting the need for continual education. New dimensions of consumer education are also beginning to emerge as people become more aware of the need for ethical consumerism and sustainable consumer behaviour in our increasingly globalized society.\nConsumer education is an education that can be found in several areas of study in the formal school curriculum and incorporated knowledge from many disciplines, including: economics, game theory, information theory, law, mathematics, and psychology. The goal of teaching the subject is to help people understand in what ways we, as humans, traditionally make oversights in decision-making, so that we can be more self-aware and try to use that information to make more critical and useful decisions. It is especially important in a consumerist society, where many options are available, but rarely ever of equal quality, and where many options take advantage of our biases when we lack complete information, are in need of something urgently (like food while grocery shopping), our preference for familiar and common things, or when we have uneasy feelings. Training for teachers also include instruction regarding different branches of consumerism.Consumer education focuses on both functional skills and rights. These two elements are inseparable in the sense that awareness of several rights leads to functional skills. There are also instances when consumer education is conducted for the purpose of changing consumer perceptions, such as the educational drive to increase consumer confidence in for example e-commerce.\nTraditionally, the subject matter taught in consumer education would be found under the label home economics. Beginning in the late 20th century, however, with the rise of consumerism, the need for an individual to manage a budget, make informed purchases, and save for the future have become paramount. The outcomes of consumer education include not only the improved understanding of consumer goods and services, but also increased awareness of the consumer's rights in the consumer market and better capability to take actions to improve consumer well-being.Subjects included in consumer education also vary from country to country. For instance, in the United Kingdom the focus is on the protection of children from the effects of exploitative consumer society, while in the Philippines the emphasis is more on issues related to the more immediate public interest (e.g., boiling water before drinking it, examining sugar for impurities).\nConsumer education helps families gain information to make cost effective choices in child care. The goal for consumer education for families is to reduce the financial burden to quality child care by reviewing trusted information to become their own advocates. This is done by providing education to parents on the awareness of early education and childcare as well as the financial assistance that may be needed by low income families to attend public or private pre-K facilities. The National Center for Children in Poverty (NCCP) defines consumer education for families as raising awareness on child care that meets the familial demands through a continuum of skills to expand knowledge, increase variety, and an increase in resources that families can use.In multiple countries home economists have contributed in strengthening these programs aimed at women, families, and children. These programs aim to teach women formally and informally education, increase understanding and appreciation of other cultures, improving public health, and improving the process of introducing change.A few professional organizations have facilitated international involvement. Some of these include the International Federation of Home Economics (IFHE), American Home Economics Association now the American Association of Family and Consumer Sciences (AAFCS), and the American Association of State Universities and Land Grant Colleges (AASULGC) now the National Association of State Universities and Land-Grant Colleges (NASULGC).\nEconomists in the United States become more involved outside their country around the twentieth century when mission boards hired graduates to assist in establishing home economics departments in other countries to improve living conditions of the people. In the United States, a few states have set up consumer education programs that aim at educating future populations. Texas Office of Consumer Credit Consumer aims to educate Texans to be financially literate and to make good decisions as a consumer.\nIn Australia, consumer education starts in years 9 and 10 as an elective course during their educational career.\nThe Food and Drug Administration (FDA) is responsible for protecting the public health by assuring the safety, efficacy, and security of human and veterinary drugs, biological products, medical devices, our nation's food supply, cosmetics, and products that emit radiation. The FDA also provides accurate, science-based health information to the public. Making any health claims without the FDA reviewing it first is illegal. This is not the case for structural or functional claims on conventional food.Consumers are becoming increasingly health-conscious and most agree that eating healthy is a better way to prevent illness than using medication. An increased consciousness of eating healthy among consumers has led to more consumers buying functional foods who are marketed with scientifically substantiated claims to improve health and well-being. The American dietetic Association supports the use of health claims that have previously been approved by the Food and Drug Administration (FDA) but stresses the importance of health claims on food being supported by a program of health and nutrition. Multiple sources have to support these claims to make sure there are no unbalanced messages received by the consumer.\nCommon findings from studies on health and nutrition in consumerism were:\nHealth claims on food are seen by consumers as useful, and when a product features a health claim consumers view it as healthier and state, they are more likely to purchase it.\nConsumers are skeptical when companies make the claim of their product having health benefits but strongly agree when the government makes a claim.\nConsumers do not clearly distinguish between nutrition content claims, structure function claims and health claims.\nTo make sure consumers are being influenced by the claims that are made, it is important that consumers are being exposed and pay attention to the claim, that they have an understanding of the claim and that they have a change in their attitude and belief. after that it is important to maintain this behavior change.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_3" +} \ No newline at end of file diff --git a/test/Economy/Data_culture.json b/test/Economy/Data_culture.json new file mode 100644 index 0000000000000000000000000000000000000000..b37cc69fd2c58547dafa230d7a7eb1f1c7108d52 --- /dev/null +++ b/test/Economy/Data_culture.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Data culture is the principle established in the process of social practice in both public and Private sectors which requires all staffs and decision-makers to focus on the information conveyed by the existing data, and make decisions and changes according to these results instead of leading the development of the company based on experience in the particular field. \nThese data might include but are not limited to: general economical or Social Trends in the market, sales volume of products, or even performance of staffs pointing to their efficiency and productivity. Despite the business field, data culture is also applied in the social infrastructure system, such as Urban planning projects, to impact the process of data production and data practices of daily usage, such as Smart City programs.\nIn general, to build data culture, the departments and organizations have to let the data talk itself, and trust the steering of statistics. Being successful as a data-driven entity requires the active participation of all staffs involved in an organization, therefore open access to data is significant in the process.\nThe idea of data culture has been under the spotlight of business field since the beginning of the 21st century, and is gaining popularity in recent years. Although first introduced in a scientific approach, the idea is now associated with both the science field and social sectors.In 2000, Geoffrey C. Bowker conveyed the idea of \"local data culture\" in his academic paper in terms of biodiversity.\nIn 2014, Microsoft made a series of announcements including their intention to build data culture into everyday life through their services including Office 365, Azure and SQL Server.\nIn 2015, Microsoft organized a series of workshops about data culture in alliance with Hortonworks and KPMG UK, offering data analysts and other professional working in the field of Big data an opportunity to understand the data culture of the company and help them build their own data culture in private sectors.\nThe Data Power Conference 2017 was held in Canada at Carleton University, Ottawa, 22:23 June 2017.\nParticipants are both producers of data and people who can contribute to the data culture by making influential changes. In the building process of data culture in a particular entity, employees at different levels are all supposed to obtain the ability of illustrating their works with relative statistics. This includes but is not limited to the goal of their job, the purpose of a specific task, and solutions they could bring up according to problems pointed out by data. Also, participants are allowed to make decisions within the section they take charge of, and experience changes happened due to their innovations.Data analysts serve as an important part in the establishment of a data culture, as they often receive first-hand material and raw data, and the way they connect all the components together can determine the efficiency of communication between ordinary participants and decision-makers. Also, they are responsible for the analysis of information conveyed by the data. Having data scientists in each specific section of a company would be an ideal situation for a data-driven entity, therefore guaranteeing data access whenever needed.Decision-makers are those who apply changes and determine the direction of development in a company. In this case, they would make important decisions according to the trends and information highlighted by the data produced either in their own companies internally or statistics of the target market they want their corporations to aim at. Also, to build a data culture, decision makers have to emphasize their intention of requiring data analyses, therefore driving the motivation of staffs to deal with raw materials.The Microsoft team, under the management of Satya Nadella, depends on data to drive both major market decisions and their daily behaviors. Microsoft focuses on data visualization and Advocates that participants and employees should have the right to access the company's data. The company uses tools such as Power BI to have individual workers get involved and contribute to the future of the company.Capita is a British agency that assists clients in both government departments and enterprises to understand themselves better, using advanced techniques of data analysis. Established in 1984, they advocate their clients to build their own data culture with relative database in their own field of career.Socrata is a US-based company which serves both public sectors and the civil society. They assist companies and organizations reach open data from the federal government to either improve the working progress of the government or assist social groups that are lack of resources. Their core value is tied to open data and they tend to focus on corporations which are in need of funding to process data analysis. The cloud-based service they provide allow government departments to communicate with the public through publishing their official data.Data culture is a German company (datenkultur GmbH) which serves business intelligence products and services. It was founded in 2003 and is active in building company data culture since 2006. The technical services are based on Microsoft products like SQL Server data warehouse and Power BI, but the BI strategic services are not directly connected to a product line. The goal is to help controlling employees or board member to use the existing data more effective and efficient. The necessary tools are based on the business needs and not the other way around.Some companies feel that it is important to keep the data private at the executive level. Although it is possible for all staff in a company to produce and process the data together, it is restricted for data to be free from the approach of participants at the elementary level. Some companies use the idea of Data warehouse, a system that limits access to data. Only people in charge could access the data, and other people requiring access need to go through the assessment of warehouse staff.As long as data bureaucracy is convenient for open access to Databases, the large number of users might slow down the speed of processing in a particular system. Also, it might be difficult for users to search for what they want if the data bureaucracy system is not facilitated with proper tools. In this case, Data Warehouse would be more efficient for users who are not able to perform professionally when they seek for data.A rational method of building or expanding an enterprise is an opposite approach to an empirical one. The decisions of rationalists are often evaluated according to their personal spirit and their existing cognition of the world. In terms of this approach, decision-makers depend on logic rather than social phenomena and phenomena appearing at the front line of an industry to make changes. The fact that decision-making process is not limited to the executive team anymore lead to the hesitation of some people on the management level, therefore they refuse to develop data culture.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_4" +} \ No newline at end of file diff --git a/test/Economy/Economic_consulting.json b/test/Economy/Economic_consulting.json new file mode 100644 index 0000000000000000000000000000000000000000..fd9d3f562161ab70c98cd3268ef6ff7d209d0946 --- /dev/null +++ b/test/Economy/Economic_consulting.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Economic consulting is the practice of providing advanced economic, financial, and statistical analysis for use in litigation, regulatory, and commercial environments. Law firms, state institutions, and other organizations may rely on economic consultants to produce research, analyses, reports, and testimony to be used in trial. Economic consulting also deals with various matters that require data-intensive analyses, such as macroeconomics research, program evaluation, policymaking, and commercial strategies. Economic consultants are typically required to possess knowledge of statistics, econometrics, and computer programming, given the data-oriented nature of economic consulting caseworks. \nEconomic consulting consists of providing economic expertise in a variety of areas, including but not limited to antitrust; valuation; bankruptcy; energy; finance; healthcare; insurance; intellectual property; labor and employment; life sciences; cybersecurity; media and entertainment; and securities. Economic consulting firms often provide the support team when a client hires a law firm or economic expert. The expert—typically a professor or a senior member of an economic consulting firm—will provide economic consulting by, for example, analyzing competitive effects, calculating damages, and testifying to one’s expert opinion before a judge, jury, arbiter, or government enforcement agency.\nEconomic consulting began growing in the United States when, in 1936, the Department of Justice (DOJ) began employing economists to assist with its investigations and litigations of mergers and anti-competitive behavior. Economic consulting firms began providing assistance to the companies being investigated and being sued by government agencies and their economists, and they soon began providing assistance to government agencies as well.By the turn of the 21st century, economic consultancies had gained prominence, and their reports were often part of the court record and the basis for the court’s opinions. In the late 1990s, the DOJ, direct action plaintiffs, and class action plaintiffs sued an international cartel of vitamin manufacturers, accusing them of conspiring to inflate prices in what became the largest price-fixing case in US history at that time. In the class certification phase, the judge’s opinion cited evidence from both plaintiff and defendant economic experts regarding common impact of damages, price trends, and the structure of the vitamins industry. This case was the first successful US prosecution of an international cartel. Within a few years, even the Supreme Court was considering economic consulting work products to decide its cases.\nEconomic consulting services are generally divided into four types of services: conducting research; performing statistical and empirical economic analysis; responding to the opposing expert’s work; and preparing an expert report and supporting the expert during trial. Consultants often begin by conducting research: they review materials provided in discovery, depositions, news articles, industry reports, and economic literature to gain industry knowledge and identify relevant information like the structure of the industry (e.g., competitors, relevant market size, competing products) and available data. This work may occur at the beginning of litigation or in a consulting or pre-litigation phase.Consultants perform empirical analysis, often developing complex regression models to determine factors such as the impact of a proposed merger or price increases due to anticompetitive behavior. Consultants further review the work of the other party in litigation, analyzing the validity of the opposing expert’s economic theory and analysis and often summarizing their expert’s work and opinions in an expert report. Finally, if the case goes to trial, consultants support the expert during trial.\nEconomic consultants are sometimes accused of using “junk science” to help their clients. In a 2016 speech, former Deputy Assistant Attorney General David Gelfand stated that economic consultancies often help him understand the complex economic issues underlying his cases. However, Gelfand also observed that some economic consulting presentations and reports rely on p-hacking (misusing data analysis to find patterns in data that can be presented as statistically significant) or misrepresent the evidence to support their client’s goals.A 2016 ProPublica article noted that economic consulting is a million-dollar industry, with top economic experts billing at over $1,000 an hour. Yet the experts’ reports are often confidential—meaning the public cannot scrutinize them—and their predictions often do not prove true. The article’s authors credit the economic consulting industry with the decline in merger enforcement and the rise in market concentration. Additional scrutiny has occurred when economic consulting firms have been found to be working on both sides of the same case.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_5" +} \ No newline at end of file diff --git a/test/Economy/Economy.json b/test/Economy/Economy.json new file mode 100644 index 0000000000000000000000000000000000000000..7252adac83f46a99ddd59cd957fe3be40d6c1a16 --- /dev/null +++ b/test/Economy/Economy.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "An economy is an area of the production, distribution and trade, as well as consumption of goods and services. In general, it is defined as a social domain that emphasize the practices, discourses, and material expressions associated with the production, use, and management of resources. A given economy is a set of processes that involves its culture, values, education, technological evolution, history, social organization, political structure, legal systems, and natural resources as main factors. These factors give context, content, and set the conditions and parameters in which an economy functions. In other words, the economic domain is a social domain of interrelated human practices and transactions that does not stand alone.\nEconomic agents can be individuals, businesses, organizations, or governments. Economic transactions occur when two groups or parties agree to the value or price of the transacted good or service, commonly expressed in a certain currency. However, monetary transactions only account for a small part of the economic domain.\nEconomic activity is spurred by production which uses natural resources, labor and capital. It has changed over time due to technology, innovation (new products, services, processes, expanding markets, diversification of markets, niche markets, increases revenue functions) and changes in industrial relations (most notably child labor being replaced in some parts of the world with universal access to education).\nThe word economy in English is derived from the Middle French's yconomie, which itself derived from the Medieval Latin's oeconomia. The Latin word has its origin at the Ancient Greek's oikonomia or oikonomos. The word's first part oikos means \"house\", and the second part nemein means \"to manage\".The most frequently used current sense, denoting \"the economic system of a country or an area\", seems not to have developed until the 1650s.\nAs long as someone has been making, supplying and distributing goods or services, there has been some sort of economy; economies grew larger as societies grew and became more complex. Sumer developed a large-scale economy based on commodity money, while the Babylonians and their neighboring city states later developed the earliest system of economics as we think of, in terms of rules/laws on debt, legal contracts and law codes relating to business practices, and private property.The Babylonians and their city state neighbors developed forms of economics comparable to currently used civil society (law) concepts. They developed the first known codified legal and administrative systems, complete with courts, jails, and government records.\nThe ancient economy was based primarily on subsistence farming. The Shekel are the first to refer to a unit of weight and currency, used by the Semitic peoples. The first usage of the term came from Mesopotamia circa 3000 BC. and referred to a specific mass of barley which related other values in a metric such as silver, bronze, copper, etc. A barley/shekel was originally both a unit of currency and a unit of weight, just as the British Pound was originally a unit denominating a one-pound mass of silver.\nMost exchange of goods had occurred through social relationships. There were also traders who bartered in the marketplaces. In Ancient Greece, where the present English word 'economy' originated, many people were bond slaves of the freeholders. The economic discussion was driven by scarcity.\nIn Chinese economic law, the huge cycle of institutional innovation contains an idea. Serving a non-market economy promotes a firm's tenure that is legally guaranteed and protected from bureaucratic opportunities.\nIn the Middle Ages, what is now known as an economy was not far from the subsistence level. Most exchange occurred within social groups. On top of this, the great conquerors raised what we now call venture capital (from ventura, ital.; risk) to finance their captures. The capital should be refunded by the goods they would bring up in the New World. The discoveries of Marco Polo (1254:1324), Christopher Columbus (1451:1506) and Vasco da Gama (1469:1524) led to a first global economy. The first enterprises were trading establishments. In 1513, the first stock exchange was founded in Antwerp. Economy at the time meant primarily trade.The European captures became branches of the European states, the so-called colonies. The rising nation-states Spain, Portugal, France, Great Britain and the Netherlands tried to control the trade through custom duties and mercantilism (from mercator, lat.: merchant) was a first approach to intermediate between private wealth and public interest. The secularization in Europe allowed states to use the immense property of the church for the development of towns. The influence of the nobles decreased. The first Secretaries of State for economy started their work. Bankers like Amschel Mayer Rothschild (1773:1855) started to finance national projects such as wars and infrastructure. Economy from then on meant national economy as a topic for the economic activities of the citizens of a state.\nThe first economist in the true modern meaning of the word was the Scotsman Adam Smith (1723:1790) who was inspired partly by the ideas of physiocracy, a reaction to mercantilism and also later Economics student, Adam Mari. He defined the elements of a national economy: products are offered at a natural price generated by the use of competition - supply and demand - and the division of labor. He maintained that the basic motive for free trade is human self-interest. The so-called self-interest hypothesis became the anthropological basis for economics. Thomas Malthus (1766:1834) transferred the idea of supply and demand to the problem of overpopulation.The Industrial Revolution was a period from the 18th to the 19th century where major changes in agriculture, manufacturing, mining, and transport had a profound effect on the socioeconomic and cultural conditions starting in the United Kingdom, then subsequently spreading throughout Europe, North America, and eventually the world. The onset of the Industrial Revolution marked a major turning point in human history; almost every aspect of daily life was eventually influenced in some way.\nIn Europe wild capitalism started to replace the system of mercantilism (today: protectionism) and led to economic growth. The period is called the Industrial Revolution because the system of production and division of labor enabled the mass production of goods.\nThe contemporary concept of \"the economy\" wasn't popularly known until the American Great Depression in the 1930s.After the chaos of two World Wars and the devastating Great Depression, policymakers searched for new ways of controlling the course of the economy. This was explored and discussed by Friedrich August von Hayek (1899:1992) and Milton Friedman (1912:2006) who pleaded for a global free trade and are supposed to be the fathers of the so-called neoliberalism. However, the prevailing view was that held by John Maynard Keynes (1883:1946), who argued for a stronger control of the markets by the state. The theory that the state can alleviate economic problems and instigate economic growth through state manipulation of aggregate demand is called Keynesianism in his honor. In the late 1950s, the economic growth in America and Europe—often called Wirtschaftswunder (German for economic miracle) —brought up a new form of economy: mass consumption economy. In 1958, John Kenneth Galbraith (1908:2006) was the first to speak of an affluent society in his book The Affluent Society. In most of the countries the economic system is called a social market economy.\nWith the fall of the Iron Curtain and the transition of the countries of the Eastern Bloc towards democratic government and market economies, the idea of the post-industrial society is brought into importance as its role is to mark together the significance that the service sector receives instead of industrialization. Some attribute the first use of this term to Daniel Bell's 1973 book, The Coming of Post-Industrial Society, while others attribute it to social philosopher Ivan Illich's book, Tools for Conviviality. The term is also applied in philosophy to designate the fading of postmodernism in the late 90s and especially in the beginning of the 21st century.With the spread of Internet as a mass media and communication medium especially after 2000:2001, the idea for the Internet and information economy is given place because of the growing importance of e-commerce and electronic businesses, also the term for a global information society as understanding of a new type of \"all-connected\" society is created. In the late 2000s, the new type of economies and economic expansions of countries like China, Brazil, and India bring attention and interest to economies different from the usually dominating Western-type economies and economic models.\nA market economy is one where goods and services are produced and exchanged according to demand and supply between participants (economic agents) by barter or a medium of exchange with a credit or debit value accepted within the network, such as a unit of currency. A planned economy is one where political agents directly control what is produced and how it is sold and distributed. A green economy is low-carbon and resource efficient. In a green economy, growth in income and employment is driven by public and private investments that reduce carbon emissions and pollution, enhance energy and resource efficiency, and prevent the loss of biodiversity and ecosystem services. A gig economy is one in which short-term jobs are assigned or chosen on-demand. The global economy refers to humanity's economic system or systems overall. An informal economy is neither taxed nor monitored by any form of government.The economy may be considered as having developed through the following phases or degrees of precedence:The ancient economy was mainly based on subsistence farming.\nThe Industrial Revolution phase lessened the role of subsistence farming, converting it to more extensive and mono-cultural forms of agriculture in the last three centuries. The economic growth took place mostly in mining, construction and manufacturing industries. Commerce became more significant due to the need for improved exchange and distribution of produce throughout the community.\nIn the economies of modern consumer societies phase there is a growing part played by services, finance, and technology—the knowledge economy.\nIn modern economies, these phase precedences are somewhat differently expressed by the three-sector model:\nPrimary: Involves the extraction and production of raw materials, such as corn, coal, wood and iron.\nSecondary: Involves the transformation of raw or intermediate materials into goods e.g. manufacturing steel into cars, or textiles into clothing.\nTertiary: Involves the provision of services to consumers and businesses, such as baby-sitting, cinema and banking.\nOther sectors of the developed community include:\nthe public sector or state sector (which usually includes: parliament, law-courts and government centers, various emergency services, public health, shelters for impoverished and threatened people, transport facilities, air/sea ports, post-natal care, hospitals, schools, libraries, museums, preserved historical buildings, parks/gardens, nature-reserves, some universities, national sports grounds/stadiums, national arts/concert-halls or theaters and centers for various religions).\nthe private sector or privately run businesses.\nthe voluntary sector or social sector.\nThe gross domestic product (GDP) of a country is a measure of the size of its economy, or more specifically, monetary measure of the market value of all the final goods and services produced. The most conventional economic analysis of a country relies heavily on economic indicators like the GDP and GDP per capita. While often useful, GDP only includes economic activity for which money is exchanged.Due to the growing importance of the financial sector in modern times, the term real economy is used by analysts as well as politicians to denote the part of the economy that is concerned with the actual production of goods and services, as ostensibly contrasted with the paper economy, or the financial side of the economy, which is concerned with buying and selling on the financial markets. Alternate and long-standing terminology distinguishes measures of an economy expressed in real values (adjusted for inflation), such as real GDP, or in nominal values (unadjusted for inflation).\nThe study of economics are roughly divided into macroeconomics and microeconomics. Today, the range of fields of study examining the economy revolves around the social science of economics, but may also include sociology, history, anthropology, and geography. Practical fields directly related to the human activities involving production, distribution, exchange, and consumption of goods and services as a whole are business, engineering, government, and health care. Macroeconomics is studied at the regional and national levels, and common analyses include income and production, money, prices, employment, international trade, and other issues.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_6" +} \ No newline at end of file diff --git a/test/Economy/Law_of_supply.json b/test/Economy/Law_of_supply.json new file mode 100644 index 0000000000000000000000000000000000000000..a8ba723caa5cf36634a44a74e20d687f7189c39c --- /dev/null +++ b/test/Economy/Law_of_supply.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "The law of supply is a fundamental principle of economic theory which states that, keeping other factors constant, an increase in sales price results in an increase in quantity supplied. In other words, there is a direct relationship between price and quantity: quantities respond in the same direction as price changes. This means that producers and manufacturers are willing to offer more of a product for sale on the market at higher prices, as increasing production is a way of increasing profits.\nIn short, the law of supply is a positive relationship between quantity supplied and price, and is the reason for the upward slope of the supply curve.\nSome heterodox economists, such as Steve Keen and Dirk Ehnts, dispute the law of supply, arguing that the supply curve for mass-produced goods is often downward-sloping: as production increases, unit prices go down, and conversely, if demand is very low, unit prices go up.\nA supply is a good or service that producers are willing to provide. The law of supply determines the quantity of supply at a given price.The law of supply and demand states that, for a given product, if the quantity demanded exceeds the quantity supplied, then the price increases, which decreases the demand (law of demand) and increases the supply (law of supply)—and vice versa—until the quantity supplied equals the quantity demanded.\nFor example, a job paying £20/hr attracts more interest than a job paying £15/hr, and a high interest rate attracts lenders and deters borrowers.\nThere are various non-price determinants that can cause a shift in a supply curve. For example, if the costs of production, such as wages, decrease, then the manufacturers can produce more goods for the same price, so the quantity supplied will increase. If the number of suppliers increases, or if the capacity of a factory producing the goods increases, the quantity supplied will increase.Other factors can include government policy—government subsidies to encourage certain products decreases the overall cost of production. However, government taxation can cause the cost of production to rise. For some products, such as in agriculture, the quantity supplied is dependent on the weather.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_7" +} \ No newline at end of file diff --git a/test/Economy/Necrocapitalism.json b/test/Economy/Necrocapitalism.json new file mode 100644 index 0000000000000000000000000000000000000000..1f1e43c68072e61254fff24542384d903ac9003c --- /dev/null +++ b/test/Economy/Necrocapitalism.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Necrocapitalism is a socioeconomical concept introduced in the mid-2000s and formalized by Subhabrata Bobby Banerjee from City, University of London, in a 2008 publication of the same name. It is defined as a contemporary form of organizational accumulation that involves dispossession and the subjugation of life to the power of death.\nA form of capitalism where a country’s trade and industry are founded on, linked to and dependent directly or indirectly on death and the profits accruing from it.In her article Unveiling the Necrocapitalist Dimensions of the Shadow Carceral State: On Pay-to-Stay to Recoup the Cost of Incarceration, Brittany Friedman, demonstrates how necrocapitalism is an increasing vector of civil and administrative pipelines to incarceration, civil financial alternatives to criminal sanctions, and innovations to generate criminal justice revenue.\nIn his review about Monsanto: a photographic investigation by photographer by Mathieu Asselin, Dr. Thom Davies describes Monsanto's behavior, that caused ecological, social, and health problems for countless people across the world, as necrocapitalism\nOrr, W., Henne, K., Lee, A., Harb, J.I. and Alphonso, F.C. (2023), Necrocapitalism in the Gig Economy: The Case of Platform Food Couriers in Australia. Antipode, 55.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_8" +} \ No newline at end of file diff --git a/test/Economy/New_economy.json b/test/Economy/New_economy.json new file mode 100644 index 0000000000000000000000000000000000000000..e71f2dd6c72b40b279e5e28c0e8321326a6e5833 --- /dev/null +++ b/test/Economy/New_economy.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "The New Economy refers to the ongoing development of the American economic system. It evolved from the notions of the classical economy via the transition from a manufacturing-based economy to a service-based economy, and has been driven by new technology and innovations. This popular use of the term emerged during the dot-com bubble of the late 1990s, where high growth, low inflation, and high employment of this period led to optimistic predictions and flawed business plans.\nA 1983 cover article in Time, \"The New Economy\", described the transition from heavy industry to a new technology based economy. By 1997, Newsweek was referring to the \"new economy\" in many of its articles.After a nearly 25-year period of unprecedented growth, the United States experienced a much discussed economic slowdown beginning in 1972. However, around 1995, U.S. economic growth accelerated, driven by faster productivity growth. From 1972 to 1995, the growth rate of output per hour, a measure of labor productivity, had only averaged around one-percent per year. But by the mid 1990s, growth became much faster.65 percent from 1995:99. America also experienced increased employment and decreasing inflation. The economist Robert J. Gordon referred to this as a Goldilocks economy—-the result of five positive \"shocks\"—:\"the two traditional shocks (food-energy and imports) and the three new shocks (computers, medical care, and measurement)\".\nOther economists pointed to the ripening benefits of the computer age, being realized after a delay much like that associated with the delayed benefits of electricity shortly after the turn of the twentieth century. Gordon contended in 2000, that the benefits of computers were marginal or even negative for the majority of firms, with their benefits being consolidated in the computer hardware and durable goods manufacturing sectors, which only represent a relatively small segment of the economy. His method relied on applying considerably sized gains in the business cycle to explain aggregate productivity growth.\nAccording to the generally unaccepted Kondratiev wave theory of economy growth, the \"new economy\" is a current Kondratiev wave which will end after a 50-year period in the 2040s. Its innovative basis includes Internet, nanotechnologies, telematics and bionics.\nIn the financial markets, the term has been associated with the Dot-com bubble. This included the emergence of the NASDAQ as a rival to the New York Stock Exchange, a high rate of IPOs, the rise of Dot-com stocks over established firms, and the prevalent use of tools such as stock options. In the wider economy the term has been associated with practices such as outsourcing, business process outsourcing and business process re-engineering.At the same time, there was a lot of investment in companies in the technology sector. Stock shares rose dramatically. A lot of start-ups were created and the stock value was very high where floated. Newspapers and business leaders were starting to talk of new business models. Some even claimed that the old laws of economics did not apply anymore and that new laws had taken their place. They also claimed that improvements in computer hardware and software, would dramatically change the future, and that information is the most important value in the new economy.\nSome, such as Joseph Stiglitz and Blake Belding, have suggested that a lot of investment in information technology, especially in software and unused fibre optics, was useless. However, this may be too harsh a judgment, given that U.S. investment in information technology has remained relatively strong since 2002. While there may have been some overinvestment, productivity research shows that much of the investment has been useful in raising output.\nThe recession of 2001 disproved many of the more extreme predictions made during the boom years, and gave credence to Gordon's minimization of computers' contributions. However, subsequent research strongly suggests that productivity growth has been stimulated by heavy investment in information and communication technology.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_9" +} \ No newline at end of file diff --git a/test/Economy/Primary_sector_of_the_economy.json b/test/Economy/Primary_sector_of_the_economy.json new file mode 100644 index 0000000000000000000000000000000000000000..a8c84e60786e1d3fb5ac8be16df1e4c4aef9c4e3 --- /dev/null +++ b/test/Economy/Primary_sector_of_the_economy.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "The primary sector of the economy includes any industry involved in the extraction and production of raw materials, such as farming, logging, fishing, forestry and mining.\nThe primary sector tends to make up a larger portion of the economy in developing countries than it does in developed countries. For example, in 2018, agriculture, forestry, and fishing comprised more than 15% of GDP in sub-Saharan Africa but less than 1% of GDP in North America.\nIn developed countries the primary sector has become more technologically advanced, enabling for example the mechanization of farming, as compared with lower-tech methods in poorer countries. More developed economies may invest additional capital in primary means of production: for example, in the United States corn belt, combine harvesters pick the corn, and sprayers spray large amounts of insecticides, herbicides and fungicides, producing a higher yield than is possible using less capital-intensive techniques. These technological advances and investment allow the primary sector to employ a smaller workforce, so developed countries tend to have a smaller percentage of their workforce involved in primary activities, instead having a higher percentage involved in the secondary and tertiary sectors.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_10" +} \ No newline at end of file diff --git a/test/Economy/Registered_office.json b/test/Economy/Registered_office.json new file mode 100644 index 0000000000000000000000000000000000000000..e3f3fd02d25d17f77281be00a2feb358865c1f47 --- /dev/null +++ b/test/Economy/Registered_office.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "A registered office is the official address of an incorporated company, association or any other legal entity. Generally it will form part of the public record and is required in most countries where the registered organization or legal entity is incorporated. A registered physical office address is required for incorporated organizations to receive official correspondence and formal notices from government departments, investors, banks, shareholders, and the public.\nIn the United Kingdom, the Companies Act 2006 requires all companies to have a registered office. Documents may be served on companies by delivery to the registered office address as recorded at Companies House. A registered office address is required for incorporated organizations to receive official correspondence and formal notices from government departments, investors, banks, shareholders, and the public.  The registered office address does not have to be where the organization conducts its actual business or trade, and it is not unusual for law firms, accountants or incorporation agents to provide the official registered office address service. Generally, a company's registered name must be visible to the public at its registered office. Companies must include their registered office address on all communications, such as letters, and on its websites. A company's statutory records previously had to be kept at the registered office and available for public inspection; since 1 October 2009, it has been possible for companies to designate a single alternative inspection location (SAIL) as a place to keep their records which must be available for public inspection.  Since June 2016, private companies can elect to keep certain records on the central register which is held and published by Companies House, instead of maintaining their own registers.\nA company must indicate in which of the United Kingdom's three jurisdictions its registered office is to be located: England and Wales, Scotland, or Northern Ireland. Companies incorporated in Wales may elect for their registered office address to be recorded as in Wales rather than in England and Wales. Under regulations implemented in the UK on 1 October 2009, company directors may now also use a registered office address instead of their private home address for contact on the Companies House register. Although their legal registration is in either England and Wales, or in Wales, according to Companies House companies must display the company registered office location in a manner similar to one of the following suggested formats:\n\"On all company's business letters, order forms (in hard copy, electronic or any other form) and its websites, the company must show in legible lettering:\n(a) the part of the United Kingdom in which the company is registered which is:\nFor Companies registered in England and Wales either:\nRegistered in England and Wales; or\nRegistered in England; or\nRegistered in Wales; or\nRegistered in London; or\nRegistered in Cardiff.\"\nIn many other countries, the address with which a company is registered must be where its headquarters or seat is located, and this will often determine the subnational registry at which the company must be registered.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_11" +} \ No newline at end of file diff --git a/test/Economy/Sabbath_economics.json b/test/Economy/Sabbath_economics.json new file mode 100644 index 0000000000000000000000000000000000000000..1a1e861c3a7363ab7cbca2d53c7a0c5c81333cd3 --- /dev/null +++ b/test/Economy/Sabbath_economics.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Sabbath economics is an economic system championed by Christian theologian Ched Myers. The model is an application of the economic aspects of the Biblical Sabbath to modern socioeconomics. In the introduction of his book introducing this model, Myers states that \"God's people are instructed to dismantle, on a regular basis, the fundamental patterns and structures of stratified wealth and power, so that there is 'enough for everyone.' \" This statement contains two of the core principles of Myer's socioeconomic vision:\nThe focus on voluntary redistribution of wealth\nA foundation of abundance as opposed to scarcity in other modern economic models.\nThe Biblical concepts from which Sabbath economics draws are:\nSabbath day, particularly during the journey through the wilderness as described in Exodus 15:17\nSabbath year, described in Exodus 23, where the land was not cultivated, and Israelite slaves were released every seventh year\nYear of Jubilee every 50th year, when all debts were cancelled and all property returned to the original owners\nOthers have since sought to explore the ideas of a Sabbath economy in practical ways. Sabbath economics and related concepts of jubilee economics have also received attention from the liberation theology community, and other Christian thinkers who focus on social justice, gender equality and other humanitarian issues.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_12" +} \ No newline at end of file diff --git a/test/Economy/Silent_trade.json b/test/Economy/Silent_trade.json new file mode 100644 index 0000000000000000000000000000000000000000..ddedd71d5fd7c496a976925cf9e2bc849f411ef8 --- /dev/null +++ b/test/Economy/Silent_trade.json @@ -0,0 +1,52 @@ +{ + "domain": "Economy", + "document": "Silent trade, also called silent barter, dumb barter (\"dumb\" here used in its old meaning of \"mute\"), or depot trade, is a method by which traders who cannot speak each other's language can trade without talking. Group A would leave trade goods in a prominent position and signal, by gong, fire, or drum for example, that they had left goods. Group B would then arrive at the spot, examine the goods and deposit their trade goods or money that they wanted to exchange and withdraw. Group A would then return and either accept the trade by taking the goods from Group B or withdraw again leaving Group B to add to or change out items to create an equal value. The trade ends when Group A accepts Group B's offer and removes the offered goods leaving Group B to remove the original goods.\nThis system was used in many parts of ancient Africa. Silent trading was mainly used during the period 500 to 1500. The practice was also well established between tribes in Africa in their trade with India. Cosmas Indicopleustes describes this practiced in Azania, where officials from Axum traded for gold with beef. Prince Henry the Navigator of Portugal recorded this practice when he occupied Ceuta in 1415.\nIn West Africa gold mined south of the Sahel was traded for salt mined in the desert. The salt from the desert was needed by the people of Sahel to flavor and preserve their food and the gold had obvious value, especially in trading with the European people. Because of this trade, cities grew and flourished and parts of West Africa became commercial centers. West Africa produced large amounts of gold until about 1500 AD. The communication in this gold-for-salt was carried out using drums.\nSilent trade might be used because of an inability to speak the other traders' language, or to protect the secrets of where the valuable gold and salt came from.\nSilent bartering has been used since ancient times, such as the ancient Ghana Empire. The Ghanaian salt traders would leave pounds of salt by the Niger river and the gold traders would leave a fair amount of gold in turn.\nTo perform a silent trade, one group of traders would go to a specific location, leave their trading goods and then withdraw to a distance. Then play a drum to signal the other traders that a silent trade was taking place. The other group of traders would then approach and inspect the goods (most commonly salt or gold). If the goods met with approval, the second group would then take the goods, leave their own goods in return, and depart. This system of trading was used in particular in ancient Ghana. It was also used among the Kushites and the Aksumites.The Greek historian Herodotus wrote about the gold trade with Ghana and Carthage: \"The Carthaginians also tell us that they trade with a race of men who live in a part of Libya beyond the Pillars of Hercules. On reaching this country, they unload their goods, arrange them tidily along the beach, and then, returning to their boats, raise a smoke. Seeing the smoke, the natives come down to the beach, place on the ground a certain quantity of gold in exchange for the goods, and go off again to a distance. The Carthaginians then come ashore and take a look at the gold; and if they think it represents a fair price for their wares, they collect it and go away; if, on the other hand, it seems too little, they go back aboard and wait, and the natives come and add to the gold until they are satisfied. There is perfect honesty on both sides; the Carthaginians never touch the gold until it equals in value what they have offered for sale, and the natives never touch the goods until the gold has been taken away.\"\nW.S.W. Ruschenberger, M.D., in Zanzibar in 1835, describes Banyan merchants, then cites \"Establecimientos ultramarinos. Tomo III. Madrid 1786\" in writing:....A very short time sufficed them to transact the most important business. They usually dealt in bazaars; the vender told the price of his goods in a subdued voice and in few words; the purchaser replied by taking his hand, and by a certain manner of doubling and extending the fingers, explained what abatement he wished in the price. The bargain was often concluded without speaking a word; and, to ratify it, the hand was again taken in token of its inviolability....Such were the Banyans three centuries gone by, and we have reason to think, they have not been entirely changed.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "PresentInWork", + "Creator", + "CitesWork", + "SignificantEvent", + "Uses", + "PhysicallyInteractsWith", + "InterestedIn", + "InspiredBy", + "PracticedBy", + "AppliesToPart", + "HasQuality", + "LocatedIn", + "PartOf", + "Founded", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Economy_13" +} \ No newline at end of file diff --git a/test/Education/Beehive_Design_Collective.json b/test/Education/Beehive_Design_Collective.json new file mode 100644 index 0000000000000000000000000000000000000000..dc7e87654a001f1b460febefb6adabf8d8e7fb76 --- /dev/null +++ b/test/Education/Beehive_Design_Collective.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "The Beehive Design Collective is a volunteer-driven non-profit art collective that uses graphical media as educational tools to communicate stories of resistance to corporate globalization. The purpose of the Machias, Maine-based group is to \"cross-pollinate the grassroots\" by creating collaborative, anti-copyright images that can be used as educational and organizing tools. The most recognizable of these images are large format pen and ink posters, which seek to provide a visual alternative to deconstruction of complicated social and political issues ranging from globalization, free trade, militarism, resource extraction, and biotechnology. \nTheir work has been included in curated exhibitions internationally, including at the Station Museum of Contemporary Art and Manifesta. One of their most well-known works, Mesoamérica Resiste, was a nine-year research project working directly with communities in Central America regarding effects of the Mesoamerica Project, and is typical of their community-engaged style of production.\nThe Collective creates graphic campaigns addressing diverse geo- and socio-political issues. The illustrations are informed and developed through extensive research. The work for the poster began in 2004, and by 2010 the group had distributed over 10,000 posters in the Americas. The most recent campaign in 2012 resulted from travel to Mexico and interviews of a broad spectrum of people. The “Mesoamerica Resiste” poster was used as their aid in this campaign and was unveiled in December 7, 2012 at the Machias Grange Hall. The group adheres to self-imposed rules during their campaign production, including absence of literal human depictions, use of cross-cultural imagery, and avoidance of cultural appropriation. The group bills its pieces as “portable murals,” using them as educational pieces while they travel around the world to do speaking engagements.The current trilogy in progress details globalization in the western hemisphere through a series of three graphics.\nThe Collective's educational work involves storytelling, international lecture circuits using giant reproductions of their posters as storytelling aids. \"Picture lectures\" feature a 30-feet high graphic and a 6-foot-tall (1.8 m) fabric flipbook/storybook. Audiences are led through a two-hour interactive, conversational presentation.One of the Beehive's goals in their graphic distribution is to have 50% of each print run distributed free to communities in the global south, including to groups working on the issues depicted in the prints. The remaining half are distributed internationally for donations. Posters are distributed at a wide range of venues, events, college campuses and academic events.All of the Beehive Collective's materials are distributed as anti-copyright, and their production is encouraged for non-profit, non-commercial use to assist in publications and productions. The black and white imagery is designed to facilitate ease of reproduction. The Beehive distributes free clip-art digital imagery via their website and graphic CD-ROMs distributed from their webstore.\nSince the year 2000, the Collective has been engaged in the restoration of the Machias Valley Grange Hall in Machias, Maine, built in 1904. The restoration labor was sourced from visiting volunteers. The building was initially used as the Collective's center of its stone mosaics program.Annually, the Collective throws a no-cost dress-up dance party of immense proportions called the \"Blackfly Ball\". There are ongoing events such as a weekly Open Mic night and annual Halloween celebration.\nIn 2007, the Machias Valley Grange Hall was placed onto the National Register of Historic Places.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_0" +} \ No newline at end of file diff --git a/test/Education/Campus_climate.json b/test/Education/Campus_climate.json new file mode 100644 index 0000000000000000000000000000000000000000..a8d8c403fad7ca8d583d00757857a5b51b46a182 --- /dev/null +++ b/test/Education/Campus_climate.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "Campus climate refers to current dimensions of climate in the campus community in higher education institutions. According to one definition offered by Jeni Hart and Jennifer Fellabaum, the dimensions of climate could refer to views, attitudes, psychology, behaviors, standards, perceptions and expectations. Campus community could refer to employees such as faculty, staff, administrators, and students, individually or as a group. Campus climate is often contrasted with campus culture. While climate and culture are sometimes used interchangeably, some authors mention overlaps while others define clear boundaries between the two.\nHuston Smith (1955) wrote that the \"atmosphere\" and \"environment\" of a college affects everyone that is a part of it, making an educational institute more than a group of students, employees and buildings. Early attempts at measuring campus climate (culture, atmosphere, environment) include assessments and indexes created by John L. Holland & Alexander Astin (1961), and George G. Stern & C. Robert Pace (1962). More recently, climate has been understood to represent an \"immeasurable construct\". Hart & Fellabaum (2008) studied 118 campus climate papers and identified a number of definitions and measurement efforts.The major features of climate are (1) its primary emphasis on common participant views of a wide array of organizational phenomena that allow for comparison among groups or over time, (2) its focus on current patterns of beliefs and behaviors, and (3) its often ephemeral or malleable character\nThe collective, mutually shaping patterns of institutional history, mission, physical settings, norms, traditions, values, practices, beliefs, and assumptions that guide the behavior of individuals and groups in an institution of higher education which provide a frame of reference for interpreting the meanings of events and actions on and off campus\nThe current attitudes, behaviors, and standards and practices of employees and students of an institution [...] that concern the access for, inclusion of, and level of respect for individual and group needs, abilities, and potential\nClimate is a broad concept however often used in a narrower and more concentrated manner. Conceptual framework for campus climate has developed to include the history of the educational institute, capacity to handle diversity, and psychological and behavioral climate.\nWomen colleges and universities around the world provide a friendly and \"warm\" to \"neutral\" climate. Campus climate at women's colleges for female faculty is more conducive than at coeducational institutions. The climate situation in coeducational settings for female faculty is similar to the situation for female students, say with regard to male privilege. Intellectual inbreeding in China, Japan and Korea is affected by the old boy networks; in this respect women colleges and universities provide opportunities which coeducational institutions do not.A study conducted at Federal University of Bahia observed that a number of campus climate variables affected students in general, and more importantly variables that went on to affect their interaction with their academic life and retention. This includes identity, teaching and faculty interactions.One of the first studies in India which included the aspect of campus climate was conducted in the University of Pune from 2013 onwards. The study found that faculty demographics and student demographics has changed unequally and this has a significant factor of campus climate. The study also revealed changing gender patterns which also have implications for campus climate. Changes in the gender gap include increased access to higher education for women from \"relatively privileged backgrounds\" and males from \"disadvantaged backgrounds\". This kind of changing social dynamic has resulted in observations such as men reporting experiencing more discrimination than women. Low empathy, low tolerance and low argumentation skills were observed.Gunuc & Artun et al. (2019) conducted a campus climate study of 26 universities in Turkey covering all the geographic regions of the country. The study found that the correlation between student engagement and campus climate along with certain other variables was significant.Climate for free speech in US campuses has been studied. More than half of college students self-censor themselves and there is a large variation between institutions with regard to free speech. There is a discussion about cancel culture and wokeness on the left. Campus climate is an important factor that affects decisions to seek out mental health services for mental health issues.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_1" +} \ No newline at end of file diff --git a/test/Education/Classification_of_Instructional_Programs.json b/test/Education/Classification_of_Instructional_Programs.json new file mode 100644 index 0000000000000000000000000000000000000000..80a2eaa834045a6ca0c3c3c58e731dc42893e1a1 --- /dev/null +++ b/test/Education/Classification_of_Instructional_Programs.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "The Classification of Instructional Programs (CIP) is a taxonomy of academic disciplines at institutions of higher education in the United States and Canada.\nThe CIP was originally developed by the National Center for Education Statistics (NCES) of the United States Department of Education in 1980 and was revised in 1985, 1990, 2000, 2010, and 2020. The 2020 edition (CIP 2020) is the fifth and current revision of the taxonomy. Instructional programs are classified by a six-digit CIP at the most granular level and are classified according to the two-digit and four-digit prefixes of the code. For example, \"Forensic Science and Technology\" has the six-digit code 43.0406, which places it in \"Security Science and Technology\" (43.04) and \"Homeland Security, Law Enforcement, Firefighting and Related Protective Services\" (two-digit CIP 43).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_2" +} \ No newline at end of file diff --git a/test/Education/Content_similarity_detection.json b/test/Education/Content_similarity_detection.json new file mode 100644 index 0000000000000000000000000000000000000000..2176372c364ded2d1caa17fd09791c29565dc6ed --- /dev/null +++ b/test/Education/Content_similarity_detection.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "Plagiarism detection or content similarity detection is the process of locating instances of plagiarism or copyright infringement within a work or document. The widespread use of computers and the advent of the Internet have made it easier to plagiarize the work of others.\nDetection of plagiarism can be undertaken in a variety of ways. Human detection is the most traditional form of identifying plagiarism from written work. This can be a lengthy and time-consuming task for the reader and can also result in inconsistencies in how plagiarism is identified within an organization. Text-matching software (TMS), which is also referred to as \"plagiarism detection software\" or \"anti-plagiarism\" software, has become widely available, in the form of both commercially available products as well as open-source software. TMS does not actually detect plagiarism per se, but instead finds specific passages of text in one document that match text in another document.\nComputer-assisted plagiarism detection is an Information retrieval (IR) task supported by specialized IR systems, which is referred to as a plagiarism detection system (PDS) or document similarity detection system. A 2019 systematic literature review presents an overview of state-of-the-art plagiarism detection methods.Systems for text similarity detection implement one of two generic detection approaches, one being external, the other being intrinsic.External detection systems compare a suspicious document with a reference collection, which is a set of documents assumed to be genuine.\nBased on a chosen document model and predefined similarity criteria, the detection task is to retrieve all documents that contain text that is similar to a degree above a chosen threshold to text in the suspicious document.\nIntrinsic PDSes solely analyze the text to be evaluated without performing comparisons to external documents. This approach aims to recognize changes in the unique writing style of an author as an indicator for potential plagiarism. \nPDSes are not capable of reliably identifying plagiarism without human judgment. Similarities and writing style features are computed with the help of predefined document models and might represent false positives.\nA study was conducted to test the effectiveness of similarity detection software in a higher education setting. One part of the study assigned one group of students to write a paper. These students were first educated about plagiarism and informed that their work was to be run through a content similarity detection system. A second group of students was assigned to write a paper without any information about plagiarism. The researchers expected to find lower rates in group one but found roughly the same rates of plagiarism in both groups.The figure below represents a classification of all detection approaches currently in use for computer-assisted content similarity detection. The approaches are characterized by the type of similarity assessment they undertake: global or local. Global similarity assessment approaches use the characteristics taken from larger parts of the text or the document as a whole to compute similarity, while local methods only examine pre-selected text segments as input.Fingerprinting is currently the most widely applied approach to content similarity detection. This method forms representative digests of documents by selecting a set of multiple substrings (n-grams) from them. The sets represent the fingerprints and their elements are called minutiae.A suspicious document is checked for plagiarism by computing its fingerprint and querying minutiae with a precomputed index of fingerprints for all documents of a reference collection. Minutiae matching with those of other documents indicate shared text segments and suggest potential plagiarism if they exceed a chosen similarity threshold. Computational resources and time are limiting factors to fingerprinting, which is why this method typically only compares a subset of minutiae to speed up the computation and allow for checks in very large collection, such as the Internet.\nString matching is a prevalent approach used in computer science. When applied to the problem of plagiarism detection, documents are compared for verbatim text overlaps. Numerous methods have been proposed to tackle this task, of which some have been adapted to external plagiarism detection. Checking a suspicious document in this setting requires the computation and storage of efficiently comparable representations for all documents in the reference collection to compare them pairwise. Generally, suffix document models, such as suffix trees or suffix vectors, have been used for this task. Nonetheless, substring matching remains computationally expensive, which makes it a non-viable solution for checking large collections of documents.Bag of words analysis represents the adoption of vector space retrieval, a traditional IR concept, to the domain of content similarity detection. Documents are represented as one or multiple vectors, e.g. for different document parts, which are used for pair wise similarity computations. Similarity computation may then rely on the traditional cosine similarity measure, or on more sophisticated similarity measures.Citation-based plagiarism detection (CbPD) relies on citation analysis, and is the only approach to plagiarism detection that does not rely on the textual similarity. CbPD examines the citation and reference information in texts to identify similar patterns in the citation sequences. As such, this approach is suitable for scientific texts, or other academic documents that contain citations. Citation analysis to detect plagiarism is a relatively young concept. It has not been adopted by commercial software, but a first prototype of a citation-based plagiarism detection system exists. Similar order and proximity of citations in the examined documents are the main criteria used to compute citation pattern similarities. Citation patterns represent subsequences non-exclusively containing citations shared by the documents compared. Factors, including the absolute number or relative fraction of shared citations in the pattern, as well as the probability that citations co-occur in a document are also considered to quantify the patterns' degree of similarity.Stylometry subsumes statistical methods for quantifying an author's unique writing style and is mainly used for authorship attribution or intrinsic plagiarism detection. Detecting plagiarism by authorship attribution requires checking whether the writing style of the suspicious document, which is written supposedly by a certain author, matches with that of a corpus of documents written by the same author. Intrinsic plagiarism detection, on the other hand, uncovers plagiarism based on internal evidences in the suspicious document without comparing it with other documents. This is performed by constructing and comparing stylometric models for different text segments of the suspicious document, and passages that are stylistically different from others are marked as potentially plagiarized/infringed. Although they are simple to extract, character n-grams are proven to be among the best stylometric features for intrinsic plagiarism detection.More recent approaches to assess content similarity using neural networks have achieved significantly greater accuracy, but come at great computational cost. Traditional neural network approaches embed both pieces of content into semantic vector embeddings to calculate their similarity, which is often their cosine similarity. More advanced methods perform end-to-end prediction of similarity or classifications using the Transformer architecture. Paraphrase detection particularly benefits from highly parameterized pre-trained models.Comparative evaluations of content similarity detection systems indicate that their performance depends on the type of plagiarism present (see figure). Except for citation pattern analysis, all detection approaches rely on textual similarity. It is therefore symptomatic that detection accuracy decreases the more plagiarism cases are obfuscated.Literal copies, a.k.a. copy and paste plagiarism or blatant copyright infringement, or modestly disguised plagiarism cases can be detected with high accuracy by current external PDS if the source is accessible to the software. In particular, substring matching procedures achieve good performance for copy and paste plagiarism, since they commonly use lossless document models, such as suffix trees. The performance of systems using fingerprinting or bag of words analysis in detecting copies depends on the information loss incurred by the document model used. By applying flexible chunking and selection strategies, they are better capable of detecting moderate forms of disguised plagiarism when compared to substring matching procedures.\nIntrinsic plagiarism detection using stylometry can overcome the boundaries of textual similarity to some extent by comparing linguistic similarity. Given that the stylistic differences between plagiarized and original segments are significant and can be identified reliably, stylometry can help in identifying disguised and paraphrased plagiarism. Stylometric comparisons are likely to fail in cases where segments are strongly paraphrased to the point where they more closely resemble the personal writing style of the plagiarist or if a text was compiled by multiple authors. The results of the International Competitions on Plagiarism Detection held in 2009, 2010 and 2011, as well as experiments performed by Stein, indicate that stylometric analysis seems to work reliably only for document lengths of several thousand or tens of thousands of words, which limits the applicability of the method to computer-assisted plagiarism detection settings.\nAn increasing amount of research is performed on methods and systems capable of detecting translated plagiarism. Currently, cross-language plagiarism detection (CLPD) is not viewed as a mature technology and respective systems have not been able to achieve satisfying detection results in practice.\nCitation-based plagiarism detection using citation pattern analysis is capable of identifying stronger paraphrases and translations with higher success rates when compared to other detection approaches, because it is independent of textual characteristics. However, since citation-pattern analysis depends on the availability of sufficient citation information, it is limited to academic texts. It remains inferior to text-based approaches in detecting shorter plagiarized passages, which are typical for cases of copy-and-paste or shake-and-paste plagiarism; the latter refers to mixing slightly altered fragments from different sources.\nThe design of content similarity detection software for use with text documents is characterized by a number of factors:Most large-scale plagiarism detection systems use large, internal databases (in addition to other resources) that grow with each additional document submitted for analysis. However, this feature is considered by some as a violation of student copyright.\nPlagiarism in computer source code is also frequent, and requires different tools than those used for text comparisons in document. Significant research has been dedicated to academic source-code plagiarism.A distinctive aspect of source-code plagiarism is that there are no essay mills, such as can be found in traditional plagiarism. Since most programming assignments expect students to write programs with very specific requirements, it is very difficult to find existing programs that already meet them. Since integrating external code is often harder than writing it from scratch, most plagiarizing students choose to do so from their peers.\nAccording to Roy and Cordy, source-code similarity detection algorithms can be classified as based on either\nStrings : look for exact textual matches of segments, for instance five-word runs. Fast, but can be confused by renaming identifiers.\nTokens : as with strings, but using a lexer to convert the program into tokens first. This discards whitespace, comments, and identifier names, making the system more robust against simple text replacements. Most academic plagiarism detection systems work at this level, using different algorithms to measure the similarity between token sequences.\nParse Trees : build and compare parse trees. This allows higher-level similarities to be detected. For instance, tree comparison can normalize conditional statements, and detect equivalent constructs as similar to each other.\nProgram Dependency Graphs (PDGs) : a PDG captures the actual flow of control in a program, and allows much higher-level equivalences to be located, at a greater expense in complexity and calculation time.\nMetrics : metrics capture 'scores' of code segments according to certain criteria; for instance, \"the number of loops and conditionals\", or \"the number of different variables used\". Metrics are simple to calculate and can be compared quickly, but can also lead to false positives: two fragments with the same scores on a set of metrics may do entirely different things.\nHybrid approaches : for instance, parse trees + suffix trees can combine the detection capability of parse trees with the speed afforded by suffix trees, a type of string-matching data structure.\nThe previous classification was developed for code refactoring, and not for academic plagiarism detection (an important goal of refactoring is to avoid duplicate code, referred to as code clones in the literature). The above approaches are effective against different levels of similarity; low-level similarity refers to identical text, while high-level similarity can be due to similar specifications. In an academic setting, when all students are expected to code to the same specifications, functionally equivalent code (with high-level similarity) is entirely expected, and only low-level similarity is considered as proof of cheating.\nDifference between Plagiarism and Copyright\nPlagiarism and copyright are essential concepts in academic and creative writing that writers, researchers, and students have to understand. Although they may sound similar, they are not; different strategies can be used to address each of them.\nVarious complications have been documented with the use of text-matching software when used for plagiarism detection. One of the more prevalent concerns documented centers on the issue of intellectual property rights. The basic argument is that materials must be added to a database in order for the TMS to effectively determine a match, but adding users' materials to such a database may infringe on their intellectual property rights. The issue has been raised in a number of court cases. An additional complication with the use of TMS is that the software finds only precise matches to other text. It does not pick up poorly paraphrased work, for example, or the practice of plagiarizing by use of sufficient word substitutions to elude detection software, which is known as rogeting. It also cannot evaluate whether the paraphrase genuinely reflects an original understanding or is an attempt to bypass detection. \nAnother complication with TMS is its tendency to flag much more content than necessary, including legitimate citations and paraphrasing, making it difficult to find real cases of plagiarism. This issue arises because TMS algorithms mainly look at surface-level text similarities without considering the context of the writing. Educators have raised concerns that reliance on TMS may shift focus away from teaching proper citation and writing skills, and may create an oversimplified view of plagiarism that disregards the nuances of student writing. As a result, scholars argue that these false positives can cause fear in students and discourage them from using their authentic voice.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_3" +} \ No newline at end of file diff --git a/test/Education/Field_trip.json b/test/Education/Field_trip.json new file mode 100644 index 0000000000000000000000000000000000000000..64f6ae860a870e80aab548f3860625c1790b6198 --- /dev/null +++ b/test/Education/Field_trip.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "A field trip or excursion is a journey by a group of associated peers, such as coworkers or school students, to a place away from their normal environment for the purpose of education or leisure, either within their country or abroad.\nWhen arranged by a school administration for students, it is also known as school trip in the United Kingdom, Australia, Kenya, New Zealand and Bangladesh, and school tour in Ireland.\nA 2022 study, which used randomized controlled trial data, found that culturally enriching field trips led students to show a greater interest in arts, greater tolerance for people with different views, and boosted their educational outcomes.\nThe purpose of the field trip is usually observation for education, non-experimental research or to provide students with experiences outside their everyday activities, such as going camping with teachers and their classmates. The aim of this research is to observe the subject in its natural state and possibly collect samples. It is seen that more-advantaged children may have already experienced cultural institutions outside of school, and field trips provide common ground between more-advantaged and less-advantaged children to share the same cultural experiences.Field trips often involve three steps: preparation, activities and follow-up activity. Preparation applies to both the students and the teachers. Teachers often take the time to learn about the destination and the subject before the trip. Activities on the field trips often include: lectures, tours, worksheets, videos and demonstrations. Follow-up activities are generally discussions in the classroom once the field trip is completed.\nIn Western culture people first come across this method during school years when classes are taken on school trips to visit a geological or geographical feature of the landscape, for example. Much of the early research into the natural sciences was of this form. Charles Darwin is an important example of someone who has contributed to science through the use of field trips.\nPopular field trip sites include zoos, nature centers, community agencies such as fire stations and hospitals, government agencies, local businesses, amusement parks, science museums and factories. Field trips provide alternative educational opportunities for children and can benefit the community if they include some type of community service. Field trips also let students take a break from their normal routine and experience more hands-on learning. Places like zoos and nature centers often have an interactive display that allows children to touch plants or animals.\nToday, culturally enriching field trips are in decline. Museums across the United States report a steep drop in school tours. For example, the Field Museum in Chicago at one time welcomed more than 300,000 students every year. Recently, the number is below 200,000. Between 2002 and 2007, Cincinnati arts organizations saw a 30 percent decrease in student attendance. A survey by the American Association of School Administrators found that more than half of schools eliminated planned field trips in 2010:11.\nA variation on the field trip is the \"site-based program\" or \"site-school\" model, where a class temporarily relocates to a non-school location for an entire week to take advantage of the resources on the site. As with a multi-day field trip, appropriate overnight camping or lodging arrangements are often made to accommodate the experience. The approach was first developed at the Calgary Zoo in Alberta, Canada in 1993, and \"Zoo School\" was inaugurated in 1994. The Calgary Board of Education then approached the Glenbow Museum and Archives to create a \"Museum School\" in 1995 followed by the Calgary Science Centre (1996), the University of Calgary (1996), Canada Olympic Park (1997), the Inglewood Bird Sanctuary (1998), Calgary City Hall (2000), Cross Conservation Area (2000), the Calgary Stampede (2002), the Calgary Aero-Space Museum (2005), and the Fire Training Academy (2008). One of the newer schools in Calgary is Tinker School and Social Enterprise School as STEM Learning Lab (2018) The model spread across Alberta (with 15 sites in Edmonton alone), throughout Canada and in the United States. Global coordination of the model is through the \"Beyond the Classroom Network\".In Europe, School Trip, a 2002 German-Polish film, describes the German students' trip to Poland during the summer.In Japan, in addition to the one-day field trip, the school trip, called shūgaku ryokō (Japanese: 修学旅行, literally \"learning journey\"), has a history since 1886, and is now part of the middle school and high school curriculum, with all students participating in such a program. The trip is usually longer than several days, such as a week or several weeks long. The typical locations visited within Japan are regions of national or historical significance, such as ancient capitals of Kyoto and Nara, Nagasaki, for its experience with nuclear weapons and historical significance as the sole international port during the country's 17th:19th century isolationist foreign policy Japanese: 鎖国, romanized: sakoku (さこく) and Nikkō 日光, popular onsen spa town renowned for its beauty. Travelling abroad is occasionally chosen as an option by some schools.In other Asian regions/countries such as South Korea, Taiwan and Singapore, the school trip, when arranged, tends to become a voluntary part of the school curriculum. When Japan was selected, the Japanese government waived the entry visa.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_4" +} \ No newline at end of file diff --git a/test/Education/Further_and_Higher_Education_Act_1992.json b/test/Education/Further_and_Higher_Education_Act_1992.json new file mode 100644 index 0000000000000000000000000000000000000000..df1f0d40d23a99666d30429f4a13f8df4105afde --- /dev/null +++ b/test/Education/Further_and_Higher_Education_Act_1992.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "The Further and Higher Education Act 1992 made changes in the funding and administration of further education and higher education within England and Wales, with consequential effects on associated matters in Scotland which had previously been governed by the same legislation as England and Wales. It was introduced during the First Major ministry.\nThe most visible result was to allow thirty-five polytechnics to become universities (often referred to as the \"new universities\" or \"post-1992 universities\"). A goal of the act was to end the distinction : known as the \"binary divide\" : between colleges and universities.\nIn addition, the act created bodies to fund higher education in England—HEFCE—and further education—FEFC. Universities in Scotland and Wales which had previously been funded by the UK-wide Universities Funding Council were the subject of other acts that created higher education funding councils in each country. The act also removed colleges of further education from local government control, and created quality assessment arrangements.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_5" +} \ No newline at end of file diff --git a/test/Education/Hospitality_management_studies.json b/test/Education/Hospitality_management_studies.json new file mode 100644 index 0000000000000000000000000000000000000000..0b948d65915cf2eab241a16625dfdc788ba827bd --- /dev/null +++ b/test/Education/Hospitality_management_studies.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "Hospitality Management and Tourism is the study of the hospitality industry. A degree in the subject may be awarded either by a university college dedicated to the studies of hospitality management or a business school with a relevant department. Degrees in hospitality management may also be referred to as hotel management, hotel and tourism management, or hotel administration. Degrees conferred in this academic field include BA, Bachelor of Business Administration, BS, BASc, B.Voc, MS, MBA, Bachelor of Hospitality Management, Master of Management, PhD and short term course. Hospitality management covers hotels, restaurants, cruise ships, amusement parks, destination marketing organizations, convention centers, country clubs and many more.\nIn the US, hospitality and tourism management curricula follow similar core subject applications to that of a business degree, but with a focus on tourism development and hospitality management. Core subject areas include accounting, administration, entrepreneurship, finance, information systems, marketing, human resource management, public relations, strategy, quantitative methods, and sectoral studies in the various areas of hospitality business. Some programs in India also include culinary training.Many schools have departments that specifically give degrees in the hospitality field.The QS World University Rankings by Subject are based upon academic reputation, employer reputation and research impact. These results are reviewed and evaluated every year by academics and industry professionals to ensure consistent quality over time.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_6" +} \ No newline at end of file diff --git a/test/Education/SESI_Mathematics.json b/test/Education/SESI_Mathematics.json new file mode 100644 index 0000000000000000000000000000000000000000..fcfa7e05ffaf5b925f366479ec72f2c80dfc44ee --- /dev/null +++ b/test/Education/SESI_Mathematics.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "SESI Mathematics is a project developed by FIRJAN System with the aim of improving the teaching of math for high school students. The program consists of a series of initiatives, from the organization of training courses for teachers and distribution of educational kits, to the providing of physical spaces for students of SESI Rio and SENAI Rio network, as well as for those from selected state schools. Although the project has the pretension of being expanded to other Brazilian states, nowadays it only operates in the states of Rio de Janeiro and Bahia.\nSESI Mathematics was launched in 2012 by SESI Rio. The program counted on an initial investment of R$ 10 million and was created based on the Lei de Diretrizes e Bases da Educação Nacional (read \"Law of Guidelines and Bases of National Education\"), motivated by the poor performance of Brazil in national and international reviews, as well as in researches that indicated a lack of skilled people to work in areas related to the exact sciences, which require mastery of mathematics.In 2013, an agreement was signed between SESI Bahia and the Government of Bahia State to extend the project to the schools of the state of Bahia. In the same year, the project won the Idea Brasil award in the \"Design Strategy\" category.\nThe project's initiatives make use of online interactive technologies such as educational games as a way to encourage the teaching of students.The games are developed by the English company Mangahigh.\nIn partnership with the Instituto Nacional de Matemática Pura e Aplicada (read \"National Institute for Pure and Applied Mathematics\"), one of the initiatives of the project is the construction of a public space dedicated to temporary and permanent exhibitions of themes related to mathematics, among other activities. The space will be located at Barra da Tijuca (Rio de Janeiro, Brasil) and is scheduled to open in 2015.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_7" +} \ No newline at end of file diff --git a/test/Education/Sophomore.json b/test/Education/Sophomore.json new file mode 100644 index 0000000000000000000000000000000000000000..2e008444d8114e90282e008b64c2ed70b3bd5280 --- /dev/null +++ b/test/Education/Sophomore.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "In the United States, a sophomore ( or ) is a person in the second year at an educational institution; usually at a secondary school or at the college and university level, but also in other forms of post-secondary educational institutions. In high school a sophomore is equivalent to a tenth grade or Class-10 student.\nIn sports, sophomore may also refer to a professional athlete in their second season. In entertainment, television series in their second season may be referred to as sophomore shows, while actors and musicians experiencing their second major success may be referred to as sophomore artists.\nThe 10th grade is the second year of a student's high school period (usually aged 15:16) and is referred to as sophomore year, so in a four year course the stages are freshman, sophomore, junior and senior.In How to Read a Book, the Aristotelean philosopher and founder of the \"Great Books of the Western World\" program Mortimer Adler says, \"There have always been literate ignoramuses, who have read too widely, and not well. The Greeks had a name for such a mixture of learning and folly which might be applied to the bookish but poorly read of all ages. They are all 'sophomores'.\" This oxymoron points at the Greek words σοφός ('wise') and μωρός ('fool').\nHigh-school sophomores are expected to begin preparing for the college application process, including increasing and focusing their extracurricular activities. Students at this level are also considered to be developing greater ability for abstract thinking.\nThe term sophomore is also used to refer to a student in the second year of college or university studies in the United States; typically a college sophomore is 19 to 20 years old. Sophomores generally work on completing general education requirements and might declare their major if they are allowed. College sophomores are also advised to begin thinking of career options and to get involved in volunteering or social organizations on or near campus.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_8" +} \ No newline at end of file diff --git a/test/Education/Validation_of_foreign_studies_and_degrees.json b/test/Education/Validation_of_foreign_studies_and_degrees.json new file mode 100644 index 0000000000000000000000000000000000000000..8031a902138c12e3b7487de7997e04eca261e955 --- /dev/null +++ b/test/Education/Validation_of_foreign_studies_and_degrees.json @@ -0,0 +1,51 @@ +{ + "domain": "Education", + "document": "The Validation or recognition of foreign studies and degrees is the process whereby a competent authority in one country formally recognises the value of a qualification from a foreign country. This can entail total or partial validation of foreign university and non-university studies, degrees and other qualifications. Particularly within Europe, this is covered by a number of international conventions and agreements.\nThe first generation of recognition conventions was developed under the auspices of UNESCO in the 1970s and 1980s, with conventions covering Latin America and the Caribbean (1974), the Mediterranean (1976), the Arab States (1978), Europe (1979), Africa (1981), and Asia and the Pacific (1983). These conventions are specifically concerned with recognition of qualifications rather than equivalence : there is no attempt to build frameworks with automatic equivalence of qualifications. This first generation of conventions has been built on by second generation conventions, starting with Lisbon (1997) covering Europe and now including the Asia-Pacific region (Tokyo, 2011) and Africa (Addis Ababa, 2014). A major change with the more recent conventions is a shift in favour of recognition, with the burden being to show substantial differences.\nThe Lisbon Convention entered into force in 1999, the Tokyo Convention in 2018 and the Addis Ababa Convention in 2019. A new regional convention covering Latin America and the Caribbean was adopted in Buenos Aires in 2019 but has not, as of February 2020, entered into force. The first recognition treaty with a global scope, the Global Convention on the Recognition of Higher Education Qualifications, was adopted by the 40th session of UNESCO's General Conference in November 2019.\nMutual recognition of higher education qualifications is enshrined in the UNESCO/Council of Europe Lisbon Recognition Convention, which covers (as of February 2017) all Council of Europe members except Monaco and Greece, as well as Australia, Belarus, Holy See, Israel, Kazakhstan, Kyrghyz Republic, New Zealand and Tajikistan. The convention has also been signed, but not ratified, by Canada and the United States. Within these countries, qualifications must be recognised as equivalent unless proven otherwise, and assessments must be carried out fairly and within a reasonable time.The convention established the European Network of Information Centres (ENIC), supplementing and expanding the National Academic Recognition Information Centre (NARIC) network established by the European Union in 1984. The ENIC-NARIC network comprises national centres for validation of degrees in member countries.\nThe European Higher Education Area consists (as of February 2017) of 48 national members (who must be signatories of the European Cultural Convention) and the European Union. It aims to promote mutual recognition of academic qualifications through alignment of national qualifications frameworks, via the Bologna Process's short cycle, first cycle (bachelor's degree), second cycle (master's degree) and third cycle (doctoral degree) framework, the European Credit Transfer and Accumulation System, and the use of Diploma Supplements.The European Qualifications Framework (EQF) is an initiative of the European Commission to provide a \"translation\" for national qualifications frameworks at all levels (not just higher education) and so support mobility of workers within the European Union. It originally covered the 28 EU states plus Lichtenstein and Norway, but has been opened to non-EU states, with Australia, New Zealand and Hong Kong currently going through referencing of their national frameworks to the EQF.Mutual recognition of professional qualifications is regulated by European Union Directive 2005/36/EC of the European Parliament and of the Council of 7 September 2005 on the recognition of professional qualifications, modified by Council Directive 2006/100/EC.Procedure:\nThe competent authority of the host Member State shall acknowledge receipt of the application within one month of receipt and inform the applicant of any missing document.\nThe procedure for examining an application for authorisation to practise a regulated profession must be completed as quickly as possible and lead to a duly substantiated decision by the competent authority in the host Member State in any case within three months after the date on which the applicant's complete file was submitted. However, this deadline may be extended by one month in certain cases.\nThe decision, or failure to reach a decision within the deadline, shall be subject to appeal under national law.\nThe Norwegian governmental authority for accreditation of foreign education of Norwegian citizens and foreigners, NOKUT, has sole power in these matters.The total validation of foreign university studies and degrees in the Spanish system consists of a complete recognition of said studies and degrees in that system. The Spanish Ministry of Education and Science is in charge of the procedure.The academic degrees, diplomas or certificates on pharmaceutical or medical specialities which were obtained in a foreign country and which qualify the applicant in order to carry out the relevant professions in those countries can be validated as their official equivalents in the Spanish system.\nThe Ministry of Education and Science is only responsible for the total validation of a foreign university degree for its Spanish equivalent. Any other applications for the partial validation of studies carried out in a foreign country in order to pursue a university study course in Spain must be submitted to the Spanish university itself.\nThe US government does not have a specified agency for recognition and validation of foreign qualifications. Instead, responsibility falls on universities and colleges to determine the equivalence for students they admit, on employers for people they employ and on state licensing board for entry into regulated professions. These bodies may carry out assessment themselves, or contract a private credential evaluation service.Credential evaluation is also important for those seeking an H-1B visa, which requires a bachelor's degree or equivalent, and for some categories of permanent resident. For H-1Bs, but not permanent resident applications, experience can be counted towards equivalence at the rate of three years of experience equals one year of education.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "RegulatedBy", + "DoesNotHavePart", + "Measures", + "LocatedIn", + "Event", + "AdverseEffect", + "HasParts", + "PartOf", + "HasEffect", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Education_9" +} \ No newline at end of file diff --git a/test/Energy/Advanced_thermal_recycling_system.json b/test/Energy/Advanced_thermal_recycling_system.json new file mode 100644 index 0000000000000000000000000000000000000000..5a483881bc5fbd10bb31bda0cde6b17a3b5759b3 --- /dev/null +++ b/test/Energy/Advanced_thermal_recycling_system.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "An advanced thermal recycling system (or an ATR system) is the commercial brand name of the waste-to-energy incineration offering by Klean Power, which has been implemented in a single plant in Germany in 1999. WtE facilities such as the ATR transforms municipal solid waste (MSW) into electricity or steam for district heating or industrial customers. The combustion bottom ash, and the combustion fly ash, along with the air pollution control system fly ash, are treated to produce products that can be beneficially reused. Specifically, ATR systems consist of the following:\nSolid waste combustion, boiler and combustion control system, energy recovery and air pollution control equipment;\nCombustion bottom ash and fly ash treatment systems that produce commercially reusable products; and\nAn optional pre-processing system to recover recyclable materials contained in the MSW delivered to the facility before the MSW enters the thermal processing area of the facility.\nOne commercially operating ATR facility has been built so far. It is the Müllverwertung Rugenberger Damm WtE plant in Hamburg, Germany, commissioned in 1999. The German Green Party has endorsed the specific features of this facility in its \"Concept 2020\" initiative to cease all landfilling of waste by 2020 as an essential part of an integrated waste management system achieving the highest standards in the energy-from-waste industry. No landfilling of unprocessed waste has been allowed in Germany since 2005.Overhead refuse cranes are used to hold approximately five tons of garbage each. The waste is then mixed in the bunker to create a homogeneous mixture to ensure that the bottom ash byproduct has good combustion, and low carbon content. These cranes then deliver the mixed waste into the feeding hopper, which leads down onto stoker grates. These grates control the rate at which the waste travels through the boiler. The heat ignites the trash as it moves along the forward feeding grates until only the byproduct bottom ash remains at the end of the grate. Each combustion line feeds a boiler that operates above 1,560 °F (850 °C) for two seconds. The temperature in the combustion zone is measured through acoustic monitoring. A computer controls the temperature, the grate speed, the amount of air used, and all other aspects of the process that enable complete combustion and minimization of emissions.\nMaintaining the furnace's high temperature is essential to rid the waste and the resulting combustion gases of complex organic compounds such as dioxins and furans. To prevent the reformulation of pollutants, fly ash is separated from the flue gas downstream of the superheaters to reduce the fly ash content, which could act as a catalyst in the critical reformulation temperature range of 600 to 400 °F (316 to 204 °C). At the exit of the boiler, the flue gas is cooled down to a level of 340 °F (171 °C).\nAs the waste is combusted, heat is released in the boiler. This heat produces high-pressure, high-temperature steam, which generates electrical energy when passed through a turbine generator. The electricity is fed into the public power grid or sold directly to a customer. The steam can also be exported directly for use in district heating or industrial processes.\nEach unit has an independent air pollution control system. Flue gas cleaning begins in the boiler, where oxides of nitrogen are reduced by injecting ammonia water into the combustion chamber. Lightly loaded absorbents (activated carbon from the second bag house) are injected into the flue gas downstream of the first bag house to separate any contaminants that have reformed (such as organic compounds), any condensed heavy metals, salts and other gaseous contaminants, as well as residue fly ash.\nThe first baghouse makes it possible to produce reusable by-products such as hydrochloric acid and gypsum from the consecutive air pollution control process steps. Acid gases are removed from the flue gases by passing through a two-stage scrubber to remove acid components, especially halogen compounds such as hydrochloric acid and hydrofluoric acid. A counter-flow neutral scrubber follows, using a lime slurry to remove sulphur oxides. The pollutant gases are either dissolved in water droplets (acids) or bound as calcium salts and thereby removed from the flue gas. A second baghouse acts as a polishing filter to capture any remaining aerosols, organic compounds and heavy metals, which thereby are reduced to levels usually below detection.\nFollowing combustion, the material left consists of the non-combustible components of the waste and the inert materials produced during combustion. This is known as bottom ash. The bottom ash is washed to eliminate soluble salts. Iron scrap and non-ferrous metals such as aluminium, copper and brass are separated and sold in secondary metals markets. The bottom ash is then screened, crushed and sold for use as a construction material.\nGypsum is created when the oxides of sulphur (SO2 and SO3) are separated by the single stage scrubber. It is purified, then sold to the construction industry.\nThe acid scrubbing process in the flue gas treatment system also produces a raw hydrochloric acid at a concentration of 10% to 12%. The acid is distilled (rectified) to yield commercial-grade (30% concentration) hydrochloric acid.\nFly ash, separated in the boiler and baghouses and constituting up to 5% by weight of the combusted MSW, is treated to recover metals and minerals for reuse, resulting in an overall ATR process landfill diversion rate of approximately 98.5%.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_0" +} \ No newline at end of file diff --git a/test/Energy/Anne_Korin.json b/test/Energy/Anne_Korin.json new file mode 100644 index 0000000000000000000000000000000000000000..194d16b5623569bb049a5a29a59c7ffae0567ed1 --- /dev/null +++ b/test/Energy/Anne_Korin.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "Anne Korin is co-director of the Institute for the Analysis of Global Security, a think tank focused on energy and security, and chairs the Set America Free Coalition, an alliance of national security, environmental, labor and religious groups promoting ways to reduce America's dependence on foreign oil. She is co-author of Energy Security Challenges for the 21st Century (2009) and Turning Oil into Salt (2009). She appears in the media frequently and has written articles for Foreign Affairs, MIT Innovations, The American Interest and National Review.\nIn May 2008, Korin testified before the House Committee on Foreign Affairs.\nKorin is adviser to the United States Energy Security Council.\nIn July 2023, Gal Luft, with whom Korin co-authored Turning Oil into Salt, and Energy Security Challenges for the 21st Century, along with several other books and articles, was indicted in the United States for acting as unregistered foreign agent, trafficking in arms, violating U.S. sanctions against Iran, and making false statements to federal Agents. Korin and Luft are co-directors of The Institute for the Analysis of Global Security.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_1" +} \ No newline at end of file diff --git a/test/Energy/Association_for_Decentralised_Energy.json b/test/Energy/Association_for_Decentralised_Energy.json new file mode 100644 index 0000000000000000000000000000000000000000..0db3a60659645a44b6b6d7ab7052614867446f1d --- /dev/null +++ b/test/Energy/Association_for_Decentralised_Energy.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "The Association for Decentralised Energy (ADE), formerly the Combined Heat and Power Association, is an advocate of an integrated approach to delivering energy locally. The ADE was founded in 1967 as the District Heating Association, becoming the Combined Heat and Power Association in 1983, and was then renamed to the Association for Decentralised Energy on 12 January 2015. The ADE has over 100 members.\nThe Association merged with the Association for the Conservation of Energy in 2018.\nThe ADE acts as an advocate for its members by engaging with Government and key decision makers to support cost effective and efficient solutions to industry, businesses and householders by:\nDeveloping a policy which puts the energy user's needs first\nDelivering a local, low carbon energy system at lowest cost\nEnsuring an understanding of heat, which makes up half of our energy use\nTaking an integrated and 'systems thinking' approach\nHelping users manage energy demand to limit the need for new generation capacity\nStrengthening the sector's reputation through industry standards and best practice\nThe Association also provide secretariat for the Independent Heat Customer Protection Scheme.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_2" +} \ No newline at end of file diff --git a/test/Energy/Electric_power_industry.json b/test/Energy/Electric_power_industry.json new file mode 100644 index 0000000000000000000000000000000000000000..c3995b2b5760d46715ca7accb1e4c7e7c14a09c0 --- /dev/null +++ b/test/Energy/Electric_power_industry.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "The electric power industry covers the generation, transmission, distribution and sale of electric power to the general public and industry. The commercial distribution of electric power started in 1882 when electricity was produced for electric lighting. In the 1880s and 1890s, growing economic and safety concerns lead to the regulation of the industry. What was once an expensive novelty limited to the most densely populated areas, reliable and economical electric power has become an essential aspect for normal operation of all elements of developed economies.\nBy the middle of the 20th century, electricity was seen as a \"natural monopoly\", only efficient if a restricted number of organizations participated in the market; in some areas, vertically-integrated companies provide all stages from generation to retail, and only governmental supervision regulated the rate of return and cost structure.\nSince the 1990s, many regions have broken up the generation and distribution of electric power. While such markets can be abusively manipulated with consequent adverse price and reliability impact to consumers, generally competitive production of electrical energy leads to worthwhile improvements in efficiency. However, transmission and distribution are harder problems since returns on investment are not as easy to find.\nAlthough electricity had been known to be produced as a result of the chemical reactions that take place in an electrolytic cell since Alessandro Volta developed the voltaic pile in 1800, its production by this means was, and still is, expensive. In 1831, Michael Faraday devised a machine that generated electricity from rotary motion, but it took almost 50 years for the technology to reach a commercially viable stage. In 1878, in the United States, Thomas Edison developed and sold a commercially viable replacement for gas lighting and heating using locally generated and distributed direct current electricity.Robert Hammond, in December 1881, demonstrated the new electric light in the Sussex town of Brighton in the UK for a trial period. The ensuing success of this installation enabled Hammond to put this venture on both a commercial and legal footing, as a number of shop owners wanted to use the new electric light. Thus the Hammond Electricity Supply Co. was launched.\nIn early 1882, Edison opened the world's first steam-powered electricity generating station at Holborn Viaduct in London, where he had entered into an agreement with the City Corporation for a period of three months to provide street lighting. In time he had supplied a number of local consumers with electric light. The method of supply was direct current (DC). Whilst the Godalming and the 1882 Holborn Viaduct Scheme closed after a few years the Brighton Scheme continued on, and supply was in 1887 made available for 24 hours per day.\nIt was later on in the year in September 1882 that Edison opened the Pearl Street Power Station in New York City and again it was a DC supply. It was for this reason that the generation was close to or on the consumer's premises as Edison had no means of voltage conversion. The voltage chosen for any electrical system is a compromise. For a given amount of power transmitted, increasing the voltage reduces the current and therefore reduces the required wire thickness. Unfortunately it also increases the danger from direct contact and increases the required insulation thickness. Furthermore, some load types were difficult or impossible to make work with higher voltages. The overall effect was that Edison's system required power stations to be within a mile of the consumers. While this could work in city centres, it would be unable to economically supply suburbs with power.\nThe mid to late 1880s saw the introduction of alternating current (AC) systems in Europe and the U.S. AC power had an advantage in that transformers, installed at power stations, could be used to raise the voltage from the generators, and transformers at local substations could reduce voltage to supply loads. Increasing the voltage reduced the current in the transmission and distribution lines and hence the size of conductors and distribution losses. This made it more economical to distribute power over long distances. Generators (such as hydroelectric sites) could be located far from the loads. AC and DC competed for a while, during a period called the war of the currents. The DC system was able to claim slightly greater safety, but this difference was not great enough to overwhelm the enormous technical and economic advantages of alternating current which eventually won out.\nThe AC power system used today developed rapidly, backed by industrialists such as George Westinghouse with Mikhail Dolivo-Dobrovolsky, Galileo Ferraris, Sebastian Ziani de Ferranti, Lucien Gaulard, John Dixon Gibbs, Carl Wilhelm Siemens, William Stanley Jr., Nikola Tesla, and others contributed to this field.\nPower electronics is the application of solid-state electronics to the control and conversion of electric power. Power electronics started with the development of the mercury arc rectifier in 1902, used to convert AC into DC. From the 1920s on, research continued on applying thyratrons and grid-controlled mercury arc valves to power transmission. Grading electrodes made them suitable for high voltage direct current (HVDC) power transmission. In 1933, selenium rectifiers were invented. Transistor technology dates back to 1947, with the invention of the point-contact transistor, which was followed by the bipolar junction transistor (BJT) in 1948. By the 1950s, higher power semiconductor diodes became available and started replacing vacuum tubes. In 1956, the silicon controlled rectifier (SCR) was introduced, increasing the range of power electronic applications.\nA breakthrough in power electronics came with the invention of the MOSFET (metal-oxide-semiconductor field-effect transistor) in 1959. Generations of MOSFETs enabled power designers to achieve performance and density levels not possible with bipolar transistors. In 1969, Hitachi introduced the first vertical power MOSFET, which would later be known as the VMOS (V-groove MOSFET). The power MOSFET has since become the most common power device in the world, due to its low gate drive power, fast switching speed, easy advanced paralleling capability, wide bandwidth, ruggedness, easy drive, simple biasing, ease of application, and ease of repair.\nWhile HVDC is increasingly being used to transmit large quantities of electricity over long distances or to connect adjacent asynchronous power systems, the bulk of electricity generation, transmission, distribution and retailing takes place using alternating current.\nThe electric power industry is commonly split up into four processes. These are electricity generation such as a power station, electric power transmission, electricity distribution and electricity retailing. In many countries, electric power companies own the whole infrastructure from generating stations to transmission and distribution infrastructure. For this reason, electric power is viewed as a natural monopoly. The industry is generally heavily regulated, often with price controls and is frequently government-owned and operated. However, the modern trend has been growing deregulation in at least the latter two processes.The nature and state of market reform of the electricity market often determines whether electric companies are able to be involved in just some of these processes without having to own the entire infrastructure, or citizens choose which components of infrastructure to patronise. In countries where electricity provision is deregulated, end-users of electricity may opt for more costly green electricity.\nGeneration is the conversion of some primary energy source into electric power suitable for commercial use on an electrical grid. Most commercial electric power is produced by rotating electrical machines, \"generators\", which move conductors through a magnetic field to produce electric current. The generator is rotated by some other prime mover machine; in typical grid-connected generators this is a steam turbine, a gas turbine, or a hydraulic turbine. Primary energy sources for these machine are often fossil fuels (coal, oil, natural gas), nuclear fission, geothermal steam, or falling water. Renewable sources such as wind and solar energy are increasingly of commercial importance.Since electrical generation must be closely matched with electrical consumption, enough generation capacity must be installed to meet peak demands. At the same time, primary energy sources must be selected to minimize the cost of produced electrical energy. Generally the lowest-incremental-cost source of electrical energy will be the next unit connected to meet rising demand. Electrical generators have automatic controls to regulate the power fed into the electrical transmission system, adjusting generator output moment by moment to balance with electrical demand. For a large grid with scores or hundreds of generators connected and thousands of loads, management of stable generator supply is a problem with significant challenges, to meet economic, environmental and reliability requirements. For example, low-incremental-cost generation sources such as nuclear power plants may be run continually to meet the average \"base load\" of the connected system, whereas more costly peaking power plants such as natural gas turbines may be run for brief times during the day to meet peak loads. Alternatively, load management strategies may encourage more even demand for electrical power and reduce costly peaks. Designated generator units for a particular electrical grid may be run at partial output only, to provide \"spinning reserve\" for sudden increases in demand or faults with other generating units.\nIn addition to electrical power production, electrical generation units may provide other ancillary services to the electrical grid, such as frequency control, reactive power, and black start of a collapsed power grid. These ancillary services may be commercially valuable when the generation, transmission, and distribution electrical companies are separate commercial entities.\nElectric power transmission is the bulk movement of electrical energy from a generating site, such as a power plant, to an electrical substation. The interconnected lines which facilitate this movement are known as a transmission network. This is distinct from the local wiring between high-voltage substations and customers, which is typically referred to as electric power distribution. The combined transmission and distribution network is known as the \"power grid\" in North America, or just \"the grid\". In the United Kingdom, India, Malaysia and New Zealand, the network is known as the National Grid.A wide area synchronous grid, also known as an \"interconnection\" in North America, directly connects many generators delivering AC power with the same relative frequency numerous consumers. For example, there are four major interconnections in North America (the Western Interconnection, the Eastern Interconnection, the Quebec Interconnection and the Electric Reliability Council of Texas (ERCOT) grid). In Europe one large grid connects most of continental Europe.\nHistorically, transmission and distribution lines were owned by the same company, but starting in the 1990s, many countries have liberalized the regulation of the electricity market in ways that have led to the separation of the electricity transmission business from the distribution business.\nElectric power distribution is the final stage in the delivery of electric power; it carries electricity from the transmission system to individual consumers. Distribution substations connect to the transmission system and lower the transmission voltage to medium voltage ranging between 2 kV and 35 kV with the use of transformers. Primary distribution lines carry this medium voltage power to distribution transformers located near the customer's premises. Distribution transformers again lower the voltage to the utilization voltage used by lighting, industrial equipment or household appliances. Often several customers are supplied from one transformer through secondary distribution lines. Commercial and residential customers are connected to the secondary distribution lines through service drops. Customers demanding a much larger amount of power may be connected directly to the primary distribution level or the subtransmission level.Electricity retailing is the final sale of electricity from generation to the end-use consumer.The organization of the electrical sector of a country or region varies depending on the economic system of the country. In some places, all electric power generation, transmission and distribution is provided by a government controlled organization. Other regions have private or investor-owned utility companies, city or municipally owned companies, cooperative companies owned by their own customers, or combinations. Generation, transmission and distribution may be offered by a single company, or different organizations may provide each of these portions of the system.Not everyone has access to grid electricity. About 840 million people (mostly in Africa) had no access in 2017, down from 1.2 billion in 2010.\nThe business model behind the electric utility has changed over the years playing a vital role in shaping the electricity industry into what it is today; from generation, transmission, distribution, to the final local retailing. This has occurred prominently since the reform of the electricity supply industry in England and Wales in 1990.In 1996 : 1999 the Federal Energy Regulatory Commission (FERC) made a series of decisions which were intended to open the U.S. wholesale power market to new players, with the hope that spurring competition would save consumers $4 to $5 billion per year and encourage technical innovation in the industry. Steps were taken to give all market participants open access to existing interstate transmission lines. Order No. 888 ordered vertically integrated electric utilities to functionally separate their transmission, power generation and marketing businesses to prevent self-dealing.\nOrder No. 889 set up a system to provide all participants with timely access to information about available transmission capacity and prices.\nThe FERC also endorsed the concept of appointing independent system operators (ISOs) to manage the electric power grid : a function that was traditionally the responsibility of vertically integrated electric utility companies. The concept of an independent system operator evolved into that of regional transmission organizations (RTOs). FERC's intention was that all U.S. companies owning interstate electric transmission lines would place those facilities under the control of an RTO. In its Order No. 2000 (Regional Transmission Organizations), issued in 1999, FERC specified the minimum capabilities that an RTO should possess.\nThese decisions, which were intended to create a fully interconnected grid and an integrated national power market, resulted in the restructuring of the U.S. electricity industry. That process was soon dealt two setbacks: the California energy crisis of 2000, and the Enron scandal and collapse. Although industry restructuring proceeded, these events made clear that competitive markets could be manipulated and thus must be properly designed and monitored. Furthermore, the Northeast blackout of 2003 highlighted the need for a dual focus on competitive pricing and strong reliability standards.\nIn some countries, wholesale electricity markets operate, with generators and retailers trading electricity in a similar manner to shares and currency. As deregulation continues further, utilities are driven to sell their assets as the energy market follows in line with the gas market in use of the futures and spot markets and other financial arrangements. Even globalization with foreign purchases are taking place. One such purchase was when the UK's National Grid, the largest private electric utility in the world, bought several electric utilities in New England for $3.2 billion. Between 1995 and 1997, seven of the 12 Regional Electric Companies (RECs) in England and Wales were bought by U.S. energy companies. Domestically, local electric and gas firms have merged operations as they saw the advantages of joint affiliation, especially with the reduced cost of joint-metering. Technological advances will take place in the competitive wholesale electric markets, such examples already being utilized include fuel cells used in space flight; aeroderivative gas turbines used in jet aircraft; solar engineering and photovoltaic systems; off-shore wind farms; and the communication advances spawned by the digital world, particularly with microprocessing which aids in monitoring and dispatching.Electricity is expected to see growing demand in the future. The Information Revolution is highly reliant on electric power. Other growth areas include emerging new electricity-exclusive technologies, developments in space conditioning, industrial processes, and transportation (for example hybrid vehicles, locomotives).", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_3" +} \ No newline at end of file diff --git a/test/Energy/Energy_management_software.json b/test/Energy/Energy_management_software.json new file mode 100644 index 0000000000000000000000000000000000000000..bf0af63e93748cf3f19748eb40dd4aa95375a424 --- /dev/null +++ b/test/Energy/Energy_management_software.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "Energy Management Software (EMS) is a general term and category referring to a variety of energy-related software applications, which provide energy management including utility bill tracking, real-time energy metering, consumption control (building HVAC and lighting control systems), generation control (solar PV and ESS), building simulation and modeling, carbon and sustainability reporting, IT equipment management, grid services (demand response, virtual power plant, etc), and/or energy audits. Managing energy can require a system of systems approach.\nEnergy management software often provides tools for reducing energy costs and consumption for buildings, communities or industries. EMS collects energy data and uses it for three main purposes: Reporting, Monitoring and Engagement. Reporting may include verification of energy data, benchmarking, and setting high-level energy use reduction targets. Monitoring may include trend analysis and tracking energy consumption to identify cost-saving opportunities. Engagement can mean real-time responses (automated or manual), or the initiation of a dialogue between occupants and building managers to promote energy conservation. One engagement method that has recently gained popularity is the real-time energy consumption display available in web applications or an onsite energy dashboard/display.\nEnergy Management Software collects historic and/or real-time interval data, with intervals varying from quarterly billing statements to minute-by-minute smart meter readings. In addition to energy consumption, an EMS collects data related to variables that impact energy consumption such as number of people in the building, outside temperature, number of produced units, and more. The data are collected from interval meters, Building Automation Systems (BAS), directly from utilities, directly from sensors on electrical circuits, or other sources. Past bills can be used to provide a comparison between pre- and post-EMS energy consumption.Through Energy Data Analytics, EMS assists the users in the composition of mathematical formulas for analyzing, forecasting and tracking energy conservation measures to quantify the success of the measure, once implemented. Energy analytics help energy managers combine across energy and non-energy data to create key performance indicators, calculate carbon footprint, greenhouse gas, renewable heat incentives and energy efficiency certifications to meet local climate change policies, directives, regulation and certifications. Energy analytics also include intelligent algorithms such as classification and machine learning to analyse the energy consumption of buildings and/or its equipment that build up a memory of energy use patterns, learn the good and bad energy consumption behaviours and notify in case of abnormal energy use.Reporting tools are targeted at owners and executives who want to automate energy and emissions auditing. Cost and consumption data from a number of buildings can be aggregated or compared with the software, saving time relative to manual reporting. EMS offers more detailed energy information than utility billing can provide; another advantage is that outside factors affecting energy use, such as weather condition or building occupancy, can be accounted for as part of the reporting process. This information can be used to prioritize energy savings initiatives and balance energy savings against energy-related capital expenditures.Bill verification can be used to compare metered consumption against billed consumption. Bill analysis can also demonstrate the impact of different energy costs, for example by comparing electrical demand charges to consumption costs.\nGreenhouse gas (GHG) accounting can calculate direct or indirect GHG emissions, which may be used for internal reporting or enterprise carbon accounting.\nMonitoring tools track and display real-time and historical data. Often, EMS includes various benchmarking tools, such as energy consumption per square foot, weather normalization or more advanced analysis using energy modelling algorithms to identify anomalous consumption. Seeing exactly when energy is used, combined with anomaly recognition, can allow Facility or Energy Managers to identify savings opportunities.Initiatives such as demand shaving, replacement of malfunctioning equipment, retrofits of inefficient equipment, and removal of unnecessary loads can be discovered and coordinated using the EMS. For example, an unexpected energy spike at a specific time each day may indicate an improperly set or malfunctioning timer. These tools can also be used for Energy Monitoring and Targeting. EMS uses models to correct for variable factors such as weather when performing historical comparisons to verify the effect of conservation and efficiency initiatives.\nEMS may offer alerts, via text or email messages, when consumption values exceed pre-defined thresholds based on consumption or cost. These thresholds may be set at absolute levels, or use an energy model to determine when consumption is abnormally high or low. More recently, smartphones and tablets are becoming mainstream platforms for EMS.\nEngagement can refer to automated or manual responses to collected and analyzed energy data. Building control systems can respond as readily to energy fluctuation as a heating system can respond to temperature variation. Demand spikes can trigger equipment power-down processes, with or without human intervention.Another objective of Engagement is to connect occupants’ daily choices with building energy consumption. By displaying real-time consumption information, occupants see the immediate impact of their actions. The software can be used to promote energy conservation initiatives, offer advice to the occupants, or provide a forum for feedback on sustainability initiatives.\nPeople-driven energy conservation programs, such as those sponsored by Energy Education, can be highly effective in reducing energy use and cost.\nLetting occupants know their real-time consumption alone can be responsible for a 7% reduction in energy consumption.\nMonitoring the flows of energy in building allows the users to directly monitor part of the sustainable goals of companies. Allowing them to affect them indirectly. Thats reason why EMS are becoming tool for Sustainability Managers in corporate sphere. Developing new branch of Sustainability Management System (SMS), that can direct part of EMS.Monitoring the energy flows allow Scope 1 and Scope 2 emissions to be calculated based on EMS data.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_4" +} \ No newline at end of file diff --git a/test/Energy/ExxonMobil_Beaumont_Refinery.json b/test/Energy/ExxonMobil_Beaumont_Refinery.json new file mode 100644 index 0000000000000000000000000000000000000000..8e2c9ad0248b93f8d11efb84943daf08423d1810 --- /dev/null +++ b/test/Energy/ExxonMobil_Beaumont_Refinery.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "The ExxonMobil Refinery in Beaumont, Texas was built along the banks of the Neches River in 1903. The refinery is currently one of the largest in the world with a nameplate capacity of 634,000 bpd. The plant is also highly integrated with petrochemicals production and lubricants and is a critical part of the Texas-Louisiana gulf coast energy infrastructure. The site encompasses more than 2,700 acres and is staffed by 2,000 employees daily plus another 3,000 contractors to support maintenance and construction activities.\nIn 1903, construction started on the Burt Refining Company to capitalize on the prolific Spindletop field located just south of Beaumont. Little was known of Burt Refining's origins other than George A. Burts was the owner and was rumored to have been an agent of John D. Rockefeller. In 1909, the State of Texas seized the refinery as an illegal affiliate of Standard Oil and sold in an auction to Magnolia Petroleum Co. The refinery became Texas's third largest by 1920 under Magnolia as the company expanded throughout the region. As Magnolia Petroleum Company expanded its influence in the southwestern United States, Standard Oil Company of New York (SOCONY Mobil) began acquiring shares in the company. In December 1925, all Magnolia stock was exchanged for Standard Oil of New York shares, and the Texas assets were subsequently transferred to Magnolia Petroleum Company. The Magnolia Refinery played a key role during World War II as it stepped up production and shipped oil globally. By 1959, the operations of the Magnolia Oil Company had been merged entirely into SOCONY Mobil. The refinery further in the ensuing decades to becomes Beaumont's largest employer and eventually Mobil's largest refinery by 1980. In 1999, Exxon and Mobil merged to form the largest oil company in the world and the Beaumont Refinery became one of the 5 largest refineries in the combined company's portfolio. Following a $2 billion major capital investment program twenty five years later, including a new 250,000 bpd crude unit, Beaumont became the third largest oil refinery in North America and the largest of any of ExxonMobil's plants.According to ExxonMobil's filings with the US DOE's Energy Information Agency, the unit capacities for the Beaumont Refinery are presented below: The refinery has a Nelson complexity index of 9.0, making it moderately complex.\nThe refinery has three crude trains. The smallest is CDU A110,000 bpd. The second crude unit is CDU B 274,000 bpd. The newest CDU C was designed for lighter crude oils produced by shale crudes and light tight oils and is of 250,000 bpd of capacity.\nStarting in 2019, the refinery underwent a major expansion with a 65% increase in its nameplate capacity as part of a $2 billion program. KBR was contracted to lead the work with a scope that covered offsite facilities and interconnecting units within the expansion This followed ExxonMobil's earlier contract with TechnipFMC PLC for EPC services on four new units, including an atmospheric pipe still, hydrotreater units, and a benzene recovery system.\nThe refinery has a large lubricants plant located on 27 acres within the refinery. The lubes plant produces 160 million gallons of lubricants across 275 product types and employs 175 employees and 163 contractors.\nThe refinery has three power plants that are integrated to provide steam and thermal heating to the refinery, in addition to selling electricity to the grid. These are:The refinery is also integrated with a large ExxonMobil petrochemical facility that is collocated on the same plot. Total ethylene cracking capacity for the site is currently 816,000 tons per year according to the Oil & Gas Journal Survey of Steam Crackers.As a major emitting facility, the ExxonMobil Beaumont Refinery and Petrochemical Site must report its complete greenhouse gas emissions to the EPA every year subject to the EPA's Greenhouse Gas Reporting Program. The Baytown site's Refinery Facility ID is 110041990913 and the Chemical Plant's is 110000464131.Statutory reporting data is in the table below:\nThe refinery is represented by USW Local 13-243. Labor relations have been contentious at times The U.S. National Labor Relations Board (NLRB) determined that ExxonMobil's 10-month lockout of over 600 workers at the refinery and lube plant was an unlawful attempt to remove the United Steelworkers union as the workers' representative. The NLRB asked an administrative law judge to issue remedies, including back pay, potentially costing Exxon tens of millions. The lockout, which lasted from May 2021 to March 2022, continued while replacements were hired. The NLRB found that Exxon's actions, including messages to workers offering job reinstatement if they voted to decertify the union, undermined federal employee rights. Despite the company's efforts, workers voted to retain USW local 13:243 as their representative.On April 17, 2013, an explosion and fire at ExxonMobil's Beaumont, Texas refinery injured at least 12 people and killed two. The incident was caused by a hydrotreater heat exchanger, releasing hydrocarbons that ignited. Following the event, multiple negligence-based personal injury lawsuits were filed. ExxonMobil attributed the fire to the actions of Clean Harbors, a subcontractor responsible for cleaning operations. ExxonMobil was fined $616,000 by the U.S. Department of Justice and the Environmental Protection Agency for the fire. After a trial, a jury awarded damages to the families of the workers who died of $44 million.In 2016, a 37-year old contract worker named Migual Barron was killed during a turnaround at the refinery when struck by a heat exchanger on the 110,000 bpd crude unit.\nIn 2017, a female contractor named Yesenia Espinoza was killed on while working on the same crude unit when a pipe fell and landed on her. After the accident, a judge issued a temporary restraining order to cease work on the crude unit until an investigation could be completed. The family of Espinoza sued ExxonMobil for medical, burial, funeral expenses plus damages.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_5" +} \ No newline at end of file diff --git a/test/Energy/Maksim_Sonin.json b/test/Energy/Maksim_Sonin.json new file mode 100644 index 0000000000000000000000000000000000000000..faf38cb98a92da03cd1e947a72406d15caf7a798 --- /dev/null +++ b/test/Energy/Maksim_Sonin.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "Maksim Sonin (born May 1986) is a thought leader in the energy industry. He is known for his work on humanitarian and global sustainability concerns.\nMaksim Sonin has held executive roles and served on the Boards of UCC, Silleno, KMG Petrochem, and other organizations. This includes contributing to the development of the large-scale industrial plants for producing ammonia and fertilizers, designed for high capacity and efficiency, supporting efforts toward a cost-effective and environmentally sustainable transition to a low-carbon economy.Maksim is a regular speaker at various energy-related international events including World Hydrogen by S&P Global, Reuters, the Ammonia Symposium by Stanford, Global Clean Hydrogen, and other prominent global venues. He is also frequently cited in leading publications and outlets, including Nikkei Business Publications, International Business Times, Inc, Forbes, Power etc.\nMaksim holds an MS in Management from Stanford Graduate School of Business as a Sloan Fellow, a PhD in Engineering from Scientific Research Institute of Natural Gases and Gas Technologies, and an MS in Finance. He is a member of Stanford University Hydrogen Initiative and Hydrogen Projects Fellow at Stanford University.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_6" +} \ No newline at end of file diff --git a/test/Energy/Planetary_civilization.json b/test/Energy/Planetary_civilization.json new file mode 100644 index 0000000000000000000000000000000000000000..9137373f83c5dd253d09dcfbc298bf9fb7a22e0f --- /dev/null +++ b/test/Energy/Planetary_civilization.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "A planetary civilization or global civilization is a civilization of Type I on the Kardashev scale. This type of civilization is likely to be reliant on renewable energy sources such as stellar power, as well as powerful non-renewable sources such as nuclear fusion. A Type I civilization's energy consumption level is roughly equivalent to the solar insolation on Earth (between 1016 and 1017 watts) : around 3 orders of magnitude higher than that of contemporary humanity (around 2×1013 as of 2020).\nSoviet astronomer Nikolai Kardashev, in his 1964 paper titled \"Transmission of Information by Extraterrestrial Civilizations\", proposed a scale intended to measure the level of technological development of civilizations based on the amount of energy that they are able to utilize, eponymously named the Kardashev scale.A Type I civilization is planetary, consuming all energy that reaches its home planet from its parent star, equivalent to about 1017 watts in the case of Earth.\nCarl Sagan suggested defining intermediate values (not considered in Kardashev's original scale) by interpolating and extrapolating the commonly used values for the energy consumption levels of types I (1016 W), II (1026 W) and III (1036 W). According to Sagan's extended model, modern-day humanity is describable as a Type 0.73 civilization as of 2020.\nTheoretical physicist Michio Kaku, in his book Physics of the Future, published in 2011, stated that, assuming sustained economic growth, humanity may attain planetary civilization status in 100 years.But where is all this technological change leading? Where is the final destination in this long voyage into science and technology?\nThe culmination of all these upheavals is the formation of planetary civilization, what physicists call a Type I civilization. This transition is perhaps the greatest transition in history, marking a sharp departure from all civilizations of the past. Every headline that dominates the news reflects, in some way, the birth pangs of the planetary civilization. Commerce, trade, culture, language, entertainment, leisure activities, and even war are all being revolutionized by the emergence of this planetary civilization.\nMichio Kaku, in his interview \"Will Mankind Destroy Itself?\" for \"Big Think\", discussed one possible danger of the transition to a planetary civilization:So whenever I open the newspaper every headline I see in the newspaper points to the birth pangs of a type one civilization information. However, every time I open the newspaper I also see the opposite trend as well. What is terrorism? Terrorism in some sense is a reaction against the creation of a type one civilization. Now most terrorists cannot articulate this. They don’t even know what the hell I’m talking about, but what they’re reacting to is not modernism. What they’re reacting to is the fact that we’re headed toward a multicultural tolerant scientific society and that is what they don’t want. They don’t want science. They want a theocracy. They don’t want multiculturalism. They want monoculturalism. So instinctively they don’t like the march toward a type one civilization. Now which tendency will win? I don’t know, but I hope that we emerge as a type one civilization.\nMany futuristic civilizations seen in science fiction are planetary civilizations. According to Michio Kaku, a typicalType I civilization would be that of Buck Rogers or Flash Gordon, where an entire planet's energy resources have been developed. They can control all the planetary sources of energy, so they might be able to control or modify weather at will, harness the power of a hurricane, and build cities on oceans. Nonetheless, their energy output is still largely confined to their home planet.\nOn the Kardashev scale, the next status (Type II) is a stellar civilization, a civilization that consumes all the energy that its parent star emits, or about 1027 watts. Michio Kaku suggests in the book \"Physics of the Future\" that humanity may attain stellar civilization status in a few thousand years.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_7" +} \ No newline at end of file diff --git a/test/Energy/Thomas_W._Walde.json b/test/Energy/Thomas_W._Walde.json new file mode 100644 index 0000000000000000000000000000000000000000..9052122e9be3d40d0ee7aad58dded761cb378892 --- /dev/null +++ b/test/Energy/Thomas_W._Walde.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "Thomas W. Wälde (9 January 1949 : 11 October 2008), former United Nations (UN) Inter-regional Adviser on Petroleum and Mineral Legislation, was Professor & Jean-Monnet Chair at the Centre for Energy, Petroleum and Mineral Law and Policy (CEPMLP), Dundee.\nThomas Wälde died on 11 October 2008 in the south of France.Thomas Wälde grew up in Heidelberg (Germany) and went to school at the Kurfuerst-Friedrich-Gymnasium. He was from a South-West German family; his great uncle, Reinhold Maier, was the first Ministerpraesident of Baden-Wuerttemberg; another uncle, Heinz Maier-Leibnitz, a well known German professor of nuclear physics, director of German and French nuclear physics research laboratories and President of the German National Science Foundation (DFG).\nThomas Wälde lived and worked from his home/offices outside St Andrews, Scotland, Heidelberg and Bormes-Les-Mimosas. His second wife, Professor Charlotte Wälde, has served as co-director of the AHRC Centre on Intellectual Property Law at Edinburgh University. His son Max works as an attorney in Vienna, and his daughter Olivia is a student in London.\nHe studied law, in the traditional German way, at the Universities of Heidelberg, Lausanne-Geneva, Berlin and Frankfurt, with his law degree (Referendar) and doctorate (Juristische Folgenorientierung - a study on decision theory as an interpretative tool for international economic law) - in Frankfurt.He did his professional legal training in Frankfurt (including as an intern at the UN Centre on Transnational Corporations in New York) and obtained his \"Assessor\" grade there. He also worked as Associate Officer and resident consultant with the UN/CTC in New York and UNIDO in Vienna and was fellow at the Institute for International Economic Law in Frankfurt (founded by Heinrich Kronstein who was also professor at Georgetown Law School in the US and founder of the Washington-based International Law Institute).\nWälde was at Harvard Law School (1972:74) as LL.M. and subsequent visiting scholar. His Harvard LL.M. dissertation - on comparative company law - was published in 1974. Detlev Vagts was his academic mentor and teacher at Harvard Law School; he also worked as research assistant for the late Professor and ICJ Judge Richard Baxter. In 1978, he obtained the now prestigious price by the German Research Foundation (DFG) for a publication on transnational investment agreements (published in Rabelz Zeitschrift) which was, a decade later, named after Heinz Maier-Leibnitz, at one time the President of DFG.\nICJ president Roslyn Higgins had served as an academic mentor for Thomas Wälde since he moved from the United Nations in New York to the University of Dundee, Scotland in 1991.\nWälde started in 1980 as UN interregional adviser on mineral law - with the remit to provide rapid ad hoc advisory services to developing country governments throughout the world. He later became responsible for energy/petroleum and international investment policy as well. At the UN, he advised over 60 governments on legislative reform and contract negotiations with international investors mainly. He was also, from 1981 to 1983, UN investigator on occupation practices in Palestinian territories and responsible for the Secretary General's reports on \"Permanent Sovereignty over Natural resources\" and the Permanent Sovereignty in Occupied Palestinian territories reports. Wälde set up numerous investment advisory projects - combining legal, financial and technical expertise - to support investment project negotiations; organised training seminars and international UN conferences in the field of mining and oil and gas. He initiated the UN project for environmental guidelines in mining and was chair of the drafting group that produced the first version of the \"Berlin Guidelines\" in 1990.At Dundee, Wälde, as Professor and Executive Director, developed the Centre for Petroleum and Mineral Law into the world's largest graduate school in its field - with four students in 1991 growing to well over 140 LL.M., MBA, MSC, MBA and PHD students in 2002/2003 (when he gave up the directorship). Student numbers went up, from 1991 to 2002, by a factor of about 40 and fees were raised by a factor of 4. The centre obtained as a recognition for its spectacular growth the prestigious Queen's Award for Enterprise in 2004.\nFollowing his directorship of CEPMLP/Dundee, Wälde developed academic and professional expertise in international dispute resolution, both mediation and arbitration for large, complex, cross-border transnational disputes, primarily (but not exclusively) in the field of oil, gas, energy, infrastructure and mining (but also gaming and private equity) based on contract and investment treaties. He set up OGEMID, the mainly international electronic discussion and intelligence forum which is by now a \"must\" for anybody seriously engaged in international investment disputes, but also in complex commercial disputes in the energy and resources field. He acted as co-arbitrator in the NAFTA Chapter XI arbitration Thunderbird v Mexico; as co-arbitrator in the BIT-based arbitration of K+ v Czech Republic; and, in 2008, as co-arbitrator in a CAFTA dispute. He has also been appointed to international disputes in the field of mining and energy (electricity). He frequently acts as expert witness and (expert) co-counsel in international arbitrations relating to oil, gas, energy, mining and infrastructure, including Glamis v US, Duke v Peru, Nykomb v Latvia plus commercial, BIT, ECT and NAFTA-based arbitrations under UNCITRAL, ICSID, NAFTA and CAFTA procedural rules. He has also mediated commercial disputes between international oil companies and the SwePol dispute concerning an electricity interconnector between Poland and Sweden.\nHe was a frequent expert, but also counsel, mediator and arbitrator in international energy and investment disputes (International Centre for Settlement of Investment Disputes (ICSID), the North American Free Trade Agreement (NAFTA), Energy Charter Treaty, Bilateral Investment Treaty (BIT) and commercial contract disputes). Special member of AIPN, member of several int'l arbitral institutions, Rechtsanwalt (Frankfurt) & barrister (Lincoln's Inn - Essex Court Chambers, London). Adviser to the international institutions in the oil and gas field (the Organization of Petroleum Exporting Countries, International Energy Agency (IEA), UN, APEC, European Union, World Bank). Identified as leading international energy lawyer in a Euromoney survey, leading international lawyer in a Cambridge-sponsored Who's Who in International law and one of three international arbitrators resident in Scotland. Formerly (up to 1990) Interregional Adviser on Mineral and Petroleum law and International Investment Policy, United Nations, New York; staff and consultant for UN Centre on Transnational Corporations and United Nations Industrial Development Organization (1976:1980); Reporter for International Law Association Foreign Investment Law Committee (damages and tax-related investment disputes). Frequent speaker and author on international investment law, natural resources, mineral, energy and oil and gas law, including renegotiation, taxation, indirect expropriation, de-commissioning (abandonment) of offshore operations; state enterprise privatisation, investment treaties, environmental regulation; arbitration; Energy Charter Treaty.\nThomas Wälde was a prolific writer and speaker, and spoke at conferences around the world. He served as visiting professor at Panthéon-Assas University and American University. He is fellow of the investment programme at the British Institute of International & Comparative Law, at Columbia University's Law School and other EU-law focused institutions. He obtained a Jean-Monnet Chair in an EU-wide competition from the EU Commission in 1995 - on EU Energy and Economic Law. He was a \"Special Member\" of the Association of Int'l Petroleum Negotiators (AIPN), panel of energy/resources arbitrators of the Permanent court of Int'l Arbitration; Member of the Institut pour l'Arbitrage International; member of the IBA, LCIA, DIS; ICDR, ILA; ASIL, ITA (Academic Council). He was named in several professional guides as a leading international energy lawyers and one of three international arbitrators in Scotland. He was formerly the Chair, Energy, Petroleum and Mineral Law and Policy Trust; Director of the 2004 Hague Academy for Int'l Law Research Seminar on Int'l Investment Law. He was on the IUCN Energy Working Group and the World Energy Council's Task force on Energy Investment & Trade.\nHe could write and speak in English, German, French and Spanish, with some knowledge of Italian, Russian and Arabic. He worked in all corners of the world. He developed and led negotiation assistance inter alia in several investment projects related to coal (Colombia), gold (Mali), Guyana (uranium), Dominican Republic (nickel, oil), Cayman Islands (oil) : all led to completed transaction.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_8" +} \ No newline at end of file diff --git a/test/Energy/Uganda_Energy_Credit_Capitalisation_Company.json b/test/Energy/Uganda_Energy_Credit_Capitalisation_Company.json new file mode 100644 index 0000000000000000000000000000000000000000..6a06b381fc3ce82975c500f6d8f197b51f92884a --- /dev/null +++ b/test/Energy/Uganda_Energy_Credit_Capitalisation_Company.json @@ -0,0 +1,72 @@ +{ + "domain": "Energy", + "document": "The Uganda Energy Credit Capitalisation Company (UECCC) is a company owned by the government of Uganda. It is responsible for coordinating funding from the Ugandan government, international development partners and the private sector, to invest in renewable energy infrastructure in Uganda, with emphasis on the promotion of private sector participation.\nUECCC's headquarters is located in Amber House, at 29-33 Kampala Road, in the centre of Kampala, Uganda's capital and largest city. The coordinates of the company headquarters are 00°18'48.0\"N, 32°34'55.0\"E (Latitude.313340; Longitude.581949).The company was established in 2009 and coordinates investment into renewable energy sources in the country. The company offers technical, financial, and advisory services to the lending financial institution and to the renewable energy project developer. Services offered include the following: (a) Liquidity refinance option (b) Cash reserving (c) Partial risk guarantee (d) Solar refinance facility to participating microfinance institutions (e) Bridge financing facility (f) Subordinated debt finance (g) Interest rate buy down and (h) Transaction advisory services. Participating international development partners include the World Bank and KfW.The company is jointly owned by the Uganda Ministry of Energy and Mineral Development and the Uganda Ministry of Finance, Planning and Economic Development. As of June 2022, the company's total assets were USh58.4 billion (US$15.257 million). At that time the company was involved in developing nine mini-hydroelectric power stations in the country, that were yet to come online.In July 2024, UECCC signed contracts for the construction of the ORIO Mini Hydropower Project, in the Western Region of Uganda. The project involves the construction of 9 mini-grid dams with total capacity of 6.7 MW. The project will benefit up to 71,081 households and 2,300 small and medium enterprises (SMEs) in the districts of Kasese, Bushenyi, Mitooma, Hoima, Kabarole, Bunyangabu and Bundibugyo. The construction is budgeted at USh53.3 billion (approx. US$14.4 million).HNAC Technology Company Limited from China will be responsible for the civil and hydro-mechanical works. Ossberger GmbH from Germany will be responsible for the design, manufacture, supply, and installation of the electromechanical components. The project is co-financed by the Government of Uganda and the ORIO Infrastructure Fund. The government of the Netherlands provided a grant of €13.1 million towards this project.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "PresentInWork", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "ConferredBy", + "InterestedIn", + "Investor", + "Represents", + "Choreographer", + "UsedBy", + "SupportedSportsTeam", + "SupportsProgrammingLanguage", + "InOppositionTo", + "IsPollinatorOf", + "MeasuredBy", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Author", + "Partner", + "CountryOfOrigin", + "WorkLocation", + "Continent", + "DiplomaticRelation", + "ContainsAdministrativeTerritorialEntity", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Energy_9" +} \ No newline at end of file diff --git a/test/Engineering/ARP4761.json b/test/Engineering/ARP4761.json new file mode 100644 index 0000000000000000000000000000000000000000..b8d4f34de4773c783944e7b2efce49598d69851d --- /dev/null +++ b/test/Engineering/ARP4761.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "ARP4761, Guidelines for Conducting the Safety Assessment Process on Civil Aircraft, Systems, and Equipment is an Aerospace Recommended Practice from SAE International. In conjunction with ARP4754, ARP4761 is used to demonstrate compliance with 14 CFR 25.1309 in the U.S. Federal Aviation Administration (FAA) airworthiness regulations for transport category aircraft, and also harmonized international airworthiness regulations such as European Aviation Safety Agency (EASA) CS:25.1309.\nThis Recommended Practice defines a process for using common modeling techniques to assess the safety of a system being put together. The first 30 pages of the document covers that process. The next 140 pages give an overview of the modeling techniques and how they should be applied. The last 160 pages give an example of the process in action.\nSome of the methods covered:\nFunctional Hazard Assessment (FHA)\nPreliminary System Safety Assessment (PSSA)\nSystem Safety Assessment (SSA)\nFault Tree Analysis (FTA)\nFailure Mode and Effects Analysis (FMEA)\nFailure Modes and Effects Summary (FMES)\nCommon Cause Analysis (CCA), consisting of:\nZonal Safety Analysis (ZSA)\nParticular Risks Analysis (PRA)\nCommon Mode Analysis (CMA)\nThe general flow of the safety life cycle under ARP4761 is:Perform the aircraft level FHA in parallel with development of aircraft level requirements.\nPerform the system level FHA in parallel with allocation of aircraft functions to system functions, and initiate the CCA.\nPerform the PSSA in parallel with system architecture development, and update the CCA.\nIterate the CCA and PSSA as the system is allocated into hardware and software components.\nPerform the SSA in parallel with system implementation, and complete the CCA.\nFeed the results into the certification process.\nThe Functional Safety process is focused on identifying functional failure conditions leading to hazards. Functional Hazard Analyses / Assessments are central to determining hazards. FHA is performed early in aircraft design, first as an Aircraft Functional Hazard Analysis (AFHA) and then as a System Functional Hazard Analysis (SFHA). Using qualitative assessment, aircraft functions and subsequently aircraft system functions are systematically analyzed for failure conditions, and each failure condition is assigned a hazard classification. Hazard classifications are closely related to Development Assurance Levels (DALs) and are aligned between ARP4761 and related aviation safety documents such as ARP4754A, 14 CFR 25.1309, and Radio Technical Commission for Aeronautics (RTCA) standards DO-254 and DO-178B. \nFHA results are normally shown in spreadsheet form, with columns identifying function, failure condition, phase of flight, effect, hazard classification, DAL, means of detection, aircrew response, and related information. Each hazard is assigned a unique identifier that is tracked throughout the entire safety life cycle. One approach is to identify systems by their ATA system codes and the corresponding hazards by derivative identifiers. For example, the thrust reverser system could be identified by its ATA code 78-30. Untimely deployment of thrust reverser would be a hazard, which could be assigned an identifier based on ATA code 78-30.\nFHA results are coordinated with the system design process as aircraft functions are allocated to aircraft systems. The FHA also feeds into the PSSA, which is prepared while the system architecture is developed.\nThe PSSA may contain qualitative FTA, which can be used to identify systems requiring redundancy so that catastrophic events do not result from a single failure (or dual failure where one is latent). A fault tree is prepared for each SFHA hazard rated hazardous or catastrophic. Fault trees may be performed for major hazards if warranted. DALs and specific safety design requirements are imposed on the subsystems. The safety design requirements are captured and traced. These may include preventive or mitigation strategies selected for particular subsystems. The PSSA and CCA generate separation requirements to identify and eliminate common mode failures. Subsystem failure rate budgets are assigned so that hazard probability limits can be met.\nThe CCA consists of three separate types of analyses which are designed to uncover hazards not created by a specific subsystem component failure. The CCA may be many separate documents, may be one CCA document, or may be included as sections in the SSA document. The Particular Risk Analysis (PRA) looks for external events which can create a hazard such as a birdstrike or engine turbine burst. The Zonal Safety Analysis (ZSA) looks at each compartment on the aircraft and looks for hazards that can affect every component in that compartment, such as loss of cooling air or a fluid line bursting. The Common Mode Analysis (CMA) looks at the redundant critical components to find failure modes which can cause all to fail at about the same time. Software is always included in this analysis as well as looking for manufacturing errors or \"bad lot\" components. A failure such as a bad resistor in all flight control computers would be addressed here. The mitigations for CMA discoveries is often DO-254 or DO-178B components.\nThe SSA includes quantitative FMEA, which is summarized into FMES. Normally FMES probabilities are used in quantitative FTA to demonstrate that the hazard probability limits are in fact met. Cutset analysis of the fault trees demonstrates that no single failure condition will result in a hazardous or catastrophic event. The SSA may include the results of all safety analysis and be one document or may be many documents. An FTA is only one method for performing the SSA. Other methods include dependence diagram or reliability block diagram and Markov Analysis.\nThe PSSA and CCA often result in recommendations or design requirements to improve the system. The SSA summarizes the residual risks remaining in the system and should show all hazards meet the 1309 failure rates.\nThe ARP4761 analyses also feed into Crew Alerting System (CAS) message selection and the development of critical maintenance tasks under ATA MSG3.\nIn 2004, SAE Standard Committee S-18 began working on Revision A to ARP4761. When released, EUROCAE plans to jointly issue the document as ED:135.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_0" +} \ No newline at end of file diff --git a/test/Engineering/Amasa_Stone_Bishop.json b/test/Engineering/Amasa_Stone_Bishop.json new file mode 100644 index 0000000000000000000000000000000000000000..8b1123a9831b6f92ba48571df3f872bcd3b7e374 --- /dev/null +++ b/test/Engineering/Amasa_Stone_Bishop.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "Amasa Stone Bishop (1921 : May 21, 1997) was an American nuclear physicist specializing in fusion physics. He received his B.S. in physics from the California Institute of Technology in 1943. From 1943 to 1946 he was a member of the staff of Radiation Laboratory at the Massachusetts Institute of Technology, where he was involved with radar research and development. Later, he became a staff member of the University of California at Berkeley from 1946 to 1950. Specializing in high energy particle work, he earned his Ph.D. in physics in 1950.\nAfter attaining his Ph.D., Amasa spent three years in Switzerland, acting as research associate at the Federal Institute of Technology in Zürich, and later at the University of Zürich. In 1953 Amasa joined the research division of the Atomic Energy Commission (AEC) in Washington and became the director of the American program to develop controlled fusion, also known as Project Sherwood. He was later presented the AEC Outstanding Service Award for his work. After leaving this position in 1956, Amasa published a book on behalf of the AEC discussing the various attempts at harnessing fusion under Project Sherwood. The book, \"Project Sherwood: The U.S. Program in Controlled Fusion\", was published in 1958.\nAfter 1956 Amasa also served as the AEC's European scientific representative, based in Paris. He was also an assistant delegate to the European atomic energy agency, Euratom, in Brussels. Later he spent several years in Princeton, New Jersey, and was in charge of the fusion program in Washington.\nIn 1970 Amasa joined the United Nations in Europe as director of environment of the United Nations Economic Commission for Europe. During this position, he worked with scientists and diplomats to create solutions for various environmental problems. He left this position to retire in 1980. Amasa died on May 21, 1997, of pneumonia related to Alzheimer's disease at the Clinique de Genolier in Genolier, Switzerland.\nBishop was the great-grandson of Industrialist Amasa Stone.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_1" +} \ No newline at end of file diff --git a/test/Engineering/Bug_(engineering).json b/test/Engineering/Bug_(engineering).json new file mode 100644 index 0000000000000000000000000000000000000000..49a0ff025a052ef660dbb748a2762517313a85a2 --- /dev/null +++ b/test/Engineering/Bug_(engineering).json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "In engineering, a bug is a design defect in an engineered system that causes an undesired result.\nAlthough used exclusively to describe a technical issue, bug is a non-technical term; applicable without technical understanding of the system.\nThe term bug applies exclusively to a system that is (human) designed; not to a natural system; and that the issue is within the influence of human control. For example, humans have faults but not bugs, and a server crash due to natural disaster is not a bug.\nIn addition to or instead of defect, some use: error, flaw or fault.\nEngineered systems is a broad classification encompassing but not limited to: software, computer hardware, electronics, circuitry and machinery.\nThe undesirable result can be classified and described many ways including: intermittent, transient, glitch, crash or hang.\nSince desirability is subjective, what is considered undesirable to one may be considered desirable to another; even a useful feature.\nThe Middle English word bugge is the basis for the terms bugbear and bugaboo as terms used for a monster.The term bug to describe a defect has been engineering jargon since at least as far back as the 1870s : long before electronic computers and computer software. For instance, Thomas Edison wrote the following words in a letter to an associate in 1878:\nIt has been just so in all of my inventions. The first step is an intuition, and comes with a burst, then difficulties arise—this thing gives out and [it is] then that \"Bugs\"—as such little faults and difficulties are called—show themselves and months of intense watching, study and labor are requisite before commercial success or failure is certainly reached.\nIn a comic strip printed in a 1924 telephone industry journal, a naive character hears that a man has a job as a \"bug hunter\" and gives a gift of a backscratcher. The man replies \"don't you know that a 'bug hunter' is just a nickname for a repairman?\"\nBaffle Ball, the first mechanical pinball game, was advertised as being \"free of bugs\" in 1931.\nProblems with military gear during World War II were referred to as bugs (or glitches). \nIn the 1940 film, Flight Command, a defect in a piece of direction-finding gear is called a bug. \nIn a book published in 1942, Louise Dickinson Rich, speaking of a powered ice cutting machine, said, \"Ice sawing was suspended until the creator could be brought in to take the bugs out of his darling.\"\nIsaac Asimov used the term bug to relate to issues with a robot in his short story \"Catch That Rabbit\", published in 1944.\nComputer pioneer and rear admiral, Grace Hopper, popularized a story about a moth that caused a problem in an early electromechanical computer. While Hopper was working on the Mark II and Mark III as Harvard faculty in about 1947, operators traced an error in the Mark II to a moth trapped in a relay. The moth was removed from the mechanism and taped in a log book with the note \"First actual case of bug being found.\"\nReportedly, the operators, including William \"Bill\" Burke, later of the Naval Weapons Laboratory, Dahlgren, Virginia, were familiar with the engineering term and probably making a joke by conflating the two meanings of bug (biological and defect).\nAlthough probably a joke, the story indicates that the term was commonly used in the computer field at that time. \nThe log book, complete with moth, is part of the collection of the Smithsonian National Museum of American History.\nThe related term debug also appears to predate its usage in computing: the Oxford English Dictionary's etymology of the word contains an attestation from 1945, in the context of aircraft engines.\nSince bug implies undesirable behavior, calling a behavior a bug is subjective. Behavior which is considered a bug by some may be considered a useful feature by others,hence a common phrase is \"It's not a bug, it's a feature\" (INABIAF). This quip is recorded in The Jargon File dating to 1975 but dates to 1971 when PDP-8 programmer Sandra Lee Harris at Digital Equipment Corporation (DEC) made the distinction between issues to be fixed in the code for DEC's FOCAL interpreter and those to be documented or clarified in the user manual.\nSuch behavior might be explicitly communicated to users, or might remain an undocumented feature.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_2" +} \ No newline at end of file diff --git a/test/Engineering/Engineering_technologist.json b/test/Engineering/Engineering_technologist.json new file mode 100644 index 0000000000000000000000000000000000000000..88d5eddf3d113bf1faf6a83d5f09e661ed07c8f1 --- /dev/null +++ b/test/Engineering/Engineering_technologist.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "An engineering technologist is a professional trained in certain aspects of development and implementation of a respective area of technology. An education in engineering technology concentrates more on application and less on theory than does an engineering education. Engineering technologists often assist engineers; but after years of experience, they can also become engineers. Like engineers, areas where engineering technologists can work include product design, fabrication, and testing. Engineering technologists sometimes rise to senior management positions in industry or become entrepreneurs.\nEngineering technologists are more likely than engineers to focus on post-development implementation, product manufacturing, or operation of technology. The American National Society of Professional Engineers (NSPE) makes the distinction that engineers are trained in conceptual skills, to \"function as designers\", while engineering technologists \"apply others' designs\". The mathematics and sciences, as well as other technical courses, in engineering technology programs, are taught with more application-based examples, whereas engineering coursework provides a more theoretical foundation in math and science. Moreover, engineering coursework tends to require higher-level mathematics including calculus and calculus-based theoretical science courses, as well as more extensive knowledge of the natural sciences, which serves to prepare students for research (whether in graduate studies or industrial R&D) as opposed to engineering technology coursework which focuses on algebra, trigonometry, applied calculus, and other courses that are more practical than theoretical in nature and generally have more labs that involve the hands-on application of the topics studied.\nIn the United States, although some states require, without exception, a BS degree in engineering at schools with programs accredited by the Engineering Accreditation Commission (EAC) of the Accreditation Board for Engineering and Technology (ABET), about two-thirds of the states accept BS degrees in engineering technology accredited by the Engineering Technology Accreditation Commission (ETAC) of the ABET, in order to become licensed as professional engineers. States have different requirements as to the years of experience needed to take the Fundamentals of Engineering (FE) and Professional Engineering (PE) exams. A few states require those sitting for the exams to have a master's degree in engineering. This education model is in line with the educational system in the United Kingdom where an accredited MEng or MSc degree in engineering is required by the Engineering Council (EngC) to be registered as a Chartered Engineer. Engineering technology graduates with can earn an MS degree in engineering technology, engineering, engineering management, construction management, or a National Architectural Accrediting Board (NAAB)-accredited Master of Architecture degree. These degrees are also offered online or through distance-learning programs at various universities, both nationally and internationally, which allows individuals to continue working full-time while earning an advanced degree.\nEngineering technologists are more likely to work in testing, fabrication/construction or fieldwork, while engineers generally focus more on conceptual design and product development, with considerable overlap (e.g., testing and fabrication are often integral to the overall product development process and can involve engineers as well as engineering technologists).Engineering technologists are employed in a wide array of industries and areas including product development, manufacturing and maintenance. They may become managers depending upon the experience and their educational emphasis on management. Entry-level positions relating in various ways to product design, product testing, product development, systems development, field engineering, technical operations, and quality control are common for engineering technologists. Most companies generally make no distinction between engineers and engineering technologists when it comes to hiring.\nBeginning in the 1950s and 1960s, some post-secondary institutions in the U.S. and Canada began offering degrees in engineering technology, focusing on applied study rather than the more theoretical studies required for engineering degrees. The focus on applied study addressed a need within the scientific, manufacturing, and engineering communities, as well as other industries, for professionals with hands-on and applications-based engineering knowledge. Depending on the institution, associate's or bachelor's degrees are offered, with some institutions also offering advanced degrees in engineering technology.In general, an engineering technologist receives a broad range of applied science and applied mathematics training, as well as the fundamentals of engineering in the student's area of focus. Engineering technology programs typically include instruction in providing support to specific engineering specialties. Information technology is primarily involved with the management, operation, and maintenance of computer systems and networks, along with an application of technology in diverse fields such as architecture, engineering, graphic design, telecommunications, computer science, and network security. An engineering technologist is also expected to have had some coursework in ethics.\nIn 2001, Professional organizations from different countries have signed a mutual recognition agreement called the Sydney Accord, which represents an understanding that the academic credentials of engineering technologists will be recognized in all signatory states. The recognition given engineering technologists under the Sydney Accord can be compared to the Washington Accord for engineers and the Dublin Accord for engineering technicians. The Engineering Technologist Mobility Forum (ETMF) is an international forum held by signatories of the Sydney Accord to explore mutual recognition for experienced engineering technologists and to remove artificial barriers to the free movement and practice of engineering technologists amongst their countries. ETMF can be compared to the Engineers Mobility Forum (EMF) for engineers.\nGraduates acquiring an associate degree, or lower, typically find careers as engineering technicians. According to the United States Bureau of Labor Statistics: \"Many four-year colleges offer bachelor's degrees in engineering technology and graduates of these programs are hired to work as entry-level engineers or applied engineers, but not technicians.\" Engineering technicians typically have a two-year associate degree, while engineering technologists have a bachelor's degrees.\nIn Canada, the new occupational category of \"technologist\" was established in the 1960s, in conjunction with an emerging system of community colleges and technical institutes. It was designed to effectively bridge the gap between the increasingly theoretical nature of engineering degrees and the predominantly practical approach of technician and trades programs. Provincial associations may certify individuals as a professional technologist (P.Tech.), certified engineering technologist (C.E.T.), registered engineering technologist (R.E.T.), applied science technologist (AScT), or technologue professionel (T.P.). These provincial associations are constituent members of Technology Professionals Canada (TPC), which accredits technology programs across Canada, through its Technology Accreditation Canada (TAC). Nationally accredited engineering technology programs range from two to three years in length, depending on the province, and often require as many classroom hours as a 4-year degree program.In the United States, the U.S. Department of Education or the Council for Higher Education Accreditation (CHEA) are at the top of the educational accreditation hierarchy. The U.S. Department of Education acknowledges regional and national accreditation and CHEA recognizes specialty accreditation. One technology accreditation is currently recognized by CHEA: The Association of Technology, Management and Applied Engineering (ATMAE). CHEA recognizes ATMAE for accrediting associate, baccalaureate, and master's degree programs in technology, applied technology, engineering technology, and technology-related disciplines delivered by national or regional accredited institutions in the United States. As of March 2019, ABET withdrew from CHEA recognitionThe National Institute for Certification in Engineering Technologies (NICET) awards certification at two levels, depending on work experience: the Associate Engineering Technologist (AT) and the Certified Engineering Technologist (CT). ATMAE awards two levels of certification in technology management: Certified Technology Manager (CTM) and Certified Senior Technology Manager (CSTM). ATMAE also awards two levels of certification of manufacturing specialist: Certified Manufacturing Specialist (CMS) and Certified Senior Manufacturing Specialist (CSMS). In 2020, ATMAE announced offering the Certified Controls Engineer (CCE) and Certified Senior Controls Engineer (CSCE) professional certifications. While the CTM, CMS, and CCE certifications are obtained through examination, the CSTM, CSMS and CSCE require industry experience and continuous improvement via the obtainment of professional development units (PDUs).\nThe American Society of Certified Engineering Technicians (ASCET) is a membership organization that issues Certified Member certifications to engineering technicians and engineering technologists. Professional engineers are issued Registered Member certification.\nThe United Kingdom has a decades-long tradition of producing engineering technologists via the apprenticeship system. UK engineering technologists have always been designated as \"engineers\", which in the UK is used to describe the entire range of skilled workers and professionals, from tradespeople through to the highly educated Chartered Engineer. In fact up until the 1960s professional engineers in the UK were often referred to as \"Technologists\" to distinguish them from scientists, technicians, and craftsmen. The modern term for an engineering technologist is \"incorporated engineer\" (IEng), although since 2000 the normal route to achieving IEng is with a bachelor's or honors degree in engineering. Modern technical apprenticeships would normally lead to the engineering technician (EngTech) professional qualification and, with further studies at higher apprenticeship level, an IEng. Since 2015, the Universities and Colleges Admissions Service (UCAS) has introduced engineering degree (bachelors and masters) apprenticeships. The title \"incorporated engineer\" is protected by civil law. Prior to the title \"incorporated engineer\", UK technologists were known as \"technician engineers\" a designation introduced in the 1960s.In the United Kingdom, an incorporated engineer is accepted as a \"professional engineer\", registered by the EngC, although the term \"professional engineer\" has no legal meaning in the UK and there are no restrictions on the practice. In fact, anyone in the UK can call themselves an \"engineer\" or \"professional engineer\" without any qualifications or proven competence in engineering; and most UK skilled trades are sometimes referred to as \"professional\" or \"accredited\" engineers. Examples are \"Registered Gas Engineer\" (gas installer) or \"Professional Telephone Engineer\" (phone line installer or fault diagnosis).\nIncorporated engineers are recognized internationally under the Sydney Accord as engineering technologists. One of the professional titles recognized by the Washington Accord for engineers in the United Kingdom is the chartered engineer. The incorporated engineer is a professional engineer as recognized by the EngC of the United Kingdom. The European designation, as demonstrated by the prescribed title under 2005/36/EC, is \"engineer\". The incorporated engineer operates autonomously and directs activities independently. They do not necessarily need the support of chartered engineers, because they are often acknowledged as full engineers in the UK (but not in Canada or the U.S.). The United Kingdom incorporated engineer may also contribute to the design of new products and systems.\nThe chartered engineer and incorporated engineer, whilst often undertaking similar roles, are distinct qualifications awarded by the EngC, with Chartered Engineer (CEng) status being the terminal engineering qualification.\nIncorporated engineers currently require an IEng-accredited bachelors or honors degree in engineering (prior to 1997 the B.Sc. and B.Eng. degrees satisfied the academic requirements for \"chartered engineer\" registration), a Higher National Certificate or diploma, City and Guilds of London Institute higher diploma/full technological cert diploma, or a Foundation Degree in engineering, plus appropriate further learning to degree level, or an NVQ4 or SVQ4 qualifications approved for the purpose by a licensed engineering institution.\nThe academic requirements must be accompanied by the appropriate peer-reviewed experience in employment—typically 4 years post qualification. In addition to the experience and academic requirements, the engineering candidate must have three referees (themselves CEng or IEng) who vouch for the performance of the individual being considered for professional recognition. There are a number of alternative ways to achieve IEng status for those that do not have the necessary qualifications for applicants, but who can clearly show they have achieved the same level as those with qualifications, including:\nwriting a technical report, based upon their experience and demonstrate their knowledge and understanding of engineering principles;\nearning the City and Guilds graduate diploma (bachelors level) and a postgraduate diploma (masters level) accredited by the Institution of Mechanical Engineers (IMechE), Institution of Engineering and Technology (IET) and Institution of Civil Engineers (ICE);\nfollowing a work-based learning program;\nor taking an academic program specified by the institution to which they are applying.\nThe engineering technologist (state-certified technician; German: Staatlich geprüfter Techniker) are vocational (non-academic) qualifications at the tertiary level in Germany. The degree is governed by the framework agreement of trade and technical schools (resolution of the Standing Conference of the Ministers of Education and Cultural Affairs of the states in the Federal Republic of Germany of 7 November 2002 in its respective applicable version) and is recognised by all states of the Federal Republic of Germany. It is awarded after passing state examinations at state or state-recognised technical school or academies (German: Fachschule/Fachakademie). Through the Vocational Training Modernisation Act (12.12.2019), state-certified engineers are also allowed to hold the title Bachelor Professional in Technik as of 1 January 2020.To be eligible for the engineering technologist examination, candidates must fulfill the following requirements: completion of one of the school systems (Hauptschule, Realschule, Gymnasium), an apprenticeship of at least two years duration, one year of completed professional work experience and attendance of an educational program with a course load of 2400:3000 hours, usually completed within two years, full-time, or 3.5:4 years, part-time, at vocational colleges.\nAs of 31 January 2012, state-certified engineers, state-certified business managers and state-certified designers are at level 6-bachelor in the European Qualifications Framework (EQF), equivalent to a bachelor's degree. As such, the engineering technologist constitutes an advanced entry qualification for German universities and in principle permits entry into any undergraduate academic-degree program.The qualifications are listed in EU Directives as recognised, regulated professions in Germany and the EU. Annexes C and D were added to Council Directive 92/51/EEC as a second general system for the recognition of professional education and training to supplement Directive 89/48/EEC.\nInstitutions involved included the federal government (in Germany, the Federal Ministry of Education and Research and the Federal Ministry of Economics and Technology), EU Standing Conference and Economic Ministerial Meeting of Countries, the German Chamber of Crafts, the Confederation of German Employers' Associations, German Chambers of Industry and Commerce, Confederation of German Trade Unions, and the Federal Institute for Vocational Application. These government institutions agreed on a common position regarding the implementation of the EQF and a German qualifications framework (DQR).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_4" +} \ No newline at end of file diff --git a/test/Engineering/Gravimetric_blender.json b/test/Engineering/Gravimetric_blender.json new file mode 100644 index 0000000000000000000000000000000000000000..093e772f195fd8ec5d58daff0467983463e8a3de --- /dev/null +++ b/test/Engineering/Gravimetric_blender.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "A gravimetric blender is an item of industrial equipment used in the plastics industry to accurately weigh two or more components and then mix them together prior to processing in an injection molding machine, plastics extrusion, or blow moulding machine.\nThere are two types of gravimetric blenders. Loss in weight\nThis type of gravimetric blender measures the \"loss in weight\" from two or more hoppers using a load cell under each hopper. Material is usually dispensed from the hoppers using a screw conveyor. All materials are dispensed together and the rate of dosing from each hopper is controlled to ensure the correct blend is achieved.\n2. Gain in weight (sometimes called a batch blender)\nA gain in weight gravimetric blender has two or more hoppers arranged above a weigh-pan. These hoppers contain the components which are to be mixed, at the base of each hopper there is a valve to control the dispensing of material from the component hopper into the weigh-pan. The components are dispensed one at a time into the weigh pan until the target or batch weight is reached. Once the batch has been weighed out the contents of the weigh-pan are dispensed into a mixing chamber where they are blended. The resulting mixture exits the base of the mixing chamber into the processing machine.\nA typical application of a gravimetric blender would be mixing virgin plastic granules, recycled plastic, and masterbatch (an additive used to colour plastics) together.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_3" +} \ No newline at end of file diff --git a/test/Engineering/History_of_engineering.json b/test/Engineering/History_of_engineering.json new file mode 100644 index 0000000000000000000000000000000000000000..cff96d6d6424dcc62a8f5a3ae651d31bdc49977e --- /dev/null +++ b/test/Engineering/History_of_engineering.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "The concept of engineering has existed since ancient times as humans devised fundamental inventions such as the pulley, lever, and wheel. Each of these inventions is consistent with the modern definition of engineering, exploiting basic mechanical principles to develop useful tools and objects.\nThe term engineering itself has a much more recent etymology, deriving from the word engineer, which itself dates back to 1325,\nwhen an engine’er (literally, one who operates an engine) originally referred to \"a constructor of military engines.\" In this context, now obsolete, an \"engine\" referred to a military machine, i. e., a mechanical contraption used in war (for example, a catapult). The word \"engine\" itself is of even older origin, ultimately deriving from the Latin ingenium (c. 1250), meaning \"innate quality, especially mental power, hence a clever invention.\"\nLater, as the design of civilian structures such as bridges and buildings matured as a technical discipline, the term civil engineering entered the lexicon as a way to distinguish between those specializing in the construction of such non-military projects and those involved in the older discipline of military engineering (the original meaning of the word \"engineering,\" now largely obsolete, with notable exceptions that have survived to the present day such as military engineering corps, e. g., the U. S. Army Corps of Engineers).\nThe ziggurats of Mesopotamia, the pyramids and Pharos of Alexandria in ancient Egypt, cities of the Indus Valley civilization, the Acropolis and Parthenon in ancient Greece, the aqueducts, Via Appia and Colosseum in the Roman Empire, Teotihuacán, the cities and pyramids of the Mayan, Inca and Aztec Empires, and the Great Wall of China, among many others, stand as a testament to the ingenuity and skill of the ancient civil and military engineers.The six classic simple machines were known in the ancient Near East. The wedge and the inclined plane (ramp) were known since prehistoric times. The wheel, along with the wheel and axle mechanism, was invented in Mesopotamia (modern Iraq) during the 5th millennium BC. The lever mechanism first appeared around 5,000 years ago in the Near East, where it was used in a simple balance scale, and to move large objects in ancient Egyptian technology. The lever was also used in the shadoof water-lifting device, the first crane machine, which appeared in Mesopotamia circa 3000 BC, and then in ancient Egyptian technology circa 2000 BC. The earliest evidence of pulleys date back to Mesopotamia in the early 2nd millennium BC, and ancient Egypt during the Twelfth Dynasty (1991-1802 BC). The screw, the last of the simple machines to be invented, first appeared in Mesopotamia during the Neo-Assyrian period (911-609) BC. The Egyptian pyramids were built using three of the six simple machines, the inclined plane, the wedge, and the lever, to create structures like the Great Pyramid of Giza.\nThe earliest architect known by name is Imhotep. As one of the officials of the Pharaoh, Djosèr, he probably designed and supervised the construction of the Pyramid of Djoser (a Step Pyramid) at Saqqara in Egypt around 2630-2611 BC. He may also have been responsible for the first known use of columns in architecture.\nKush developed the Sakia during the 4th century BC, which relied on animal power instead of human energy. Reservoirs in the form of Hafirs were developed in Kush to boost irrigation. Sappers were employed to build causeways during military campaigns. Kushite ancestors built speos between 3700 and 3250 BC. Bloomeries and blast furnaces were also created during the Meroitic period.\nThe earliest practical water-powered machines, the water wheel and watermill, first appeared in the Persian Empire, in what are now Iraq and Iran, by the early 4th century BC.\nAncient Greece developed machines both in the civilian and military domains. The Antikythera mechanism, an early known model of a mechanical analog computer, and the mechanical inventions of Archimedes, are examples of Greek mechanical engineering. Some of Archimedes' inventions, as well as the Antikythera mechanism, required sophisticated knowledge of differential gearing or epicyclic gearing, two key principles in machine theory that helped design the gear trains of the Industrial revolution and are still widely used today in diverse fields such as robotics and automotive engineering.\nChinese and Roman armies employed complex military machines including the Ballista and catapult. In the Middle Ages, the Trebuchet was developed. In 132, polymath Zhang Heng invented the seismoscope for detecting earthquakes, which was not invented anywhere else in the world until 1,100 years later.\nHuan Tan's Xinlun is the earliest text to describe the trip hammer device powered by hydraulics (i.e., a waterwheel), which was used to pound and decorticate grain.\nByzantines translated and preserved countless Greek manuscripts and also made contributions to engineering in the early medieval world. Anthemius of Tralles, and Isidore of Miletus, were responsible for the architecture of the Hagia Sophia church in 532-537 CE.The Greek fire, invented by Callinicus of Heliopolis was a weapon used by the Byzantines. It consisted of flammable substances such as petroleum, naphtha, quicklime, sulphur, resin and potassium nitrate.\nIslamic Golden Age witnessed advances of engineering knowledge, after translate the works of Greek, Persian, Roman, and Indian scholars.The earliest practical wind-powered machines, the windmill and wind pump, first appeared in the Muslim world during the Islamic Golden Age, in what are now Iran, Afghanistan, and Pakistan, by the 9th century AD. The earliest practical steam-powered machine was a steam jack steam turbine, described in 1551 by Taqi al-Din Muhammad ibn Ma'ruf in Ottoman Egypt.\nThe cotton gin was invented in India by the 6th century AD, and the spinning wheel was invented in the Islamic world by the early 11th century, both of which were fundamental to the growth of the cotton industry. The spinning wheel was also a precursor to the spinning jenny, which was a key development during the early Industrial Revolution in the 18th century.\nAfter translating the works of Hero of Alexandria, by Qusta ibn Luqa, the earliest programmable machines were developed in the Muslim world. A music sequencer, a programmable musical instrument, was the earliest type of programmable machine. The first music sequencer was an automated flute player invented by the Banu Musa brothers, described in their Book of Ingenious Devices, in the 9th century. In 1206, Al-Jazari invented programmable automata/robots. He described four automaton musicians, including drummers operated by a programmable drum machine, where they could be made to play different rhythms and different drum patterns. \nAl-Jazari built five machines to pump water for the kings of the Turkish Artuqid dynasty and their palaces. Besides over 50 ingenious mechanical devices, Al-Jazari also developed and made innovations to segmental gears, mechanical controls, escapement mechanisms, clocks, robotics, and protocols for designing and manufacturing methods.\nThe first fully-functioning steam engine was built in 1716 by blacksmith Thomas Newcomen. The development of this device gave rise to the Industrial Revolution in the coming decades, allowing for the beginnings of mass production.With the rise of engineering as a profession in the 18th century, the term became more narrowly applied to fields in which mathematics and science were applied to these ends. Similarly, in addition to military and civil engineering, the fields then known as the mechanic arts became incorporated into engineering.\nThe following images are samples from a deck of cards illustrating engineering instruments in England in 1702. They illustrate a range of engineering specializations, that would eventually become known as civil engineering, mechanical engineering, geodesy and geomatics, and so on.\nEach card includes a caption explaining the purpose of the instrument:\nThe inventions of Thomas Savery and the Scottish engineer James Watt gave rise to modern Mechanical Engineering. The development of specialized machines and their maintenance tools during the industrial revolution led to the rapid growth of Mechanical Engineering both in its birthplace Britain and abroad.The discipline of Electrical Engineering was shaped by the experiments of Alessandro Volta in the 19th century, the experiments of Michael Faraday, Georg Ohm and others and the invention of the electric motor in 1872. Electrical engineering became a profession late in the 19th century. Practitioners had created a global electric telegraph network and the first electrical engineering institutions to support the new discipline were founded in the UK and US. Although it is impossible to precisely pinpoint a first electrical engineer, Francis Ronalds stands ahead of the field, who created the first working electric telegraph system in 1816 and documented his vision of how the world could be transformed by electricity.\nThe work of James Maxwell and Heinrich Hertz in the late 19th century gave rise to the field of Electronics. The later inventions of the vacuum tube and the transistor further accelerated the development of Electronics to such an extent that electrical and electronics engineers currently outnumber their colleagues of any other Engineering specialty.\nChemical Engineering, like its counterpart Mechanical Engineering, developed in the 19th century during the Industrial Revolution. Industrial scale manufacturing demanded new materials and new processes and by 1880 the need for large scale production of chemicals was such that a new industry was created, dedicated to the development and large scale manufacturing of chemicals in new industrial plants. The role of the chemical engineer was the design of these chemical plants and processes.\nAeronautical Engineering deals with aircraft design while Aerospace Engineering is a more modern term that expands the reach envelope of the discipline by including spacecraft design. Its origins can be traced back to the aviation pioneers around the turn of the 20th century although the work of Sir George Cayley has recently been dated as being from the last decade of the 18th century. Early knowledge of aeronautical engineering was largely empirical with some concepts and skills imported from other branches of engineering. Only a decade after the successful flights by the Wright brothers, the 1920s saw extensive development of aeronautical engineering through development of World War I military aircraft. Meanwhile, research to provide fundamental background science continued by combining theoretical physics with experiments.\nThe first PhD in engineering (technically, applied science and engineering) awarded in the United States went to Willard Gibbs at Yale University in 1863; it was also the second PhD awarded in science in the U.S.\nIn 1990, with the rise of computer technology, the first search engine was built by computer engineer Alan Emtage.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_5" +} \ No newline at end of file diff --git a/test/Engineering/History_of_women_in_engineering_in_the_United_Kingdom.json b/test/Engineering/History_of_women_in_engineering_in_the_United_Kingdom.json new file mode 100644 index 0000000000000000000000000000000000000000..db6d0dce377e3da644db15a46fdb618b67dd1f94 --- /dev/null +++ b/test/Engineering/History_of_women_in_engineering_in_the_United_Kingdom.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "Women have played a role in engineering in the United Kingdom for hundreds of years, despite the various societal barriers facing them. In the 18th and 19th century, there were few formal training opportunities for women to train as engineers and frequently women were introduced to engineering through family companies or their spouses. Some women did have more formal educations in the late 19th century and early 20th century, normally in mathematics or science subjects. There are several examples of women filing patents in the 19th century, including Sarah Guppy, Henrietta Vansittart and Hertha Ayrton.\nDuring the first two decades of the 20th century new opportunities arose for women to go to university and earn degrees and there were increasing numbers of women studying maths and physics at universities across the UK. The job opportunities for women opened up by World War I meant many women were trained in various forms of engineering. In 1919, the Women's Engineering Society (WES) was founded to protect these jobs for women, which, once the war ended, were handed back to the men returning from the front, as decreed by the Restoration of Pre-War Practices Act (1919).\nThe 1920s and 30s produced many successful women engineers, who were able to forge careers for themselves in various fields, including aeronautical, automotive and electrical engineering. Many of these women were members of WES.\nInventors and engineers in the early 19th century in the UK include Sarah Guppy, the first woman in the UK to patent a bridge. Later in the 19th century, there are more examples of women patenting inventions and practising as engineers. Naval engineer Henrietta Vansittart, who was introduced to engineering by her father James Lowe, contributed to naval engineering and held patents across the world for the Lowe-Vansittart propeller. Similarly, another naval engineer, Blanche Thornycroft, found her way into engineering through a family connection. She worked as part of her father's engineering business on the Isle of Wight.Electrical engineer and physicist, Hertha Ayrton, was the first woman admitted to the IEE (the Institution of Electrical Engineers, now the IET), the premier British electrical engineering profession institution, in recognition of her work on electrical arc lighting.\nMany women in this era were collaborators in engineering projects with their husbands. The effort to electrify the home in the late 19th century involved many women, including Alice Mary Gordon, who wrote a book called Decorative Electricity, which included a section detailing life as an engineering spouse. Katharine Parsons worked with her husband Sir Charles Parsons on the steam turbine engine and later founded the Women's Engineering Society. Margaret, Lady Moir described herself as an \"engineer by marriage\" through her relationship with Ernest Moir. Several of the women who went on to be founding members of WES were also involved in the women's suffrage movement, including Katharine Parsons and her daughter, Rachel Parsons, Lady Moir, Laura Annie Willson (who was arrested twice for suffragette activities) and Caroline Haslett.\nThe 1911 census recorded no woman listing her profession as an engineer. However, at the start of the 20th century in the UK, there were greater opportunities for women to study at university and there were more instances of women studying for degrees in physics, mathematics, and engineering subjects. Nina Cameron Graham graduated from University of Liverpool in 1912 with a degree in Civil Engineering, the first British woman to qualify as an engineer. She married a fellow student and moved to Canada. Electrical Engineer and businesswoman Margaret Partridge studied maths at Bedford College, graduating in 1914. Aeronautical engineer Hilda Lyon went to study maths at Newnham College, Cambridge in 1915. Many women attended Loughborough College (now University), which admitted the first cohort of women engineers in 1919, including mechanical engineer Verena Holmes and engineer, writer and traveller Claudia Parsons. Georgina Kermode's career as socialite, suffragette, metallurgist and serial patentee (in particular the first successful postage stamp selling machines), seems to have emerged from her early marriage to an engineer, whom she soon left behind. Many women gained engineering experience during World War One. As men were away fighting, jobs in factories had to be filled by women. Women in engineering such as Dorothée Pullinger, Rachel Parsons, Margaret Dorothea Rowbotham and Laura Annie Willson all learned important aspects of their trades through working during World War One, particularly in the production of munitions. Recognition of the roles naval architects Blanche Thornycroft, Eily Keary, and Rachel Parsons played was recognised on 9 April 1919 when they became the first three women to be admitted as associate members by the Royal Institution of Naval Architects, Keary having been the first woman to contribute a paper in the institution's transactions in 1916.\nOnce the war was over, these jobs were threatened by the Restoration of Pre-War Practices Act (1919), which stated that the jobs women filled had to be handed back to the men returning from the front. Another act of parliament later in 1919 attempted to improve women's professional and educational rights. The Sex Disqualification (Removal) Act 1919 received Royal Assent on 23 December 1919. The act enabled women to join the professions and professional bodies (including those representing the engineering professions), to sit on juries and be awarded degrees:\n\"A person shall not be disqualified by sex or marriage from the exercise of any public function, or from being appointed to or holding any civil or judicial office or post, or from entering or assuming or carrying on any civil profession or vocation, or for admission to any incorporated society (whether incorporated by Royal Charter or otherwise)...\"\nIt was an enabling act, not an enforcing one, but did open the doors of the professional engineering institutions to women who could earn the qualifications and had the professional experience required to pass the entry examinations.\nThe Women's Engineering Society - the first of its kind in the world - was founded on 23 June 1919 to protect the jobs that women had gained during World War One and to continue promoting the place of women in engineering. Seven women signed the foundation documents: Eleanor Shelley-Rolls, Margaret, Lady Moir, Laura Annie Willson, Margaret Rowbotham, Katharine Parsons, Rachel Parsons and Janetta Mary Ornsby. The first Secretary appointed was Caroline Haslett, who had trained as a boiler-maker during World War One, and was later made a Dame for her services to industry and business. The United States equivalent, the Society of Women Engineers (SWE), was founded in 1950.Through these new opportunities, the 1920s and 1930s in the UK were an active time for women in engineering and WES. In 1923 Elsie Louisa Winterton, a draughtswoman working for the Great Western Railway (GWR) became the first woman member of the Institution of Railway Signal Engineers.In 1924, members of WES, including Caroline Haslett, Margaret Moir and Margaret Partridge founded the Electrical Association for Women. This association aimed to educate women about electricity, providing courses in Electrical Housecraft and demonstrations at electrical showrooms. It published The Electrical Handbook for Women, a guide to electricity, which was re-issued (though with different names) until 1983. That same year, engineering project manager Kathleen M. Butler travelled to London to set up the project offices for the Sydney Harbour Bridge team at Dorman Long, at the same time that Dorothy Donaldson Buchanan started work at the company.\nIn July 1925 the First International Conference of Women in Science, Industry & Commerce was held in London, during the British Empire Exhibition. It was organised by Caroline Haslett & WES, and opened by the Duchess of York in her first public engagement since her marriage into the royal family. Chaired by Lady Astor, the first woman MP to take her seat in the House of Commons, its speakers and attendee list represented key figures in the suffrage and women's rights movements in Britain and abroad, including Millicent Fawcett, Viscountess Rhondda, Kerstin Hesselgren the first woman elected to Upper House of the Swedish parliament and American engineer Ethel H. Bailey.\nAlso in 1925, Annette Ashberry was the first woman to be elected to the UK Society of Engineers and delivered the first address by a woman to the Society's members on 1 November 1926.\nCareers developed in companies such as Metropolitan Vickers in Manchester, where engineer Gertrude Entwisle worked for her entire career. In 1927, Dorothy Donaldson Buchanan successfully passed the admission examination to become the first female member of the Institution of Civil Engineers. In 1929 Winifred Hackett was the first woman to graduate in electrical engineering from the University of Birmingham. By the 1950s Hackett was head of the Guided Weapons Division at aerospace and defence company English Electric.\nIn 1934, pilot and engineer Amy Johnson became the youngest president of WES, serving under her married name of 'Mrs Jim Mollison', four years after becoming the first woman to fly solo from the UK to Australia. That same year, Jeanie Dicks, the first female member of the Electrical Contractors Association, was responsible for the first permanent electrification of Winchester Cathedral. A register of members from 1935 shows the international membership of WES and the variety of different women who were members.\nBefore World War Two, German Jewish engineer Ira Rischowski took refuge in the United Kingdom, becoming a member of WES, having already been in correspondence with them at the start of the War. Because of her German heritage, she was interned as an enemy alien at the Rushen camp on the Isle of Wight but returned to an engineering career once freed in 1942. In 1938, Marja Ludwika Ziff (later known as Maria Watkins) became the first woman to study electrical engineering at the University of Edinburgh, the professor who had offered her a place believing her application was from a Polish man. She later became a defence engineer and university lecturer.\nWomen continued to play an active role in engineering in World War Two and WES were vocal about promoting women's place in industry. Women proved once again their ability to take on roles seen as exclusively for men, while women with formal training in engineering from before the War were able to demonstrate their innovative capacity. Aeronautical engineer Beatrice Shilling, for example, engineered the RAE restrictor for use in Hurricane and Spitfire planes, which had previously been failing during air battle.Isabel Hardwich, electrical engineer and photometry expert joined the Metropolitan-Vickers Electrical Company Ltd. in Manchester in 1941, and later became supervisor of technical women within their Research Department, as well as a president of WES.\nAlthough women who had gained engineering opportunities in both industry and the forces during World War Two were forced out of those positions in an almost identical situation to that following World War One, there were enough women sufficiently established in senior roles in government research establishments, such as the Royal Aircraft Establishment, Building Research Establishment and similar, that there continued to be more openings for women. Beatrice Shilling, for instance, remained at the RAE to work on rocket engines and was consulted by NASA on runway surfaces for the future space shuttles. In the same era, Anne Burns introduced the use of strain gauges for inflight testing, contributing to solving the reasons for the Comet airliner crashes of the 1950s.In 1947 Mary Thompson Irvine became the first woman to be elected a chartered member of the Institution of Structural Engineers. In the early 1950s Mary Coombs became the first woman to work on a commercial computer, the LEO computer. In 1954, Mary Sudbury became the only female engineer to work on the wind tunnels used for supersonic aircraft testing at RAE, and part of the development of Concorde, but still encountered petty misogyny. In 1958 Dorothy Smith, an electrical engineer at Metropolitan-Vickers, was awarded Full Membership of the Institution of Electrical Engineers, the first woman since Hertha Ayrton in 1899, to reach this level of membership.\nIn 1962, Steve Shirley founded software company Freelance Programmers with a capital of £6, (later FI, then Xansa, since acquired by Steria and now part of the Sopra Steria Group). Having experienced sexism in her workplace, \"being fondled, being pushed against the wall\", she wanted to create job opportunities for women with dependents, and predominantly employed women, with only three male programmers in the first 300 staff, until the Sex Discrimination Act 1975 made that practice illegal. She also adopted the name \"Steve\" to help her in the male-dominated business world, given that company letters signed using her real name were not responded to. Her team's projects included programming Concorde's black box flight recorder.\nIn 1967, WES led the organisation of the second International Conference of Women Engineers and Scientists, held in Cambridge. The conference was attended by delegates from across the globe, with many international speakers, including from African and Asian countries.\nTidal engineer Mary Kendrick began leading the team working on the Thames Barrier in 1968. She later became the first female Acting Conservator of the River Mersey responsible for keeping the River Mersey navigable, a role dating back to 1625.\nIn 1969, Shirley Williams MP, then Minister for Education and Science, launched the first Women in Engineering Year campaign in conjunction with WES to encourage girls and young women to take up engineering as a career.\nAlthough numbers were tiny until the 1970s, increasing numbers of women started to take university degrees and trade qualifications in engineering subjects. It was still a period when a talented person could rise from the technician ranks without a degree, as defence engineer Joan Lavender was able to do at DeHavillands and engineering software designer Judy Butland was able to do at Manchester University and then with her own software business. The defence industry, aviation and the emerging computer hardware and software industries were areas when many women found careers at that time. Examples include Elizabeth Killick, WES presidents Elizabeth Laverick and Peggy Hodges and the founder of the UK's first independent commercial software company, Dina St Johnston.\nIn 1979 the Finniston Report into the engineering profession in the United Kingdom was commissioned by the Labour government. This ultimately led to the foundation of the Engineering Council in 1981, which in its turn collaborated with the Equal Opportunities Commission (EOC) to launch the Women into Science and Engineering (WISE) year in 1984. Spearheaded by Baroness Beryl Platt, Chair of the EOC and herself an aeronautical engineer, WISE aimed to highlight the career opportunities for girls and women in science and engineering professions. At the time of the launch of WISE, only 7% of engineering graduates in the UK were women.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_6" +} \ No newline at end of file diff --git a/test/Engineering/Mineral_Products_Association.json b/test/Engineering/Mineral_Products_Association.json new file mode 100644 index 0000000000000000000000000000000000000000..095a47e50f979228baa541e8b0b8307c3df8f9db --- /dev/null +++ b/test/Engineering/Mineral_Products_Association.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "The Mineral Products Association (MPA) is the United Kingdom trade association for the aggregates, asphalt, cement, concrete, dimension stone, lime, mortar, and silica sand industries.\nThe MPA, with the affiliation of the British Association of Reinforcement, British Calcium Carbonates Federation, Eurobitume UK, and United Kingdom Quality Ash Association, has a growing membership of 520 companies and is the sectoral voice for mineral products. MPA membership is made up of the vast majority of independent SME quarrying companies throughout the UK, as well as the nine major international and global companies. It covers 100% of UK cement production, 90% of aggregates production, 95% of asphalt and over 70% of ready-mixed concrete and precast concrete production. Each year the industry supplies £22 billion worth of materials and services to the UK economy and is the largest supplier to the construction industry, which has annual output valued at £144 billion. Industry production represents the largest materials flow in the UK economy and is also one of the largest manufacturing sectors.The MPA was formed in March 2009 from the merger of the Quarry Products Association, the British Cement Association and The Concrete Centre. It was officially launched in June 2009.The MPA has offices in London, Glasgow and Fron in Wales.QPA Northern Ireland is affiliated to the MPA and has offices in Crumlin, County Antrim. The British Precast Concrete Federation (BPCF), the trade association of precast concrete manufacturers, is a member of the MPA and is based in Leicester.\nThe MPA has regional divisions, for London & South East, South West, East Anglia, Midlands, Wales, North, Scotland and Northern Ireland.\nThe Concrete Centre was formed in 2003 and since 2009 has been part of the MPA. The Concrete Centre promotes the use of concrete in construction through the provision of resources to enable designers to follow best practice for the design of concrete and masonry. The Concrete Centre publishes a journal, Concrete Quarterly which was first published by the Cement and Concrete Association in 1947. The journal showcases the use of concrete in construction projects in the United Kingdom and worldwide. The CQ archive is available online.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_7" +} \ No newline at end of file diff --git a/test/Engineering/Pressure_Equipment_Directive_(EU).json b/test/Engineering/Pressure_Equipment_Directive_(EU).json new file mode 100644 index 0000000000000000000000000000000000000000..573282f256586b60bbb9322d644a3ed207cff339 --- /dev/null +++ b/test/Engineering/Pressure_Equipment_Directive_(EU).json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "The Pressure Equipment Directive (PED) 2014/68/EU (formerly 97/23/EC) of the EU sets out the standards for the design and fabrication of pressure equipment (\"pressure equipment\" means steam boilers, pressure vessels, piping, safety valves and other components and assemblies subject to pressure loading) generally over one liter in volume and having a maximum pressure more than 0.5 bar gauge. It also sets the administrative procedures requirements for the \"conformity assessment\" of pressure equipment, for the free placing on the European market without local legislative barriers. It has been mandatory throughout the EU since 30 May 2002, with 2014 revision fully effective as of 19 July 2016. The standards and regulations regarding pressure vessels and boiler safety are also very close to the US standards defined by the American Society of Mechanical Engineers (ASME). This enables most international inspection agencies to provide both verification and certification services to assess compliance to the different pressure equipment directives. From the pressure vessel manufactures PED does not generally require a prior manufacturing permit/certificate/stamp as ASME does.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_8" +} \ No newline at end of file diff --git a/test/Engineering/Resilience_week.json b/test/Engineering/Resilience_week.json new file mode 100644 index 0000000000000000000000000000000000000000..a82d8ea592c01d183f2f111f7aa13b89da9cf33b --- /dev/null +++ b/test/Engineering/Resilience_week.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "Resilience week is an annual symposium established to enable cross-disciplinary and role based discussions to advance strategies and research that engenders resilience in critical infrastructure systems and communities. Damaging storms, cyber attack and the interconnection of critical infrastructure systems can lead to cascading events that not only affect local but also across regions. However, many of these interdependencies are not easily recognized and obscure and complicate the mitigation of risk. The purpose of the symposia series is hence to facilitate best practice in managing critical infrastructure risks, by bringing together businesses, government and researchers.\nOriginally organized in 2008 as a focus on the new research area of resilient control systems, including the disciplinary areas of control system, cyber-security, cognitive psychology and any number of critical infrastructure domains. Resilience has long been recognized as an area that requires not only the contributions of multiple disciplines or multidisciplinary participation, but interdisciplinary interaction where there is a common language and familiarity of the contributors to what other disciplines (and roles) contribute. The resulting interactions developed by Resilience Week and associated activities are intended to culture this sharing environment as a safe zone for inclusion; more importantly, an environment that lends to developing the new science and practice.As the attributes of resilience are complex, the contributions and topics for the event have included both the disciplinary and the project considerations, in keynotes, panels and research presentations. Keynotes have included senior leadership in the Department of Energy, Department of Defense, Department of Homeland Security, the National Science Foundation, and other agencies in addition to National Academy and professional organization fellows and senior industry leaders. Project panels and research presentations include emergent topics in resilience to climate change, cyber attack, damaging storms and the energy assurance. \nProceedings are developed for each year of the event, documenting the diversity of the research and engagements within these topical areas.\nSince its inception, the Resilience Week community has evolved from one that primarily included only university researchers to one that includes many government laboratories, universities and private industries in the US and internationally. This type of collaboration forms a feedback loop that informs the research with the current needs and hones best practices. The future of the event is to further advance discussions that advance investment, recognize priorities and expedite technologies and tools to proactively address our energy future, in light of the natural and manmade challenges, and rationalizing the complex relationships that exist in critical infrastructure.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_9" +} \ No newline at end of file diff --git a/test/Engineering/Social_construction_of_technology.json b/test/Engineering/Social_construction_of_technology.json new file mode 100644 index 0000000000000000000000000000000000000000..981380f39bad8407a84356d7c46d173d4240eefb --- /dev/null +++ b/test/Engineering/Social_construction_of_technology.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "Social construction of technology (SCOT) is a theory within the field of science and technology studies. Advocates of SCOT—that is, social constructivists—argue that technology does not determine human action, but that rather, human action shapes technology. They also argue that the ways a technology is used cannot be understood without understanding how that technology is embedded in its social context. SCOT is a response to technological determinism and is sometimes known as technological constructivism.\nSCOT draws on work done in the constructivist school of the sociology of scientific knowledge, and its subtopics include actor-network theory (a branch of the sociology of science and technology) and historical analysis of sociotechnical systems, such as the work of historian Thomas P. Hughes. Its empirical methods are an adaptation of the Empirical Programme of Relativism (EPOR), which outlines a method of analysis to demonstrate the ways in which scientific findings are socially constructed (see strong program). Leading adherents of SCOT include Wiebe Bijker and Trevor Pinch.\nSCOT holds that those who seek to understand the reasons for acceptance or rejection of a technology should look to the social world. It is not enough, according to SCOT, to explain a technology's success by saying that it is \"the best\"—researchers must look at how the criteria of being \"the best\" is defined and what groups and stakeholders participate in defining it. In particular, they must ask who defines the technical criteria success is measured by, why technical criteria are defined this way, and who is included or excluded. Pinch and Bijker argue that technological determinism is a myth that results when one looks backwards and believes that the path taken to the present was the only possible path.\nSCOT is not only a theory, but also a methodology: it formalizes the steps and principles to follow when one wants to analyze the causes of technological failures or successes.\nAt the point of its conception, the SCOT approach was partly motivated by the ideas of the strong programme in the sociology of science (Bloor 1973). In their seminal article, Pinch and Bijker refer to the Principle of Symmetry as the most influential tenet of the Sociology of Science, which should be applied in historical and sociological investigations of technology as well. It is strongly connected to Bloor's theory of social causation.The Principle of Symmetry holds that in explaining the origins of scientific beliefs, that is, assessing the success and failure of models, theories, or experiments, the historian/sociologist should deploy the same kind of explanation in the cases of success as in cases of failure. When investigating beliefs, researchers should be impartial to the (a posteriori attributed) truth or falsehood of those beliefs, and the explanations should be unbiased. The strong programme adopts a position of relativism or neutralism regarding the arguments that social actors put forward for the acceptance/rejection of any technology. All arguments (social, cultural, political, economic, as well as technical) are to be treated equally.The symmetry principle addresses the problem that the historian is tempted to explain the success of successful theories by referring to their \"objective truth\", or inherent \"technical superiority\", whereas s/he is more likely to put forward sociological explanations (citing political influence or economic reasons) only in the case of failures. For example, having experienced the obvious success of the chain-driven bicycle for decades, it is tempting to attribute its success to its \"advanced technology\" compared to the \"primitiveness\" of the Penny Farthing, but if we look closely and symmetrically at their history (as Pinch and Bijker do), we can see that at the beginning bicycles were valued according to quite different standards than nowadays. The early adopters (predominantly young, well-to-do gentlemen) valued the speed, the thrill, and the spectacularity of the Penny Farthing : in contrast to the security and stability of the chain-driven Safety Bicycle. Many other social factors (e.g., the contemporary state of urbanism and transport, women's clothing habits and feminism) have influenced and changed the relative valuations of bicycle models.\nA weak reading of the Principle of Symmetry points out that there often are many competing theories or technologies, which all have the potential to provide slightly different solutions to similar problems. In these cases, sociological factors tip the balance between them: that's why we should pay equal attention to them.\nA strong, social constructivist reading would add that even the emergence of the questions or problems to be solved are governed by social determinations, so the Principle of Symmetry is applicable even to the apparently purely technical issues.\nThe Empirical Programme of Relativism (EPOR) introduced the SCOT theory in two stage.The first stage of the SCOT research methodology is to reconstruct the alternative interpretations of the technology, analyze the problems and conflicts these interpretations give rise to, and connect them to the design features of the technological artifacts. The relations between groups, problems, and designs can be visualized in diagrams.Interpretative flexibility means that each technological artifact has different meanings and interpretations for various groups. Bijker and Pinch show that the air tire of the bicycle meant a more convenient mode of transportation for some people, whereas it meant technical nuisances, traction problems and ugly aesthetics to others. In racing air tires lent to greater speed.\nThese alternative interpretations generate different problems to be solved. For the bicycle, it means how features such as aesthetics, convenience, and speed should be prioritized. It also considers tradeoffs, such as between traction and speed.\nThe most basic relevant groups are the users and the producers of the technological artifact, but most often many subgroups can be delineated : users with different socioeconomic status, competing producers, etc. Sometimes there are relevant groups who are neither users, nor producers of the technology, for example, journalists, politicians, and civil organizations. Trevor Pinch has argued that the salespeople of technology should also be included in the study of technology. The groups can be distinguished based on their shared or diverging interpretations of the technology in question.Just as technologies have different meanings in different social groups, there are always multiple ways of constructing technologies. A particular design is only a single point in the large field of technical possibilities, reflecting the interpretations of certain relevant groups.The different interpretations often give rise to conflicts between criteria that are hard to resolve technologically (e.g., in the case of the bicycle, one such problem was how a woman could ride the bicycle in a skirt while still adhering to standards of decency), or conflicts between the relevant groups (the \"Anti-cyclists\" lobbied for the banning of the bicycles). Different groups in different societies construct different problems, leading to different designs.The second stage of the SCOT methodology is to show how closure is achieved.Over time, as technologies are developed, the interpretative and design flexibility collapse through closure mechanisms. Two examples of closure mechanisms:\nRhetorical closure: When social groups see the problem as being solved, the need for alternative designs diminishes. This is often the result of advertising.\nRedefinition of the problem: A design standing in the focus of conflicts can be stabilized by using it to solve a different, new problem, which ends up being solved by this very design. As an example, the aesthetic and technical problems of the air tire diminished, as the technology advanced to the stage where air tire bikes started to win the bike races. Tires were still considered cumbersome and ugly, but they provided a solution to the \"speed problem\", and this overrode previous concerns.\nClosure is not permanent. New social groups may form and reintroduce interpretative flexibility, causing a new round of debate or conflict about a technology. (For instance, in the 1890s automobiles were seen as the \"green\" alternative, a cleaner environmentally-friendly technology, to horse-powered vehicles; by the 1960s, new social groups had introduced new interpretations about the environmental effects of the automobile, eliciting the opposite conclusion.)\nMany other historians and sociologists of technology extended the original SCOT theory.This is often considered the third stage of the original theory.For example, Paul N. Edwards shows in his book \"The Closed World: Computers and the Politics of Discourse in Cold War America\" the strong relations between the political discourse of the Cold War and the computer designs of this era.\nIn 1993, Langdon Winner published a critique of SCOT entitled \"Upon Opening the Black Box and Finding it Empty: Social Constructivism and the Philosophy of Technology.\" In it, he argues that social constructivism is an overly narrow research program. He identifies the following specific limitations in social constructivism:It explains how technologies arise, but ignores the consequences of the technologies after the fact. This results in a sociology that says nothing about how such technologies matter in the broader context.\nIt examines social groups and interests that contribute to the construction of technology, but ignores those who have no voice in the process, yet are affected by it. Likewise, when documenting technological contingencies and choices, it fails to account for those options that never made it to the table. According to Winner, this results in conservative and elitist sociology.\nIt is superficial in that it focuses on how the immediate needs, interests, problems and solutions of chosen social groups influence technological choice, but disregards any possible deeper cultural, intellectual or economic origins of social choices concerning technology.\nIt actively avoids taking any kind of moral stance or passing judgment on the relative merits of the alternative interpretations of a technology. This indifference makes it unhelpful in addressing important debates about the place of technology in human affairs.\nOther critics include Stewart Russell with his letter in the journal Social Studies of Science titled \"The Social Construction of Artifacts: A Response to Pinch and Bijker\".\nDeborah Deliyannis, Hendrik Dey, and Paolo Squatriti criticize the concept of social construction of technology for being a false dichotomy with a technologically determinist straw man that ignores third, fourth and more alternatives, as well as for overlooking the process of how the technology is developed as something that can work. For example, accounting for which groups would have interests in a windmill cannot explain how a windmill is practically constructed, nor does it account for the difference between having the knowledge but for some reason not using it and lacking the knowledge altogether. This distinction between knowledge that have not yet been invented and knowledge that is merely prevented from being used by commercial, bureaucratic or other socially constructed factors, which it is argued that SCOT overlooks, is argued to explain the archaeological evidence of rich technological cultures in the aftermath of the collapse of civilizations (such as early medieval technology in the aftermath of the collapse of the Roman Empire, which was much richer than it is depicted as by the \"Dark Medieval\" stereotype) as a result of technology being remembered even when prevented from being used with the potential to being put into use when the artificial repression is no longer in place due to societal collapse.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_10" +} \ No newline at end of file diff --git a/test/Engineering/Tests_of_Engineering_Aptitude,_Mathematics,_and_Science.json b/test/Engineering/Tests_of_Engineering_Aptitude,_Mathematics,_and_Science.json new file mode 100644 index 0000000000000000000000000000000000000000..dbc100d2948019c82ebbe5aed13dacfdec43b84d --- /dev/null +++ b/test/Engineering/Tests_of_Engineering_Aptitude,_Mathematics,_and_Science.json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "Tests of Engineering Aptitude, Mathematics, and Science (TEAMS) is an annual competition originally organized by the Junior Engineering Technical Society (JETS). TEAMS is an annual theme-based competition for students in grades 9:12, aimed at giving them the opportunity to discover engineering and how they can make a difference in the world.\nThe TEAMS competition was created in 1975 at the University of Illinois for the state of Illinois. In 1978, JETS expanded TEAMS to become a national competition. In 1993, the TEAMS test changed format into a format very similar to the one used today. Since 2008, the TEAMS competitions have had a theme.The 2010 theme for the TEAMS competition delved in the problems engineers face while providing access to clean water. It was named for Samuel Taylor Coleridge's famous quote, \"Water, water, everywhere, / Nor any drop to drink.\"\nThis competition is divided in two parts. The first part, lasting an hour and a half, has 80 multiple choice questions. Each group of ten questions is related to a specific problem relating to the overall theme. The second part consists of eight open-ended tasks that are aimed at encouraging teamwork to develop the best answer. This competition is taken part by each participating school in a regional competition; the scores at that date determine the standings in the regional, state, and national level. There are six school divisions, one home division, one group division and two levels (9th/10th grade level & 11th/12th grade level).Each team consists of eight high school students. A school may submit multiple teams. Thousands of teams participate in this competition each year.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_11" +} \ No newline at end of file diff --git a/test/Engineering/Washington_Accord_(credentials).json b/test/Engineering/Washington_Accord_(credentials).json new file mode 100644 index 0000000000000000000000000000000000000000..179637db5368dbca8480a0b461db0e71885d6b4d --- /dev/null +++ b/test/Engineering/Washington_Accord_(credentials).json @@ -0,0 +1,49 @@ +{ + "domain": "Engineering", + "document": "The Washington Accord is an international accreditation agreement for undergraduate professional engineering academic degrees and postgraduate professional \nengineering academic degrees between the bodies responsible for accreditation in its signatory countries. The full signatories as of January 2024 are Australia, Bangladesh, Canada, China, Costa Rica, Hong Kong, India, Indonesia, Ireland, Japan, Korea, Malaysia, Mexico, New Zealand, Pakistan, Philippines, Peru, Russia, Singapore, South Africa, Sri Lanka, Taiwan, Turkey, the United Kingdom and the United States.\nThe Washington Accord recognizes that there is substantial equivalence of programs accredited by those signatories. Graduates of accredited programs in any of the signatory countries are recognized by the other signatory countries as having met the academic requirements for entry to the practice of engineering. Recognition of accredited programs is not retroactive but takes effect only from the date of admission of the country to signatory status.The Washington Accord covers both undergraduate and postgraduate engineering degrees. Engineering technology programs are not covered by the accord. Engineering technology programs are covered under the Sydney Accord and Dublin Accord. Only qualifications awarded after the signatory country or region became part of the Washington Accord are recognized. The accord is not directly responsible for the licensing of professional engineers and the registration of chartered engineers but it does cover the academic requirements that are part of the licensing processes in signatory countries.The following are the signatory countries and territories of the Washington Accord, their respective accreditation bodies and years of admission:", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "Creator", + "SetInPeriod", + "CommissionedBy", + "UsedBy", + "InspiredBy", + "SupportsProgrammingLanguage", + "LocatedIn", + "HasParts", + "PartOf", + "Founded", + "FoundedBy", + "Father", + "PublishedIn", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Engineering_12" +} \ No newline at end of file diff --git a/test/Entertainment/Anvil_firing.json b/test/Entertainment/Anvil_firing.json new file mode 100644 index 0000000000000000000000000000000000000000..38563cc286ff4ff9672cdc46aed79eea9767114d --- /dev/null +++ b/test/Entertainment/Anvil_firing.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Anvil firing (also known as anvil launching or anvil shooting) is the practice of firing an anvil into the air with gunpowder.\nIt is a traditional event held in New Westminster to celebrate Queen Victoria's birthday.\nIn the United Kingdom, the term refers to a method of testing anvils. Black powder was poured onto the top of the anvil and ignited. If the anvil did not shatter, it was deemed safe to use.\nTypically, two anvils are used: one as a base (placed upside down), and another one (also known as the \"flier\") as the projectile (placed right-side up, atop the base).An alternative method is to place the bottom anvil upright, and fill the hardy hole with black powder. A torus or washer, often made from a playing card, is placed over the hole, with a space for a fuse or powder trail. The top anvil is placed upside down, face to face with the bottom anvil.\nA technique for firing a single anvil uses a stone base. The space formed by the anvil's concave base is filled with black powder. Modern double-base powders have much higher energy densities, making them unsuitable. A fuse is made to project out, then lit, and the resulting deflagration sends the projectile anvil several feet into the air.\nAnvils were traditionally fired on St. Clement's Day, honoring Pope Clement I, the patron saint of blacksmiths and metalworkers.\nAlthough its practice has lessened in recent years, enthusiasts still participate in anvil launching events and competitions. On September 5, 2011, The Science Channel premiered Flying Anvils, a reality television series about anvil firing.\nIndividuals may be crushed by falling anvils. The black powder can also prematurely ignite when the top anvil is placed. As in any case where an explosive is confined on all sides by metal, shrapnel presents a hazard. If a damaged or structurally weak anvil is used, the anvil base may shatter upon ignition.The technique depends on the fact that black powder is a low explosive, which burns more rapidly when under pressure.A “21-anvil salute” replaced the traditional 21-gun salute on Victoria Day 1860 in New Westminster, British Columbia, after the town's cannon and status as capital of British Columbia was taken away.On November 7, 1864 during the American Civil War, the commander of the Iowa Home Guard militia in Davis County, Iowa, having no artillery piece at his disposal, ordered a local citizen to fire an anvil in the county seat at Bloomfield to alert militiamen in outlying townships in response to intelligence received of the presence of Confederate bushwhackers in Davis County. This was in response to a report of two suspected Confederate guerrillas at a residence in the neighborhood where they had demanded money and food and had terrorized the occupants, a Mr. and Mrs. Gore. The private citizen who carried out the order to fire the anvil was seriously injured.\nOne noteworthy celebration was held on the day the State of Texas voted to secede from the Union. On February 23, 1861, Texas Ranger and prominent Union supporter Thomas Lopton Campbell Jr. was held captive and forced to \"fire the anvils\" in the streets of Austin.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_0" +} \ No newline at end of file diff --git a/test/Entertainment/Aqua_drama.json b/test/Entertainment/Aqua_drama.json new file mode 100644 index 0000000000000000000000000000000000000000..45154e7856345caa6e4328d4fe3daa29d68ac34b --- /dev/null +++ b/test/Entertainment/Aqua_drama.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "The theatrical genre of aqua drama that was popular in 19th century France, England, and the United States involved flooding the arenas of circuses for recreations of major naval conflicts and similar aquatic events; some venues participated to such a great extent in this once-popular form as to install permanent water-tanks on stage. Water-based spectacles, especially those portraying great naval battles, had been popular in Roman times, when they were known as naumachia, and the custom was resurrected at various times during the Middle Ages.\nAt the start of the 19th century, the already established Sadler's Wells Theatre came under the management of Charles Dibdin, Jr., a man who had big plans for the theatre's future. In 1804, he installed a large 90x24x3ft water tank that covered the entire stage. The water used to fill the tank was pumped in from the New River, which was adjacent to the theatre, by an Archimedes wheel. This process took twelve men twelve hours: four men would work in four hour shifts and then rotate until the entire tank was full. Even though the tanks were drained and refilled every three weeks they would become filthy. The water would become dirty not only from the shows, but the actors would bathe in the tank, along with rowdy audience members jumping in to see if the water was real. The Aquatic Drama was popular in the early 19th century, and with Sadler's Wells on the outskirts of London, the audiences, especially in the pit were unruly, loud, and most likely drunk. The large water tank that these disruptive audience members would jump into was not the only tank in the theatre, Dibdin Jr. had a second 5x5x5 ft tank above the theatre that was used to simulate waterfalls.The first show Dibdin, Jr. and his crew put on was The Siege of Gibraltar. It opened in 1804, and it was a play that depicted the naval battle between the English Navy and the Spanish Armada. A playbill from this performance describes the battle in the show:\"the conflagration of the town in various places, the defense of the garrison, and attack by the floating batteries, [which] is so faithfully and naturally represented, that when the floating batteries take fire, some blowing up with a dreadful explosion, and others, after burning to the water’s edge, sink to the bottom; while the gallant Sir Roger Curtis appears in his boat to save the drowning Spaniards, the British tars for that purpose plunging into the water, the effect is such as to produce an unprecedented climax of astonishment and applause.\"\nThere were 177 ships on the liquid stage, all equipped with live guns and ready for battle. Over a hundred real scale sized naval ships would not have been able to fit in Sadler's Wells tanks, so Dibdin hired men who worked at the Woolwich Dockyards to build him smaller ships built at a one-inch per foot scale, with exact detailed imitation down to the rigging. Children were cast as some of the Spanish naval officers manning the tiny ships, and were seen “drowning” after the Spanish had been defeated. The climactic battle of the show was when the English and Spanish went head on, full force, with guns blazing, and the audience members saw incredible spectacle as the English triumphantly destroyed the Spanish Armada.\nIn 1823 Sadler's Wells presented the aqua drama entitled The Island or Christian and His Comrades which dramatized the main events of the Mutiny on board HMS Bounty. In order to alleviate a twenty-minute delay between a dry land scene and an aquatic scene, the stage was made to ascend to near the roof of the theatre, in full view of the audience.\nEventually the aqua drama slash began to ripple then calm as audience members were no longer pleased with what was being performed at Sadler's Wells. This could have been due to the fact that Dibdin, Jr. tried to reuse many of his 177 ships from the Siege of Gibraltar, and they were no longer new and exciting to the audiences, but also the Napoleonic wars could have contributed. According to Dan Cuickshank at BBC News, the Napoleonic wars were raging on during the early 1800s and England dipped its toes in the war waters in 1793 with the new Revolutionary France. After a decade of fighting the two countries finally signed at the Treaty of Amiens, which only lasted a month until in May 1803 war broke out between the two countries again. The initial declaration of war could have sparked a rise in nationalism with in England, being a contributing factor into the Dibden, Jr. and his aquatic drama's success. Britain was known for having a large and powerful navy, and they didn't mind flexing their muscles as they asserted themselves as the most powerful navy in Europe at the 1815 after their victory at Waterloo. The citizens of England would have known how powerful their countries navy was. Seeing shows, such as the ones being put at Sadler's Wells, reminded the English people of how strong their military was, making them feel proud and safe initially. Yet, after a few years into the war the citizens began to realize the horrors of war. According to Mather, they were exposed not only to the death of friends and family along with the fear of invasion, but also the raising of taxes to fund the military. A staggering 11.6 million, which is around 570 million pounds in today's market, was spent on forts alone, most of which were protecting dock yards. The British people became fed up with war, especially naval combat and eventually the tanks were taken out of the theatre. Removal of the tanks due to lack of popularity reflects the English nation's view of war.Even though the tanks were removed in 1824, aqua drama was a part of a long lasting theatre's history. The legacy left behind of aquatic theatre is only a few pages in books and websites, and a painting or two, but Sadler's Wells legacy has been alive and well since Richard Sadler first opened his music house in 1683. Since then the theatre has seen many triumphs and tragedies. After Charles Dibdin, Jr. resigned there was a false fire alarm during one of the shows which lead to 18 people being stampeded to death.In 1843 the theater was once again successful, as the actor manager Samuel Philips put on Shakespeare's plays. Sadly, in 1915 the doors to Sadler's Wells were closed. Lilian Baylis, who wanted everyone in London to have the privilege to see the mesmerizing art of theatre, raised the money to reopen Sadler's Wells. The Sadler's Wells legacy continued as it was once again able to share theatre's magic with the people of northern London in 1931. After many years of putting on progressive theatre that entertained northern London, the play aspect of Sadler's Wells eventually faded out, opera and dance became prominent. Around 1945 Sadler's Wells started to become a strictly dance performance hall. The theatre legacy was replaced over the next half century as the once music hall become an outstanding, well respected dance hall. Sadler's Wells still stands today, not in the same building, but with the murky water of Charles Dibdin, Jr.’s aquatic theatre running in its historic veins.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_1" +} \ No newline at end of file diff --git a/test/Entertainment/Delfines_Hotel_&_Convention_Center.json b/test/Entertainment/Delfines_Hotel_&_Convention_Center.json new file mode 100644 index 0000000000000000000000000000000000000000..2c46e88ba4ff66cd7bd45a62262ee033aab0a4dd --- /dev/null +++ b/test/Entertainment/Delfines_Hotel_&_Convention_Center.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "The Delfines Hotel & Convention Center, formerly known as the Delfines Hotel & Casino and commonly known as the Hotel Los Delfines, is a five-star hotel in San Isidro District, Lima, Peru. From its opening in 1997 until 2010, the hotel was best known for its two bottlenose dolphins, Yaku and Wayra, who gave the hotel its name.\nThe hotel, owned by Jacques Levy Calvo—a Peruvian businessman and banker of French-Jewish descent—and his siblings, opened on July 15, 1997, intended to attract foreign businessmen visiting the city. Its name came from the two dolphins that were trained by Levy's (then) wife, María Elena Llanos. At the time of its opening, it was the first hotel able to host more than 1,000 in an event hall.In 2008, the hotel's \"Salón Mediterráneo\" event hall was one of the locations where meetings of that year's summit of the Asia-Pacific Economic Cooperation were held.\nYaku (born c. 1988) and Wayra (born c. 1992) are two male and female bottlenose dolphins that served as the hotel's namesake and main attraction from 1997 to 2010. Born off the coasts of Cuba, they were smuggled to Mexico, where they became known as \"Yoyo\" and \"Laly\" until their arrival to Peru, where they were moved to the hotel and renamed to the Quechua words for \"water\" and \"air\", respectively.The dolphins' arrival to Peru in 1997 after their purchase the year before led to an immediate response by animal welfare groups in the country, with the Judiciary of Peru ruling in favour of the hotel, concluding that the pool where they were kept was built prior to the creation of any regulations regarding the maintenance of captive dolphins. Consequently, the dolphins remained in the hotel, accessible to its guests and reportedly exposed to the show lights and street noise.\nIn 2010, both dolphins were moved from the hotel to another pool in a hill near La Herradura, a beach in Chorrillos District. The new site's poor conditions were condemned by local media, with its small size (12 m in diameter and 3.5 m deep) being highlighted. All visits ceased to be allowed in 2011.\nDuring the entirety of her captivity, Wayra became pregnant four times with ultimately no calf surviving due to the conditions they lived in. The one calf she gave birth to is alleged to have been crushed by her due to the small size of the hotel pool.\nBoth dolphins were reportedly moved to Dolphin Cove Jamaica, a dolphinarium in Jamaica, on July 18, 2014. These claims have since been disputed, however, by former caretaker Ursula Behr, who was once denied a visit to the dolphins in June 2014. María Elena Llanos, Levy's ex-wife, also denounced the lack of transparency and possible abuse in the animals' transport, highlighting that Yaku's cardiac issues could be fatal if not treated properly.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_2" +} \ No newline at end of file diff --git a/test/Entertainment/Dumb_Ways_to_Die.json b/test/Entertainment/Dumb_Ways_to_Die.json new file mode 100644 index 0000000000000000000000000000000000000000..ae0bb223a6c87c154718cd451e21b05f8d48cd57 --- /dev/null +++ b/test/Entertainment/Dumb_Ways_to_Die.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Dumb Ways to Die is an Australian public awareness campaign video and media franchise made by Metro Trains in Melbourne, Victoria to promote railway safety. The original cartoon public service announcement for the awareness campaign went viral on social media after it was released on the internet in November 2012, amassing over 320 million views on YouTube. The campaign's animation was later developed into an mobile app available to iOS and Android devices. \nOn 1 October 2021, PlaySide Studios acquired the Dumb Ways to Die franchise for A$2.25 million from Metro. PlaySide Studios also released an NFT called BEANS on 3 February 2022.\nThe campaign was devised by advertising agency McCann Melbourne. It appeared in newspapers, local radio and outdoor advertising throughout the Metro Trains network and on Tumblr. John Mescall, executive creative director of McCann, said \"The aim of this campaign is to engage an audience that really doesn't want to hear any kind of safety message, and we think dumb ways to die will.\" McCann estimated that within two weeks, it had generated at least $50 million worth of global media value in addition to more than 700 media stories, for \"a fraction of the cost of one TV ad\". According to Metro Trains, the campaign contributed to a 20% reduction in \"near-miss\" accidents compared to the annual average, or 30% with respect to the same time of the year before from 13.29 near-misses per million kilometres in November 2011 : January 2012, to 9.17 near-misses per million kilometres in November 2012 : January 2013.The video was art directed by Patrick Baron, animated by Julian Frost and produced by Cinnamon Darvall. It was uploaded to YouTube on 14 November 2012 and made public two days later. It featured characters known as \"Beans\", each bearing names such as \"Numpty,\" \"Hapless,\" \"Pillock,\" and \"Dippy\" (the first four beans in the video, listed in order of appearance) dying as a result of their own stupidity (doing such unwise things as setting their own hair on fire or provoking a grizzly bear); the final three beans shown in the video, named \"Stumble\", \"Bonehead\", and \"Putz\", all die as a result of unsafe behavior at train stations and/or railways, which are deemed \"the dumbest ways to die\". The animated video has two versions, one in English, and one in Spanish, titled \"Formas Tontas de Morir.\"\nThe song \"Dumb Ways to Die\" from the video was written by John Mescall and co created with Patrick Baron, music by Ollie McGill from the Cat Empire, who also produced it. It was performed by Emily Lubitz, the lead vocalist of Tinpan Orange, with McGill providing backing vocals. The band on the recording consists of Gavin Pearce on bass, Danny Farrugia on drums and Brett Wood on guitar. It was released on iTunes, attributed to the artist \"Tangerine Kitty\" (a reference to Tinpan Orange and The Cat Empire).The song, with a tempo of 128 beats per minute, is written in C major and a time signature of 4/4.\nCharts\nOn 6 May 2013, Metro released a Dumb Ways to Die game as an app for iOS devices. The game, developed by Julian Frost, Patrick Baron and Samuel Baird, invites players to avoid the dangerous activities engaged in by the various characters featured throughout the campaign. Within the app, players can also pledge to \"not do dumb stuff around trains.\" The activities include things like getting toast out with a fork and poking a stick at a grizzly bear.An Android version was released in September 2014. \nThe game is similar to games in the WarioWare series. The game presents minigames based on the animated music video in rapid succession and becomes faster and more difficult the longer the game is played.\nA sequel titled Dumb Ways to Die 2: The Games was released on 18 November 2014. In the sequel, there are a lot more varieties of challenges in each particular building, and each building has a particular theme. Before a train arrives at a building, the player plays a challenge to counter something related to trains. If successful, bonus points can be earned at the end of the game. There are 8 challenges each in every building. Like the original game, the game's characters do plenty of dangerous and unsafe activities. Lives can be lost by \"dying\" in one of the activities. The player has three chances to prevent the characters from dying.\nThe game is recently also available as a web and mobile-web version by MarketJS, license holder of the HTML5 web IP.\nA second sequel titled Dumb Ways to Die 3: World Tour was released on 21 December 2017. Unlike the previous games which both involved the player playing minigames and trying to prevent the characters from dying, here the player collects coins from houses that are fixed up from being initially broken. The houses are fixed by the player playing a new minigame for each area containing those houses.\nA third sequel titled Dumb Ways to Die 4 was released on Android and iOS on May 2, 2023.\nA spinoff was also released, titled Dumb Ways to Draw on 5 May 2019. In the game, the player has to draw lines with in-game pens to guide the characters to their goals. But they also have to prevent the characters' deaths by dangers. It also had a colouring section to colour and share drawings as well as a \"trace the picture\" section, in which the player is required to hold the screen until a line of sufficient length is drawn to trace the given diagram. The sequel titled Dumb Ways to Draw 2 was released on 23 December 2022.\nAnother spinoff, titled Dumb Ways to Dash was released on 13 December 2019. The player has to guide their character in a 3D race against other characters to the finish line while avoiding the obstacles.\nA third spinoff, titled Dumb Ways to Die: Superheroes was released on 25 June 2020. It has similar gameplay to the previous spinoff.\nThe Metro Trains has also published a number of other videos on its YouTube channel, \"Dumb Ways to Die\", including trailers of the games, a video centered on the MIFF, a series of Christmas-themed short videos, Halloween-themed videos, clips of the characters appearing in real life, and some other videos centered on Train Safety.Susie O'Brien in the Herald Sun in Melbourne criticised the ad for trivialising serious injuries and being about advertisers' ego rather than effective safety messages.Simon Crerar of the Herald Sun wrote that the song's \"catchy chorus was the most arresting hook since PSY's Gangnam Style.\" Alice Clarke writing in the Herald Sun described the video as \"adorably morbid\" and wrote that Victoria's public transport \"broke its long running streak of terrible ads\".\nDaisy Dumas of the Sydney Morning Herald described it as \"darkly cute—and irksomely catchy\" and the chorus as \"instant earworm material\".\nMichelle Starr of CNET described the campaign as the Darwin Awards meets The Gashlycrumb Tinies and the song as \"a cutesy indie-pop hit in the style of Feist\".\nLogan Booker of Gizmodo described it as \"taking a page out of the Happy Tree Friends book and mixing cute with horrifying\".\nKaren Stocks of YouTube Australia said the video was unusual due to the high number of views from mobile devices. Stocks attributed the success to \"A snappy headline. A catchy tune that gets stuck in your head. And a message that is easy to understand and perfectly targeted.\"\nThe Sunshine Coast Daily described it as \"the Gangnam Style of train safety campaigns\".\nArlene Paredes of the International Business Times said the video was \"brilliant in getting viewers' attention\" and \"arguably one of the cutest PSAs ever made.\"\nThe campaign received some criticism on the basis that suicide is one of the most influential causes of rail trauma, and the ad reinforces deadly trains as a possible suicide method. Writing in Mumbrella in February 2013, a former employee of Victoria's Department of Infrastructure advised critical thinking when evaluating claims made regarding improvements to safety. Reference was made specifically to the claimed 20 per cent reduction in risky behaviour as being \"social media bullshit\".In February 2013, Artemy Lebedev's blog was censored by Roskomnadzor, the Russian government agency in charge of Internet censorship, for including the video. Later that day, the YouTube video was also censored, with the \"This content is not available in your country due to a legal complaint from the government\" message. The official takedown notice sent to Livejournal.com was quoted, in part, by Lebedev in his blog.The song's lyrics contains a description of different ways of committing suicide, such as: using drugs beyond their expiration date, standing on an edge of a platform, running across the rails, eating superglue and other. The animated personages demonstrate dangerous ways of suicide in attractive for children and teenagers comic format. The lines such as \"Use a clothes dryer as a hiding place\" and \"I wonder what's this red button do?\" contain an incitement to commit those acts.\nDespite this, the video was still included into the ABC Show and was shown in more than 50 cities across Russia.\nThe campaign won seven Webby Awards in 2013 including the Best Animation Film & Video and Best Public Service & Activism (Social Content & Marketing).It won three Siren Awards, run by Commercial Radio Australia, including the Gold Siren for best advertisement of the year and Silver Sirens for the best song and best campaign.\nThe public service announcement was awarded the Grand Trophy in the 2013 New York Festivals International Advertising Awards.\nIn June 2013, the campaign clip won the Integrated Grand Prix at the Cannes Lions International Festival of Creativity, and overall, won five Grand Prix awards, 18 Gold Lions, three Silver Lions, and two Bronze Lions, which was the most for any campaign in the festival's history.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_3" +} \ No newline at end of file diff --git a/test/Entertainment/Elegiac_comedy.json b/test/Entertainment/Elegiac_comedy.json new file mode 100644 index 0000000000000000000000000000000000000000..a95663170f8485ffcdf51b4cc2a96ccd7d595253 --- /dev/null +++ b/test/Entertainment/Elegiac_comedy.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Elegiac comedy was a genre of medieval Latin literature—or drama—represented by about twenty texts written in the 12th and 13th centuries in the liberal arts schools of west central France (roughly the Loire Valley). Though commonly identified in manuscripts as comoedia, modern scholars often reject their status as comedy. Unlike Classical comedy, they were written in elegiac couplets. Denying their true comedic nature, Edmond Faral called them Latin fabliaux, after the later Old French fabliaux, and Ian Thomson labelled them Latin comic tales. Other scholars have invented terms like verse tales, rhymed monologues, epic comedies, and Horatian comedies to describe them. The Latin \"comedies\", the dramatic nature of which varies greatly, may have been the direct ancestors of the fabliaux but more likely merely share similarities. Other interpretations have concluded that they are primitive romances, student juvenilia, didactic poems, or merely collections of elegies on related themes.\nSome elegiac comedies were adapted into vernacular language in the later Middle Ages, and retold by major vernacular writers such as Boccaccio, Chaucer, and Gower. The poem Pamphilus has Venetian and Old French versions.\nThese comedies were composed in a high style, but they were typically about low or unimportant subject matter; lyric complaints only sometimes mixed with amorous content. They combined the plot and character types of the Greek \"new comedy\" practised by Terence and Plautus, but the greatest influence on them was Ovid. His Ars amatoria, Amores, and Heroides were highly influential. Plautus, though less widely read in the Middle Ages, was also an influence, as were the Scholastic debates concerning the nature of universals and other contemporary philosophical problems, with which the elegiac comedies often dealt, always humorously but no doubt sometimes to a serious end.The elegiac dramatists delight in \"showing off\" their Latin skills. Their use of rhetoric, logic, and various grammatical constructions suggest that they may have been used in the schools as exercises in poetic composition and philosophical argument. The language of their \"fools\" can be deliberately outlandish, and their deft use of puns is frequently sexual in nature. Parody is another typical element of elegiac humour. Persons of low rank are often placed in positions unsuited to them. Their bumbling, as when a rustic attempts to speak philosophically or the commoner pretends he is a chivalrous gentleman, is portrayed for its satiric effect. Satire is often employed in long digressions criticizing the corruption of the times, specifically targeting the selling of church offices, political corruption at court, sycophants’ attempts to rise in society, and aristocrats’ attempts to philosophize. In the Middle Ages, satire was usually considered a breed of comedy.\nThe comedies were often about a sexual conquest, in which the lover must use his guile to overcome obstacles such as guardians, rivals, and reluctance on the part of the woman. The setting is some unspecified time contemporary with the poet, and the characters are all typical and have names descriptive of their traits and function in the story. The lack of resources on the part of the hero forces him to resort to deception and to employ intermediaries (as Ovid did in his narratives) in order to win the object of his desire.The elegiac comedies bear limited dramatic features. Thompson denies their theatricality, saying that \"no ancient drama would ever have been written in elegiacs.\" A similar opinion is that the comedies are rhetorical exercises. Medieval poetic theory, however, did not regard comedy and elegy as mutually exclusive, nor identical. John of Garland wrote \"all comedy is elegy, but the reverse is not true.\" Other arguments raised against the dramatic performance of the comedies is, in general, their large number of narrative segments as opposed to dialogue. Arnulf of Orléans, one of the elegiac writers, seems to have considered his work to have been made for the stage. These performances may have been narrated, mimed, or sung.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_4" +} \ No newline at end of file diff --git a/test/Entertainment/Metagame.json b/test/Entertainment/Metagame.json new file mode 100644 index 0000000000000000000000000000000000000000..f1bdd25a0a433fe429692b8a955ca2ad48942fb6 --- /dev/null +++ b/test/Entertainment/Metagame.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "A metagame, broadly defined as \"a game beyond the game\", typically refers to either of two concepts: a game which revolves around a core game; or the strategies and approaches to playing a game. A metagame can serve a broad range of purposes, and may be tied to the way a game relates to various aspects of life.  \nIn competitive games, the metagame can refer to the most popular strategy, often called a game's meta, or preparation for a match in general. \nIn tabletop role-playing game, metagaming has been used to describe players discussing the game, sometimes simply rules discussions and other times causing the characters they control to act in ways they normally would not within the story.\nThe word metagame is composed of the Greek-derived prefix meta: (from μετά, meta, meaning \"beyond\") and the noun game. The shorthand meta has been backronymed as \"Most Effective Tactics Available\" to tersely explain the concept. Metagame was used in the context of playing zero-sum games in a publication by the Mental Health Research Institute in 1956. It is alternately claimed that the first known use of the term was in Nigel Howard's book Paradoxes of Rationality: Theory of Metagames and Political Behavior published in 1971, where Howard used the term in his analysis of the Cold War political landscape using a variation of the Prisoner's Dilemma.,  however Howard used the term in Metagame Analysis in Political Problems published in 1966. In 1967, the word appeared in a study by Russell Lincoln Ackoff and in the Bulletin of the Operations Research Society of America.In casual gaming, the metagame generally refers to any meaningful interaction between players and elements not directly part of the game. The concept gained traction in game design in a column written in 1995 by Richard Garfield, the creator of Magic: The Gathering, for The Duelist. In a 2000 talk at the Game Developers Conference, Garfield expanded on this, defining metagame as \"how a game interfaces beyond itself\", and asserted that this can include \"what you bring to a game, what you take away from a game, what happens between games, [and] what happens during a game\".  Stephanie Boluk and Patrick Lemieux extend and refine Garfield's term to apply to potentially all forms of play and gaming, arguing that metagames are often more important than video games themselves.  They go on to describe that metagaming \"results from the entanglement of philosophical concepts, the craft of game design, and the cultures of play that surrounds videogames.\"In the world of competitive games, rule imprecisions and non-goal oriented play are not commonplace. As a result, the extent of metagaming narrows down mostly to studying strategies of top players and exploiting commonly-used strategies for an advantage. Those may evolve as updates are released or new, better, strategies are discovered by top players. The opposite metagame of playing a relatively unknown strategy for surprisal is often called off-meta.This usage is particularly common in games that have large, organized play systems or tournament circuits. Some examples of this kind of environment are tournament scenes for tabletop or computer collectible card games like Magic: The Gathering, Gwent: The Witcher Card Game or Hearthstone, tabletop war-gaming such as Warhammer 40,000 and Flames of War, or team-based multiplayer online games such as Star Conflict, Dota 2, League of Legends, and Team Fortress 2. In some games, such as Heroes of the Storm, each battleground has a different metagame.\nThe meta in these environments is often affected by new elements added by the game's developers and publishers, such as new card expansions in card games, or adjustments to character abilities in online games. The metagame may also come within player communities as reactions to win over currently-popular strategies, creating ebbs and flows of strategy types over time.\nIn competitive games, more pervasive forms of metagaming like teaming in free-for-all multiplayer games can be interpreted as cheating or as bad sportsmanship. Writer Richard Garfield's book, Lost in the Shuffle: Games Within Games, considers instead teaming as just a form of metagaming. The practice of losing individual games to dodge stronger opponents in tournaments has also been interpreted as a form of metagaming, sometimes considered as unfair.Exploiting the meta is commonplace in esports. In StarCraft, a player's previous matches with the same opponent have given them insight into that player's play style and may cause them to make certain decisions which would otherwise seem inferior. Another instance of using the meta in esports was in 2012 at The International, a Dota 2 competition, when one team was able to exploit \"predictable, economical strategies and that summer's metagame, the in-game decisions and team configurations that were fashionable\" to counter a play by the other team. In fighting games, the meta is also played through character selection. The opposing character has various strengths that can be avoided and weaknesses that can be exploited more easily depending on the character you choose provided you are aware of those strengths and weaknesses (called a \"match up\"). For a basic example, a character with a projectile attack has the advantage over a grappler who must be close to the opponent to be effective. Match up metagaming is very important in tournament settings. In recent fighting games, blind select has been implemented for online modes. This makes it so that neither player can see what character the other player chose. In tournaments, players have the option to opt for a blind select where they tell a judge in confidence the character they intend to select in the match, making their character choice mandatory. A newer trend in more recently released titles is to allow the selection of multiple characters at once which the player can then switch between on the fly, rendering match-up picking excessively hard and virtually impractical.\nIn popular trading card games, such as Magic: The Gathering, Pokémon Trading Card Game, or Yu-Gi-Oh! Trading Card Game players compete with decks they have created in advance and the meta consists of the deck types that are currently popular and expected to show up in large numbers in a tournament. The knowledge of metagame trends can give players an edge against other participants, both while they are playing by quickly recognizing what kind of deck opponents have and guessing their likely cards or moves, and during the deck building process, by selecting cards that do well against current popular deck types at the possible expense of performance against rarer ones. Another example of metagaming would be bluffing opponents into expecting cards that you do not have, or surprising the competition with novel decks that they may not be prepared for. The secondary market of cards is heavily influenced by metagame trends: cards become more valuable when they are popular, often to the point of scarcity.Competitive chess has a well-defined meta in the form of chess openings and chess schools. A particular example are hypermodern openings. They became popular after World War I as high-ranked players like Aron Nimzowitsch started to play them. A popular off-meta is to play unpopular openings for humor or for strategically denying subsequent use of opening theory.\nMore narrowly, the playing history (meta) of a player or small group of players can be used to gain an advantage. A scholar's mate is a special set of moves can allow a player to win in four moves, usually by and against beginners. An example where this meta can be exploited by the opponent is as follows: competitor A has been watching Competitor B play chess, and the past five games in a row Competitor B has attempted to use this four-move win. When Competitor A sits down to play against Competitor B, Competitor A can play in a way to give them an advantage, assuming Competitor B repeats this line.\nIn tabletop role-playing games, metagaming can refer to aspects of play that occur outside of a given game's fictional universe. In particular, metagaming often refers to having an in-game character act on knowledge that the player has access to, but the character should not. For example, having a character bring a mirror to defeat Medusa when they are unaware her gaze can petrify them, or being more cautious when the game is run by a merciless gamemaster.Some consider metagaming to benefit oneself bad sportsmanship. It is frowned upon in many role-playing communities, as it upsets suspension of disbelief, and affects game balance. However, some narrativist indie role-playing games deliberately support metagaming and encourage shared storytelling among players.\nThe metagame for game developers refers to the extra set of rules and logic that are independent of the core gameplay. This can involve extra progressions or an economic market appended to the core gameplay that add mid- and long-term goals for players. Some researchers argue that having a metagame for players can increase user engagement with those games.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_5" +} \ No newline at end of file diff --git a/test/Entertainment/Musical_canine_freestyle.json b/test/Entertainment/Musical_canine_freestyle.json new file mode 100644 index 0000000000000000000000000000000000000000..a9ab062f71ca69ae8c225a6dd4f5391eeda6e09f --- /dev/null +++ b/test/Entertainment/Musical_canine_freestyle.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Musical canine freestyle, also known as musical freestyle, freestyle dance, and canine freestyle, is a modern dog sport that is a mixture of obedience training, tricks, and dance that allows for creative interaction between dogs and their owners. The sport has developed into competition forms in several countries around the world.\nMusical freestyle started in many places almost simultaneously around 1989, with demonstrations of the talent of heeling to music being shown in Canada, England, the United States, and the Netherlands within three years of each other. The main unifying element among the groups was an interest in more creative obedience demonstrations and dog training, a love of music, and, in many cases, inspiration from an equine sport called musical kur, which was a more creative and dynamic form of dressage.The first official musical freestyle group, Musical Canine Sports International, was founded in British Columbia, Canada, in 1991. Soon, other groups followed in the United States and England. Each region began developing its own style, with many American groups promoting more trick-based routines and costumes. English groups focused more on heel work and on the dog, and less on costumes and design. Musical freestyle has become more common in animal talent shows and specialty acts.\nTeaching a dog to be able to work on both sides of the handler's body, not just the left side as in standard obedience heeling, is the first step to doing freestyle. The trainer first breaks the routine into pieces with only two or three moves linked together, and as they progress these pieces are linked together.There are two types of musical canine freestyle, freestyle heeling (also known as heelwork to music) and musical freestyle.\nHeelwork to music focuses on a dog's ability to stay in variations of the heel position while the handler moves to music. In heel work to music, the dog and trainer remain close to each other at all times. Sending the dog away or doing distance work is not part of the routine, with the dog remaining almost invisibly tethered to the trainer. Pivots, and moving diagonally, backwards, and forwards to a suitable musical theme are important to the routine. Jumping, weaving, rolling, passing through the trainer's legs and anything else considered \"not heeling\" is not allowed.Musical freestyle demands that the dog perform a variety of tricks and other obedience talents. In musical freestyle, heel work can be combined with other moves such as leg weaving, sending the dog away, moving together at a distance, and more dramatic tricks such as jumping, spinning, bowing, rolling over. Dancing in place, and other innovative actions where the dog plays off the dance moves of the trainer are encouraged. A popular finishing trick for some routines is for the dog to jump into the trainer's arms, or over his or her back.Currently, there are several organizations regulating competitive freestyle, such as Rally Freestyle Elements, the World Canine Freestyle Organization, Canine Freestyle Federation, Dogs Can Dance and the Musical Dog Sport Association in the United States, Paws 2 Dance Canine Freestyle Organization in Canada, Canine Freestyle GB in Great Britain, and Pawfect K9 Freestyle Club in Japan. In the UK, the sport is called Heelwork to Music and is an officially recognized sport of the Kennel club.Competition rules vary from group to group, and from country to country, but most are based on a variety of technical and artistic merit points. All routines are done free of training aids or leashes, except in some beginner categories. Competition can be done as a single dog-and-handler team, as a pair of dogs and handlers, or as a full team of three or more dogs and their handlers. Generally, there is only one dog per handler for competition.\nIn either type of competition, the choice of music and the way the routine reflects the music is important. Routines not following the rhythm, no matter how well executed, do not score well.\nExhibition freestyle is a no-holds-barred routine designed to demonstrate the full extent of creativity and excitement that musical freestyle can offer. Though highly entertaining and representing what most people see on television or at events, it allows for moves, props, cues, and costumes that would not usually be allowed on the competition circuit.\nRally Freestyle Elements (Rally FrEE) combines the trick behaviors of Canine Musical Freestyle with the format of Rally-Obedience.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_6" +} \ No newline at end of file diff --git a/test/Entertainment/Nonchalance.json b/test/Entertainment/Nonchalance.json new file mode 100644 index 0000000000000000000000000000000000000000..654d45900166b6f5b58635ee51a2f592742182d1 --- /dev/null +++ b/test/Entertainment/Nonchalance.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Nonchalance began as an art collective in Oakland, California around 2002, and later in 2008 was transformed into a design consultancy group. Their work focuses on interactive, immersive art installations, which they call \"situational design\".\nNonchalance was launched by Jeff Hull around 2002. Their first project was the street art campaign called Oaklandish. Original projects included a wheat-paste poster series, the \"Oakland-Love Retrospective\" slide show (projected onto downtown architectural landmarks), the Liberation Drive-In parking lot movie series, and the Oakslander Lakeside Gazette zine. These projects aimed to infuse cultural content into negative urban spaces during a time of rapid development in the city.In 2008, Nonchalance created The Jejune Institute, an alternate reality game, public art installation and immersive experience that ran in San Francisco, California, from 2008 to 10 April 2011. The Jejune Institute featured a narrative that made use of live actors, puzzles, phone calls, radio transmissions, staged protests, and interactive promenade theater. It centered on characters such as the eponymous Jejune Institute and its founder, the rebel group the Elsewhere Public Works Agency, and a rebellious young woman named Eva.Over the course of three years, it enrolled more than 10,000 players who, responding to eccentric flyers plastered all over the city, started the game by receiving their \"induction\" at the fake headquarters of the institute, located in an office building in San Francisco's Financial District.\nIn 2015, Nonchalance opened the Latitude Society, an invite-only secret society and immersive experience. It featured a clubhouse, an arcade, and regular social events. The Latitude Society closed after one year, at least partially due to an operating cost of $3,000 per day.From 2021 to 2022, Nonchalance ran a podcast called SYGNYL, \"a participatory-arts podcast\" inviting the audience to participate in \"small collaborative acts in the real world.\"The Jejune Institute won \"Best World\" and \"Best Story\" at Indiecade 2010, and \"Best Alternate Reality\" in the SF Bay Guardian's \"Best of the Bay 2010\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_7" +} \ No newline at end of file diff --git a/test/Entertainment/Rene_van_Helsdingen.json b/test/Entertainment/Rene_van_Helsdingen.json new file mode 100644 index 0000000000000000000000000000000000000000..6a603a9497098077f305894603457aea325569ec --- /dev/null +++ b/test/Entertainment/Rene_van_Helsdingen.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Rene Peter Onno Rubiono van Helsdingen (born 25 February 1957) is a Dutch pianist and composer.\nHe studied classical music with Komter Loeber in Blaricum in the Netherlands from 1962:72. Then he studied jazz music with Terry Trotter and Lazlo Cser in Los Angeles in 1979. His earliest influences include Oscar Peterson, McCoy Tyner and Bill Evans.\nOver the years pianist René has recorded and produced for many different labels, such as Virgin, Timeless, WEA, Dureco, Zebra Acoustic, Pacific Music, Turning Point records, Munich Records, demajors Independent Music Industry Jakarta and his own labels: Relukreul records, and Helsdingen Music, The Netherlands. Helsdingen writes most of his repertoire. Australian newspaper The Age characterised him as \"A rewarding pianist who can play comfortably in the groove, or create more impressionistic patterns, or quiet, subtle musings. Perhaps the most notable quality of his solos is brevity. René allows himself a few extended workouts and avoids the trap of repeating himself or overstating his case.\"\nHelsdingen has organized many successful tours, projects and festivals sponsored by NGOs, governmental institutions, companies to which he was responsible with regard to the control over the budgets made available.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_8" +} \ No newline at end of file diff --git a/test/Entertainment/Rule_63.json b/test/Entertainment/Rule_63.json new file mode 100644 index 0000000000000000000000000000000000000000..0f55e91bcf831c68c07bf9d1ce483b179e57619e --- /dev/null +++ b/test/Entertainment/Rule_63.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Rule 63 is an Internet meme that states that, as a rule, \"for every character there is a gender swapped version of that character\". It is one of the \"Rules of the Internet\" that began in 2006 as a Netiquette guide on 4chan and were eventually expanded upon by including deliberately mocking rules, of which Rule 63 is an example. It began to see general use in fandom communities as a term to refer to both fan-made and official gender flips of existing fictional characters.\nPrior to the creation of Rule 63, gender flipping was popularized in video games in the 1990s by the finishing move of Darkstalkers character Demitri Maximoff, a vampire. Called the \"Midnight Bliss\", it involved tossing a rose at a character to transform them into a helpless maiden and completely drain them of life energy. This meant that female versions of all the game's male characters had to be created, as well as those of Street Fighter and SNK characters when SNK vs. Capcom included Maximoff. These female interpretations became popular and resulted in large amounts of fan art, as well as prompting art of gender-swaps of other male and female characters.Rule 63 was created in mid-2007 as an addition to the humorous \"Rules of the Internet\", originally created around the end of 2006 on 4chan. It lists two statements:\n\"for every given male character, there is a female version of that character\", and\n\"for every given female character, there is a male version of that character\".\nThe trope, originally seen primarily unofficially, later became more widely disseminated in popular culture, with critics stating that it had been \"recognized by Hollywood\".\nRule 63 is commonly used as a term to refer to gender-swapped interpretations of existing characters in fanworks, such as fan art, fan fiction and cosplay, and it is particularly pervasive in the anime and manga community, where communities sprang up built around romantic gender-swap relationships. It also often overlaps with the creation of moe anthropomorphic female versions of non-human, male characters. A well-known example of this is Bowsette, a female version of the Mario antagonist Bowser that became one of the most popular Internet memes of 2018. However, it has also been used by critics to refer to official characters who are gender-swapped versions of older characters or fictional beings, such as Number Six from Battlestar Galactica being a \"sexy female\" version of a Cylon Centurion, and the female main cast of the 2016 reboot of Ghostbusters.The creation of Rule 63 cosplays such as gender-swapped superheroes has been cited as popular among female cosplayers as giving them the ability to portray roles beyond socially approved gendered scripts. It is seen as empowering, allowing cosplayers to wear clothing and weapons usually not afforded to female characters. However, certain characters with inherent gender fluidity are said to work better than others. Such gender-bending cosplay, which allows the cosplayer to choose what behavior enhances the performance, can be contrasted with crossplay, which completely immerses the cosplayer in the codes of another gender.\nAdventure Time received a spin-off series entitled Fionna and Cake, based on the eponymous episode of the original show, which featured Fionna and Cake, gender-swapped versions of Finn and Jake as main characters, as well as genderbent versions of other characters that later featured in other episodes.The 2016 Ghostbusters reboot featured a cast of female leads that was called \"proof of Rule 63\", with similarities noted between each team member and one of the original male team members. It was called an official acknowledgement of what was formerly an unofficial, fan-driven phenomenon.\nIn an episode of The Loud House titled One of the Boys, Lincoln has a dream of traveling to an alternate dimension where all his sisters are male. Near the end of the episode, he travels to another dimension where he is female. A picture of him and a female version of Clyde, his best friend, can be seen in \"her\" room.\nIn an episode of Malcolm in the Middle, season 4, episode 10, titled \"If Boys Were Girls\", Lois pictures Reese, Malcolm, and Dewey as girls, named Renee, Mallory, and Daisy, respectively. Francis is also a girl named Frances, with Christopher Kennedy Masterson in drag.\nIn the Mario series, the fan-made Bowsette is a female version of the male antagonist Bowser, created through the use of the Super Crown, a power-up that imparts the appearance and abilities of Princess Peach on its user. Nintendo's official clarification is that the item is only usable by Toadette, and the creation of Bowsette is \"technically impossible\".In Shovel Knight, a \"Body Swap Mode\" (originally called \"Gender Swap\") was added after it was funded as a Kickstarter goal, allowing the player to change the secondary sex characteristics of every major character in the game (and, independently, their pronouns) via the settings menu. The developers endeavored to maintain parity with the original character designs by only making their swapped version as gendered as the original, as well as matching their existing personality and gameplay.\nIn the Zelda series, the character Linkle was created by Nintendo as an alternate-universe gender-swap of the typical main character, Link. However, she does not possess his powers, and is instead a normal girl who dual-wields a pair of crossbows. Made playable in Hyrule Warriors Legends, she was also modded into The Legend of Zelda: Breath of the Wild by a fan to replace Link. The character Sheik, who Princess Zelda has the ability to transform into in The Legend of Zelda: Ocarina of Time, has been called the most iconic example of female-to-male gender-swapping in gaming, although Sheik has both male and female characteristics.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_9" +} \ No newline at end of file diff --git a/test/Entertainment/Varsity_Spirit.json b/test/Entertainment/Varsity_Spirit.json new file mode 100644 index 0000000000000000000000000000000000000000..e1bf844b9db4387267ec0b67ee12ad4a2d1f01cb --- /dev/null +++ b/test/Entertainment/Varsity_Spirit.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "Varsity Spirit, LLC, also known as Varsity, is an American cheerleading company owned by Varsity Brands. Founded in 1974 as the Universal Cheerleaders Association, the company is a manufacturer of apparel for cheerleading and dance teams, organizer of cheerleading competitions, and operator of training camps and sanctioning bodies. \nThe company's vertical integration of competitive cheerleading has faced criticism, including accusations of anti-competitive and monopolistic practices (including opposition to cheerleading being sanctioned as a sport), conflicts of interest via control of governing bodies, and institutionalizing high financial costs for participation in competitive cheerleading. In 2023 and 2024, Varsity and its previous owners agreed to settle multiple class action lawsuits, including those surrounding high financial costs, and conflicts of interest with the U.S. All Star Federation.\nVarsity Spirit was founded by Jeff Webb, a yell leader at the University of Oklahoma contemplating law school. After working as a summer camp instructor for Lawrence \"Herkie\" Herkimer's National Cheerleaders Association (NCA), he attempted, but failed, to acquire part of the company.In 1974, Webb established the Universal Cheerleaders Association (UCA), in an effort to raise the profile of cheerleading, initially by establishing training camps, and later through promotional campaigns and its National College Cheerleading Championship (which was first held in 1978) and its National High School Cheerleading Championship (which was first held in 1980). Cheerleading had seen declines in participation due to the growth of women's sports following the introduction of Title IX. \nWebb first operated the company out of his apartment, and only made a profit of US$850 (equivalent to $5,251 in 2023) during his first year of operations. By 2002, Webb estimated that Varsity Spirit held about half of the market, and that 60% of its revenue came from apparel. In 2003, Varsity backed the formation of the U.S. All Star Federation, a sanctioning body for \"all-star\" cheerleading competitions involving teams from private gyms. \nIn 2004, Varsity acquired National Spirit Group, owner of the NCA (which Webb estimated to have a 25% market share in 2002), giving it control of the sheer majority of the cheerleading industry. In 2005, it acquired the Knoxville-based Athletic Championships LLC and Premier Athletics LLC. In 2007, it backed the formation of USA Cheer, a non-profit led by Webb which aimed to be a sanctioning body for cheerleading (with a goal to back cheerleading as a proposed Olympic event).\nIn 2011, Varsity Brands merged with Herff Jones, an Indianapolis-based manufacturer of class rings, caps and gowns, and yearbooks; Webb was named president and COO in December 2012, and the merged company took on the Varsity Brands name in 2014. In 2012, it acquired American Cheerleader magazine from Macfadden Communications Group, with the publishers of Memphis-based teen magazine Justine producing the magazine. Charlesbank Capital Partners acquired Varsity Brands in 2014, after which it began to place a larger focus on club-based \"all-star\" cheerleading. In 2015, it acquired JAM Brands, which had been the company's main competitor in the 2010s.\nIn 2016, Varsity Brands sued Star Athletica, a competing manufacturer of cheerleading uniforms established by The Liebe Company (which was formerly contracted with Varsity), for copyright infringement over similarities in designs between their products. The Supreme Court ruled in favor of Varsity, establishing that aesthetic elements of a useful article can be protected if they are a copyrightable artistic work, and are identifiable as art when mentally separated from the practical aspects of the item.\nIn 2017, BSN Sports CEO Adam Blumenfeld replaced Webb as CEO.\nIn July 2019, the company introduced a new division, \"Varsity Pro\", which focuses on providing apparel and services for professional cheer and dance teams, such as those of professional sports franchises. The division's first partnership as outfitter was with the NBA's Memphis Grizzlies. It also acquired SA Feather Co. and Stanbury Uniforms to expand into the band market.\nOn December 9, 2020, Webb announced that he would step down from Varsity. In a 2021 interview with Sportico after the International Olympic Committee (IOC) voted to recognize the ICU, Webb stated that he had divested himself of Varsity, recently had \"a very favorable liquidity event\", and \"was looking around with what I want to do with this phase of my life.\" Varsity's former vice president of corporate alliances and business development, Marlene Cota, stated that Webb's role in the company had begun to lessen after the sale to Charlesbank. After his departure, Webb became the new co-publisher and senior news editor of the conservative publication Human Events.\nAmerican Cheerleader was the first and largest national teen magazine dedicated to covering sideline and competitive cheerleading. It was founded in 1995 and based in Memphis, Tennessee. Staff included Editor-in-Chief Jackie Martin and Managing Editor Kim Conley. Inspired by the popularity and competitive nature of cheerleading in the early 1990s, publishing executive Michael Weiskopf started a magazine to take advantage of its evolving culture. The first issue was published in New York in January 1995. It was published by Lifestyle Ventures, LLC, and the first issue featured University of Maryland cheerleader Penny Ramsey, who went on to become a castaway in Thailand on the CBS show Survivor in 2002. Special Collector's Editions were produced in February 2005 and February 2010 to commemorate the magazine's 10th and 15th anniversaries. Lifestyle Media, Inc. was acquired by Macfadden Performing Arts Media, LLC in 2006. Varsity Spirit bought the magazine in 2012.American Cheerleader covered training tips for stunting and tumbling, tryout advice, team building activities, beauty, fashion, fitness and how to balance schoolwork and cheer. All issues feature a Cheerleader of the Month, Spotlight Squad and Awesome Athletes. 'Cheerleaders of the Month' were recognized for their talent, academic achievement and community involvement. Past celebrity covers have included Debby Ryan, Erica Joy Allen, Krystyna Krzeminski, Kendall Jenner, Heather Morris, Francia Raisa, Christina Milian, Kirsten Dunst, Mýa, Hilarie Burton, Ashley Tisdale, and Olivia Holt. American Cheerleader has also made its way into every sequel of the Bring It On films.\nTheir website, Americancheerleader.com, featured cheer news and trends, training tips, featured athletes and step by step videos of stunting, tumbling and cheer skills.\nVarsity Spirit has been described as having a monopoly position in cheerleading in the United States, due to extensive vertical integration of apparel businesses, training camps, affiliated gyms, cheerleading competitions, and sanctioning bodies, as well as acquisitions of competitors.Varsity has been accused of engaging in anti-competitive practices; the company signs gyms to multi-year agreements, under which they receive rebates if they exclusively purchase apparel from the company, and participate in Varsity-run competitions. Only Varsity-owned brands are allowed to exhibit and market their apparel at its events, hindering the ability for competitors to do the same. Although there are no restrictions on use of non-Varsity apparel by participants in the competitions proper, in 2010 Webb testified that in at least one competition, teams received more points if they used Varsity-produced props. \nVarsity also has effective control of affiliated governing bodies for cheerleading. USA Cheer, a non-profit governing body for cheerleading, was established by Varsity Spirit with a no-interest loan, and is staffed by six contracted Varsity Spirit employees. The U.S. All Star Federation (USASF), a governing body for private cheer and dance squads, was formed in 2003 with financial backing by Varsity Spirit via a no-interest loan. Although Varsity Spirit officially states that it does not own the USASF, its board was effectively controlled by Varsity Spirit by means of six of its 15 board members, and by-laws requiring seven seats to be filled by representatives of a group of Varsity Spirit-controlled cheerleading and dance associations. The company also paid the salary of its president, and its vice president of events and corporate alliances. In 2011, the USASF threatened to ban its members from participating in Varsity-run events if they participate in competing world championships not run by the company. Varsity was also involved in the establishment of the International Cheer Union (ICU). Under a \"Stay Smart\" scheme, attendees of events were also required to book accommodations with specific providers vouched by Varsity, which were accused of having paid kickbacks to the company.\nVarsity Spirit and its affiliates have lobbied against proposals for cheerleading to be sanctioned as a sport, including proposals by California, and Texas's University Interscholastic League (UIL), arguing that this would result in increased oversight and regulation that would be detrimental to its business and self-oversight. In 2015, the UIL announced a pilot \"Spirit Championship\", whose judges would be trained and provided by Varsity Spirit.In 2010, Webb was called upon as an expert witness in a Title IX case involving Quinnipiac University, which had redirected money out of women's sports to its all-women cheerleading team under the argument that it was a sport. In his testimony, Webb stated that he did not consider cheerleading to be a sport, as he primarily considered Varsity's competitions to be a promotion for its lines of business. A federal judge held that cheerleading \"does not qualify as a varsity sport for the purposes of Title IX\".\nIn 2020, a proposed class action lawsuit was filed against Varsity Brands, alleging that it used its \"undue influence and control\" over affiliated bodies to maintain its monopoly in competitive cheerleading and scholastic apparel, including requiring participation in Varsity-run training camps in order to attend its competitions, participation in its insurance plans, and the aforementioned rebate program, which institutionalized financial costs for participation in competitive cheerleading. Varsity responded to the suit, arguing that they \"welcome the kind of competition that enhances the cheer marketplace\", and accused competitors of \"seeking to chill that marketplace through the Courts. We are contesting this flawed diversion from an otherwise dynamic industry with energy, resources and determination.\"In March 2023, Varsity Brands agreed to pay $43.5 million to settle one of the antitrust cases, Fusion Elite All Stars, et al. v. Varsity Brands LLC, et al,, targeting \"direct purchasers\"; under the settlement, Varsity agreed to stop paying the salaries of USASF executives, and prohibit its board members from occupying seats on the USASF board. In addition, the USASF agreed to not allow any one cheerleading body from controlling more than 40% of the voting seats on its board. In May 2024, Varsity settled Jessica Jones, et al., v. Varsity Brands, LLC, et al., with the company and its prior owners agreeing to pay out $82.5 million to \"indirect\" purchasers who paid for registration fees or purchased apparel from Varsity. As part of the settlement, Varsity also agreed to no longer require competitors to participate in its training camps, phase out the \"Stay Smart\" scheme, and to restrict the sharing of confidential information from other USASF members to Varsity..\nIn September 2020, USA Today published a report accusing governing bodies tied to Varsity Spirit of allowing 180 individuals (including coaches, choreographers, and others) indicted for child sexual abuse — 140 of whom having been convicted — to continue participating in activities. It found that their list of blacklisted individuals only contained 21 people, and was only amended and expanded following reports made by the paper.In September 2022, a federal lawsuit was filed in Memphis against Varsity Brands, Varsity Spirit, and the estate of Scott Foster (a gym owner who had killed himself while under investigation for child sexual abuse), by six alleged victims of Foster. The suit alleged negligence in violation of the Protecting Young Victims from Sexual Abuse and Safe Sport Authorization Act of 2017, including that Varsity made no effort to prohibit Foster from attending its sanctioned events, even after his suspension from the USASF in 2018.\nAll Varsity Spirit competitions follow a shared scoring system. This system varies slightly per team depending on the age, level, and coed of the division. Unlike previous seasons the 2021-2022 scoring system is based on 50 points instead of 100. This resulted in major shifts in the allocation of points within the sections of the cheerleading routines.Before the 2021-2022 season, the scoring system in Varsity Spirit and USASF governed competitions was straightforward. The scoring followed the main divisions of an all star cheerleading routine, stunts, pyramid, jumps, tosses, running tumbling, standing tumbling and dance. Each of these sections were allocated ten points, five for difficulty and five for execution except for dance. The scoring also allocated ten points for both performance and routine composition, five points to for stunt and pyramid creativity, and five points for stunt quantity. Lastly for coed teams five points were used to score coed stunts, non-coed teams were given a five. This scoring results in 100 possible points without deductions.\nThe 2021-2022 season scoring system changed most dramatically in that the major sections of the routine were no longer scored evenly. Stunts, pyramid, standing tumbling and running tumbling are allocated eight points, four for difficulty and four for execution; tosses and jumps were allocated four, two for difficulty and two for execution; and dance was only given two points. The amount allocated to routine composition dropped to two points while performance was dropped entirely, instead there are now two points allocated to a similar category, overall impression. Stunt and pyramid creativity are now allocated one point each. Another large change, mainly for all girl teams, is the change of the scoring sheet from coed teams to not coed teams. Meaning, coed teams still get scored on their coed stunts, unless they are an international team, however, the all-girl and international coed teams have the coed scoring section replaced with stunt quantity. This scoring results in 50 possible points which is doubled to obtain 100 possible points.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_10" +} \ No newline at end of file diff --git a/test/Entertainment/White_label.json b/test/Entertainment/White_label.json new file mode 100644 index 0000000000000000000000000000000000000000..92a639c7f39f95a8f9c48501f78e334f0d05ec2d --- /dev/null +++ b/test/Entertainment/White_label.json @@ -0,0 +1,62 @@ +{ + "domain": "Entertainment", + "document": "A white label record is a vinyl record with white labels attached. There are several variations each with a different purpose. Variations include test pressings, white label promos, and plain white labels.\nTest pressings, usually with test pressing written on the label, with catalogue number, artist and recording time or date, are the first vinyl discs made at the factory. Such discs are produced in very small quantities (usually no more than 5 or 6 copies) to evaluate the quality of the disc before mass production begins. A review of the test pressing may expose problems with the tape to disc transfer (mastering) and helps to ensure that the defective discs do not reach the public.In the United States, the term white label promo (often abbreviated as WLP) refers to a promotional pressing with a label that has mostly the same text and label logo/artwork as the commercial label, but with a white background instead of the color label or artwork found on commercial pressings. These are usually pressed in quantities of only a few thousand per title. Such copies may also contain biographies or pictures of the musical artists. Promotional copies are for distribution to journalists, music distributors or radio stations in order to assess consumer opinion.White label discs can be used to anonymously promote new artists or upcoming albums by veteran artists. In some cases plain white labels are issued to conceal artist identities (examples of this include songs by Traci Lords and La Toya Jackson), whose record companies issued white labels so that DJs would have no pre-conceived notions about the music from the artist name. Many dance music producers press copies of white labels in order to test crowd response in dance clubs to their own musical productions.Today, white labels are usually produced in small amounts (fewer than 300) by small record companies or DJs and are most popular with club and hip-hop music DJs. In the early 1990s, hardcore techno and house artists created tracks in home or local studios and had five-hundred or a few thousand singles pressed on 12\" white labels, which were easy to sell at dance music record stores.Steve Beckett of Warp Records recalls that \"shops would take fifty white labels off you for five pounds each, no problem. Dance music was all imports, then people in Britain started doing it for themselves, and their tracks started to get better than the tunes in America.\" Record labels like Warp, and Shut Up and Dance, were begun as white-label enterprises, providing cutting-edge dance music to pirate radio stations and music stores.\nSome white labels may contain unauthorized remixes or other recordings which are not licensed for release. Recordings not authorized by the artist or label are often called \"bootlegs\". White labels are referred to as \"promos\" (short for \"promotional copies\") that many top-name DJs receive and play weeks or months prior to the day of general release to the public. As artists using samples pay high fees for the privilege of such, they must be able to gauge the market potential of their tracks prior to approval. Recently, smaller promo services offer record companies a more economical means of distribution although these companies may not have the means to properly protect releases from illegal copying.The industry itself seems to be aware of this necessity and white labels are commonly accepted as a necessary evil within the industry, which has only prosecuted a small number of those artists using white labeled pressings of uncleared samples and compositions.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "PhysicallyInteractsWith", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "InspiredBy", + "NominatedBy", + "Contains", + "IsPollinatorOf", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "Causes", + "Founded", + "HasEffect", + "OriginalLanguageOfFilmOrTvShow", + "LanguageOfWorkOrName", + "LanguagesSpokenWrittenOrSigned", + "Producer", + "Performer", + "NativeLanguage" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Entertainment_11" +} \ No newline at end of file diff --git a/test/Food_and_drink/Custard.json b/test/Food_and_drink/Custard.json new file mode 100644 index 0000000000000000000000000000000000000000..7499a0418fbec056e4a82e7ba5b781fcb9c7d965 --- /dev/null +++ b/test/Food_and_drink/Custard.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Custard is a variety of culinary preparations based on sweetened milk, cheese, or cream cooked with egg or egg yolk to thicken it, and sometimes also flour, corn starch, or gelatin. Depending on the recipe, custard may vary in consistency from a thin pouring sauce (crème anglaise) to the thick pastry cream (crème pâtissière) used to fill éclairs. The most common custards are used in custard desserts or dessert sauces and typically include sugar and vanilla; however, savory custards are also found, e.g., in quiche.\nCustard is usually cooked in a double boiler (bain-marie), or heated very gently in a saucepan on a stove, though custard can also be steamed, baked in the oven with or without a water bath, or even cooked in a pressure cooker. Custard preparation is a delicate operation because a temperature increase of 3:6 °C (5.4:10.8 °F) leads to overcooking and curdling. Generally, a fully cooked custard should not exceed 80 °C (176 °F); it begins setting at 70 °C (158 °F). A bain marie water bath slows heat transfer and makes it easier to remove the custard from the oven before it curdles. Adding a small amount of cornflour to the egg-sugar mixture stabilises the resulting custard, allowing it to be cooked in a single pan as well as in a double-boiler. A sous-vide water bath may be used to precisely control temperature.While custard may refer to a wide variety of thickened dishes, technically (and in French cookery) the word custard (crème or more precisely crème moulée, [kʁɛm mule]) refers only to an egg-thickened custard.When starch is added, the result is called 'pastry cream' (French: crème pâtissière, pronounced [kʁɛm pɑtisjɛːʁ]) or confectioners' custard, made with a combination of milk or cream, egg yolks, fine sugar, flour or some other starch, and usually a flavoring such as vanilla, chocolate, or lemon. Crème pâtissière is a key ingredient in many French desserts, including mille-feuille (or Napoleons) and filled tarts. It is also used in Italian pastry and sometimes in Boston cream pie. The thickening of the custard is caused by the combination of egg and starch. Corn flour or flour thickens at 100 °C (212 °F) and as such many recipes instruct the pastry cream to be boiled. In a traditional custard such as a crème anglaise, where eggs are used alone as a thickener, boiling results in the over-cooking and subsequent curdling of the custard; however, in a pastry cream, starch prevents this. Once cooled, the amount of starch in pastry cream sets the cream and requires it to be beaten or whipped before use.\nWhen gelatin is added, it is known as crème anglaise collée ([kʁɛm ɑ̃ɡlɛz kɔle]). When gelatin is added and whipped cream is folded in, and it sets in a mold, it is bavarois. When starch is used alone as a thickener (without eggs), the result is a blancmange.\nIn the United Kingdom, custard has various traditional recipes some thickened principally with cornflour (cornstarch) rather than the egg component, others involving regular flour; see custard powder.\nAfter the custard has thickened, it may be mixed with other ingredients: mixed with stiffly beaten egg whites and gelatin, it is chiboust cream; mixed with whipped cream, it is crème légère, [kʁɛm leʒɛːʁ]. Beating in softened butter produces German buttercream or crème mousseline.\nA quiche is a savoury custard tart. Some kinds of timbale or vegetable loaf are made of a custard base mixed with chopped savoury ingredients. Custard royale is a thick custard cut into decorative shapes and used to garnish soup, stew or broth. In German, it is known as Eierstich and is used as a garnish in German Wedding Soup (Hochzeitssuppe). Chawanmushi is a Japanese savoury custard, steamed and served in a small bowl or on a saucer. Chinese steamed egg is a similar but larger savoury egg dish. Bougatsa is a Greek breakfast pastry whose sweet version consists of semolina custard filling between layers of phyllo.\nCustard may also be used as a top layer in gratins, such as the South African bobotie and many Balkan versions of moussaka.\nIn Peru, leche asada (\"baked milk\") is custard baked in individual molds. It is considered a restaurant dish.\nFrench cuisine has several named variations on custard:Recipes involving sweet custard are listed in the custard dessert category, and include:Custards baked in pastry (custard tarts) were very popular in the Middle Ages, and are the origin of the English word 'custard': the French term croustade originally referred to the crust of a tart, and is derived from the Italian word crostata, and ultimately the Latin crustāre.Examples include Crustardes of flessh and Crustade, in the 14th century English collection The Forme of Cury. These recipes include solid ingredients such as meat, fish, and fruit bound by the custard. Stirred custards cooked in pots are also found under the names Creme Boylede and Creme boiled. Some custards especially in the Elizabethan era used marigold (calendula) to give the custard color.\nIn modern times, the name 'custard' is sometimes applied to starch-thickened preparations like blancmange and Bird's Custard powder.\nStirred custard is thickened by coagulation of egg protein, while the same gives baked custard its gel structure. The type of milk used also impacts the result. Most important to a successfully stirred custard is to avoid excessive heat that will cause over-coagulation and syneresis that will result in a curdled custard.Eggs contain the proteins necessary for the gel structure to form, and emulsifiers to maintain the structure. Egg yolk also contains enzymes like amylase, which can break down added starch. This enzyme activity contributes to the overall thinning of custard in the mouth. Egg yolk lecithin also helps to maintain the milk-egg interface. The proteins in egg whites are set at 60:80 °C (140:176 °F).\nStarch is sometimes added to custard to prevent premature curdling. The starch acts as a heat buffer in the mixture: as they hydrate, they absorb heat and help maintain a constant rate of heat transfer. Starches also make for a smoother texture and thicker mouth feel.\nIf the mixture pH is 9 or higher, the gel is too hard; if it is below 5, the gel structure has difficulty forming because protonation prevents the formation of covalent bonds.\nCooked (set) custard is a weak gel, viscous, and thixotropic; while it does become easier to stir the more it is manipulated, it does not, unlike many other thixotropic liquids, recover its lost viscosity over time. On the other hand, a suspension of uncooked imitation custard powder (starch) in water, with the proper proportions, has the opposite rheological property: it is negative thixotropic, or dilatant, allowing the demonstration of \"walking on custard\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_0" +} \ No newline at end of file diff --git a/test/Food_and_drink/Dairy_in_the_New_Garden.json b/test/Food_and_drink/Dairy_in_the_New_Garden.json new file mode 100644 index 0000000000000000000000000000000000000000..eeb7751a0dee4bad4d43467306f7db603ae7e5b1 --- /dev/null +++ b/test/Food_and_drink/Dairy_in_the_New_Garden.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "The Dairy in the New Garden (Alte Meierei) is a historic building located in Potsdam, Germany. It is situated on the shore of the Jungfernsee lake, at the northernmost tip of the New Garden. The Dairy was constructed between 1790 and 1792 under the supervision of master builder Carl Gotthard Langhans, with Andreas Ludwig Krüger carrying out the construction.\nIn the course of laying out the landscape garden and building the Marble Palace under Frederick William II of Prussia, a dairy was built to supply the royal court. Cows grazing on the surrounding land produced milk for the manufacture of butter and cheese.In 1843/1844 Frederick William IV. had the building extended. To a design by the architect Ludwig Persius a second storey was added under the direction of Ludwig Ferdinand Hesse and the southwest corner was enhanced with a tower. Battlements run along the edges of the roof and gave the building a Norman character.\nA second expansion was carried out in 1857 with the engine or pump house, which was built to water the New Garden. The high, slender chimney is part of that technical modification. The upper basin for the supply of water is nowadays located within the Belvedere on the Pfingstberg.\nIn 1928 a restaurant was established in the building that became one of the most popular destinations for day trippers in Potsdam until the Second World War.\nIts occupation by the Red Army at the end of 1945 and the destruction by fire of part of the building ended its gastronomic function. The dairy was still in this ruined condition when the Berlin Wall was built in 1961.\nIn 1991, after the Wende, renovation and restoration measures were carried out on the old building and, in 2003, it was able to re-open as a brewery and restaurant (Gasthausbrauerei).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_1" +} \ No newline at end of file diff --git a/test/Food_and_drink/Drinking.json b/test/Food_and_drink/Drinking.json new file mode 100644 index 0000000000000000000000000000000000000000..45848ed6cb41075243c9ca2bb564709d72874e95 --- /dev/null +++ b/test/Food_and_drink/Drinking.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Drinking is the act of ingesting water or other liquids into the body through the mouth, proboscis, or elsewhere. Humans drink by swallowing, completed by peristalsis in the esophagus. The physiological processes of drinking vary widely among other animals.\nMost animals drink water to maintain bodily hydration, although many can survive on the water gained from their food. Water is required for many physiological processes. Both inadequate and (less commonly) excessive water intake are associated with health problems.\nWhen a liquid enters a human mouth, the swallowing process is completed by peristalsis which delivers the liquid through the esophagus to the stomach; much of the activity is abetted by gravity. The liquid may be poured from the hands or drinkware may be used as vessels. Drinking can also be performed by acts of inhalation, typically when imbibing hot liquids or drinking from a spoon. Infants employ a method of suction wherein the lips are pressed tight around a source, as in breastfeeding: a combination of breath and tongue movement creates a vacuum which draws in liquid.By necessity, terrestrial animals in captivity become accustomed to drinking water, but most free-roaming animals stay hydrated through the fluids and moisture in fresh food, and learn to actively seek foods with high fluid content. When conditions impel them to drink from bodies of water, the methods and motions differ greatly among species.Cats, canines, and ruminants all lower the neck and lap in water with their powerful tongues. Cats and canines lap up water with the tongue in a spoon-like shape. Canines lap water by scooping it into their mouth with a tongue which has taken the shape of a ladle. However, with cats, only the tip of their tongue (which is smooth) touches the water, and then the cat quickly pulls its tongue back into its mouth which soon closes; this results in a column of liquid being pulled into the cat's mouth, which is then secured by its mouth closing. Ruminants and most other herbivores partially submerge the tip of the mouth in order to draw in water by means of a plunging action with the tongue held straight. Cats drink at a significantly slower pace than ruminants, who face greater natural predation hazards.\nMany desert animals do not drink even if water becomes available, but rely on eating succulent plants. In cold and frozen environments, some animals like hares, tree squirrels, and bighorn sheep resort to consuming snow and icicles. In savannas, the drinking method of giraffes has been a source of speculation for its apparent defiance of gravity; the most recent theory contemplates the animal's long neck functions like a plunger pump. Uniquely, elephants draw water into their trunks and squirt it into their mouths.\nMost birds scoop or draw water into the buccal areas of their bills, raising and tilting their heads back to drink. An exception is the common pigeon, which can suck in water directly by inhalation.Most insects obtain adequate water from their food: When dehydrated from a lack of moist food, however, many species will drink from standing water. Additionally, all terrestrial insects constantly absorb a certain amount of the air's humidity through their cuticles. Some desert insects, such as Onymacris unguicularis, have evolved to drink substantially from nighttime fog.Amphibians and aquatic animals which live in freshwater do not need to drink: they absorb water steadily through the skin by osmosis. Saltwater fish, however, drink through the mouth as they swim, and purge the excess salt through the gills. Saltwater fishes do drink plenty of water and excrete a small volume of concentrated urine.Like nearly all other life forms, humans require water for tissue hydration. Lack of hydration causes thirst, a desire to drink which is regulated by the hypothalamus in response to subtle changes in the body's electrolyte levels and blood volume. A decline in total body water is called dehydration and will eventually lead to death by hypernatremia. Methods used in the management of dehydration include assisted drinking or oral rehydration therapy.An overconsumption of water can lead to water intoxication, which can dangerously dilute the concentration of salts in the body. Overhydration sometimes occurs among athletes and outdoor laborers, but it can also be a sign of disease or damage to the hypothalamus. A persistent desire to drink inordinate quantities of water is a psychological condition termed polydipsia. It is often accompanied by polyuria and may itself be a symptom of diabetes mellitus or diabetes insipidus.\nA daily intake of water is required for the normal physiological functioning of the human body. The USDA recommends a daily intake of total water: not necessarily by drinking but by consumption of water contained in other beverages and foods. The recommended intake is 3.7 liters (appx. 1 gallon) per day for an adult male, and 2.7 liters (appx. 0.75 gallon) for an adult female.Other sources, however, claim that a high intake of fresh drinking water, separate and distinct from other sources of moisture, is necessary for good health : eight servings per day of eight fluid ounces (1.8 liters, or 0.5 gallon) is the amount recommended by many nutritionists, although there is no scientific evidence supporting this recommendation.\nEvidence-based hydration experts say that the amount of drinking water needed depends on ambient temperature, activity level, body size, and sweat rate. Research shows drinking when thirsty will maintain hydration to within about 2% of the needed level. Drinking beyond thirst might be beneficial for people who need to perform tasks that require intense concentration, and those with kidney disease, kidney stones, urinary tract infections, and people with a weak sense of thirst (which may include more older people).\nThe term \"drinking\" is often used metonymically for the consumption of alcoholic beverages. Most cultures throughout history have incorporated some number of the wide variety of \"strong drinks\" into their meals, celebrations, ceremonies, toasts and other occasions. Evidence of fermented drinks in human culture goes back as early as the Neolithic Period, and the first pictorial evidence can be found in Egypt around 4,000 BC.Alcohol consumption has developed into a variety of well-established drinking cultures around the world. Despite its popularity, alcohol consumption poses significant health risks. Alcohol abuse and the addiction of alcoholism are common maladies in developed countries worldwide. A high rate of consumption can also lead to cirrhosis, gastritis, gout, pancreatitis, hypertension, various forms of cancer, and numerous other illnesses.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_2" +} \ No newline at end of file diff --git a/test/Food_and_drink/Energy_gel.json b/test/Food_and_drink/Energy_gel.json new file mode 100644 index 0000000000000000000000000000000000000000..bb94a2da2280680e7017efee39d95820c92ac66f --- /dev/null +++ b/test/Food_and_drink/Energy_gel.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Energy gels are edible carbohydrate gels that provide energy for exercise and promote recovery, commonly used in endurance events such as running, cycling, and triathlons. Energy gels are also referred to as endurance gels, sports gels, nutritional gels, and carbohydrate gels. \nEnergy gels are packaged in small, single-serve plastic packets. Each packet has a strip with a small notch at the top that can be peeled off to reveal an opening through which the gel can be consumed. One-handed operation is often adopted by users to facilitate continuous exercise performance.\nThe size content of energy gels is commonly 1.2 oz (32g), with a range from 1 oz to 1.5 oz packets. The portable packaging is designed to facilitate uninterrupted training or performance conditions. Common ingredients include water, maltodextrin, fructose, and various micronutrients, preservatives, and flavor compounds or caffeine.Sports energy gels emerged in the United Kingdom in 1986 as a \"convenient, prewrapped, portable\" way to deliver carbohydrates during endurance events. Gels have a gooey texture and are sometimes referred to as \"goo\" generically. The gel Leppin Squeezy was distributed at the Hawaii Ironman Triathlon in 1988. Once considered a \"cult product in clear packaging\", energy gel products are now marketed in fancy packaging and come in a variety of flavors. The energy gel market grew during the 1990s, as professional athletes began endorsing products. Manufacturers generally encourage the consumption of multiple packets, with water, when participating in endurance events.Energy gels are promoted to individuals seeking a boost from caffeine and carbohydrates during exercise performance. The recommended use of an energy gel is 15 minutes before starting and 30:45 minutes after starting the endurance exercise.Energy gels have varied taste by addition of flavor ingredients added during manufacturing, such as menthol and chai latte.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_3" +} \ No newline at end of file diff --git a/test/Food_and_drink/Food_engineering.json b/test/Food_and_drink/Food_engineering.json new file mode 100644 index 0000000000000000000000000000000000000000..158e061d0df0ca84d6fa18ae19ad670cad7554f0 --- /dev/null +++ b/test/Food_and_drink/Food_engineering.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Food engineering is a scientific, academic, and professional field that interprets and applies principles of engineering, science, and mathematics to food manufacturing and operations, including the processing, production, handling, storage, conservation, control, packaging and distribution of food products. Given its reliance on food science and broader engineering disciplines such as electrical, mechanical, civil, chemical, industrial and agricultural engineering, food engineering is considered a multidisciplinary and narrow field. \nDue to the complex nature of food materials, food engineering also combines the study of more specific chemical and physical concepts such as biochemistry, microbiology, food chemistry, thermodynamics, transport phenomena, rheology, and heat transfer. Food engineers apply this knowledge to the cost-effective design, production, and commercialization of sustainable, safe, nutritious, healthy, appealing, affordable and high-quality ingredients and foods, as well as to the development of food systems, machinery, and instrumentation.\nAlthough food engineering is a relatively recent and evolving field of study, it is based on long-established concepts and activities. The traditional focus of food engineering was preservation, which involved stabilizing and sterilizing foods, preventing spoilage, and preserving nutrients in food for prolonged periods of time. More specific traditional activities include food dehydration and concentration, protective packaging, canning and freeze-drying . The development of food technologies were greatly influenced and urged by wars and long voyages, including space missions, where long-lasting and nutritious foods were essential for survival. Other ancient activities include milling, storage, and fermentation processes. Although several traditional activities remain of concern and form the basis of today’s technologies and innovations, the focus of food engineering has recently shifted to food quality, safety, taste, health and sustainability.The following are some of the applications and practices used in food engineering to produce safe, healthy, tasty, and sustainable food:The main objective of food refrigeration and/or freezing is to preserve the quality and safety of food materials. Refrigeration and freezing contribute to the preservation of perishable foods, and to the conservation some food quality factors such as visual appearance, texture, taste, flavor and nutritional content. Freezing food slows the growth of bacteria that could potentially harm consumers.Evaporation is used to pre-concentrate, increase the solid content, change the color, and reduce the water content of food and liquid products. This process is mostly seen when processing milk, starch derivatives, coffee, fruit juices, vegetable pastes and concentrates, seasonings, sauces, sugar, and edible oil. Evaporation is also used in food dehydration processes. The purpose of dehydration is to prevent the growth of molds in food, which only build when moisture is present. This process can be applied to vegetables, fruits, meats, and fish, for example.Food packaging technologies are used to extend the shelf-life of products, to stabilize food (preserve taste, appearance, and quality), and to maintain the food clean, protected, and appealing to the consumer. This can be achieved, for example, by packaging food in cans and jars. Because food production creates large amounts of waste, many companies are transitioning to eco-friendly packaging to preserve the environment and attract the attention of environmentally conscious consumers. Some types of environmentally friendly packaging include plastics made from corn or potato, bio-compostable plastic and paper products which disintegrate, and recycled content. Even though transitioning to eco-friendly packaging has positive effects on the environment, many companies are finding other benefits such as reducing excess packaging material, helping to attract and retain customers, and showing that companies care about the environment.To increase sustainability of food processing there is a need for energy efficiency and waste heat recovery. The replacement of conventional energy-intensive food processes with new technologies like thermodynamic cycles and non-thermal heating processes provide another potential to reduce energy consumption, reduce production costs, and improve the sustainability in food production.Heat transfer is important in the processing of almost every commercialized food product and is important to preserve the hygienic, nutritional and sensory qualities of food. Heat transfer methods include induction, convection, and radiation. These methods are used to create variations in the physical properties of food when freezing, baking, or deep frying products, and also when applying ohmic heating or infrared radiation to food. These tools allow food engineers to innovate in the creation and transformation of food products.A Food Safety Management System (FSMS) is \"a systematic approach to controlling food safety hazards within a business in order to ensure that the food product is safe to consume.\" In some countries FSMS is a legal requirement, which obliges all food production businesses to use and maintain a FSMS based on the principles of Hazard Analysis Critical Control Point (HACCP). HACCP is a management system that addresses food safety through the analysis and control of biological, chemical, and physical hazards in all stages of the food supply chain. The ISO 22000 standard specifies the requirements for FSMS.The following technologies, which continue to evolve, have contributed to the innovation and advancement of food engineering practices:Three-dimensional (3D) printing, also known as additive manufacturing, is the process of using digital files to create three dimensional objects. In the food industry, 3D printing of food is used for the processing of food layers using computer equipment. The process of 3D printing is slow, but is improving over time with the goal of reducing costs and processing times. Some of the successful food items that have been printed through 3D technology are: chocolate, cheese, cake frosting, turkey, pizza, celery, among others. This technology is continuously improving, and has the potential of providing cost-effective, energy efficient food that meets nutritional stability, safety and variety.Biosensors can be used for quality control in laboratories and in different stages of food processing. Biosensor technology is one way in which farmers and food processors have adapted to the worldwide increase in demand for food, while maintaining their food production and quality high. Furthermore, since millions of people are affected by food-borne diseases caused by bacteria and viruses, biosensors are becoming an important tool to ensure the safety of food. They help track and analyze food quality during several parts of the supply chain: in food processing, shipping and commercialization. Biosensors can also help with the detection of genetically modified organisms (GMOs), to help regulate GMO products. With the advancement of technologies, like nanotechnology, the quality and uses of biosensors are constantly being improved.When storage conditions of milk are controlled, milk tends to have a very good flavor. However, oxidized flavor is a problem that affects the taste and safety of milk in a negative way. To prevent the growth of pathogenic bacteria and extend the shelf life of milk, pasteurization processes were developed. Microwaved milk has been studied and developed to prevent oxidation compared to traditional pasteurized milk methods, and it has been concluded that milk has a better quality when it has microwaved milk pasteurization.In the 1950s, food engineering emerged as an academic discipline, when several U.S. universities included food science and food technology in their curricula, and important works on food engineering appeared. Today, educational institutions throughout the world offer bachelors, masters, and doctoral degrees in food engineering. However, due to the unique character of food engineering, its training is more often offered as a branch of broader programs on food science, food technology, biotechnology, or agricultural and chemical engineering. In other cases, institutions offer food engineering education through concentrations, specializations, or minors. Food engineering candidates receive multidisciplinary training in areas like mathematics, chemistry, biochemistry, physics, microbiology, nutrition, and law.Food engineering is still growing and developing as a field of study, and academic curricula continue to evolve. Future food engineering programs are subject to change due to the current challenges in the food industry, including bio-economics, food security, population growth, food safety, changing eating behavior, globalization, climate change, energy cost and change in value chain, fossil fuel prices, and sustainability. To address these challenges, which require the development of new products, services, and processes, academic programs are incorporating innovative and practical forms of training. For example, innovation laboratories, research programs, and projects with food companies and equipment manufacturers are being adopted by some universities. In addition, food engineering competitions and competitions from other scientific disciplines are appearing.\nWith the growing demand for safe, sustainable, and healthy food, and for environmentally friendly processes and packaging, there is a large job market for food engineering prospective employees. Food engineers are typically employed by the food industry, academia, government agencies, research centers, consulting firms, pharmaceutical companies, healthcare firms, and entrepreneurial projects. Job descriptions include but are not limited to food engineer, food microbiologist, bioengineering/biotechnology, nutrition, traceability, food safety and quality management.\nFood engineering has negative impacts on the environment such as the emission of large quantities of waste and the pollution of water and air, which must be addressed by food engineers in the future development of food production and processing operations. Scientists and engineers are experimenting in different ways to create improved processes that reduce pollution, but these must continue to be improved in order to achieve a sustainable food supply chain. Food engineers must reevaluate current practices and technologies to focus on increasing productivity and efficiency while reducing the consumption of water and energy, and decreasing the amount of waste produced.Even though food supply expands yearly, there has also been an increase in the number of hungry people. The world population is expected to reach 9-10 billion people by 2050 and the problem of malnutrition remains a priority. To achieve food security, food engineers are required to address land and water scarcity to provide enough growth and food for undernourished people. In addition, food production depends on land and water supply, which are under stress as the population size increases. There is a growing pressure on land resources driven by expanding populations, leading to expansions of croplands; this usually involves the destruction of forests and exploitation of arable land. Food engineers face the challenge of finding sustainable ways to produce to adapt to the growing population.Food engineers must adapt food technologies and operations to the recent consumer trend toward the consumption of healthy and nutritious food. To supply foods with these qualities, and for the benefit of human health, food engineers must work collaboratively with professionals in other domains such as medicine, biochemistry, chemistry, and consumerism. New technologies and practices must be developed to increase the production of foods that have a positive impact on human health.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_4" +} \ No newline at end of file diff --git a/test/Food_and_drink/Irreechaa.json b/test/Food_and_drink/Irreechaa.json new file mode 100644 index 0000000000000000000000000000000000000000..eb99d0b9c67d92ca20f6f351d64e0252e2a87cf8 --- /dev/null +++ b/test/Food_and_drink/Irreechaa.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Irreecha (also called Irreessa or Dhibaayyuu), is thanksgiving holiday celebrating the end of the winter in Oromia Region, Ethiopia. Irreecha is the most celebrated cultural festival in Africa. The Oromo people celebrate Irreecha to thank Waaqa (God) for the blessings and mercies they have received throughout the previous year. The Irreecha festival is celebrated every year at the beginning of Birraa (Spring), new season after the dark and rainy winter season. It is attended by hundreds of thousands people. The thanksgiving is celebrated at sacred lakes across Oromia Region like the Hora Finfinne and Hora Harsadi, Bishoftu, Oromia Region as a whole. Once at the lake, festival-goers immerse freshly cut green grass and the flowers they are carrying and sprinkle themselves and place in water.\nIn 2019, the festival was celebrated in Addis Ababa, the capital city of Ethiopia and the regional state of Oromia, followed by Irreecha in Bishoftu. The 2020 Irreecha in Addis Ababa was celebrated by around 5,000 people due to political tension and the COVID-19 pandemic. Irreecha is also celebrated around the world where diaspora Oromos live especially in North America and Europe.\nMany people interpreted the Irrecha festival of the Oromo people as a festival of difficulty period between the month of June and September. But the reality is not as many have exaggerated today. The Irrecha festival is a celebration to welcome the expected seeds and fruits of prosperity, and peace. The Oromo people also consider the winter rainy season of June to September as a time of difficulty in communication with families and friends due to heavy rains which could cause rivers to swell and floods that may drown people, cattle, crop, and flood homes. Also, family relationships will suffer during winter rain as they can not visit each other because of swelling rivers. In addition, winter time could be a time of hunger for some because the previous harvest collected in January is running short and the new harvest is not ripe yet. Because of this, some families may endure food shortages during the winter. In Birraa (Spring in Oromoland), this shortage ends as many food crops especially maize is ripe and families can eat their fill. Other crops like potato, barley, etc. will also be ripe in Birraa. Some disease types like malaria also break out during rainy winter time. Because of this, the Oromos see winter as a difficult season. It does not mean the Oromo people hate rain or the winter season at all. Even when there is a shortage of rain, they pray to Waaqa (God) for rain.The Oromo people celebrate Irreecha not only to thank Waaqa (God) but also to welcome the new season of plentiful harvests after the dark and rainy winter season associated with nature and creatures. At Irreecha festivals, friends, family, and relatives gather together and celebrate with joy and happiness. Irreecha festivals bring people closer to each other and make social bonds.\nMoreover, the Oromo people celebrate this auspicious event to mark the end of the rainy season, known as Ganna, which was established by Oromo forefathers, in the time of Gadaa Melbaa in Mormor, Oromia. The auspicious day on which this last Mormor Day of Gadaa Melbaa - the Dark Time of starvation and hunger- was established on the Sunday of last week of September or the Sunday of the 1st week of October according to the Gadaa lunar calendar has been designated as National Thanksgiving Day by modern-day Oromo people.\nOn 2 October 2016, between 55 and 300 festival goers were killed in a stampede at the Irreecha cultural thanksgiving festival, which was the largest and most sacred cultural festival for the Oromo people. In just one day, dozens were killed and many more were injured during the stampede. Locals blamed security forces for triggering the stampede.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_5" +} \ No newline at end of file diff --git a/test/Food_and_drink/Liquor.json b/test/Food_and_drink/Liquor.json new file mode 100644 index 0000000000000000000000000000000000000000..6c53e5c585b9ab54e60860415b9cf6319d3dd044 --- /dev/null +++ b/test/Food_and_drink/Liquor.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Liquor or distilled beverages are alcoholic drinks produced by the distillation of grains, fruits, vegetables, or sugar that have already gone through alcoholic fermentation. Other terms for liquor include spirit, spirituous liquor or hard liquor. While the word liquor ordinarily refers to distilled alcoholic spirits rather than beverages produced by fermentation alone, it can sometimes be used more broadly to refer to any alcoholic beverage (or even non-alcoholic products of distillation or various other liquids).\nThe distillation process concentrates the liquid to increase its alcohol by volume. As liquors contain significantly more alcohol (ethanol) than other alcoholic drinks, they are considered \"harder\". In North America, the term hard liquor is sometimes used to distinguish distilled alcoholic drinks from non-distilled ones, whereas the term spirits is more commonly used in the United Kingdom. Some examples of liquors include vodka, rum, gin and tequila. Liquors are often aged in barrels, such as for the production of brandy and whiskey, or are infused with flavorings to form flavored liquors, such as absinthe.\nLike other alcoholic drinks, liquor is typically consumed for the psychoactive effects of alcohol. Liquor may be consumed on its own (i.e. \"neat\"), typically in amounts of around 50 millilitres (1.7 US fluid ounces) per served drink; or frequently mixed with other ingredients to form a cocktail. In an undiluted form, distilled beverages are often slightly sweet and bitter and typically impart a burning mouthfeel with an odor derived from the alcohol and the production and aging processes; the exact flavor varies between different varieties of liquor and the different impurities they impart.\nRapid consumption of a large amount of liquor can cause severe alcohol intoxication or alcohol poisoning, which can be fatal either due to acute biochemical damage to vital organs (e.g. alcoholic hepatitis and pancreatitis), or due to trauma (e.g. falls or motor vehicle accidents) caused by alcohol-induced delirium. Consistent consumption of liquor over time correlates with higher mortality and other harmful health effects, even when compared to other alcoholic beverages.\nThe term \"spirit\" (singular and used without the additional term \"drink\") refers to liquor that should not contain added sugar and is usually 35:40% alcohol by volume (ABV). Fruit brandy, for example, is also known as 'fruit spirit'.Liquor bottled with added sugar and flavorings, such as Grand Marnier, amaretto, and American schnapps, are known instead as liqueurs.\nLiquor generally has an alcohol concentration higher than 30% when bottled, and before being diluted for bottling, it typically has a concentration over 50%. Beer and wine, which are not distilled, typically have a maximum alcohol content of about 15% ABV, as most yeasts cannot metabolize when the concentration of alcohol is above this level; as a consequence, fermentation ceases at that point.\nThe origin of liquor and its close relative liquid is the Latin verb liquere, meaning 'to be fluid'. According to the Oxford English Dictionary (OED), an early use of the word in the English language, meaning simply \"a liquid\", can be dated to 1225. The first use documented in the OED defined as \"a liquid for drinking\" occurred in the 14th century. Its use as a term for \"an intoxicating alcoholic drink\" appeared in the 16th century.In accordance with the regulation (EU) 2019/787 of the European Parliament and of the Council of April 17, 2019, a spirit drink is an alcoholic beverage that has been produced:either directly by using, individually or in combination, any of the following methods:\ndistillation, with or without added flavourings or flavouring foodstuffs, of fermented products;\nmaceration or similar processing of plant materials in ethyl alcohol of agricultural origin, distillates of agricultural origin or spirit drinks or a combination thereof;\naddition, individually or in combination, to ethyl alcohol of agricultural origin, distillates of agricultural origin, or spirit drinks of flavourings, colours, other authorised ingredients, sweetening products, other agricultural products, and foodstuffs.\nor by adding, individually or in combination, to it any of the following:\nother spirit drinks;\nethyl alcohol of agricultural origin;\ndistillates of agricultural origin;\nother foodstuffs.\nSpirit drinks must contain at least 15% ABV (except in the case of egg liqueur such as Advocaat, which must contain a minimum of 14% ABV).\nRegulation makes a difference between \"ethyl alcohol of agricultural origin\" and a \"distillate of agricultural origin\". Distillate of agricultural origin is defined as an alcoholic liquid that is the result of the distillation, after alcoholic fermentation, of agricultural products which does not have the properties of ethyl alcohol and which retain the aroma and taste of the raw materials used.Annex 1 to the regulation lists 44 categories of spirit drinks and their legal requirements.Some spirit drinks can fall into more than one category. Specific production requirements distinguish one category from another (London gin falls into the Gin category but any gin cannot be considered as London gin).\nSpirit drinks that are not produced within the EU, such as tequila or baijiu, are not listed in the 44 categories.\nEarly evidence of distillation comes from Akkadian tablets dated c. 1200 BC describing perfumery operations, providing textual evidence that an early, primitive form of distillation was known to the Babylonians of ancient Mesopotamia. Early evidence of distillation also comes from alchemists working in Alexandria, Roman Egypt, in the 1st century. Distilled water was described in the 2nd century AD by Alexander of Aphrodisias. Alchemists in Roman Egypt were using a distillation alembic or still device in the 3rd century.Distillation was known in the ancient Indian subcontinent, evident from baked clay retorts and receivers found at Taxila and Charsadda in Pakistan and Rang Mahal in India dating to the early centuries of the Common Era. Frank Raymond Allchin says these terracotta distill tubes were \"made to imitate bamboo\". These \"Gandhara stills\" were capable of producing only very weak liquor, as there was no efficient means of collecting the vapors at low heat.\nDistillation in China could have begun during the Eastern Han dynasty (1st:2nd centuries), but the distillation of beverages began in the Jin (12th:13th centuries) and Southern Song (10th:13th centuries) dynasties according to archaeological evidence.\nFreeze distillation involves freezing the alcoholic beverage and then removing the ice. The freezing technique had limitations in geography and implementation limiting how widely this method was put to use.\nThe flammable nature of the exhalations of wine was already known to ancient natural philosophers such as Aristotle (384:322 BCE), Theophrastus (c. 371 : c. 287 BCE), and Pliny the Elder (23/24:79 CE). This did not immediately lead to the isolation of alcohol, however, despite the development of more advanced distillation techniques in second- and third-century Roman Egypt. An important recognition, first found in one of the writings attributed to Jābir ibn Ḥayyān (ninth century CE), was that by adding salt to boiling wine, which increases the wine's relative volatility, the flammability of the resulting vapors may be enhanced. The distillation of wine is attested in Arabic works attributed to al-Kindī (c. 801:873 CE) and to al-Fārābī (c. 872:950), and in the 28th book of al-Zahrāwī's (Latin: Abulcasis, 936:1013) Kitāb al-Taṣrīf (later translated into Latin as Liber servatoris). In the twelfth century, recipes for the production of aqua ardens (\"burning water\", i.e., alcohol) by distilling wine with salt started to appear in a number of Latin works, and by the end of the thirteenth century, it had become a widely known substance among Western European chemists. Its medicinal properties were studied by Arnald of Villanova (1240:1311 CE) and John of Rupescissa (c. 1310:1366), the latter of whom regarded it as a life-preserving substance able to prevent all diseases (the aqua vitae or \"water of life\", also called by John the quintessence of wine).In China, archaeological evidence indicates that the true distillation of alcohol began during the 12th century Jin or Southern Song dynasties.\nA still has been found at an archaeological site in Qinglong, Hebei, dating to the 12th century.\nIn India, the true distillation of alcohol was introduced from the Middle East and was in wide use in the Delhi Sultanate by the 14th century.\nThe works of Taddeo Alderotti (1223:1296) describe a method for concentrating alcohol involving repeated fractional distillation through a water-cooled still, by which an alcohol purity of 90% could be obtained.\nIn 1437, \"burned water\" (brandy) was mentioned in the records of the County of Katzenelnbogen in Germany.\nIt is legal to distill beverage alcohol as a hobby for personal use in some countries, including New Zealand and the Netherlands.In many others including the United States, it is illegal to distill beverage alcohol without a license, and the licensing process is too arduous for hobbyist-scale production. In some parts of the U.S., it is also illegal to sell a still without a license. Nonetheless, all states allow unlicensed individuals to make their own beer, and some also allow unlicensed individuals to make their own wine (although making beer and wine is also prohibited in some local jurisdictions).\nSome countries and sub-national jurisdictions limit or prohibit the sale of certain high-percentage alcohol, commonly known as neutral spirit. Due to its flammability (see below) alcoholic beverages with an alcohol content above 70% by volume are not permitted to be transported in aircraft.Microdistilling (also known as craft distilling) began to re-emerge as a trend in the United States following the microbrewing and craft beer movement in the last decades of the 20th century.The World Health Organization (WHO) measures and publishes alcohol consumption patterns in different countries. The WHO measures alcohol consumed by persons 15 years of age or older and reports it on the basis of liters of pure alcohol consumed per capita in a given year in a country.In Europe, spirits (especially vodka) are more popular in the north and east of the continent.\nDistilled spirits contain ethyl alcohol, the same chemical that is present in beer and wine, and as such, spirit consumption has short-term psychological and physiological effects on the user. Different concentrations of alcohol in the human body have different effects on a person. The effects of alcohol depend on the amount an individual has drunk, the percentage of alcohol in the spirits and the timespan over which the consumption took place.The short-term effects of alcohol consumption range from a decrease in anxiety and motor skills and euphoria at lower doses to intoxication (drunkenness), to stupor, unconsciousness, anterograde amnesia (memory \"blackouts\"), and central nervous system depression at higher doses. Cell membranes are highly permeable to alcohol, so once it is in the bloodstream, it can diffuse into nearly every cell in the body. Alcohol can greatly exacerbate sleep problems. During abstinence, residual disruptions in sleep regularity and sleep patterns are the greatest predictors of relapse. \nDrinking more than 1:2 drinks a day increases the risk of heart disease, high blood pressure, atrial fibrillation, and stroke. The risk is greater in younger people due to binge drinking, which may result in violence or accidents. About 3.3 million deaths (5.9% of all deaths) are due to alcohol each year.\nUnlike wine and perhaps beer, there is no evidence for a J-shaped health effect for the consumption of distilled alcohol. Long-term use can lead to an alcohol use disorder, an increased risk of developing physical dependence. cardiovascular disease and several types of cancer.\nAlcoholism, also known as \"alcohol use disorder\", is a broad term for any drinking of alcohol that results in problems. Alcoholism reduces a person's life expectancy by around ten years and alcohol use is the third-leading cause of early death in the United States.\nConsumption of alcohol in any quantity can cause cancer. Alcohol causes breast cancer, colorectal cancer, esophageal cancer, liver cancer, and head-and-neck cancers. The more alcohol is consumed, the higher the cancer risk.\nA survey of high school students in Alstahaug, Nordland county, revealed that adolescents consume alcohol at rates above the national average, with home-made liquor being prevalent and easily accessible, highlighting an urgent need for preventive measures.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_6" +} \ No newline at end of file diff --git a/test/Food_and_drink/Night_of_the_Radishes.json b/test/Food_and_drink/Night_of_the_Radishes.json new file mode 100644 index 0000000000000000000000000000000000000000..3004fc018dc4763627712770c90bd6418570ad1b --- /dev/null +++ b/test/Food_and_drink/Night_of_the_Radishes.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "The Night of the Radishes (Spanish: Noche de Rábanos) is an annual event held on December 23 in Oaxaca, Mexico, dedicated to the carving of oversized radishes (Raphanus sativus) to create scenes that compete for prizes in various categories.\nThe event has its origins in the colonial period when radishes were introduced by the Spanish. Oaxaca has a long wood carving tradition and farmers began carving radishes into figures as a way to attract customers' attention at the Christmas market, which was held in the main square on December 23. In 1897, the city instituted the formal competition. As the city has grown, the government has had to dedicate land to the growing of the radishes used for the event, supervising their growth and distribution to competitors. The event has become very popular, attracting over 100 contestants and thousands of visitors. Since the radishes wilt soon after cutting, the works can only be displayed for a number of hours, which has led to very long lines for those wishing to see them. The event also has displays and competitions for works made with corn husks and dried flowers, which are created with the same themes as those with radishes.\nNative to China, radishes were introduced to Mexico by the Spanish, particularly by the friars. Over time, the crop became used as a side dish or snack, or carved into decorations for special dishes. In the colonial period, the radishes began to be carved with religious themes in relation to the annual Christmas market held in the city of Oaxaca on December 23, with the encouragement of priests. The carvings were a marketing gimmick, with farmers using them to attract the attention of shoppers in the market in the city plaza. Eventually people began buying the radishes not only to eat, but to create centerpieces for Christmas dinners.The legend as to how the event began says that one year in the mid-18th century, the radish crop was so abundant that a section lay unharvested for months. In December, two friars pulled up some of these forgotten radishes. The sizes and shapes were amusing, and they brought them as curiosities to the Christmas market held on December 23. The misshapen vegetables attracted attention and soon they began to be carved to give them a wider variety of shapes and figures.\nIn 1897, the mayor of the city, Francisco Vasconcelos, decided to create a formal radish-carving competition, which has been held each year since.\nOver the years various types of radishes have been used both in Oaxacan cuisine and for carving. A large completely white type called criollo was used earlier, as it did not rot as readily and adopted more capricious forms. While this variety has since disappeared, an image of them can be seen in a work by Diego Rivera called \"Las tentaciones de San Antonio\".\nThe formal Noche de Rábanos competition focuses on the carving of radishes, which can be embellished with other elements. Most entries are scenes that use multiple radishes, with the most traditional being nativity scenes. However, over the 100+ years that the competition has been held, there has been significant diversification in the entries. Common scenes are related to life in Oaxaca such as the Guelaguetza, posadas, calendas (a kind of traditional party), Day of the Dead, Danza de la Pluma, Pineapple Harvest Dance and the Chilena from the Costa Chica, Oaxacan history and folklore as well as the veneration of Our Lady of Guadalupe, Our Lady of Juquila and Our Lady of Solitude, the patron of the state. However, they can also depict other themes such as non-Christmas Biblical stories and can even be in protest. The most common elements are the people, animals, food and handcrafts of the state, but they can also include duendes, snowmen, monsters and more.Originally the radishes used by competitors were those raised by local farmers, but as the city has grown, taking over land traditionally dedicated to their cultivation, the municipal government has stepped in. It has allocated an area near El Tequio Park to their cultivation, specially grown for the event. They are heavily fertilized, chemically treated and left in the ground long after normal harvests to allow them to reach monumental sizes and capricious shapes, which also makes them unsuitable for human consumption. The resulting vegetables can be up to fifty centimeters in length, ten centimeters or wider and can weigh up to three kilos. In 2014, twelve tons of radishes were harvested for that event alone. Local authorities monitor the harvest and distribute the crop to registered contestants on December 18. The radish currently used has a red skin and a white interior. The use of this radish, which is softer than other varieties, has precipitated a number of strategies different from those used in the past, one being the use of the contrast between the skin and the interior and the other to peel and flatten the red skin for use as clothing items, flags and more. Typically participants use knives and toothpicks to create the sculptures, after the tops of the radishes with their long, green leaves have been cut off (and sometimes used in the scenes) . Although the carving of radishes evolved from the area's tradition of wood carving, the current competition does not attract current woodcarvers as the material is very different.\nThe event attracts over 100 participants from the city of Oaxaca and neighboring communities, especially San Antonino Velazco. In 2014, 94 competed in the adult categories, along with 61 youth and 50 children. Contestants register months in advance and from the 18th to the 23rd they must plan and design their scenes, generally using the natural shapes of the radishes they have been allotted as a guide. The actual carving and assembly of the entries occurs during the day of December 23. There are several categories of participation. For adults, radish sculptures and scenes can be in the traditional or \"free\" category, which is determined by the theme. Works in the traditional category are for depictions of nativity scenes and those of Oaxacan traditions. Those in the free category generally depict more contemporary themes. However, as the function of the event is to preserve tradition, the grand prize of 15,000 pesos is awarded to the winner of the traditional category. In 2014 the grand prize winner was the entry \"Dulces Regionales Oaxaqueños\" by the Vasquez Lopez family. There are also prizes for participants competing as novices, and a children's category for those aged from six to seventeen to encourage new generations to continue the tradition. Prizes for the children's categories include bicycles and school supplies. The event has also added categories for scenes made not from radishes but instead from dried corn husks (called totomoxtle) and those made with a dried flower called \"flor inmortal\" (immortal flower) named such as it dries quickly and keeps most of its color. These entries also have several subcategories and generally have similar themes to those done with radishes.\nSince the radishes do not keep after they are cut and quickly wilt, the entire event lasts only for a number of hours from the late afternoon to early evening of December 23, with stands set up the morning before around the main square of the city and taken down the morning after. Visitors are permitted to pass by the stands starting in the late afternoon, with judging and the awarding of prizes taking place at about 9 pm, with the radish sculptures removed shortly after that. The event has become popular, attracting thousands of visitors as well as functionaries that can include the state's governor. Despite the creation of a two-line system (the one behind on a raised platform) for visitors to file by the stands, wait times can be as long as 4:5 hours to see the entries.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_7" +} \ No newline at end of file diff --git a/test/Food_and_drink/Pagophagia.json b/test/Food_and_drink/Pagophagia.json new file mode 100644 index 0000000000000000000000000000000000000000..52cab07df8e448acbfd680ef06d2dd0d57b941be --- /dev/null +++ b/test/Food_and_drink/Pagophagia.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Pagophagia (from Greek: pagos, frost/ice, + phagō, to eat) is the compulsive consumption of ice or iced drinks. It is a form of the disorder known as pica, which in Latin refers to a magpie that eats everything indiscriminately. Pica's medical definition refers to the persistent consumption of nonnutritive substances, ice in this case, for over a period of at least one month. However, different studies have included alternative definitions for pagophagia, including \"daily consumption of 2:11 full glasses of ice (480:2640 g)\" or \"the purposeful ingestion of at least one ordinary tray of ice daily for a period in excess of two months.\" It has been shown to be associated with iron-deficiency anemia and responsive to iron supplementation, leading some investigators to postulate that some forms of pica may be the result of nutritional deficiency.\nSimilarly, folk wisdom also maintained that pica reflected an appetite to compensate for nutritional deficiencies, such as low iron or zinc. In iron deficient pregnant women who experience symptoms of pagophagia, decreased cravings for ice have been observed after iron supplementation. Later research demonstrated that the substances ingested by those who have pica generally do not provide the mineral or nutrient in which people are deficient. In the long run, as people start consuming more nonfoods compulsively, pica can also cause additional nutritional deficiencies.\nA hypothesis of the neurological basis of pagophagia was proposed in a 2014 study in which those with iron deficiency anemia were shown to have improved response times while performing on a neuropsychological test when given ice to chew on. As a result, the researchers hypothesized that chewing on ice causes vascular changes that allow for increased perfusion of the brain, as well as activation of the sympathetic nervous system, which also increases blood flow to the brain, allowing for increased processing speed and alertness.\nAlthough some investigators also hypothesize that chewing ice may lessen pain in glossitis and stomatitis related to iron-deficiency anemia, the specific pathophysiology is still unknown and this hypothesis remains controversial. The American Dental Association recommends not chewing ice as it can lead to dental injury and suggests that ice should be allowed to melt in the mouth instead.\nThe main symptom for pagophagia is intense cravings for chewing ice. Those with pagophagia will find themselves constantly chewing on ice cubes, shaved ice or even frost from the fridge. Since a common underlying cause of pagophagia is iron-deficiency anemia, many people with the disorder will also experience weakness, fatigue, pallor, sore tongue, dizziness, headache, and cold extremities. Other symptoms associated with iron deficiency may include brittle nails, cracking at the corner of the mouth, and restless legs syndrome. Severe cases of iron deficiency can also cause the body to make up for decreased oxygen-carrying capacity of the blood by increasing cardiac output. Thus, palpitations, angina, as well as shortness of breath may also present, specially if there is a preexisting cardiovascular disease or condition. Excess water intake from any source can lead to hyponatremia and has been noted in at least one case study.Although compulsive consumption of ice is frequently associated with a deficiency of iron, the exact etiology of this form of pica is not well-understood. There is one hypothesis that states consumption of ice activates a vasoconstrictive response which causes an increase of blood flow to the brain. Because fatigue is the most common symptom experienced in iron-deficiency anemia due to decreased levels of oxygen delivered to the brain, the increase of blood flow to the brain through consumption of ice is thought to increase alertness and improve the symptoms of fatigue. In support of this hypothesis, individuals with iron-deficient anemia were found to have improved response times on neuropsychological tests than compared to healthy controls when chewing ice.Reports have demonstrated the improvement or resolution of pagophagia when given iron supplementation. People with iron-deficiency anemia who showed symptoms of pagophagia had complete resolution of their symptoms when their iron levels were treated, suggesting the association between serum iron levels and symptoms of pagophagia. In another case, an individual who presented with pagophagia was prescribed 325mg tablets of ferrous sulfate twice daily. The individual was also administered 1000mg of low molecular weight dextran over 1 hour and their symptoms of pagophagia were immediately resolved. In another case, a woman with iron-deficiency anemia related to gynecological bleeding was admitted and her dietary screening showed consumption of about 80 ice cubes for day for the past 5 years. She was given iron supplementation and her anemia was treated along with the disappearance of pagophagia within two weeks.\nOne study looked at the relationship between pagophagia and H. pylori infection in those with iron deficiency anemia. It was found that pagophagia does not increase the risk of H. pylori infections in that specific population. In addition, H. pylori infection and pagophagia did not have a synergistic effect on the development of iron absorption abnormalities in the intestines.\nPagophagia has been often reported with calcium deficiency but its pathophysiology is unknown.In several cases, pagophagia has been associated with certain psychological conditions such as compulsive behavior or depressive disorder where pagophagia was used as a coping mechanism to deal with psychological stress. Some suggestions for other causes of pagophagia include hunger and gastrointestinal distress related to ways the body attempts to ease the stress.Other known risk factors for pica include \"stress, cultural factors, learned behavior, low socioeconomic status, underlying mental health disorder, nutritional deficiency, child neglect, pregnancy, epilepsy, [and] familial psychopathology.\"\nIn one case report, a 42-year-old woman presented with complaints of freezer frost and eating ice. She developed a habit of eating 10 to 12 ice cubes and freezer frost each day, and eventually increased her consumption to 25 to 30 ice cubes each day. Her medical assessment revealed no past or family history of any chronic psychiatric disorder or physical disorder. Her hemoglobin, serum calcium, and stool examination were normal. One suspected cause of her pagophagia was psychological stress, the stressor being her son's annual examinations. The woman was previously prescribed venlafaxine 50mg and vitamin B-complex for two to six weeks but with no improvement. The doctor initiated fluoxetine 20mg daily for her and the venlafaxine was tapered off. The dose was increased to 30mg after three weeks and counseling and behavioral treatment was given. Her pagophagia resolved after four months. Along with this case, previous reports have shown selective serotonin reuptake inhibitors effective in treating pagophagia. Counseling and behavioral strategies such as positive and negative reinforcement should be utilized for people with psychiatric conditions.\nPagophagia may often go undiagnosed as those with the condition may consider it to be harmless and not seek medical help unless the behavior begins to interfere with their lives. However, the disorder is not as harmless as it seems since underlying medical causes that remain undiagnosed may lead to complications. For example, if anemia is not treated properly, the heart will need to exert more force in order to supply adequate oxygen throughout the body which can progress to heart failure. Other complications of pagophagia include tooth sensitivity and dental injury leading to cracked or chipped teeth. Overconsumption of ice may cause bloating, gas, and stomach pain. Imaging exams such as abdominal x-rays and endoscopy may be ordered if a person presents with abdominal symptoms. Due to the relation between pagophagia and iron deficiency anemia, diagnosis begins with obtaining a medical history, a physical exam as well as blood tests that includes a complete blood count and additional tests to determine levels of hemoglobin, hematocrit, serum iron, and ferritin, a protein that helps the body store iron. In individuals that are anemic, the tests would show results with lower than normal levels which would then confirm the diagnosis. If a blood slide is ordered by the doctor, it may show red blood cells that are smaller and paler than normal cells. In the case of severe iron deficiency, white blood cell count may also be low.\nA differential diagnosis for psychiatric conditions should be performed in the setting of pagophagia. Schizophrenia and psychosis, other eating disorders, substance use, and autism should be considered in the differential diagnosis.\nWhen screening for suspected pagophagia, it may be appropriate to include screening for iron deficiency. Screening for pagophagia may help clinicians gather valuable information towards the diagnosis and treatment, especially populations who are at risk, for iron deficiency. Women who are menstruating, pregnant, or lactating may benefit from pagophagia screening because of the high occurrence of iron deficiency in these groups. Other groups at risk due to prevalence of iron deficiency include blood donors, individuals who are post-surgery or trauma, or people who experience malabsorption of iron. Collecting information during health screening to determine any causes of blood loss, malabsorption of iron from the diet, and any laboratory tests to determine iron deficiency may be appropriate in people who present with symptoms of pagophagia. If iron deficiency is confirmed by laboratory screening, iron replacement therapy can be considered with oral supplementation. Over the counter or prescription formulations of iron containing ferrous gluconate, ferrous sulfate, or ferrous fumarate are available.In one study of pica in iron deficient versus iron replete blood donors, \"pica was reported in 11% of donors with iron depletion/deficiency, compared with 4% of iron-replete donors,\" with pagophagia accounting for 94% of reported pica cases. A case series of pagophagia in men with iron-deficiency anemia concluded \"that pagophagia occurred in 34% of men with iron-deficiency anemia.\" Men who were older and had higher platelet counts were less likely to have pagophagia compared to younger men and those with lower platelet counts.In women, pica is \"most often seen during pregnancy,\" with estimates of 27.8% of pregnant women experiencing pica, but pica prevalence and manifestation is culturally and geographically heterogenous. A study of pregnant women in Tehran, Iran found pica in 8.33% of the study population with pagophagia accounting for 76% of observed pica cases. Logistic regression showed a positive correlation between pica in pregnancy with pregnancy complications, lower educational attainment, and use of iron supplementation. A study of pica in pregnant Mexican-born women living in either the United States or Mexico found differing rates of pagophagy between the two groups.A meta-analysis of the prevalence of pica in German children found that 12.3% of German children \"have engaged with a pica behavior at some point in their lives,\" but did not specify the types of pica observed. Despite pica being observed in young children, it is important to note that it is also a common eating disorder among those who are intellectually impaired. Thus, proper diagnosis of pica is essential, requiring the children to be at least above two years of age, as it is more common to see children younger than two consuming nonnutritive substances. In children, pica is usually short term and will disappear spontaneously. In terms of studies regarding a specific type of pica, a cross-sectional study of American children receiving chronic hemodialysis therapy found that 34.5% of the children studied engaged in pagophagy compared to 12.6% of children who engaged in other forms of pica.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_8" +} \ No newline at end of file diff --git a/test/Food_and_drink/Wilderness-acquired_diarrhea.json b/test/Food_and_drink/Wilderness-acquired_diarrhea.json new file mode 100644 index 0000000000000000000000000000000000000000..2e28cb685cd9cd639f0cd42e7306ab5b1f9dc823 --- /dev/null +++ b/test/Food_and_drink/Wilderness-acquired_diarrhea.json @@ -0,0 +1,57 @@ +{ + "domain": "Food_and_drink", + "document": "Wilderness-acquired diarrhea is a variety of traveler's diarrhea in which backpackers and other outdoor enthusiasts are affected. Potential sources are contaminated food or water, or \"hand-to-mouth\", directly from another person who is infected. Cases generally resolve spontaneously, with or without treatment, and the cause is typically unknown. The National Outdoor Leadership School has recorded about one incident per 5,000 person-field days by following strict protocols on hygiene and water treatment. More limited, separate studies have presented highly varied estimated rates of affliction that range from 3 percent to 74 percent of wilderness visitors. One survey found that long-distance Appalachian Trail hikers reported diarrhea as their most common illness. Based on reviews of epidemiologic data and literature, some researchers believe that the risks have been over-stated and are poorly understood by the public.\nThe average incubation periods for giardiasis and cryptosporidiosis are each 7 days. Certain other bacterial and viral agents have shorter incubation periods, although hepatitis may take weeks to manifest itself. The onset usually occurs within the first week of return from the field, but may also occur at any time while hiking.Most cases begin abruptly and usually result in increased frequency, volume, and weight of stool. Typically, a hiker experiences at least four to five loose or watery bowel movements each day. Other commonly associated symptoms are nausea, vomiting, abdominal cramping, bloating, low fever, urgency, and malaise, and usually the appetite is affected. The condition is much more serious if there is blood or mucus in stools, abdominal pain, or high fever. Dehydration is a possibility. Life-threatening illness resulting from WAD is extremely rare but can occur in people with weakened immune systems.\nSome people may be carriers and not exhibit symptoms.\nInfectious diarrhea acquired in the wilderness is caused by various bacteria, viruses, and parasites (protozoa). The most commonly reported are the protozoa Giardia and Cryptosporidium. Other infectious agents may play a larger role than generally believed and include Campylobacter, hepatitis A virus, hepatitis E virus, enterotoxogenic E. coli, E. coli O157:H7, Shigella, and various other viruses. More rarely, Yersinia enterocolitica, Aeromonas hydrophila, and Cyanobacterium may also cause disease.Giardia lamblia cysts usually do not tolerate freezing although some cysts can survive a single freeze:thaw cycle. Cysts can remain viable for nearly three months in river water when the temperature is 10 °C and about one month at 15:20 °C in lake water. Cryptosporidium may survive in cold waters (4 °C) for up to 18 months, and can even withstand freezing, although its viability is thereby greatly reduced. Many other varieties of diarrhea-causing organisms, including Shigella and Salmonella typhi, and hepatitis A virus, can survive freezing for weeks to months. Virologists believe all surface water in the United States and Canada has the potential to contain human viruses, which cause a wide range of illnesses including diarrhea, polio and meningitis. Modes of acquiring infection from these causes are limited to fecal-oral transmission, and contaminated water and food. The major factor governing pathogen content of surface water is human and animal activity in the watershed.\nIt may be difficult to associate a particular case of diarrhea with a recent wilderness trip of a few days because incubation of the disease may outlast the trip. Studies of trips that are much longer than the average incubation period, e.g. a week for Cryptosporidium and Giardia, are less susceptible to these errors since there is enough time for the diarrhea to occur during the trip. Other bacterial and viral agents have shorter incubation periods, although hepatitis may require weeks.A suspected case of wilderness-acquired diarrhea may be assessed within the general context of intestinal complaints. During any given four-week period, as many as 7.2% of Americans may experience some form of infectious or non-infectious diarrhea. There are an estimated 99 million annual cases of intestinal infectious disease in the United States, most commonly from viruses, followed by bacteria and parasites, including Giardia and Cryptosporidium. There are an estimated 1.2 million U.S. cases of symptomatic giardiasis annually. However, only about 40% of cases are symptomatic.\nSince wilderness acquired diarrhea can be caused by insufficient hygiene, contaminated water, and (possibly) increased susceptibility from vitamin deficiency, prevention methods should address these causes.The risk of fecal-oral transmission of pathogens that cause diarrhea can be significantly reduced by good hygiene, including washing hands with soap and water after urination and defecation, and washing eating utensils with warm soapy water. Additionally a three-bowl system can be used for washing eating utensils.Water can be treated in the wilderness through filtering, chemical disinfectants, a portable ultraviolet light device, pasteurizing or boiling. Factors in choice may include the number of people involved, space and weight considerations, the quality of available water, personal taste and preferences, and fuel availability.In a study of long-distance backpacking, it was found that water filters were used more consistently than chemical disinfectants. Inconsistent use of iodine or chlorine may be due to disagreeable taste, extended treatment time or treatment complexity due to water temperature and turbidity.\nBecause methods based on halogens, such as iodine and chlorine, do not kill Cryptosporidium, and because filtration misses some viruses, the best protection may require a two-step process of either filtration or coagulation-flocculation, followed by halogenation. Boiling is effective in all situations.\nIodine resins, if combined with microfiltration to remove resistant cysts, are also a viable single-step process, but may not be effective under all conditions. New one-step techniques using chlorine dioxide, ozone, and UV radiation may prove effective, but still require validation.\nUltraviolet (UV) light for water disinfection is well established and widely used for large applications, like municipal water systems. Some hikers use small portable UV devices which meet the U.S. EPA Guide Standard and Protocol for Testing Microbiological Water Purifiers, for example, the SteriPEN. Another approach to portable UV water purification is solar disinfection (also called sodis). Clear water is sterilized by putting it in a clear polyethylene (PET) bottle and leaving it in direct sunlight for 6 hours.\nDifferent types of water sources may have different levels of contamination:More contamination may be in water that\nlikely could have passed through an area subject to heavy human or animal use\nis cloudy, has surface foam, or has some other suspicious appearance.\nLess contamination may be in water from\nsprings (provided the true source is not surface water a short distance above)\nlarge streams (those entering from the side may have less contamination than those paralleling the trail)\nfast-flowing streams\nhigher elevations\nlakes with undisturbed sediments (10 days undisturbed water storage can result in 75:99% removal of coliform bacteria by settling to the bottom)\nfreshly melted snow\ndeep wells (provided they aren't subject to contamination from surface runoff)\nregions where there was a heavy snow year when streams run full and long compared to dry years.\nRain storms can either improve or worsen water quality. They can wash contaminants into water and stir up contaminated sediments with increasing flow, but can also dilute contaminants by adding large amounts of water.\nUnfortunately, there have not been any epidemiological studies to validate the above, except possibly for the case of spring water.\nOne study suggests that on very long trips in the wilderness, taking multivitamins may reduce the incidence of diarrhea.WAD is typically self-limited, generally resolving without specific treatment. Oral rehydration therapy with rehydration salts is often beneficial to replace lost fluids and electrolytes. Clear, disinfected water or other liquids are routinely recommended.Hikers who develop three or more loose stools in a 24-hour period : especially if associated with nausea, vomiting, abdominal cramps, fever, or blood in stools : should be treated by a doctor and may benefit from antibiotics, usually given for 3:5 days. Alternatively, a single dose azithromycin or levofloxacin may be prescribed. If diarrhea persists despite therapy, travelers should be evaluated and treated for possible parasitic infection.\nCryptosporidium can be quite dangerous to patients with compromised immune systems. Alinia (nitazoxanide) is approved by the FDA for treatment of Cryptosporidium.\nThe risk of acquiring infectious diarrhea in the wilderness arises from inadvertent ingestion of pathogens. Various studies have sought to estimate diarrhea attack rates among wilderness travelers, and results have ranged widely. The variation of diarrhea rate between studies may depend on the time of year, the location of the study, the length of time the hikers were in the wilderness,the prevention methods used, and the study methodology.\nThe National Outdoor Leadership School (NOLS), which emphasizes strict hand-washing techniques, water disinfection and washing of common cooking utensils in their programs, reports that gastrointestinal illnesses occurred at a rate of only 0.26 per 1000 program days. In contrast, a survey of long-distance Appalachian Trail hikers found more than half the respondents reported at least one episode of diarrhea that lasted an average of two days. (Infectious diarrhea may last longer than an average of two days; certain forms of non-infectious diarrhea, caused by diet change etc., can be of very brief duration). Analysis of this survey found occurrence of diarrhea was positively associated with the duration of exposure in the wilderness. During any given four-week period, as many as 7.2% of Americans may experience some form of infectious or non-infectious diarrhea. A number of behaviors each individually reduced the incidence of diarrhea: treating water; routinely washing hands with soap and water after defecation and urination; cleaning cooking utensils with soap and warm water; and taking multi-vitamins.\nA variety of pathogens can cause infectious diarrhea, and most cases among backpackers appear to be caused by bacteria from feces. A study at Grand Teton National Park found 69% of diarrhea affected visitors had no identifiable cause, that 23% had diarrhea due to Campylobacter and 8% of patients with diarrhea had giardiasis. Campylobacter enteritis occurred most frequently in young adults who had hiked in wilderness areas and drunk untreated surface water in the week prior. Another study tested 35 individuals before and after a trip to the Desolation Wilderness of California. Giardia cysts were found in fecal samples from two people after the trip, but they were asymptomatic. A third person was empirically treated for symptoms of giardiasis.\nFecal-oral transmission may be the most common vector for wilderness acquired diarrhea. There are differing opinions regarding the importance of routine disinfection of water during relatively brief backcountry visits.\nInfection by fecal coliform bacteria, which indicate fecal pollution, are more common than giardiasis. Risks are highest in surface water near trails used by pack animals and cattle pastures.Most samples of backcountry water in the Desolation Wilderness in California have found very low or no Giardia cysts. The infectious dose of giardia, however, is very low, with about 2% chance of infection from a single cyst. Also, very few studies have addressed the issue of transient contamination. According to one researcher, the likely model for the risk of Giardia from wilderness water is pulse contamination, that is, a brief period of high cyst concentration from fecal contamination.\nDiarrhea acquired in the wilderness or other remote areas is typically a form of infectious diarrhea, itself classified as a type of secretory diarrhea. These are all considered forms of gastroenteritis. The term may be applied in various remote areas of non-tropical developed countries (U.S., Canada, western Europe, etc.), but is less applicable in developing countries, and in the tropics, because of the different pathogens that are most likely to cause infection.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "SignificantEvent", + "ScheduledServiceDestination", + "Uses", + "CommissionedBy", + "TypeOfElectrification", + "Represents", + "UsedBy", + "LocatedOnAstronomicalLocation", + "HasQuality", + "IsPollinatorOf", + "MeasuredBy", + "ProducedSound", + "Promoted", + "LocatedIn", + "Causes", + "HasParts", + "HasCharacteristic", + "PartOf", + "Origin", + "HasCause", + "HasEffect", + "DesignedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Food_and_drink_9" +} \ No newline at end of file diff --git a/test/Geography/Age_of_Sail.json b/test/Geography/Age_of_Sail.json new file mode 100644 index 0000000000000000000000000000000000000000..b62978a34dfff3abeb6f9ab8067b7e1978da4184 --- /dev/null +++ b/test/Geography/Age_of_Sail.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The Age of Sail is a period in European history that lasted at the latest from the mid-16th (or mid-15th) to the mid-19th centuries, in which the dominance of sailing ships in global trade and warfare culminated, particularly marked by the introduction of naval artillery, and ultimately reached its highest extent at the advent of steam power. Enabled by the advances of the related Age of Navigation, it is identified as a distinctive element of the early modern period and the Age of Discovery.\nLike most periodic eras, defining the age is inexact and serves only as a general description. The term is used differently for warships and merchant vessels.By the 14th century naval artillery was employed in Europe, documented at the Battle of Arnemuiden (1338). The 15th century saw the Iberian naval ventures all the way along the African Atlantic coast and across the Atlantic Ocean, starting the Age of Discovery.\nFor warships, the age of sail runs roughly from the Battle of Lepanto in 1571, the last significant engagement in which oar-propelled galleys played a major role, to the development of steam-powered warships.\nThe period between the mid-19th century to the early 20th century, when sailing vessels reached their peak of size and complexity (e.g. clippers and windjammers), is sometimes referred to as the \"Golden Age of Sail\".The second sea-going steamboat was Richard Wright's first steamboat Experiment, an ex-French lugger; she steamed from Leeds to Yarmouth in July 1813. The first iron steamship to go to sea was the 116-ton Aaron Manby, built in 1821 by Aaron Manby at the Horseley Ironworks, and became the first iron-built vessel to put to sea when she crossed the English Channel in 1822, arriving in Paris on 22 June. She carried passengers and freight to Paris in 1822 at an average speed of 8 knots (9 mph, 14 km/h). The first purpose-built steam battleship was the 90-gun Napoléon in 1850. Multiple steam battleships saw action during the Crimean War, especially the Allied (British, French and Ottoman) fleet Bombardment of Sevastopol as part of the Siege of Sevastopol (1854:1855). The first ironclad battleship, Gloire, was launched by the French Navy in November 1859. In the March 1862 Battle of Hampton Roads, the ironclad CSS Virginia fought USS Monitor, making this the first fight between ironclads.\nThe Suez Canal in the Middle East, which opened in 1869, was more practical for steamships than for sailing ships, achieving a much shorter European-Asian sea route, which coincided with more fuel-efficient steamships, starting with Agamemnon in 1865.\nBy 1873, the Age of Sail for warships had ended, with HMS Devastation commissioned in 1871. Devastation was the first class of ocean-going battleships that did not carry sails.\nSailing ships continued to be an economical way to transport bulk cargo on long voyages into the 1920s and 1930s, though steamships soon pushed them out of those trades as well. Sailing ships do not require fuel or complex engines to be powered; thus they tended to be more independent from sophisticated dedicated support bases on land. Crucially though, steam-powered ships held a speed advantage and were rarely hindered by adverse winds, freeing steam-powered vessels from the necessity of following trade winds. As a result, cargo and supplies could reach a foreign port in a fraction of the time it took a sailing ship.\nSailing vessels were pushed into narrower and narrower economic niches and gradually disappeared from commercial trade. Today, sailing vessels are only economically viable for small-scale coastal fishing, along with recreational uses such as yachting and passenger sail excursion ships.\nIn recent decades, the commercial shipping industry has been reviving interest in wind assisted ships as a way to conserve fuel in the interest of sustainability.\nA New Age of Sail has been predicted by some experts to occur by 2030, driven by a revolution in energy technology and a desire to reduce carbon emissions from maritime shipping through wind-assisted propulsion. The book Trade Winds: A Voyage to a Sustainable Future for Shipping discusses the potential of a return to wind propulsion through the firsthand experiences of Christiaan De Beukelaer, who spent five months aboard a sailing cargo ship in 2020.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_0" +} \ No newline at end of file diff --git a/test/Geography/Churbaierische_Atlas.json b/test/Geography/Churbaierische_Atlas.json new file mode 100644 index 0000000000000000000000000000000000000000..4225f9353181e16391e668e256e1e24172d19e5b --- /dev/null +++ b/test/Geography/Churbaierische_Atlas.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The Churbaierische Atlas (German: Kurbayerischer Atlas) is a geographical description of the Electorate of Bavaria from the late 17th century.\nThe full original title is:Chur-Bayerischer Atlas / Das ist: Eine Grundrichtige, Historische, und mit vielen schönen Kupfern und Land-Karten gezierte Abbildung, aller in dem hochberühmten Chur-Hertzogthum Ober- und Nieder-Bayern, auch in der Obern Pfalz ligenden vortrefflichen Städten, Märkt, und theils Schlösser, samt deroselben Ursprung, Fortpflanzung und andere merkwürdigste Bayrische Denk-Sachen, alle aus dem unverfälschten Grund der Antiquität enthalten. \nBeschrieben und Verfasset von ANTONIO GUILIELMO Ertl, der Rechten Licenciat, Chur-Bayerischen Hofgerichts-Advocaten, und des Lobwürdigen Closters Steingadten Ober-Richtern zu Widtraeltingen, auch andern Schwäbischen Dorffschafften.Which in English, translates to\nChur-Bayerischer Atlas / That is: A fundamentally correct, historical, and with many beautiful copper and country maps decorated illustration, of all in the highly famous Chur Duchy of Upper and Lower Bavaria, also in the Upper Palatinate's excellent cities, markets, and castles, together with their origin, reproduction, and other most remarkable Bavarian memorabilia, all contained on the unadulterated grounds of antiquity.\nDescribed and written by ANTONIO GUILIELMO Ertl, of the right Licenciat, Chur-Bayerischen Court Advocates, and of the praiseworthy cloister Steingadten Senior judges of Widtraeltingen, also other Swabian villages.The work first appeared in 1687 with a description of the towns, markets and castles of Bavaria. A new two-volume edition was published in 1690, with the addition of volume 2, which also included Bavarian monasteries, abbeys, provostries and convents. The copperplate engravings are by Johann Ulrich Krauß (1655-1719). The Munich jurist Anton Wilhelm Ertl (1654-1715) - at this time chief judge of Steingaden Abbey in Wiedergeltingen - wrote the text. Further editions were published in 1698, 1703, and 1705.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_1" +} \ No newline at end of file diff --git a/test/Geography/Five_themes_of_geography.json b/test/Geography/Five_themes_of_geography.json new file mode 100644 index 0000000000000000000000000000000000000000..145b0eb4c8463ce9de9c12379ee1cfdf71916cac --- /dev/null +++ b/test/Geography/Five_themes_of_geography.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The five themes of geography are an educational tool for teaching geography. The five themes were published in 1984 and widely adopted by teachers, textbook publishers, and curriculum designers in the United States. Most American geography and social studies classrooms have adopted the five themes in teaching practices, as they provide \"an alternative to the detrimental, but unfortunately persistent, habit of teaching geography through rote memorization\". They are pedagogical themes that guide how geographic content should be taught in schools.\nFive Themes of geography:Location\nPlace\nHuman-Environment Interaction\nMovement\nRegion\nEvery point on Earth has a location. Location can be described in two different ways:Absolute location, a location as described by its latitude and longitude on the Earth. For example, the coordinates of Albany, New York are 42.6525° N, 73.7572° W.\nRelative location, a location as described by where it is compared to something else. For example, Albany, New York is roughly 140 miles north of New York City.\nEvery site on Earth has a unique absolute location, which can be identified with a reference grid (such as latitude and longitude). Maps and globes can be used to find location and can also be used to convey other types of geographical information. Map projections are used to represent the three-dimensional Earth on a two-dimensional map. The Earth's position relative to the Sun affects climate, seasons, and time zones. Location as a theme helps teachers to demonstrate to students that observers have to know and be able to explain where something is before it can be examined geographically. It allows the examination of spatial relationships using spatial ideas such as distance, direction, adjacency, proximity, and enclosure.\nA place is an area that is defined by everything in it. It differs from location in that a place is conditions and features, and location is a position in space. Places have physical characteristics, such as landforms and plant and animal life, as well as human characteristics, such as economic activities and languages. All places have features that give them personality and distinguish them from other places. It is a combination of the “features, perceptions, and activities that occur in a given location\".Toponym: a place name, especially one derived from a topographical feature.\nSite: an area of ground on which a town, building, or monument is constructed.\nSituation: the location and surroundings of a place.\nPopulation: the number of people that live in the area.\nThis theme describes how people interact with the environment, and how the environment responds, with three key concepts:Dependency: Humans depend on the environment.\nAdaptation: Humans adapt to the environment.\nModification: Humans modify the environment.\nSub-themes include \"the earth as an environmental system\" (including the role and problems of technology, environmental hazards and limits, and adaptation) and \"ethics and values\" (differing cultural values and the trade-off between economic development and environmental protection). In the original 1984 Guidelines for Geographic Education: Elementary and Secondary Schools, this was called “relationships within places\". It focused on the advantages and disadvantages for human settlement in places. It was later renamed to human-environment interaction. This theme is not exclusive to geography, as it is a goal for many disciplines of study.\nMovement is the travel of people, goods, and ideas from one location to another. Examples of movement include the United States' westward expansion, the Information Revolution, and immigration. New devices such as the airplane and the Internet allow physical and ideological goods to be transferred long distances in short time intervals. A person's travel from place to place, and the actions they perform there are also considered movement.Places are connected by movement:\nMethods of transportation (transportation geography) : public transportation, private transportation, freight transportation\nMovement in everyday life\nHistory of movement\nEconomic factors influencing movement\nEnergy or mass induced movement : the water cycle, tectonic plates, movements within ecosystems, etc.\nGlobal interdependence\nModels of human interaction, including gravity models and central place theory\nIn the original 1984 Guidelines for Geographic Education: Elementary and Secondary Schools document, movement was called “relationships between places\". Transportation routes and telephone lines that link people all over the world are visible examples of relationships between places.\nRegions are areas with distinctive characteristics: human characteristics, such as demographics or politics, and physical characteristics, such as climate and vegetation. For example, the US is a political region because it shares one governmental system.Regions may have clear, well-defined borders or vague boundaries.\nUniform region : \"defined by some uniform cultural or physical characteristic\", such as the Bible Belt or New England\nFunctional region : space organized around a focal point, such as a metropolitan area or around the flow of something, like the water of the Amazon Basin, or the flow of travelers in an airport\nCultural diversity : regions are a way to understand human diversity.\nUniform regions and formal regions share a similar definition, with formal regions being “a group of places that have similar conditions\". Even in formal regions, it is true that no region is completely homogeneous, as characteristics vary from place to place. While regions all share at least one common trait, it is true that they can have multiple traits that unite them, an example being a region that shares a language and a government.\nThe five themes of geography were published in the 1984 Guidelines for Geographic Education: Elementary and Secondary Schools by the National Council for Geographic Education/Association of American Geographers Joint Committee on Geographic Education. The document was 28 pages, and suggested the themes as a way for teachers to organize content for geography classes. The committee included Salvatore J. Natoli, Richard G. Boehm, James B. Kracht, David A. Lanegran, Janice J. Monk, and Robert W. Morrill. They settled on five themes: location, place, relationships within places (later changed to human-environment interaction), relationships between places (later shortened to movement), and region. The themes were not a \"new geography\" but rather a conceptual structure for organizing information about geography.The themes became widespread in American social science education and were used for teacher training by the National Geographic Society's statewide alliances. They also played a role in reestablishing geography in school curricula. When the National Geography Standards were released in 1994, people compared them to the five themes, saying that the themes had a simplicity that the new standards were lacking.\nIn 1992, a National Assessment of Educational Progress consensus group said that the five themes are useful for teaching, but that for assessment, geography should be divided into the three topics of \"space and place\", \"environment and society\", and \"spatial dynamic and connections\".\nThe five themes continue to be used as an educational approach in many educational outlets. As of 2012, they are included in the National Council for the Social Studies elementary school standards and in state social studies standards.\nThe five themes continue to be used as an educational approach in many educational outlets. As of 2012, they are included in the National Council for the Social Studies elementary school standards and in state social studies standards. The influence of the five themes can still be found in many standards, such as the National Council for the Social Studies (NCSS) Standards for elementary grades. With the increase of emphasis placed on standardized testing in the United States, social studies, and thus geography, is receiving less time in elementary classrooms.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_2" +} \ No newline at end of file diff --git a/test/Geography/Four_traditions_of_geography.json b/test/Geography/Four_traditions_of_geography.json new file mode 100644 index 0000000000000000000000000000000000000000..d146486a1ba8021628cd1b080fad1429a4b803d3 --- /dev/null +++ b/test/Geography/Four_traditions_of_geography.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "William Pattison's four traditions of geography, often referred to as just the four traditions of geography, are a proposed way to organize the various competing themes and approaches within geography. Proposed in a 1964 article in the Journal of Geography to address criticism that geography was undisciplined and calls for definitions of the scope of geography as a discipline that had been ongoing for at least half a century, the four traditions of geography propose that American geographers work was consistent, but fit into four distinct traditions rather than one overarching definition. The original traditions proposed by Pattison are the spatial tradition, the area studies tradition, the Man-Land tradition, and the Earth science tradition. A theme among these traditions is interconnectedness, and it has been referenced in relation to the Tobler's first law of geography.\nThe four traditions of geography have been widely used to teach geography in the classroom as a compromise between a single definition and memorization of many distinct sub-themes. There are many competing methods to organize geography. The original four traditions have had several proposed changes.\nThe spatial or locational tradition is concerned with employing quantitative methods to describe the spatial characteristics of a location. The spatial tradition seeks to use the spatial characteristics of a location or phenomena to understand and explain it. The contributors to this tradition were historically cartographers, but it now encompasses what we call technical geography and geographic information science.The area studies or regional tradition is concerned with the description of the unique characteristics of the earth's surface, resulting in each area from the combination of its complete natural or elements, as of physical and human environment. The main aim is to understand, or define the uniqueness, or character of a particular region that consists of natural as well as human elements. Attention is paid also to regionalization, which covers the proper techniques of space delimitation into regions.The Human Environment Interaction tradition (originally the Man-Land), also known as Integrated geography, is concerned with the description of the spatial interactions between humans and the natural world. It requires an understanding of the traditional aspects of physical and human geography, like how human societies conceptualize the environment. Integrated geography has emerged as a bridge between human and physical geography due to the increasing specialization of the two sub-fields, or branches.The Earth science tradition is largely concerned with what is generally referred to as physical geography. The tradition focuses on understanding the spatial characteristics of natural phenomena. Some argue the Earth science tradition is a subset of the spatial tradition, however, the two are different enough in their focus and objectives to warrant separation.One of the most contentious terms is the \"man-land tradition.\" This has been largely replaced by the term \"human-environment interaction\" or integrated geography. The Area studies tradition is also called the \"regional\" tradition.Pattison's Four Traditions of Geography have significantly influenced the structure of geographic inquiry. This framework has provided a foundation for organizing and understanding the diverse methodologies and approaches within the field. Scholars and students continue to engage with these traditions, contributing to ongoing debates and advancements in geographical research.While widely embraced, the Four Traditions have not been without criticism. Some scholars argue for a more integrated and interdisciplinary approach that transcends the boundaries of these traditions. Additionally, ongoing developments in technology, globalization, and environmental concerns have prompted discussions on potential expansions or revisions to accommodate contemporary challenges.There are many other methods for organizing geography, including three branches proposed in the UNESCO Encyclopedia of Life Support Systems, which consist of physical geography, human geography, and technical geography.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_3" +} \ No newline at end of file diff --git a/test/Geography/Geography_Cup.json b/test/Geography/Geography_Cup.json new file mode 100644 index 0000000000000000000000000000000000000000..c2aaf7bda3ebe6c794ff9de236b4a5b5477f21ec --- /dev/null +++ b/test/Geography/Geography_Cup.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The Geography Cup is an online, international competition between the United States and the United Kingdom, with the aim of determining which nation collectively knows more about geography. It was also intended to raise awareness of the importance of world geography in the modern world. Any resident of the US or UK could participate to test their own geographic knowledge and to support their nation. The first (and so far only) competition took place between 12 November and 31 December 2006 to coincide with Geography Awareness Week, the third week in November.\nThe Geography Cup was created in late 2006 by two geography enthusiasts: Roger Andresen from Atlanta, Georgia, and Daniel Raven-Ellison, a geography teacher from Reading, Berkshire. Both became committed to expanding public awareness of the importance of geography after seeing the results of polls illustrating Americans' and Britons' startling lack of geographical knowledge. A poll of young Americans conducted in the United States by National Geographic in 2006 found that only 37% of those polled could find Iraq on a map, and half could not even find the state of New York.Andresen and Raven-Ellison created the competition for two main reasons. One reason was to determine whether people who live in the United States or people who live in the United Kingdom knew more about world geography. However, the main reason was to encourage people to learn more about world geography and to understand the importance of geography. \nThe two creators plan to hold the competition yearly beginning in the third week in November to coincide with Geography Awareness Week, established in the United States by Ronald Reagan in 1987. In 2007, more than 18,000 people participated.\nAny citizen of the USA or the UK was eligible to participate in the contest. Upon signup, the website determined which country a user lived in based on their IP address and automatically put the user into the correct team. The quiz consisted of thirteen random, geography-related questions that had to be answered in a total of two minutes. The first ten questions consisted of placing randomly selected countries onto a blank political map. The final three questions consisted of geography-related trivia questions that were answered by selecting the correct country on the blank map. Each user could practice, affect their own score, and learn about geography by playing as many times as they wanted to, but only three plays per 24-hour period could affect their nation's score.The randomly selected countries could be any country (or territory) in the world. This included the large and well-known regions (Russia, Canada, United States, etc.) as well as smaller and more obscure nations (Palau, Djibouti, Togo, etc.). Most participants had little trouble recognizing the major European and Asian countries but many people on both teams had trouble locating small Pacific Islands and some African countries.\nThe trivia questions were sometimes related directly to geography, e. g., \"Made up of 33 atolls, which country straddles both the equator and the International Date Line?\" (Kiribati). However, some were about current events to test if participants knew where, geographically, news stories were taking place, e. g., \"Which Asian country recently made its first test of a nuclear weapon?\" (North Korea).\nDue to the large difference in population between the United States and the United Kingdom, the score of each team was determined by an average percentage based on the percentage scores of each individual player. After each game, a player could see how he or she affected their nation's score and their own personal percentage. Because there were 13 questions, each question was worth approximately 7.7%.The USA won with a final accuracy score of 62.368% after trailing for a few days, while the UK lagged behind slightly at the end with an accuracy of 57.947%. The USA had 41,885 participants while the UK team had 10,820, indicating about 30% greater per capita participation in the UK.Users in Britain using Internet Explorer reported some problems with the website. Also, some US and UK residents were rejected or put into the incorrect team because their internet service provider used overseas servers. Finally, after the surge of media attention following the Reuters and Christian Science Monitor articles, the number of users exceeded the capacity of the servers, causing a temporary suspension of the competition.The Geography Cup was sponsored by A Broader View, founded by Roger Andresen to decrease geographical ignorance with geography puzzles and games. It is also sponsored by Give Geography Its Place, founded by Daniel Raven-Ellison and David Rayner to raise awareness of the importance geography in UK media. The third sponsor is Nelson Thornes, a UK-based educational publisher owned by Wolters Kluwer.The Geographic Alliance in Nevada (GAIN), part of National Geographic EdNet, encouraged its members to participate in the competition in the belief that \"It is only fitting that these two countries compete in a geography competition, as they both share the same widely-publicized affliction.\" Polls in the United States, including the National Geographic-Roper poll, and similar polls in the UK, which include a magazine poll cited by the BBC, illustrate a glaring lack of geographic knowledge by young people on both sides of the Atlantic Ocean. In addition, a group of geography teachers and enthusiasts from the UK on a Staffordshire Learning Net geography forum supported the competition and encouraged students to try to improve their nation's score.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_4" +} \ No newline at end of file diff --git a/test/Geography/Jebel_Akhdar_(Libya).json b/test/Geography/Jebel_Akhdar_(Libya).json new file mode 100644 index 0000000000000000000000000000000000000000..f602a6b499c8ae99269b54abe2c292a442c0dbd4 --- /dev/null +++ b/test/Geography/Jebel_Akhdar_(Libya).json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The Jebel Akhdar is a heavily forested, fertile upland area in northeastern Libya. It is located in the modern shabiyahs or districts of Derna, Jabal al Akhdar, and Marj.\nThe Jebel Akhdar consists of a mountainous plateau rising to an altitude of 900 metres (3,000 ft), cut by several valleys and wadis. It forms the north-western part of the peninsula that sticks north into the Mediterranean Sea, with the Gulf of Sidra on the west, and the Levantine Basin on the east. It runs from Bengazi eastward to just east of Derna, fronting the coast for about 330 kilometres (210 mi). Due to erosion and deposition, the plateau is sometimes as much as 16 kilometres (9.9 mi) from the shore, but it forms cliffs on the headlands. The final uplift and arching of the plateau was completed in the Miocene.The region is one of the very few forested areas of Libya, which taken as a whole is one of the least forested countries on Earth. The Jebel Akhdar is the wettest part of Libya, receiving some 600 millimetres (24 in) of precipitation annually. The high rainfall contributes to the area's large forests containing Chammari, and enables rich fruit, potato, and cereal agriculture, something of a rarity in an arid country like Libya. Camels, goats and sheep are herded in and around the Jebel Akhdar and the herders tend to be nomadic.\nIn marked contrast to the aridity prevailing in most of Libya, there are forested areas in this region totalling around 3200 km2, although approximately a third of the original forest has already been destroyed to make way for agriculture. In addition to the forests there are also large areas of maquis and steppe-like vegetation. Typical maquis species are the Phoenician juniper (Juniperus phoenicea), the mastic tree (Pistacia lentiscus), the Kermes oak (Quercus coccifera) and the carob tree (Ceratonia siliqua). In the drier steppe-like areas, branched asphodel (Asphodelus ramosus), prickly burnet (Sarcopoterium spinosum) and white wormwood (Artemisia herba-alba) predominate.More than half of the endemic plant species in Libya are to be found in the Jebel Akhdar and, of these, seven are found only in the region: Arbutus pavarii, Arum cyrenaicum, Bellis sylvestris var. cyrenaica, Cyclamen rohlfsianum, Cynara cyrenaica, Onopordum cyrenaicum and Romulea cyrenaica.\nDocuments created during the New Kingdom of Egypt record that to the west there were large populations of metal workers who lived in towns and had plentiful livestock. The only plausible location for these \"Libyans\" is the Jebel Akhdar.The ancient Greek colony of Cyrene was located in a lush valley in the Jebel Akhdar, with the ruins remaining. It was the Greeks who introduced farming to the Jebal Akhdar when they colonised its verdant valleys in around 600 BC.\nDuring the Italian occupation these mountains were identified as a promising area for agriculture and many Italians moved here in the 1930s. This settlement was interrupted during World War II and the villages and farms were deserted and were later reoccupied by Libyans. The mountain chain was the site of major battles between the British Commonwealth and the Axis forces during World War II.The Libyan leader Omar al-Mukhtar used this heavily forested mountainous region to resist the Italian colonization of Libya for more than twenty years.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_5" +} \ No newline at end of file diff --git a/test/Geography/Land_systems.json b/test/Geography/Land_systems.json new file mode 100644 index 0000000000000000000000000000000000000000..b1bf40921e1a3f6b43c32e00d1a48cdca36457fd --- /dev/null +++ b/test/Geography/Land_systems.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "Land systems constitute the terrestrial component of the Earth system and encompass all processes and activities related to the human use of land, including socioeconomic, technological and organizational investments and arrangements, as well as the benefits gained from land and the unintended social and ecological outcomes of societal activities. Changes in land systems have large consequences for the local environment and human well-being and are at the same time pervasive factors of global environmental change. Land provides vital resources to society, such as food, fuel, fibres and many other ecosystem services that support production functions, regulate risks of natural hazards, or provide cultural and spiritual services. By using the land, society alters and modifies the quantity and quality of the provision of these services.\nLand system changes are the direct result of human decision making at multiple scales ranging from local land owners decisions to national scale land use planning and global trade agreements. The aggregate impact of many local land system changes has far reaching consequences for the Earth System, that feedback on ecosystem services, human well-being and decision making. As a consequence, land system change is both a cause and consequence of socio-ecological processes.\nThe Global Land Programme (GLP) of Future Earth is an interdisciplinary community of science and practice fostering the study of land systems and the co-design of solutions for global sustainability.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_6" +} \ No newline at end of file diff --git a/test/Geography/Rosgen_Stream_Classification.json b/test/Geography/Rosgen_Stream_Classification.json new file mode 100644 index 0000000000000000000000000000000000000000..ad3ab2cdbd4f60ba43cf442b572215ddf8b4cfa8 --- /dev/null +++ b/test/Geography/Rosgen_Stream_Classification.json @@ -0,0 +1,53 @@ +{ + "domain": "Geography", + "document": "The Rosgen Stream Classification is a system for natural rivers in which morphological arrangements of stream characteristics are organized into relatively homogeneous stream types. This is a widely used method for classifying streams and rivers based on common patterns of channel morphology. The specific objectives of this stream classification system are as follows) predict a rivers behavior from its appearance; 2) develop specific hydrologic and sediment relationships for a given stream type and its state; 3) provide mechanisms to extrapolate site-specific data to stream reaches having similar characteristics; and 4) provide a consistent frame of reference for communicating stream morphology and condition among a variety of disciplines and interested parties. These objectives are met through Rosgen's four hierarchical levels (I-IV) of river morphology.\nLevel I categorize stream types into letters A - G based on their geomorphic characteristics that result from the integration of basin relief, land form, and valley morphology. This is a general way in which the morphology of a stream can be described. Many of the Level I criteria can be determined through topographic and landform maps, aerial imagery, and geospatial data.Level II characterizes stream type by using numbers 1 - 6, in addition to letters A - G, to include the assessments of the channel cross-section, longitudinal profile, and plan-form pattern. Cross-section measurements include a streams entrenchment ratio, width/depth ratio, and dominant substrate. The longitudinal and plan-form measurements consist of slope, stream bed features, sinuosity, and meander width ratio. Level II is a quantitative morphological assessment of the stream reach which provides greater detail from data collected in the field for the implementation into land management decisions.Level III describes the existing condition of a stream as it relates to its stability, response potential, and function. This level includes additional measurements such as, sediment supply, channel stability, and flow regime which further describe the condition or “state” of the stream.Level IV verifies the process relationships inferred from the previous three levels of classification. The objective of this level is to determine empirical relationships for use in prediction (e.g. to develop Manning's n values from measured velocity)The Rosgen Stream Classification is probably best applied as a communication tool to describe channel form. Other uses for the Rosgen Stream Classification include fish habitat indices, surveys of riparian communities, stream restoration and mitigation, engineering, evaluating livestock grazing related to stream type, and the use of sediment and hydraulic data by stream type.Problems with the use of the Rosgen Stream Classification are encountered with identifying bankfull dimensions, particularly in incising channels and with the mixing of bed and bank sediment into a single population. Its use for engineering design and restoration may be flawed by ignoring some processes governed by force and resistance, and the imbalance between sediment supply and transporting power in unstable systemsLimitations for Level II classification involve time dependence, uncertain applicability across physical environments, difficulty in identification of a true equilibrium condition, and uncertain process significance of classification criteria. Implications of using the Rosgen Stream Classification, include: (1) acceptance of the limitations, (2) acceptance of the risk of classifying streams incorrectly, and (3) classification results may be used inappropriately\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AdjacentStation", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Manufacturer", + "PresentedIn", + "PositionHeld", + "SetInPeriod", + "ContributedToCreativeWork", + "UsedBy", + "InspiredBy", + "Contains", + "ProducedSound", + "LocatedIn", + "PartOf", + "HasEffect", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Geography_7" +} \ No newline at end of file diff --git a/test/Government/Continuity_of_government.json b/test/Government/Continuity_of_government.json new file mode 100644 index 0000000000000000000000000000000000000000..ca6618f287bf9f4d53b09080c92a8fd24d7cb249 --- /dev/null +++ b/test/Government/Continuity_of_government.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of a catastrophic event such as nuclear war.\nContinuity of government was developed by the British government before and during World War II to counter threats, such as that of the Luftwaffe bombing during the Battle of Britain. The need for continuity of government plans gained new urgency with nuclear proliferation.\nDuring and after the Cold War countries developed such plans to avoid (or minimize) confusion and disorder due to a power vacuum in the aftermath of a nuclear attack.\nIn the US, COG is no longer limited to nuclear emergencies; the Continuity of Operations Plan was activated following the September 11 attacks.\nDuring the years following the federation of Australia in 1901, several locations were considered for the national capital. One of the criteria used to assess sites was that they needed to be inland so that they could not be attacked from the sea. It was also believed that locations away from the coast would have a lower incidence of disease. During the Cold War the Office of National Assessments believed that it was unlikely that Australian cities would be attacked by the Soviet Union during a nuclear war.The modern Australian Government has plans to enable the continuity of government. As of 2008, these formed part of 'Plan Mercator', which the government has described as aiming \"to minimise the impact of a national security emergency on critical government operations and provide for the rapid resumption of 'near normal' government business under alternate arrangements until normal operations can be resumed\".\nUnder the Australian system of government, there is not necessarily a requirement to maintain the Cabinet in a crisis. If the Prime Minister was killed in a disaster, the Governor-General would need to appoint their successor. A national unity government could also be formed in a major crisis.\nA range of legislation, including the Defence Act 1903 and several health bills, include provisions that can be activated in response to emergencies. There are also plans for the Parliament of Australia to operate from another location if it is unable to sit at Parliament House in Canberra. These plans are classified.\nThe Canberra Times has reported that an Australian Government building in the Canberra suburb of Symonston houses communications systems that would be used to support the continuity of government if Plan Mercator was activated. The building was completed in 2007, and its secret function was disclosed as part of a job advertisement in 2008.\nIn response to the COVID-19 pandemic, the federal and most of the state and territory parliaments cancelled scheduled sittings from March 2020. Federal parliamentary committees continued to operate virtually. The federal parliament met with only the number of members necessary to form a quorum present on several occasions between March and June 2020, and resumed full sittings from August that year. The arrangements in place from August allowed members of parliament who were unable to travel to Canberra to participate virtually, but these members were unable to vote in proceedings.\nPrime Minister Scott Morrison arranged to be secretly appointed to hold several ministerial positions during 2020 and 2021, justifying his appointment as the Minister for Finance and Minister for Health as being necessary in case the ministers for portfolios were affected by COVID-19 and unable to perform their duties. Morrison's appointment as Minister for Health was approved in March 2020 by the National Security Committee of Cabinet as part of measures taken in response to the pandemic, but was not publicly announced. His subsequent appointment to the other ministries was not known to other members of the government. An inquiry held into the matter during 2022 that was headed by Former High Court justice Virginia Bell found that Morrison had not needed to hold these ministries, as he could have been appointed \"in a matter of minutes\" if the ministers had been incapacitated. Morrison did not use the powers available to him as Finance or Health minister.\nCanada built numerous nuclear bunkers across the country, nicknamed \"Diefenbunkers\" in a play on the last name of then-Prime Minister John Diefenbaker. In 2016, the Privy Council Office made an agreement with the Department of National Defence to open two bunkers for government officials amid the ongoing North Korean nuclear crisis.The People's Republic of China (PRC) once operated Underground Project 131, intended to be the PLA headquarters in Hubei during a nuclear conflict. Built due to the Sino-Soviet split during that portion of the Cold War, in 1981, the Project 131 site was turned over to the civilian authorities of the prefecture-level city of Xianning, where it is located.The K-116 facility under Zlíchov hill in western Prague was designated to house the Czechoslovak government in case of nuclear attack (together with the K-9 facility in Jihlava) and might still be used as the emergency headquarters of the Czech government and military.During the Cold War, Denmark built two bunker complexes, named REGAN Vest and REGAN Øst (Danish: \"REGeringsANlæg\", translated: \"Government Complex West and Government Complex East\"), in Jutland and Zealand respectively. The idea was to have half of the government and the royal family in one bunker, and the other half in the other, allowing continuity of government, even if one of the bunkers were destroyed or cut off.The Centre d'opération des forces aériennes stratégiques (COFAS) is a hardened command centre for French nuclear forces at Taverny Air Base in Taverny, Val d'Oise. The alternate national command center is located at Mont Verdun near Lyon.The hardened headquarters of Force océanique stratégique (FOST), France's nuclear SSBN fleet, is at Brest, Finistère.\nGermany operated a government bunker (Regierungsbunker) to house the German government, parliament and all federal personnel needed to keep the government working in the event of war or severe crisis. It was decommissioned in 1997.In Ireland, the National Security Committee (NSC) is the conduit for officials to communicate with the Taoiseach (Prime Minister) and/or cabinet members if the normal channel of communication with their minister became unavailable. Drafts of emergency powers legislation have been drawn up in secret, including legislation to deal with circumstances such as an attack on cabinet involving numerous deaths.During the period of the Cold War, it was envisaged that cabinet ministers, senior civil servants and military advisers would use an underground nuclear bunker at Custume Barracks in Athlone in the event of a nuclear exchange. The bunker was equipped with a command and control centre with communications equipment : which had a hotline to the British government in Whitehall : a map room pointing out important areas for protection, kitchen, bedroom and bathroom facilities.\nAs of December 2003 an underground national crisis management center was being constructed at an undisclosed location in the Judaean Mountains under Jerusalem. Another command and control bunker is being built as part of the new Prime Minister's Office complex in Givat Ram.According to Constitution of Poland in case of death or inability to discharging duties of the President, his duties are discharged by Marshal of the Sejm (or if they are unable, the Marshal of the Senate).After Smolensk air disaster in 2010 a lot of the highest state and army offices were emptied. Their duties were automatically taken over by respective deputies.\nThe New Zealand government believes the most likely disaster scenario to affect the government is a large earthquake in Wellington. The government has plans to move Parliament and essential staff to Devonport Naval Base in Auckland if such an event occurs.The website of the Governor-General of New Zealand notes that their constitutional role is to \"maintain the legitimacy and continuity of government by ensuring there is always a government in office with a democratic mandate to govern\".\nThe New Zealand National Crisis Management Centre is located under the \"Beehive\" building in Wellington. An Alternate National Crisis Management Centre is in Auckland, and would be activated if the facility in Wellington was damaged, if multiple crises were occurring or if the government is required to relocate to Auckland.\nThe Norwegian government operates a nuclear bunker called Sentralanlegget in Buskerud County. The bunker is meant to accommodate the Norwegian royal family and the government in case of a nuclear/military attack on the nation, and also function as a wartime headquarters. There is also a bunker beneath Høyblokka in downtown Oslo.In the public domain very little is known about Russia's COG plans. One sprawling underground facility residing in tunnels cut into Mount Yamantau is likely to be related to the survival of Russia's government, given its size and decades long construction history, with a construction start during the rule of Leonid Brezhnev (1964:82). KGB defector Colonel Oleg Gordievsky states that an organization, known as Directorate 15, was (or is) tasked with building and maintaining a network of hundreds of underground command bunkers for the Soviet leadership; this includes the vast site beneath Yamantau Mountain, which is often called Mezhgorye / Межго́рье after the closed city that is located nearby. However, there is speculation, due to its proximity to Chelyabinsk-70, that Yamantau is a 400-square-mile underground complex which houses nuclear warheads, missiles, launch controls, and several nuclear weapons factories designed to continue production after a hypothetical nuclear war begins.The second command and control center in the Urals, after Yamantau, is similarly speculated to be underground and located near, or under, Kosvinsky Kamen. The site is believed to host the Russian Strategic Rocket Forces alternate command post, a post for the general staff built to compensate for the vulnerability of older Soviet era command posts in the Moscow region. In spite of this, the primary command posts for the Strategic Rocket Forces remains Kuntsevo in Moscow and the secondary is the Kosvinsky Mountain in the Urals. The facility at Kosvinsky, finished in early 1996, was designed to resist US earth-penetrating warheads and serves a similar role as the American Cheyenne Mountain Complex.\nFurther command centers, according to globalsecurity.org, include one near Chekhov, which is the Russian General Staff wartime command post, buried deep underground, and Sharapovo(ru) about 80 kilometres (50 mi) south of Moscow, built in the 1950s, Sharapovo is believed to have been the primary backup command center for the Soviet era leadership. Both Chekhov and Sharapovo are each suggested to have the capability to accommodate about 30,000 individuals, As an alternative to Sharapovo, a secondary political leadership base is located at Chaadayevka, some 650 kilometers southeast of Moscow near the city of Penza.\nThere is also said to be as many as 12 underground levels beneath the Russian capital of Moscow to protect the government in the Kremlin, known as the Main Directorate of special programs of the President (Glavnoye Upravlenie Specialnih Program: GUSP) (ru) the direct successor of the 15th Directorate of the KGB, which was established in 1977, GUSP is said to oversee, amongst other sites, a parallel track line alongside the Moscow metro, known as the 'Kremlin line' Metro-2 or D-6 to be used in an emergency. Two destinations of this system are suggested to be the old KGB headquarters, now the FSB headquarters, at Lubyanka Square, and the second being regarded as an enormous underground leadership bunker adjacent to Moscow State University. Another alleged subterranean destination, apart from the aforementioned underground town at Ramenki/Moscow State University is Vnukovo-2 airport. Despite official Russian state ambiguity, it is speculated that many of the Moscow bunkers are linked by an underground railway line.\nIn case of war, the Riksdag can convene somewhere else than in the capital, and if necessary, a War Delegation will replace the Riksdag. The War Delegation consists of the Speaker and 50 members of the Riksdag. The government can put a number of enabling acts in force to regulate for example rationing, export and seizing of property. If the government is unable to carry out its duties the Riksdag may decide on the formation of a new government. Likewise, if the Riksdag and the War Delegation are unable to carry out its duties, the government can assume the powers of the Riksdag, but with some limitations.During the Cold War, the Klara skyddsrum (\"Klara shelter\" or \"Klara bunker\") was built underneath Stockholm. The bunker is designed to accommodate two thirds of the government and between 8,000 and 12,000 civilians in the case of a military attack on Stockholm. It is designed as a very large, two-story oval, with multiple entrances. During peacetime, parts of it are used as a parking garage. Sweden built over 65,000 fallout shelters in regular houses, and every county had at least one large hard-rock underground bunker that controlled a number of smaller bunkers that were located in the municipalities.\nThere is little public knowledge about continuity of government in Turkey. The cabinet and presidential offices, based in the capital of Ankara, have secondary sites in Istanbul and İzmir.The primary British COG headquarters is at the Ministry of Defence in Whitehall. The Central Government War Headquarters was previously maintained in a quarry complex near Corsham, Wiltshire. The above-ground support facility was RAF Rudloe Manor.Service command centres are Northwood for the Royal Navy Trident SSBN force, and RAF High Wycombe for the Royal Air Force.\nContinuity of the national government was first threatened in late 1776, when British forces advanced toward the Continental capital at Philadelphia. On December 9, the Continental Congress passed a resolution in anticipation of a British capture:Resolved: That in case this Congress shall be under the necessity of removing from Philadelphia, it shall be adjourned to Baltimore.\nThe Congress was adjourned as planned three days later. Other relocations followed during the course of the Revolutionary War.\nFor most of its existence, the United States operated without a standing continuity plan. When British forces burned Washington in 1814, Secretary of State James Monroe received only a few hours' notice to remove the government records. Although his staff saved many valuable records, much was nonetheless destroyed, and the next administration encountered a great deal of confusion.\nIn 1952, President Truman ordered all federal offices to develop their own continuity plans for the event of a civil defense emergency. Plans have been maintained and adapted since then, at times requiring the construction of secret facilities such as the emergency Congress facility in Greenbrier County, West Virginia. The current continuity policy is defined in National Security Policy Directive 51 and its implementation plan. The continuity plan was activated for the first time during the September 11, 2001 attacks and then again during the January 6 United States Capitol attack. Presidential Emergency Action Documents (PEADs) are draft classified executive orders, proclamations, and messages to Congress that are prepared for the President of the United States to exercise or expand powers in anticipation of a range of emergency hypothetical worst-case scenarios, so that they are ready to sign and put into effect the moment one of those scenarios comes to pass.\nThe United States presidential line of succession is the order in which officials of the United States federal government assume the powers and duties of the office of president of the United States if the incumbent president becomes incapacitated, dies, resigns, or is removed from office. It was adopted in 1947, and last revised in 2006. The designated survivor is an individual in the line of succession, chosen to stay away from events such as State of the Union addresses and presidential inaugurations.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_0" +} \ No newline at end of file diff --git a/test/Government/Fall_of_the_Derg_regime.json b/test/Government/Fall_of_the_Derg_regime.json new file mode 100644 index 0000000000000000000000000000000000000000..9a99a90ec28c6eeb209a89828aae8ed1045ee136 --- /dev/null +++ b/test/Government/Fall_of_the_Derg_regime.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "The fall of the Derg was a military campaign that resulted in the defeat of the ruling Marxist:Leninist military junta, the Derg, by the rebel coalition Ethiopian People's Revolutionary Democratic Front (EPRDF) on 28 May 1991 in Addis Ababa, ending the Ethiopian Civil War. The Derg took power after deposing Emperor Haile Selassie and the Solomonic dynasty, an imperial dynasty of Ethiopia that began in 1270. The Derg suffered from insurgency with different factions, and separatist rebel groups since their early rule, beginning with the Ethiopian Civil War. The 1983:1985 famine, the Red Terror, and resettlement and villagization made the Derg unpopular with the majority of Ethiopians tending to support insurgent groups like the Tigray People's Liberation Front (TPLF) and Eritrean People's Liberation Front (EPLF).\nWith the establishment of People's Democratic Republic of Ethiopia in 1987, the Derg, led by Mengistu Haile Mariam, was subdued by rebel groups due to lack of support from the Soviet Union since 1990.\nOne account of the Eritrean People's Liberation Front (EPLF) written in 1980s provides little information about their struggle against the Derg regime, but not as their political ideologies. Dieter Beisel, Reise ins Land der Rebellen, Rowohlt Verlag, Hamburg, 1989, was prominent firsthand journalistic work based on the events surrounding the rebel groups.In September 1962, Eritrea was federated with Ethiopia under Emperor Haile Selassie as the ninth province of the Ethiopian Empire after being ruled as Italy's colony and then put under British administration during the Second World War in 1941. As a result, the Eritrean Liberation Movement (ELM) was formed in Sudan in 1958 to fight for independence. Haile Selassie regime became more authoritarian; political parties were persecuted and freedom of speech and press generally suppressed, and native language was banned in favor of Amharic language.Although Eritrean resistance prevailed throughout the condition with respect to little importance, the movement regarded the turning point in formation of armed separatist groups and movement. Muslim herdsmen lowlander often cemented separatist movement while Christian in the highlands of Eritrea favored to join with Ethiopia. In July 1960, the ELM formed as the Eritrean Liberation Front (ELF) in Cairo by majority Muslims. The number of attack toward the imperial Ethiopian government went from 4 in 1962 to 27 in 1966. The ELF then grew its wing, the Eritrean Liberation Army in early 1967, forcing the Ethiopian government to deploy two brigades into three-phased counterinsurgency operation codenamed Wegaw (lit. \"trash\").\nThe Provisional Military Administrative Committee, also known as, the Derg seized power following a coup d'état of Emperor Haile Selassie, ending the empire administration and put the country into military dictatorship regime in 1975. Upon neutralizing ELM, in mid-1960s, three factions were reorganize to establish the Eritrean People's Liberation Front (EPLF) in 1974, and its military wing Eritrean Liberation Front Army (EPLA). In 1977, the committee elected Mengistu Haile Mariam as the chairman of the Derg while disengaging military posts in Eritrea. The EPLF and ELF launched series offensive in control of most parts of Eritrea other than Asmara, Massawa, Asseb, Barentu, and Senafe. In February 1975, another insurgency group the Tigray People's Liberation Front (TPLF) was formed in response to withdrawal of these areas.Their first attacked took place in August 1975, and the organization steadily supported by local peasants and the populace as whole. During early period of formation, the group fought with multidirectional rivalry in lieu of the central government. In 1978, the Derg commenced formal invasion of Ogaden region by Somalia, which claimed the region into integral part of Greater Somalia. \nThe EPLF and ELF were successful in seizing 80% of Eritrea, but the Derg as soon as diverted their attention to Eritrea after victory against Somalia, fearing the loss of Red Sea in isolation of Ethiopia. In early 1978, they organized 90,000 powerful Second Revolutionary Army (SRA) and launched multi-sided attacks against EPLF and ELF. The Derg achieved control of southern and central Eritrea since their June 1978 military operation, and resumed offensives in November 1978 to capture Agordat, Afabet and Keren.\nThe Derg secured road connecting Massawa with Asmara, but heavily assaulted while besieging fortification of EPLA by June 1983. Although the government made significant investment to infrastructure-rehabilitation projects and villagization of rural population by early 1980s, the Red Terror, and 1983:1985 famine disesteemed the Derg unpopularly, especially from the whole population, and conversely, the opponent rebel groups gained broad support. The Derg also accused relief organizations for the famine for assisting the insurgent groups. By the 1984, the TPLF controlled most of rural area of Tigray, while Adigrat and Shire were de facto under siege. Situation were capsized when EPLF ceased support to TPLF by blockade of route with Sudan in 1985. The Derg advanced its military to Eritrea, and the Tigrayan insurgency were emboldened for potential threat.\nThe EPLF took strategic entrance after year breakup of operations Stealth Offensive and Red Star campaign in June 1982, and retook Teseney, and Aligider, thus captured land connection between Sahel Redoubt and Sudan in January 1984. Subsequently, they retook military outpost of Ethiopia in Alghena area, on the coast of Red Sea a week later. By May 1986, the Asmara:Massawa road destroyed, with air bases and artillery was burned by the insurgent.\nIn September 1987, Mengistu proclaimed Ethiopia as a socialist republic officially named \"People's Democratic Republic of Ethiopia\", and the Derg became Ethiopian Worker's Party. The same year, the Amhara anti-government opposition groups known as the Ethiopian People's Democratic Movement (EPDM) was formed. Together with TPLF, they established coalition known as the Ethiopian People's Revolutionary Democratic Front (EPDRF) in 1989, with Meles Zenawi serving a chairman of both the TPLF and EPDM. Mengistu banned the Ethiopian media from using the term glasnost and perestroika, defying Mikhail Gorbachev who was believed has not fondness for him. Gorbachev sent communist conservatives with military men in Moscow to aid with the rate of 1 billion dollars in the next three consecutive years.\n20,000 Soviet troops were surrendered to EPLF when they attempt infiltrating Afabet, which shocked Gorbachev to turn the decision. He ultimately told to Mengistu that he would do not have opportunity to deal equipments and ceasing by 1990. By the end of decade, the insurgents acceded the importance of mixed economy, multi-party democracy, and open society over socialist dogma in order to aid defeating the Derg. These ideologues would concur with close the United States allies. In early February 1990, EPLF successful controlled Massawa, de-linking the road of Mengistu's army in Asmara and central Eritrea. In early 1990, Mengistu provided emigration of Ethiopian Jews to Israel. The Israeli lobbying campaign peaked on behalf of Mengistu with the February's visit to Israeli foreign minister official to Washington. Many Jewish organizations and leaders even from US Congress discerned Mengistu's task in the lobbying effort.\nOn 5 March 1990, Mengistu delivered lengthy speech to address threats in the country and beseeching reforms. From 17 to 21 January 1991, the EPRDF held its first congress in Tigray, which was published on 10 March containing backward old fashioned Marxist rhetoric: advocating \"People's Republic\" dominated by \"workers and peasants\" in repudiation of \"capitalists with foreign sponsorships\" as well as \"feudals\". Meles concerned about cooperation with the Oromo Liberation Front about future of Ethiopia, which had almost odd coordinations including harassing settlers, abduction relief workers and the Derg outposts. At the end of January 1991, the EPRDF launched campaign to liberate Amhara region codenamed \"Operation Tewedros\". In early March 1991, the Afar Liberation Front became an ally of EPRDF without formal joining. In the same month, they captured Bahir Dar, through Gojjam and Blue Nile, crossing Wollo province via capital Dessie. By this time, the Derg had opted to resistance.\nThey paved to Shewa and Welega to Addis Ababa; in April, they took Oromo dominated territory including the capital of Welega, Nekemte, and moved to Gimbi, by which OLF and EPRDF gained mutual harmony. On 27 May, they had almost controlled the southwest cities such as Jimma, Agaro and Gambela, amid London conference. The Derg authority were immediately fell in disorder, evacuated from the area. On 28 May, the EPRDF took control of Addis Ababa; Mengistu and some other the Derg officials fled the country, or arrested. Mengistu fled to Zimbabwe, where he still lives.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_1" +} \ No newline at end of file diff --git a/test/Government/Fullmetal_Alchemist_(film).json b/test/Government/Fullmetal_Alchemist_(film).json new file mode 100644 index 0000000000000000000000000000000000000000..63a561e880068ee545e5f807f2f69e7723167648 --- /dev/null +++ b/test/Government/Fullmetal_Alchemist_(film).json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "Fullmetal Alchemist is a 2017 Japanese science fantasy action film directed by Fumihiko Sori, starring Ryosuke Yamada, Tsubasa Honda and Dean Fujioka and based on the manga series of the same name by Hiromu Arakawa, covering the first four volumes of the original storyline. It was released in Japan by Warner Bros. Pictures on 1 December 2017. The theme song of the film, \"Kimi no Soba ni Iru yo\", is performed by Misia. Two sequels were released in 2022: Fullmetal Alchemist: The Revenge of Scar and Fullmetal Alchemist: The Final Alchemy.\nIn the fictional country of Amestris, children Edward Elric and his younger brother Alphonse live in a rural town with their mother Trisha while self-learning alchemy. When the brothers commit the taboo act of Human Transmutation to resurrect Trisha after she dies of illness, it backfires and they face the consequences via the Law of Equivalent Exchange: Edward loses his left leg, while Alphonse is dragged into the Gate of Truth. Edward sacrifices his right arm to save his brother's soul and bind it to a suit of armor. His missing limbs are replaced with \"automail\" prosthetics made by the town's automail mechanic whose granddaughter, Winry Rockbell, is the brothers' childhood friend.Edward receives an invitation from Colonel Roy Mustang to join the military. After becoming the country's youngest State Alchemist with the title \"Fullmetal Alchemist\", he and Alphonse begin their quest to find the legendary Philosopher's Stone that can restore their bodies. Years later, the brothers, now teenagers, receive help from Major General Hakuro after another failed attempt to find the stone. Hakuro introduces them to Shou Tucker, a bio-alchemy authority who obtained his State Alchemist credentials by creating a talking chimera. Tucker points them to Dr. Tim Marcoh, who created a Philosopher's Stone prior to going into hiding.\nWhen Edward and Winry find Marcoh, he is murdered by Lust, an assassin. Upon return, Edward and Alphonse are horrified to discover that Tucker has transmuted his young daughter Nina, and his dog together to create a human talking chimera in a bid not to lose his State Alchemist credentials. They have Tucker arrested, though not before he tries to turn Alphonse against Edward, causing the brothers to fight. Edward and Mustang's close friend Major Maes Hughes makes a disturbing discovery from Marcoh's notes, but is killed by Lust's associate Envy. Using Marcoh's notes, Edward is led to the clandestine Fifth Laboratory, where he finds the now-insane Tucker holding Alphonse and Winry hostage. When Edward learns that Philosopher's Stones are unethically created from human lives, he has a breakdown, realizing he can no longer depend on that method.\nLust kills Tucker, revealing herself as a homunculus. Hakuro reveals himself as their partner, divulging that the military made Philosopher's Stones using human hostages. He activates a Mannequin Soldier homunculi army with the Stones but is killed by them. As the military destroys the Mannequins, Mustang kills Lust and tears out the Philosopher's Stone that was powering her body. He gives Edward the stone so he can restore Alphonse but the brothers refuse, now knowing how they are made. Instead, Edward uses the stone to appear before his brother's corporeal body at the Gate of Truth and promises to find another way to restore him.\nIn a mid-credit scene, Envy is revealed to have survived Mustang's attack as its true parasitic form escapes from its human body's charred remains.\nThe film was originally planned to be produced in 2013 but because of low budget and also technology, it was delayed until it was officially announced for production in May 2016. According to the director's press conference in March 2017:[S]ince the main characters are the two brothers, where there is Ed, there will always be Al. Even just based on that, the amount of CG used becomes enormous. In this work, I’m using a technology that was used in Hollywood movies such as The Avengers. We’re using a lot [of] new techniques that were never used in Japanese movies before...\"\nSince the original story consists of 27 volumes, I cut it down in to two hours, but we will stay faithful to the manga. ... I don’t plan to change the setting, the world view, and make a different story... Of course we will have the philosopher's stone...[ in the story].\nOn adapting the source material, Fumihiko Sori said, \"I want to create a style that follows the original manga as much as possible. The cast is entirely Japanese, but the cultural background is Europe. However, it's a style that doesn't represent a specific race or country.\" Regarding the faithfulness of the adaptation, which has characters of non-Japanese ethnicity, the director said, \"There will never be a scene in which a character says something that would identify him/her as Japanese.\"\nSori told Oricon he has a deep affection for the story that tells the \"truth of living,\" and said, \"It is my dearest wish to turn this wonderful story into a film, and it is not an exaggeration to say that I am living for this reason.\" He added that he \"wants to create a wonderful film that uses techniques that challenge Hollywood,\" and noted that nowadays Japanese filmmaking techniques have progressed greatly.\nPrincipal photography took place in Italy. Shooting was spotted in Volterra (identified as Reole from 06 to 12) on the first week of June and some scenes continued filming in Japan from June and finished on 26 August 2016.\nJapanese VFX company OXYBOT inc. provided the visual effects for the film. The first teaser visual was unveiled on 31 December 2016. The updated version with the 2017 New Year Greetings were unveiled on the following day with the text \"Happy New Year\". In February 2017, they unveiled the release date of 1 December, with the CG appearance of Alphonse\nOn 19 February 2018, the film released on Netflix as a Netflix Original Film. Notably, in the English-language dub voice actors Vic Mignogna, Aaron Dismuke, and Caitlin Glass reprised their roles as Edward Elric, Alphonse Elric, and Winry Rockbell respectively from the Funimation dub of the Fullmetal Alchemist anime series.\nThe film received mostly mixed reviews. The review aggregator website Rotten Tomatoes reported that 28% of critics have given the film a positive review based on 18 reviews, with an average rating of 4.8/10. On Metacritic, which assigns and normalizes scores of critic reviews, the film has a weighted average score of 48 out of 100 based on 5 critics, indicating \"mixed or average reviews\".In July 2017, Sori and Yamada said a sequel was in development. In early March 2022, it was announced that two sequels would be released during the year: Fullmetal Alchemist: The Revenge of Scar and Fullmetal Alchemist: The Final Alchemy , with Mackenyu playing the role of Scar. They were released on 20 May and 24 June respectively. They became available on Netflix on 20 August and 24 September respectively.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_2" +} \ No newline at end of file diff --git a/test/Government/Gemma_Ubasart.json b/test/Government/Gemma_Ubasart.json new file mode 100644 index 0000000000000000000000000000000000000000..2aca3d6d16b198d8848c8ab7fa389b7a130f5d47 --- /dev/null +++ b/test/Government/Gemma_Ubasart.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "Gemma Ubasart González is a Spanish political scientist and politician. She served as Minister of Justice, Rights and Memory of Catalonia between October 2022 and August 2024, as city councilor in Castellar del Vallès, secretary for international affairs and public policies for change in Podemos, and secretary general of Podemos in Catalonia in 2015.\nUbasart attended the Autonomous University of Barcelona, where she graduated with a PhD. She also obtained a graduate degree in the penal system and human rights at the University of Barcelona, as well as a postgraduate degree in applied social research and data analysis. She became a professor at the University of Girona, and has also been a professor at the Autonomous University of Madrid.In the 2007 Spanish local elections, she was elected to the city council of her municipality, affiliated with the L'Altraveu per Castellar (es). In November 2014 she was elected a member of the Citizen Council of Podemos, and joined the Coordination Council of Pablo Iglesias Turrión as secretary of international affairs and public policies for change. In February 2015, she was elected secretary general of Podemos in Catalonia, and she held that position until October 10, 2015.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_3" +} \ No newline at end of file diff --git a/test/Government/Government_agency.json b/test/Government/Government_agency.json new file mode 100644 index 0000000000000000000000000000000000000000..ab3fdc1ddfa85c7035ae5f9595f1069247c3e6fc --- /dev/null +++ b/test/Government/Government_agency.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "A government agency or state agency, sometimes an appointed commission, is a permanent or semi-permanent organization in the machinery of government (bureaucracy) that is responsible for the oversight and administration of specific functions, such as an administration. There is a notable variety of agency types. Although usage differs, a government agency is normally distinct both from a department or ministry, and other types of public body established by government. The functions of an agency are normally executive in character since different types of organizations (such as commissions) are most often constituted in an advisory role — this distinction is often blurred in practice however, it is not allowed.\nA government agency may be established by either a national government or a state government within a federal system. Agencies can be established by legislation or by executive powers. The autonomy, independence, and accountability of government agencies also vary widely.\nEarly examples of organizations that would now be termed a government agency include the British Navy Board, responsible for ships and supplies, which was established in 1546 by King Henry VIII and the British Commissioners of Bankruptcy established in 1570.From 1933, the New Deal saw growth in U.S. federal agencies, the \"alphabet agencies\" as they were used to deliver new programs created by legislation, such as the Federal Emergency Relief Administration.\nFrom the 1980s, as part of New Public Management, several countries including Australia and the United Kingdom developed the use of agencies to improve efficiency in public services.\nThe Government agencies in Sweden are State controlled organizations who act independently to carry out the policies of the Government of Sweden. The Ministries are relatively small and merely policy-making organizations, allowed to control agencies by policy decisions but not by direct orders. This means that while the agencies are subject to decisions made by the Government, Ministers are explicitly prohibited (so-called ban on ministerstyre) from interfering with the day-to-day operation in an agency or the outcome in individual cases as well.In addition to the State and its agencies, there are also local government agencies, which are extensions of municipalities and county councils.\nAgencies in the United Kingdom are either executive agencies answerable to government ministers or non-departmental public bodies answerable directly to parliament or the devolved assemblies of the United Kingdom. They are also commonly known as Quangos.Agencies can be created by enabling legislation by the Parliament of the United Kingdom, Scottish Parliament or the Welsh Parliament.\nThe Congress and President of the United States delegate specific authority to government agencies to regulate the complex facets of the modern American federal state. Also, most of the 50 U.S. states have created similar government agencies. Each state government is similar to the national government, with all but one having a bicameral legislature.The term \"government agency\" or \"administrative agency\" usually applies to one of the independent agencies of the United States government, which exercise some degree of independence from the President's control. Although the heads of independent agencies are often appointed by the government, they can usually be removed only for cause. The heads of independent agencies work together in groups, such as a commission, board or council. Independent agencies often function as miniature versions of the tripartite federal government with the authority to legislate (through the issuing or promulgation of regulations), to adjudicate disputes, and to enforce agency regulations. Examples of independent agencies include the Federal Communications Commission (FCC), Federal Reserve Board, U.S. Securities and Exchange Commission (SEC), the National Labor Relations Board (NLRB) and the Federal Trade Commission (FTC).\nA broader definition of the term \"government agency\" also means the United States federal executive departments that include the President's cabinet-level departments and their sub-units. Examples of these include the Department of Energy (DOE) and the Internal Revenue Service (IRS), which is a bureau of the Department of the Treasury.\nMost federal agencies are created by Congress through statutes called \"enabling acts\", which define the scope of an agency's authority. Because the Constitution does not expressly mention federal agencies (as it does the three branches), some commentators have called agencies the \"headless fourth branch\" of the federal government. However, most independent agencies are technically part of the executive branch, with a few located in the legislative branch of government. By enacting the Administrative Procedure Act (APA) in 1946, Congress established some means to oversee government agency action. The APA established uniform administrative law procedures for a federal agency's promulgation of rules and adjudication of claims. The APA also sets forth the process for judicial review of agency action.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_4" +} \ No newline at end of file diff --git a/test/Government/Official_communications_in_imperial_China.json b/test/Government/Official_communications_in_imperial_China.json new file mode 100644 index 0000000000000000000000000000000000000000..5c8236df57a1a9ad1522ceb973a5fe7871814e9e --- /dev/null +++ b/test/Government/Official_communications_in_imperial_China.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "Official communications in imperial China, the era which lasted from the 221 BC until AD 1912, required predictable forms and means. Documents flowed down from the emperor to officials, from officials to the emperor, from one part of the bureaucracy to others, and from the emperor or his officials to the people. These documents, especially memorials to the throne, were preserved in collections which became more voluminous with each passing dynasty and make the Chinese historical record extraordinarily rich.\nThis article briefly describes the major forms and types of communication going up to and down from the emperor.\nUnder Chinese law, the emperor's edicts had the force of law. By the time the Han dynasty established the basic patterns of bureaucracy, edicts or commands could be issued either by the emperor or in the emperor's name by the proper official or unit of the government. Important edicts were carved on stone tablets for public inspection. One modern scholar counted more than 175 different terms for top down commands, orders, edicts, and such.Edicts formed a recognized category of prose writing. The Qing dynasty scholar Yao Nai ranked \"Edicts and orders\" (Zhao-ling) as one of the thirteen categories of prose writing, citing prototypes which went back to the Zhou dynasty and the Book of History. Han dynasty edicts, sometimes actually written by high officials in the name of the emperor, were known for their literary quality. In later dynasties, both emperors and officials who wrote in the emperor's name published collections of edicts.\nThe history of China features a range of famous edicts and instructions. Here are examples in chronological order:\nAn edict issued in 213 BC by Qin Shi Huang of the Qin dynasty ordered the burning of books and burying of scholars.\nThe Edict on the Proclamation of the Dynastic Name (建國號詔) issued in 1271 by Emperor Shizu of the Yuan dynasty promulgated the official dynastic name of \"Great Yuan\", officially established the Yuan dynasty as a Chinese dynasty, and explicitly claimed political succession from the Three Sovereigns and Five Emperors to the Tang dynasty.\nThe Hongwu Emperor of the Ming dynasty issued a series of Great Warnings (御製大誥) which informed his people and his bureaucracy of their failings and his instructions to correct them.\nAlso issued by the Hongwu Emperor, the Instructions of the Ancestor was effectively an edict directed at his descendants.\nThe Hongwu Emperor also issued the Six Maxims (聖諭六言) which instructed his subjects:\nTreat your parents with piety; respect your elders and superiors; live at peace in your villages; instruct your children and grandchildren; make your living peacefully; commit no wrong.\nThe Kangxi Emperor of the Qing dynasty issued the Sacred Edict in 1670 to educate his subjects on Confucian principles. This was to be posted in every village and read periodically to the assembled population. The edict was later expanded upon by the Yongzheng Emperor in 1724 and distributed in Chinese, Manchu and Mongolian languages.\nThe Qianlong Emperor issued an edict to George III of the United Kingdom in 1793 instructing him that England had nothing of value to offer.\nA memorial, most commonly zouyi, was the most important form of document sent by an official to the emperor. In the early dynasties, the terms and formats of the memorial were fluid, but by the Ming dynasty, codes and statutes specified what terminology could be used by what level of official in what particular type of document dealing with what particular type of problem. Criminal codes specified punishments for mistranscriptions or using a character that was forbidden because it was used in one of the emperor's names. The emperor might reply at length, perhaps dictating a rescript in response. More often he made a notation in the margin in vermilion ink (which only the emperor could use) stating his wishes. Or he might simply write \"forward to the proper ministry,\" \"noted,\" or use his brush to make a circle, the equivalent of a checkmark, to indicate that he had read the document.In 1370, the Hongwu emperor established an office to organize the flow of memorials, which could come from both officials and commoners, and this became the Office of Transmission (Tongzheng si). The staff copied each memorial received, and forwarded the original to the emperor. The emperor once severely scolded a director of the office for failing to report several memorials: \"Stability depends on superior and inferior communicating; there is none when they do not. From ancient times, many a state has fallen because a ruler did not know the affairs of the people.\"\nBy the height of the Qing dynasty in the 18th century, memorials from bureaucrats at the central, provincial, and county level supplied the emperors (and modern historians) with personnel evaluations, crop reports, prices in local markets, weather predictions, intelligence on social affairs, and any other matter of possible interest. Memorials were transported by government couriers and then copied and summarized by the Grand Secretariat, which itself had been perfected in the preceding Ming dynasty. They would be copied by clerks and entered into official registers.\nThis bureaucracy saved the emperor from being swamped with tedious detail but might also shield him from information which he needed to know. The Kangxi Emperor (r. 1672:1722), the Yongzheng Emperor (r. 1722:1735), and the Qianlong Emperor (r. 1735:1796) therefore developed a supplementary system of \"Palace Memorials\" (zouzhe) which they instructed local officials to send directly, without passing through bureaucratic filters. One type, the \"Folding Memorial,\" was written on a page small enough for the emperor to hold in his hand and read without being observed. The Yongzheng Emperor, who preferred the written system over audiences, increased the use of these palace memorials by more than ten times over his father. He found he could get quick responses to emergency requests instead of waiting for the formal report, or give frank instructions: Of one official he said, \"he is good-hearted, hard-working old hand. I think he's very good. But he's a bit coarse... just like Zhao Xiangkui, except that Zhao is intelligent.\" Likewise a provincial governor could frankly report that a subordinate was \"scatter brained.\" The emperor could then instruct the official to also submit a routine memorial. Most important, bypassing the regular bureaucracy made it easier for the emperor to have his own way without being restricted by the regulations of the administrative code.\nThe system of memorials and rescripts, even more than personal audiences, was the emperor's way to shape and cement relations with his officials. Memorials could be quite specific and even personal, since the emperor knew many of his officials quite well. The Kangxi Emperor, for instance, wrote one of his generals:\n\"I am fine. It is cool now outside the passes. There has been enough rain so the food now is very good... You're an old man -- are grandfather and grandmother both well?\"\nBut sometimes impatience broke through: \"Stop the incessant sending of these greetings!\" or \"I hear tell you've been drinking. If after receiving my edict you are not able to refrain, and so turn your back on my generosity, I will no longer value you or your services.\" The historian Jonathan Spence translated and joined together memorials of the Kangxi Emperor to form an autobiographical \"self-portrait\" which gives an feel for the emperor's place in the flow of government.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_5" +} \ No newline at end of file diff --git a/test/Government/Quality_of_Nationality_Index.json b/test/Government/Quality_of_Nationality_Index.json new file mode 100644 index 0000000000000000000000000000000000000000..a572d979946f02237e7d304ad3d7ef80992faca6 --- /dev/null +++ b/test/Government/Quality_of_Nationality_Index.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "The Quality of Nationality Index (QNI) ranks the quality of nationalities based on internal and external factors. Each nationality receives an aggregated score based on economic strength, human development, ease of travel, political stability and overseas employment opportunities for their citizens. The QNI was created by Dimitry Kochenov and Christian Kälin, chairman of Henley & Partners.\nThe phenomenon of being a native of any country was described as 'a birthright lottery' by Ayelet Shachar, Professor of Law, Political Science, and Global Affairs at the University of Toronto. At the same time, the QNI shows that nationalities diverge greatly in their practical value, which is not always parallel with the characteristics of those countries, such as economic power or level of human development. Applying the methodology of the QNI, some economically strong countries have relatively unattractive nationalities. For example, Indian nationality shares 106th place with Senegalese nationality (2017 data). By contrast, some small countries have nationalities of larger value, such as those of Lithuania and Romania, which are ranked 22nd and 25th respectively in the QNI 2017.The QNI is frequently cited by media organisations such as Forbes, Bloomberg, The Enquirer and Business Standard.\nThe QNI takes a quantitative approach to determine the value of a nationality based on seven parameters, comprising both internal value (40%) and external value (60%). Three parameters reflect the internal value of a nationality: human development (15%), economic strength (15%), and peace and stability (10%). Four parameters reflect the external value of a nationality: diversity of travel freedom (15%), weight of travel freedom (15%), diversity of settlement freedom (15%), and weight of settlement freedom (15%).Most nationalities of the world, as well as EU citizenship, are included in the ranking. Not included are fantasy passports and nationalities of non-recognized states such as micronations, Abkhazia, South Ossetia, and Somaliland. All nationalities receive a score from 0% to 100%.\nThe data is aggregated from various objective sources. The internal factors present the quality of life and opportunities for personal growth within the country of origin of the holder of nationality.Human Development is measured using the United Nations Development Programme Human Development Index (HDI). The HDI was developed by Pakistani economist Mahbub ul Haq and Indian economist Amartya Sen, and used to measure countries' development by the United Nations Development Program (UNDP). The index is based on the human development approach, developed by Ul Haq, often calculated in terms of whether people are able to \"be\" and \"do\" desirable things in life, such as being well fed, sheltered, and healthy, or doing work, education, voting, participating in community life. Consequently, this index centres on three different human development areas: life expectancy at birth, expected years of education, and standard of living.The QNI normalizes the HDI scores of the countries with which a particular nationality is associated to a 0-15% scale. The nationality of the highest-scoring country on the HDI gets the full 15% score, with the other nationalities being ranked proportionately.\nEconomic strength of a nationality is based on the Gross domestic product (GDP) at Purchasing power parity (PPP) of each country. It is calculated from data provided by the International Monetary Fund. If there is no reliable Purchasing power parity data available, non-PPP data from the World Bank are used. GDP at PPP scores are normalized to a 0-15% scale, the largest economy receiving the full 15% score.Peace and Stability are calculated using data by the annual Global Peace Index (GPI), published by the Institute for Economics and Peace. Peace and stability accounts for 10% of the total QNI General Ranking scale. The nationality associated with the most peaceful country receives the full 10%, and others are ranked proportionately on the basis of the ranking scale used by the GPI.External factors identify the quality and diversity of opportunities the holder of a nationality can pursue outside their country of origin.Diversity of travel freedom is based on how many destinations the holder of a particular nationality can visit without a visa or with a visa-on-arrival for short-term tourism or business purposes. The data is taken from the International Air Transport Association (IATA). The diversity of travel freedom accounts for 15% of the total QNI General Ranking scale.Weight of travel freedom evaluates the quality of the travel freedom the holder of a nationality has without a visa or with a visa-on-arrival for short term visits. Unlike Diversity of Travel Freedom, which looks only at the number of destinations, weight of travel freedom looks at the value of having visa-free or visa-on-arrival travel access to a particular country. This value is based on the Human Development (50%) and Economic Strength (50%) of each country destination. This is based on the presumption that for most people, having visa-free access to certain countries is of higher value than having visa-free access to others. Weight of travel freedom accounts for 15% of the total QNI General Ranking scale.Diversity of settlement freedom is based on the number of foreign countries in which the holder of a nationality can freely settle for at least 360 days with automatic access to work there. Diversity of settlement freedom accounts for 15% of the total QNI General Ranking scale. The most advanced example of a regional organization which allows nationals of its member states to freely settle in each of the other member states is the European Union, but other regional organizations which include free settlement are Mercosur, the Gulf Cooperation Council, and the Economic Community of West African States. Outside such regional organizations, Georgia is the only country that allows almost all foreigners to freely settle and work in its country.Weight of settlement freedom evaluates the quality of the settlement freedom of the holder of a nationality, by looking at the Human Development (50%) and Economic Strength (50%) of the countries to which the nationality holder has settlement access. Weight of settlement freedom accounts for 15% of the total QNI General Ranking scale.As of 2017, Italian and French nationality is ranked the best in the world, according to the latest edition of the Quality of Nationality Index (QNI), earning a score of 81.7% out of a possible 100%, just ahead of Germany. While the difference between the scores for France and Germany are small, France's comparative advantage lies in its greater settlement freedom, attributable mainly to the country's former colonial empire.Italian and French nationalities remained the best in the world according to the 2018 edition of the Quality of Nationality Index, earning a score of 83.5% out of a possible 100%, fractionally ahead of Germany and the Netherlands.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_6" +} \ No newline at end of file diff --git a/test/Government/Substitute_(elections).json b/test/Government/Substitute_(elections).json new file mode 100644 index 0000000000000000000000000000000000000000..77fe0b44290a9524828a3fdcb2977aa7f6f98b49 --- /dev/null +++ b/test/Government/Substitute_(elections).json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "A substitute is a political candidate who is not directly elected, but who succeeds a politician holding an elected office after that person ceases to hold the office due to, for example, resignation or death. This system can be used to fill casual vacancies instead of holding by-elections or special elections to fill the vacant office. Substitutes are nominated, not at the time the vacancy arises but, rather, before the election for the information of voters. In voting systems which use electoral lists, the candidates on a given list who are not among those initially elected may become the substitutes for those who are. In other systems, individual candidates may have substitutes.\nIn Belgian federal parliamentary elections, each electoral list has both a list of \"effective\" candidates and a list of \"substitutes\" (Dutch: opvolgers; French: suppléants). The system was introduced as part of the law of 29 December 1899 introducing proportional representation. Before that, by-elections were held to succeed members.For municipal and provincial elections, as well as those for the Parliament of the Brussels-Capital Region since 2019, there is only one list, and substitutes are designated, according to various systems from one region to another, on the base of their own preferential votes, weighted or not with list votes, i.e. not for one or several specific candidate(s).\nIn the elections for the French National Assembly, each candidate is on a ticket with a substitute (French: Suppléant), who assumes the functions of the elected deputy under specific conditions. The substitute assumes the functions of the deputy if the deputy dies, enters the executive government, is appointed by the Government to an assignment of more than six months' duration, or appointed to the Constitutional Council or Defender of Rights (Défenseur des droits).If the deputy resigns, or their election is determined to be invalid, a by-election (French: élections legislatives partielles) is held instead.\nThe Electoral Code does not provide for any age restriction to be appointed alternate. For the Fourteenth Legislature (2012 - 2017), the youngest Deputy-Substitute in France was Nicolas Brien, born in 1989, who was elected in Allier's 2nd constituency.\nIn the Philippines, a substitute is a person who replaces the candidate up to midday of election day. The Commission on Elections only allows substitution for certain reasons and on certain periods, if the original candidate dies, withdraws or is disqualified; after a certain date, substitution via withdrawal is prohibited, and a candidate can only be substituted by someone who has the same surname as the original candidate. Furthermore, only candidates who were nominated by a political party can be substituted.If a vacancy occurs after the term of office begins, substitutes do not replace the original candidate:\nFor executive offices (president, governor, mayor), the deputy (vice president, vice governor, vice mayor, as the case may be) replaces the original officeholder\nFor the vice president, the president nominates a new officeholder, which is then confirmed by Congress.\nFor members of Congress, a special election (called as \"by-elections\" elsewhere) is held, except for members elected under the party-list system, where the next person on the list takes their place.\nFor deputies of local executive offices (vice governor, vice mayor), the candidate with the highest number of votes in the local legislature (Sangguniang Panlalawigan and Sangguniang Panlungsod or Sangguniang Bayan, as the case may be) replaces the original officeholder\nFor members of local legislatures, the political party nominates a new officeholder; if the vacating officeholder is an independent, the chief executive (president, governor, mayor, as the case may be) appoints a replacement.\nMagnolia Antonino substituted for her husband Gaudencio Antonino in the 1967 Philippine Senate election after the latter died on election eve. Magnolia eventually won.Edna Sanchez substituted for her husband Armando Sanchez in 2010 Batangas gubernatorial election after the latter died. Edna eventually lost.\nRodrigo Duterte substituted for Martin Diño in the 2016 Philippine presidential election after the latter withdrew. Duterte eventually won.\nSara Duterte substituted for Lyle Fernando Uy in the 2022 Philippine vice presidential election after the latter withdrew. Duterte eventually won.\nBong Go substituted for Grepor Belgica in the 2022 Philippine presidential election after the latter withdrew. Go eventually withdrew himself.\nUntil the 20th century, the Vice President was mostly a substitute for the President.Andrew Johnson replaced Abraham Lincoln after his assassination.Harry Truman replaced Franklin Roosevelt after his death.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_7" +} \ No newline at end of file diff --git a/test/Government/Treaty_of_Verdun.json b/test/Government/Treaty_of_Verdun.json new file mode 100644 index 0000000000000000000000000000000000000000..e2d30e145631ef96cdbbcac4df810bce64b57a5b --- /dev/null +++ b/test/Government/Treaty_of_Verdun.json @@ -0,0 +1,69 @@ +{ + "domain": "Government", + "document": "The Treaty of Verdun (French: Traité de Verdun,\nGerman: Vertrag von Verdun), agreed in 10 August 843, divided the Frankish Empire into three kingdoms between Lothair I, Louis II and Charles II, the surviving sons of the emperor Louis I, the son and successor of Charlemagne. The treaty was concluded following almost three years of civil war and was the culmination of negotiations lasting more than a year. It was the first in a series of partitions contributing to the dissolution of the empire created by Charlemagne and has been seen as foreshadowing the formation of many of the modern countries of western Europe.\nThe treaty was the first of the four partition treaties of the Carolingian Empire, followed by the Treaties of Prüm (855), Meerssen (870), and Ribemont (880).\nFollowing Charlemagne's death, Louis was made ruler of the Frankish Empire. Agobard, archbishop of Lyon, opposed the division of the empire, as he claimed that it would divide the church. During his reign, Louis the Pious divided the empire so that each of his sons could rule over their own kingdom under the greater rule of their father. Louis’ eldest son, Lothair I, was given the title of emperor but because of several re-divisions by his father and the resulting revolts, he became much less powerful. When Louis died in 840, Lothair I claimed overlordship over the entirety of his father's kingdom in an attempt to reclaim the power he had at the beginning of his reign as emperor. He also supported his nephew Pepin II's claim to Aquitaine, a large province in the west of the Frankish realm. Lothair's brother, Louis II, and his half-brother Charles II refused to acknowledge Lothair's suzerainty and declared war against him. After a bloody civil war, they defeated Lothair at the Battle of Fontenoy in 841 and sealed their alliance in 842 with the Oaths of Strasbourg which declared Lothair unfit for the imperial throne, after which he became willing to negotiate a settlement. The meeting happened shortly before August 10, as confirmed by a contemporary letter.Each of the three brothers was already established in one kingdom: Lothair in the Kingdom of Italy; Louis the German in the Kingdom of Bavaria; and Charles II in the Kingdom of Aquitaine. Lothair I received Francia Media (the Middle Frankish kingdom).\nIn the settlement, Lothair (who had been named co-emperor in 817) retained his title as emperor, but it conferred only nominal overlordship of his brothers' lands. His domain later became the Low Countries, the Rhineland west of the Rhine, Lorraine, Alsace, Burgundy, Provence, and the Kingdom of Italy (which covered the northern half of the Italian Peninsula). He also received the two imperial cities, Aachen and Rome.\nLouis II received Francia Orientalis (the East Frankish kingdom).\nHe was guaranteed the kingship of all lands to the east of the Rhine (although not the Netherlands to the north of the Rhine) and to the north and east of Italy, altogether called East Francia. It eventually became the High Medieval Kingdom of Germany, the largest component of the Holy Roman Empire.\nCharles II received Francia Occidentalis (the West Frankish kingdom).\nPepin II was granted the Kingdom of Aquitaine, but only under the authority of Charles. Charles received all lands west of the Rhône, called West Francia. It eventually became the Kingdom of France.\nAfter Lothair's death in 855, his eldest son, Louis II, inherited Italy and his father's claim to the Imperial throne. Upper Burgundy and Lower Burgundy (Arles and Provence) passed to Lothair's third son, Charles of Provence. The remaining territory north of the Alps, which did not previously have a name, was inherited by Lothair's second son, Lothair II, and was then named Lotharingia (present day Lorraine) after him.\nThe division reflected an adherence to the old Frankish custom of partible or divisible inheritance amongst a ruler's sons, rather than primogeniture (i.e., inheritance by the eldest son) which would soon be adopted by both Frankish kingdoms. Since Lotharingia combined lengthy and vulnerable land borders with poor internal communications as it was severed by the Alps, it was not a viable entity and soon fragmented. This made it difficult for a single ruler to reassemble Charlemagne's empire. Only Charles the Fat achieved this briefly.In 855, the northern section became fragile Lotharingia, which became disputed by the more powerful states that evolved out of Francia Occidentalis (present day France) and Francia Orientalis (present day Germany). Generations of kings of France and Germany were unable to establish a firm rule over Lothair's kingdom. While the north of Lotharingia was then composed of independent countries, the southern third of Lotharingia, Alsace-Lorraine, was traded back and forth between France and Germany from the 18th to the 20th century. In 1766, it passed to France after the death of Stanisław Leszczyński, who had acquired the region from the German Habsburgs by the Treaty of Vienna (1738) ending the War of Polish Succession (1733:1738). In 1871, Alsace-Lorraine became German, after the victory of Prussia and its German allies over the French in the Franco-Prussian War (1870:1871). In 1919, it became French again by the Treaty of Versailles (1919), following the French victory over the Germans in World War I (1914:1918). In 1940, Germany reannexed Alsace-Lorraine following Germany's conquest of France. Finally, in 1945, after World War II (1939:1945), Alsace-Lorraine was solidified as French territory, which it remains to this day, more than a thousand years after the Treaty of Verdun. The collapse of the Middle Frankish Kingdom also compounded the disunity of the Italian Peninsula, which persisted into the 19th century.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "OperatingSystem", + "NominatedFor", + "Follows", + "FollowedBy", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PositionHeld", + "OfficeHeldByHeadOfGovernment", + "AppointedBy", + "Represents", + "UsedBy", + "IssuedBy", + "Promoted", + "Measures", + "LocatedIn", + "ConvictedOf", + "PartOf", + "Founded", + "LegislatedBy", + "Signatory", + "BasedOn", + "ParentOrganization", + "PublishedIn", + "OfficialLanguage", + "PrimeFactor", + "NativeLanguage", + "CountryOfCitizenship", + "HeadOfState", + "PartyChiefRepresentative", + "Capital", + "Country", + "HasEffect", + "TwinnedAdministrativeBody" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Government_8" +} \ No newline at end of file diff --git a/test/Health/Anxiety_buffer_disruption_theory.json b/test/Health/Anxiety_buffer_disruption_theory.json new file mode 100644 index 0000000000000000000000000000000000000000..d75fb3ff2fed73975c243e879b0110a02cf67fc3 --- /dev/null +++ b/test/Health/Anxiety_buffer_disruption_theory.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Anxiety buffer disruption theory (ABDT) is an application of terror management theory to explain an individual's reaction to a traumatic event, which leads to post traumatic stress disorder. Terror management theory posits that humans, unlike any other organism, are uniquely aware that death is the inevitable outcome of life. When thoughts of death are made salient, such as when a terrorist attack carries those thoughts into the level of consciousness, humans are subject to debilitating anxiety unless it can be \"buffered.\" Humans respond to the anxiety and dread mortality salience produces by clinging to their cultural worldview, through self-esteem and also close personal relationships. Cultural worldviews, with their cultural norms, religious beliefs and moral values infuse life with meaning. They give life a feeling of normalcy and also a feeling of control. There is no way to definitely prove one's cultural worldview, there they are fragile human constructs and must be maintained. Clinging to a cultural worldview and self-esteem buffer the anxiety connected to thoughts of mortality. When thoughts of death are salient, humans are drawn to their cultural world view which \"stipulates appropriate social requirements, and standards for valued conduct, while instilling one's life with meaning, order and permanence.\"\nWhen a traumatic experience cannot be assimilated into a currently held cultural worldview, the anxiety-buffering mechanisms are disrupted. ABDT argues that individuals face overwhelming anxiety which leads to the symptoms of PTSD including re-experiencing, hyper-arousal, avoidance and disassociation. The dissociation causes atypical responses to mortality salience compared with individuals who do not have an anxiety buffer disruption. When the anxiety buffer disruption is mild, exaggerated coping responses, such as rejecting or taking offense at other cultures, is expected. When the anxiety buffer disruption is severe, there can be a total breakdown of coping mechanisms. The theory was proposed by Tom Pyszczynski and Pelin Kesebir.\nIn 1992, Janoff-Bulman delineated a theory of trauma response (Shattered Assumptions Theory). Janoff-Bulman posits that humans have basic assumptions about the world in which they live, based on the belief that the world is a benevolent and meaningful place and that the individual has self-worth. These assumptions give the individual the illusion that they have a measure of control on their own lives as well as a feeling of invulnerability. When an individual faces a traumatic event, their deeply held beliefs that the world is a benevolent and meaningful place and that they have a worthy role in that world are shattered. The world is no longer benevolent or predictable.Terror management theory and anxiety buffer disruption theory have taken the concept one step further.\nAnxiety buffer disruption theory not only focuses on the thoughts and emotions of an individual, but it also studies the behavior that results when terror management theory and shattered assumptions theory are examined together. Excessive anxiety experienced by people with post-traumatic stress disorder occurs because the events causing the post-traumatic stress disorder have demonstrated to these individuals that anxiety-buffering mechanisms are not capable of protecting them from death. Individuals who have high levels of peritraumatic dissociation and low levels of self-efficacy coping, two indicators of post-traumatic stress disorder, have abnormal responses to reminders of death. These individuals in turn do not utilize the coping mechanisms that are typically used to remove the fear of death: culture, self-esteem, and interpersonal relationships. In fact, in individuals with post traumatic stress disorder, mortality salience coping mechanisms are viewed as worthless and perhaps are even seen to be detestable.Cultural Worldview: Individuals who have post traumatic stress disorder will often reject their culture when provided with mortality salience triggers, the direct opposite of what terror management theory demonstrates to be true in those without post traumatic stress disorder. Cultural worldviews infuse life with structure, purpose and meaning. People maintain these fragile constructions by preferring the company of the like-minded. But when faced with a traumatic event, there are times when the horror cannot be assimilated into the framework of the person's existing cultural worldview.Self-Esteem: Various studies demonstrate that individuals who have post traumatic stress disorder also have decreased self-esteem. Self-esteem cannot function well as an anxiety buffering system in those who have post traumatic stress disorder as the buffer is weakened in these individuals. High self-esteem can displace defensive responses and buffer against the terror of mortality salience because it is a signal that the individual is living at the standard they should, based on their world view. Self-worth as the terror management theory suggests is an essential component of the existential anxiety- buffering system. PTSD is related to a breakdown in this system, and noted that veterans with past and present, or ongoing PTSD have shown to have lower self-esteem. According to ABDT this leaves this group particularly vulnerable to anxiety, since self-worth is an integral part of the individual's anxiety- buffering mechanism.\nClose Relationships: It is often mentioned that worldview and self-esteem affect ways in which our fears of death are buffered with ABDT. Close relationships also serve as a regulator of these fears. Previous studies hinted at that close relationships played a role in terror management, but they did not conceptualize, theoretically explain, or test the context of close relationships in Terror Management Theories. Close relationships seem to be a product of natural selection because of their reproductive and survival benefits, having reproductive benefits contribute to the survival of people's genes through their offspring. Therefore, close relationships increase the likelihood of mating and brings about other survival skills like gathering food, finding shelter, environmental awareness, and protects offspring from dangers. Love and belongingness are ranked over those of esteem and self- actualization. The formation and maintenance of close relationships have been recognized in both infants and adults as a source of regulating distress. It is also noted that self- esteem can also stem from close relationships. Based on these things it was assumed that formation and maintenance of close relationships may serve as a death- anxiety- buffering mechanism.\nClose relationships appear to have inoculating power against basic existential threats, which allows people to respond to these threats by fulfilling relational potentials. Second, it seems the sense of relationship commitment is shaped by not only perceived relational investment, gains, and potential alternatives, as well as the existential need of denial of death awareness. Third, it seems processes of terror management not only include worldview defenses to protect the self, but also promote commitment to significant others and the expansion of the self, provided by these relationships. Close relationships may serve as a fundamental anxiety buffer. It appears close relationships not only protect individuals from concrete and actual threats or danger, but also offer a symbolic shield against the awareness of one's finitude. Since the threat of death is inescapable, the support from those close to us make may make the thought of death more tolerable by giving meaning to our lives by being important to others.\nAs other anxiety buffers, interpersonal relationships are damaged as well in individuals with post traumatic stress disorder. People with post traumatic stress disorder have higher rates of divorce, more difficulty with their children, are more prone to domestic violence, and are emotionally distant from loved ones. All of these are damaging and as a result, terror management cannot be accomplished through close interpersonal relationships.\nA study looked at dissociation responses and PTSD in students who survived the 2005 Zarand earthquake in Iran. The earthquake measured 6.4 on the Richter scale, killed more than 1,500 people and displaced more than 6,700 for two months or more. It looked at dissociation one month later then two years later to see if level of dissociation predicted PTSD.Four weeks after the earthquake, researchers solicited for volunteers at local universities. All of the participants met the DSM-IV criterion for a Class A1 trauma. Many were wearing black mourning clothes or had injuries from the earthquake.\nThree priming conditions were employed: mortality salience, earthquake or dental pain. The researchers then evaluated how the subjects felt toward foreign aid in the wake of the disaster. The results indicated that subjects with high dissociative tendencies showed no effect of mortality salience on attitudes toward the foreign aid. Subjects with low dissociative tendencies reacted as terror management theory predicts when confronted with mortality salience and thought of the earthquake.\nTwo years after the quake, the researchers returned and 172 of the original respondents participated. They predicted that subjects with high PTSD symptoms would have a disrupted worldview on both foreign aid and the Islamic dress code. They found a strong relationship between dissociation and subsequent PTSD symptom severity. Even after the passage of two years, subjects with high dissociative tendencies were still not defending against existential threats in a way typical for the population who has not experienced trauma.\n105 students of the University of Abidjan took the Post-Traumatic Stress Checklist-Civilian Version and then an opinion survey on the civil war in Côte d'Ivoire. Last, they took part in a word-completion task designed to measure their accessibility of death-related thoughts. This study, unlike previous studies related to terror management theory, looked at the subjects' thoughts of death as related to the war, a specific traumatic event.In the control condition, where subjects were asked to talk about their anxiety related to their worst exam, death thought accessibility was lower for those with higher levels of PTSD. This suggests that people with strong PTSD repress thoughts of death. But when mortality was made salient, it provoked a marked increase in death thought accessibility for those with high PTSD. The results indicate that the anxiety buffer of death thought suppression under normal circumstances failed when subjects were reminded of the traumatic event.\nA second experiment was conducted with 197 students of the University of Ajidjan where they evaluated exposure (proximity) to a traumatic event. In this case, it was geographical location to the civil war. The researchers hypothesized that subjects who lived where the fighting was more constant and intense would be more likely to increase their PTSD reports when mortality was made salient. Those who lived in an area of less conflict should not increase their reports of PTSD. As a form of defensive denial, the researchers predicted they might report lower levels of symptoms. As expected, subjects who had more exposure to war reported greater PTSD symptoms in the mortality salience condition.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_0" +} \ No newline at end of file diff --git a/test/Health/Bioenvironmental_Engineering.json b/test/Health/Bioenvironmental_Engineering.json new file mode 100644 index 0000000000000000000000000000000000000000..11b864662836b41bf4a32d96039ee363d7d686d9 --- /dev/null +++ b/test/Health/Bioenvironmental_Engineering.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Bioenvironmental Engineers (BEEs) within the United States Air Force (USAF) blend the understanding of fundamental engineering principles with a broad preventive medicine mission to identify, evaluate and recommend controls for hazards that could harm USAF Airmen, employees, and their families. The information from these evaluations help BEEs design control measures and make recommendations that prevent illness and injury across multiple specialty areas, to include: Occupational Health, Environmental Health, Radiation Safety, and Emergency Response. BEEs are provided both initial and advanced instruction at the United States Air Force School of Aerospace Medicine at Wright-Patterson Air Force Base in Dayton, Ohio.\nDuring the 1970s, the United States Air Force (USAF) saw a need to implement measures to protect the health of their personnel. They took elements of Military Public Health and spun off a separate arm called Bioenvironmental Engineering. From that point on, Bioenvironmental Engineering had taken the lead in protecting the health of USAF workers.The original group of Bioenvironmental Engineers (BEEs) came to the Air Force from the U.S. Army in 1947 when the Air Force was formed. They were an outgrowth of the U.S. Army Sanitary Corps. Until 1964, Air Force BEEs were called Sanitary and Industrial Hygiene Engineers. They were Medical Service Corps (MSC) officers until the Biomedical Sciences Corps (BSC) was created in 1965.\nBetween 1960 and 1970, the BEE field grew from around 100 to 150 members. However, beginning in 1970, with the formation of the Occupational Safety and Health Administration (OSHA), the U.S. Environmental Protection Agency (EPA), and the Nuclear Regulatory Commission, the career field experienced an exponential growth in Federal regulations. These laws required BEEs to monitor Air Force operations for their effects on personnel and the environment. Several major catastrophes and other events focused keen Congressional interest on environment, safety and occupational health (ESOH), leading to new, mandatory compliance programs. Love Canal, Bhopal, atmospheric ozone depletion, and other incidents spawned new laws governing the Installation Restoration Program; Hazard Communication; community-right-to-know; Process Safety Management; and hazardous material inventory, control, and reduction. These have continually driven additional, corresponding requirements for BEEs.\nIn the early 1980s, a major shift in functions occurred. The clinical and sanitary aspects of the BEE program, (communicable disease, sanitary surveys, vector control, and occupational medicine) were turned over to the newly forming environmental health officers. This enabled the BEE force to concentrate its efforts on the industrial work place and the environment.\nThe importance of ensuring Air Force compliance with ESOH requirements is now higher than ever. Public awareness/concern/disclosure, the recognition of risk analysis/communication/management, loss of sovereign immunity of federal agencies, and the personal liability of commanders for environmental infractions are all impacting BEE surveillance programs. Increased environmental pollution prevention and occupational health preventive medicine programs are shifting the emphasis to avoiding problems before they occur.\nBioenvironmental Engineers conduct health risk assessments (HRAs) in and around workplaces, protecting Airmen and employees from the hazards associated with their duties, very similar in nature to industrial or occupational hygiene. HRAs with recommendations to reduce or eliminate risk are sent to relevant parties for their consideration and to advise them on the impacts and risks to their subordinates and their mission(s). BEEs fundamentally analyze and recommend controls for identified occupational health (OH) risks to include employee exposure to Occupational Safety and Health Administration (OSHA) expanded standard chemicals listed under 29 CFR 1910 (Subpart Z), immediately dangerous to life or health (IDLH) conditions found within confined spaces, and musculoskeletal disorders introduced by ergonomic stresses (such as repetitive motion/vibration/biomechanical stresses). BEEs routinely monitor local exhaust ventilation systems controlling airborne hazards across an installation to limit exposures a worker may receive. In conjunction with ventilation, BEEs also oversee the Respiratory Protection Program associated with each installation; BEEs ensure personnel are trained on the proper wear of an occupationally-required respirator, have a respirator fit test conducted, and know how to properly don/doff their personal protective equipment to protect them from inhalation hazards imposed by their tasks. BEEs are the installation authority regarding hazardous materials and personal protective equipment certification for use on an Air Force Base. Though not required, common OH certifications attained by BEEs include: Certified Industrial Hygienist (CIH) through the Board for Global EHS Credentialing (formerly the American Board of Industrial Hygiene) and Certified Safety Professional (CSP) through the Board of Certified Safety Professionals.Bioenvironmental Engineers serve as installation liaisons for federal, state, and local organizations regarding drinking water quality and assess for environmental contaminants on Air Force Bases, annually publishing a consumer confidence report to keep the base populace informed on the quality of their drinking water. A frequent concern on Air Force Bases is exposure to occupational noise hazards, as tinnitus is the most prevalent service-connected disability claimed by veterans through the United States Department of Veterans Affairs as of 2020, accounting for ~8% of all disabilities. To address this concern, BEEs routinely conduct noise dosimetry on personnel to identify and isolate excessive noise-producing equipment in the workplace. BEEs also conduct Occupational and Environmental Health Site Assessments (OEHSA) to identify and mitigate risks to personnel from their jobs, duties, and environment on an Air Force Base and its GSUs. Additionally, BEEs assess indoor air quality for airborne dusts, fumes, mists, fogs, vapors, and gases, frequently quantifying through exposure monitoring and documentation of worker exposures. Furthermore, BEEs routinely monitor for Thermal Stress (to include heat stress and cold stress) on an installation and publish flag conditions associated with recommended work-rest cycles and hydration guidelines, allowing supervisors and workers to remain safe.Bioenvironmental Engineers typically concurrently serve as Installation Radiation Safety Officers (IRSO) and Installation Laser Safety Officers (LSO) on an Air Force Base and its GSUs, overseeing and authorizing the transport and use of radioactive materials, Nuclear Regulatory Commission (NRC) Permits, ionizing and non-ionizing radiation sources, and lasers. A key component to protecting personnel from radiation is routine exposure monitoring, managed by the BEEs through a thermoluminescent dosimetry (TLD) program that maintains oversight of all radiation worker exposures installation-wide.Bioenvironmental Engineers serve as emergency responders and health risk advisors for Chemical, Biological, Radiological, and Nuclear hazards, incidents, and their associated personal protective equipment (or clothing). BEEs are also HAZWOPER-certified, providing risk assessments and communication regarding hazardous materials. However, what BEEs are typically known for on an installation is the customer-oriented service they provide in the form of gas mask fit tests. BEEs routinely respond to emergencies alongside Emergency Management.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_1" +} \ No newline at end of file diff --git a/test/Health/Homeschooling_during_the_COVID-19_pandemic.json b/test/Health/Homeschooling_during_the_COVID-19_pandemic.json new file mode 100644 index 0000000000000000000000000000000000000000..05c3b70139e6efc0d09e8ab16b296c10eab9bdde --- /dev/null +++ b/test/Health/Homeschooling_during_the_COVID-19_pandemic.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "There was a resurgence of homeschooling during the COVID-19 pandemic to help students return to school. Innovative parents sought to create solutions to their individual dilemmas by organizing local groups. These variations of homeschooling include micro schools and educational family co-ops. The first usually involves hired professionals to teach a small group of kids (similar to one-room schoolhouses). The second is a parent-organized co-operative where families take turns educating and minding their kids during the week. Both are largely available only to the well-off, as costs in time and money are high. 'Pandemic pod' is the fashionable term used to describe one of these arrangements where all group members agree to participate under well-defined and strictly enforced health rules.\nConsidering the overall racial and ethnic makeup of the U.S. population, and the relative size of each group, minority parents are much more likely to participate in learning pods: Parents identifying as Hispanic have the highest level of participation (22 %), followed by parents identifying as Black (17 %) and Asian (11 %). Among white parents the participation rate was 17 %. In addition, minority parents display significantly more interest in forming or joining learning pods (Hispanic, 29 %; Black, 21 %; Asian, 34 %) compared to white parents (18 %). Furthermore, parents identifying as special needs parents are considerably more likely to have their children in a learning pod (31 %) compared to non-special needs parents (14 %). Finally, parents with younger children (Kindergarten to 4th grade, 21 %; 5th to 8th grade, 24 %) tend to participate more in learning pods compared to parents with older children (9th to 12th grade, 14 %), and parents of younger children also display greater interest in forming or joining learning pods (Kindergarten to 4th grade, 27 %; 9th to 12th grade, 16 %).\nThe impact of the COVID-19 pandemic on education forced school closures around the world. Parents are left to manage their children and it is causing economic, educational, political and psychological distress. A University of California, San Francisco study states that schools can't open safely until COVID-19 transmission in a general population is under control.\nAs schools have been closed to cope with the global pandemic, students, parents and educators around the globe have felt the unexpected ripple effect of the COVID-19 pandemic. While governments, frontline workers and health officials are doing their best slowing down the outbreak, education systems are trying to continue imparting quality education for all during these difficult times. Most public schools have turned to online, distance learning in an attempt to re-engage students back into school. Many students at home/living space have undergone psychological and emotional distress and have been unable to engage productively. Lack of social interaction and face to face engagement between students and their teachers, or peers, has decreased student's overall motivation. The requirements placed on parents to fill in the gaps as teachers aids and support the implementation of the curriculum through remote learning left parents questioning the reliability of online education. The best practices for online homeschooling are yet to be explored, and it is unclear if homeschooling, or any other mitigation effort, can prevent students from falling behind.\nTo mitigate the disruption of school closures, multiple educational structures have been proposed. These terms are used interchangeably and this makes it confusing for parents who are trying to figure out how to organize their lives this fall as most schools will only offer virtual instruction. But basically there are three distinct ideas: pandemic pods, micro schools, and family co-ops.\nA pandemic pods is a small group of people who are all taking similar precautions against catching the virus. For educational purposes, pandemic pods (also known as learning pods) are a composed group of students who learn together, in person, outside of a traditional school. A family unit living together is a natural pandemic pod — everyone is taking responsibility for everyone else's health outcomes. Learning pods take many forms, but they primarily offer the benefit of a smaller circle of students, which provides comfort from the coronavirus. It also gives the feeling of a more formal schooling option, in which parents can return to work and students could be in a learning environment that's much closer to the traditional setting.A family co-op is not a pandemic-related entity. Most family co-ops form to ease the economic pressures of child care among several families. Several families get together and agree to share afterschool care of all the kids on certain days. This arrangement frees each set of parents from childcare several times per week. If five families are involved, then each family can take responsibility for all kids once per week. Instead of money, this social arrangement trades in time. Family co-ops is a very old arrangement that has been extensively studied in academic literature.In early April 2020, Canadian authorities actively encouraged the formation of family bubble — two families (usually with kids) who would join together and share responsibility for each other.A micro school is some variation on the one-room school where parents hire a teacher to educate their children. Micro schools can be as small as just one family hiring a teacher or a group of parents makes arrangements for all of their children together, splitting the costs of such endeavor. The biggest advantage of micro schools is that parents have total control over their children's education, including the choice of teachers. Micro Schools can vary significantly in costs.Some parents created \"school pods\" of multiple families or hired tutors to instruct students by zoom.\nA pandemic educational family co-op is the cross of all three structures: the micro schools, the family co-ops, and the Pandemic pods. Pandemic educational family co-ops function just like the educational family co-ops but in addition to all of the rest, the pandemic version stresses pandemic precautions within the group. This is the most economical solution for parents that are stuck without \"brick and mortar\" schools to send their kids during the week.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_2" +} \ No newline at end of file diff --git a/test/Health/Kate_Rew.json b/test/Health/Kate_Rew.json new file mode 100644 index 0000000000000000000000000000000000000000..b98a75415e5c7124a31786e87e0bdc6a198a33cb --- /dev/null +++ b/test/Health/Kate_Rew.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "(Anna) Kate Rew (born 11 September 1969) is a swimmer, author, journalist and founder of The Outdoor Swimming Society. Rew lives in Somerset.\nKate Rew was born in Devon, England, where she grew up with a deep connection to the natural world. The picturesque landscapes and waterways of Devon played a significant role in shaping her love for outdoor activities, particularly swimming in the River Culm. She attended the University of Oxford.Kate Rew is best known as a pioneer of the outdoor swimming movement in the United Kingdom. She founded The Outdoor Swimming Society (OSS) in 2006, an organisation dedicated to promoting and supporting outdoor swimming in natural waters. Under her leadership, The OSS has grown to become a significant community, inspiring hundreds of thousands to take up outdoor swimming around the world.Rew is also an accomplished author and journalist. Her first book, \"Wild Swim\" (Faber), published in 2008, combined personal anecdotes, practical advice, and original photography to celebrate the joys and challenges of swimming in natural waters. The book was praised for its inspirational content and its role in popularising wild swimming, and became a bestseller. Her second book, \"The Outdoor Swimmers' Handbook' (Rider, 2022), brought together art, sport and science to teach readers everything they may need to enjoy swims in any water body.\nIn addition to her book, Kate has written numerous articles for prominent publications, as well as featuring on TV, radio and blogs, sharing her insights and experiences related to outdoor swimming and the natural environment. Her writing often emphasizes the physical and mental health benefits of swimming in natural settings, as well as the sense of adventure and connection to nature it provides.\nIn 2009 the news and lifestyle periodical Monocle magazine named her as one of its 20 \"global heroes who deserve a bigger stage worldwide\". In 2016 she received the Paragon Award from the International Swimming Hall of Fame in California, America for her 'stalwart contributions' to recreational swimming.Event Director & Charity Fundraiser Rew launched the first mass market open water swim in the UK in 2006, a charity swim called Breaststrokes in Windermere which raised money for Cancer Research UK. Breastrokes ran in Windermere and in Serpentine in 2006 and 2007, raising over £250k for the charity, which Rew had a loyalty to as a result of her mother's experiences of breast cancer.\nShe went on to found and run some of Britain's most iconic swim events the Dart10k (2009), The Bantham Swoosh and the Hurly Burly. She began a partnership with charity Level Water, which offers swimming lessons to children with disabilities, in 2016, and the events raised millions for the charity before being taken on by them in 2022. She continues to support the charity through The OSS, saying 'The OSS is proud of our substantial and longstanding role in helping this charity level things up, kickstarting a love of swimming in disabled children who might otherwise not have access to it'.\nThrough The OSS and events she has also mobilised swimmers in support of Surfers Against Sewage and Project Seagrass.\nRight to Swim & Community Advocate Rew champions the everyday swimmer in her work. She has written and appeared in short films such as Chasing The Sublime to share her philosophy that 'there is always fear on a swim, of discomfort and risk' but that it is through this the sublime is reached. Chasing The Sublime appeared on Oprah Winfrey's SuperSoul Sunday.\nIn the UK, Rew has been vocal on the need for a greater legal access to reservoirs and other bodies of water through her work on 'Right to Swim', and together with the OSS Inland Access Group and Sheffield Outdoor Plungers (SOUP), she started a Kinder Swim Trespass in 2021 which has grown into an annual and now nationwide fixture.\nWith a view to making swimming more accessible in urban environments worldwide, she is a founding partner of the Swimmable Cities network.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_3" +} \ No newline at end of file diff --git a/test/Health/Open-air_treatment.json b/test/Health/Open-air_treatment.json new file mode 100644 index 0000000000000000000000000000000000000000..f9c3f6af36b9fe027dcb6047c5288f3cd4cd99eb --- /dev/null +++ b/test/Health/Open-air_treatment.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Open-air treatment is the therapeutic use of fresh air and sunshine. In a hospital or sanitorium, this may be done by ensuring good ventilation in an airy, sunny room or by housing patients outdoors in tents or other open forms of accommodation. During the 20th century, such treatment was used for people with infectious respiratory diseases such as influenza or tuberculosis.\nIn the 1960s, researchers into biological warfare found that microbes such as Escherichia coli were killed when exposed to outdoor air but that, when they were enclosed, they would remain viable for longer. They called this the open air factor but were unable to identify the exact mechanism or disinfecting agent.\nOpen-air schools were established in several countries to provide a healthy environment for sickly children, emphasising fresh air, good food and exercise. In England, the first one opened at Bostall Wood in 1907 and, by the 1930s, there were over a hundred across the country.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_4" +} \ No newline at end of file diff --git a/test/Health/Patient_management_software.json b/test/Health/Patient_management_software.json new file mode 100644 index 0000000000000000000000000000000000000000..e78d035d1b70ff0f725a960daa2815a6cbda5c1b --- /dev/null +++ b/test/Health/Patient_management_software.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Patient management software (PMS) is referred to as software that is regulated as a medical device. It is software that is used to acquire medical information from a medical device to be used in the treatment or diagnosis of a patient. It can also be software that is an adjunct to a medical device and directly contributes to the treatment of the patient by performing analysis, or providing treatment or diagnosis functionality that replaces the decision and judgment of a physician.\nMedical devices are classified and these classifications became somewhat less restrictive in December, 2010. Regulations provide rules for classifying medical devices into four increasing risk levels : Class I, Class II, Class III, and Class IV. Patient management software is classified as either Class I or Class II. Software that is intended to be used to view images, or other real time data, as an adjunct to the monitoring device itself, for the purpose of aiding in treatment or diagnosis of a patient, would be Class I medical devices. Medical device software that is an adjunct to another medical device and is involved in data manipulation, data analysis, data editing, image generation, determination of measurements, identification of a region of interest in an image, or identification (by an alarm or alert) of results from a monitor that are outside of an established range, is a Class II medical device if it: (1) provides the only means and opportunity to capture or acquire data from a medical device for aiding directly in diagnosis or treatment of a patient; or (2) replaces a diagnostic or treatment decision made by a physician.Examples of patient management software are PACS, remote patient monitoring. Others include any medical device that is used to transmit data from a medical device or analyze data from a medical device such as blood pressure monitors and glucose monitors.\nMany in the health care industry have raised concerns over the quality and software development process of PMS. The development of PMS is often criticized as too focused on simply the software development process and not the product. Much of these concerns are rooted in safety issuesComputerized physician order entry, an example of PMS, highlights some of these safety concerns.\nOther criticisms are aimed at the regulations in place. Some critics argue that regulations stifle innovation and that vendors will no longer have any incentive to create new products. Also, existing and future products will have to adhere to strict licensing procedures and this may affect the sustainability of these products.\nAnother concern is that the rules are disproportionately strict in comparison to the actual risk associated with a wide variety of eHealth systems and this may prevent companies from initiating the development of new products.\nRegulation of patient management software applies to anyone importing, distributing or selling the software. Health Canada is responsible for regulating the sale, advertising and distribution of patient management software in Canada. Regulated software is classified based on risk increasing from Class I to Class II.The type of license required depends on the classification of the software. An establishment license is required from a vendor or manufacturer of Class I PMS and a medical device license is required from a vendor or manufacturer of Class II PMS. ISO 13485 certification is required of manufacturers of Class II medical devices.\nIn August, 2009, Health Canada which is responsible for regulating the advertising, manufacturing and sale of medical devices in Canada issued a notice confirming that patient management software is a medical device and is subject to the Medical Devices Regulations and the Food and Drugs Act. The development of the regulation of patient management software as a medical device began three years earlier when a company called MedManager created a patient portal technology that was deemed a Class II medical device and subject to regulation by Health Canada. Developments had taken place thereafter, to indicate that medical device classification include patient management software. A notice was officially released by Health Canada in August, 2009 indicating that patient management software was indeed a medical device.Therefore, organizations that import, sell or otherwise distribute Class I patient management software must have an establishment license and Class II patient management software must have a medical device licence. In order to obtain a medical device licence, manufacturers must hold a quality management system (QMS) certificate issued by an accredited registrar showing that the QMS is compliant with ISO 13485 Medical devices : Quality management systems : requirements for regulatory purposes. Organizations are also required to perform certain post-market responsibilities such as maintaining distribution and complaint handling records, mandatory problem reporting and recalls.\nIn December, 2010, a notice was released by Health Canada further clarifying the definition, classification and licensing requirements of software regulated as a medical device. For example, software used to transmit data from a medical device, or software that analyzes data from a medical device and makes diagnostic or treatment decisions normally made by a physician, would be considered software regulated as a medical device. A product that only stores and displays patient information is not a medical device. Examples of software that are not medical devices are middleware, EHR's including those that are custom built for use only within the organization, applications that perform administrative calculations and manipulations (such as determining time between appointments, or workflow management), the Wii Fit video game, personal BMI calculators and pedometer software used for fitness. The regulations apply to software that is distributed with or without compensation.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_5" +} \ No newline at end of file diff --git a/test/Health/Smell_as_evidence_of_disease.json b/test/Health/Smell_as_evidence_of_disease.json new file mode 100644 index 0000000000000000000000000000000000000000..f8ee56ac94fff049f50f5241e8efd85c664973ef --- /dev/null +++ b/test/Health/Smell_as_evidence_of_disease.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Smell as evidence of disease has been long used, dating back to Hippocrates around 400 years BCE. It is still employed with a focus on volatile organic compounds (VOCs) found in body odor. VOCs are carbon-based molecular groups having a low molecular weight, secreted during cells' metabolic processes. Their profiles may be altered by diseases such as cancer, metabolic disorders, genetic disorders, infections, and among others. Abnormal changes in VOC composition can be identified through equipment such as gas chromatography-mass spectrometry(GC-MS), electronic nose (e-noses), and trained non-human olfaction.\nPhysicians historically used odors as a diagnostic indicator to judge a patient's health. Hippocrates saw the breath of patients as a potential indicator in around 400 BCE. Galen, Avicenna, and other physicians considered urine scent alongside color, density, sediments, and more in urinalysis. Urine with a sweet odor was diagnosed as possessing dominating sanguine humor relative to the other three humors; pungent odor as an excessive amount of bile; and foul odor as the presence of ulcers in the urinary tract or development of putrefactive fever, a fever occurring in the humors.VOCs are currently deemed as noninvasive diagnostic biomarkers with the potential for point-of-care (POC) testing and long-term monitoring.\nThe biochemical mechanism of VOC generation in the human body is not fully comprehended. Their occurrence is due to changes in cell metabolism, inflammation, and oxidative stress, where reactive oxygen species (ROS) produced from cellular respiration interact with cellular structures (such as the membrane, proteins, DNA, and RNA) to create VOCs. The accumulation occurs in breath, skin, sweat, blood, urine, and faeces. The samples can be analyzed by various methods, such as selected-ion-flow-tube mass spectrometry (SIFT-MS), field asymmetric ion mobility spectrometry (FAIMS), nuclear magnetic resonance (NMR) spectroscopy, proton-transfer-reaction mass spectrometry (PTR-MS) and more, but the commonly used technologies are gas chromatography with mass spectrometry (GC-MS) and electric nose (e-nose). The difference in samples and methods of analysis chosen may explain the high heterogeneity observed in VOCs identified in different studies pertaining to the same diseases.Electronic nose (e-noses) is a standard method used for non-compound-specific identification where arrays of broadly tuned sensors capture patterns or fingerprints of VOCs to distinguish between healthy and diseased individuals. The limitation of this method is the inability to identify individual biomarkers, implying unique biomarkers for diseases can not be discovered.Gas chromatography with mass spectrometry (GC-MS) is considered the gold standard for VOC analysis to identify specific compounds. The chromatography separates the sample mixture in a gaseous state by forcing them through a column using a carrier gas, and the mass spectrometer identifies the compound. The limitation of this method is the requirement of expensive specialized equipment and highly trained personnel.VOC analysis is seen in asthma, chronic obstructive pulmonary disease (COPD), cystic fibrosis (CF), chronic obstructive sleep apnea (OSA), inflammatory bowel disease, cancer, infections, and among others.\nLung cancer-specific VOCs are 1-propanol, endogenous primary alcohol, and pentane. Pentane's presence in exhaled breath of patients has been hypothesized to originate from the increased peroxidation of fatty acids seen in severe lung disease. Foul-smelling p-cresol was solely found in colorectal and gastric cancer, expected to be caused by cancer's alteration of the microbiome. No singular compound could be exclusively considered a biomarker, but VOCs patterns observed may aid in distinguishing between certain diseases.People with diabetes were found to have an increased concentration of ketones, the cause of sweet urine smell, derived from the oxidation of non-esterified fatty acids. Exhaled acetone is often used as a biomarker, but its relevance as a sole biomarker for diabetes is ambiguous. Acetone is considered a biomarker in other diseases, such as lung cancer and cystic fibrosis (CF), and reports on acetone and blood glucose have been mixed.Maple syrup urine disease, characterized by a strong maple syrup scent in urine, is found to have higher keto acid levels.\nThe breath of patients infected with Aspergillus fumigatus, a fungus responsible for invasive aspergillosis, showed the presence of 2-pentylfuran, a compound not ordinarily produced in mammalian metabolism. VOC profiles may be confounded by intakes of peanuts, soy milk, and more, which also display 2-pentylfuran.Patients with cystic fibrosis (CF) had a significantly higher level of ethane than individuals without CF, correlating with increased carbon monoxide levels and obstructed airways. For CF caused by P. aeruginosa infection, hydrogen cyanide, 2-aminoacetophenone, and methyl thiocyanate were identified as potential breath biomarkers.\nDogs have been used to diagnose symptomatic and asymptomatic individuals with metabolic and infectious diseases because of their highly sensitive olfaction due to a higher neuron packing density and threefold the number of functional genes encoding olfactory receptors relative to humans. This increase in receptors results in dogs possessing a 10,000 to 100,000 times higher accuracy in specially recognizing chemical messengers than humans. They have been frequently used to diagnose asymptomatic individuals with various infectious diseases such as SARS CoV-2, H1N1 Influenza, malaria, bovine virus infection, etc.The first study on trained dogs used for the detection of cancer was published by Willis et al. in 2004, observing that dogs were capable of detecting bladder cancer from urine samples. Subsequently, in 2004, Pickel et al. confirmed that dogs were able to successfully diagnose melanoma. In 2008, Horvath et al. confirmed dogs were successful in differentiating between cancerous and normal tissue and in distinguishing non-cancerous pathological tissue from cancerous tissue. Another study by Horvath et al. in 2010 found the dogs to show over 90% specificity in detecting ovarian cancer from blood samples, colorectal cancer from respiratory air, and prostate cancer from dog urine.The first study on dogs used for the detection of infectious diseases was conducted by Bomers et al. in 2012. The dogs were trained with food rewards to detect individuals with C. difficile diarrhea, and the results showed 100% specificity and sensitivity in the detection in stool samples. They were also capable of surveilling C. difficile in the environment with 92.3% sensitivity and 95.4% specificity for both odor detection and the ability to locate the source. Vancouver Canada hospital's canine scent recognition program also reported observing dogs' promising ability to detect C. difficile on hospital surfaces, equipment, and C. difficile reservoirs.The advantage of using trained dogs to detect C. difficile compared to the traditional culture-based diagnostic method is the fast detection speed, which only takes a few minutes. Whether sniffing dogs could be universally employed for diagnosing C. difficile is dubious as although it yields the results faster than the preexisting nucleic amplification test, its responsiveness is significantly lower.\nDogs have been trained to sniff SARS CoV-2-related VOCs since the outbreak of COVID-19 pandemic. Their overall success rates of detection were similar to or higher than reverse transcription polymerase chain reaction (RT-PCR) and antigen testing procedures. Grandjean et al. trained the dogs to sit in front of samples from COVID-19 positive patients. The success rate of distinguishing the sweat odor of individuals with COVID-19 from individuals without COVID-19 was between 83% and 100%. In principle, the dogs could be used to screen individuals with various stages of COVID-19 infections (including asymptotic, presymptomatic individuals with mild to severe symptoms) in different settings such as schools, transportation centers like airports, hospitals, and public gatherings. An advantage of using trained dogs compared to primates or cats to detect COVID-19 is that dogs are animal species with a low risk of binding between ACE2 receptor and SARS CoV-2, making them less likely to be transmitters. To further minimize the risk of transmission to dogs, sniffing sweat (which has low transmission property) is deemed the ideal mechanism for dogs to detect COVID-19. Other advantages of using dogs for screening COVID-19 over the current RT-PCR method are lower cost, decreased intrusiveness to the subjects, and no delay in reporting the results.African giant pouched rats were trained to diagnose more than 14000 tuberculosis patients by smelling sputum. Compared to dogs capable of sniffing around 10 samples of C. difficile in stool or E.coli in urine per day, rats could sniff up to 100 samples in 20 minutes. Their success rates of detection were comparable to smear examination by microscopy after Ziehl-Neelsen staining with a responsiveness of 94% (which are common tools to diagnose tuberculosis in low-income countries). Their sensitivity was lower in comparison to nucleic acid amplification tests (80%) and with culture (60:70%). The rats were regarded as a good diagnostic tool for tuberculosis despite their lower responsiveness than nucleic acid tests when diagnostic settings are highly endemic countries with peripheral medical centers without proper laboratory set-ups.Mosquitoes were found to be attracted to skin odors of individuals infected by malaria parasites (Plasmodium falciparum gametocytes). The attraction of uninfected mosquitoes was two to three times higher in children infected with gametocytes, and the attraction resumed to baseline following successful antimalarial treatments. Further investigation found a consistent effect of malaria on skin VOC profiles among populations with high malaria rates, where the infected showed a higher level of aldehydes heptanal, octanal, and nonanal, and notable distinguishable effects of asymptomatic and symptomatic infections.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_6" +} \ No newline at end of file diff --git a/test/Health/Value-based_health_care.json b/test/Health/Value-based_health_care.json new file mode 100644 index 0000000000000000000000000000000000000000..edfb2c74f70fd75c957208f0fc7ed19c5caa9918 --- /dev/null +++ b/test/Health/Value-based_health_care.json @@ -0,0 +1,54 @@ +{ + "domain": "Health", + "document": "Value-based health care (VBHC) is a framework for restructuring health care systems with the overarching goal of value for patients, with value defined as health outcomes per unit of costs. The concept was introduced in 2006 by Michael Porter and Elizabeth Olmsted Teisberg, though implementation efforts on aspects of value-based care began long before them in the 1990s. VBHC emphasizes systematic measurement of outcomes and costs, restructuring provider organizations, and transitioning toward bundled payments. \nWithin this framework, cost reduction alone is not seen as proper strategy for healthcare systems: health outcomes have to improve to enhance value. Although value-based health care is seen as a priority in many health systems worldwide, a global assessment in 2016 found many countries are only beginning to align their health systems with VBHC-principles. Additionally, several studies report incoherent implementation efforts, and there seem to be various interpretations of VBHC, both within and across countries.\nIn a value-based care model, providers would work with patients to determine a treatment plan, then measure the relevant clinical results over the course of the patient's treatment.There is debate as to whether patient experience and satisfaction with the quality of their care is a component of value-based care. Some argue that while patient satisfaction is often conflated with value-based care, satisfaction is predicated on the patient's experience of treatment, rather than its medical effectiveness. However, the U.S. Agency for Healthcare Research and Quality (AHRQ) states that patient experience is an integral component of healthcare quality, and that patient experience is in fact different from patient satisfaction. There is a relationship between patient experience and greater medical effectiveness associated with patient adherence to medical advice. It is for this reason that patient experience surveys, namely CAHPS surveys, are national reporting requirements for several value-based purchasing programs, such as the Hospital Value-Based Purchasing (VBP) Program.\nCost reduction is a component of this model : for example, by making healthcare cost information more readily available to patients : but it may not be the primary goal from a patient perspective, though it may be an important consideration from the perspective of payers, purchasers, and providers with an interest in the promise of maximizing outcomes per unit of cost inherent to VBHC.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "CitesWork", + "InfluencedBy", + "PresentedIn", + "FieldOfWork", + "Uses", + "PhysicallyInteractsWith", + "UsedBy", + "PracticedBy", + "SupportsProgrammingLanguage", + "PartnershipWith", + "HasQuality", + "InvestigatedBy", + "LocatedIn", + "AffectedBodyPart", + "Causes", + "PartOf", + "Founded", + "HasEffect", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Health_7" +} \ No newline at end of file diff --git a/test/History/Archival_research.json b/test/History/Archival_research.json new file mode 100644 index 0000000000000000000000000000000000000000..6c0063f0b73e08350e74d6452d5d398be829f5b5 --- /dev/null +++ b/test/History/Archival_research.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Archival research is a type of research which involves seeking out and extracting evidence from archival records. These records may be held either in collecting institutions, such as libraries and museums, or in the custody of the organization (whether a government body, business, family, or other agency) that originally generated or accumulated them, or in that of a successor body (transferring, or in-house archives). Archival research can be contrasted with (1) secondary research (undertaken in a library or online), which involves identifying and consulting secondary sources relating to the topic of enquiry; and (2) with other types of primary research and empirical investigation such as fieldwork and experiment.\nThe oldest archives have been in existence for hundreds of years. For instance, in Europe, the General Archive of the Crown of Aragon was instituted in 1318, or the Vatican Secret Archives which were started in the 17th century and contain state papers, papal account books, and papal correspondence dating back to the 8th century. The Archives Nationales in France was founded in 1790 during the French Revolution and has holdings that date back to AD 625, and other European archives have a similar provenance. Archives in the modern world, while of more recent date, may also hold material going back several centuries, for example, the United States National Archives and Records Administration was established originally in 1934. The NARA contains records and collections dating back to the founding of the United States in the 18th century. Among the collections of the NARA are the Declaration of Independence, the Constitution of the United States, and an original copy of Magna Carta. The British National Archives (TNA) traces its history to the creation of the Public Record Office in 1838, while other state and national bodies were also formed in the late 19th and early 20th centuries.Universities are another venue for archival holdings and manuscript collections. Most universities have archival holdings that chronicle the business of the university. Some universities also have archives or manuscript collections that focus on one aspect or another of the culture of the state or country in which the university is located. Schools and religious institutions, as well as local studies and history collections, museums and research institutions may all hold archives.\nThe reason for highlighting the breadth and depth of archives is to give some idea of the difficulties facing archival researchers. Some of these archives hold vast quantities of records. For example, the Vatican Secret Archive has upwards of 52 miles of archival shelving. An increasing number of archives are now accepting digital transfers, which can also present challenges for display and access.\nArchival research lies at the heart of most academic and other forms of original historical research; but it is frequently also undertaken (in conjunction with parallel research methodologies) in other disciplines within the humanities and social sciences, including literary studies, rhetoric, archaeology, sociology, human geography, anthropology, psychology, and organizational studies. It may also be important in other non-academic types of enquiry, such as the tracing of birth families by adoptees, and criminal investigations. Data held by archival institutions is also of use in scientific research and in establishing civil rights.In addition to discipline, the kind of research methodology used in archival research can vary depending on its organization and its materials. For example, in an archives that has a large number of materials still unprocessed, a researcher may find consulting directly with archive staff who have a clear understanding of collections and their organization to be useful as they can be a source of information regarding unprocessed materials or of related materials in other archives and repositories. When an archive is not entirely oriented towards one or relevant to a single discipline, researchers, for example genealogists, may rely upon formal or informal networks to support research by sharing information about specific archives' organization and collections with each other.\nArchival research is generally more complex and time-consuming than secondary research, presenting challenges in identifying, locating and interpreting relevant documents. Although archives share similar features and characteristics they can also vary in significant ways. While publicly funded archives may have mandates that require them to be as accessible as possible, other kinds, such as corporate, religious, or private archives, will have varying degrees of access and discoverability. Some materials may be restricted in other ways, such as on those containing sensitive or classified information, unpublished works, or imposed by agreements with the donor of materials. Furthermore, archival records are often unique, and the researcher must be prepared to travel to reach them. Even when materials are available in digital formats there may be restrictions on them that prohibit them from being accessed off-site.Prior to online search, union catalogs were an important tool for finding materials in libraries and archives. In the United States, the National Union Catalog and the National Union Catalog of Manuscript Collections have been used by researchers to locate archives although much of its information has since been migrated to online systems.An increasing number of archival institutions can be found via an online search. In addition, portals such as Europeana, the Digital Public Library of America and the National Library of Australia's Trove provide links to member institutions.\nIn the UK, JISC hosts the ArchivesHub, while the OCLC's ArchiveGrid provides an international portal for mostly library based institutions, which use MARC as a cataloguing tool for their holdings. The Association of Canadian Archivists (ACA) has partnered with the software company Artefactual to create ArchivesCanada, while the Australian Society of Archivists have used the same software for their Directory of Archives in Australia. Many other online search tools have been made available to facilitate search and discovery, including the Location Register of English Literary Manuscripts and Letters, the ArchiveSearch guide to archival materials in institutions in Cambridge, UK, and CARTOMAC: Archives littéraires d'Afrique.\nIf an archives cannot be found through online search or a publicly listed collection a researcher may have to track down its existence through other means, such as following other researcher's citations and references. This is particularly true for materials held by corporations or other organizations that may not employ an archivist and thus be unaware of the extent or contents of their materials.\nIn very restricted archives, access may be restricted only to individuals with certain credentials or affiliations with institutions like universities and then only to those of a certain level. Those lacking the necessary credentials may need to request letters of introduction from an individual or institution to provide to the archive.\nArchives usually contain unique materials and their organization may also be entirely unique or idiosyncratic to the institution or organization that maintains them. This is one important distinction with libraries where material is organized according to standardized classification systems. Traditionally, archives have followed the principle of respect des fonds in which the provenance and original order is maintained although some rearrangement, physical or intellectual, may be done by the archivist to facilitate its use. A basic guideline for archival description is the International Standard of Archival Description (General) (ISAD/G or ISAD), produced by the International Council on Archives (ICA). American institutions may also be guided by Describing Archives: a content standard (DACS) and in Canada by the Rules of Archival Description Archived 16 May 2017 at the Wayback Machine (RAD). Understanding how archival descriptions and finding aids are constructed is known as archival intelligence.In addition to these standards and rules for creating hard copy and online listings and catalogues, archivists may also provide access to their catalogues through APIs or through the encoding standards EAD (Encoded archival description) (relating to the fonds, series, and items) and EAC (Encoded archival context)(the organisations and people that created the archives).\nFinding aids are a common reference tool created by archivists for locating materials. They come in a variety of forms, such as registers, card catalogs, or inventories. Many finding aids to archival documents are now hosted online as web pages or uploaded as documents, such as at the Library of Congress' Rare Book & Special Collections. The level of detail in finding aids can vary from granular item-level descriptions to coarse collection-level descriptions. If an archive has a large backlog of unprocessed materials, there may not be any kind of finding aid at all. From around 2005, an ideology known as \"More Product, Less Process\", or MPLP, has been adopted by many North American collecting archives seeking to reduce processing time or alleviate backlogs to provide access to materials sooner, the results of which may be minimally described finding aids.\nAlthough most archive repositories welcome researchers, and have professional staff tasked with assisting them, the large quantity of records means that finding aids may be of only limited usefulness: the researcher will need to hunt through large quantities of documents in search of material relevant to his or her particular enquiry. Some records may be closed to public access for reasons of confidentiality; and others may be written in archaic handwriting, in ancient or foreign languages, or in technical terminology. Archival documents were generally created for immediate practical or administrative purposes, not for the benefit of future researchers, and additional contextual research may be necessary to make sense of them. Many of these challenges are exacerbated when the records are still in the custody of the generating body or in private hands, where owners or custodians may be unwilling to provide access to external enquirers, and where finding aids may be even more rudimentary or non-existent.\nArchival materials are usually held in closed stacks and non-circulating. Users request to see specific materials from the archives and may only consult them on-site. After locating the relevant record location using a finding aid or other discovery tool a user may then have to submit the request to the archives, such as using a request form. If an archives has part of its holdings located in a separate building or facility, it make take days or weeks to retrieve materials, requiring a user to submit their requests in advance of an on-site consultation.A reading room is a space, usually within or near the archive, where users can consult archival materials under staff supervision. The unique, fragile, or sensitive nature of some materials sometimes requires the certain kinds of restrictions on their use, handling, and/or duplication. Many archives restrict what kinds of items can be brought into a reading room from outside, such as pencils, notepads, bags, and even clothing, to guard against theft or risk of damage to materials. Further restrictions may be placed on the number of materials that can be consulted at any given time, such as limiting a user to one box at a time and requiring all materials to be laid flat and visible at all times. Some archives provide basic supplies including scrap paper and pencils or foam wedges for supporting unusually large materials. Duplication services may be available at the archive although the policies, costs, and time required can vary. Increasingly, archives also allow users to use their own devices, such as handheld cameras, cell phones, and even scanners, to duplicate materials. The use of white or any other glove, while popular in television programs, is not necessarily required for handling archival documents, due to concerns about fragility of pages and text. They may be required for handling volumes with poor bindings, if the gloves are removed for the internal pages to prevent transfer of dirt and other material, and should be used when handling photographs. Always check with the archivist as to whether gloves are required or not.\nArchives may also provide access to content via microfilm (including fiche and other formats) due to the fragility or popularity of the original archive. Digital copies may also be provided for the same reason. Before asking for access to the original, users should make sure that the items that have been reformatted are suitable for the use for which they are required. Reasons for asking for access to original content might include the need to view a colour image (architectural perspective and elevation drawings, maps and plans, etc.) or for accessibility reasons (minor visual vertigo is usually not considered a reason for access to originals, as the effect can be mitigated by slower perusal of the film).\nSome materials may contain information that concerns the privacy and confidentiality of living individuals, such as medical and student records, and demand special care. Materials that might contain personally identifiable information, such as social security numbers or names, must be handled appropriately, and an archive might provide redacted copies of materials or deny access to materials entirely due to privacy or other legislative concerns.\nMore and more archival materials are being digitized or are born-digital enabling them to be accessed off-site through the internet or other networked services. Archives that have digital materials accessible to the public may make their holdings discoverable to internet search engines by sharing or exposing their electronic catalogs and/or metadata, using standards like the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH). Some institutions have online portals where users can freely access digital materials that have been made available by the archive such as the Archives of the New York Public Library or the Smithsonian Institution Archives. Governments and their related institutions may use these \"electronic\", or \"virtual\", reading rooms to upload documents and materials that have been requested by the public such as through FOIA requests or in accordance with records disclosure policies.", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_0" +} \ No newline at end of file diff --git a/test/History/Cosmogony.json b/test/History/Cosmogony.json new file mode 100644 index 0000000000000000000000000000000000000000..a86c7068ef124987458ed690e5f40e9ca75b3d70 --- /dev/null +++ b/test/History/Cosmogony.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Cosmogony is any model concerning the origin of the cosmos or the universe.\nIn astronomy, cosmogony is the study of the origin of particular astrophysical objects or systems, and is most commonly used in reference to the origin of the universe, the Solar System, or the Earth:Moon system. The prevalent cosmological model of the early development of the universe is the Big Bang theory.Sean M. Carroll, who specializes in theoretical cosmology and field theory, explains two competing explanations for the origins of the singularity, which is the center of a space in which a characteristic is limitless (one example is the singularity of a black hole, where gravity is the characteristic that becomes limitless — infinite).\nIt is generally thought that the universe began at a point of singularity, but among Modern Cosmologists and Physicists, a singularity usually represents a lack of understanding, and in the case of Cosmology/Cosmogony, requires a theory of quantum gravity to understand. When the universe started to expand, what is colloquially known as the Big Bang occurred, which evidently began the universe. The other explanation, held by proponents such as Stephen Hawking, asserts that time did not exist when it emerged along with the universe. This assertion implies that the universe does not have a beginning, as time did not exist \"prior\" to the universe. Hence, it is unclear whether properties such as space or time emerged with the singularity and the known universe.\nDespite the research, there is currently no theoretical model that explains the earliest moments of the universe's existence (during the Planck epoch) due to a lack of a testable theory of quantum gravity. Nevertheless, researchers of string theory, its extensions (such as M-theory), and of loop quantum cosmology, like Barton Zwiebach and Washington Taylor, have proposed solutions to assist in the explanation of the universe's earliest moments. Cosmogonists have only tentative theories for the early stages of the universe and its beginning. The proposed theoretical scenarios include string theory, M-theory, the Hartle:Hawking initial state, emergent Universe, string landscape, cosmic inflation, the Big Bang, and the ekpyrotic universe. Some of these proposed scenarios, like the string theory, are compatible, whereas others are not.\nIn mythology, creation or cosmogonic myths are narratives describing the beginning of the universe or cosmos.Creation myths may be etiological, attempting to provide explanations for the origin of the universe. For instance, Eridu Genesis, the oldest known creation myth, contains an account of the creation of the world in which the universe was created out of a primeval sea (Abzu). Creation myths vary, but they may share similar deities or symbols. For instance, the ruler of the gods in Greek mythology, Zeus, is similar to the ruler of the gods in Roman mythology, Jupiter. Another example is the ruler of the gods in Tagalog mythology, Bathala, who is similar to various rulers of certain pantheons within Philippine mythology such as the Bisaya's Kaptan.\nIn the humanities, the distinction between cosmogony and cosmology is blurred. For example, in theology, the cosmological argument for the existence of God (pre-cosmic cosmogonic bearer of personhood) is an appeal to ideas concerning the origin of the universe and is thus cosmogonical. Some religious cosmogonies have an impersonal first cause (for example Taoism).However, in astronomy, cosmogony can be distinguished from cosmology, which studies the universe and its existence, but does not necessarily inquire into its origins. There is therefore a scientific distinction between cosmological and cosmogonical ideas. Physical cosmology is the science that attempts to explain all observations relevant to the development and characteristics of the universe on its largest scale. Some questions regarding the behaviour of the universe have been described by some physicists and cosmologists as being extra-scientific or metaphysical. Attempted solutions to such questions may include the extrapolation of scientific theories to untested regimes (such as the Planck epoch), or the inclusion of philosophical or religious ideas.\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_1" +} \ No newline at end of file diff --git a/test/History/Cultural_history.json b/test/History/Cultural_history.json new file mode 100644 index 0000000000000000000000000000000000000000..c8d7118484b522b87862b4c8d961de64d6ab1904 --- /dev/null +++ b/test/History/Cultural_history.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Cultural history records and interprets past events involving human beings through the social, cultural, and political milieu of or relating to the arts and manners that a group favors. Jacob Burckhardt (1818:1897) helped found cultural history as a discipline. Cultural history studies and interprets the record of human societies by denoting the various distinctive ways of living built up by a group of people under consideration. Cultural history involves the aggregate of past cultural activity, such as ceremony, class in practices, and the interaction with locales. It combines the approaches of anthropology and history to examine popular cultural traditions and cultural interpretations of historical experience.\nMany current cultural historians claim it to be a new approach, but cultural history was already referred to by nineteenth-century historians, notably the Swiss scholar of Renaissance history Jacob Burckhardt.Cultural history overlaps in its approaches with the French movements of histoire des mentalités (Philippe Poirrier, 2004) and the so-called new history, and in the U.S. it is closely associated with the field of American studies. As originally conceived and practiced in the 19th century by Burckhardt, in relation to the Italian Renaissance, cultural history was oriented to the study of a particular historical period in its entirety, with regard not only to its painting, sculpture, and architecture, but to the economic basis underpinning society, and to the social institutions of its daily life. Echoes of Burkhardt's approach in the 20th century can be seen in Johan Huizinga's The Waning of the Middle Ages (1919).\nMost often the focus is on phenomena shared by non-elite groups in a society, such as: carnival, festival, and public rituals; performance traditions of tale, epic, and other verbal forms; cultural evolutions in human relations (ideas, sciences, arts, techniques); and cultural expressions of social movements such as nationalism. Cultural history also examines main historical concepts as power, ideology, class, culture, cultural identity, attitude, race, perception and new historical methods as narration of body. Many studies consider adaptations of traditional culture to mass media (television, radio, newspapers, magazines, posters, etc.), from print to film and, now, to the Internet (culture of capitalism). Its modern approaches come from art history, Annales, Marxist school, microhistory and new cultural history.\nCommon theoretical touchstones for recent cultural history have included: Jürgen Habermas's formulation of the public sphere in The Structural Transformation of the Bourgeois Public Sphere; Clifford Geertz's notion of 'thick description' (expounded in The Interpretation of Cultures); and the idea of memory as a cultural-historical category, as discussed in Paul Connerton's How Societies Remember.\nThe area where new-style cultural history is often pointed to as being almost a paradigm is the \"revisionist\" history of the French Revolution, dated somewhere since François Furet's massively influential 1978 essay Interpreting the French Revolution. The \"revisionist interpretation\" is often characterized as replacing the allegedly dominant, allegedly Marxist, \"social interpretation\" which locates the causes of the Revolution in class dynamics. The revisionist approach has tended to put more emphasis on \"political culture\". Reading ideas of political culture through Habermas' conception of the public sphere, historians of the Revolution in the past few decades have looked at the role and position of cultural themes such as gender, ritual, and ideology in the context of pre-revolutionary French political culture.Historians who might be grouped under this umbrella are Roger Chartier, Robert Darnton, Patrice Higonnet, Lynn Hunt, Keith Baker, Joan Landes, Mona Ozouf, and Sarah Maza. Of course, these scholars all pursue fairly diverse interests, and perhaps too much emphasis has been placed on the paradigmatic nature of the new history of the French Revolution. Colin Jones, for example, is no stranger to cultural history, Habermas, or Marxism, and has persistently argued that the Marxist interpretation is not dead, but can be revivified; after all, Habermas' logic was heavily indebted to a Marxist understanding. Meanwhile, Rebecca Spang has also recently argued that for all its emphasis on difference and newness, the 'revisionist' approach retains the idea of the French Revolution as a watershed in the history of (so-called) modernity and that the problematic notion of modernity has itself attracted scant attention.\nCultural studies is an academic discipline popular among a diverse group of scholars. It combines political economy, geography, sociology, social theory, literary theory, film/video studies, cultural anthropology, philosophy, and art history/criticism to study cultural phenomena in various societies. Cultural studies researchers often concentrate on how a particular phenomenon relates to matters of ideology, nationality, ethnicity, social class, and/or gender. The term was coined by Richard Hoggart in 1964 when he founded the Birmingham Centre for Contemporary Cultural Studies. It has since become strongly associated with Stuart Hall, who succeeded Hoggart as Director.The BBC has produced and broadcast a number of educational television programmes on different aspects of human cultural history: in 1969 Civilisation, in 1973 The Ascent of Man, in 1985 The Triumph of the West and in 2012 Andrew Marr's History of the World.", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_2" +} \ No newline at end of file diff --git a/test/History/Dawid_Moryc_Apfelbaum.json b/test/History/Dawid_Moryc_Apfelbaum.json new file mode 100644 index 0000000000000000000000000000000000000000..008baba8183a0ee6f3c9566c4f298dd3cfb7981a --- /dev/null +++ b/test/History/Dawid_Moryc_Apfelbaum.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Dawid Moryc Apfelbaum, sometimes also known as Mieczysław Dawid Apfelbaum, is a disputed soldier who some contend was incorrectly credited as the commander of the Jewish Military Union that fought in the 1943 Warsaw Ghetto Uprising, during the Second World War. It is claimed that he died on 28 April 1943. Some allege he also served as a lieutenant of the Polish Armed Forces prior to the conflict.\nApfelbaum was first attested in 1948, in statements by Henryk Iwański, and later also mentioned by Tadeusz Bednarczyk, Władysław Zajdler, and Kałmen Mendelson, all of whom have claimed to have fought in the Warsaw Ghetto Uprising in 1943 under Apfelbaum's command, and to be members of the Polish Home Army. Their statements have been found by historians to be false, and their actual participation in the conflict, as well as the existence of Apfelbaum, was questioned.\nThe existence of Dawid Moryc Apfelbaum, sometimes also called Mieczysław Dawid Apfelbaum, was first attested in 1948 by Henryk Iwański. Apfelbaum was also later mentioned in stories told by Tadeusz Bednarczyk, Władysław Zajdler, and Kałmen Mendelson. All of them claimed to have fought in the Warsaw Ghetto Uprising in 1943, and to be members of the Home Army. Their statements had been found to differ in details, to have changed over the years, making claims not attested to anywhere else, leading some historians to doubt the existence of Apfelbaum.According to the first statement given by Iwański in 1948, Apfelbaum was one of the Jewish insurgents fighting in the Warsaw Ghetto Uprising in 1943. However, later, in the late 1950s, and early 1960s, he began being shown as a lieutenant of the Polish Armed Forces, as well as the creator and commander of the Jewish Military Union during the uprising. In contrast, currently it is believed that said accomplishments should be credited to Paweł Frenkiel instead. In various statements, they also described Apfelbaum's death due to wounds he would have suffered during a skirmish at Muranowska Street on 28 April 1943, in the first days of the uprising. Apfelbaum was also described to use pseudonyms Jabłoński, Kowal (meaning smith), and Mietek.\nIn 1962 Iwański told a story about Apfelbaum to journalist Chai Lazar, who then published it in Israel. It contributed to its spread in historical sources, where he was credited as a historical figure and creator of the Jewish Military Union. However, there are no sources that would prove that Apfelbaum was ever a member of Polish military prior to the war, nor that he ever lived in Warsaw. In 1963, Apfelbaum was awarded posthumously the Third-Class Order of the Cross of Grunwald.\nIn 2011, historians Dariusz Libionka and Laurence Weinbaum published a book titled Bohaterowie, hosztaplerzy, opisywacze. Wokół Żydowskiego Związku Wojskowego (Heroes, grifters, describers. Around the Jewish Military Union), in which they argued that Apfelbaum did not exist, and was fabricated by Iwański, Bednarczyk, and others for personal gain.\nIn 1997, Apfelbaum was commemorated together with Paweł Frenkiel, with an inscription in a stone sculpture near Dubois Street, as part of the Memorial Route of Jewish Martyrdom and Struggle installation located in the city of Warsaw, Poland, in the Downtown district. The inscription, translated to English, reads: \"Paweł Frenkel, commander of the Jewish Military Union; Dawid Apfelbaum, squad commander of the Jewish Military Union stationed near the Muranów Square; Killed in action in the Warsaw Ghetto Uprising\".\nOn 24 March 2004, a garden square, situated between Smocza Street, Pawia Street, and Dzielna Street, located within the district of Wola in Warsaw, was named Mieczysław Apfelbaum Square (Polish: Skwer Mieczysława Apfelbauma), in his commemoration. At the time, he was still assumed to be commander of the Jewish Military Union. Its was originally proposed by the Warsaw-based Jewish Historical Institute, which wanted a swuare near the Pawiak Prison Museum, to commemorate a person associated with the Jewish Military Union. It listed Apfelbaum as one of the potential candidates, whom was eventually chosen by the city, due to his, alleged at the time, status of the leader of the organisation. In 2012, its name was modified to Mieczysław Dawid Apfelbaum Square (Polish: skwer Mieczysława Dawida Apfelbauma).\nIn 2022, the Jewish Historical Institute begun collecting signatures on a petition to rename the square in honor of writer Rokhl Auerbakh, argumenting that Apfelbaum was fictional. In June 2023, the members of the Warsaw City Council voted unilaterally to change the name, which came in effect in September 2023, to Rokhl Auerbakh Square (Polish: skwer Racheli Auerbach).\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_3" +} \ No newline at end of file diff --git a/test/History/History_of_Tat_people.json b/test/History/History_of_Tat_people.json new file mode 100644 index 0000000000000000000000000000000000000000..58a93be2b583716d208038fa20666b296c2b1838 --- /dev/null +++ b/test/History/History_of_Tat_people.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Tat (variants of names - Caucasian Persians, Tat, Parsi, Daghly, Lahij) - are Iranian-speaking people who live in Azerbaijan and Russia (in the south of the Republic of Dagestan). They profess Islam - Shiite and Sunni directions. The Sunni Tats mainly live in the Guba and Shabran regions of Azerbaijan and also in Dagestan (Russia) they inhabit villages to the west of the city of Derbent. Also, the Tats live in Georgia - Gombori (Sagarejoi municipality).\nThe Tats live in Absheron and call themselves Parsi, and the Tats in the mountain villages of the northeast are called Daghly. Residents of the village of Lahij in the Ismailli region use another name. They refer to themselves as Lahij.\nThe name of tats first appeared in the 8th century. The ethnonym \"Tat\" has changed its meaning several times over the centuries. In the early era, the name tats is found in the monumental inscriptions of the ancient Persian kings of the Achaemenid dynasty (the time of the mention of the inscription is about the 5th century BC). The word \"tat\" meant one of the ancient Iranian tribes\". It is also worth noting that the Christian population in the mountainous regions of the Crimea were also called tat, but spoke Greek.The history of the Tats is not fully understood and there are very few facts about their origin. There are several versions of historians about the origin of the Tats. Some historians are inclined to believe about their Scythian origin, calling their ancestors in the person of ancient tapurs. Others speak of their Sassanian origin. There are versions about their Jewish origin and their assimilation of the Massagetae.The Tats were the main population of the Shirvanshah state.The Tat ethnogenesis was formed due to the mixing of Iranian, Caucasian and Semitic peoples. The Massagetae unambiguously participated in the etogenesis of the Tats, tribes of Caucasian Albania and Arab-Turkic conquerors.Until the October Revolution, the Tats used Persian as a written language, a small part of them spoke Arabic. In subsequent years, the Tat language remained unwritten.According to the 1921 census, there were more than 100 thousand tats. In 1931, 60.5 thousand tats were marked, and in 1989 their number dropped to 10 thousand, in 1999 only 10.9 thousand people called themselves tatami. The Tats are one of the small peoples of Azerbaijan, who are most susceptible to assimilation processes. This is noticeable among urban Muslim Tats. All this complicates the implementation of the actual number of tats. M. Velili-Baharly claims that the majority of the Azeri-Turks of north-western Azerbaijan, as well as the mountainous region of the Quba and Shemakhi districts, as well as the Absheron peninsula, consists of turkicized tats.The flag of tat was created in 2012.In the Middle Ages, the name tat was found on the territory of present-day Turkmenistan and in Khorasan.Despite the fact that during the Soviet period in the Soviet Union, including Georgia, the ethnic situation was scrupulously described, one ethnic group escaped the field of view of both scientists and state structures. These are lajjs (lakhijs), which were designated (registered) as Azerbaijanis both in the population censuses and in official legal documents proving the identity. Attention should be paid to one more circumstance: the people under such an ethnonym are not attested anywhere.The Laijs live in Gare Kakheti (Eastern Georgia), in the village of Gombori, Sagarejo region. Although the Laijs were recorded as Azerbaijanis, they did not consider themselves to be such. Along with Laij ethnic consciousness, they have such a basic feature of ethnicity as language. Since this ethnic unit was not known to the general scientific community until today, from now on, such awareness of the scientific community is necessary. The priority of detecting Laijah belongs to the Georgian orientalist (Iranian) scientist Manana Kvachadze, who scientifically studied the Laij language, playing the role of a kind of pioneer in this matter (Kvachadze 1988; 1989; 1998; 2004). The author of the article was familiar from childhood with the original ethnic community of the Laijs, with which he was even linked by certain family ties. What language do the Laijs speak? - In tat language. But it should certainly be emphasized that layjs do not identify themselves with the tatami. And one more interesting circumstance: in the village of Gombori, there is also another group of Muslims who call themselves tat, but speak Azeri rather than Tati. They are also recorded in all documents - both Soviet times and the current ones - as Azerbaijanis. These two ethnic groups of the Islamic faith communicate with each other in Azerbaijani.\nAccording to the materials we obtained, in 2010 there were between 300 and 400 Laijis living in Georgia. For various reasons, it is impossible to determine their exact number. The Laij are people of Iranian / Tato-speaking origin, and the Tats still live in Azerbaijan and Iran (in the Zohra and Talikan regions), as well as in Dagestan. According to linguistic data, Laidzh language is included in the southwestern group of Iranian languages and is one of the dialects of the Tat language. The Laij speech reveals a close genetic link with the Persian and Tajik languages .\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_4" +} \ No newline at end of file diff --git a/test/History/Hugh_Llewellyn_Keenleyside.json b/test/History/Hugh_Llewellyn_Keenleyside.json new file mode 100644 index 0000000000000000000000000000000000000000..fbb8639c1fdd63a1fdaeae9eba27f555911f13b0 --- /dev/null +++ b/test/History/Hugh_Llewellyn_Keenleyside.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "Hugh Llewellyn Keenleyside, CC (7 July 1898 : September 27, 1992) was a Canadian university professor, diplomat, and civil servant. He was the Canadian ambassador to Mexico from 1944 to 1947, and the commissioner of the Northwest Territories from January 14, 1947 to September 15, 1950.\nBorn in Toronto, the son of Ellis William and Margaret (Irvine) Keenleyside, he moved with his family to British Columbia when he was a few months old. After serving with the Canadian Expeditionary Force during World War I, he received a Bachelor of Arts degree from the University of British Columbia in 1920. He married Katherine Pillsbury in 1924. He received a Master of Arts degree in 1921 and Ph.D. in 1923 from Clark University. He taught history at Clark University, Penn State University, Brown University and Syracuse University. He returned to the University of British Columbia in 1927, but left to work at Macmillan publishers, before joining the Department of External Affairs at the same time as Lester B. Pearson.In 1929, he was posted to Japan, to open the new Canadian embassy there. He returned to Canada in 1936, and prepared the 1939 royal visit of King George VI and Queen Elizabeth. In 1941, he was appointed Assistant Under-Secretary of State for External Affairs. From 1944 to 1947, he was the Canadian Ambassador to Mexico. From 1940 to 1945, he served on the Canadian Section of the Permanent Joint Board on Defence. He was the commissioner of the Northwest Territories from 1947 to 1950. From 1947 to 1949, he was the Deputy Minister of Mines and Resources. From 1950 to 1958, he was the director general of the United Nations' Technical Assistance Administration. From 1959 to 1962, he was the chairman of the British Columbia Power Commission and co-chairman at the British Columbia Hydro and Power Authority from 1962 to 1969. He retired in 1969.\nFrom 1969 to 1977, he served as Chancellor and Chairman of the Board of Governors of Notre Dame University College.\nHe published a two-volume memoir: Hammer the Golden Day and On the Bridge of Time.\nIn 1969, he was made a Companion of the Order of Canada \"for service at the United Nations and in public administration\". He also was the 1982 recipient of the Pearson Medal of Peace for his work in public service. The Hugh Keenleyside Dam on the Columbia River in British Columbia is named in his honour. He was awarded an honorary degree from the University of British Columbia in 1945 and an honorary Doctor of Laws from his alma mater Clark University in 1951.", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_5" +} \ No newline at end of file diff --git a/test/History/International_Students_of_History_Association.json b/test/History/International_Students_of_History_Association.json new file mode 100644 index 0000000000000000000000000000000000000000..8e102a149e0457b98f106c6d017360d1a88b1f18 --- /dev/null +++ b/test/History/International_Students_of_History_Association.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "The International Students of History Association (ISHA) is an international non-governmental organization of students of history. Based and active mainly in Europe, ISHA's goals are to facilitate communication and provide a platform of exchange for students of history and related sciences on an international level.\nISHA was founded in Budapest in May 1990 thanks to the initiative of Hungarian history students who, after the fall of the Iron Curtain, wanted to forge links with their colleagues in Western Europe. At present, ISHA's members include more than 25 sections in fifteen European countries, and a number of observers and associate members, while ISHA is itself an associate member of the European Students' Union (ESU). Moreover, ISHA closely cooperates with a number of other academic networks, among them the Network of Concerned Historians, the European History Network and EUROCLIO, the European Association of History Educators, and The International Committee of Historical Sciences (ICHS), and the Right to Research Coalition (R2RC).\nThroughout the academic year, the various member sections take turns organizing several seminars and an Annual Conference. These events usually last five to seven days and take place with thirty to fifty (in case of the Annual Conference, up to a hundred) student participants from around Europe, and are hosted by different ISHA sections. They comprise workshops, discussions, lectures and presentations on varying topics, but also offer a cultural programme with visits and excursions. Additional leisure and evening activities are meant to provide more informal opportunities for participants to meet one another and thereby broaden their intercultural understandings.In 2009-10, ISHA took part in the project \"Connecting Europe through History : Experiences and Perceptions of Migration in Europe\", together with EUROCLIO and The Europaeum, an organization of ten leading European universities.In 2016-17, ISHA took part in the EU-funded project \"Learning a History that is 'not yet History'\", together with EUROCLIO and several other partners. In 2017, EUROCLIO organized the public debate \"How Can Europe Help the Balkans Consume its History?\", hosted by the newly inaugurated House of European History in Brussels, in association with the Centre for Democracy and Reconciliation in South East Europe (CDRSEE) and ISHA.\nIn 2018, ISHA associated with the International Association of Physics Students (IAPS) in a Series of Interdisciplinary Conferences named HyPe (HistorY and Physics Experience). The first edition took place in Bologna, Italy, with the topic of \"Nuclear Physics and History\". A second edition of HyPe, titled \"Space Matters\", was organised in 2019 in Rome, Italy. \nIn addition, a number of Conferences have been co-organized with the European Geography Association (EGEA).\nIn 2022, after the cancellation of the annual conference because of the COVID 19 pandemic, General Elections were held in a New Year Seminar in Vienna, organized as a partnership with Central European University.\nSince 1999, the association publishes its own annual journal, Carnival, a graduate student journal in which students of history and related sciences can publish articles of their own, regardless of ISHA affiliation. Submissions are peer-reviewed by a team of PhD students.The Association is organized around sections, or local chapters, that represent a city. Any city with an active member can become a section, and some are associated with local student organizations, such as Ffabula in the Czech Republic, Durf Doen in Belgium, and the Association of Finnish History Students in Finland. Sections send delegates to the Annual Conferences, where they constitute the General Assembly and elect the International Board, consisting of a President, one or more Vice-Presidents, a Secretary, and a Treasurer. The General Assembly also elects a Council, the Treasury Supervision, the editor-in-chief for Carnival, and an Archivist, responsible for maintaining the association's archives in the Ladeuze University Library of the KU Leuven.", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_6" +} \ No newline at end of file diff --git a/test/History/List_of_preserved_historic_blast_furnaces.json b/test/History/List_of_preserved_historic_blast_furnaces.json new file mode 100644 index 0000000000000000000000000000000000000000..bbbf580949664f42502b761b849edc51ac51651b --- /dev/null +++ b/test/History/List_of_preserved_historic_blast_furnaces.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "This list of preserved historic blast furnaces contains decommissioned blast furnaces, of which substantial remains survive. The furnaces are preserved in a park or museum, or as a site otherwise open to visitors, or intended to become such.\nWhile pre-20th-century blast furnaces already have a long history of monument preservation, the perception of 20th century mass production blast furnace installations as industrial heritage is a comparably new trend. For a long time, it has been normal procedure for such a blast furnace to be demolished after being decommissioned and either be replaced with a newer, improved one, or to have the entire site demolished to make room for follow-up use of the area. It has only been in recent years that numerous countries have realized the value of blast furnaces as a part of their industrial history.\nHistorically, the first such blast furnace not to be demolished stands in Starachowice, Poland (decommissioned in 1968), followed by the last blast furnace of Yahata Steel Works in Yahatahigashi-ku, Kitakyūshū, Japan (decommissioned in 1972) and the \"Carrie Furnaces\" in Homestead, Pennsylvania in the United States (decommissioned in 1978). One of the two blast furnaces in Neunkirchen in Germany (decommissioned in 1982) was the first blast furnace worldwide to be not just preserved, but actively refurbished for the purpose of preservation.\nFor 20th-century mass production blast furnaces, the degree of accurate preservation versus integration into new structures, or even re-purposing, differs between the various sites. Colorful illumination installations at night are common.\nThese installations all date from the 20th century. They are supported by outer frames made of metal, were supplied with pre-heated blast air from external Cowper stoves, were typically part of large industrial compounds where, at one point, multiple blast furnaces were typically standing and operating side by side for efficiency reasons, raw materials were delivered by external elevating mechanisms, and the entire site was accessible by freight trains which delivered the raw materials and carried off the freshly smelted pig iron in ladles.In many cases, the preserved sites have been deliberately stripped down to minimize maintenance costs; namely, some blast furnaces and related installations have been demolished. The goal was to only retain one or two blast furnaces including the relevant related installations (such as Cowper stoves, cast house, winch house etc.), which are considered sufficient to explain the blast furnace process and all related functions to visitors.\nThe first such decommissioned blast furnace that wasn't demolished and has been preserved to this very day stands in Starachowice, Poland, and has ceased operation as early as 1968.\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_7" +} \ No newline at end of file diff --git a/test/History/National_History_Day.json b/test/History/National_History_Day.json new file mode 100644 index 0000000000000000000000000000000000000000..1e034a4209713de6ad9ce2d6e9b35b90ff20c70f --- /dev/null +++ b/test/History/National_History_Day.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "National History Day is a competition that educates young children in College Park, Maryland that operates an annual project-based contest for students in grades 6-12. It has affiliates in all fifty states, Washington, D.C., Puerto Rico, Guam, American Samoa, South Korea, China, South Asia, and Central America. It started as a local program in Cleveland, Ohio, headed by Dr. David Van Tassel, a history professor at Case Western Reserve University. It grew from 129 students in 1974 to over 500,000 students in 48 states in 1991, and 700,000 students and 40,000 teachers in 2001. Today, more than half a million students enter through local contests. They construct entries as an individual or a group in one of five categories: documentary, exhibit board, paper, performance, or website. Students then compete in a series of regional contests with top three entries advancing to affiliate, then state contests. At state contests, the top two entries in each category and division are invited to compete at the National History Day contest. State winners then go to Maryland for a final competition, held in June for a prize of money.\nNational History Day started in Cleveland, Ohio in 1974. Members of the History Department at Case Western Reserve University developed the initial idea for a history contest akin to a Science Fair. In 1978, they incorporated the project and hired Lois Scharf as executive director. She worked to raise grant funds and recruit state historical organizations to join the program. She served until 1992. Students gathered on campus to devote one day to history calling it \"National History Day.\" Over the next few years, the contest expanded throughout Ohio and into surrounding Midwestern states. By 1980, with the help of the National Endowment for the Humanities, National History Day had grown into a national non-profit organization. In 1992 National History Day moved its headquarters from Cleveland to College Park, Maryland in the Washington, D.C., area. National History Day now runs multiple educational programs but the National Contest is still the largest of these.The annual theme frames students’ research within a historical theme. It is chosen for its broad application to world, national, or state history and its relevance to ancient history or the recent past. Themes are rotated each year and prior themes can be used after approximately twelve years. For example, the 2023 theme was \"Turning Points in History.\" Projects are judged in part on their connection to the annual theme.As of 2024, the theme for NHD is Rights & Responsibilities in History\nStudents, either individually or as a group, can submit a project from one of the following categories: paper, exhibit, performance, documentary, or website. After reviewing the year's theme, the submission handbook, and choosing a topic, the student(s) should gather primary and secondary sources about their research. All sources need to be clearly cited in the annotated bibliography that is required for all projects. Additionally, a title page and a process paper must be submitted with each project. The process paper should include how the project's topic was chosen, how the research was conducted, how the actual project was created, the historical significance of the research, and the historical argument made in the project.National History Day projects are judged using an evaluation form with two categories: Historical Quality (accounting for 80% of the score) and Clarity of Presentation (20% of the score). The Historical Quality category includes judging based on the strength historical arguments, research, quality of primary sources, historical accuracy, multiple perspectives, and relevant connections to the historical context.In some regions, students who reach enough points in their judging advance to state competitions, and any number of students at regional competitions can advance to states. In other states, such as California, Connecticut, and Pennsylvania, the top three projects at the regional competition advance to the state competition. Regions can be divided by geographic area, population, or by county.At the affiliate, then state level contests, students compete for a variety of prizes. Some states may have additional categories which do not proceed to nationals, such as California which has a Podcast category. At state level competitions, the top two entries in each category and division are invited to the National Contest, held each June at the University of Maryland, College Park.\nIn the preliminary rounds, each entry presents its project before a panel of three judges. In the case of the paper and website categories, the projects are reviewed by the judges before the presentations, while performances, documentaries, and exhibits are seen by the judges for the first time at the presentation. The top 2 entries in the senior, and junior division advance to the national contest. Judges in each room advance one entry to the final round of judging. Each room reviews approximately 9-10 entries.Competitors that have advanced to the final round have their projects judged by a panel of three new judges, but the students are not interviewed in this round. Their project then has to stand alone for the final judging. \nThe awards for first, second, and third place at the national level are $1000, $500, and $250, respectively. \"Outstanding Entry\" awards are also given to two projects from each state: one junior entry and one senior entry. There are also more than a dozen special prizes awarded worth between $250 and $10,000.\nIn 2011 several researchers from Rockman et al published a study examining the competition's impact on participating students. Funded by the National History Day organization and an independent funder, the study focused on students from New Jersey, Texas, South Carolina, and Colorado, examining both students who participated in the contest and those who did not. Findings indicated that participating students were more likely to outperform the non-participating students scholastically; researchers noted that \"Although it is difficult to credit any single program with student success, there are clear and consistent indications that academic performance improves with successive years of NHD participation.\"Arnita Jones, executive director of the American Historical Association, wrote in 2001:Perhaps the greatest impact of National History Day...was on the historical profession itself. I truly believe that never have so many historians enjoyed engaging in the pursuit of history outside their offices, their regular classrooms, and their academic research as have the thousands who have participated in National History Day as teachers, mentors, consultants, and judges over more than two decades.\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_8" +} \ No newline at end of file diff --git a/test/History/North_American_Society_for_Oceanic_History.json b/test/History/North_American_Society_for_Oceanic_History.json new file mode 100644 index 0000000000000000000000000000000000000000..c43101d30264d9cf3b20ab315727ec3657e11e73 --- /dev/null +++ b/test/History/North_American_Society_for_Oceanic_History.json @@ -0,0 +1,59 @@ +{ + "domain": "History", + "document": "The North American Society for Oceanic History (NASOH) is the national organization in the United States of America for professional historians, underwater archeologists, archivists, librarians, museum specialists and others working in the broad field of maritime history. NASOH is an affiliated organization of the American Historical Association.\nNASOH was founded in 1973 to provide a forum for maritime history and remains actively devoted to the study and promotion of maritime history. The society's objectives are to promote the exchange of information among its members and others interested in the history of the seas, lakes, and inland waterways; to call attention to books, articles, and documents pertinent to naval and maritime history; and to work with local, regional, national, international, and government organizations toward the goal of fostering a more general awareness and appreciation for North America's naval and maritime heritage. NASOH also houses the U.S. Commission on Maritime History which is a constituent member of the International Commission for Maritime History.\nNASOH's organizational records are deposited in the Joyner Library] at East Carolina University\nEvery year NASOH holds an academic conference, where its members present papers on current research in maritime history. Each year, the conferences are held in a different location. The site is usually at a maritime location, which will allow members to link a broad national and global understanding of maritime history to local and regional maritime activities. Meetings have been held on the West Coast, the Gulf Coast, the Great Lakes, the Mid- and Southern-Atlantic coasts of the United States as well as in Canada and in Bermuda.The president of NASOH awards on occasion the K. Jack Bauer Award to honor those who have given distinguished service to NASOH and have made life-time contributions to the field of maritime history.The Charles Dana Gibson Award honors the best article on North American maritime history published in a peer-reviewed journal.\nEach year, a panel of selected NASOH members reviews all the books published during the year in the field of maritime history to select the John Lyman Book Awards that are given annually by the society in the following six categories: Canadian naval and maritime history, U.S. naval history, U.S. maritime history, science and technology, reference works and published primary sources, and biography and autobiography.\nThe society also gives a number of awards to graduate students:\nChad Smith Student Travel Grants are awarded to assist students in funding travel to its annual meeting to deliver a paper at the meeting. The award is named in honor of Philip Chadwick Foster Smith, maritime museum curator, maritime historian, and an early member of NASOH.\nClark G. Reynolds Student Paper Award is provided each year to the author of the best paper by a graduate student delivered at the society's annual conference. Named in honor of Clark G. Reynolds (1939:2005)—naval historian, museum curator, and the first executive officer of NASOH—the prize will consist of assistance in publishing the essay in The Northern Mariner(the journal co-sponsored by NASOH and the Canadian Nautical Research Society), a membership in NASOH, and a handsome plaque.\nThe James C. Bradford Dissertation Research Fellowship is named in honor of NASOH past-president Dr. James C. Bradford, in recognition of his distinguished contributions to the field of American naval history. Topics in all periods of United States and North American naval history, including strategy, tactics, and operations; institutional development and administration; biography, personnel, and social development; exploration, science, and technology and science; and policy and diplomacy. Applicants must have completed all requirements for the Ph.D. at the time of application and have an approved dissertation proposal on file at their degree-granting institution.\nThe society publishes at regular intervals the NASOH Newsletter to inform members about activities within the field of maritime history.From 2007, NASOH also publishes in association with the Canadian Nautical Research Society the refereed academic journal The Northern Mariner (TNM).\nFrom time to time, NASOH publishes books of collected papers from its annual conferences and NASOH will be publishing a series of handbooks for use in teaching aspects of maritime history.\n", + "RE_label_set": [ + "HasPart", + "LanguagesSpokenWrittenOrSigned", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Capital", + "TimePeriod", + "Crosses", + "PracticedBy", + "HasQuality", + "DevelopsFrom", + "LocatedIn", + "AffiliatedOrganization", + "Causes", + "PartOf", + "Founded", + "OfficialLanguage", + "LanguageUsed" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "History_9" +} \ No newline at end of file diff --git a/test/Human_behavior/Affect_infusion_model.json b/test/Human_behavior/Affect_infusion_model.json new file mode 100644 index 0000000000000000000000000000000000000000..e1fe2a9e325806d21d7edf540cfa340c19486806 --- /dev/null +++ b/test/Human_behavior/Affect_infusion_model.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "The Affect infusion model (AIM) is a theoretical model in the field of human psychology. Developed by social psychologist Joseph Paul Forgas in the early 1990s, it attempts to explain how affect impacts one's ability to process information. A key assertion of the AIM is that the effects of affect tend to be exacerbated in complex situations that demand substantial cognitive processing. In simpler words, as situations become more complicated and unanticipated, mood becomes more influential in driving evaluations and responses.\nForgas defined the term affect infusion as \"the process whereby affectively loaded information exerts an influence on and becomes incorporated into the judgmental process, entering into the judge's deliberations and eventually coloring the judgmental outcome\". In other words, a process that determines the degree to which mood can affect our judgement. According to the AIM, affect (mood and emotion) exerts a notable influence not only on information processing but on the resulting response behaviors as well. For example, if a person receives an inordinately large electric bill, they will respond differently if they have had a relaxing and stress-free day than they will if they have just been stuck in traffic for two hours. Under this latter circumstance, the person will experience high levels of affect infusion, as their agitated state will be made worse upon seeing the electric bill. An assumption of the AIM is that this effect will generally occur more strongly as the complexity of a situation increases. Highly complex situations can exhibit a number of qualities, such as the amount of effort needed to process the information, whether the situation is familiar or entirely new and how severely the situation affects the person. Some common activities that tend to produce high affect infusion include: choosing whether or not to drink or take drugs, selecting or getting to know a new partner, explaining a conflict or allocating rewards to a group.\nAccording to Forgas, the varying levels of affect infusion can be seen as a continuum, with four alternative processing strategies as markers along that continuum. These strategies represent the different degrees of severity in which mood exerts its influence. In identifying these strategies, two important differentiating factors are considered: the information search strategies used to perform a task (open or restricted)\nthe extent of the information considered in constructing a response.\nSeveral factors related to the judgment target, context, and judger influence which processing strategy is selected.\nFamiliarity - Familiar targets are more likely to elicit either direct access or motivated processing.\nImportance - Unimportant judgments are more likely to encourage direct access processing or motivated processing when a specific motive exists.\nAtypical - If a target is complex or unusual it is more likely to trigger substantive processing, otherwise heuristic processing may be used.\nCognitive capacity - If the individual has cognitive capacity substantive processing may be more likely.\nAffective state - Positive affect is more closely linked to heuristic processing, while negative affect is more closely associated with substantive processing.\nMotivation for accuracy - An individual who is motivated to be accurate will be more likely to use substantive processing.\nThe least intensive of the four, direct access processing, involves reproducing a stored reaction, that is, repeating a response that has been given before to a similar situation. According to the AIM, the influence of mood on cognition will be least severe during this type of processing.Motivated processing usually involves specific and targeted search strategies with a direct informational goal in mind. This strategy also involves little influence from mood, as the individual in question will have a fairly clear idea of what information he or she needs (although it is higher on the continuum than direct access processing).Heuristic processing assumes that affective processing, or emotional processing, occurs outside our awareness, with people simply making sense of their emotional reactions as they happen. Thus, affective experience provides people with information about themselves, including their tendencies and implicit judgments. This process is also known as the \"affect-as-information\" mechanism.Also called systematic processing, this strategy involves the most elaborate cognitive processing and appears highest on the continuum, as it is the most powerfully affected by mood. The reason substantive processing is most apt to be infused by affect is because mood can affect each stage in the cognition process: attention, encoding, retrieval, and association.Attention : To grapple with the amount of information that elicits substantive processing, people are likely to only focus on a subset of the entire information available. Mood-congruent information is more likely to be attended to than mood-incongruent information.\nEncoding : People spend more time encoding mood-congruent into a richer network of representations than mood incongruent information.\nRetrieval - Mood-congruent information is more likely to be retrieved from memory than other details.\nAssociation : Constructive social judgments require the interpretation of complex information. Affect can prime certain associations that influence subsequent interpretation.\nTaken as a whole, Forgas has identified two overarching conditions under which mood is most likely to affect information processing: \nsituations that require cognition about difficult, peripheral subjects\nsituations that require judgment of obscure, atypical subjects.\nBecause mood itself is relatively complex, being the sum of many smaller emotional experiences with no single cause, pinpointing its real-world influence is no easy task. But scholars have used the AIM to examine a number of social phenomena with a variety of results. One area of research involving the AIM concerns the model's role in understanding an individual's propensity for risk taking. Since risky behavior can trigger a complex and varied set of emotional responses (elation, fear, acceptance, etc.), a person's mood might be expected to play a substantial and unpredictable role in any choice to take heavy risks. If a person is in a good mood, he or she might be more likely to appraise the risk positively and be willing to accept any consequences in advance. But even if they are in a bad mood, they could be more likely to rebel against their cultural norms and take the risk anyway.This relationship has been examined in a particular experiment by attempting to manipulate a person's mood in order to produce infusion responses. The hypothesis is that the \"risk taking tendency is greater for those individuals who are in a happy mood than for those who are in a sad mood\". Participants in this experiment were exposed to one of three priming movies (happy, sad, or neutral) and then measured on a risk-taking scale. The researchers divided the sample into two units of separation, one being age (old and young) and the other being mood valence (happy, neutral and sad). Not only did their data confirm their hypothesis for both younger and older participants, but it also confirmed the AIM as a legitimate instrument for studying the complexities of mood.\nAnother study examined how the AIM relates to a specific type of risk behavior: gambling. It investigated how mood affects an individual's sustained inclination to gamble, especially among non-regular gamblers. The researchers separated regular and non-regular gamblers and measured how their moods affected their experiences on the gaming floor. Specifically, they expected non-regular gamblers in a good mood to be more persistent than non-regular gamblers in a bad mood. This is because gambling, when it is a new and unfamiliar experience, complete with the bright lights and colors that are a feature of the average casino, requires a great deal of information processing, making it especially unattractive to someone in a bad mood. Their research confirmed this notion, but in addition, it was used to positively identify depression as a causal factor of addictive gambling, when the casino has become a familiar environment.\nIn striving for a deeper understanding of the AIM, scholars have examined different types of behavior that can be expected when affect (mood and emotion) strongly influences information processing. This is by no means an exact science, as the behavioral consequences of affect are usually indirect and varied, but they have been able to show that \"affective states have a subtle and cognitively mediated influence on the ways people perform or inhibit complex strategic behaviors\" (p. 206). In other words, emotion influences thinking and behavior in subtle ways. A person in a strongly positive mood may be more confident and use more direct interpersonal behaviors than they would if they were in a bad mood. They may feel 'untouchable' due to the many good things that have happened to them and approach complex situations with an increased level of assurance. As the research has shown, this effect becomes greater as a situation becomes more complex.In this sense, the AIM is a potential instrument for propaganda campaigns that promote a link between positive affect and desired behavior. For example, many failed attempts to dissuade adolescents from smoking have involved morbid and gloomy advertisements that only serve to depress their viewers. According to the AIM, messages that establish a comfortable atmosphere and focus not on the consequences of smoking but on the benefits of not smoking would probably be more successful.\nAlong with a clearer understanding of the effect of mood on a person's information processing, the AIM also provides a guide by which researchers can design experiments to investigate the effect of sending persuasive messages to subjects. One important area of research involves the concept of 'mood congruence', or how the results of mood compare to the mood itself. It has been found that 'mood congruence' occurs when a person exhibits a positive relationship between his or her mood and a dependent variable; essentially, as the strength of the mood increases or decreases, so the performance measured by this variable increases or decreases correspondingly. Conversely, 'mood incongruence' occurs when a person exhibits a negative relationship between mood and the dependent variable; thus, as mood increases, performance decreases and vice versa.This distinction has been used to study the relationship between moods and personal goals. For those who are mood congruent, mood generally has a positive relationship with goal motivation, which presents a major opportunity to designers of public health information. According to this line of thought, establishing a positive mood state within the emotional feel of a message and then psychologically connecting that state to the desired behavior would be critical to the message's efficacy.\nThe AIM has also provided useful insights to other fields. In consumer research, the AIM has helped to explain how males and females differ in their processing of advertising under happy and sad mood states.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_0" +} \ No newline at end of file diff --git a/test/Human_behavior/Behavioral_change_support_system.json b/test/Human_behavior/Behavioral_change_support_system.json new file mode 100644 index 0000000000000000000000000000000000000000..fdba78ca92d1feea7d87a9ed3715f924520dc573 --- /dev/null +++ b/test/Human_behavior/Behavioral_change_support_system.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "A Behavioral Change Support System (BCSS) is any information and communications technology (ICT) tool, web platform, or gamified environment which targets behavioral changes in its end-users. BCSS are built upon persuasive systems design techniques.\nThe design of these systems and their contents are based on behavioral change theories and models for behavioral change over time. The theory of planned behavior describes the relationship between attitudes, intentions, and the desired behavior. It is considered to be one of the most influential determinant models.A supporting model is the Fogg Behaviour Model (FBM), which states that a user must be motivated first before having the ability to perform the change in their behavior, which is triggered by either intrinsic or extrinsic factors (The term \"trigger\" was changed by the author in late 2017 and the term \"prompt\" is now being used). BCSS makes use of extrinsic (perceptual) prompts like alarms, messages with offers or calls to action, ads, requests, and more.\nOther theories that aid in the design and mechanisms behind a BCSS include the social learning theory (SLT), which studies the interactions between a user and the environment, and the theory of planned behavior (initiated as the theory of reasoned action).\nApplications of BCSS may include game and training elements in several market domains which can range from Health and Education and Quality of Life (QoL), to professional development and workability. Virtually any concept designed to cause a shift in a person's behavior can be considered a BCSS, even if this change is not directly observed by the users. When users are aware of this intention and choose to work within the system, the chances of favorable results from this system increase. This effect is attributed to metacognition, as most BCSS systems implement metacognitive strategies for goal attainment. These strategies help users understand the cause of their resistance to adopting the desired behavior. It requires that they monitor themselves whenever the targeted behavior can be observed to understand their progress towards the desired behavior, and record evidence (usually objective but also subjective measurements) of their behavioral changes.There can be a positive impact on people who have difficulties in changing their behavior by considering behaviors and the distance to the desired behavior. This can be achieved by helping them develop a personalized plan for reaching the targeted behavior and learning the ways to achieve their personal goals. In most cases, the general objective can be split into more than one objective or step, before the desired behavior is adopted by the users and becomes a routine. The positive feedback introduces self-management in BCSS applications since it is particularly helpful for people to take responsibility for their own actions and do things to the best of their ability. BCSS is very often equipped with additional features like game elements to foster user engagement leading to serious game applications. Moreover, they implement machine learning techniques to predict the future behavior of users based on their past performance. The evidence of the achieved change in behavior, as well as important notifications during self-evaluation, are communicated with visual analytics tools such as performance graphs. Additional tools frequently found in BCSS include checklists and questionnaires to collect users' feedback, hardware sensing components like the Internet of things (IoT) devices (e.g., cameras), and social collaboration to help the members of a user community to support each other. Occasionally, some BCSS allow professionals (trainers, educators, medical personnel and social professionals) to participate in the BCSS activities. This can be done by giving advice and support and also by making decisions and alterations to the treatment plan according to the observed performance and the personal needs of the targeted users.\nMost BCSSes work on a single profile (targeted user), while some can monitor and report progress made by a group of people. There are BCSS applications purely made using software, while others include hardware components like sensors and IoT devices to introduce physical computing in a hybrid physical-digital approach. The devices used to access a BCSS are usually internet-connected mobile devices like smartphones, tablets, or smartwatches. The success in this category of BCSS applications lies in monitoring and notifying the users constantly in regards to daily activities. On the other hand, there are BCSSes which are less intrusive and rely on less frequent access to the system. Another way to distinguish BCSSes is by the knowledge domain they refer to. Theoretically, a BCSS can be built in any knowledge domain.Examples of BCSS applied in eHealth domains include CAREGIVERSPRO-MMD, which is a community-based intervention to support people living with dementia and their caregivers using game elements to engage users in non-pharmacological interventions; iLift, which trains nurses in lifting and transfer techniques to prevent lower-back injuries, and We4Fit which is more like a game environment. A more extensive review of health BCSS can be found on the work of Alahäivälä & Oinas-Kukkonen (2016) and Bridle et al. (2005).As Arlinghaus and Johnston implied, “Although not sufficient, education is a necessary component for behaviour change” (2018). BCSSes are used in education less for imparting knowledge and testing knowledge gained, and more for teaching a difficult subject like \"responsible sexual behaviour\" in middle-school students, or for changing attitudes and beliefs about a topic of interest.Adopting new behavioral patterns is difficult and people are not motivated to change their behavior if they do not recognize the blocking issue. Gamification is used to help recognition by providing rewards, competition, and motivational cues of a BCSS. Prochaska et al. (2007) proposed a six-stage behavioral change model (pre-contemplation, contemplation, preparation, action, maintenance, and termination) which can be applied in educational uses of a BCSS, as it appears in an ideal environment for making the first step (contemplation) after a long period of resistance (pre-contemplation). BCSSes affect the physical world and help people experiment with an alternative behavioral pattern without thinking of possible coincidences (such as social exposure). The virtual activities performed in a BCSS help in the next step (preparation) where the user makes a transition from a passive to an active state in a safe environment. The user-monitoring and reward system of a BCSS helps users complete the rest of the stages of the behavior change (action, maintenance, and termination) and avoid regression to the previous unwanted behavior. Schmied (2017) proposes a similar seven-step process: the Designing for Behaviour Change (DBC) framework. Overall, a positive behavioral change in education settings is facilitated by technology through digital intervention strategies, where a teacher or educator makes adjustments to personalize the interventions to the student's profiles and performance. Although ICT tools may not be necessary to change behavior in schools, when used in the form of serious game-assisted learning, they can provide a more in-depth perception of important concepts in a field of study despite some disadvantages.\nBCSS has been applied in other knowledge and study areas, including workers' behaviour, consumers' brand-loyalty, and CO2 footprints and energy consumption. Examples include applications designed to raise water-saving awareness, apps used by drivers to reduce fuel consumption by adopting an eco-friendly driving style, and educational games for simulating energy consumption in domestic environments like in Casals et al. (2017). A systematic review of the application of game elements to behavioural change in domestic energy consumption can be found in Johnson et al. (2017) An example from the Industry 4.0 domain is SATISFACTORY, which proposes a gamified social collaboration platform that is integrated into the shop-floor of industries to improve productivity, safety and workers' engagement. In the marketing context, behavioural change techniques do not aim to change the way people think, but how they consume products and services. In politics, behavioural change interventions are delivered in the form of mass-media campaigns on existing social media platforms rather than standalone applications.Overall, there is a continually growing number of domains in which ICT tools are introduced as tools to implement and deliver behavioral change campaigns in a systematic way. Some researchers refer to persuasive technology to identify the computer-mediated communication between humans or human-computer interaction technologies used to deliver persuasive evidence. A BCSS should be treated as a more complex ICT-based construct which may use persuasive technologies, but also supports the full life-cycle of behavioral change interventions (from authoring to publishing), implements various campaigns to achieve its goals, and is adaptive to specific user profiles.\nBehavior Change Support Systems have been criticized for a lack of grounding in independent behavioral theory, as well as the lack of industry standards to measure performance or effect. Another source of criticism refers to the dominant behavioral change models as products of the theory of planned behavior. According to some researchers (Kollmus & Agyeman, 2002), there is a gap between attitude and intention, and target behavior. Thus, it is difficult to find a widely accepted model that can take all relevant behavioral parameters into account. Additionally, even if BCSSes help to effect a change in a targeted user's behavior, the user usually fails to maintain the target behavior. This could be the result of underestimating the long-term influence that environmental factors have on behavior.There is currently an open discussion on how intrusive a BCSS should be, but this appears to be dependent upon the physical and social context of the environment in which the BCSS is being used. As BCSS makes use of personal data coming from users' profiles and the user-monitoring system, the use of BCSSes in everyday life may be legally restricted.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_1" +} \ No newline at end of file diff --git a/test/Human_behavior/Binge_eating.json b/test/Human_behavior/Binge_eating.json new file mode 100644 index 0000000000000000000000000000000000000000..54c7e7244e501db125be94cb4aee68f30560ff65 --- /dev/null +++ b/test/Human_behavior/Binge_eating.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Binge eating is a pattern of disordered eating which consists of episodes of uncontrollable eating. It is a common symptom of eating disorders such as binge eating disorder and bulimia nervosa. During such binges, a person rapidly consumes an excessive quantity of food. A diagnosis of binge eating is associated with feelings of loss of control. Binge eating disorder is also linked with being overweight and obesity.\nThe DSM-5 includes a disorder diagnosis criterion for Binge Eating Disorder (BED). It is as follows:Recurrent and persistent episodes of binge eating\nBinge eating episodes are associated with three (or more) of the following:\nEating much more rapidly than normal\nEating until feeling uncomfortably full\nEating large amounts of food when not physically hungry\nEating alone because of being embarrassed by how much one is eating\nFeeling disgusted with oneself, depressed, or very guilty after overeating\nMarked distress regarding binge eating\nAbsence of regular compensatory behaviors (such as purging)\nTypical warning signs of binge eating disorder include the disappearance of a large quantity of food in a relatively short period of time. A person who may be experiencing binge eating disorder may appear to be uncomfortable when eating around others or in public. A person may develop new and extreme eating patterns that they have never done before. These might include diets that cut out certain food groups completely such as a no dairy or no carb diet. Binge eating can begin after a first attempt at dieting. They might also steal or hoard food in unusual places. A person may be experiencing fluctuations in their weight. In addition, they may have feelings of disgust, depression, or guilt about overeating. Another possible warning sign of binge eating is that a person may be obsessed with their body image or weight.Furthermore, patients who binge eat may also engage in other self-destructing behaviours like suicide attempts, drug use, shop-lifting, and drinking too much alcohol. The onset of binge eating without dieting is linked to a higher risk of mental health issues and a younger age of onset. BED patients can experience comorbid psychiatric instability.\nThere are no direct causes of binge eating; however, long-term dieting, psychological issues and an obsession with body image have been linked to binge eating. There are multiple factors that increase a person's risk of developing binge eating disorder. Family history could play a role if that person had a family member who was affected by binge eating. Said person may not have a supportive or friendly home environment, and they have a hard time expressing their problems with BED. Having a history of going on extreme diets may cause an urge to binge eat. Psychological issues such as feeling negatively about oneself or the way they look may trigger a binge.Weight stigma has also been found to predict binge eating, highlighting the importance of weight inclusive approaches to binge eating disorder that do not exercerbate this potential cause.\nThere are several physical, emotional, and social health risks when associated with binge eating disorder. These risks include depression, anxiety, and heart disease.One study found that people with obesity who experience binge eating have a higher body mass index, and higher levels of depression and stress than those who did not have with binge eating disorder Exposure to two major categories of risk factors—those that raise the risk for obesity and those that raise the risk for psychiatric disorders in general—can be associated with binge eating disorder.\nTypically, the eating is done rapidly, and a person will feel emotionally numb and unable to stop eating. Most people who have eating binges try to hide this behavior from others, and often feel ashamed about being overweight or depressed about their overeating. Although people who do not have any eating disorder may occasionally experience episodes of overeating, frequent binge eating is often a symptom of an eating disorder.BED is characterized by uncontrollable, excessive eating, followed by feelings of shame and guilt. Unlike those with bulimia, those with BED symptoms typically do not purge their food, fast, or excessively exercise to compensate for binges. Additionally, these individuals tend to diet more often, enroll in weight-control programs and have a history of family obesity. However, many who have bulimia also have binge-eating disorder.\nAlong with the social and physical health that is affected when suffering from BED, there are psychiatric disorders that are often linked to BED. Some of them being but are not limited to: \ndepression, bipolar disorder, anxiety disorder, substance abuse/use disorder.\nCurrent treatments for binge eating disorder mainly consist of psychological therapies, such as Cognitive Behavioural Therapy (CBT), Interpersonal Psychotherapy (IPT), and Dialectical Behavioural Therapy (DBT). A study conducted on the long term efficacy of psychological treatments for binge eating showed that both cognitive behavioral therapy (CBT) and group interpersonal psychotherapy (IPT) effectively treat binge eating disorder, with 64.4% of patients completely recovering from binge eating.Lisdexamfetamine dimesylate, also known as Vyvanse, is the only medication approved by the Food and Drug Administration (FDA) for the treatment of moderate-to-severe binge eating disorder in adults as of 2024. However, some studies have called into question its effectiveness for this indication.\nThe American Psychiatric Association mentioned and listed binge eating under the listed criteria and features of bulimia in the Diagnostic and Statistical Manual of Mental Disorders (DSM) - 3 in 1987. By including binge eating in the DSM-3, even if not on its own as a separate eating disorder, they brought awareness to the disorder and gave it mental disorder legitimacy. This allowed for people to receive the appropriate treatment for binge eating and for their disorder to be legitimized.In January 2015, the Food and Drug Administration (FDA) approved lisdexamfetamine dimesylate (Vyvanse), the first medication indicated for the treatment of moderate-to-severe binge eating disorder.Men with binge eating often face unique barriers to seeking treatment due to socio-cultural expectations surrounding masculinity. After men compare their bodies to the culturally constructed masculine ideals, they often develop heightened concerns about their own body image and internalize the belief that their bodies should be muscular, lean, and strong, developing unhealthy behaviors like binge eating or using fad diets. Many men hesitate to reach out for help out of fear of appearing weak, 'less like a man' or even homosexual. The pervasive stereotype that eating disorders primarily affect women has contributed to feelings of shame and isolation among men who are affected by these disorders. This gender-based stigma surrounding eating disorders and strongly feminine branding of eating disorder treatment centers create a significant barrier to men's willingness to reach out for support. Men are more likely to partake in compulsive or excessive exercising as a compensation to highly calorific diets, leading to body dysmorphia.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_2" +} \ No newline at end of file diff --git a/test/Human_behavior/Creative_consumer.json b/test/Human_behavior/Creative_consumer.json new file mode 100644 index 0000000000000000000000000000000000000000..b53a70c699854629c116274acaf746671c2ce87f --- /dev/null +++ b/test/Human_behavior/Creative_consumer.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "A creative consumer is defined as any \"individual or group who adapt, modify, or transform a proprietary offering\". Traditional consumers simply use and consume products and services, creative consumers do the same but also change them in some way.\nExamples include:\nThe hacker George Hotz unlocked the original iPhone and hacked Sony's PlayStation 3, then gave away these hacks for free.\nJose Avila made FedEx furniture for his apartment exclusively from Federal Express boxes.\nJim Hill, a devoted Disney fan, designed and delivered guided but unauthorized tours of Disneyland.\nIn 2005, The Economist published an article about the future of innovation, ‘The rise of the creative consumer’. This article explained that some companies rely on identifying and leveraging the innovation potential of creative consumers. However, many companies may feel threatened or upset by the actions of creative consumers. Hotz, Avila, and Hill all received negative, and in some cases threatening, reactions from the companies whose products and services they had repurposed.\nBerthon, et al., proposed that companies can take four general stances on creative consumers. These stances are determined by whether the company's actions toward these creative consumers are active or passive and whether the company's attitude towards creative consumers is either positive or negative.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_3" +} \ No newline at end of file diff --git a/test/Human_behavior/Crowd_collapses_and_crushes.json b/test/Human_behavior/Crowd_collapses_and_crushes.json new file mode 100644 index 0000000000000000000000000000000000000000..90431a24162b4883e52eedb7aa83d94401e8de2b --- /dev/null +++ b/test/Human_behavior/Crowd_collapses_and_crushes.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Crowd collapses and crowd crushes are catastrophic incidents that can occur when a body of people becomes dangerously overcrowded. When numbers are up to about five people per square meter, the environment may feel cramped but manageable; when numbers reach between eight and ten people per square meter, individuals become pressed against each other and may be swept along against their will by the motion of the crowd. Under these conditions, the crowd may undergo a progressive collapse where the pressure pushes people off their feet, resulting in people being trampled or crushed by the weight of other people falling on top of them. At even higher densities, the pressure on each individual can cause them to be crushed or asphyxiated while still upright.\nSuch incidents are invariably the product of organizational failures, and most major crowd disasters could have been prevented by simple crowd management strategies. Such incidents can occur at large gatherings such as sporting, commercial, social, and religious events. The critical factor is crowd density rather than crowd size.\nCrowd collapses and crushes are often reported incorrectly as human stampedes, which typically occur when a large group of people all try to get away from a perceived risk to life.\nOne study has calculated that there were 232 deaths and over 66,000 injuries in the ten years between 1992 and 2002 as a result of such incidents, but crowd scientists believe that such casualties are both vastly under-reported and increasing in frequency. One estimate is that only one in ten crowd injuries occurring in doorbuster sales are reported, while many, if not most, injuries at rock concerts go unreported.The average individual occupies an oval floorspace approximately 30 by 60 centimetres (1 by 2 ft)—0.2 square metres; 2 square feet—and at densities of 1 to 2 per square meter (or per 10 sq ft) individuals can move freely without contact. Even if people are moving quickly, at this density one can avoid obstacles, and the chance of a crowd-related incident is minimal. Even at three or four people per square meter, the risk is low; however, at densities of five per square meter, it becomes more difficult for individuals to move, and at higher densities of six to seven per square meter, individuals become pressed against each other and can be unable to move voluntarily. At this point a crowd can begin to behave like a fluid, with individuals moved about by the pressure of those around them, and shockwaves can pass through the crowd as pressures within the crowd change. This can be highly dangerous, although some people actively seek this experience, such as at rock concerts or football matches, where the excitement, camaraderie, and literally \"going with the flow\" is for some an essential part of the experience, and activities like dancing and moshing are common. The danger inherent in these conditions is that the crowd will collapse in on itself or become so densely packed that individuals are crushed and asphyxiated.A crowd collapse occurs when a crowd is so dense that each individual is touching others all around and is, to an extent, supported by those around. This can occur whether the crowd is moving or stationary. If a person then falls, the support to those around is lost, while the pressure from those further out remains, causing people to fall into the void. This process is then repeated, causing a bigger void, and will progress until the pressure eases; meanwhile, those who have fallen are at risk of being smothered by the weight of bodies on top or being trampled as the crowd is swept over them.An example of a progressive crowd collapse was the 2015 Mina stampede in Mecca, Saudi Arabia during the Hajj when over 2,400 people were reported to have died.\nAt even higher densities (approaching ten people per square metre (one per square foot)) a crowd can become so packed that people are crushed together to such an extent they can no longer breathe and are asphyxiated. Such crowd crushes can occur when a moving crowd is funneled into a smaller and smaller space, when it meets an obstacle (such as a dead end, or a locked door), or when an already densely packed crowd has an influx of people, causing a pressure wave toward those at the front of the crowd. In this situation those entering may be unaware of the effect on those in front and continue to press in.Examples of crushes are the Hillsborough disaster in Sheffield, South Yorkshire, England in 1989, the Love Parade disaster in Duisburg, North Rhine-Westphalia, Germany in 2010, the Astroworld Festival crowd crush in Houston, Texas, and the Itaewon Halloween crowd crush in Itaewon, Seoul, South Korea in 2022.\nThe term \"stampede\" is usually used in reference to animals that are fleeing a threat. Stampede events that involve humans are extremely rare and are unlikely to be fatal. According to Keith Still, professor of crowd science at Manchester Metropolitan University, \"If you look at the analysis, I've not seen any instances of the cause of mass fatalities being a stampede. People don't die because they panic. They panic because they are dying\". Paul Torrens, a professor at the Center for Geospatial Information Science at the University of Maryland, remarks that \"the idea of the hysterical mass is a myth\". Incidents involving crowds are often reported by media as the results of panic. However, the scientific literature has explained how panic is a myth which is used to mislead the attention of the public from the real causes of crowd incidents, such as a crowd crush.In crowd collapse and crush incidents the most common cause of death is asphyxiation, caused either by vertical stacking, as people fall on top of one another, or by horizontal stacking, where people are crushed together or against an unyielding barrier. Victims can also exhibit bone fractures caused by the pressure, or trampling injuries, when a crowd has swept over them where they have lain.It is believed that most major crowd disasters can be prevented by simple crowd management strategies. Crushes can be prevented by organization and traffic control, such as crowd barriers. On the other hand, barriers in some cases may funnel the crowd toward an already-packed area, such as in the Hillsborough disaster. Hence barriers can be a solution in preventing or a key factor in causing a crush. One problem is lack of feedback from people being crushed to the crowd pressing behind—feedback can instead be provided by police, organizers, or other observers, particularly raised observers, such as on platforms or horseback, who can survey the crowd and use loudspeakers to communicate and direct a crowd. In some cases it may be possible to take simple measures such as spreading movements out over time.A factor that may contribute to a crush is inexperienced security officers who assume that people's behaviour in a dense crowd is voluntary and dangerous, and start applying force or preventing people from moving in certain directions. In the 1989 Hillsborough disaster, some police and stewards were so concerned with what they saw as possible hooliganism that they took actions that actually made matters worse.\nThere is risk of a crush when crowd density exceeds about five people per square meter. For a person in a crowd a signal of danger, and a warning to get out of the crowd if possible, is the sensation of being touched on all four sides. A later, more serious, warning is when one feels shock waves travelling through the crowd, due to people at the back pushing forward against people at the front with nowhere to go. Keith Still of the Fire Safety Engineering Group, University of Greenwich, said \"Be aware of your surroundings. Look ahead. Listen to the crowd noise. If you start finding yourself in a crowd surge, wait for the surge to come, go with it, and move sideways. Keep moving with it and sideways, with it and sideways.\" Other recommendations include trying to remain upright, and keeping away from walls and other obstructions if possible.\nAfter the 1883 crush known as the Victoria Hall disaster in Sunderland, England, which killed 183 children, a law was passed in England which required all public entertainment venues to be equipped with doors that open outwards—for example, using crash bar latches that open when pushed. Crash bars are required by various building codes.\nFruin, John (January 2002) [First presented March 1993]. The Causes and Prevention of Crowd Disasters (PDF). First International Conference on Engineering for Crowd Safety (crowdsafe.com ed.). Archived (PDF) from the original on 30 April 2021.Pearl, Tracy Hresko (2015). \"Crowd Crush: How the Law Leaves American Crowds Unprotected\". Kentucky Law Journal. 104 (1). Article 4.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_4" +} \ No newline at end of file diff --git a/test/Human_behavior/Deviance_regulation_theory.json b/test/Human_behavior/Deviance_regulation_theory.json new file mode 100644 index 0000000000000000000000000000000000000000..dc38c05d2d6b135e0b2840a1d79631810a1c0658 --- /dev/null +++ b/test/Human_behavior/Deviance_regulation_theory.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Deviance regulation theory (DRT) posits that people choose to stray from social norms in socially attractive ways as well as avoiding socially unattractive behaviors that stray from social norms. These actions are all performed in an effort to preserve a constructive private and public self-image. DRT was proposed by Hart Blanton at the University of Albany in 2003 and has various applications in behavior change including alcohol interventions, inducing creativity, and other uses that are briefly mentioned below. Limitations to this theory have yet to be discovered but with future research Blanton and Christie are sure that boundaries are to be found.\nDeviance regulation theory (DRT) builds upon past research on causal attribution, self-representation, social comparison, person perception, and social prototypes. These areas of research focus on identity and actions separately. In DRT, deviance is defined strictly as a divergence from a norm, lacking any negative connotation that the term deviance commonly holds in psychology. Deviance regulation theory links actions and identities to explain and predict adherence to, and deviance from, normative action based on identity pursuit. This is a somewhat narrow scope because application is limited to situations where identity concerns are predominant.DRT relies on a dual-motivational system to explain the pursuit of identity within reference groups. On one side of the system, motivation comes from the avoidance of negative self-views. In a reference group where a behavior is required of its members, the members of the reference group will internalize the group mentality. If an individual were to deviate from the normative behavior, they would then develop negative self-views. So in order to protect their positive self-regard, individuals are motivated to avoid deviating from the normative behavior.\nOn the other side of the dual-motivational system, in a reference group where a behavior deviating from the norm is desirable but not required of its members, members of the group would regard the deviant act as an ideal. In this scenario, an individual is motivated to deviate from the norm because doing so will raise their esteem within the reference group and will elevate their level of positive self-regard.\nIn both schemes, deviance from or adherence to a normative act is guided by identity pursuit. In the first scheme behavior was guided by the preservation of positive identity through the avoidance of negative self-regard; and in the second scheme, behavior was guided by the pursuit of positive identity. Which motivation will guide behavior will depend on the context within reference groups and individual variance, although avoidance of negative identity seems to be a more pungent motivator. In the first example the negative self-views would come from ideas of social obligation. Not meeting the minimum requirements of the social obligation leads to feelings of exclusion which is why it can be a very powerful motivator. Positive identity pursuit gives motivation to exhibit what Blanton and Christie referred to as \"optional ideals\". Meeting minimums for social inclusion seems to be a more pressing influence over behavior than exhibiting ideal (but not required) behavior, especially when individual abilities and interests are taken into account.\nResearch by Hart Blanton has not found limitations because the experiments were conducted under circumstances that favored the current theory. Blanton and Christie expect boundary conditions to become evident through future research and may be found to exist in situations where the individual is resistant to change. If an individual makes a conscious effort to resist a reference group's perceived attempt to alter the individual's behavior, it seems plausible that DRT could backfire. The same way that people key off of behavior from ingroups, people also observe and avoid normative behavior displayed by people in outgroups. In this context DRT could play the opposite role as an individual would avoid the observed normative behavior.Differences in culture could potentially expose another boundary condition. A person's level of self-representation could be a limit of application. Future research could show whether cultural identity would influence the predictive power of deviance regulation theory. It seems intuitive to think that a person who holds a more collective identity (e.g. in eastern culture individuals base more of their identity off of the identity of the success and failure of their collective nation when compared with individuals from western culture) may be influenced differently by motivations relating to identity pursuit than someone who holds an individualistic view of identity.\nDeviance regulation theory is primarily used as an intervention meant to influence behavior through social norms. By framing a message about what behaviors are considered normal in either a positive or negative way, it is possible to influence individuals to either engage or abstain from those behaviors based on the desire to appear as an individual with positive qualities. There are several ways in which a deviance regulation intervention has been and can possibly be used:Among the uses of deviance regulation interventions, the regulation of alcohol use, especially among college students, is perhaps the most prevalent. Interventions involving conformity are particularly relevant in the case of college drinking due to the tendency of college students to overestimate the amount of alcohol consumed by their peers, as well as projection, or the tendency for individuals to view their peer's drinking habits as similar to their own, causing them to see their own alcohol use as normal. Furthermore, a deviance regulation intervention makes sense among this population due to college often being a time of identity development, and because many see drinking as an integral part of the college experience could serve as a behavior with which to establish an identity.One way deviance regulation interventions have been used to control alcohol consumption is by increasing the use of protective behavioral strategies. Protective behavioral strategies (PBS) are methods that an individual can employ in order to limit the consequences of alcohol use, and include limiting the number of drinks consumed in a session, moderating the manner of drinking, and serious harm reduction, such as having a designated driver. It was found that individuals who believed the use of PBS was high were most influenced by a negative message about those who do not use PBS and that individuals who believed PBS use was low were more influenced by a positive message about those who use PBS. However, this held true only for the manner of drinking strategy, and only influenced behavior when the subject believed in the message.\nDeviance regulation interventions have also been used to influence creativity. This was done by manipulating self guides, which are internalized evaluative standards developed through socialization. There are two types of self guides: ought self-guides, which are representative of attributes that are socially desirable and are performed out of a sense of obligation or social obligation or responsibility, and Ideal self guides, which represent attributes formed more from the individual's desires and personal ambitions. Both of these self-guides are associated with distinct motivational orientations. Ought self-guides, which focus on attributes typically taught through punishment, lead to a prevention-focus, or the avoidance of unwanted outcomes. Conversely, ideal self-guides, which are developed through praise and admiration, lead to a promotion-focus, or the desire to achieve positive outcomes.It has been generally observed that individuals high in promotion-focus are more likely to show flexible and creative thinking patterns. Therefore, researchers believed that situations that activate promotion-focus should result in greater creativity. It was found that those who put a high emphasis on social obligation had less desire to be creative, and therefore manipulation of the salience of ought self-guides inhibited creative output while manipulation of ideal self-guides increased creative output. Furthermore, priming of promotion-focus lead subjects led to more novel answers on a word association test. However, it is believed that these results came from an increase in creative expression, not creative ability, as the boost to creative output vanished among speeded trials.\nA deviance regulation intervention has been used in various other scenarios in order to encourage flu immunization, condom use, as well as prospectively for the discouragement of cigarette smoke.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_5" +} \ No newline at end of file diff --git a/test/Human_behavior/Discrete_trial_training.json b/test/Human_behavior/Discrete_trial_training.json new file mode 100644 index 0000000000000000000000000000000000000000..1c96fe8a9e767485edb1782caadb3a9cc16157c3 --- /dev/null +++ b/test/Human_behavior/Discrete_trial_training.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Discrete trial training (DTT) is a technique used by practitioners of applied behavior analysis (ABA) that was developed by Ivar Lovaas at the University of California, Los Angeles (UCLA). DTT uses mass instruction and reinforcers that create clear contingencies to shape new skills. Often employed as an early intensive behavioral intervention (EIBI) for up to 25:40 hours per week for children with autism, the technique relies on the use of prompts, modeling, and positive reinforcement strategies to facilitate the child's learning. It previously used aversives to punish unwanted behaviors. DTT has also been referred to as the \"Lovaas/UCLA model\", \"rapid motor imitation antecedent\", \"listener responding\", \"errorless learning\", and \"mass trials\".\nDiscrete trial training (DTT) is a process whereby an activity is divided into smaller distinct sub-tasks and each of these is repeated continuously until a person is proficient. The trainer rewards successful completion and uses errorless correction procedures if there is unsuccessful completion by the subject to condition them into mastering the process. When proficiency is gained in each sub-task, they are re-combined into the whole activity: in this way proficiency at complex activities can be taught. DTT is carried out in a one-on-one therapist to student ratio at the table. Intervention can start when a child is as young as two years old and can last from two to six years. Progression through goals of the program are determined individually and are not determined by which year the client has been in the program. The first year seeks to reduce self-stimulating/self-regulatory (\"stimming\") behavior (this includes (\"stimming\") in ways that pose no inherent harm), teach listener responding, eye contact, and rapid fine and gross motor imitation, as well as to establish playing with toys in what the therapist considers the \"correct\" way, and integrate the family into the treatment protocol. The second year teaches early expressive language and abstract linguistic skills. The third year strives to include the individual's community in the treatment to optimize \"mainstreaming\" by focusing on peer interaction, basic socializing skills, basic social rules, emotional expression and variation, in addition to observational learning and pre-academic skills, such as reading, writing, and arithmetic. Rarely is the technique implemented for the first time with adults.\nDTT is typically performed five to seven days a week with each session lasting from five to eight hours, totaling an average of 30:40 hours per week. Sessions are divided into trials with intermittent breaks, and the therapist is positioned directly across the table from the student receiving treatment. Each trial is composed of the therapist giving an instruction (i.e., \"Look at me\", \"Do this\", \"Point to\", etc.), in reference to an object, color, simple imitative gesture, etc., which is followed by a prompt (verbal, gestural, physical, etc.). The concept is centered on shaping the child to respond correctly to the instructions throughout the trials. Should the child fail to respond to an instruction, the therapist uses either a \"partial prompt\" (a simple nudge or touch on the hand or arm) or a \"full prompt\" to facilitate the child to successfully complete the task. Correct responses are reinforced with a reward, and the prompts are discontinued as the child begins to master each skill.\nThe intervention is often used in conjunction with the Picture Exchange Communication System (PECS) as it primes the child for an easy transition between treatment types. The PECS program serves as another common intervention technique used to conform individuals with autism. As many as 25% of autistic individuals have no functional speech. The program teaches spontaneous social communication through symbols or pictures by relying on ABA techniques. PECS operates on a similar premise to DTT in that it uses systematic chaining to teach the individual to pair the concept of expressive speech with an object. It is structured in a similar fashion to DTT, in that each session begins with a preferred reinforcer survey to ascertain what would most motivate the child and effectively facilitate learning.\nLimited research shows DTT to be effective in enhancing spoken language, academic and adaptive skills, as many studies are of low quality research design and there needs to be more larger sample sizes.A 1965 article in Life magazine entitled Screams, Slaps and Love has a lasting impact on public attitudes towards Lovaas's therapy. Giving little thought to how their work might be portrayed, Lovaas and parent advocate Bernie Rimland, M.D., were surprised when the magazine article appeared, since it focussed on text and selected images showing the use of aversives, including a close up of a child being slapped. Even after the use of aversives had been largely discontinued, the article continued to have an effect, galvanizing public concerns about behavior modification techniques.In April 2002 treatment cost in the U.S. was about US$4,200 per month ($50,000 annually) per child. The 20:40 hours per week intensity of the program, often conducted at home, may place additional stress on already challenged families.Discrete trial training is rooted in the hypothesis of Charles Ferster that autism was caused in part by a person's inability to react appropriately to \"social reinforcers\", such as praise or criticism. Lovaas's early work concentrated on showing that it was possible to strengthen autistic people's responses to these social reinforcers, but he found these improvements were not associated with any general improvement in overall behavior.In a 1987 paper, psychologists Frank Gresham and Donald MacMillan described a number of weaknesses in Lovass's research and judged that it would be better to call the evidence for his interventions \"promising\" rather than \"compelling\".\nLovaas's original technique used aversives such as striking, shouting, and electrical shocks to punish undesired behaviors. By 1979, Lovaas had abandoned the use of aversives, and in 2012 the use of electric shocks was described as being inconsistent with contemporary practice.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_6" +} \ No newline at end of file diff --git a/test/Human_behavior/Fight-or-flight_response.json b/test/Human_behavior/Fight-or-flight_response.json new file mode 100644 index 0000000000000000000000000000000000000000..2004a2a830e0a87dc14143e82466321544b1aa91 --- /dev/null +++ b/test/Human_behavior/Fight-or-flight_response.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "The fight-or-flight or the fight-flight-freeze-or-fawn (also called hyperarousal or the acute stress response) is a physiological reaction that occurs in response to a perceived harmful event, attack, or threat to survival. It was first described by Walter Bradford Cannon in 1915. His theory states that animals react to threats with a general discharge of the sympathetic nervous system, preparing the animal for fighting or fleeing. More specifically, the adrenal medulla produces a hormonal cascade that results in the secretion of catecholamines, especially norepinephrine and epinephrine. The hormones estrogen, testosterone, and cortisol, as well as the neurotransmitters dopamine and serotonin, also affect how organisms react to stress. The hormone osteocalcin might also play a part.\nThis response is recognised as the first stage of the general adaptation syndrome that regulates stress responses among vertebrates and other organisms.\nOriginally understood as the \"fight-or-flight\" response in Cannon's research, the state of hyperarousal results in several responses beyond fighting or fleeing. This has led people to calling it the \"fight, flight, freeze\" response, \"fight-flight-freeze-fawn\" or \"fight-flight-faint-or-freeze\", among other variants. The wider array of responses, such as freezing, flop, faint, flee and fright, has led researchers to use more neutral or accommodating terminology such as \"hyperarousal\" or the \"acute stress response\".\nThe autonomic nervous system is a control system that acts largely unconsciously and regulates heart rate, digestion, respiratory rate, pupillary response, urination, and sexual arousal. This system is the primary mechanism in control of the fight-or-flight response and its role is mediated by two different components: the sympathetic nervous system and the parasympathetic nervous system.The sympathetic nervous system originates in the spinal cord and its main function is to activate the arousal responses that occur during the fight-or-flight response. The sympathetic nervous system transfers signals from the dorsal hypothalamus, which activates the heart, increases vascular resistance, and increases blood flow, especially to the muscle, heart, and brain tissues. It activates the adrenal medulla, releasing catecholamines that amplify the sympathetic response. Additionally, this component of the autonomic nervous system utilizes and activates the release of norepinephrine by the adrenal glands in the reaction.The parasympathetic nervous system originates in the sacral spinal cord and medulla, physically surrounding the sympathetic origin, and works in concert with the sympathetic nervous system. It is known as the calming portion of the autonomic nervous system. While the sympathetic nervous system is activated, the parasympathetic nervous system decreases its response. Efferent vagal fibers originating from the nucleus ambiguous fire in parallel to the respiratory system, decreasing the vagal cardiac parasympathetic tone. After the fight or flight response, the parasympathetic system's main function is to activate the \"rest and digest\" response and return the body to homeostasis. This system utilizes and activates the release of the neurotransmitter acetylcholine.The reaction begins in the amygdala, which triggers a neural response in the hypothalamus. The initial reaction is followed by activation of the pituitary gland and secretion of the hormone ACTH. The adrenal gland is activated almost simultaneously, via the sympathetic nervous system, and releases the hormone epinephrine. The release of chemical messengers results in the production of the hormone cortisol, which increases blood pressure, blood sugar, and suppresses the immune system.The initial response and subsequent reactions are triggered in an effort to create a boost of energy. This boost of energy is activated by epinephrine binding to liver cells and the subsequent production of glucose. Additionally, the circulation of cortisol functions to turn fatty acids into available energy, which prepares muscles throughout the body for response.\nCatecholamine hormones, such as adrenaline (epinephrine) or noradrenaline (norepinephrine), facilitate immediate physical reactions associated with a preparation for violent muscular action.\nThe physiological changes that occur during the fight or flight response are activated in order to give the body increased strength and speed in anticipation of fighting or running. Some of the specific physiological changes and their functions include:Increased blood flow to the muscles activated by diverting blood flow from other parts of the body to make taking quick action easier.\nIncreased blood pressure and heart rate enhance cardiac output in order to supply the body with more energy.\nIncreased blood sugar (glucose) and fats secreted by the liver to provide the body with extra fuel.\nIncreased respiration to supply the oxygen necessary to help burn the extra glucose.\nThe blood clotting function of the body speeds up in order to prevent excessive blood loss in the event of an injury sustained during the response.\nIncreased muscle tension in order to provide the body with extra speed and strength, which can result in trembling or shaking until the tension is released.\nThe pupils dilate to let in more light, allowing for better vision of the body's surroundings.\nIn the context of the fight or flight response, emotional regulation is used proactively to avoid threats of stress or to control the level of emotional arousal. Emotional socialization can develop someone's ability to successfully regulate their emotions. Faced with a perceived threat (in the context of a fight or flight situation) those raised with supportive parental behaviors are far more likely to easily self-regulate their emotions.During the reaction, the intensity of emotion that is brought on by the stimulus will also determine the nature and intensity of the behavioral response. In a experiment conducted by Clayton, Lang, Leshner and Quick (2019), they viewed the responses of 49 participants to antitobacco messages. Participants reacted in two orders of fashion after seeing the message with the individual smoker and their affects on those surrounding them. The first reaction was participants who had higher defense mechanisms, who decided to ignore the messages, while the other participants who had lower defense mechanisms, ended up arguing and becoming frustrated after viewing the antitobacco messages. Individuals with higher levels of emotional reactivity (Such as an anxiety disorder) may be prone to anxiety and aggression, which illustrates the implications of appropriate emotional reaction in the fight or flight response.The specific components of cognitions in the fight or flight response seem to be largely negative. These negative cognitions may be characterised by: attention to negative stimuli, the perception of ambiguous situations as negative, and the recurrence of recalling negative words. There also may be specific negative thoughts associated with emotions commonly seen in the reaction.Perceived control relates to an individual's thoughts about control over situations and events. Perceived control should be differentiated from actual control because an individual's beliefs about their abilities may not reflect their actual abilities. Therefore, overestimation or underestimation of perceived control can lead to anxiety and aggression.The social information processing model proposes a variety of factors that determine behavior in the context of social situations and preexisting thoughts. The attribution of hostility, especially in ambiguous situations, seems to be one of the most important cognitive factors associated with the fight or flight response because of its implications towards aggression.An evolutionary psychology explanation is that early animals had to react to threatening stimuli quickly and did not have time to psychologically and physically prepare themselves. The fight or flight response provided them with the mechanisms to rapidly respond to threats against survival.A typical example of the stress response is a grazing zebra. If the zebra sees a lion closing in for the kill, the stress response is activated as a means to escape its predator. The escape requires intense muscular effort, supported by all of the body's systems. The sympathetic nervous system's activation provides for these needs. A similar example involving fight is of a cat about to be attacked by a dog. The cat shows accelerated heartbeat, piloerection (hair standing on end), and pupil dilation, all signs of sympathetic arousal. Note that the zebra and cat still maintain homeostasis in all states.In July 1992, Behavioral Ecology published experimental research conducted by biologist Lee A. Dugatkin where guppies were sorted into \"bold\", \"ordinary\", and \"timid\" groups based upon their reactions when confronted by a smallmouth bass (i.e. inspecting the predator, hiding, or swimming away) after which the guppies were left in a tank with the bass. After 60 hours, 40 percent of the timid guppies and 15 percent of the ordinary guppies survived while none of the bold guppies did.\nAnimals respond to threats in many complex ways. Rats, for instance, try to escape when threatened but will fight when cornered. Some animals stand perfectly still so that predators will not see them. Many animals freeze or play dead when touched in the hope that the predator will lose interest.Other animals have alternative self-protection methods. Some species of cold-blooded animals change color swiftly to camouflage themselves. These responses are triggered by the sympathetic nervous system, but, in order to fit the model of fight or flight, the idea of flight must be broadened to include escaping capture either in a physical or sensory way. Thus, flight can be disappearing to another location or just disappearing in place, and fight and flight are often combined in a given situation.\nThe fight or flight actions also have polarity : the individual can either fight against or flee from something that is threatening, such as a hungry lion, or fight for or fly towards something that is needed, such as the safety of the shore from a raging river.\nA threat from another animal does not always result in immediate fight or flight. There may be a period of heightened awareness, during which each animal interprets behavioral signals from the other. Signs such as paling, piloerection, immobility, sounds, and body language communicate the status and intentions of each animal. There may be a sort of negotiation, after which fight or flight may ensue, but which might also result in playing, mating, or nothing at all. An example of this is kittens playing: each kitten shows the signs of sympathetic arousal, but they never inflict real damage.\nAcute stress response is a common issue in self-defense criminal cases. Expert opinions are usually required if the defender's fault becomes the focus of the case.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_7" +} \ No newline at end of file diff --git a/test/Human_behavior/Oblique_Strategies.json b/test/Human_behavior/Oblique_Strategies.json new file mode 100644 index 0000000000000000000000000000000000000000..584b6a9d703205b28ac1136a816caaaf98b51c9f --- /dev/null +++ b/test/Human_behavior/Oblique_Strategies.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Oblique Strategies (subtitled Over One Hundred Worthwhile Dilemmas) is a card-based method for promoting creativity jointly created by musician/artist Brian Eno and multimedia artist Peter Schmidt, first published in 1975. Physically, it takes the form of a deck of 7-by-9-centimetre (2.8 in × 3.5 in) printed cards in a black box. Each card offers a challenging constraint intended to help artists (particularly musicians) break creative blocks by encouraging lateral thinking.\nIn 1970, Peter Schmidt created \"The Thoughts Behind the Thoughts\", a box containing 55 sentences letterpress printed onto disused prints that accumulated in his studio, which is still in Eno's possession. Eno, who had known Schmidt since the late 1960s, had been pursuing a similar project himself, which he had handwritten onto a number of bamboo cards and given the name \"Oblique Strategies\" in 1974. There was a significant overlap between the two projects, and so, in late 1974, Schmidt and Eno combined them into a single pack of cards and offered them for general sale. The set went through three limited edition printings before Schmidt suddenly died in early 1980, after which the card decks became rather rare and expensive. Sixteen years later software pioneer Peter Norton convinced Eno to let him create a fourth edition as Christmas gifts for his friends (not for sale, although they occasionally come up at auction). Eno's decision to revisit the cards and his collaboration with Norton in revising them is described in detail in his 1996 book A Year with Swollen Appendices. With public interest in the cards undiminished, in 2001 Eno once again produced a new set of Oblique Strategies cards. The number and content of the cards vary according to the edition. In May 2013 a limited edition of 500 boxes, in burgundy rather than black, was issued.The story of Oblique Strategies, along with the content of all the cards, exhaustive history and commentary, is documented in a website widely acknowledged as the authoritative source and put together by musician and educator Gregory Alan Taylor.\nThe text of Schmidt's \"The Thoughts Behind the Thoughts\" was published by Mindmade Books in 2012.\nEach card contains a gnomic suggestion, aphorism or remark which can be used to break a deadlock or dilemma situation. A few are specific to music composition; others are more general. These cards evolved from separate observations of the principles underlying what we were doing. Sometimes they were recognised in retrospect (intellect catching up with intuition), sometimes they were identified as they were happening, sometimes they were formulated.\nThey can be used as a pack, or by drawing a single card from the shuffled pack when a dilemma occurs in a working situation. In this case the card is trusted even if its appropriateness is quite unclear...\nReferences to Oblique Strategies exist in popular culture, notably in the film Slacker, in which a character offers passers-by cards from a deck. Strategies mentioned include \"Honor thy error as a hidden intention\", \"Look closely at the most embarrassing details and amplify\", \"Not building a wall; making a brick\", \"Repetition is a form of change\", and one which came to be seen as a summary of the film's ethos (though it was not part of the official set of Oblique Strategies), \"Withdrawing in disgust is not the same thing as apathy.\" This line was quoted in the 1994 song \"What's the Frequency, Kenneth?\" by R.E.M., who also mentioned Oblique Strategies in their 1998 song \"Diminished\" from the album Up. The Oblique Strategies are also referenced in comic 1018, \"Oblique Angles\", of popular web comic Questionable Content.Other musicians inspired by Oblique Strategies include the British band Coldplay, said to have used the cards when recording their 2008 Brian Eno-produced album Viva la Vida or Death and All His Friends and French band Phoenix, who used the cards when recording their 2009 album Wolfgang Amadeus Phoenix. German musician/composer Blixa Bargeld has a similar navigation system, called Dave. In response to their song \"Brian Eno\", from their album Congratulations, MGMT has said they had a deck of Oblique Strategies in the studio, but they \"don't know if [they] used them correctly.\" The band Bauhaus have used the cards for the composition of their songs. The B-52's used them in the studio when recording their first album.\nThey were most famously used by Eno during the recording of David Bowie's Berlin triptych of albums (Low, \"Heroes\", Lodger). Stories suggest they were used during the recording of instrumentals on \"Heroes\" such as \"Sense of Doubt\" and were used more extensively on Lodger (\"Fantastic Voyage\", \"Boys Keep Swinging\", \"Red Money\"). They were used again on Bowie's 1995 album Outside, which Eno was involved with as a writer, producer and musician. Carlos Alomar, who worked with Eno and Bowie on all these albums, was a fan of using the cards, later saying \"at the Center for Performing Arts at the Stevens Institute of Technology, where I teach, on the wall are Brian Eno’s Oblique Strategies cards. And when my students get a mental block, I immediately direct them to that wall.\"\nThe Oblique Strategies cards deck is featured in Italian comics artist Igort's work Japanese Notebooks: A Journey to the Empire of Signs (Chronicle Books, 2017; original Italian edition: Quaderni giapponesi. Un viaggio nell'impero dei segni, Cononino Press, 2015).\nThe football club A.S. Velasca used the Oblique Strategies during an official football match. These Football Times referred to the club, founded by French visual artist Wolfgang Natlacen, by the german word Gesamtkunstwerk, which means \"total work of art.\"\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_8" +} \ No newline at end of file diff --git a/test/Human_behavior/Regifting.json b/test/Human_behavior/Regifting.json new file mode 100644 index 0000000000000000000000000000000000000000..ff7ce1f5395e493018ba4def8b7d55716a7a13da --- /dev/null +++ b/test/Human_behavior/Regifting.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Regifting or regiving is the act of taking a gift that has been received and giving it to somebody else, sometimes in the guise of a new gift.\nRegifting differs from straightforward giving in that goods are not acquired specifically for donation. Typically, goods that have been received as a gift are offered to others, unbeknown to them that it was originally a gift to the person offering it. Often the motives are principally charitable but also includes giving items which are surplus to one's needs. However, regifting also refers to the act of giving away unwanted gifts as a way of disposing them.Regiving differs from recycling in that recycling is most often associated with breaking components down and rebuilding into new products.\nThe term was popularized by a 1995 episode of the NBC sitcom Seinfeld (\"The Label Maker\"), although the practice pre-dates the term considerably. In the episode, the character Elaine calls Dr. Tim Whatley a \"regifter\" after he gives Jerry Seinfeld a label maker that was originally given to Whatley by Elaine. (Whatley later reveals to Elaine that the label maker was faulty, which gave him the excuse to give the item away.)Another variant introduced in Seinfeld is degifting (see Indian giver), which refers to the act of demanding a gift back from the receiver.\nSeveral rules of etiquette are proposed in popular media regarding regifting; they include rewrapping the gift, not using the gift before regifting it, and not giving the gift back to the original gift-giver.Regifting has become a popular addition to many white elephant gift exchanges or yankee swap events. There are no rules that specifically prohibit or encourage the practice of regifting at these parties, but generally the host of the party suggests regifting if it is an option. However, if the host suggests a spending limit for the party, it is generally poor etiquette to regift in lieu of making a purchase. The online variations of these exchanges eliminate this situation through their online purchasing requirements. One example of a formalization of this activity are the white elephant gift exchanges, in which items can be regifted from year to year.\nA variant of regifting was mentioned as one of Oprah's Favorite Things during the recession-themed 2008 episode.\nA Fairleigh Dickinson University PublicMind Poll in December 2010 showed that regifting was commonplace. Burçak Ertimur, one of the investigators in the study, and a professor of marketing at FDU, said “The popularity of regifting is driven by many things for different people. For some, it’s thrift in difficult economic times, or it’s a way to get around annoyingly high expectations about gift-giving. It’s also awareness of, or guilt over, how much stuff goes into the landfill. But the main reason might be just the sheer volume of stuff we have,” she said.\nRegifting has recently become more acceptable when it was adopted by environmentally and budgetary conscious people that encourage the green gifting concept.\nIn the US, National Regifting Day is December 18, created by a debt-counselling group called Money Management International. Many office holiday parties are held on this day, and research shows that 40% of office party gifts are regifted without use. On October 24, 2008, the Governor of Colorado, Bill Ritter Jr., declared December 18, 2008, \"National Regifting Day\". In Canada, eBay marketed \"National Re-gifting Week\" as December 26:30, after Christmas.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_9" +} \ No newline at end of file diff --git a/test/Human_behavior/Stockholm_syndrome.json b/test/Human_behavior/Stockholm_syndrome.json new file mode 100644 index 0000000000000000000000000000000000000000..7405209f5b489b10c4c8a9576c38720d1df1e607 --- /dev/null +++ b/test/Human_behavior/Stockholm_syndrome.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Stockholm syndrome is a proposed condition or theory that tries to explain why hostages sometimes develop a psychological bond with their captors.\nStockholm syndrome is a \"contested illness\" due to doubts about the legitimacy of the condition. \nEmotional bonds can possibly form between captors and captives, during intimate time together, but these are considered irrational by some in light of the danger or risk endured by the victims. Stockholm syndrome has never been included in the Diagnostic and Statistical Manual of Mental Disorders (DSM), the standard tool for diagnosis of psychiatric illnesses and disorders in the United States, mainly due to the lack of a consistent body of academic research.\nIn 1973, Jan-Erik Olsson, a convict on parole, took four employees (three women and one man) of Kreditbanken, one of the largest banks in Stockholm, Sweden, hostage during a failed bank robbery. He negotiated the release from prison of his friend Clark Olofsson to assist him. They held the hostages captive for six days (23:28 August) in one of the bank's vaults. When the hostages were released, none of them would testify against either captor in court; instead, they began raising money for their defense.Nils Bejerot, a Swedish criminologist and psychiatrist, invented the term after the Stockholm police asked him for assistance with analyzing the victims' reactions to the 1973 bank robbery and their status as hostages. As the idea of brainwashing was not a new concept, Bejerot, speaking on \"a news cast after the captives' release\", described the hostages' reactions as a result of being brainwashed by their captors. He called it Norrmalmstorgssyndromet (after Norrmalmstorg Square where the attempted robbery took place), meaning \"the Norrmalmstorg syndrome\"; it later became known outside Sweden as Stockholm syndrome. It was originally defined by psychiatrist Frank Ochberg to aid the management of hostage situations.\nAccording to accounts by Kristin Enmark, one of the hostages, the police were acting incompetently, with little care for the hostages' safety. This forced the hostages to negotiate for their lives and releases with the robbers on their own. In the process, the hostages saw the robbers behaving more rationally than the police negotiators and subsequently developed a deep distrust towards the latter. Enmark had criticized Bejerot specifically for endangering their lives by behaving aggressively and agitating the captors. She had criticized the police for pointing guns at the convicts while the hostages were in the line of fire, and she had told news outlets that one of the captors tried to protect the hostages from being caught in the crossfire. She was also critical of prime minister Olof Palme, as she had negotiated with the captors for freedom, but the prime minister told her that she would have to content herself with dying at her post rather than Palme giving in to the captors' demands. Ultimately, Enmark explained she was more afraid of the police, whose attitude seemed to be a much larger, direct threat to her life than the robbers.\nOlsson later said in an interview that he could have easily killed the hostages in the beginning, but over time it became more difficult, as he developed an emotional bond with them:\nIt was the hostages' fault. They did everything I told them to. If they hadn't, I might not be here now. Why didn't any of them attack me? They made it hard to kill. They made us go on living together day after day, like goats, in that filth. There was nothing to do but get to know each other.\nPatty Hearst, the granddaughter of publisher William Randolph Hearst, was taken and held hostage by the Symbionese Liberation Army, \"an urban guerrilla group\", in 1974. She was recorded denouncing her family as well as the police using her new name, \"Tania\", and was later seen working with the SLA to rob banks in San Francisco. She publicly asserted her \"sympathetic feelings\" toward the SLA and their pursuits as well. After her 1975 arrest, pleading Stockholm syndrome (although the term was not used then, due to the recency of the event) did not work as a proper defense in court, much to the chagrin of her defense lawyer F. Lee Bailey. Her seven-year prison sentence was later commuted, and she was eventually pardoned by President Bill Clinton, who was informed that she was not acting by her own free will.An inversion of Stockholm syndrome, termed Lima syndrome, has been proposed, in which abductors develop sympathy for their hostages. An abductor may also have second thoughts or experience empathy towards their victims. Lima syndrome was named after an abduction at the Japanese embassy in Lima, Peru, in 1996, when members of a militant movement took hostage hundreds of people attending a party at the official residence of Japan's ambassador. Lima syndrome is poorly understood, as the main example for research on this variation came from the Japanese embassy hostage crisis in Lima. Two main factors observed in the evaluation were that spending time with the captives may have strengthened the bonds between the captor and captive, however, this had little basis as the majority of captives were released earlier on. Establishing a friendly rapport with a captor could contribute to a positive bond, as most of the captives in this situation were high-level diplomats who were well-versed in their communication skills.London Syndrome is the opposite of both Stockholm and Lima Syndromes: one or more hostages arouse the kidnappers' antipathy by defying them, trying to escape or, in the case of a political kidnapping, arguing with them, disqualifying their ideology. These hostages end up being executed by their captors at the first opportunity.The name London Syndrome comes from the 1980 siege of the Iranian Embassy in London, in which 26 hostages were taken. During the siege, one of the hostages repeatedly argued with the captors, despite other hostages asking him to keep quiet. After several days of siege, the captors decided to kill one of the hostages to force compliance with their demands. So they chose the argumentative hostage, shooting him and then throwing his body out into the street. This prompted a special forces attack, during which they rescued all but one of the remaining hostages and killed five of the six hostage-takers.\nVictims of the formal definition of Stockholm syndrome develop \"positive feelings toward their captors and sympathy for their causes and goals, and negative feelings toward the police or authorities\". These symptoms often follow escaped victims back into their previously ordinary lives.Stockholm syndrome is paradoxical because the sympathetic sentiments that captives feel towards their captors are the opposite of the fear and disdain which an onlooker might feel towards the captors.\nThere are four key components that characterize Stockholm syndrome:\nA hostage's development of positive feelings towards the captor.\nNo previous relationship between hostage and captor.\nA refusal by hostages to cooperate with police and other government authorities.\nA hostage's belief in the humanity of the captor, ceasing to perceive them as a threat, when the victim holds the same values as the aggressor.\nRobbins and Anthony, who had historically studied a condition similar to Stockholm syndrome, known as destructive cult disorder, observed in their 1982 study that the 1970s were rich with apprehension surrounding the potential risks of brainwashing. They assert that media attention to brainwashing during this time resulted in the fluid reception of Stockholm syndrome as a psychological condition.A 1999 report by the FBI containing more than 1,200 hostage incidents found that only 8% of kidnapping victims showed signs of Stockholm syndrome. When victims who showed only negative feeling toward the law enforcement personnel are excluded, the percentage decreases to 5%. A survey of 600 police agencies in 1989, performed by the FBI and the University of Vermont, found not a single case when emotional involvement between the victim and the kidnapper interfered with or jeopardized an assault. In short, this database provides empirical support that the Stockholm syndrome remains a rare occurrence. The sensational nature of dramatic cases causes the public to perceive this phenomenon as the rule rather than the exception. The bulletin concludes that, although depicted in fiction and movies and often referred to by the news media, the phenomenon actually occurs rarely. Therefore, crisis negotiators should place the Stockholm syndrome in proper perspective.A research group led by Namnyak has found that although there is vast media coverage of Stockholm syndrome, there has not been much research into the phenomenon. What little research has been done is often contradictory and does not always agree on what Stockholm syndrome is. The term has grown beyond kidnappings to all definitions of abuse. It stated that there is no clear definition of symptoms to diagnose the syndrome.The DSM-5 is widely used as the \"classification system for psychological disorders\" by the American Psychiatric Association. Stockholm syndrome has not historically appeared in the manual, as many believe it falls under trauma bonding or post-traumatic stress disorder (PTSD) and there is no consensus about the correct clarification. In addition, there is no extensive body of research or consensus to help solve the argument, although before the fifth edition (DSM 5) was released, Stockholm syndrome was under consideration to be included under 'Disorders of Extreme Stress, Not Otherwise Specified'.At Dignity Conference 2015, Dr. Allan Wade presented The myth of \"Stockholm Syndrome\" (and other concepts invented to discredit women victims of violence) after interviewing Kristin Enmark. In this presentation he posits that \"Stockholm Syndrome\" and related ideas such as \"traumatic bonding\", \"learned helplessness\", \"battered women's syndrome\", \"internalized oppression\", and \"identification with the aggressor/oppressor\" shift the focus away from actual events in context to invented pathologies in the minds of victims, particularly women. \"Stockholm syndrome\" can be seen as one of many concepts used to silence individuals who, as victims, speak publicly about negative social (i.e., institutional) responses.In her 2019 treatise on domestic violence See What You Made Me Do, Australian journalist Jess Hill described the syndrome as a \"dubious pathology with no diagnostic criteria\", and stated that it is \"riddled with misogyny and founded on a lie\"; she also noted that a 2008 literature review revealed \"most diagnoses [of Stockholm syndrome] are made by the media, not by psychologists or psychiatrists.\" In particular, Hill's analysis revealed that Stockholm authorities : under direct guidance from Bejerot : responded to the robbery in a way that put the hostages at greater risk from the police than from their captors (hostage Kristin Enmark, who during the siege was granted a telephone call with Swedish Prime Minister Olof Palme, reported that Palme told her that the government would not negotiate with criminals, and that \"you will have to content yourself that you will have died at your post\"); as well, she observed that not only was Bejerot's diagnosis of Enmark made without ever having spoken to her, it was in direct response to her public criticism of his actions during the siege.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_10" +} \ No newline at end of file diff --git a/test/Human_behavior/Tears.json b/test/Human_behavior/Tears.json new file mode 100644 index 0000000000000000000000000000000000000000..d42fdeee70f3fc01f0190207763ef63eeb0aabfd --- /dev/null +++ b/test/Human_behavior/Tears.json @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Tears are a clear liquid secreted by the lacrimal glands (tear gland) found in the eyes of all land mammals. Tears are made up of water, electrolytes, proteins, lipids, and mucins that form layers on the surface of eyes. The different types of tears—basal, reflex, and emotional—vary significantly in composition. \n The functions of tears include lubricating the eyes (basal tears), removing irritants (reflex tears), and also aiding the immune system. Tears also occur as a part of the body's natural pain response. Emotional secretion of tears may serve a biological function by excreting stress-inducing hormones built up through times of emotional distress. Tears have symbolic significance among humans.\nTears are made up of three layers: lipid, aqueous, and mucous. Tears are composed of water, salts, antibodies, and lysozymes (antibacterial enzymes); though composition varies among different tear types. The composition of tears caused by an emotional reaction differs from that of tears as a reaction to irritants, such as onion fumes, dust, or allergens. Emotional tears contain higher concentrations of stress hormones such as adrenocorticotropic hormone and leucine enkephalin (a natural pain killer), which suggests that emotional tears play a biological role in balancing stress hormone levels.The lacrimal glands secrete lacrimal fluid, which flows through the main excretory ducts into the space between the eyeball and the lids. When the eyes blink, the lacrimal fluid is spread across the surface of the eye. Lacrimal fluid gathers in the lacrimal lake which is found in the medial part of the eye. The lacrimal papilla is an elevation in the inner side of the eyelid, at the edge of the lacrimal lake. The lacrimal canaliculi open into the papilla. The opening of each canaliculus is the lacrimal punctum. From the punctum, tears will enter the lacrimal sac, then on to the nasolacrimal duct, and finally into the nasal cavity. An excess of tears, as caused by strong emotion, can cause the nose to run. Quality of vision is affected by the stability of the tear film.There are three basic types of tears: basal, reflex and emotional.Some mammals, such as cats, camels, polar bears, seals and aardvarks, have a full translucent third eyelid called a nictitating membrane, while others have a vestigial nictitating membrane. The membrane works to protect and moisten the eyelid while maintaining visibility. It also contributes to the aqueous portion of the tear film and possibly immunoglobulins. Humans and some primates have a much smaller nictitating membrane; this may be because they do not capture prey or root vegetation with their teeth, so that there is no evolutionary advantage of the third eyelid.The trigeminal V1 (fifth cranial) nerve bears the sensory pathway of the tear reflexes. When the trigeminal nerve is cut, tears from reflexes will stop, while emotional tears will not. The great (superficial) petrosal nerve from cranial nerve VII provides autonomic innervation to the lacrimal gland. It is responsible for the production of much of the aqueous portion of the tear film.In nearly all human cultures, crying is associated with tears trickling down the cheeks and accompanied by characteristic sobbing sounds. Emotional triggers are most often sadness and grief, but crying can also be triggered by anger, happiness, fear, laughter or humor, frustration, remorse, or other strong, intense emotions. Emotional tears can also be triggered by listening to music or by reading, watching or listening to various forms of media. Crying is often associated with babies and children. Some cultures consider crying to be undignified and infantile, casting aspersions on those who cry publicly, except if it is due to the death of a close friend or relative. In most Western cultures, it is more socially acceptable for women and children to cry than men, reflecting masculine sex-role stereotypes. In some Latin regions, crying among men is more acceptable. There is evidence for an interpersonal function of crying as tears express a need for help and foster willingness to help in an observer.Some modern psychotherapy movements such as Re-evaluation Counseling encourage crying as beneficial to health and mental well-being. An insincere display of grief or dishonest remorse is sometimes called crocodile tears in reference to an Ancient Greek anecdote that crocodiles would pretend to weep while luring or devouring their prey. In addition, \"crocodile tears syndrome\" is a colloquialism for Bogorad's syndrome, an uncommon consequence of recovery from Bell's palsy in which faulty regeneration of the facial nerve causes people to shed tears while eating.\nBogorad's syndrome, also known as \"Crocodile Tears Syndrome\", is an uncommon consequence of nerve regeneration subsequent to Bell's palsy or other damage to the facial nerve. Efferent fibers from the superior salivary nucleus become improperly connected to nerve axons projecting to the lacrimal glands, causing one to shed tears (lacrimate) on the side of the palsy during salivation while smelling foods or eating. It is presumed that this would cause salivation while crying due to the inverse improper connection of the lacrimal nucleus to the salivary glands, but this would be less noticeable. The condition was first described in 1926 by its namesake, Russian neuropathologist F. A. Bogorad, in an article titled \"Syndrome of the Crocodile Tears\" (alternatively, \"The Symptom of the Crocodile Tears\") that argued the tears were caused by the act of salivation.Keratoconjunctivitis sicca, known in the vernacular as dry eye, is a very common disorder of the tear film. Despite the eyes being dry, those affected can still experience watering of the eyes, which is, in fact, a response to irritation caused by the original tear film deficiency. Lack of Meibomian gland secretion can mean that the tears are not enveloped in a hydrophobic film coat, leading to tears spilling onto the face.Treatment for dry eyes to compensate for the loss of tear film include eye-drops composed of methyl cellulose or carboxy- methyl cellulose or hemi-cellulose in strengths of either 0.5% or 1% depending upon the severity of drying up of the cornea.\nFamilial dysautonomia is a genetic condition that can be associated with a lack of overflow tears (Alacrima) during emotional crying.Obstruction of the punctum, nasolacrimal canal, or nasolacrimal duct can cause even normal levels of the basal tear to overflow onto the face (Epiphora), giving the appearance of constant psychic tearing. This can have significant social consequences.\nPseudobulbar affect (PBA) is a condition involving episodic uncontrollable laughter or crying. PBA mostly occurs in people with neurological injuries affecting how the brain controls emotions. Scientists believe PBA results from prefrontal cortex damage. PBA often involves crying. Hence, PBA is mistakable for depression. But PBA is neurological; depression is psychological. Patients with PBA do not experience typical depression symptoms like sleep disturbances or appetite loss.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_11" +} \ No newline at end of file diff --git "a/test/Human_behavior/Work\342\200\223family_conflict.json" "b/test/Human_behavior/Work\342\200\223family_conflict.json" new file mode 100644 index 0000000000000000000000000000000000000000..6b965b3e8184f48cda579ec691236d255d9a535f --- /dev/null +++ "b/test/Human_behavior/Work\342\200\223family_conflict.json" @@ -0,0 +1,50 @@ +{ + "domain": "Human_behavior", + "document": "Work:family conflict occurs when an individual experiences incompatible demands between work and family roles, causing participation in both roles to become more difficult. This imbalance creates conflict at the work-life interface. It is important for organizations and individuals to understand the implications linked to work-family conflict. In certain cases, work:family conflict has been associated with increased occupational burnout, job stress, decreased health, and issues pertaining to organizational commitment and job performance.\nWork:family conflict was first studied in the late 19th century. During this time period, work and income moved from inside the home (agricultural work) to outside the home (factories). Industrialization challenged the current relationship between working and family.Boundary theory and border theory are the foundations used to study work-family conflict. Boundary theory divides social life into two interdependent sections, work and family. Individuals have different roles and responsibilities in each section. Since the sections are interdependent, two roles cannot take place at the same time. Individuals have to participate in role transformation between expectations of the workplace and expected roles within the family structure.\nBorder theory expands this by considering the influences each section has on the other. Border theory attempts to pin down ways to manage conflict and achieve balance between conflicting identities. Individuals may choose to treat these segments separately, moving back and forth between work and family roles (displaying boundary theory) or can decide to integrate the segments with hopes of finding balance.\nConflict between work and family is bi-directional. There is a distinction between what is termed work-to-family conflict and what is termed family-to-work conflict.Work-to-family conflict occurs when experiences and commitments at work interfere with family life, such as extensive, irregular, or inflexible work hours, work overload and other forms of job stress, interpersonal conflict at work, extensive travel, career transitions, or an unsupportive supervisor or organization. For example, an unexpected meeting late in the day may prevent a parent from picking up his or her child from school.\nFamily-to-work conflict occurs when experiences and commitments in the family interfere with work life, such as the presence of young children, primary responsibility for children, elder care responsibilities, interpersonal conflict within the family unit, or unsupportive family members. For example, a parent may need to take time off from work in order to take care of a sick child, or to witness a tournament or performance of a child. Family-to-work conflict is perceived to result in lower work productivity of employees.\nWithin work-to-family conflict and family-to-work conflict, three subtypes of conflict have been identified: time-based, strain-based, and behavior-based. Time-based conflict entails competing time requirements across work and family roles, strain-based conflict entails pressures in one role impairing performance in the second role, and behavior-based conflict entails an incompatibility of behaviors necessary for the two roles.\nAlthough work interface with family (WIF) and family interface with work (FIW) are strongly correlated, more attention has been directed toward WIF. Research, largely attributed to the idea Ariel Russel Hochschild termed the \"ideal worker\", depicts the inelastic nature of work roles and responsibilities. The expectations employers hold of an \"ideal worker\" already rest on unrealistic assumptions about how the family should operate. Many employers expect that employees with families have someone tending to everything at home, leaving the worker unencumbered. Despite the fact that a majority of families in the U.S. are dual earning, the image of the \"ideal worker\" persists, presenting work-family conflict.\nWorkaholism correlates with experiences of work-to-family conflict, since one's priority of work may interfere with family commitments. In its simplest form, workaholism is said to be a substantial investment in one's work. One who is said to be involved in the act of workaholism can be labeled as a workaholic. Workaholism is said to be multifaceted and multi-directional. The flexibility and satisfaction within one's job has an impact on an employee's happiness and satisfaction in the home and vice versa. An overabundance of work has been said to take priority over everyone and everything else in the lives of those infatuated with work. Excessive work prevents one from forming and maintaining intimate relationships and close friendships. Workaholics are known to spend a vast amount of time in work-related activities, which then results in the sacrifice of crucial family, social, and recreational activities. Marital problems, trouble with maintaining close relationships, and isolation from friends and family are the common issues related to workaholism and those involved.In most recent years, employers have become more aware of the strain and stress that work can place on an employee. Companies have since started seeing their employees not only as workers, but also as people with personal and home lives. Implementation of family-responsive human resource practices and policies that promote work-family balance have become a reality as a way to reduce stress in both environments.\nWith the struggles of work-family conflict, options are necessary to provide a solution for these problems. Loehr and Schwartz compare the extreme demands experienced by an individual in the workplace to that of a professional athlete. In both scenarios energy expenditure (stress) is experienced. Without recovery (oscillation) both cannot perform to their greatest ability, eventually leading to chronic stress, burnout, and fatigue. Persist stress without oscillation and the result will be permanent damage.Creating an environment that values oscillation, for instance encouraging 15-minute walk breaks throughout the workday or offering corporate gym memberships, can improve employee cognition, energy, focus, and emotional intelligence. Companies, along with their bottom line and employees, win when mental and physical health are treated as equally important to cognitive capabilities. In order to gain competitive advantage, organizations are attempting to be portrayed as work:life balance:supportive employers. Companies that value employee work:life balance are able to attract and retain satisfied employees, improve worker performance, and boost employee morale and organization identification.\nWork:family conflict can be diminished by establishing family-friendly policies in the workplace. Some of these policies include maternity, paternity, parental, sick leaves, and health care insurance. Organizations may provide child care options either as an on-site child care center at the business, references to close child care centers, or supplemented child care incomes for the families placing their children in a child care center.\nWith advances in technology, individuals who work outside the home and have intense schedules are finding ways to keep in touch with their families when they cannot physically be together. \"Technology has provided a bit of an upper hand, allowing them unprecedented control and creativity in maneuvering the tenuous balance between work and family\" (Temple, 2009). Organizations are now able to implement remote work policies and provide more flextime.\nThe role of gender is a large factor in work-family conflict because one's gender may determine their role in the home or work place. Female representation in the workplace is a direct result of power operating covertly through ideological controls. This is illustrated by the basic assumption of an \"ideal worker.\" Many organizations view the ideal worker as one who is \"committed to their work above all else\". Ideal workers are those that complete tasks beyond their formal and assigned behaviors, seen as a positive and valuable attribute to the organization. Individuals having to divide their time (and their commitments) between family and work are perceived as less dedicated to the organization. A manager's perception of a subordinate's role and commitment to the organization is positively associated with the individual's promotability.Manager expectations of an ideal worker are often placed on female workers. Since female workers are both part of the workforce and have significant responsibilities at home, they experience a greater bearing of work-life conflict. Families in Germany with at least one child under the age of 13 and both parents in the labor force in 2018 saw moms devote nearly three times as much time to child care than fathers did. A new study suggested that women tend to face more work-family conflict than men because women have lower control over work and schedules than men. Female employees, who managers perceive to be juggling work and family commitments, were presumed to be less committed to the organization, therefore not worthy of advancement. Women in the workforce may be \"inaccurately perceived to have less commitment to their organizations than their counterparts. Their advancement in organizations may be unfairly obstructed\". Males are perceived to be extremely dedicated to their organization because they experience lower levels of work-family conflict.\nA male individual may be unmarried and have no thought as to what \"typical\" family responsibilities entail because they simply have not had the experience. The male may be married, but his wife, due to the demands of the husband's position, has remained at home, tending solely to the house and children and experiencing the \"typical\" family responsibilities. Since the wife is the one who stays home and tends to the children, the husband is more present in the workforce, representing the higher percentage of males at the top of the organization hierarchy. Ironically, these are the individuals creating and reforming workplace policies.\nThe motherhood penalty is a term sociologists use when arguing that in the workplace working mothers encounter systematic disadvantages in pay, perceived competence, and benefits relative to childless women. In their place of work, women may suffer a per-child wage penalty, leading to a pay gap between mothers and non-mothers that is larger than the gap between men and women. Not only do working mothers have the burden of balancing work and home life, but they also have to prove they are as dedicated as other employees. Mothers tend to suffer less favorable job-site evaluations compared to non-mothers, stating that mothers are much less committed to their jobs, less authoritative, and less dependable than non-mothers. Hence, mothers may experience discrimination is terms of pay, hiring, and day-to-day job experience.\nThe way in which companies have shaped the \"ideal worker\" does not complement the family lifestyle, nor does it accommodate it. Long hours and near complete devotion to the profession make it difficult for working mothers to participate in, or get ahead in the workplace while maintaining a home and family.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ApprovedBy", + "ContributedToCreativeWork", + "UsedBy", + "IssuedBy", + "Affiliation", + "StatedIn", + "HasQuality", + "Contains", + "Studies", + "Causes", + "HasCause", + "HasEffect", + "BasedOn", + "PublishedIn", + "LocatedInTheAdministrativeTerritorialEntity" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Human_behavior_12" +} \ No newline at end of file diff --git a/test/Humanities/Bells_on_Sunday.json b/test/Humanities/Bells_on_Sunday.json new file mode 100644 index 0000000000000000000000000000000000000000..8477e465c5f2a80f6931411ece6d699d87e0e71f --- /dev/null +++ b/test/Humanities/Bells_on_Sunday.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Bells on Sunday is a short radio programme transmitted on BBC Radio 4. It currently airs at approximately 5 AM every Sunday, and is repeated at 12 AM the following Monday, and features bell ringers ringing the changes. The recordings come from a different church tower within the United Kingdom each week as well as from other parts of the world where full circle change ringing takes place.\nNew recordings can be submitted for inclusion in the programme by ringers. This is done by sending the recording to an official liaison, a volunteer bell ringer, who checks the quality of the recording, authors the accompanying draft presentation notes, submits the recordings to the BBC producers and generally liaises with the BBC.\nFor many years the liaison was Michael Orme of Congleton however in recent years (since 2018) this role has been taken up by his son Phillip Orme (of Cambridge Great St Mary's and also the Norman Tower Bury St. Edmunds).\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_0" +} \ No newline at end of file diff --git a/test/Humanities/Book_desert.json b/test/Humanities/Book_desert.json new file mode 100644 index 0000000000000000000000000000000000000000..874425ada5b089784db763a0f2ff56f27bbcd5a2 --- /dev/null +++ b/test/Humanities/Book_desert.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "A book desert is a geographic area (country, state, county, city, neighborhood, home) where printed books and other reading material are relatively hard to obtain, particularly without access to an automobile or other form of transportation. Some researchers have defined book deserts by linking them to poverty and low income, while others use a combination of factors that include census data, income, ethnicity, geography, language, and the number of books in a home.\nThe term \"book desert\" came into regular use in the mid-2010s when the social enterprise Unite for Literacy, coined the term. \nUnite for Literacy suggests that planting and growing “Book Gardens” is one way to eradicate book deserts. Initiatives that increase the availability of books by such measures as bookmobiles and librarians on bicycles have been offered as possible solutions to book deserts, as have Little Free Libraries and offering children's literature available online, free of charge.\nIn the past, researchers have studied how the absence or scarcity of books impact how a child's early literacy and language skills develop. Unite for Literacy created an operational definition of a book desert when they published the U.S. Book Desert Map: A geographic area (country, state, county, census tract) where it is predicted that a majority of homes have less than 100 printed books. In March 2014, James LaRue, director of the American Library Association's Office for Intellectual Freedom and the Freedom to Read Foundation, used the term in an issue of American Libraries, where he described the term as applying to houses with 25 or fewer books in them and discussed ways to lessen or eradicate the problem.In July 2016, professors Susan B. Neuman and Naomi Moland published a study in Urban Education, where they examined how the lack of printed reading material among low-income and poverty stricken neighborhoods impacts early childhood development and used the term to describe areas and homes with little access to written materials. This study built upon other research Neuman had conducted in 2001. The researchers found few stores in Detroit, Los Angeles, and Washington, D.C.. The focus areas of their research was print resources for children ages 0 to 18. Of those stores, many were dollar stores. \nIn 2016, The Atlantic reported that in 2015, Neuman and JetBlue Airways held an experiment to foster literacy, by providing book vending machines in a low-income Washington D.C. neighborhood. Over 20,000 books were given away, prompting Neuman to conclude that the neighborhood's parents did care about their children's education, but lacked \"the resources to enable their children to be successful.\"\nMultiple factors are credited as contributing to the formation of book deserts, the most frequently highlighted of which tends to be poverty and low income. Other factors tend to include language and geography, as some areas lack access to bookstores or public or community school libraries that would provide books. Book store closures due to bankruptcy or other financial difficulties are also occasionally cited as a contributing factor, when the closure leaves the area without a bookseller.Unite for Literacy developed a book desert map of the United States powered by Esri's ArcGIS platform, which provides a visual presentation of the lack of books in the nation, states, counties and census tracts. To create the map, Unite for Literacy performed a statistical analyses of data from National Assessment of Educational Progress (NAEP) and the U.S. Census Bureau American Community Survey, including the number of books in 4th graders' homes, average community income, ethnic diversity, geographic location and home language. Unite for Literacy unveiled the map during the Clinton Global Initiative America (CGI America) meeting held in Denver, Colorado, in June 2014.In 2023, Unite for Literacy worked with the Colorado State University Geospatial Centroid to refine the book desert map. The Centroid team compiled and analyzed data from NAEP, the Census Bureau, and Diversity Data Kids, along with survey responses from more than 10,000 participants in the Unite for Literacy’s Growing Readers program. The new map more consistently and accurately identifies how likely households within census tracts are to have an abundance of books when compared to other tracts.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_1" +} \ No newline at end of file diff --git a/test/Humanities/Cretan_Lie.json b/test/Humanities/Cretan_Lie.json new file mode 100644 index 0000000000000000000000000000000000000000..6c5538bff7b5fdd041dca1701d1e7dadf52c08f0 --- /dev/null +++ b/test/Humanities/Cretan_Lie.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "The Cretan Lie refers to an episode within the Odyssey in which Odysseus relays a fabricated story of his exploits against Egypt to the loyal swine herd, Eumaeus. This story has been subjected to much inquiry in the field of the history and archaeology of the end of the Late Bronze Age.\nIn his story, Odysseus cannot return to Crete following the Trojan War and, by divine provocation, is forced to launch an expedition against the Egyptians. Odysseus's fleet is routed due to Zeus's wrath, but the Egyptian king takes pity on Odysseus. Odysseus amasses wealth in Egypt but later loses it in a ship wreck.But a spirit in me urged, 'Set sail for Egypt—\nfit out ships, take crews of seasoned heroes!'\nNine I fitted out, the men joined up at once\nand then six days my shipmates feasted well\nBut swept away by their own reckless fury, the crew went berserk—\nthey promptly began to plunder the lush Egyptian farms,\ndragged off the women and children, killed the men.\nOutcries reached the city in no time—stirred by shouts\n- Homer, Odyssey Book XIV\nThe significance of this story is the topic of much scholarly analysis particularly with its close parallels to the story of the Sea Peoples and the Battle of the Nile as recorded at the mortuary temple of Ramses III at Medinet Habu. Likewise, Ramses II's adoption of invading Sherden into his bodyguard reflects Odysseus's residence and enrichment in Egypt. It is then speculated that Odysseus's lie reflected some historical fact of the Late Bronze Age Collapse from the oral traditions of the Mycenean Greeks.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_2" +} \ No newline at end of file diff --git a/test/Humanities/Development_anthropology.json b/test/Humanities/Development_anthropology.json new file mode 100644 index 0000000000000000000000000000000000000000..7329ec160c2a2e326bcf78f053021a7a842250b6 --- /dev/null +++ b/test/Humanities/Development_anthropology.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Development anthropology refers to the application of anthropological perspectives to the multidisciplinary branch of development studies. It takes international development and international aid as primary objects. In this branch of anthropology, the term development refers to the social action made by different agents (e.g. institutions, businesses, states, or independent volunteers) who are trying to modify the economic, technical, political, or/and social life of a given place in the world, especially in impoverished, formerly colonized regions.\nDevelopment anthropologists share a commitment to simultaneously critique and contribute to projects and institutions that create and administer Western projects that seek to improve the economic well-being of the most marginalized, and to eliminate poverty. While some theorists distinguish between the anthropology of development (in which development is the object of study) and development anthropology (as an applied practice), this distinction is increasingly thought of as obsolete. With researches on the field, the anthropologist can describe, analyze, and understand the different actions of development that took and take place in a given place. The various impacts on the local population, environment, society, and economy are to be examined.\nIn 1971, Glynn Cochrane proposed development anthropology as a new field for practitioners interested in a career outside academia. Given the growing complexity of development assistance, Cochrane suggested that graduates needed to prepare themselves to work in interdisciplinary settings. In 1973, Cochrane was invited by the World Bank to make recommendations for the use of anthropology, and his report (which stressed the need for the systematic treatment of social issues) laid a foundation for future use of the discipline in the World Bank Group. Around ninety anthropologists are now employed by the World Bank Group in various roles.In 1974, Bob Berg—of the United States Agency for International Development (USAID)—and Cochrane worked together, and, as a result, USAID introduced \"social soundness analysis\" as a project preparation requirement. This innovation led to the employment of more than seventy anthropologists. Social soundness analysis has now been in USAID use for over forty years. USAID ran an in-house development studies course in the 1970s, through which several hundred field personnel eventually passed. In addition to anthropology, the course covered development economics, regional and national planning, and institution building.\nIn the late 1970s, Thayer Scudder, Michael Horowitz, and David Brokensha established an Institute for Development Anthropology at the State University of New York at Binghamton. This institute has played an influential role in the continuing expansion of this branch of the discipline.\nBy the 1980s and 1990s, development anthropology began to be more widely used in the private sector. Corporate social responsibility and issues ranging from resettlement and human rights to micro-enterprise are now routinely addressed by systematic social assessment as an integral part of investment appraisal.\nCriticism of Western development became an important goal in the late 1980s, after the wake of severe economic crisis brought disease, poverty, and starvation to countries and sectors that were the focus of large Western structural adjustment development projects throughout Latin America, Africa, and other parts of the former colonial world. Despite the failure of many of these development projects, and some 40 years of post World War II funding from the US and Europe, scholars know that development has been the key way that Western post-industrialized countries intervene in non-Western society. Development criticism seeks to discover why, given the funds and best intentions of volunteers and policy makers, do the majority of development projects continue to fail to (1) redistribute economic power and resources in a way that helps the poorest sectors of society, and (2) to create economic growth that is sustainable in the country.Anthropologists who study development projects themselves have criticized the fundamental structure of Western development projects coming from such institutions as USAID and bilateral lenders such as the World Bank. Because they are often working from the perspective of the objects of development in the non-Western world, rather than from within the aid institutions, anthropologists encountering such projects have a unique perspective from which to see the problems. Anthropologists write with concern about the ways that non-Western objects of aid have been left out of the widespread drive to develop after World War II, especially in the ways that such projects limit solutions to poverty in the form of narrow Western capitalist models that promote exploitation and the destruction of household farms, or, more suspiciously, naturalise inequality between Western post-industrialized countries and former colonial subjects.\nSome describe the anthropological critique of development as one that pits modernization and an eradication of the indigenous culture, but this is too reductive and not the case with the majority of scholarly work. In fact, most anthropologists who work in impoverished areas desire the same economic relief for the people they study as policymakers; however, they are wary about the assumptions and models on which development interventions are based. Anthropologists and others who critique development projects instead view Western development itself as a product of Western culture that must be refined in order to better help those it claims to aid. The problem therefore is not that of markets driving out culture, but of the fundamental blind-spots of Western developmental culture itself. Criticism often focuses therefore on the cultural bias and blind-spots of Western development institutions, or modernization models that systematically represent non-Western societies as more deficient than the West; erroneously assume that Western modes of production and historical processes are repeatable in all contexts; or that do not take into account hundreds of years of colonial exploitation by the West that has tended to destroy the resources of former colonial society. Most critically, anthropologists argue that sustainable development requires at the very least more involvement of the people who the project aims to target in the project's creation, its management, and its decision-making processes.\nA major critique of development from anthropologists came from Arturo Escobar's seminal book Encountering Development, which argued that Western development largely exploited non-Western peoples and enacted an Orientalism (see Edward Said). Escobar even sees international development as a means for the Occident to keep control over the resources of former colonies. Escobar shows that, between 1945 and 1960, the former colonies were going through the decolonization era, and the development plan helped to maintain the third world's dependency on the old metropole. Development projects themselves flourished in the wake of World War II, and during the Cold War, when they were developed to (1) stop the spread of communism with the spread of capitalist markets, and (2) create more prosperity for the West and its products by creating a global consumer demand for finished Western products abroad. Some scholars blame the different agents for having only considered a small aspect of the local people's lives without analyzing broader consequences, while others like dependency theory or Escobar argue that development projects are doomed to failure for the fundamental ways they privilege Western industry and corporations. Escobar's argument echos the earlier work of dependency theory and follows a larger critique more recently posed by Michel Foucault and other post-structuralists.\nMore recent studies like James Ferguson's The Anti-Politics Machine argue that the ideas and institutional structure that support Western development projects are fundamentally flawed because of the way the West continues to represent the former colonial world. International development uses an \"anti-politics\" that ultimately produces failure, despite the best intentions. Finally, studies also point out how development efforts often attempt to de-politicize change by a focus on instrumental assistance (like a school building) but not on the objective conditions that led to the development failure (e.g., the state's neglect of rural children at the expense of urban elite), nor the content of what the school might or might not teach. In this sense, the critique of international development focuses on the insidious effects of projects that at the least offer band-aids that address symptoms but not causes, and that at the worst promote projects that systematically redirect economic resources and profit to the West.\nWhile anthropological studies critique the Western assumptions and political context of development projects, anthropologists also consult on and work within aid institutions in the creation and implementation of development projects. While economists look at aggregate measures like gross national product and per capita income, as well as measures of income distribution and economic inequality in a society, anthropologists can provide a more fine-grained analysis of the qualitative information behind these numbers, such as the nature of the social groups involved and the social significance of the composition of income. Thus, development anthropologists often deal with assessing the important qualitative aspects of development sometimes ignored by an economic approach.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_3" +} \ No newline at end of file diff --git a/test/Humanities/Digital_Humanities_conference.json b/test/Humanities/Digital_Humanities_conference.json new file mode 100644 index 0000000000000000000000000000000000000000..6206f2bd7a7fa77dc63f7b5bddcd7a9187778492 --- /dev/null +++ b/test/Humanities/Digital_Humanities_conference.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "The Digital Humanities conference is an academic conference for the field of digital humanities. It is hosted by Alliance of Digital Humanities Organizations and has been held annually since 1989.\nThe first joint conference was held in 1989, at the University of Toronto—but that was the 16th annual meeting of ALLC, and the ninth annual meeting of the ACH-sponsored International Conference on Computers and the Humanities (ICCH).The Chronicle of Higher Education has called the conference \"highly competitive\" but \"worth the price of admission,\" praising its participants' focus on best practices, the intellectual community it has fostered, and the tendency of its organizers to sponsor attendance of early-career scholars (important given the relative expense of attending it, as compared to other academic conferences).\nAn analysis of the Digital Humanities conference abstracts between 2004 and 2014 highlights some trends evident in the evolution of the conference (such as the increasing rate of new authors entering the field, and the continuing disproportional predominance of authors from North America represented in the abstracts). An extended study (2000-2015) offer a feminist and critical engagement of Digital Humanities conferences with solutions for a more inclusive culture. Scott B. Weingart has also published detailed analyses of submissions to Digital Humanities 2013, 2014, 2015, and 2016 on his blog.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_4" +} \ No newline at end of file diff --git a/test/Humanities/Eskimology.json b/test/Humanities/Eskimology.json new file mode 100644 index 0000000000000000000000000000000000000000..76582907336dad60eff2ffb1ab97dbe7771dc4a4 --- /dev/null +++ b/test/Humanities/Eskimology.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Eskimology or Inuitology is a complex of humanities and sciences studying the languages, history, literature, folklore, culture, and ethnology of the speakers of Eskimo:Aleut languages and Inuit, Yupik and Aleut (or Unangam), sometimes collectively known as Eskimos, in historical and comparative context. This includes ethnic groups from the Chukchi Peninsula on the far eastern tip of Siberia in Russia, through Alaska of the United States, Canada's Inuit Nunangat, including the Inuvialuit Settlement Region, Nunavut Nunavik and Nunatsiavut, through NunatuKavut (but not the Gulf of St. Lawrence area), to Greenland of Denmark. Originally, an Eskimologist or Inuitologist was primarily a linguist or philologist who researches Eskimo or Inuit languages.\nEskimology traces its beginning to the pioneering work of Hans Egede (1745) and David Crantz (1767) in Greenland. Eskimology has traditionally had a particular focus on Greenland studies owing to the long-standing relationship between Denmark and Greenland established in the early 18th century, and the academic discipline of Eskimology is today centered at the University of Copenhagen. The term \"Eskimology\" was not common until 1967, when a genuine department was established and officially named the Department of Eskimology. From the late 1960s, Eskimology changed its focus toward increasingly contemporary and global political issues. In 2019, the department changed its name to Greenlandic and Arctic Studies Section (a section within the Department of Cross-Cultural and Regional Studies). The Greenlandic and Arctic Studies Section offers full BA and MA programmes. In these programmes, the study of the Greenlandic language and the socio-cultural issues of Greenland / Arctic are central.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_5" +} \ No newline at end of file diff --git a/test/Humanities/GLAM_(cultural_heritage).json b/test/Humanities/GLAM_(cultural_heritage).json new file mode 100644 index 0000000000000000000000000000000000000000..fa048e544d4d13efb5d657205eef3df078691ed0 --- /dev/null +++ b/test/Humanities/GLAM_(cultural_heritage).json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "GLAM is an acronym for galleries, libraries, archives, and museums, and refers to cultural institutions with a mission to provide access to knowledge. GLAMs collect and maintain cultural heritage materials in the public interest. As collecting institutions, GLAMs preserve and make accessible primary sources valuable for researchers.\nVersions of the acronym include GLAMR, which specifies records management, and the earlier form LAM, which did not specify \"galleries\" (whether seen as a subset of museums, or else potentially confused with commercial establishments where art is bought and sold). Another form also is GLAMA, which specifies academia, or alternatively GLEAM (\"Education\").\nAs an abbreviation, LAM has been in use since the 1990s; it emerged as these institutions saw their missions overlapping, creating the need for a wider industry sector grouping. This became apparent as they placed their collections online—artworks, books, documents, and artifacts all effectively becoming \"information resources.\" The work to get GLAM sector collections online is supported by GLAM Peak in Australia and the National Digital Forum in New Zealand.Proponents of greater collaborations argue that the present convergence is actually a return to traditional unity. These institutions share epistemological links dating from the \"Museum\" of Alexandria and continuing through the cabinets of curiosities gathered in early modern Europe. Over time as collections expanded, they became more specialized and their housing was separated according to the form of information and kinds of users. Furthermore, during the nineteenth and twentieth centuries, distinct professional societies and educational programs developed for each kind of institution.\nOpen GLAM (Galleries, Library, Archives, and Museums) is a term that has gained popularity since 2010 to describe an initiative, network and movement that supports exchange and collaboration between cultural institutions supporting open access to their digitised collections. The GLAM-Wiki Initiative helps cultural institutions share their openly licensed resources with the world through collaborative projects with experienced Wikipedia editors. Open GLAM and open data resources from the heritage sector are now frequently used in research, publishing, and programming, particularly in Digital Humanities research and teaching.\nQueer GLAM is an area of focus has emerged within the field, focusing on topics within the discipline that highlight queer experiences. Robert Mills theorizes what the queer museum might look like, using queer theory to conceptualize what this might look like. This practice complicates archiving practices of GLAM institutions and seeks to better represent the queer experience in these institutions. This is in contrast to previous history in GLAMs, which are often characterized as representing heteronormative views.In tandem with this, scholars have been arguing that GLAM institutions need to grapple with their colonial history and the ways this continues to impact their practice today. Work tracing the role of white women in the library highlight this.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_6" +} \ No newline at end of file diff --git a/test/Humanities/Gender_and_politics.json b/test/Humanities/Gender_and_politics.json new file mode 100644 index 0000000000000000000000000000000000000000..07ca32bae4f22895271c54b78e52eefb04e1ef52 --- /dev/null +++ b/test/Humanities/Gender_and_politics.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Gender and politics, also called gender in politics, is a field of study in political science and gender studies that aims to understand the relationship between peoples' genders and phenomena in politics. Researchers of gender and politics study how peoples' political participation and experiences interact with their gender identity, and how ideas of gender shape political institutions and decision-making. Women's political participation in the context of patriarchal political systems is a particular focus of study. Gender and politics is an interdisciplinary field, drawing not just from political science and gender studies but also related fields such as feminist political thought, and peoples' gendered treatment is commonly seen as intersectionally linked to their entire social identity.\nThe study of gender and politics is concerned with how peoples' gender structures their participation in and experience of political events, and how political institutions are encoded with gendered ideas. This study exists in the context that, historically and across countries, gender has been a core determinant of how resources are distributed, how policies are set, and who participates in political decision-making. Because of the breadth covered by the subfield, it spans numerous areas of study in politics such as international relations, comparative politics, political philosophy, and public policy, and it draws from and builds on ideas in feminist political theory like intersectionality and modern conceptions of gender. The study of gender and politics overlaps with the study of how other components of peoples' social identities interact with their political participation and experiences, with researchers particularly emphasizing that the interaction of gender and politics is intersectional and dependent on factors like peoples' race, class, and gender expression.The study of gender and politics may also be referred to as \"gender in politics\", and is closely related to the study of \"women and politics\" or \"women in politics\", which may also be used synecdochically to refer to the connection between gender and politics.\nIn a study conducted by Amy Friesenhahn called At the Intersection of Gender and Party:\nLegislative Freedom, we see how intricate the study of gender and politics is. The study delves into the intricate dynamics of gender and politics, particularly focusing on the behavior of politicians in relation to women-friendly districts. The findings shed light on how district characteristics influence legislative freedom and party defections on women's issue roll-call votes among both Democratic and Republican members of Congress. The study reveals that Democratic women MCs representing moderately women-friendly districts are more likely to defect from party on women’s issue roll-call votes than their partisan counterparts who are men. On the other hand, there are no apparent gender differences in party defection among Republican MCs on women’s issue roll-call votes. However, the Republican women-friendly district effect increases the likelihood of Republicans defecting from party on women’s issues. The research also highlights the importance of district-level demographic characteristics as a conditional explanatory factor for Republican MCs exercising legislative freedom on women’s issues. It suggests that as districts become more women-friendly, Republican MCs, even men, will likely serve as substantive representatives for women’s interests. Moreover, the study acknowledges certain limitations, such as the inability of existing measures to capture the likely success of women candidates of color. Future research is encouraged to delve deeper into intersectionality and the effects of descriptive representation in terms of race and gender, combined with district characteristics, on women’s issue roll-call voting behavior. The study contributes to the ongoing discourse on gender and politics, providing insights into how district characteristics intersect with gender to influence political behavior. It underscores the nuanced nature of political representation and the need to further explore intersectional dynamics within political contexts.\nA central concern in the study of gender and politics is the patriarchal exclusion of women from politics, which is a common but not universal theme historically and across cultures. As the involvement of women in public affairs increased across many societies during the 20th and 21st centuries, academic attention was also increasingly focused on the changing role of women in politics. For example, a common topic in the study of gender and politics is the participation of women as politicians, voters, and activists in a particular country. Since that participation exists in some political context, many scholars of gender and politics also study the political mechanisms that either enable or suppress women's participation in politics; women's social participation may increase or decrease as a result of political institutions, government policies, or social events. Another common topic of study is the impact on women of particular social policies, such as debates over women's rights, reproductive rights, women in government quotas, and policies on violence against women.Gender and politics researchers have also analyzed the position of women in the discipline of political science, which has mirrored the broader societal trend of increasing inclusion and participation of women beginning in the second half of the 20th century.\nGender and politics is the focus of the journals Politics & Gender and the European Journal of Politics and Gender. Gender and politics is also the title of a book series, Gender and Politics, which launched in 2012 and published dozens of volumes over the next several years.There are a number of institutes and centers devoted to the study of gender and politics. The Center for American Women and Politics in the Eagleton Institute of Politics at Rutgers University is dedicated to the study of women's political participation in the United States. Other examples include the Women & Politics Institute at American University, which seeks \"to close the gender gap in political leadership\" by providing relevant academic training to young women, and the Center for Women in Politics and Public Policy at the University of Massachusetts Boston which has a similar mandate.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_7" +} \ No newline at end of file diff --git a/test/Humanities/Nature_writing.json b/test/Humanities/Nature_writing.json new file mode 100644 index 0000000000000000000000000000000000000000..d95bf64499447bbbdb303c71e565e43a7865b383 --- /dev/null +++ b/test/Humanities/Nature_writing.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Nature writing is nonfiction or fiction prose about the natural environment. It often draws heavily from scientific information and facts while also incorporating philosophical reflection upon various aspects of nature. Works are frequently written in the first person and include personal observations. \nNature writing encompasses a wide variety of works, ranging from those that place primary emphasis on natural history (such as field guides) to those focusing on philosophical interpretation. It includes poetry, essays of solitude or escape, as well as travel and adventure writing.\nModern-day nature writing traces its roots to works of natural history that initially gained popularity in the second half of the 18th century, and continued to do so throughout the 19th century. An important early figure in nature writing was the parson-naturalist Gilbert White (1720:1793), a pioneering English naturalist and ornithologist. He is best known for writing Natural History and Antiquities of Selborne (1789). \nWilliam Bartram (1739:1823) was another significant American pioneer naturalist who became a respected figure in literary and scientific communities after his first work was published in 1791.\nThe tradition of clerical naturalists can be traced back to the monastic writings of the Middle Ages, although under modern-day definitions, these writings about animals and plants cannot be correctly classified as natural history. Notable early parson-naturalists were William Turner (1508:1568), John Ray (1627:1705) and William Derham (1657:1735).Gilbert White was an English ecologist, who expressed encouragement towards an increased respect for nature. He said of the earthworm: \"Earthworms, though in appearance a small and despicable link in the chain of nature, yet, if lost, would make a lamentable chasm. [...] worms seem to be the great promoters of vegetation, which would proceed but lamely without them.\" Along with naturalist William Markwick,White collected records of the dates of emergence of more than 400 plant and animal species in Hampshire and Sussex between 1768 and 1793. Their findings were summarized in The Natural History and Antiquities of Selborne, in which they recorded the earliest and latest dates for each event over a 25-year period. The data recorded by White and Markwick are among the earliest examples of modern phenology.\nAmerican botanist, natural historian, and explorer William Bartram traveled extensively in the Americas throughout the late 1700s, observing the native flora and fauna; his work, now known as Bartram's Travels, was published in 1791. Ephraim George Squier and Edwin Hamilton Davis, in their book, Ancient Monuments of the Mississippi Valley, name Bartram as \"the first naturalist who penetrated the dense tropical forests of Florida.\"\nAnother early illustrated work of nature writing was A History of British Birds by Thomas Bewick, published in two volumes. Volume 1, \"Land Birds\", appeared in 1797. Volume 2, \"Water Birds\", appeared in 1804. The book was considered to be the first \"field guide\" for non-specialists. Bewick provided an accurate illustration of each species, listed the common and scientific name(s) and cited the naming authorities. Each bird is described with its distribution and behavior, often with extensive quotations from external sources or correspondents. Critics noted Bewick's skill as a naturalist as well as an engraver.\nThroughout the 19th century, works of nature writing included those of American ornithologist John James Audubon (1785:1851), Charles Darwin (1809:1882) and Alfred Russel Wallace (1823:1913). Additional authors who published modern works include English author Richard Jefferies (1848-1887), American authors Susan Fenimore Cooper(1813:1894) and Henry David Thoreau (1817:1862). Other significant writers in the genre include Ralph Waldo Emerson(1803:1882), John Burroughs (1837:1931) and John Muir (1838:1914).\nThe second half of the 20th century saw a significant increase in nature writing in fiction and non-fiction in Britain. One of the earliest of these works was John Moore (1907:1967), a best-selling pioneer conservationist. Writing from the 1930s to 1960s, he was described by Sir Compton Mackenzie as the most talented writer about the countryside of his generation. Moore's contemporaries included Henry Williamson (1895:1977), best known for Tarka the Otter, whose imaginative prose won him the Hawthornden Prize in 1928. Other 20th century writers included American authors Edward Abbey (1927:1989), Aldo Leopold (1887:1948) and Indian author M. Krishnan (1912:1996).After World War II, other writers emerged including English teacher and naturalist Margaret Hutchinson (1904:1997), who strongly advocated for raising children as naturalists from an early age. American author Rachel Carson (1907:1964) is known for Silent Spring, published in 1962. Carson heralded a new and pointed style of nature writing that carried stronger warnings of environmental loss as climate change became an increasing conflict throughout the 20th century. \nRelevant contemporary nature writers in Britain include Richard Mabey, Roger Deakin, Mark Cocker, and Oliver Rackham. Rackham's books included Ancient Woodland (1980) and The History of the Countryside (1986). Richard Mabey has been involved with radio and television programmes on nature, and his book Nature Cure, describes his experiences and recovery from depression in the context of man's relationship with landscape and nature. He has also edited and introduced editions of Richard Jefferies, Gilbert White, Flora Thompson and Peter Matthiessen. Mark Cocker has written extensively for British newspapers and magazines and his books include Birds Britannica (with Richard Mabey) (2005). and Crow Country (2007). He frequently writes about modern responses to the wild, whether found in landscape, human societies or in other species. Roger Deakin was an English writer, documentary-maker and environmentalist. In 1999, Deakin's acclaimed book Waterlog was published. Inspired in part by the short story The Swimmer by John Cheever, it describes his experiences of 'wild swimming' in Britain's rivers and lakes and advocates open access to the countryside and waterways. Deakin's book Wildwood appeared posthumously in 2007. It describes a series of journeys across the globe that Deakin made to meet people whose lives are intimately connected to trees and wood. \nGerman contributions to nature writing include German author Peter Wohlleben's book The Hidden Life of Trees: What They Feel, How They Communicate. Published in 2016, it was translated from German into English and subsequently became a New York Times Bestseller. In 2017, the German book publishing company Matthes & Seitz Berlin began to grant the German Award for Nature Writing, an annual literary award for German writers who fulfill criteria within nature writing as a literary genre. It comes with a prize of 10,000 euro and an additional artist in residency grant of six weeks at the International Academy for Nature Conservation of Germany in Vilm. In 2018, the British Council offered an education bursary and workshop opportunities to six young German authors deemed to be dedicated to nature writing.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_8" +} \ No newline at end of file diff --git a/test/Humanities/Social_practice.json b/test/Humanities/Social_practice.json new file mode 100644 index 0000000000000000000000000000000000000000..a5e4bb38bcb377aa186c50f43d6a1d87a7d10830 --- /dev/null +++ b/test/Humanities/Social_practice.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Social practice is a theory within psychology that seeks to determine the link between practice and context within social situations. Emphasized as a commitment to change, social practice occurs in two forms: activity and inquiry. Most often applied within the context of human development, social practice involves knowledge production and the theorization and analysis of both institutional and intervention practices.\nThrough research, Sylvia Scribner sought to understand and create a decent life for all people regardless of geographical position, race, gender, and social class. Using anthropological field research and psychological experimentation, Scribner tried to dig deeper into human mental functioning and its creation through social practice in different societal and cultural settings. She therefore aimed to enact social reform and community development through an ethical orientation that accounts for the interaction of historical and societal conditions of different institutional settings with human social and mental functioning and development.Social practice involves engagement with communities of interest by creating a practitioner-community relationship wherein there remains a focus on the skills, knowledge, and understanding of people in their private, family, community, and working lives. In this approach to social practice, activity is used for social change without the agenda of research. Activity theory suggests the use of a system of participants that work toward an object or goal that brings about some form of change or transformation in the community.Within research, social practice aims to integrate the individual with his or her surrounding environment while assessing how context and culture relate to common actions and practices of the individual. Just as social practice is an activity itself, inquiry focuses on how social activity occurs and identifies its main causes and outcomes. It has been argued that research be developed as a specific theory of social practice through which research purposes are defined not by philosophical paradigms but by researchers' commitments to specific forms of social action.In education, social practice refers to the use of adult-child interaction for observation in order to propose intentions and gauge the reactions of others. Under social practice, literacy is seen as a key dimension of community regeneration and a part of the wider lifelong learning agenda. In particular, literacy is considered to be an area of instruction for the introduction of social practice through social language and social identity. According to social practice in education, literacy and numeracy are complex capabilities rather than a simple set of basic skills. Furthermore, adult learners are more likely to develop and retain knowledge, skills, and understanding if they see them as relevant to their own problems and challenges. Social practice perspectives focus on local literacies and how literacy practices are affected by settings and groups interacting around print.As literature is repeatedly studied in education and critiqued in discourse, many believe that it should be a field of social practice as it evokes emotion and discussion of social interactions and social conditions. Those that believe literature may be construed as a form of social practice believe that literature and society are essentially related to each other. As such, they attempt to define specific sociological practices of literature and share expressions of literature as works comprising text, institution, and individual. Overall, literature becomes a realm of social exchange through fiction, poetry, politics, and history.Social practice is also considered a medium for making art. Social practice art came about in response to increasing pressure within art education to work collaboratively through social and participatory formats from artists' desires and art viewers' increasing media sophistication. \"Social practice art\" is a term for artwork that uses social engagement as a primary medium, and is also referred to by a range of different names: socially engaged art, community art, new-genre public art, participatory art, interventionist art, and collaborative art.\nArtists working in the medium of social practice develop projects by inviting collaboration with individuals, communities, institutions, or a combination of these, creating participatory art that exists both within and outside of the traditional gallery and museum system. Artists working in social practice art co-create their work with a specific audience or propose critical interventions within existing social systems that inspire debate or catalyze social exchange. Social practice art work focuses on the interaction between the audience, social systems, and the artist through topics such as aesthetics, ethics, collaboration, persona, media strategies, and social activism. The social interaction component inspires, drives, or, in some instances, completes the project. Although projects may incorporate traditional studio media, they are realized in a variety of visual or social forms (depending on variable contexts and participant demographics) such as performance, social activism, or mobilizing communities towards a common goal.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_9" +} \ No newline at end of file diff --git a/test/Humanities/Uncertainty_management_theory.json b/test/Humanities/Uncertainty_management_theory.json new file mode 100644 index 0000000000000000000000000000000000000000..da88484a73b64a92f534f22090cb2f40a2e5b222 --- /dev/null +++ b/test/Humanities/Uncertainty_management_theory.json @@ -0,0 +1,52 @@ +{ + "domain": "Humanities", + "document": "Uncertainty management theory (UMT), developed by Dale Brashers, addresses the concept of uncertainty management. Several theories have been developed in an attempt to define uncertainty, identify its effects and establish strategies for managing it. Uncertainty management theory was the first theory to decline the idea that uncertainty is negative. It was developed and has been applied considering uncertainty neutral; neither positive nor negative. Although viewed as neutral, researchers of uncertainty management propose that uncertainty can be utilized strategically for beneficial purposes while also acknowledging that the effects of uncertainty can be harmful, espousing an approach that requires examination of each situation, the parties involved, the issues at stake and the desired objectives for determining the best method for managing uncertainty, with reduction being one of the many management techniques.\nUncertainty Management Theory (UMT) was developed by Dale Brashers, an associate professor of Speech Communication at the University of Illinois at Urbana Champaign. Brashers died in 2010 after spending more than 20 years researching uncertainty management. Before Brashers' work, the most prominent literature in the field of uncertainty management was that of Charles Berger. Berger's Uncertainty Reduction Theory (URT) continues to be the dominant theory of uncertainty management, with much of the additional work on this topic being a continuation of Berger's research. This includes the work of William Gudykunst, who continued with Berger's line of thinking, partnering together with him on Anxiety-Uncertainty Management (AUM) theory. Both of these theories focus on the idea that uncertainty produces anxiety. Because of the anxiety produced by heightened levels of uncertainty, individuals are highly motivated to reduce uncertainty. Uncertainty Reduction posits that individuals would rather receive bad news than continue in a state of uncertainty. This thinking was widely accepted, with uncertainty being studied almost exclusively through this lens before the introduction of UMT. With UMT, Brashers established that to fully understand the effects of uncertainty and how uncertainty contributes to various aspects of human life humanity must first move away from the idea that all uncertainty is negative. Brashers approached uncertainty as neutral (neither good nor bad), acknowledging that uncertainty reduction is one of many possible responses to situations that are lacking in the information necessary for full understanding. Brashers notes, however, that individuals will sometimes choose to remain in a state of uncertainty even though reduction opportunities are available.Uncertainty is an unavoidable aspect of everyday life. The degree to which it is felt in a given situation varies among individuals. Because uncertainty is dependent upon perspective, \"a person who believes himself or herself to be uncertain is uncertain.\" However, people have different appetites and tolerances for uncertainty. For some, the existence of uncertainty is stimulating or perhaps even exhilarating, whereas others can be highly motivated to reduce even the slightest degree of uncertainty. The idea of exhilarating uncertainty could best be illustrated by an individual's decision to participate in an extreme recreational activity such as skydiving, bungee jumping or parasailing. Personal tolerance for uncertainty will determine how willing a person is to invest when the likelihood of the desired outcome is unclear; whether this investment is monetary, relational or otherwise. Babrow (1992) applied this principle to research around uncertainty and probability, stating that uncertainty is at its peak when the probability of the outcome is at or near 50%; while extremely low or extremely high probability reduces uncertainty.Interpersonal relationships have great application to the field of uncertainty management and arguably the widest appeal since everyone participates in the process of relating to others. In the initial stage of relationship development, individuals engage in heightened observation of the other party to reduce uncertainty about the suitability of the relationship's future. Individuals engage in self-disclosure and other forms of interaction, particularly in the early stages of relationships, often for the sole purpose of exploring how the other party will respond. Much of the research and writing on relational communication focuses on the idea that through interaction, society comes to learn more about itself and others. The focus of uncertainty management has been not only on how people interact, but how they gather information about other people through interaction, what is done with that information, and why it is done. UMT posits that even in the early stages of relationship, one might choose to not self-disclose or to not seek self-disclosure to allow a level of uncertainty to remain.Uncertainty is generally the result of a situation being unclear, unpredictable and/or complicated, with needed information being scarce or contradictory, and the people involved lacking confidence in the amount or reliability of the information they possess about this situation. A state of uncertainty can be temporary or long-term. In relationship development, uncertainty is generally reduced at a rapid pace early in the relationship as the two parties get to know one another. This slows as the relationship progresses and the parties have fewer withheld disclosures to present. The slowdown can also be the result of one or both of the parties reaching the desired level of intimacy and thus withholding additional personal information to not further the development of the relationship. Although this withholding reduces uncertainty around where the relationship is going, it can increase uncertainty or at least maintain uncertainty levels for the other party about the areas of the individual's life and being that are no longer being disclosed. Uncertainty is often the result of multiple contributing factors that are connected to how they can affect different aspects of an individual's life. The same can be true for the functioning of an organization. \nIn relationships, individuals are motivated to explore two types of uncertainty. First, predictive uncertainty reveals what one can expect from the other party going forward. An individual desires to be able to predict with some degree of certainty how the other party is going to behave in a specific circumstance or how they are going to respond to information the individual discloses. Second, explanatory uncertainty serves to identify the reasons behind past behavior. People want to be able to make sense of the other party's words or behavior. If their behavior is undesirable and the individual can identify what prompted that behavior, they can alter their behavior or words to not continue prompting the behavior they no longer desire from the other party.\nUMT applies across a wide spectrum of topics and experiences, most notably health, organizational and interpersonal settings.Healthcare, and particularly health communication, is an arena for UMT. Researchers studying health have employed UMT as a way to understand and communicate processes including medicine, technology, payer concerns and political ramifications. This work has resulted in what Brashers referred to as the \"culture of chronic illness,\" where constant testing and evaluation of people's health almost always results in the identification of some level of sickness, infection or disease; resulting in two groups of people: the \"chronically ill\" and the \"worried well.\" Much work was completed in the late 1990s regarding the effect of uncertainty on the rapidly increasing HIV diagnosed population. Uncertainty was of particular concern with the communication methods that were utilized by healthcare providers with their HIV patients. The role of medical malpractice litigation has also contributed to the complexity of communication between healthcare providers and patients regarding diagnosis and treatment options.Although not as frequently cited, UMT also has widespread applicability to the organizational setting (i.e., the workplace). Research in this setting has included examining the role of uncertainty in unhealthy workplace behavior. Other work has examined expected employee behaviors, channels of communication and deviant employee behavior. In looking at uncertainty in the context of the workplace, Brashers relates uncertainty to ambiguity where there are multiple explanations of behavior or phenomenon; he further states that \"ambiguity is not always undesired and individuals sometimes use it for strategic purposes.\" Sometimes these strategies are for self-preservation or the retention of power, where individuals create and/or maintain ambiguity to protect their status quo. This same line of thinking has been applied to perpetrators in the workplace who cloud inappropriate behavior with enough uncertainty to disguise what would otherwise be viewed as sexual harassment. It is important to note that other uncertainty management theorists, particularly those who view uncertainty as an unhealthy dynamic. view the workplace as the primary venue in need of uncertainty reduction. This argument is particularly relevant when evaluating uncertainty around the decision-making process for organizations.People in relationships can frequently experience uncertainty. This uncertainty is not only related to the other party, but even self behavior imposes uncertainty on our relationships that often are unintended. Whether it is the result of notable cultural differences or simply family influence in the way individuals relate to others or show affection, these differences leave the other party guessing at to their intended meaning. Not all uncertainty is negative. Many individuals value the spontaneity that results from some degree of uncertainty in interpersonal relationships or how those relationships are managed.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "Location", + "SignificantEvent", + "NotableWork", + "ScheduledServiceDestination", + "FieldOfWork", + "ContributedToCreativeWork", + "BroadcastBy", + "UsedBy", + "SupportsProgrammingLanguage", + "Occupation", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "HasEffect", + "Author" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Humanities_10" +} \ No newline at end of file diff --git a/test/Information/Adversarial_stylometry.json b/test/Information/Adversarial_stylometry.json new file mode 100644 index 0000000000000000000000000000000000000000..154930db9da27a80238ade6adaf75d40203864e0 --- /dev/null +++ b/test/Information/Adversarial_stylometry.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Adversarial stylometry is the practice of altering writing style to reduce the potential for stylometry to discover the author's identity or their characteristics. This task is also known as authorship obfuscation or authorship anonymisation. Stylometry poses a significant privacy challenge in its ability to unmask anonymous authors or to link pseudonyms to an author's other identities, which, for example, creates difficulties for whistleblowers, activists, and hoaxers and fraudsters. The privacy risk is expected to grow as machine learning techniques and text corpora develop.\nAll adversarial stylometry shares the core idea of faithfully paraphrasing the source text so that the meaning is unchanged but the stylistic signals are obscured. Such a faithful paraphrase is an adversarial example for a stylometric classifier. Several broad approaches to this exist, with some overlap: imitation, substituting the author's own style for another's; translation, applying machine translation with the hope that this eliminates characteristic style in the source text; and obfuscation, deliberately modifying a text's style to make it not resemble the author's own.\nManually obscuring style is possible, but laborious; in some circumstances, it is preferable or necessary. Automated tooling, either semi- or fully-automatic, could assist an author. How best to perform the task and the design of such tools is an open research question. While some approaches have been shown to be able to defeat particular stylometric analyses, particularly those that do not account for the potential of adversariality, establishing safety in the face of unknown analyses is an issue. Ensuring the faithfulness of the paraphrase is a critical challenge for automated tools.\nIt is uncertain if the practice of adversarial stylometry is detectable in itself. Some studies have found that particular methods produced signals in the output text, but a stylometrist who is uncertain of what methods may have been used may not be able to reliably detect them.\nRao & Rohatgi (2000), an early work in adversarial stylometry, identified machine translation as a possibility, but noted that the quality of translators available at the time presented severe challenges. Kacmarcik & Gamon (2006) is another early work. Brennan, Afroz & Greenstadt (2012) performed the first evaluation of adversarial stylometric methods on actual texts.Brennan & Greenstadt (2009) introduced the first corpus of adversarially authored texts specifically for evaluating stylometric methods; other corpora include the International Imitation Hemingway Competition, the Faux Faulkner contest, and the hoax blog A Gay Girl in Damascus.\nRao & Rohatgi (2000) suggest that short, unattributed documents (i.e., anonymous posts) are not at risk of stylometric identification, but pseudonymous authors who have not practiced adversarial stylometry in producing corpuses of thousands of words may be vulnerable. Narayanan et al. (2012) attempted large-scale deanonymisation of 100,000 blog authors with mixed results: the identifications were significantly better than chance, but only accurately matched the blog and author a fifth of the time; identification improved with the number of posts written by the author in the corpus. Even if an author is not identified, some of their characteristics may still be deduced stylometrically, or stylometry may narrow the anonymity set of potential authors sufficiently for other information to complete the identification. Detecting author characteristics (e.g., gender or age) is often simpler than identifying an author from a large, possibly open, set of candidates.Modern machine learning techniques offer powerful tools for identification; further development of corpora and computational stylometric techniques are likely to raise further privacy issues. Gröndahl & Asokan (2020a) say that the general validity of the hypothesis underlying stylometry—that authors have invariant, content-independent 'style fingerprints'—is uncertain, but \"the deanonymisation attack is a real privacy concern\".\nThose interested in practicing adversarial stylometry and stylistic deception include whistleblowers avoiding retribution; journalists and activists; perpetrators of frauds and hoaxes; authors of fake reviews; literary forgers; criminals disguising their identity from investigators; and, generally, anyone with a desire for anonymity or pseudonymity. Authors, or agents acting on behalf of authors, may also attempt to remove stylistic clues to author characteristics (e.g., race or gender) so that knowledge of those characteristics cannot be used for discrimination (e.g., through algorithmic bias). Another possible use for adversarial stylometry is in disguising automatically generated text as human-authored.\nWith imitation, the author attempts to mislead stylometry by matching their style to another author's. An incomplete imitation, where some of the true author's unique characteristics appear alongside the imitated author's, can be a detectable signal for the use of adversarial stylometry. Imitation can be performed automatically with style transfer systems, though this typically requires a large corpus in the target style for the system to learn from.Another approach is translation, which employs machine translation of a source text to eliminate characteristic style, often through multiple translators in sequence to produce a round-trip translation. Such chained translation can lead to texts being significantly altered, even to the point of incomprehensibility; improved translation tools reduce this risk. More simply-structured texts can be easier to machine translate without losing the original meaning. Machine translation blurs into direct stylistic imitation or obfuscation achieved through automated style transfer, which can be viewed as a \"translation\" with the same language as input and output. With low-quality translation tools, an author can be required to manually correct major translation errors while avoiding the hazard of re-introducing stylistic characteristics. Wang, Juola & Riddell (2022) found that gross errors introduced by Google Translate were rare, but more common with several intermediate translations—however, occasional simple or short sentences and misspellings in the source text appeared verbatim in the output, potentially providing an identifying signal. Chain translation can leave characteristic traces of its application in a document, which may allow reconstruction of the intermediate languages used and the number of translation steps performed.\nObfuscation involves deliberately changing the style of a text to reduce its similarity to other texts by some metric; this may be performed at the time of writing by conscious modification, or as part of a revision process with feedback from the metric being targeted as an input to decide when the text has been sufficiently obfuscated. In contrast to translation, complex texts can offer more opportunities for effective obfuscation without altering meaning, and likewise genres with more permissible variation allow more obfuscation. However, longer texts are harder to thoroughly obfuscate. Obfuscation can blend into imitation if the author develops a novel target style, distinct from their original style. With respect to masking author characteristics, obfuscation may aim to achieve a union (adding signals for imitated characteristics) or an intersection (removing signals and normalising) of other authors' styles. Avoiding the author's own idiosyncrasies and producing a \"normalised\" text is a critical obfuscatory step: an author may have a unique tendency to misspell certain words, use particular variants, or to format a document in a characteristic way. Stylometric signals vary in how simply they can be adversarially masked; an author may easily change their vocabulary by conscious choice, but altering the pattern of grammar or the letter frequency in their text may be harder to achieve, though Juola & Vescovi (2011) report that imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the author.\nConcerning automated implementations of adversarial stylometry, two possible implementations are rule-based systems for paraphrasing; and encoder:decoder architectures, where the text passes through an intermediate format that is (intended to be) style-neutral. Another division in automated methods is whether there is feedback from an identification system or not. With such feedback, finding paraphrases for author masking has been characterised as a heuristic search problem, exploring textual variants until the result is stylistically sufficiently far (in the case of obfuscation) or near (in the case of imitation), which then constitutes an adversarial example for that identification system.\nHow to best mask stylometric characteristics in practice, and what tasks to perform manually, what with tool assistance, and what fully automatically, is an open field of research, especially in short documents with limited potential variability. Manual adversarial stylometry can be preferred or even required if the author does not trust available computers with the task (as may be the case for a whistleblower, for example). Software tools require maintenance; Wang, Juola & Riddell (2022) report that there is no maintained obfuscatory software suitable for general use. Zhai et al. (2022) identify DS-PAN (Castro-Castro, Ortega Bueno & Muñoz 2017) and Mutant-X (Mahmood et al. 2019) as the 2022 state of the art in automated obfuscation. Manual stylistic modulation is a significant effort, with poor scalability properties; tool assistance can reduce the burden to varying degrees. Deterministic automated methods can lose effectiveness against a classifier trained adversarially, where output from the style transfer program is used in the classifier's training set.Potthast, Hagen & Stein (2016) give three criteria for use in evaluation of adversarial stylometry methods: safety, meaning that stylistic characteristics are reliably eliminated; soundness, meaning that the semantic content of the text is not unacceptably altered; and sensible, meaning that the output is \"well-formed and inconspicuous\". Compromising any too deeply is typically an unacceptable result, and the three trade off against each other in practice. Potthast, Hagen & Stein (2016) find that automatically evaluating sensibility, and specifically whether output is acceptably grammatical and well-formed, is difficult; automated evaluation of soundness is somewhat more promising, but manual review is the best method.\nDespite safety being an important property of an adversarial stylometry method, it can still be usefully traded away if the conceded stylometric identification potential is otherwise possible by non-stylometric analysis—for example, an author discussing their own upbringing in Britain is unlikely to care if stylometry can reveal that their text is typical of British English.\nEvaluating the safety of different approaches is complicated by how identification-resistance fundamentally depends on the methods of identification under consideration. The property of being resilient to unknown analyses is called transferability. Gröndahl & Asokan (2020b) identify four different threat models for authors, varying with their knowledge of how their text will be analysed and what training data will be used: query access, with the weakest analyst and the strongest author who knows both the methods of analysis and the training data; architecture access, where the author knows the analysis methods but not the training data; data access, where the author knows the training data but not the analysis methods; and surrogate access, with the weakest author and the strongest analyst, where the author does not know the methods of analysis nor the training data. Further, when an author chooses a method, they must rely on their threat model and trust that it is valid, and that unknown analyses able to detect remaining stylistic signals cannot or will not be performed, or that the masking successfully transfers; a stylometrist with knowledge of how the author attempted to mask their style, however, may be able to exploit some weakness in the method and render it unsafe. Much of the research into automated methods has assumed that the author has query access, which may not generalise to other settings. Masking methods that internally use an ensemble of different analyses as a model for its adversary may transfer better against unseen analyses.\nA thorough soundness loss defeats the purpose of communication, though some degree of meaning change may be tolerable if the core message is preserved; requiring only textual entailment or allowing automatic summarisation are other options to lose some meaning in a possibly-tolerable way. Rewriting an input text to defeat stylometry, as opposed to consciously removing stylistic characteristics during composition, poses challenges in retaining textual meaning. Gröndahl & Asokan (2020a) assess the problem of unsoundness as \"the most important challenge\" for research into fully automatic approaches.\nFor sensibility, if a text is so ungrammatical as to be incomprehensible or so ill-formed that it cannot fit in to its genre then the method has failed, but compromises short of that point may be useful. If inconspicuity is partially lost, then there is the possibility that more expensive and less scalable analyses will be performed (e.g., consulting a forensic linguist) to confirm suspicions or gather further evidence. The impact of a total inconspicuity failure varies depending on the motivation for performing adversarial stylometry: for someone simply attempting to stay anonymous (e.g., a whistleblower), detection may not be an issue; for a literary forger, however, detection would be disastrous. Adversarial stylometry can leave evidence of its practice, which is an inconspicuity failure. In the Brennan:Greenstadt corpus, the texts have been found to share a common \"style\" of their own. However, Gröndahl & Asokan (2020a) assess existing evidence as insufficient to prove that adversarial stylometry is always detectable, with only limited methods having been studied. Improving the smoothness of the output text may reduce the detectability of automated tools. The overall detectability of adversarial authorship has not been thoroughly studied; if the methods available to be used by the author are unknown to the stylometrist, it may be impossible.\nThe problems of author identification and verification in an adversarial setting are greatly different from recognising naïve or cooperative authors. Deliberate attempts to mask authorship are described by Juola & Vescovi (2011) as a \"problem for the current state of stylometric art\", and Brennan, Afroz & Greenstadt (2012) state that, despite stylometry's high performance in identifying non-adversarial authors, manual application of adversarial methods render it unreliable.\nKacmarcik & Gamon (2006) observe that low-dimensional stylometric models which operate on small numbers of features are less resistant to adversarial stylometry. Research has found that authors vary in how well they are able to modulate their style, with some able to successfully perform the task even without training. Wang, Juola & Riddell (2022), a replication and reproduction of Brennan, Afroz & Greenstadt (2012), found that all three of imitation, translation and obfuscation meaningfully reduced the effectiveness of authorship attribution, with manual obfuscation being somewhat more effective than manual imitation or translation, which performed similarly to each other; the original study found that imitation was superior. Potthast, Hagen & Stein (2016) reported that even simple automated methods of adversarial stylometry caused major difficulties for state-of-the-art authorship identification systems, though at significant soundness and sensibility cost. Adversarially-aware identification systems can perform much better against adversarial stylometry provided that they know which potential obfuscation methods were used, even if the identifier makes mistakes in analysing which anonymisation method was used.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_0" +} \ No newline at end of file diff --git a/test/Information/Animal_rights_by_country_or_territory.json b/test/Information/Animal_rights_by_country_or_territory.json new file mode 100644 index 0000000000000000000000000000000000000000..e39974819608286bab8910cc8d82bb43a400bc6f --- /dev/null +++ b/test/Information/Animal_rights_by_country_or_territory.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Animal rights vary greatly among countries and territories. Such laws range from the legal recognition of non-human animal sentience to the absolute lack of any anti-cruelty laws, with no regard for animal welfare.\nAs of November 2019, 32 countries have formally recognized non-human animal sentience. These are: Austria, Australia, Belgium, Bulgaria, Chile, Croatia, Cyprus, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, the Republic of Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, New Zealand, the Netherlands, Poland, Portugal, Romania, Spain, Slovakia, Slovenia, Sweden, Switzerland, and the United Kingdom. It has been proposed that the United Nations (UN) pass the first resolution recognizing animal rights, the Universal Declaration on Animal Welfare, which acknowledges the importance of the sentience of animals and human responsibilities towards them.\nThe Great Ape Project is currently campaigning to have the United Nations endorse a World Declaration on Great Apes, which would extend to non-human great apes the protection of three basic interests: the right to life, the protection of individual liberty, and the prohibition of torture. Six countries currently ban the use of great apes for scientific research, and Austria is the only country in the world to ban experiments on lesser apes.\nIn 2009, Bolivia became the first country to banish animal abuse and harm in circuses. The United States of America is the only country in the world that has banned killing horses for consumption, and India have banned killing cows for consumption in some of its states.\nCow is the national animal of Nepal and cow slaughter is a punishable offense as per the prevailing law.\nIn 2014, the Jain pilgrimage destination of Palitana City in Indian state of Gujarat became the first city in the world to be legally vegetarian. It has banned buying and selling meat, fish, and eggs, as well as related jobs, such as fishing and animal farming.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_1" +} \ No newline at end of file diff --git a/test/Information/Belgrade_IT_sector.json b/test/Information/Belgrade_IT_sector.json new file mode 100644 index 0000000000000000000000000000000000000000..1eb340619d539d052019aec98b7a7b98dbaea653 --- /dev/null +++ b/test/Information/Belgrade_IT_sector.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "The IT sector of Belgrade is the concentration of information technology centers and service providers in the Serbian Capital of Belgrade, comprising 6,924 companies as of 2013. The IT sector in Serbia is projected to become largest sector of the Serbian economy.\nMicrosoft, Huawei, and Kaspersky have opened development centers Belgrade. Microsoft Development Center Serbia was, at the time of its establishment, the fifth such center in the world. Other global IT companies that choose Belgrade for their regional or European center include Asus, Intel, Dell, Huawei, and NCR. These major investments generated over €678.3 million in Serbia's exports in 2015.\nNordeus, a local video game startup, is one of Europe's fastest-growing gaming companies. In five years of operation, Nordeus has grown to over 150 employees and €64 million of yearly sales.Another local startup, FishingBooker, was founded in 2013 and now employs over 90 people. FishingBooker has been described as \"the world’s largest online travel company that enables [users] to find and book fishing trips.\" Like Nordeus, FishingBooker, is a bootstrapped startup.\nIn the first quarter of 2016, more than US$65 million has been raised by Serbian startups including US$45 million for Seven Bridges (a Bioinformatics firm) and US$14 million for Vast (a data analysis firm). Also in 2016, a Belgrade-based website AskGamblers which generates over €810,000 in revenue and €620,000 in profits was sold to Catena Media for €15 million.\nThe startup community is supported by a non-profit organization called Startit which acts as an incubator for new companies. Startit raised US$108,000 from its Kickstarter campaign in 2015, allowing it to expand its Belgrade center, build a second center in Inđija (completed in February 2016), and expand further to other cities with strong IT industry: Novi Sad, Zrenjanin, Vršac, Subotica, Šabac. Other developments include an agriculture drone startup that uses drones for land surveying, TeleSkin an app which can identify and track skin cancer and there was another successful Kickstarter for Hexiwear a customizable smartwatch for developers.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_2" +} \ No newline at end of file diff --git a/test/Information/Coinmarketcap.json b/test/Information/Coinmarketcap.json new file mode 100644 index 0000000000000000000000000000000000000000..491bd8ef57689711bf90533076396d2a9c369d3a --- /dev/null +++ b/test/Information/Coinmarketcap.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Coinmarketcap is a website that provides information and data such as prices, trade volumes, market capitalization on cryptocurrencies. It was founded in 2013 in New York City by Brandon Chez.\nCoinmarketcap was founded in 2013 by IT programmer Brandon Chez in New York City. By 2018, the website had become one of the most popular in the world, according to The Wall Street Journal.In January 2018, Coinmarketcap took out South Korean exchanges from its calculation for prices because the prices there were consistently higher than in other regions. That caused a significant decline in XRP's market capitalization and created chaos on the markets.\nAccording to Bloomberg, in November 2019, Coinmarketcap introduced a Liquidity metric designed to combat fake trading volume.\nIn April 2020, Binance, a cryptocurrency exchange, acquired Coinmarketcap for an undisclosed amount. Forbes suggested that the deal could be worth $400 million.\nIn November 2021, Coinmarketcap was cited by Vice, The New York Times and some other media for warning users of the \"Squid\" coin fraud scheme, which falsely claimed to be affiliated with the Squid Game TV show. The website is also a source for crypto exchanges rankings.\nIn a letter to The Wall Street Journal, Chez explained that the Coinmarketcap delisted Korean exchanges because many users complained about the inaccurate prices; however, he did not expect the effect of the Korean exchange exclusion to be so large.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_3" +} \ No newline at end of file diff --git a/test/Information/E-GMS.json b/test/Information/E-GMS.json new file mode 100644 index 0000000000000000000000000000000000000000..41fac16a5e7800c8f1c4eede902fc73ee79b8dd8 --- /dev/null +++ b/test/Information/E-GMS.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "The e-Government Metadata Standard, e-GMS, is the UK e-Government Metadata Standard. It defines how UK public sector bodies should label content such as web pages and documents to make such information more easily managed, found and shared. \nThe metadata standard is an application profile of the Dublin Core Metadata Element Set and consists of mandatory, recommended and optional metadata elements such as title, date created and description.\nThe e-GMS formed part of the e-Government Metadata Framework (e-GMF) and eGovernment Interoperability Framework (e-GIF). The standard helps provide a basis for the adoption of XML schemas for data exchange.\nThe current standard defines twenty-five elements. Each has a formal description (taken from Dublin Core where possible) and an obligation rating of \"mandatory\", \"mandatory if applicable\", \"recommended\" or \"optional\":The first version of the standard comprising simple Dublin Core elements was first published with the e-GMF. E-GMS was first published as a separate document by the Office of the e-Envoy in April 2002 and contained twenty-one elements. Version 2 was released in December 2003 and added separate elements for Addressee, Aggregation, Digital Signature and Mandate. Version 2 also added further refinements and introduced the e-GMS Audience Encoding Scheme (e-GMSAES) and e-GMS Type Encoding Scheme (e-GMSTES). Version 3 was released in April 2004 and incorporated PRONOM within the format and preservation elements. The most recent version, 3.1, was published in August 2006 by the Cabinet Office e-Government Unit following the closure of the Office of the e-Envoy. It now forms part of the UK Government's Information Principles, supporting the principle that \"Information is standardised and linkable\". Responsibility for maintenance and development of the standard has since moved from central to local government.The Integrated Public Sector Vocabulary is a controlled vocabulary for describing subjects and was first released in April 2005, building on developments of the subject element introduced with version 3.0 of e-GMS. It merged three earlier lists: the GCL (Government Category List), LGCL (Local Government Category List) and the seamlessUK taxonomy. It had 2732 preferred terms and, 4230 non-preferred.The current version, version 2, was released in April 2006. It is much bigger, with 3080 preferred terms and 4843 non-preferred terms, and covers internal-facing as well as public-oriented topics. The Internal Vocabulary was released as a separate subset containing 756 preferred terms and 1333 non-preferred terms. An abridged version of the IPSV was also released containing 549 preferred terms and 1472 non-preferred terms and remains compliant with the e-GMS. \nThe Public Sector Information Domain : Metadata Standards Working Group subsequently agreed to recommend this change to eGMS on the use of subject metadata from October 2012:\nWhere you identify value in using the subject element of metadata it should be populated from a controlled vocabulary that is used consistently across the sector to which the information relates. In preference, vocabularies should be published according to SKOS and publicly available for free re-use, which then enables tagged information to be further grouped, and associated, by an agent. SKOS also encourages cross-references to be made across otherwise unconnected vocabularies.\nThis change reflects advances in searching techniques since the introduction of eGMS, and modern approaches to cataloguing and cross-referencing information against evolving terminologies.\nIPSV is no longer directly referenced and mandated within eGMS, allowing the publisher to consider if subject tagging is valuable, and to use the vocabulary that best describes their business. Therefore, the mandate to use IPSV no longer applies, although IPSV remains an option.\nThe standard has been discontinued in January 2019. The Local Government Association esd-toolkit has since continued hosting IPSV and current URIs will remain valid.\nE-GMS has been mapped to the IEEE/LOM. IPSV has been mapped to the Local Government Classification Scheme.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_4" +} \ No newline at end of file diff --git a/test/Information/Fact_sheet.json b/test/Information/Fact_sheet.json new file mode 100644 index 0000000000000000000000000000000000000000..ec145ad901ade9dcc113eebb328d3d981bdb20bf --- /dev/null +++ b/test/Information/Fact_sheet.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "A factsheet or fact sheet, also called fact file, is a single-page document containing essential information about a product, substance, service or other topic. Factsheets are frequently used to provide information to an end user, consumer or member of the public in concise, simple language. They generally contain key safety points, operating instructions or basic information about a topic depending on the purpose of the fact sheet.\nFactsheets frequently make use of elements such as lists, tables and diagrams to convey meaning quickly and effectively. The language and content of a factsheet depend on its target audience; a factsheet aimed at professional engineers may use more technical language than one aimed at an end-user.Factsheets were traditionally printed and physically distributed, often included in the packaging of a product. Many manufacturers now provide digital factsheets as well as or instead of paper-and-ink documents.The World Health Organization provides fact sheets on wide range of health issuesThe US National Aeronautics and Space Administration provides planetary fact sheets.\nThe US conservation organization Defenders of Wildlife provides fact sheets about animals.\nThe World Factbook, a collection from the US Central Intelligence Agency of tabular factsheets on various countries.\nThe Federal Republic of Germany has published a fact sheet on the unique dual vocational training system.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_5" +} \ No newline at end of file diff --git a/test/Information/Geospatial_topology.json b/test/Information/Geospatial_topology.json new file mode 100644 index 0000000000000000000000000000000000000000..66cb1b1bedf6ed05daefe454a5d9cd1af7d43c63 --- /dev/null +++ b/test/Information/Geospatial_topology.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Geospatial topology is the study and application of qualitative spatial relationships between geographic features, or between representations of such features in geographic information, such as in geographic information systems (GIS). For example, the fact that two regions overlap or that one contains the other are examples of topological relationships. It is thus the application of the mathematics of topology to GIS, and is distinct from, but complementary to the many aspects of geographic information that are based on quantitative spatial measurements through coordinate geometry. Topology appears in many aspects of geographic information science and GIS practice, including the discovery of inherent relationships through spatial query, vector overlay and map algebra; the enforcement of expected relationships as validation rules stored in geospatial data; and the use of stored topological relationships in applications such as network analysis.\nSpatial topology is the generalization of geospatial topology for non-geographic domains, e.g., CAD software.\nIn keeping with the definition of topology, a topological relationship between two geographic phenomena is any spatial relation that is not sensitive to measurable aspects of space, including transformations of space (e.g. map projection). Thus, it includes most qualitative spatial relations, such as two features being \"adjacent,\" \"overlapping,\" \"disjoint,\" or one being \"within\" another; conversely, one feature being \"5km from\" another, or one feature being \"due north of\" another are metric relations. One of the first developments of Geographic Information Science in the early 1990s was the work of Max Egenhofer, Eliseo Clementini, Peter di Felice, and others to develop a concise theory of such relations commonly called the 9-Intersection Model, which characterizes the range of topological relationships based on the relationships between the interiors, exteriors, and boundaries of features.These relationships can also be classified semantically:\nInherent relationships are those that are important to the existence or identity of one or both of the related phenomena, such as one expressed in a boundary definition or being a manifestation of a mereological relationship. For example, Nebraska lies within the United States simply because the former was created by the latter as a partition of the territory of the latter. The Missouri River is adjacent to the state of Nebraska because the definition of the boundary of the state says so. These relationships are often stored and enforced in topologically-savvy data.\nCoincidental relationships are those that are not crucial to the existence of either, although they can be very important. For example, the fact that the Platte River passes through Nebraska is coincidental because both would still exist unproblematically if the relationship did not exist. These relationships are rarely stored as such, but are usually discovered and documented by spatial analysis methods.\nTopology was a very early concern for GIS. The earliest vector systems, such as the Canadian Geographic Information System, did not manage topological relationships, and problems such as sliver polygons proliferated, especially in operations such as vector overlay. In response, topological vector data models were developed, such as GBF/DIME (U.S. Census Bureau, 1967) and POLYVRT (Harvard University, 1976). The strategy of the topological data model is to store topological relationships (primarily adjacency) between features, and use that information to construct more complex features. Nodes (points) are created where lines intersect and are attributed with a list of the connecting lines. Polygons are constructed from any sequence of lines that forms a closed loop. These structures had three advantages over non-topological vector data (often called \"spaghetti data\"): First, they were efficient (a crucial factor given the storage and processing capacities of the 1970s), because the shared boundary between two adjacent polygons was only stored once; second, they facilitated the enforcement of data integrity by preventing or highlighting topological errors, such as overlapping polygons, dangling nodes (a line not properly connected to other lines), and sliver polygons (small spurious polygons created where two lines should match but do not); and third, they made the algorithms for operations such as vector overlay simpler. Their primary disadvantage was their complexity, being difficult for many users to understand and requiring extra care during data entry. These became the dominant vector data model of the 1980s.By the 1990s, the combination of cheaper storage and new users who were not concerned with topology led to a resurgence in spaghetti data structures, such as the shapefile. However, the need for stored topological relationships and integrity enforcement still exists. A common approach in current data is to store such as an extended layer on top of data that is not inherently topological. For example, the Esri geodatabase stores vector data (\"feature classes\") as spaghetti data, but can build a \"network dataset\" structure of connections on top of a line feature class. The geodatabase can also store a list of topological rules, constraints on topological relationships within and between layers (e.g., counties cannot have gaps, state boundaries must coincide with county boundaries, counties must collectively cover states) that can be validated and corrected. Other systems, such as PostGIS, take a similar approach. A very different approach is to not store topological information in the data at all, but to construct it dynamically, usually during the editing process, to highlight and correct possible errors; this is a feature of GIS software such as ArcGIS Pro and QGIS.\nSeveral spatial analysis tools are ultimately based on the discovery of topological relationships between features:spatial query, in which one is searching for the features in one dataset based on desired topological relationships to the features of a second dataset. For example, \"where are the student locations within the boundaries of School X?\"\nspatial join, in which the attribute tables of two datasets are combined, with rows being matched based on a desired topological relationship between features in the two datasets, rather than using a stored key as in a normal table join in a relational database. For example, joining the attributes of a schools layer to the table of students based on which school boundary each student resides within.\nvector overlay, in which two layers (usually polygons) are merged, with new features being created where features from the two input datasets intersect.\ntransport network analysis, a large class of tools in which connected lines (e.g., roads, utility infrastructure, streams) are analyzed using the mathematics of graph theory. The most common example is determining the optimal route between two locations through a street network, as implemented in most street web maps.\nOracle and PostGIS provide fundamental topological operators allowing applications to test for \"such relationships as contains, inside, covers, covered by, touch, and overlap with boundaries intersecting.\" Unlike the PostGIS documentation, the Oracle documentation draws a distinction between \"topological relationships [which] remain constant when the coordinate space is deformed, such as by twisting or stretching\" and \"relationships that are not topological [which] include length of, distance between, and area of.\" These operators are leveraged by applications to ensure that data sets are stored and processed in a topologically correct fashion. However, topological operators are inherently complex and their implementation requires care to be taken with usability and conformance to standards.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_6" +} \ No newline at end of file diff --git a/test/Information/Ghost_shoes.json b/test/Information/Ghost_shoes.json new file mode 100644 index 0000000000000000000000000000000000000000..b2179959e1f0b97c58d21c2317c051ef2cd92c42 --- /dev/null +++ b/test/Information/Ghost_shoes.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Ghost shoes are a form of roadside memorial meant to commemorate a location where a pedestrian was killed in a traffic collision. Ghost shoes consist of a pair or multiple pairs of white shoes, often on a lamppost or telephone pole. Ghost shoes memorials may include flowers, and often include signs with the identity of the victim. Ghost shoes first appeared in Montreal in 2016. Since then, several of them, both in groups and as solo memorials, have been erected across the United States and Canada. Though there is no centralized organization overseeing either, ghost shoes are often related to ghost bikes, a form of memorial to cyclists killed in traffic collisions.\n26 January 2016, Montreal, Canada : On 7 January 2016, Concepción Cortacans was struck while crossing an intersection by a SUV that ran a red light. Cortacans died of her injuries six days later. On 26 January 2016, a group of Cortacans' friends and family as well as traffic safety activists gathered at the location of the collision and hung a pair of white shoes from a lamppost. Montreal had a previous precedent of ghost bikes, but the memorial for Cortacans was the first recorded instance of the phenomenon being adapted for foot traffic fatalities.October 2017, Milwaukee, Wisconsin : In September 2017, a Wisconsin state program for pedestrian and cyclist safety advocacy called Share & Be Aware declared the upcoming October as an event called Walktober, in which demonstrations would be held and a pair of ghost shoes would be erected for each of the 17 pedestrians killed in Milwaukee in the year prior. The event in Milwaukee was the first instance of ghost shoes in the USA.\n12 January 2020, Montgomery County, Maryland : On 12 January 2020, members of The Action Committee for Transit held a rally and erected a pair of ghost shoes on a telephone pole in memory of Rita Jo Sultan, an elderly woman who was killed in Silver Spring, Maryland, in December 2019. The memorial was held only days after Montgomery County's first pedestrian death of 2020, when Jose Renan Guillen, 75, was killed on 6 January 2020.\n2 March 2020, Brooklyn, New York City : On 2 March 2020, a group of transportation activists lined up 22 pairs of white shoes in front of the YMCA branch frequented by New York City mayor Bill de Blasio, intended to represent the 23 pedestrians killed in New York City since 1 January 2020. The 23rd fatality occurred on the date of the demonstration, and a corresponding pair of shoes was not obtained in time.\n15 November 2020, Toronto, Canada : A memorial including 35 ghost shoes was scheduled to be erected in Nathan Phillips Square for World Day of Remembrance for Road Traffic Victims. However, strong winds forced Jessica Spieker, the organizer of the memorial, to move the display indoors into her house.\n23 May 2021, Montgomery County, Maryland : Two pairs of ghost shoes were hung on a telephone pole in Aspen Hill, Maryland, to commemorate Claire Grossman, who was killed in April 2021 while attempting to cross Georgia Avenue, and her late husband, Robert Grossman, who was also killed in a pedestrian death on the same stretch of Georgia Avenue years prior. Ghost shoes were also erected for Etsegenet Hurissa, who was killed on Georgia Avenue in 2011, and Victor Ramos, who was killed on Georgia Avenue in 2009.\n29 January 2022, Nashville, Tennessee : On 29 January 2022, 37 pairs of ghost shoes and one ghost bike were erected in a memorial for the 38 pedestrian fatalities in Nashville in 2021. The memorial was erected on the median strip of Murfreesboro Pike, a road notorious for pedestrian fatalities in Nashville.\nMay 2022, Jersey City, New Jersey : In May 2022, a pair of ghost shoes were hung to commemorate the death of Philip Delancy, who was killed near New Jersey Route 440 on 3 November 2021.\n26 October 2022, Hartford, Connecticut : A local activist group called the Connecticut Urbanists hung a pair of ghost shoes at an intersection in West Hartford where Bob O'Neal, 61, was killed by a car on 3 June 2022.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_7" +} \ No newline at end of file diff --git a/test/Information/Information_Centre_on_NATO_in_Armenia.json b/test/Information/Information_Centre_on_NATO_in_Armenia.json new file mode 100644 index 0000000000000000000000000000000000000000..cc218e448755cfc9e0f29fb8d175cec8301f1c9a --- /dev/null +++ b/test/Information/Information_Centre_on_NATO_in_Armenia.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "The Information Centre on NATO (Armenian: ՆԱՏՕ-ի տեղեկատվական կենտրոն, romanized: NATO-i teghekatvakan kentron) is an information centre of the North Atlantic Treaty Organization (NATO) in Armenia. The information centre is located in Armenia's capital, Yerevan.\nIn 2005, the Armenian Center for Transatlantic Initiatives (ACTI) began discussions with the NATO Public Diplomacy Division, the Government of Armenia, and the Armenian Atlantic Association to establish a permanent NATO information centre in the country, as part of Armenia's Individual Partnership Action Plan. The Information Center on NATO in Armenia opened for visitors in November 2006, and the official inauguration took place on 12 March 2007. Former NATO Assistant Secretary General on Public Diplomacy, Jean Fournet, participated in the event. Fournet stated, \"the process of informing the society on the North-Atlantic Alliance, the directions of its activities and the tasks are absolutely essential. Our special partnership with Armenia is steadily developing.\" Robert Simmons, the special representative of NATO secretary general in Central Asia and South Caucasus, stated \"the center symbolizes the relations between Armenia and NATO which have developed dynamically during recent years. The involvement of the Armenian government in the opening of the centre shows its devotion to NATO.\" Meanwhile, former Armenian Foreign Minister Vartan Oskanian stated, \"it is a very significant step, as by means of the given Center, together with NATO, we will be providing true information on the Alliance, its activities and the cooperation with Armenia.\"Ara Tadevosyan is the Director of the centre.\nThe main goals of the centre is to provide the Armenian public with information on NATO, its activities, the alliance's cooperation with Armenia, and to further facilitate Armenia's Euro-Atlantic ties. The centre organizes and hosts various events and programmes, maintains a literature collection, and regularly publishes materials available to the public.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_8" +} \ No newline at end of file diff --git a/test/Information/Othernet.json b/test/Information/Othernet.json new file mode 100644 index 0000000000000000000000000000000000000000..79846ad66fbfde15b9af9b001fdc1586c4784961 --- /dev/null +++ b/test/Information/Othernet.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "Othernet Inc is a broadcast data company that was previously known as Outernet. Due to trademark issues, the name of the company and service was changed in July 2018. Othernet sells a portable satellite data receiver that combines an amplifier, radio, and CPU in a single unit. The company's goal is to make news, information, and education accessible to everyone.\nOthernet's stated goal is to provide free access to content from the web through geostationary and low Earth orbit satellites, made available effectively to all parts of the world. The project currently uses datacasting conventional geostationary communications satellites in a satellite constellation network. Wi-Fi enabled devices would communicate with the satellite hotspots, which receive data broadcasts from satellites.\nIt received its initial investment from the Media Development Investment Fund, a United States:based impact investment fund and non-profit organization established in 1995 by Saša Vučinić and Stuart Auerbach. In 2015, Outernet (now Othernet) also launched an IndieGogo campaign, which raised $697,552 to finance the development of the Lantern receiver which was never completed and delivered to backers.\nOthernet turned on their first public satellite signal on 11 August 2014. Othernet transmitted 20 Mbits per day when it was using the L-band. Othernet provided instructions for users to build their own receivers and encouraged people to do so, then to share their results with Othernet. Othernet's first signal was broadcast over Galaxy 19 and Hot Bird, covering North America, Europe, and parts of the Middle East and North Africa.On 1 October 2014, Othernet released a major update that included a redesign of the Othernet website and the release of Whiteboard, their content suggestion platform that allows anyone to suggest a URL for broadcast. Once a URL is submitted, other visitors may vote on it with the URLs receiving the most votes entering the Othernet broadcast carousel. The Othernet broadcast is broken into three categories: the Queue, Sponsored Content, and the Core Archive. Content in the Queue is decided via votes on Whiteboard as well as requests via the Othernet Facebook page. Othernet plans to expand the avenues through which it is able to receive requests for content. Anyone can view what is being broadcast on Othernet at any time.\nAccording to MDIF, the initial content access includes international and local news, crop prices for farmers, Teachers Without Borders, emergency communications such as disaster relief, applications and content such as Ubuntu, movies, music, games, and Wikipedia in its entirety.\nRequests to NASA to use the International Space Station to test their technology were declined in June 2014 due to, as stated by a letter sent by the Center for the Advancement of Science in Space (CASIS) to the staff working for Othernet, both inaccuracies within the proposition, such as \"it is assumed that the NanoLab housing will be provided by the CASIS program outside the budget\", and costs ranging from US$150,000 to $175,000. This resulted in the CASIS operations review stating in the letter that \"the likelihood for mission success as proposed is not probable\".\nOriginally a device called the \"Lantern\" (previously known as Pillar), a data receiver and media storage system, was designed and developed by Othernet that is a \"completely self-contained, high-speed receiver\" that is \"solar-powered, weatherproof, and creates a wireless hotspot to allow WiFi-enabled devices to access content.\" The purpose of the Lantern, as stated by Othernet, is to provide free access to the media archive, weather, news, and other resources, through Outernet, in high traffic public locations, such as schools.Another way to access the transmissions sent by Othernet was to build a receiver, which requires certain components, including an L-band antenna, low-noise amplifier, and DVB-T dongle with a special RTL-SDR driver to open up its debug mode SDR reception, the data received was stored on a user supplied computing device with the othernet decoding software, the received and stored content was then made accessible when a Wi-Fi dongle is connected to the hotspot, though this L-band signal service has now been discontinued though the hardware is still able to receive other L-band INMARSAT signals.\nThe current Outernet/Othernet system which is a series of hardware testing versions currently codenamed Dreamcatcher of the eventual final Lantern is using the Ku-band with a LNB which interfaces with and is decoded by a LoRa circuit on the ARM architecture based receiver board which downloads to update the onboard stored content and resources from the satellite at 20 kbit/s, this constantly updating content cache is accessible by connecting to the Othernet receiver's Wi-Fi using Wi-Fi equipped devices and viewed using that device's web browser and not requiring any special app. Ku-band service to North America is provided by SES-2 at 87° West and for Europe by Astra 3B at 23.5° East geostationary orbit locations.\nThe Othernet project is raising funds to expand globally, in order to reach third world countries or populations lacking basic access to the Internet. The amount of funds necessary to kickstart the project was US$200,000. By 8 June 2015, $628,305 had been raised.Othernet has stated three specific goals when developing Othernet: to provide information without censorship for educational and emergency purposes. They have stated that they plan to provide information about \"news, civic information, commodity prices, weather, construction plans for open source farm machinery\" and other types of information. They also have stated that they will be providing access to \"courseware\", which includes textbooks, videos, and software. Othernet will be available also when access to regular Internet connection is down for any reason.Media coverage over the Othernet has ranged from excitement to skepticism. A CNN video released on February 24, 2014, goes into detail of how the idea seems great, but has many drawbacks due to costs and the feasibility of the project. Other media outlets that have brought up the Othernet include the Washington Post and NBC. Media coverage has also gone into other competing projects that have surfaced, such as Google's Project Loon and Facebook's Internet.org.There has also been debate over the politics involved in the introduction of the Othernet to the public. Many fears exist over whether \"the major telecom companies worldwide will fight the plans for space-based broadcasting of information readily available on the Internet.\"\nA BBC News report summarized Karim's TEDGlobal talk, observing that illiteracy will be a limiting factor for rural adoption.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_9" +} \ No newline at end of file diff --git a/test/Information/Tip_sheet.json b/test/Information/Tip_sheet.json new file mode 100644 index 0000000000000000000000000000000000000000..d3043d0c576b21ec113bceeb6e21152d9f6e8464 --- /dev/null +++ b/test/Information/Tip_sheet.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "A tip sheet is a publication containing the latest information, tips or predictions for a particular industry. Tip sheets are commonly published to impart business or stock market information, music industry songwriter leads, and tips on horse racing results.\nIn the financial sector tip sheet newsletters offer investors' advice on stocks. In the UK, tip sheets are regulated by the Financial Conduct Authority (FCA) since 2010 to prevent malpractice. Prior to 2010, Financial Service Authority (FSA) regulated tipsheets.Media tip sheets are typically lists of tips on how to do something, or solve a particular problem, that are printed in newspapers and magazines and appear on television. An example tip sheet might be titled \"8 Tax Tips the IRS Wishes You Didn't Know\". They offer their creators free publicity and provide media outlets with free ready-made content, which they can reprint verbatim.\nA music tip sheet, or song tip sheet, is a research service that regularly publishes information about which recording artists and film and TV projects are looking for music, along with the appropriate contact information. They are used by songwriters, publishers and record producers, but most commonly by new songwriters looking to gain a foothold in the industry. Songwriter, publisher and \"respected music industry veteran\" Eric Beall said that \"If I were going to spend money on anything when I started out as a songwriter, other than the actual demos, I would put it into tip sheets.\"Established music tip sheets include \"RowFax\", the MusicRow publication, and SongQuarters.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_10" +} \ No newline at end of file diff --git a/test/Information/Virtual_data_room.json b/test/Information/Virtual_data_room.json new file mode 100644 index 0000000000000000000000000000000000000000..e263a23ee745325c274ad4ae680e22fe1d9d281a --- /dev/null +++ b/test/Information/Virtual_data_room.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "A virtual data room (sometimes called a VDR or Deal Room) is an online repository of information that is used for the storing and distribution of documents. In many cases, a virtual data room is used to facilitate the due diligence process during an M&A transaction, loan syndication, or private equity and venture capital transactions. This due diligence process has traditionally used a physical data room to accomplish the disclosure of documents. For reasons of cost, efficiency and security, virtual data rooms have widely replaced the more traditional physical data room.\nA virtual data room is an extranet to which the bidders and their advisers are given access via the internet. An extranet is essentially a website with limited controlled access, using a secure log-on supplied by the vendor, which can be disabled at any time, by the vendor, if a bidder withdraws. Much of the information released is confidential and restrictions are applied to the viewer's ability to release this to third parties (by means of forwarding, copying or printing). This can be effectively applied to protect the data using digital rights management. \nThe virtual data room provides access to secure documents for authorized users through a dedicated web site, or through secure agent applications.\nIn the process of mergers and acquisitions the data room is set up as part of the central repository of data relating to companies or divisions being acquired or sold. The data room enables the interested parties to view information relating to the business in a controlled environment where confidentiality can be preserved. Conventionally this was achieved by establishing a supervised, physical data room in secure premises with controlled access. In most cases, with a physical data room, only one bidder team can access the room at a time. A virtual data room is designed to have the same advantages as a conventional data room (controlling access, viewing, copying and printing, etc.) with fewer disadvantages. Due to their increased efficiency, many businesses and industries have moved to using virtual data rooms instead of physical data rooms. In 2006, a spokesperson for a company which sets up virtual deal rooms was reported claiming that the process reduced the bidding process by about thirty days compared to physical data rooms.\nAny business dealing with private data can apply VDRs when secure transaction processing is required. This includes financial institutions that need to negotiate confidential customer information without involving third parties. VDRs have traditionally been used for IPOs and real estate asset management. Technology companies may use them to exchange and review code or confidential data needed for operations. The same is true for clients, who entrust their valuable code only to the most qualified people in the organisation. The code is not something that can be printed out and brought in a folder. It resides on a computer and must be used together.VDR can find application in any business that manages data in the form of documents, especially law firms, financial advisers or the B2B sector. The latter work with documents that must always be handled and controlled confidentially, and it is difficult to store them securely when they are on a server that other people can access. In addition, in B2B, it is important to close the deal as quickly as possible: the average sales cycle is one to three months. VDR can be compared to a locked filing cabinet where all those folders and documents are kept. It automates the mathematics of pricing to prevent revenue leakage, and initially integrates CRM to ensure accurate synchronisation of all account data, which is important for B2B in particular and sales in general.\nWhile virtual data rooms offer many advantages, they are not suitable for every industry. For example, some governments may decide to continue using physical data rooms for highly confidential information sharing. The damage from potential cyberattacks and data breaches exceeds the benefits offered by virtual data rooms. In such cases, the use of VDRs is not considered. Data breaches have particularly affected the US healthcare system from March 2021 to March 2022 - according to IBM Security the cost of the breach was a record high of $10.1 million.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_12" +} \ No newline at end of file diff --git a/test/Information/White_House_visitor_logs.json b/test/Information/White_House_visitor_logs.json new file mode 100644 index 0000000000000000000000000000000000000000..019ec26a6902891969a9d04f1d5747493c14790e --- /dev/null +++ b/test/Information/White_House_visitor_logs.json @@ -0,0 +1,55 @@ +{ + "domain": "Information", + "document": "White House visitor logs, also known as the White House Worker and Visitor Entry System (WAVE), are the guestbook records of individuals visiting the White House to meet with the President of the United States or other White House officials.\nThe release of some logs to the public has been a goal of and can be credited to the pressure from watchdog groups concerned with the possible undue influence of lobbyists over the US government. Groups such as Judicial Watch, CREW, and The National Security Archive have been suing the government to release such logs under the Freedom of Information Act since at least the early 2000s. The Clinton and Bush administrations refused to release visitor records to the public, arguing they are part of presidential communications and not public records. The Obama administration, however, after initially following the same policy, eventually reversed it and by mid-2009 released the visitor logs as part of its stated commitment to government transparency, under the White House Voluntary Disclosure Policy. It was the first US administration to release those logs to the public. The logs were nonetheless redacted to remove sensitive meetings (such as visits by potential Supreme Court nominees) and purely personal guests. Logs for the period between January 20 and September 15, 2009, are subject to different policy and require specific requests.The Trump administration withdrew its support for the release of the logs and is not making visitor logs available to the public, though some comments suggest the records could be made available \"five years after Trump leaves office\". This has led to several groups suing the government again, demanding the release of such logs, which should be seen as a matter of public record.\nThe Biden Administration has stated that it will return to the policy of publicly releasing White House visitor logs while subsequently noting that the number of visitors would be comparatively lower due to the ongoing COVID-19 pandemic in the United States.\nWhile Obama's release of the logs was generally praised by transparency activists, the Sunlight Foundation noted, \"The voluntary system can be too easily circumvented. Because it only captures visitors to the White House, if an administration official wishes to keep a meeting with a lobbyist secret, he or she merely has to schedule it at a nearby location\" and \"Phone calls are also used to avoid disclosure\". Omission of significant visits was criticized by other groups. Time noted that \"The Obama-era process allowed the White House Counsel's office to unilaterally redact records of those visiting the complex for any reason. The Obama Administration, for instance, took a wide-ranging view of what were considered personal events hosted by the Obamas, leaving off celebrity sightings and meetings with top donors.\" The visitors could request their records be shielded from the public through a simple checkbox on the visitor form.A 2017 study showed that companies whose executives have met the president report a rise in their share values by approximately 0.5% following a month or two after the disclosure of the meeting. The authors note that direct causation is difficult to prove. Still, investors likely view such news as indicating that companies will perform better, for example, winning more government procurement contracts. That study identified 2,286 meetings between corporate executives and federal government officials with the top three most frequent visitors for that period being David M. Cote (Chairman and CEO of Honeywell International, 30 visits), Jeffrey R. Immelt (Executive Chairman and CEO of General Electric, 22 visits) and Roger C. Altman (Executive Chairman of EverCore Partners, 21 visits). The top three most frequent visitees by corporate executives in that period were Valerie Jarrett (Senior Advisor to the President, 107 visits), Jeff Zients (Assistant to the President for Economic Policy and Director of the National Economic Council, 103 visits), and the President himself (100 visits).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "Location", + "PositionHeld", + "Uses", + "Investor", + "ContributedToCreativeWork", + "UsedBy", + "NominatedBy", + "LicensedToBroadcastTo", + "RegulatedBy", + "HasQuality", + "IsPollinatedBy", + "LocatedIn", + "Causes", + "PartOf", + "Founded", + "DesignedBy", + "FoundedBy", + "DiplomaticRelation", + "MemberOf", + "Country" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Information_11" +} \ No newline at end of file diff --git a/test/Internet/Anti-social_Media_Bill_(Nigeria).json b/test/Internet/Anti-social_Media_Bill_(Nigeria).json new file mode 100644 index 0000000000000000000000000000000000000000..37344439bf2427bb2337ae682d5eaeabe8f76ca7 --- /dev/null +++ b/test/Internet/Anti-social_Media_Bill_(Nigeria).json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Anti-social Media Bill was introduced by the Senate of the Federal Republic of Nigeria on 5 November 2019 to criminalise the use of the social media in peddling false or malicious information. The original title of the bill is Protection from Internet Falsehood and Manipulations Bill 2019. It was sponsored by Senator Mohammed Sani Musa from the largely conservative northern Nigeria. After the bill passed second reading on the floor of the Nigeria Senate and its details were made public, information emerged on the social media accusing the sponsor of the bill of plagiarising a similar law in Singapore which is at the bottom of global ranking in the freedom of speech and of the press. But the senator denied that he plagiarised Singaporean law.\nAngry reactions trailed the introduction of the bill, and a number of civil society organisations, human rights activists, and Nigerian citizens unanimously opposed the bill. International rights group, Amnesty International and Human Rights Watch condemned the proposed legislation saying it is aimed at gagging freedom of speech which is a universal right in a country of over two hundred million people.Opposition political parties are very critical of the bill and accused the government of attempting to strip bare, Nigerian citizens of their rights to free speech and destroying same social media on whose power and influence the ruling All Progressives Congress, APC came to power in 2015. Nigeria Information Minister, Lai Mohammed has been at the center of public criticism because he is suspected to be the brain behind the proposed act. Lai was a former spokesman of then opposition All Progressives Congress.\nA \"Stop the Social Media Bill! You can no longer take our rights from us\" online petition campaign to force the Nigeria parliament to drop the bill received over 90,000 signatures within 24 hours. In November 2019, after the bill passed second reading in the senate, Akon Eyakenyi, a senator from Akwa Ibom State publicly said he would resist the bill.\nThose who support the proposed act especially Senators have often argued that the law would help curtail hate speech. President Muhammad Buhari who is seen as a beneficiary of the influence and power of the social media and free speech has been mute about it. But the president's senior aides and family members have publicly spoken in support of the bill. In November 2019, the wife of the president, Aisha Buhari, told a gathering at the Nigeria's National Mosque in the capital, Abuja that if China with over one billion people could regulate the social media, Nigeria should do same. But Nigerians reacted saying Nigeria is not a one-party communist state like China. Days later, a daughter to the president, Zahra Indimi told a gathering of young people in Abuja that social media had become a potent weapon for bullying those they thought were doing better than them in terms of social class and called for a critical regulation.Protection from Internet Falsehoods, Manipulations and Other Related Matters Bill 2019.This Act is to prevent Falsehoods and Manipulations in Internet transmission and correspondences in Nigeria.To suppress falsehoods and manipulations and counter the effects of such communications and transmissions and to sanction offenders with a view to encouraging and enhancing transparency by Social Media Platforms using the internet correspondences.\nOne objective of the bill is to prevent the transmission of false statements or declaration of facts in Nigeria.Another objective of the bill is to end the financing of online mediums that transmit false statements.\nMeasures will be taken to detect and control inauthentic behaviour and misuse of online accounts (parody accounts).\nWhen paid content is posted towards a political end, there will be measures to ensure the poster discloses such information.\nThere will be sanction for offenders.\nAccording to the bill, a person must not:Transmit a statement that is false or,\nTransmit a statement that might:\ni. Affect the security or any part of Nigeria. ii. Affect public health, public safety or public finance. iii. Affect Nigeria's relationship with other countries. iv. influence the outcome of an election to any office in a general election. v. Cause enmity or hatred towards a person or group of persons.\nAnyone guilty of the above is liable to a fine of N300,000 or three years' imprisonment or both (for individual); and a fine not exceeding ten million naira (for corporate organisations).\nSame punishment applies for fake online accounts that transmit statements listed above.\nThe bill says a person shall not open an account to transmit false statement.Anyone found guilty will be fined N200,000 or three years' imprisonment or both (for an individual) or five million naira (for corporate organisations).\nIf such accounts transmit a statement that will affect security or influence the outcome of an election, such a person will be fined N300,000 or three years' imprisonment or both.\nIf a person receives payment or reward to help another to transmit false statements knowingly, he/she is liable to a fine of N150,000 or three years' imprisonment or both. If a person receives payment or reward to help another to transmit a statement affects security or influence the outcome of an election, the fine is N300,000 or three years' imprisonment or both (for individual) and ten million naira for organisations.\nAccording to the bill, a law enforcement department can issue a \"declaration\" to offenders. And this declaration will be issued even if the \"false statement\" has been corrected or pulled down.The offender will be required to publish a \"correction notice\" in a specified newspaper, online location or other printed publication of Nigeria.\nFailure to comply, a person is liable to N200,000 or 12 months' imprisonment or both (for individual) and five million naira for organisations.\nThe bill says the law enforcement department will also issue an access blocking order to offenders.The law enforcement department may direct the NCC to order the internet access service provider to disable access by users in Nigeria to the online location and the NCC must give the internet access service provider an access blocking order.\nAn internet access service provider that does not comply with any access blocking order is liable on conviction to a fine not exceeding ten million naira for each day during any part of which that order is not fully complied with, up to a total of five million naira.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_0" +} \ No newline at end of file diff --git a/test/Internet/Cem_Korkmaz.json b/test/Internet/Cem_Korkmaz.json new file mode 100644 index 0000000000000000000000000000000000000000..40aacfeba680c5ad04bea9d555e3eb94afb9bbec --- /dev/null +++ b/test/Internet/Cem_Korkmaz.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Cem Korkmaz (1987 : 1 November 2017) was a Turkish actor and YouTuber.\nCem Korkmaz was born in Bursa in 1987, the only child of his family. He completed his primary and secondary education there and finally entered the State Theatre of Bursa.Korkmaz, who exhibited his acting with projects such as AROG (2008), Recep İvedik 4 (2014), Diğer Yarım (2014), Kiraz Mevsimi (2014) and Husband Factor (2015), made his real debut with his videos on a YouTube channel.\nIn 2013, he joined Mediakraft, which produces content for YouTube, and towards the end of 2015, his name started to be heard among internet users in Turkey. In February 2015, he was terminated by Mediakraft for swearing during a broadcast with his followers on Periscope, and in April 2015 he created a personal channel for himself.\nOn 1 November 2017, he committed suicide in his house in Üsküdar, Istanbul for an unknown reason, without leaving a will behind. When his relatives, who had not heard from him for a long time, reported the situation, the door of his house was opened in the presence of a locksmith and the police and they saw that Korkmaz had hanged himself using a rope.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_1" +} \ No newline at end of file diff --git a/test/Internet/Hyperdata.json b/test/Internet/Hyperdata.json new file mode 100644 index 0000000000000000000000000000000000000000..0c180b8d7ebab60e343ebd58df04da9dc9e2b790 --- /dev/null +++ b/test/Internet/Hyperdata.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Hyperdata are data objects linked to other data objects in other places, as hypertext indicates text linked to other text in other places. Hyperdata enables the formation of a web of data, evolving from the \"data on the Web\" that is not inter-related (or at least, not linked).\nIn the same way that hypertext usually refers to the World Wide Web but is a broader term, hyperdata usually refers to the Semantic Web, but may also be applied more broadly to other data-linking technologies such as microformats : including XHTML Friends Network.\nA hypertext link indicates that a link exists between two documents or \"information resources\". Hyperdata links go beyond simply such a connection, and express semantics about the kind of connection being made. For instance, in a document about Hillary Clinton, a hypertext link might be made from the word senator to a document about the United States Senate. In contrast, a hyperdata link from the same word to the same document might also state that senator was one of Hillary Clinton's roles, titles, or positions (depending on the ontology being used to define this link).\nThe Semantic Web introduces the controversial concept of links to non-data resources. In the Semantic Web, links are not limited to \"information resources\" or documents, such as the typical Web page. Hyperdata links may refer to a physical structure (e.g., \"the Eiffel Tower\"), a place (\"Champ de Mars\" where the Eiffel Tower stands), a person (Gustave Eiffel, the man responsible for the tower's construction), or other \"non-information resources\". The links in this article are hypertext, not hyperdata, and they all lead to documents which describe the entities named.A hyperdata browser (also called a Semantic Web browser), is a browser used to navigate the Semantic Web. Semantic Web architecture does not necessarily involve the HTML document format, which typical HTML Web browsers rely upon. A hyperdata browser specifically requests RDF data from Web servers, often through content negotiation or conneg, starting from the same URL as the traditional Web browser; the Web server may immediately return the requested RDF, or it may deliver a redirection to a new URI where the RDF may actually be found, or the RDF may be embedded in the same HTML document which would be returned to a Web browser which did not request RDF. The RDF data will generally describe the resource represented by the originally requested URI. The hyperdata browser then renders the information received as an HTML page that contains hyperlinks for users to navigate to indicated resources.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_2" +} \ No newline at end of file diff --git a/test/Internet/Internet_GIS.json b/test/Internet/Internet_GIS.json new file mode 100644 index 0000000000000000000000000000000000000000..45b6b0ed2b1a94f7efdb51810ec9305c30731372 --- /dev/null +++ b/test/Internet/Internet_GIS.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Internet GIS, or Internet geographic information system (GIS), is a term that refers to a broad set of technologies and applications that employ the Internet to access, analyze, visualize, and distribute spatial data. Internet GIS is an outgrowth of traditional GIS, and represents a shift from conducting GIS on an individual computer to working with remotely distributed data and functions. Two major issues in GIS are accessing and distributing spatial data and GIS outputs. Internet GIS helps to solve that problem by allowing users to access vast databases impossible to store on a single desktop computer, and by allowing rapid dissemination of both maps and raw data to others. These methods include both file sharing and email. This has enabled the general public to participate in map creation and make use of GIS technology.\nInternet GIS is a subset of Distributed GIS, but specifically uses the internet rather than generic computer networks. Internet GIS applications are often, but not exclusively, conducted through the World Wide Web (also known as the Web), giving rise to the sub-branch of Web GIS, often used interchangeably with Internet GIS. While Web GIS has become nearly synonymous with Internet GIS to many in the industry, the two are as distinct as the internet is from the World Wide Web. Likewise, Internet GIS is as distinct from distributed GIS as the Internet is from distributed computer networks in general.\nInternet GIS includes services beyond those enabled by the Web. Use of any other internet-enabled services to facilitate GIS functions, even if used in conjuncture with the Web, represents the use of Internet GIS. One of the most common applications of a distributed GIS system, accessing remotely saved data, can be done through the internet without the need for the Web. This is often done in practice when data are sensitive, such as hospital patient data and research facilities proprietary data, where sending data through the Web may be a security risk. This can be done using a Virtual private network (VPN) to access a local network remotely. The use of VPN for these purposes surged during the COVID-19 pandemic, when employers needed to allow employees using GIS access to sensitive spatial data from home.\nThe history of Internet geographic information systems is linked to the history of the computer, the internet, and the quantitative revolution in geography. Geography tends to adapt technologies from other disciplines rather than innovating and inventing the technologies employed to conduct geographic studies. The computer and internet are not an exception, and were rapidly investigated to purpose towards the needs of geographers. In 1959, Waldo Tobler published the first paper detailing the use of computers in map creation. This was the beginning of computer cartography, or the use of computers to create maps. In 1960, the first true geographic information system capable of storing, analyzing, changing, and creating visualizations with spatial data was created by Roger Tomlinson on behalf of the Canadian Government to manage natural resources. These technologies represented a paradigm shift in cartography and geography, with desktop computer cartography facilitated through GIS rapidly replaced traditional ways of making maps. The emergence of GIS and computer technology contributed to the quantitative revolution in geography and the emergence of the branch of technical geography.As computer technology advanced the desktop machine became the default for producing maps, a process known as digital mapping, or computer cartography. These computers were networked together to share data and processing power and create redundant communications for defense applications. This computer network evolved into the internet, and by the late 1980s, the internet was available in some people's homes. Over time, the internet moved from a novelty to a major part of daily life. Using the internet, it was no longer necessary to store all data for a project locally, and communications were vastly improved. Following this trend, GIScientists began developing methods for combining the internet and GIS. This process accelerated in the 1990s, with the creation of the World Wide Web in 1990 and the first major web mapping program, Xerox PARC Map Viewer, capable of distributed map creation appearing in 1993. This software was unique in that it facilitated dynamic user map generation, rather than static images. These new Web-based programs helped users to employ GIS without having it locally installed on their machine, ultimately leading to Web GIS being the dominant way users interact with internet GIS.\nIn 1995 The US federal government made the TIGER Mapping Service available to the public, facilitating desktop and Web GIS by hosting US boundary data. This data availability, facilitated through the internet, silently revolutionized cartography by providing the world with authoritative boundary files, for free. In 1996, MapQuest became available to the public, facilitating navigation and trip planning. Sometime during the 1990s, more maps were transmitted over the internet than physically printed. This milestone was predicted in 1985 and represented a major shift in how we distribute spatial products to the masses.\nAs of 2020, almost 75% of the population has a smartphone. These devices allow users to access the internet wherever they have service, and have revolutionized how we interact with the internet. One notable example is the rise of \nmobile apps, which have impacted both how GIS is done, and how data are collected. Some mobile apps like the Google Maps mobile app are web-based and allow users to get navigation instructions in real time. Others, like Esri's Survey123 allow users to collect data in the field with their smartphone. As time progresses, internet-based applications that do not make use of HTML or Web Browsers have begun to become to grow in popularity.\nThe World Wide Web is an information system that uses the internet to host, share, and distribute documents, images, and other data. Web GIS involves using the World Wide Web to facilitate GIS tasks traditionally done on a desktop computer, as well as enabling the sharing of maps and spatial data. Most, but not all, internet GIS is Web GIS, however all Web GIS is internet GIS. This is quite similar to how much of the activity on the internet is hosted on the World Wide Web, but not everything on the internet is the World Wide Web. The tasks Web GIS are used for are numerous but can be generally divided into the categories of Geospatial web services: web feature services, web processing services, and web mapping services.By their definition, maps can never be perfect and are simplifications of reality. Ethical cartographers try to keep these inaccuracies documented and to a minimum, while encouraging critical perspectives when using a map. Internet GIS has brought map-making tools to the general public, facilitating the rapidly disseminating these maps. While this is potentially positive, it also means that people without cartographic training can easily make and disseminate misleading maps to a wide audience. This was brought to public attention during the COVID-19 pandemic, when more than half of all United States state government COVID-19 dashboards had cartographic errors. Further, malicious actors can quickly spread intentionally misleading spatial information while hiding the source. As the internet is decentralized, traditional solutions to problems such as government regulation are difficult or impossible to implement. For many users, the World Wide Web is synonymous with the Internet, which is true for Internet GIS. Most functions done with Internet GIS are conducted through the use of Web GIS. This has caused the borders between the two terms to blur, and \"Web GIS\" to become genericized into meaning any GIS done over the internet to some users.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_3" +} \ No newline at end of file diff --git a/test/Internet/Internet_in_Laos.json b/test/Internet/Internet_in_Laos.json new file mode 100644 index 0000000000000000000000000000000000000000..56bb586d8200de9367f86b924f875de197592ec9 --- /dev/null +++ b/test/Internet/Internet_in_Laos.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "The Internet in Laos was first introduced in 1997, with the two commercial ISP services starting in 1999, specifically PlaNet Computers and GlobeNet. These supported a rapid growth of internet cafes across the country to service tourists, which incidentally introduced the internet to many English speaking Lao nationals. The introduction of mobile broadband has significantly increased the use of the Internet in Laos since 2008.\nLaos is included in the OpenNet Initiative (ONI) Regional Overview for Asia (2009). ONI found no evidence of Internet filtering in the political, social, conflict/security, and tools areas based on testing performed in 2011.The government controls domestic Internet servers and sporadically monitors Internet usage, but by the end of 2012 it apparently did not have the ability to block access to Web sites. Authorities have developed infrastructure to route all Internet traffic through a single gateway, enabling them to monitor and restrict content. However, they apparently had not utilized this increased capability as of the end of 2012. The National Internet Committee under the Prime Minister's Office administers the Internet system. The office requires Internet service providers to submit quarterly reports and link their gateways to facilitate monitoring, but the government's enforcement capability appears limited.\nThe law generally protects privacy, including that of mail, telephone, and electronic correspondence, but the government reportedly continues to violate these legal protections when there is a perceived security threat. The law prohibits unlawful searches and seizures. While the law requires that police obtain search authorization from a prosecutor or a panel of judges, police do not always obtain prior approval, especially in rural areas. Security laws allow the government to monitor individuals’ movements and private communications, including via cell phones and e-mail.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_4" +} \ No newline at end of file diff --git a/test/Internet/Online_encyclopedia.json b/test/Internet/Online_encyclopedia.json new file mode 100644 index 0000000000000000000000000000000000000000..7d7cfed2025699a5262c2fe6dba81f44e21316ee --- /dev/null +++ b/test/Internet/Online_encyclopedia.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "An online encyclopedia, also called an Internet encyclopedia, is a digital encyclopedia accessible through the Internet. Examples include Encyclopedia.com since 1998, Encarta from 2000 to 2009, Wikipedia since 2001, and Encyclopædia Britannica since 2016.\nIn January 1995, Project Gutenberg started to publish the ASCII text of the Encyclopædia Britannica, 11th edition (1911), but disagreements about the method halted the work after the first volume. For trademark reasons, the text had been published as the Gutenberg Encyclopedia. Since then, Project Gutenberg digitized and proofread the encyclopedia, until the last update in September 2018. Project Gutenberg published volumes in alphabetical order; the most recent publication is Volume 17 Slice 1: \"Lord Chamberlain\" to \"Luqman\", published on August 9, 2013. The latest Britannica was digitized by its publishers, and sold first as a CD-ROM, and later as an online service.In 2001, ASCII text of all 28 volumes was published on Encyclopædia Britannica Eleventh Edition by source; a copyright claim was added to the materials included. The website no longer exists.\nOther digitization projects have made progress in other titles; one example is Easton's Bible Dictionary (1897) digitized by the Christian Classics Ethereal Library.\nA successful digitization of an encyclopedia was the Bartleby Project's online adaptation of the Columbia Encyclopedia, Sixth Edition, in early 2000 and is updated periodically.\nOther websites provide online encyclopedias, some of which are also available on Wikisource. However, some may be more complete than those on Wikisource, or may be from different editions.\nAnother related branch of activity is the creation of new, free content on a volunteer basis. In 1991, participants of the Usenet newsgroup alt.fan.douglas-adams started Project Galactic Guide to produce a real version of The Hitchhiker's Guide to the Galaxy, a fictional encyclopedia used in the works of Douglas Adams. Although it originally aimed to contain only real, factual articles, the policy was changed to allow and encourage semi-real and unreal articles as well. Project Galactic Guide contains over 1700 articles, but no new articles have been added since 2000, which was a year after the foundation of h2g2.The 1993 Interpedia proposal was planned as an encyclopedia on the Internet to which everyone could contribute materials. The project never left the planning stage and was overtaken by a key branch of old printed encyclopedias.\nAnother early online encyclopedia was called the Global Encyclopedia. In November 1995, James Rettig, Assistant Dean of University Libraries for Reference and Information Services at College of William & Mary, presented an unfavorable review at the 15th Annual Charleston Conference on library acquisitions and related issues. He said of the Global Encyclopedia:\nThis is a volunteer effort to compile an encyclopedia and distribute it for free on the World Wide Web. If you have ever yearned to be the author of an encyclopedia article, yearn no longer. Take a minute (or even two or three if you are feeling scholarly) to write an article on a topic of your choosing and [e]mail it off to the unnamed \"editors\". These editors (to use that title very loosely) have generated a list of approximately 1,300 topics they want to include; to date, perhaps a quarter of them have been treated. ... This so-called encyclopedia gives amateurism a bad name. It is being compiled without standards or guidelines for article structure, content, or reading level. It makes no apparent effort to check the qualifications and authority of the volunteer authors. Its claim that \"Submitted articles are fact-checked, corrected for spelling, and then formatted\" is at best an exaggeration.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_5" +} \ No newline at end of file diff --git a/test/Internet/Online_optimization.json b/test/Internet/Online_optimization.json new file mode 100644 index 0000000000000000000000000000000000000000..2842e3fc2ba5d26d2e5ce9bebf1f8257407cd24a --- /dev/null +++ b/test/Internet/Online_optimization.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Online optimization is a field of optimization theory, more popular in computer science and operations research, that deals with optimization problems having no or incomplete knowledge of the future (online). These kind of problems are denoted as online problems and are seen as opposed to the classical optimization problems where complete information is assumed (offline). The research on online optimization can be distinguished into online problems where multiple decisions are made sequentially based on a piece-by-piece input and those where a decision is made only once. A famous online problem where a decision is made only once is the Ski rental problem. In general, the output of an online algorithm is compared to the solution of a corresponding offline algorithm which is necessarily always optimal and knows the entire input in advance (competitive analysis).\nIn many situations, present decisions (for example, resources allocation) must be made with incomplete knowledge of the future or distributional assumptions on the future are not reliable. In such cases, online optimization can be used, which is different from other approaches such as robust optimization, stochastic optimization and Markov decision processes.\nA problem exemplifying the concepts of online algorithms is the Canadian traveller problem. The goal of this problem is to minimize the cost of reaching a target in a weighted graph where some of the edges are unreliable and may have been removed from the graph. However, that an edge has been removed (failed) is only revealed to the traveller when they reach one of the edge's endpoints. The worst case for this problem is simply that all of the unreliable edges fail and the problem reduces to the usual shortest path problem. An alternative analysis of the problem can be made with the help of competitive analysis. For this method of analysis, the offline algorithm knows in advance which edges will fail and the goal is to minimize the ratio between the online and offline algorithms' performance. This problem is PSPACE-complete.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_6" +} \ No newline at end of file diff --git a/test/Internet/OrionVM.json b/test/Internet/OrionVM.json new file mode 100644 index 0000000000000000000000000000000000000000..ea5a6568d2b9405aaf06fc4d1f89ebf29017a2e4 --- /dev/null +++ b/test/Internet/OrionVM.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "OrionVM Wholesale Pty Limited (trading as OrionVM) \nis an Australian infrastructure as a service provider and white-label cloud platform. Resellers present customers with a rebranded interface for deploying virtual machine instances, which are only billed for what their customers use. Cloud Harmony benchmarked the OrionVM Cloud Platform's InfiniBand-backed network storage as the world's fastest in 2011.\nThe company was founded and is headquartered in Sydney, Australia,\nwith offices in San Francisco, California.\nOrionVM was founded in a dorm by Sheng Yeo, Alex Sharp \nand Joseph Glanville in 2010. \nThe company's cloud platform was developed while the founders were still students at the University of Technology, Sydney and University of Sydney. After fifteen months of development, their cloud platform entered a Public Beta programme, with a full launch on 1 April 2011.\nIn 2011, the company received angel investments from Australian entrepreneur and PIPE Networks co-founder Stephen Baxter\nand American Gordon Bell of DEC and Microsoft Research.\nFor his work at OrionVM, CEO Sheng Yeo was nominated for the 2012 Australian Entrepreneur of the Year and the 2013 Ernst & Young Entrepreneur of the Year.\nIn 2014, OrionVM received a State Merit award and a National Finalist nomination in the 2014 iAwards, with CTO Alex Sharp winning the Hills YIA Cloud award. The company was nominated for a Stevie Award for New Product or Service of the Year in Cloud Infrastructure Software, and an Australian Startup Awards nomination.\nIn 2016, Yeo and Sharp were named in the Forbes 30 Under 30 Asia list.\nOrionVM sells a wholesale cloud infrastructure platform for public, private and hybrid cloud deployments. Vendors can white-label the platform for resale, or for internal use. Prominent resellers include:Australian telephone company AAPT\nBizCloud\nIT broker StrataCore.\nOrionVM uses the Xen hypervisor to virtualise multiple machines (referred to as \"instances\") on the same hardware. Linux instances use paravirtualisation for reduced overhead by default, with Windows Server being deployed using hardware-assisted virtualisation (HVM).Traditional virtual private server and infrastructure as a service providers consolidate storage into a storage area network, which is limited by Ethernet network speeds and best-effort reliability. OrionVM's platform took design cues from supercomputers by placing hypervisor storage and compute on the same physical servers. These are backed by a decentralised InfiniBand fabric. This improves network reliability and performance, and allows for rapid rollover between physical hosts for high availability.\nTo end users, the base of the platform consists of a web panel, where customers are able to deploy virtual machines. For resellers, the logos and theme can be modified to suit their own branding.From the panel, users can deploy preconfigured instances with their chosen operating system and required memory. Additional storage disks and IP addresses can be created separately, then assigned to new or existing instances. After shutting down, further resources can be allocated or scaled down.Instances can be accessed out-of-band via a web-based serial console or VNC session. Access is also available via ovm_ctl, an open source command line interface available from GitHub and the pip package manager.Linux machines come preconfigured with SSH, and Windows with RDP for remote access.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_7" +} \ No newline at end of file diff --git a/test/Internet/Route_panorama.json b/test/Internet/Route_panorama.json new file mode 100644 index 0000000000000000000000000000000000000000..f00724f0a5e6064061c2894354041fbea2d3a815 --- /dev/null +++ b/test/Internet/Route_panorama.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "Route panorama is a continuous 2D image that includes all the scenes visible from a route, as it first appeared in Zheng and Tsuji's work of panoramic views in 1990.\nDifferent from a local panorama at a static viewpoint, a digital route panorama is constructed from partial views at consecutive viewpoints along a path. A general approach to obtain such a complete route panorama is to use a line camera or slit camera mounted on a vehicle moving along the path smoothly. The camera scans temporal scenes in the side direction of the path and connect them to the spatial image. This is realized by a program that processes temporal image data or video data in a computer. The route panorama can extend to a long distance for indexing scenes and navigation on the Internet. The long image can further be transmitted to and be scrolled on computer screens or handheld devices as moving panorama for access of geospatial locations, navigation, georeferencing, etc.Mathematically, the route panorama employs a parallel-and-perspective projection that is a continuous and extreme case of multi-perspective view to pixel lines. It may have the aspect ratio of an object different from what a normal perspective projection generates. In addition, a video camcorder is used to produce the route panorama by taking only one pixel line in the video frame at a time with the auto-exposure function of the camcorder and shaking removal function using the inter-frame matching.\nIf the depth of scenes from the path has a dominant layer, a route panorama can also be created on that layer by stitching discrete photos consecutively taken along the path using Photomontage. Under the same circumstance, a dynamic slit selected in the video frame can generate a route panorama with less shape distortion.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_8" +} \ No newline at end of file diff --git a/test/Internet/ZA_Central_Registry.json b/test/Internet/ZA_Central_Registry.json new file mode 100644 index 0000000000000000000000000000000000000000..74b637a2aee288a2b638700bd0de6454568b882d --- /dev/null +++ b/test/Internet/ZA_Central_Registry.json @@ -0,0 +1,59 @@ +{ + "domain": "Internet", + "document": "The ZA Central Registry (ZACR), formerly known as UniForum SA, is a non-profit organisation established in 1988 and operates various second-level domains (SLD's) in South Africa. The ZA Central Registry is the administrator of the South African zones such as \"co.za\" and \"web.za\". Their offices are based in Midrand, South Africa.\nThe ZACR, in partnership with the Africa Union Commission (AUC), is the applicant for the dotAfrica domain in ICANN's new Top-level domain program. The ZACR has also partnered with the ZA Domain Name Authority (ZADNA), the South African Domain Name regulator, to implement the .joburg, .capetown, and .durban Top-level domains (TLDs).\nThe ZA Central Registry was established as a non-profit company in 1988 under the name of UniForum S.A. The organisation's goal was the promotion of open standards systems and related hardware, software applications and standards.Internet Service Provider Association (ISPA) assigned to Uniforum the responsibility of administering the \"co.za\" domain name space. This was because it was seen as not only having the technical skills and resources to do so, but also committed to neutrality and unity of purpose.\nThe registry started with just 400 registered domains. The ZA Central Registry currently boasts over 920 000 co.za domain name registrations, which is over 95% of the total registrations in the \".za\" ccTLD. This has made the registry by far the largest domain name registry on the African continent.\nThe registry signed four registry operator contracts with ICANN at its Singapore meeting in April 2014, which officially appoints the ZACR as the accredited ICANN registry to manage the administration function for \".joburg\", \".capetown\", \".durban\" and \".africa\".Web.za-is a generic top level domain which is now being administered by ZACR. This means that accredited registrars are now able to register names in Web.Za. This .za 2nd level domain was re launched by ZADNA, under ZA Central Registry's operation. Web.Za will take domain name registrations on the same basis as co.za: no eligibility requirements, open to domain name applications by South Africans and non-South Africans. The re-launch allows for protection of trademarks, starting with a limited sunrise and land rush processes.\n.Africa(dotAfrica)- is the new generic Top Level Domain (gTLD) for the African continent. The application was submitted with the endorsement and support of the African Union Commission (AUC), individual African governments, regional governmental agencies and organisations. The .Africa domain name was launched in 2017.\n.Cities- ZACR in partnership with ZADNA and the support of the South African Department of Communications, submitted applications for the \".durban\", \".capetown\" and \".joburg\" TLDs. This will enable key South African cities to compete with their international counterparts and, more especially, allow them to showcase the cities as business and tourist destinations.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "TypeOfElectrification", + "UsedBy", + "SupportedSportsTeam", + "RegulatedBy", + "HasQuality", + "Studies", + "LocatedIn", + "Population", + "ConvictedOf", + "AffiliatedOrganization", + "PartOf", + "Founded", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "Partner" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Internet_9" +} \ No newline at end of file diff --git a/test/Knowledge/Cognitive_closure_(philosophy).json b/test/Knowledge/Cognitive_closure_(philosophy).json new file mode 100644 index 0000000000000000000000000000000000000000..b867e5f41899a415b0cd1d0272ac100090d24879 --- /dev/null +++ b/test/Knowledge/Cognitive_closure_(philosophy).json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "In philosophy of science and philosophy of mind, cognitive closure is the proposition that human minds are constitutionally incapable of solving certain perennial philosophical problems. Owen Flanagan calls this position anti-constructive naturalism or the \"new mysterianism\" and the primary advocate of the hypothesis, Colin McGinn, calls it transcendental naturalism acknowledging the possibility that solutions may be knowable to an intelligent non-human of some kind. According to McGinn, such philosophical questions include the mind-body problem, identity of the self, foundations of meaning, free will, and knowledge, both a priori and empirical.\nIt cannot be simply taken for granted that the human reasoning faculty is naturally suited for answering philosophical questions: the questions and their subject matter are one thing; and rational faculty, as a human trait, is another. From the fact that it is the best faculty we have… for doing philosophy it does not follow that it is a remotely good or adequate faculty for that purpose. When human minds interact with philosophical problems, especially those of the form 'How is X possible?', they are apt to go into one of four possible states. Either (i) they try to domesticate the object of puzzlement by providing a reductive or explanatory theory of it; or (ii) they declare it irreducible and hence not open to any levelling account; or (iii) they succumb to a magical story or image of what seems so puzzling; or (iv) they simply eliminate the source of trouble for fear of ontological embarrassment... The topics on which it imprints itself, and which I have discussed in some diagnostic detail in the aforementioned book, include: consciousness and the mind-body problem, the nature and identity of the self, the foundations of meaning, the possibility of free will, the availability of a priori and empirical knowledge... Basically what we find, quite generally, is the threat of magic or elimination in the face of the theoretical obduracy of the phenomenon that invites philosophical attention. The phenomenon presents initial problems of possibility... Free will, for instance, looks upon early inspection to be impossible, so we try to find some conception of it that permits its existence, but this conception always turns out to be dubiously reductive and distorting, leaving us with the unpalatable options of magic, elimination or quietism... so we hop unhappily from one unsatisfactory option to the next; or dig our heels (squintingly) into a position that seems the least intellectually unconscionable of the bunch... Science, then, might be aptly characterised as that set of questions that does not attract [these] options : where our cognitive faculties allow us to form the necessary concepts and theories. The distinction between science and philosophy is, on this view, at root a reflection of the cognitive powers we happen to possess or lack, and is therefore creature-relative: it does not correspond to any interesting real division within objective reality... It is not beyond the bounds of possibility that our brains would have to be made of something other than neurons in order for us to have the kinds of cognitive powers needed to solve the problems philosophy poses; at any rate, this is the sort of diagnosis [transcendental naturalism] offers for our philosophical retardation... The hardness of philosophy is thus an upshot of the particular way that natural selection has built our thinking organ, not an objective trait of the subject-matter of philosophical questions.\nFor Friedrich Hayek, \"The whole idea of the mind explaining itself is a logical contradiction\"... and \"takes this incompleteness—the constitutional inability of mind to explain itself—to be a generalized case of Gödel's incompleteness theorem... Hayek is not a naturalistic agnostic, that is, the view that science currently cannot offer an explanation of the mind-body relationship, but in principle it could.\"[The] passage from the physics of the brain to the corresponding facts of consciousness is unthinkable. Granted that a definite thought, and a definite molecular action in the brain occur simultaneously; we do not possess the intellectual organ, nor apparently any rudiment of the organ, which would enable us to pass, by a process of reasoning, from the one to the other. They appear together, but we do not know why. Were our minds and senses so expanded, strengthened, and illuminated, as to enable us to see and feel the very molecules of the brain; were we capable of following all their motions, all their groupings, all their electric discharges, if such there be; and were we intimately acquainted with the corresponding states of thought and feeling, we should be as far as ever from the solution of the problem, \"How are these physical processes connected with the facts of consciousness?\" The chasm between the two classes of phenomena would still remain intellectually impassable. Let the consciousness of love, for example, be associated with a right-handed spiral motion of the molecules of the brain, and the consciousness of hate with a left-handed spiral motion. We should then know, when we love, that the motion is in one direction, and, when we hate, that the motion is in the other; but the \"Why?\" would remain as unanswerable as before.Noam Chomsky argues that the cognitive capabilities of all organisms are limited by biology and that certain problems may be beyond our understanding:A Martian scientist, with a mind different from ours might regard this problem [of free will] as trivial, and wonder why humans never seem to hit on the obvious way of solving it. This observer might also be amazed at the ability of every human child to acquire language, something that seems to him incomprehensible, requiring divine intervention.\nAs argued in Kant's Critique of Pure Reason, human thinking is unavoidably structured by categories of the understanding: Quantity : Unity, Plurality, Totality.\nQuality : Reality, Negation, Limitation.\nRelation : Inherence and Subsistence, Causality and Dependence, Community.\nModality : Possibility or Impossibility, Existence or Non-Existence, Necessity or Contingence.\nThese are ideas from which there is no escape and thus they pose a limit to thinking. What can be known through the categories is called \"things for us\" and what is outside the categories is unthinkable, called \"things in themselves\".\nIn his (famous) essay \"What Is It Like to Be a Bat?\" Thomas Nagel mentions the possibility of cognitive closure to the subjective character of experience and the (deep) implications that it has for materialist reductionist science. Owen Flanagan noted in his 1991 book Science of the Mind that some modern thinkers have suggested that consciousness will never be completely explained. Flanagan called them \"the new mysterians\" after the rock group Question Mark and the Mysterians. According to McGinn, the solution to the mind-body problem cannot be grasped, despite the fact that the solution is \"written in our genes\".Emergent materialism is a similar but different claim that humans are not yet smart enough to determine the relationship between mind and matter.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_0" +} \ No newline at end of file diff --git a/test/Knowledge/Community_of_inquiry.json b/test/Knowledge/Community_of_inquiry.json new file mode 100644 index 0000000000000000000000000000000000000000..7ee9e14f5f8d048361a4c9d24758e8dd0a8325ff --- /dev/null +++ b/test/Knowledge/Community_of_inquiry.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "The community of inquiry (CoI) is a concept first introduced by early pragmatist philosophers C.S.Peirce and John Dewey, concerning the nature of knowledge formation and the process of scientific inquiry. The community of inquiry is broadly defined as any group of individuals involved in a process of empirical or conceptual inquiry into problematic situations. This concept was novel in its emphasis on the social quality and contingency of knowledge formation in the sciences, contrary to the Cartesian model of science, which assumes a fixed, unchanging reality that is objectively knowable by rational observers. The community of inquiry emphasizes that knowledge is necessarily embedded within a social context and, thus, requires intersubjective agreement among those involved in the process of inquiry for legitimacy.\nThe Buddhist parable of \"The Blind Men and an Elephant \" offers a colorful way to make sense of the notion of the community of inquiry. The tale finds many blind men fumbling about an elephant, each trying to discover what it is they are touching. They are fixated in disagreement. One finds the elephant's leg and believes it a tree. Another finds its trunk and believes it a rope. Yet another finds its side and believes it a wall. The insight is that we are all trapped inside our limited experience and cannot know the truth. If the blind men only cooperated, forming a community whose goal is inquiry into the strange multifaceted object, they may begin to overcome the problematic situation and discover the true nature of the object of their respective opinions. By sharing their experiences in a democratic and participatory manner they could arrive at a more comprehensive truth than their impoverished perspectives allow, isolated from each other. They would show each other why one found the elephant to be like a rope and the other a tree. They would go further, using other ways to collect evidence (e.g., smell the animal, listen to its sounds). Together they would try to reconcile their conflicting conclusions. The blind men would never see the elephant, but they would no longer be trapped in their own limited perspectives. In short, they would be more likely to resolve the problematic situation, that object is no object at all, it is an elephant. But resolution is never final; even their consensus could be in error. All findings are provisional and subject to revision. This is the scientific quality of the community of inquiry.While Peirce originally intended the concept of the community of inquiry as a way to model the natural sciences, the concept has been borrowed, adapted, and applied in many different fields. This article touches on the contributions in the fields of education and public administration.According to Matthew Lipman, C.S. Peirce originally restricted the concept to the community of scientists. John Dewey broadened the scope of the concept, applying it to the educational setting (Lipman, 2003, pp. 20:21). Borrowing from Dewey, Lipman systematically applies the concept to the educational setting. He argues that a classroom is a type of community of inquiry, which leads to “questioning, reasoning, connecting, deliberating, challenging, and developing problem-solving techniques.” Students and teachers involved in inquiry form a community of inquiry under certain circumstances. Therefore, a holistic understanding of a community of students and teachers engaged in authentic inquiry is the working definition of the key term ‘community of inquiry’. There is a gestalt dimension to the concept that is underlined by Lipman. He points to “….the profound educational implications of fusing together, as Peirce had, the two independently powerful notions of inquiry and community into the single transformative concept of community of inquiry” (2003, p. 84).Lipman defined community of inquiry as a rigorous, democratic and reflective form of discussion built up over time with the same group of learners.Lipman also provides a useful set of antonymic statements that contrasts the standard educational paradigm with the reflective educational paradigm in which communities of inquiry can occur.\nThe standard paradigm poses the following: \neducation as knowledge transmission\nknowledge as unambiguous, unequivocal and un-mysterious,\nknowledge is divided into non-overlapping disciplines\nteachers as authoritative sources of knowledge.\nThe reflective paradigm, in contrast, poses the following: \neducation is the outcome of participation in a teacher-guided community of inquiry\nteachers stir students to think about the world when teachers reveal knowledge to be ambiguous, equivocal, and mysterious,\nknowledge disciplines are overlapping and therefore problematic,\nteachers are ready to concede fallibility,\nstudents are expected to be reflective and increasingly reasonable and judicious\nthe educational process is not information acquisition but a grasp of relationships among disciplines (2003, pp 18:19).\nA community of inquiry can be seen to exist to the degree that it avoids the qualities of this standard paradigm and shows the qualities of this reflective paradigm.\nLipman's and Dewey's ideas were expanded and applied to online learning contexts in a Canadian project that originated in 1996 at the University of Alberta. The project was led by Randy Garrison, Terry Anderson and Walter Archer. The purpose of the study was to provide conceptual order and a tool for the use of Computer-mediated communication in supporting an educational experience.Central to the work is a model of community inquiry that constitutes three elements essential to an educational transaction - cognitive presence, social presence, and teaching presence. Indicators (key words/phrases) for each of the three elements emerged from the analysis of computer conferencing transcripts. The indicators described represent a template or tool for researchers to analyze written transcripts as well as a heuristic guide to educators for the optimal use of computer conferencing as a medium to facilitate an educational transaction. This research suggested that computer conferencing has considerable potential to create a community of inquiry for educational purposes.\nThis project led to production of many scholarly papers, a book and replication of the Community of Inquiry model by distance education researchers globally. The Community of Inquiry model is also used to conceptually guide study research and practice in other forms of mediated, blended and classroom education.\nPatricia M. Shields has applied the community of Inquiry concept to the field of public administration. The community of inquiry is not defined by geographic location, rather a common desire by its members to resolve a problematic situation using a scientific attitude to assess evidence and guide action. The community is also defined by participatory democracy. \"The parameters of the problematic situation and approaches to resolution are shaped by the interaction of the community and the facts\". The democratic community may consider ideals/values such as equality, freedom, effectiveness, justice as it considers goals. There are three key ideas : \"problematic situation, scientific attitude, and participatory democracy\". Shields depiction is similar to Lipman's in that she refines the term inquiry by focusing on the problematic situations and scientific attitude (both concepts developed by Dewey in his book Logic: The Theory of Inquiry. Community is refined as participatory democracy. The two definitions are essentially the same. Shields draws heavily on John Dewey's insights into democracy and inquiry to refine the concept and apply it to public administration.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_1" +} \ No newline at end of file diff --git a/test/Knowledge/Consumerization_of_information_technology.json b/test/Knowledge/Consumerization_of_information_technology.json new file mode 100644 index 0000000000000000000000000000000000000000..775843ace4c07b0fbe13956874faf749aa34efdb --- /dev/null +++ b/test/Knowledge/Consumerization_of_information_technology.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Consumerization is the reorientation of product and service designs to focus on (and market to) the end user as an individual consumer, in contrast with an earlier era of only organization-oriented offerings (designed solely for business-to-business or business-to-government sales). Technologies whose first commercialization was at the inter-organization level thus have potential for later consumerization. The emergence of the individual consumer as the primary driver of product and service design is most commonly associated with the IT industry, as large business and government organizations dominated the early decades of computer usage and development. Thus the microcomputer revolution, in which electronic computing moved from exclusively enterprise and government use to include personal computing, is a cardinal example of consumerization. But many technology-based products, such as calculators and mobile phones, have also had their origins in business markets, and only over time did they become dominated by high-volume consumer usage, as these products commoditized and prices fell. An example of enterprise software that became consumer software is optical character recognition software, which originated with banks and postal systems (to automate cheque clearing and mail sorting) but eventually became personal productivity software.\nIn a different sense, consumerization of IT is the proliferation of personally owned IT at the workplace (in addition to, or even instead of, company-owned IT), which originates in the consumer market, to be used for professional purposes. This bring your own device trend has significantly changed corporate IT policies, as employees now often use their own laptops, netbooks, tablets, and smartphones on the hardware side, and social media, web conferencing, cloud storage, and software as a service on the software side.\nConsumerization has existed for many decades, as, for example, the consumerization of refrigeration occurred in the 1910s through 1950s. The consumerization of IT is believed to have been first regularly called by that term by Douglas Neal and John Taylor of the Leading Edge Forum in 2001; the first known published paper on this topic was published by the LEF in June 2004. The term is now used widely throughout the IT industry, and is the topic of numerous conferences and articles. One of the first articles was special insert in \"The Economist\" magazine on October 8, 2011. Later, Consumerization of IT has been used ambiguously. In an effort to structure the amorphous nature of the term, researchers suggested to take three distinct perspectives: an individual, organizational and market perspective.The technology behind the consumerization of computing can be said to have begun with the development of eight-bit, general-purpose microprocessors in the early 1970s and eventually the personal computer in the late 1970s and early 1980s. Thus, the microcomputer revolution, in which electronic computing moved from exclusively enterprise and government use to include personal computing, is the cardinal example of consumerization. However, it is significant that the great success of the IBM PC in the first half of the 1980s was driven primarily by business markets. Business preeminence continued during the late 1980s and early 1990s with the rise of the Microsoft Windows PC platform. Meanwhile, other technology-based products, such as calculators, fax machines, and mobile phones, also had their origins in business markets, and only over time did they become dominated by high-volume consumer usage, as these products commoditized and prices fell.\nIt was the growth of the World Wide Web in the mid-1990s that began to reverse this pattern. In particular the rise of free, advertising-based services such as email and search from companies such as Hotmail and Yahoo began to establish the idea that consumer IT offerings based on a simple Internet browser were often viable alternatives to traditional business computing approaches. Meanwhile, it is argued that consumerization of IT embodies more than consumer IT diffusion, but a chance for considerable productivity gains. It \"reflects how enterprises will be affected by, and can take advantage of, new technologies and models that originate and develop in the consumer space, rather than in the enterprise IT sector\".\nThe primary impact of consumerization is that it is forcing businesses, especially large enterprises, to rethink the way they procure and manage IT equipment and services. Historically, central IT organizations controlled the great majority of IT usage within their firms, choosing or at least approving of the systems and services that employees used. Consumerization enables alternative approaches. Today, employees and departments are becoming increasingly self-sufficient in meeting their IT needs. Products have become easier to use, and cloud-based, software-as-a-service offerings are addressing an ever-widening range of business needs in areas such as video-conferencing, digital imaging, business collaboration, sales force support, systems back-up, and other areas.Similarly, there is increasing interest in so-called Bring Your Own Device strategies, where individual employees can choose and often own the computers and/or smart phones they use at work. The Apple iPhone and iPad have been particularly important in this regard. Both products were designed for individual consumers, but their appeal in the workplace has been great. They have demonstrated that elements of choice, style and entertainment are now critical computer industry dimensions that businesses cannot ignore.\nEqually important, large enterprises have become increasingly dependent upon consumerized services as search, mapping, and social media. The capabilities of firms such as Google, Facebook, and Twitter are now essential components of many firm's marketing strategies. One of the most important consumerization questions going forward is to what extent such advertising-based services will spread into major corporate applications such as email, Customer Relationship Management (CRM), and Intranets.\nOne of the more serious negative implications of consumerization is that security controls have been slower to be adopted in the consumer space. As a result, there is an increased risk to the information assets accessed through these less trustworthy consumerized devices. In a recent CSOOnline article by Joan Goodchild she reported a survey that found \"when asked what are the greatest barriers to enabling employees to use personal devices at work, 83 percent of IT respondents cited \"security concerns\" This shortcoming may soon be remedied by the chip manufacturers with technologies such as Intel's \"Trusted Execution Technology\" and ARM's \"Trust Zone\" —these technologies being designed to increase the trustworthiness of both enterprise and consumer devices.\nIn addition to the mass market changes above, consumer markets are now changing large-scale computing as well. The giant data centers that have been and are being built by firms such as Google, Apple, Amazon and others are far larger and generally much more efficient than the data centers used by most large enterprises. For example, Google is said to support over 300 million Gmail accounts, while executing more than 1 billion searches per day.Supporting these consumer-driven volumes requires new levels of efficiency and scale, and this is transforming many traditional data center approaches and practices. Among the major changes are reliance on low cost, commodity servers, N+1 system redundancy, and largely unmanned data center operations. The associated software innovations are equally important in areas such as algorithms, artificial intelligence, and Big data. In this sense, consumerization seems likely to transform much of the overall computing stack, from individual devices to many of the most demanding large-scale challenges.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_2" +} \ No newline at end of file diff --git a/test/Knowledge/Ed_Goodgold.json b/test/Knowledge/Ed_Goodgold.json new file mode 100644 index 0000000000000000000000000000000000000000..70fa8ca8ea5b9abce252142ff539de56abeab420 --- /dev/null +++ b/test/Knowledge/Ed_Goodgold.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Edwin \"Ed\" Goodgold (died May 7, 2021) was an American writer, music industry executive, academic administrator. He is known for coining the term \"trivia\" in 1965. He was also the first manager of Sha Na Na.\nGoodgold was born in Israel and grew up in Brooklyn. He attended Samuel J. Tilden High School and graduated from Columbia College in 1965. Goodgold was a history major at Columbia and was features editor of the Columbia Daily Spectator, where he introduced the term \"trivia\" in a February 25, 1965 article, saying that “Trivia is a game played by countless young adults, who on the one hand realize they have misspent their youth and yet, on the other hand, do not want to let go of it.\" In trivia, \"participants try to stump their opponents with the most minute details of shared childhood experiences,\" he wrote.At Columbia, Goodgold held Q&A sessions in dorm lounges with his classmates, trading questions about popular culture of their youth, and hosted a late-night call-in trivia show on WKCR-FM. He also created one of the first intercollegiate Quiz bowls open to the Ivy League and the Seven Sisters colleges in October 1965 and February 1967. Goodgold also wrote the 1966 book,Trivia, with Dan Carlinsky, introducing the subject to a national audience.\nAfter college, Goodgold studied at the New York University School of Law and was manager for the rock-and-roll group Sha Na Na. He then served as Americas manager for the English rock band Genesis.\nIn 1992, Goodgold retired from his music industry career and took up an administrative position in the Steinhardt School of Culture, Education, and Human Development at New York University as assistant to the associate dean.\nGoodgold died on May 7, 2021, in New York City.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_3" +} \ No newline at end of file diff --git a/test/Knowledge/Electronic_lab_notebook.json b/test/Knowledge/Electronic_lab_notebook.json new file mode 100644 index 0000000000000000000000000000000000000000..6a8465da02002a7dd6f40c86bf132e99881bd5c4 --- /dev/null +++ b/test/Knowledge/Electronic_lab_notebook.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "An electronic lab notebook (also known as electronic laboratory notebook, or ELN) is a computer program designed to replace paper laboratory notebooks. Lab notebooks in general are used by scientists, engineers, and technicians to document research, experiments, and procedures performed in a laboratory. A lab notebook is often maintained to be a legal document and may be used in a court of law as evidence. Similar to an inventor's notebook, the lab notebook is also often referred to in patent prosecution and intellectual property litigation.\nElectronic lab notebooks offer many benefits to the user as well as organizations; they are easier to search upon, simplify data copying and backups, and support collaboration amongst many users. \nELNs can have fine-grained access controls, and can be more secure than their paper counterparts. They also allow the direct incorporation of data from instruments, replacing the practice of printing out data to be stapled into a paper notebook.\nELNs can be divided into two categories:\"Specific ELNs\" contain features designed to work with specific applications, scientific instrumentation or data types.\n\"Cross-disciplinary ELNs\" or \"Generic ELNs\" are designed to support access to all data and information that needs to be recorded in a lab notebook.\nLab Platforms that combine an ELN, LIMS, and scientific data management together, all-in-one configurable software environment.\nSolutions range from specialized programs designed from the ground up for use as an ELN, to modifications or direct use of more general programs. Examples of using more general software as an ELN include using OpenWetWare, a MediaWiki install (running the same software that Wikipedia uses), WordPress, or the use of general note taking software such as OneNote as an ELN. Examples of lab platforms that provide an all-in one lab data management solutions that include a combination of ELN, LIMS, SDMS, inventory management and informatics include Labguru, Benchling, Dotmatics, Sapio Sciences and more.\nELN's come in many different forms. They can be standalone programs, use a client-server model, or be entirely web-based. Some use a lab-notebook approach, others resemble a blog. ELNs are embracing artificial intelligence and LLM technology to provide scientific AI chat assistants such as ELaiN.\nA good many variations on the \"ELN\" acronym have appeared. Differences between systems with different names are often subtle, with considerable functional overlap between them. Examples include \"ERN\" (Electronic Research Notebook), \"ERMS\" (Electronic Resource (or Research or Records) Management System (or Software) and SDMS (Scientific Data (or Document) Management System (or Software). Ultimately, these types of systems all strive to do the same thing: Capture, record, centralize and protect scientific data in a way that is highly searchable, historically accurate, and legally stringent, and which also promotes secure collaboration, greater efficiency, reduced mistakes and lowered total research costs.\nA good electronic laboratory notebook should offer a secure environment to protect the integrity of both data and process, whilst also affording the flexibility to adopt new processes or changes to existing processes without recourse to further software development. The package architecture should be a modular design, so as to offer the benefit of minimizing validation costs of any subsequent changes that you may wish to make in the future as your needs change.A good electronic laboratory notebook should be an \"out of the box\" solution that, as standard, has fully configurable forms to comply with the requirements of regulated analytical groups through to a sophisticated ELN for inclusion of structures, spectra, chromatograms, pictures, text, etc. where a preconfigured form is less appropriate. All data within the system may be stored in a database (e.g. MySQL, MS-SQL, Oracle) and be fully searchable. The system should enable data to be collected, stored and retrieved through any combination of forms or ELN that best meets the requirements of the user.\nThe application should enable secure forms to be generated that accept laboratory data input via PCs and/or laptops / palmtops, and should be directly linked to electronic devices such as laboratory balances, pH meters, etc. Networked or wireless communications should be accommodated for by the package which will allow data to be interrogated, tabulated, checked, approved, stored and archived to comply with the latest regulatory guidance and legislation. A system should also include a scheduling option for routine procedures such as equipment qualification and study related timelines. It should include configurable qualification requirements to automatically verify that instruments have been cleaned and calibrated within a specified time period, that reagents have been quality-checked and have not expired, and that workers are trained and authorized to use the equipment and perform the procedures.\nThe laboratory accreditation criteria found in the ISO 17025 standard needs to be considered for the protection and computer backup of electronic records. These criteria can be found specifically in clause 4.13.1.4 of the standard.Electronic lab notebooks used for development or research in regulated industries, such as medical devices or pharmaceuticals, are expected to comply with FDA regulations related to software validation. The purpose of the regulations is to ensure the integrity of the entries in terms of time, authorship, and content. Unlike ELNs for patent protection, FDA is not concerned with patent interference proceedings, but is concerned with avoidance of falsification. Typical provisions related to software validation are included in the medical device regulations at 21 CFR 820 (et seq.) and Title 21 CFR Part 11. Essentially, the requirements are that the software has been designed and implemented to be suitable for its intended purposes. Evidence to show that this is the case is often provided by a Software Requirements Specification (SRS) setting forth the intended uses and the needs that the ELN will meet; one or more testing protocols that, when followed, demonstrate that the ELN meets the requirements of the specification and that the requirements are satisfied under worst-case conditions. Security, audit trails, prevention of unauthorized changes without substantial collusion of otherwise independent personnel (i.e., those having no interest in the content of the ELN such as independent quality unit personnel) and similar tests are fundamental. Finally, one or more reports demonstrating the results of the testing in accordance with the predefined protocols are required prior to release of the ELN software for use. If the reports show that the software failed to satisfy any of the SRS requirements, then corrective and preventive action (\"CAPA\") must be undertaken and documented. Such CAPA may extend to minor software revisions, or changes in architecture or major revisions. CAPA activities need to be documented as well.\nAside from the requirements to follow such steps for regulated industry, such an approach is generally a good practice in terms of development and release of any software to assure its quality and fitness for use. There are standards related to software development and testing that can be applied (see ref.).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_4" +} \ No newline at end of file diff --git a/test/Knowledge/Episteme.json b/test/Knowledge/Episteme.json new file mode 100644 index 0000000000000000000000000000000000000000..37fe7f51c9fe4c3fd90e08f8242a690c6752d9cb --- /dev/null +++ b/test/Knowledge/Episteme.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "In philosophy, episteme is knowledge or understanding. The term epistemology (the branch of philosophy concerning knowledge) is derived from episteme.\nPlato, following Xenophanes, contrasts episteme with doxa: common belief or opinion. The term episteme is also distinguished from techne: a craft or applied practice. In the Protagoras, Plato's Socrates notes that nous and episteme are prerequisites for prudence (phronesis).Aristotle distinguished between five virtues of thought: technê, epistêmê, phronêsis, sophia, and nous, with techne translating as \"craft\" or \"art\" and episteme as \"knowledge\". A full account of epistêmê is given in Posterior Analytics, where Aristotle argues that knowledge of necessary, rather than contingent, truths regarding causation is foundational for episteme. To emphasize the necessity, he uses geometry. Notably, Aristotle uses the notion of cause (aitia) in a broader sense than contemporary thought. For example, understanding how geometrical axioms lead to a theorem about properties of triangles counts as understanding the cause of the proven property of the right triangle. As a result, episteme is a virtue of thought that deals with what cannot be otherwise, while techne and phronesis deal with what is contingent.In any given culture and at any given moment, there is always only one épistémè that defines the conditions of possibility of all knowledge, whether expressed in a theory or silently invested in a practice.\nIn subsequent writings, he makes it clear that several épistémè may co-exist and interact at the same time, being parts of various power-knowledge systems. Foucault attempts to demonstrate the constitutive limits of discourse, and in particular, the rules enabling their productivity; however, Foucault maintains that, though ideology may infiltrate and form science, it need not do so: it must be demonstrated how ideology actually forms the science in question; contradictions and lack of objectivity are not an indicator of ideology. Jean Piaget has compared Foucault's use of épistémè with Thomas Kuhn's notion of a paradigm.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_5" +} \ No newline at end of file diff --git a/test/Knowledge/Free-floating_intellectuals.json b/test/Knowledge/Free-floating_intellectuals.json new file mode 100644 index 0000000000000000000000000000000000000000..2187d04866014852e92470f7b7549eb46a7a67b2 --- /dev/null +++ b/test/Knowledge/Free-floating_intellectuals.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Free-floating intellectuals or free-floating intelligentsia (German: Freischwebende Intelligenz) is a term from the sociology of knowledge that was used by the sociologist and philosopher Karl Mannheim in 1929, but was originally coined by the sociologist Alfred Weber. It includes the members of the intelligentsia, whose relative independence as a socially undefined class allows them to break away from the normative thinking of their environment and to act independently of social class conditions. The intellectual floats (relatively) freely above things and tasks and is therefore less tied to ideology than other people. Karl Mannheim applied this to the political as well as the economic and cultural areas. According to Mannheim, the socially free-floating intellectuals is unbound, critical and sensitive. It is able to represent pluralistic views and have a positive impact on social conditions.\nMannheim sought a way out of the dilemma that the human mind moves within social bonds and biases in contemplation, reasoning and knowledge, but on the other hand wants to and, in his opinion, can find unadulterated truths.\nCritics dispute that it is possible to transcend the historical, social, cultural and psychological determinants for a particular group in society.According to Magnus Klaue, Mannheim called free-floating intellectuals the “milieu that shaped the Weimar Republic, which emerged as a result of the crisis of the educated middle class and in which (even then often unemployed) academics, private scholars, wealthy but professionally unambitious middle-class sons and lumpen intellectuals came together.” He has want to point out both the possibilities of this milieu for social and intellectual independence and the danger that it sees itself as an intellectual avant-garde, rejects bourgeois normality as bourgeois and wants to impose its own moral views on the “backward” majority.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_6" +} \ No newline at end of file diff --git a/test/Knowledge/Hermathena_(composite_of_Hermes_and_Athena).json b/test/Knowledge/Hermathena_(composite_of_Hermes_and_Athena).json new file mode 100644 index 0000000000000000000000000000000000000000..01f65ac1f58842572e6617654ebe826d1c970cf3 --- /dev/null +++ b/test/Knowledge/Hermathena_(composite_of_Hermes_and_Athena).json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Hermathena or Hermathene (Ancient Greek: Ἑρμαθήνη) was a composite statue, or rather a herm, which may have been a terminal bust or a Janus-like bust, representing the Greek gods Hermes and Athena, or their Roman counterparts Mercury and Minerva.\nIt was natural to see these two deities unified or fused as one form: the Greek god Hermes presided over eloquence, the goddess Athena over crafts and the sciences. The reverse of a medal of the Roman Emperor Hadrian, who prided himself on his learning and eloquence, depicts Hermathena. In early Greek poetry and myth, Hermes and Athena share or 'double' each other's functions, and some of their powers are alternate and related versions of the same quality. For example, each god embodies the kind of clever intelligence or metis that manifests itself in the clever ruse and the winning strategy. For Hermes this quality leans toward the 'night-time' realm of stealth and theft, cunning deception, and successful guidance to the underworld; while for Athena it leans toward the 'day-time' realm of good judgement, quick thinking, and successful guidance on the battlefield. Hermes and Athena were also described as half-siblings because Zeus was the father of both gods. Additionally, both Hermes and Athena guided cunning heroes like Perseus, Herakles, and Odysseus.The only literary sources concerning Hermathena are found in letters by Cicero to Atticus. Atticus had obtained a rare herm of Athena from Athens for Cicero's Tusculanum (Tusculum villa) in 67:65 BC.Cicero writes to Atticus: \"Your Hermathena pleases me greatly. It stands so prettily that the whole lecture-room looks like a votive chapel of the deity. I am greatly obliged to you\".\nHe returns to the subject in another letter. Atticus had probably purchased for him another sculpture of the same kind.\n\"What you write about the Hermathena pleases me greatly. It is a most appropriate ornament for my own little 'seat of learning.' Hermes is suitable every where, and Minerva is the special emblem of a lecture-room. I should be glad if you would, as you suggest, find as many more ornaments of the same kind for the place\".\nIt was common during the Roman period for the elite to collect herms and terminal figures as garden ornaments and interior decorations for their villas and palaces. Having a statue of Hermathena may have also been believed to give divine inspiration.One of the few surviving Hermathenas is on display at the Naples National Archaeological Museum. A bust of Athena from the 1st century BC (circa 49:25 BC), that had once topped a terminal pillar, was found at the Villa of the Papyri at Herculaneum.\nDuring the Renaissance, a number of artists, for example Rubens and Vincenzo Cartari, portrayed Hermathena in art either as two gods acting in conjunction, or as a single deity with the attributes of the other, for example Athene holding the caduceus, which was a symbol of Hermes. On the ceiling at the Villa Farnese is a late-16th-century fresco of Hermathena, called the Gabinetto dell'Ermatena, by Federico Zuccari; the fresco depicts an androgynous fusion of the deities.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_7" +} \ No newline at end of file diff --git a/test/Knowledge/Hikmah.json b/test/Knowledge/Hikmah.json new file mode 100644 index 0000000000000000000000000000000000000000..f59c78f10d6d7273134f99df6fa38e7a3f42d7a3 --- /dev/null +++ b/test/Knowledge/Hikmah.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Hikmah (also Hikmat, Arabic: حكمة, ḥikma) is an Arabic word that means wisdom, sagacity, philosophy, rationale or underlying reason. The Quran mentions \"hikmah\" in various places, where it is understood as knowledge and understanding of the Quran, fear of God, and a means of nourishing the spirit or intellect. Hikmah is sometimes associated with prophethood, faith, intelligence ('aql), comprehension (fahm), or the power of rational demonstration. In the Quran, God bestows wisdom upon whomever He chooses, and various individuals including the House of Abraham, David, Joseph, Moses, Jesus, Muhammad and Luqman are said to have received wisdom. The Quran also uses the term hikmah in connection with the Book or the scripture in general. The Quran also refers to itself as the Wise Book, and refers to God as The Wise in several places. \nHadith literature also emphasizes the importance of acquiring hikmah, which is believed to have been reflected in the sunnah of the Prophet. \nIbn Sina believed that the concept of \"hikmah\" is intricately related to the actualization and refinement of the human soul. He described it as the process of achieving perfection of the human soul through the understanding of things and the assessment of both theoretical and practical truths according to human capacity. Mulla Sadra characterized hikmah as a means by which humans can attain a level of understanding that makes them resemble the objective world and align with the order of the universe. He categorized hikmah into two types - theoretical and practical. Theoretical hikmah pertains to faith, while practical hikmah pertains to good deeds. Fakhr al-Din al-Razi equated hikmah with kalam, while Seyyed Hossein Nasr linked it to sapiential knowledge. Hikmah has also been linked to intellectual sciences, particularly traditional philosophy. \nOn a more practical level, hikmah has been explained in several ways, such as acquiring knowledge through best of sciences, combining knowledge with action, having practical experience, applying fair judgment, understanding the true nature of things, avoiding ignorance, placing things in their proper context and assigning them their rightful status, and doing good deeds.\nHikmah is an Arabic word that means wisdom, sagacity, philosophy, rationale or underlying reason. Seyyed Hossein Nasr asserts that the Arabic term \"hikmah\" has a distinct meaning that does not align with modern European philosophy or theology. Rather, it is more closely related to the original Greek concept of theosophy. For Nasr, hikma is also sapiential because its meaning is related to the Latin word \"sapere\" and the Arabic word \"dhawq,\" both of which mean \"taste.\" Additionally, hikmah can be considered \"speculative wisdom\" because it seeks to make the human soul a mirror, reflecting divine knowledge, which is similar to the meaning of the Latin word \"speculum,\" which means \"mirror.\"The term \"hikmah\" is mentioned in various places of the Quran, but one of the most commonly cited is \"He giveth wisdom [hikmah] unto whom He will, and he unto whom wisdom is given, he truly hath received abundant good\". (2). In the Quran, God thus bestows wisdom upon whomever He chooses. In this context, \"Wisdom\" is interpreted to mean knowledge and understanding of the Quran, fear of God, intelligence ('aql), comprehension (fahm), the power of rational demonstration, or prophethood. Wisdom is believed to nourish the spirit or intellect. Although wisdom is not the same as right action, it combines understanding and right action. In the words of al-Zamakhshari, the starting point and cornerstone of all wisdom is the recognition and comprehension of the Oneness of God (tawḥīd).In the Quran, the term \"wisdom\" is mentioned in several places alongside \"the Book\" or the Scripture. The Prophet Muhammad thus is reported to have been granted the Book and Wisdom (2; 3; 4). In 2 of the Quran, Abraham prays to God, asking Him to raise a messenger from among his people who will recite God's signs to them, teach them the Book and Wisdom, and purify them. This prayer is taken to be granted in 2, where it is stated that God sent a messenger from among his people who recites God's signs, purifies them, teaches them the Book and Wisdom, and also teaches them what they did not know. This messenger is understood to be Muhammad. According to the Study Quran, the term \"wisdom\" in 2 is understood as a reference to the Sunnah, which encompasses Muhammad's exemplary sayings and actions, or more generally to knowledge and understanding of the religion. However, the Study Quran notes that the Quranic pairing of the Book and Wisdom has a more universal significance, as it has been used in relation to other Quranic figures, such as Jesus (3; 5), the Children of Israel (45), and the House of Abraham (4). According to the Quran, God bestowed wisdom on many individuals, including David (2), Joseph (12), Moses (28), and Luqman, who is not considered a prophet by majority.\nThe Quran instructs people to invite others to God using wisdom (16), which can be understood as calling others to religion based on the revelation that has been received, using clear and truthful language, and presenting convincing evidence that brings intellectual certainty. Some scholars, such as al-Rāzī, consider the latter approach to be the most effective way of calling people to the way of God.\nMoreover, the Quran refers to itself as the Wise Book in several places as in 10 and 31. In 3, it refers to itself as \"The Wise Reminder\" (al-dhikr al-ḥakīm). The Quran also refers to God as The Wise (al-Ḥakīm) in numerous places as in 31 (He is the Mighty, the Wise).\n\"Hikmah\" also appears in Hadith literature, which comprises the teachings and sayings of Muhammad. One Hadith emphasizes that \"the acquisition of hikmah is incumbent upon thee: verily the good resides in hikmah\". Another Hadith cautions against speaking of \"hikmah\" to fools, stating \"speak not of hikmah to fools.\"Muslim authorities have disagreed on the meaning of hikmah in Quranic verses and prophetic sayings, with some like Fakhr al-Din al-Razi associating it with kalam. However, throughout Islamic history, many have linked hikmah to intellectual sciences, particularly traditional philosophy, and this field came to be known as \"al-hikma al-ilahiyyah\" or \"theosophia\" in its original sense in Persia. Various Islamic commentaries describe hikmah as \"to know the best of things by way of the best of sciences ...\", having experience, using \"justice in judging\", \"knowledge of the reality of things\", \"that which prevents ignorance,\" and putting \"things in their proper places, assigning them to their proper status\". In Ibn Sina's view, \"hikmah\" is closely tied to the realization and perfection of the human soul, as he defines it as \"the perfecting of the human soul through the conceptualization of things and the judgment of theoretical and practical truths to the measure of human capability\". According to Seyyed Hossein Nasr, Ibn Sina's definition implies a \"close accordance between knowledge and its practice\", which became influential in later Islamic philosophy. Mulla Sadra defined hikmah as the tool through which \"man becomes an intelligible world resembling the objective world and similar to the order of universal existence.\" Sadra suggests that Muhammad's prayer to God to \"show us things as they really are\" is referring to this concept of hikmah. In addition, Sadra explains the Quranic verse \"Surely We created man of the best stature, then We reduced him to the lowest of the low, save those who believe and do good works\" (95) by interpreting \"the best stature\" as the spiritual realm and the angelic part of the soul, and \"the lowest of the low\" as the material world and the animalistic aspect of the soul, while stating that \"those who believe\" refers to theoretical hikmah, and \"those who do good works\" alludes to practical hikmah. According to this viewpoint, hikmah involves both knowledge and action, and it rescues humans from their wretched state and restores them to a paradisial state. Mulla Sadra argues that hikmah is tied to religion and spiritual life, and it is distinct from Western philosophy, which focuses mainly on mental activities.As a term of fiqh (Islamic jurisprudence), Taqi Usmani describes it as \"the wisdom and the philosophy taken into account by the legislator while framing the [Islamic] law or the benefit intended to be drawn by [the law's] enforcement\". One Dr Dipertua calls it \"the objectives and wisdom\" as \"prescribed by Shariah\".Usmani gives as an example the secular law for traffic lights, where illat (another term of fiqh meaning \"the basic feature of a transaction that causes relevant law to be applied\") is obedience to stopping at red lights, and hikmah is traffic safety—avoiding vehicle and pedestrian collisions.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_8" +} \ No newline at end of file diff --git a/test/Knowledge/Intellectual_capital_management.json b/test/Knowledge/Intellectual_capital_management.json new file mode 100644 index 0000000000000000000000000000000000000000..bd53bbea6fe710cc31d53821217780fe27770d6c --- /dev/null +++ b/test/Knowledge/Intellectual_capital_management.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Intellectual capital is the sum of all knowledge; implying that knowledge that exists at different levels both within or outside the organisation has to be taken into account for intellectual capital. The intangible nature of many knowledge products and processes, in combination with the increasing importance of their value in corporate balance sheets leads to a growing interest in management of intellectual capital. Creating, shaping and updating the stock of intellectual capital requires the formulation of a strategic vision, which blends together all three dimensions of intellectual capital (Human, Structural and Relational Capital) within the organisational context through exploration and exploitation, measurement and disclosure. Therefore, the organisational value of intellectual capital is developed via an ongoing and emergent process focused on the capability to leverage, develop and change the dimensions. The management of intellectual capital is conceptualised as occurring via a multiple stage process, governed by an evolutionary logic. The intellectual capital management is defined as a cycle of four inter-related sets of practices: Strategic Alignment, Exploration and Exploitation, Measurement and Reporting of intellectual capitals.\nHowever, an extensive literature has found that one of the main risks for intellectual capital comes from inside the organizations. Employees have access to organizations’ confidential information and key technology and therefore tend to add risks if Procedural information security countermeasures (PCM) are not taken care of adequately. An example of good measure for robust intellectual capital management that could decrease insider risk is setting up education, training and awareness (SETA) programs.\nIntellectual capital plays an important role in generating value for companies, as well as for the global economy. With the understanding of the value of the intellectual capital, companies have developed completely new ways to manage existing knowledge. This had has many strategic implications for organizations business operations. The strategic role of the intellectual assets is therefore constantly growing and organizations are looking for more effective intellectual capital management practices. Because of importance of intellectual capital, nowadays we are talking about knowledge workers who are constantly modifying, utilizing and creating new knowledge to add value to the operations of companies.\nTherefore, it can be said that the management of intellectual capital is a significant factor in organizations value creation. Sometimes intellectual capital is also associated with the term knowledge management. Researches have tried to find out the connection between these terms.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_9" +} \ No newline at end of file diff --git a/test/Knowledge/Knowledge_Economic_Index.json b/test/Knowledge/Knowledge_Economic_Index.json new file mode 100644 index 0000000000000000000000000000000000000000..02b45398788b3dc7c1d429c94c29f27866310387 --- /dev/null +++ b/test/Knowledge/Knowledge_Economic_Index.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "The Knowledge Indexes were designed as a tool for benchmarking a country's position in relation to others in the global knowledge economy. It was created by the World Bank Institute using the Knowledge Assessment Methodology (KAM). The World Bank discontinued the index after 2012 and it was replaced by The Global Knowledge Index (GKI) from Knowledge4All, a joint initiative between the United Nations Development Programme (UNDP) and the Mohammed bin Rashid Al Maktoum Knowledge Foundation (MBRF). Criteria listed in a European Bank for Reconstruction and Development (EBRD) document on the KEI published in 2019 include institutional & legal frameworks (as a basis for patents etc.), number of technical graduates, research spending, number of patents, some measure of collaboration, and amount of venture capital. In total, 38 contributing indicators are described in the ERBD index methodology.\nThe Knowledge Index (KI) is an economic indicator prepared by the World Bank Institute to measure a country's ability to generate, adopt and diffuse knowledge. Methodologically, the KI is the simple average of the normalized performance scores of a country or region on the key variables in three Knowledge Economy pillars - education and human resources, the innovation system and information and communication technology (ICT).The Knowledge Economy Index (KEI) takes into account whether the environment is conducive for knowledge to be used effectively for economic development. It is an aggregate index that represents the overall level of development of a country or region towards the Knowledge Economy. The KEI is calculated based on the average of the normalized performance scores of a country or region on all 4 pillars related to the knowledge economy - economic incentive and institutional regime, education and human resources, the innovation system and ICT.An economic and institutional regime to provide incentives for the efficient use of existing and new knowledge and the flourishing of entrepreneurship;An educated and skilled population to create, share, and use knowledge well;\nAn efficient innovation system of firms, research centers, universities, consultants and other organizations to tap into the growing stock of global knowledge, assimilate and adapt it to local needs, and create new technology;\nInformation and communication technology to facilitate the effective creation, dissemination, and processing of information.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_10" +} \ No newline at end of file diff --git a/test/Knowledge/Knowledge_broker.json b/test/Knowledge/Knowledge_broker.json new file mode 100644 index 0000000000000000000000000000000000000000..faf6dab9c84f62e7edab5bfbea8e8a1face4d188 --- /dev/null +++ b/test/Knowledge/Knowledge_broker.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "A knowledge broker is an intermediary (an organization or a person), that aims to develop relationships and networks with, among, and between producers and users of knowledge by providing linkages, knowledge sources, and in some cases knowledge itself, (e.g. technical know-how, market insights, research evidence) to organizations in its network.\nWhile the exact role and function of knowledge brokers are conceptualized and operationalized differently in various sectors and settings, a key feature appears to be the facilitation of knowledge exchange or sharing between and among various stakeholders, including researchers, practitioners, and policy makers.\nA knowledge broker may operate in multiple markets and technology domains.\nThe concept of knowledge brokers is closely related to the concept of knowledge spillovers.\nIn the fields of public health, applied health services research, and social sciences, knowledge brokers are often referred to as bridges or intermediaries that link producers of research evidence to users of research evidence as a means of facilitating collaboration to identify issues, solve problems, and promote evidence-informed decision making (EIDM), which is the process of critically appraising and incorporating the best available research evidence, along with evidence from multiple other sources into policy and practice decisions.\nUsing a knowledge broker to facilitate the exchange of knowledge and the adoption of insights is one strategy in the broader field of Knowledge Management.\nKnowledge brokers facilitate the transfer and exchange of knowledge from where it is abundant to where it is needed, thereby supporting co-development and improving the innovative capability of organizations in their network. In the field of public health, knowledge brokers facilitate the appropriate use of the best available research evidence in decision making processes, enhancing individual and organizational capacity to participate effectively in evidence-informed decision making. In this setting, knowledge brokers promote research use.Knowledge brokers are typically involved in the following activities below:\nAssessing barriers and establishing access to knowledge (i.e. screening and recognizing valuable knowledge across organizations and industries)\nLearning (e.g. internalizing experiences from a diverse range of perspectives including those of industry, technology or health disciplines)\nLinking of separate knowledge pools (e.g. through joint research, consulting services, and developing a mutual understanding of goals and cultures\nSupporting knowledge and skill development\nFacilitating individual/organizational capacity development for knowledge use (e.g., assessing current knowledge use, absorptive and receptive capacity, and readiness for change)\nImplementing knowledge in new settings (e.g. combining existing knowledge in new ways)\nKnowledge brokers provide a link between the producers and users of knowledge. To facilitate this knowledge exchange, knowledge brokers are required to build rapport with their target audiences and forge new connections across domains.Research into effective knowledge brokers, conducted by University of Oxford researchers, found that committed knowledge leadership is key to mobilizing research across organisational boundaries and embedding it in practice. In the longitudinal research funded by the National Institute for Health and Care Research (NIHR), the study found three variations of knowledge leadership, of transposing, appropriating and contending academic research.\nA successful knowledge broker will possess:\nExpertise in synthesizing and adapting information for use in different local contexts\nA non-judgmental, respectful manner\nExcellent written and oral communication skills\nStrong interpersonal and networking skills\nAn understanding of the context, processes, and key influencers of both the producers and users of knowledge\nCritical thinking skills\nCritical reflection abilities and practices\nStrategic planning skills and experience\nAn understanding of (higher-)education principles and practices\nKnowledge brokers possess a portfolio of intellectual capital or expertise typically spanning the \"specialized jargon, knowledge, and form(s) of reasoning\" of multiple disciplines. Assuming that expertise lends itself to interdisciplinary exchange, the adequacy of a knowledge broker's understanding of a field can also be understood in terms of their possession of varieties of intellectual autonomy concerning the field, as suggested by Nguyen (2018):\nDirect autonomy is \"where we seek to understand arguments and reasons for ourselves.\"\nDelegational autonomy is \"where we seek to find others to invest with our intellectual trust when we cannot understand.\"\nManagement autonomy, is \"where we seek to encapsulate fields, in order to manage their overall structure and connectivity.\"\nNguyen (2018) responds to Elijah Millgram's The Great Endarkenment, where Millgram proposes between-field translation to reduce the internal and mutual incomprehensibility (i.e., for experts in a discipline, and between respective disciplines) of hyperspecialized disciplines. The goal of translation is intellectual transparency, or making clear the models, values, defeaters, and trade-offs of arguments in and between disciplines.\nIntellectual transparency is currently scarce due to both the above cited incomprehensibility problems, and the inevitability of mistakes (out of anyone's purview, due to resource constraints in personal and group knowledge management) accruing in \"modern scientific practical arguments,\" draped across many fields\" that are already individually difficult to keep tabs on. Nguyen argues that \"intellectual transparency will help us achieve direct autonomy, but many intellectual circumstances require that we exercise delegational and management autonomy. However, these latter forms of autonomy require us to give up on transparency\" (pp. 1).\nEvery individual or organization, which has access to knowledge from several, unconnected entities, can theoretically act as a knowledge broker. Certain types of organizations have been identified to be acting primarily as knowledge brokers:Dedicated knowledge brokers \n(i.e. ESADE Creapolis, IMCG Archived 2013-11-13 at the Wayback Machine and Sociedade Portuguesa de Inovação)\nVenture capitalists \nConsulting firms\nEvidence-informed decision making support organizations (e.g., Health Evidence, which offers dedicated knowledge brokers to mentor or facilitate evidence-informed decision making in public health organizations, and the National Collaborating Centre for Methods and Tools, which has knowledge brokers facilitating a public health Community of Practice\nA project funded by the Climate & Development Knowledge Network is aiming to integrate sources of climate change information and tailor data into relevant information products. Access to reliable information and data, and the ability to share lessons and experience, are considered key ingredients in tackling climate change, particularly within developing countries. However, although numerous websites, portals and online platforms have been set up to provide such information, the ‘knowledge infrastructure’ within the climate and development sector is still weak. The project aims to fill some of the gaps and provide bridges between isolated initiatives.A study by IISD investigated the value of knowledge brokers within the climate change sphere. Interviews and surveys were conducted with more than 200 online climate change information users to understand their needs, preferences and behaviours. The findings were published in the paper \"A user-oriented analysis of online knowledge brokering platforms for climate change and development\". This publication identifies potential areas for innovation in online knowledge brokering and highlights the need for taking climate knowledge brokering beyond its online functions.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_11" +} \ No newline at end of file diff --git a/test/Knowledge/Leisure_studies.json b/test/Knowledge/Leisure_studies.json new file mode 100644 index 0000000000000000000000000000000000000000..eb87e1dc92b6fe112ee90e918807ba9202e489f8 --- /dev/null +++ b/test/Knowledge/Leisure_studies.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Leisure studies is a branch of the social sciences that focuses on understanding and analyzing leisure. Recreation and tourism are common topics of leisure research.\nThe National Recreation and Park Association is the national organization in the United States for leisure studies, and offers accreditation to many universities to offer courses of study (degree programs) in leisure studies.\nThe Journal of Leisure Research and Journal of Park and Recreation Administration are some scholarly US academic journals of leisure studies.\nWhile leisure studies has existed for much longer, a first centralized organization for directing leisure studies was established in Birmingham, England, in May 1975, and is known as the Leisure Studies Association. In 1984, the first international conference was held by the LSA at the University of Sussex in Brighton, which also set the record as the largest LSA event held to date with over 275 attendees. LSA conferences are widely regarded as some of the most attended events for leisure researchers in the world.Pursuing a degree in leisure studies will give students the opportunity to learn how to incorporate leisure into recreational activities and tourism. Students take a wide variety of classes ranging from psychology and social sciences to biology and anatomy. Students learn how to improve and foster a healthy life through leisure.The leisure activities that people who work in leisure studies deal with include a very broad range of activities. Most of the activities can be separated into 3 sub-categories: sport and recreation, tourism, and general leisure.Sport and recreation activities is one of the broadest categories in leisure studies. This includes sports, both traditional and non-traditional, and any indoor or outdoor physical activities done for recreational purposes. Sport and recreation activities includes, but is not limited to, swimming, running, hiking, weight lifting, playing games and other outdoor recreation.\nTourism describes the traveling for leisure purposes. Destinations include parks and national parks, hikes, and domestic and foreign cities.\nAll other activities that are not considered to be a part of sport and recreation or tourism are included general leisure activities. This category is quite vast, and includes, but are not limited to, yoga, the arts, nature conservation, and other hobbies.\nA bachelor's degree in leisure studies qualifies graduates for a wide range of entry level recreational occupations in the private and public sectors. Leisure Service jobs involve a variety of leisure, recreational and sport settings for all age groups, populations, and diverse geographical locations. The U.S. Bureau of Labor Statistics report that 345,400 recreation worker jobs existed in the U.S. as of 2012 and the mean annual wage for a recreation worker was $25,430. The leisure studies field is expected to grow 14% from 2012:2022. This is growing as fast as the average of all jobs and is potentially due to increasing childhood obesity rates and the aging baby-boomers generation.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_12" +} \ No newline at end of file diff --git a/test/Knowledge/Relative_age_effect.json b/test/Knowledge/Relative_age_effect.json new file mode 100644 index 0000000000000000000000000000000000000000..0bb99cd696f9c93ab4eba92d45352c2e27c685d8 --- /dev/null +++ b/test/Knowledge/Relative_age_effect.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "The term relative age effect (RAE), also known as birthdate effect or birth date effect, is used to describe a bias, evident in the upper echelons of youth sport and academia, where participation is higher amongst those born earlier in the relevant selection period (and lower for those born later in the selection period) than would be expected from the distribution of births. The selection period is usually the calendar year, the academic year or the sporting season.\nThe difference in maturity often contributes to the effect, with age category, skill level and sport context also impacting the risk of the relative age effect. Mid to late adolescent, regional to nation, popular sports seeing the highest risk, and under 11, recreational, unpopular sports seeing the lowest risk.\nThe terms month of birth bias and season of birth bias are used to describe similar effect but are fundamentally different. Season of birth examines the influence of different prenatal and perinatal seasonal environmental factors like sunlight, temperature, or viral exposure during gestation, that relate to health outcomes. Conversely, the relative age effect shifts with selection dates moving the advantage with the selection period. With influence from social agents, children born soon after the cut-off date are typically included, and a child born soon before the cut-off date excluded.\nYouth sport participation is often organized into annual age-groups. The IOC, FIFA and the six international football confederations (AFC, CAF, CONCACAF, CONMEBOL, OFC and UEFA) all use 1 January as their administrative cut-off which is most commonly used but, 1 September is used in the UK, like many other locations around the world. This grouping can be seen in the first graph showing the distribution of births, by month, for the European Union over the ten years from 2000 to 2009. The birth rate correlates closely with the number of days in a month with a slight increase in the summer months. The second graph, by the month, shows the birth distribution of over 4,000 players involved in the qualifying squads for U17, U19 and U21 tournaments organised by UEFA in 2010:11.This declining distribution from the beginning of the year for professional athlete participation has been seen in sports like: association football, baseball, cricket, gymnastics, handball, ice hockey, rugby league, running, skiing, swimming, tennis, and the Youth Olympic Games, as well as non-physical sports like shooting.\nMalcolm Gladwell's book Outliers: The Story of Success and the book SuperFreakonomics by Steven Levitt and Stephen Dubner, popularised the issue in respect of Canadian ice-hockey players, European football players, and US Major League baseball players.\nRelative age effects are caused by birthdate eligibility rules but can be affected by parents, coaches and athletes through other mechanisms. The Pygmalion effect, Galatea effect, and Matthew effect are examples of effects which impact player motivation.In addition to these social factors contextual differences change the distribution with decreased effects in female sports, unpopular sports, at different ages, individual sports, or sports with a lower reliance on body size, with an expected increased effect in male sports, popular sports, or competitive sports. The sports popularity in a geographical or cultural area will affect the relative age distribution relative, with examples seen in volleyball and American football.\nThe early maturation levels giving physical advantages to first quarter individuals can create the bias, seen in players' height in basketball, dominant hand in tennis, or size in a cricket position, but physical size isn't always the cause. Older individuals also gain more competence and self-efficacy, increasing the performance gap. These advantages lead to increased dropout rates for Q1 births. However, the bias for sports where height and mass impedes flexibility, rotational speed and the strength to mass ratio, maturational delay may be preferred as seen in gymnastics.\nWith an adult group the relative age has the opposite meaning, as performance declines in age, and is more significant with more physically demanding sports, depending on what age the average peak performance level is, in that sport. The \"underdog effect\" has shown that those late birth individuals may see better chances if they are selected to play, with the advantage decreasing after selection.\nPlaying position, federation membership, and individual and team performance also contribute to the effect, with older players having a higher risk of injury.\nVarious methods have been suggested and tested to reduce the relative age effect like moving the cut off dates, expanding the age group range, birthdate quotas for the players, the average team age (ATA) method for eligibility, or grouping by height and weight. Some methods have struggled to find success due to the effect moving with selection dates. Making the relative age known to the individuals in the environment have shown less bias in talent identification reducing the relative age effect.Birthday banding, and re-calculating scores based on relative age, are other methods used to reduce the effects, with bio-banding seeing the most research, showing benefit to early and late maturing players, both in academy football and in recreational football. Bio-banding can help promote appropriate training loads and reduce injury risk, while increasing technical demands from players, however, sports already categorized by maturation metrics like Judo, may not see those effects. More longitudinal studies are needed, alongside more reliable ways to band individuals, as biological, psychological and social development doesn't progress in synchrony, creating different imbalances in the groups.\nThe Academic year is decided by education authorities with August or September being common cut-off dates in the Northern Hemisphere and February or March cut-off dates in the Southern Hemisphere.The third graph illustrates the relative age effect in graduations from the University of Oxford over a 10-year period, which has also been seen in UK Nobel laureates.\nThe relative age effect and reversal effect are evident in education, with older students on average scoring higher marks, getting into more gifted and talented programs, and being more likely to attend higher education in academic schools over vocational schools, not necessarily due to higher intelligence. The Matthew effect again plays a role, as the skills learned early in education compound over time, increasing the advantage, with older students becoming more likely to take up leadership roles. However, like in sport, the effect diminishes over time after middle school, and those born later in the year perform better in university education.\nA relative age effect has also been observed in the context of leadership. An over-representation starts in high-school leadership activities such as sports team captain or club president. Then in adult life, this over-representation has been observed in top managerial positions (CEOs of S&P 500 companies), and in top political positions, both in the USA (senators and representatives), and in Finland (MPs).Seasonal birth in humans varies, and alongside the relative age effect the epidemiology of seasonal births show over-representations in health conditions like ADHD and schizophrenia, with one study finding \"that higher school starting age lowers the propensity to commit crime at young ages.\" However, other studies failed to replicate relative age effects on temperament, mood, or physical development.Obesity has been linked to season of birth with increased chances, potentially due to surrounding temperature at birth, with winter and spring having the highest correlation, but physical inactivity is still a larger risk factor.\nSummer babies have increased chances of specific learning difficulties, and winter and spring babies related to schizophrenia and mania/bipolar disorder. Schizoaffective disorder can be related to December:March births, major depression to March:May births, and autism to March births.\nIncreased rates in seasonal affective disorder relate to the influence of seasonal birth in humans.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_13" +} \ No newline at end of file diff --git a/test/Knowledge/Social_work_management.json b/test/Knowledge/Social_work_management.json new file mode 100644 index 0000000000000000000000000000000000000000..e4dc39bb7ff2fab9c9b3d7a9888bc4e9128f6e73 --- /dev/null +++ b/test/Knowledge/Social_work_management.json @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Social work management is the management of organisations or enterprises in the social economy and non-profit sector, e.g., public service providers, charities, youth welfare offices, associations, etc. \nSocial work management has been traditionally pursued by social workers, social pedagogues, pedagogues, psychologists without additional management skills and knowledge or legal practitioners and business economists : often without reference to the social economy. Furthermore, Social work management is a field of education & practice established since 1980s in Europe & North America that focuses on person-centred leadership, motivation & strategic issues. It manages organizations in social economy & non-profit sector.\nMost scholars and practitioners agree that social work managers need to have a high degree of leadership skills to make considered managerial decisions, to empower social workers, to develop staff within and collaborate with partners outside the social and human service organisation. Social work management as a field of social work education and practice was established in many universities in Europe and North America since the 1980s. Established qualifications in higher education first included diplomas in social economy. It originally focused on person-centred leadership, motivation and strategic issues. It combines management with social pedagogical, psychological, and sociological knowledge and skills.\nIn today's understanding, social management includes all management functions that are necessary for the management of social and/or non-profit organizations. This includes finance and accounting of social organizations, development of mission statements and concepts, city and social marketing, public relations, organizational development, human resource management, project management, quality management and other sub-disciplines of management and business administration.In contrast to management in other industries, branches and areas of the economy (e.g. sports management or media and education management), social work management takes into account characteristics especially of organizations in the social sector: the provision of person-centered social services, the peculiarities of non-profit organizations and, in particular, labour and welfare services, the close integration into the social law as well as the character of the services as merit goods. With the increasing spread of private providers, social work management is also referred to as the management of enterprises in the social economy. Against this background, social work management can also be understood as a so-called specialised form of business administration for social enterprises or companies.\nSome authors also understand social work management as the management of people with special consideration of human relationships in the sense of human resources management. However, this understanding does not apply to all social services organizations. A systemic approach to social work management also takes into account emotions, different meanings, and various relationships. When providing social services, the focus lies on the professional development of empathic and trusting relationships with the recipients of these services.\nThe theoretical foundations of social work management are rooted in social work theories and principles as well as management studies. These theories help us understand how people act and how social and economic factors affect that behaviour. Theories like systems theory, psychodynamic theory, and human behaviour in the social environment theory are used to guide the way social work management is done. Understanding the theories behind social work management is important for making good decisions in the field that are socially sustainable.Social Work management is an interdisciplinary and transdisciplinary subject that is marked by it hybrid function (see figure 1), including other academic disciplines such as business and economics, public management, social sciences, humanities, sustainability sciences, cultural studies, political sciences, law studies, etc.\nSome principles of social work management are also included in national quality standards (e.g. NASW Standards for Social Work Case Management).Despite the fact that there is already a vast amount of literature available about management education and learning as well as social work education, the development of social work management education as a specific academic sub-discipline is still in progress and under discussion.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_14" +} \ No newline at end of file diff --git "a/test/Knowledge/Social\342\200\223emotional_learning.json" "b/test/Knowledge/Social\342\200\223emotional_learning.json" new file mode 100644 index 0000000000000000000000000000000000000000..72648484557c5953311c473081b33e3099c241ae --- /dev/null +++ "b/test/Knowledge/Social\342\200\223emotional_learning.json" @@ -0,0 +1,64 @@ +{ + "domain": "Knowledge", + "document": "Social and emotional learning (SEL) is an educational method that aims to foster social and emotional skills within school curricula. SEL is also referred to as \"social-emotional learning,\" \"socio-emotional learning,\" or \"social:emotional literacy.\" In common practice, SEL emphasizes social and emotional skills to the same degree as other subjects, such as math, science, and reading. Furthermore, SEL emphasizes an importance upon preparing students to become knowledgeable, responsible, and caring members of society when they reach adulthood.\nThe application of SEL (and similar educational theories) within public schools has become increasingly controversial since 2020, especially within the United States. Many studies continue to be conducted, examining the impact of social emotional learning in school curriculum.\nSEL began in the 1960s at the Yale School of Medicine in its Child Study Center. There, Professor James Comer started the Comer School Development Program where he focused on the education systems of low-income African-American communities, particularly the elementary schools in New Haven, Connecticut due to their poor academic report cards. The school implemented programs that focused on the social and emotional needs of the students. The approach spread to the New Haven public schools due to their proximity to Yale University.Roger Weissberg, Timothy Shriver, researchers, and educators established the New Haven Social Development program in 1987. The Collaborative for Academic, Social, and Emotional Learning (CASEL) was founded in 1994, and participants published Promoting Social and Emotional Learning: Guidelines for Educators in 1997.\nIn 2019, the concept of Transformative Social and Emotional Learning (Transformative SEL, TSEL or T-SEL) was developed. Transformative SEL aims to guide students to \"critically examine root causes of inequity, and to develop collaborative solutions that lead to personal, community, and societal well-being.\" In 2020, CASEL updated the definition of SEL to include a stronger focus on equity, and added information about Transformative SEL as one form of SEL implementation that can focus on equity.\nCASEL defines the five main components of SEL as:Self-awareness: The skill of having knowledge of one's own emotions and developing a positive self-concept.\nSelf-management: The ability to regulate one's own emotions and monitor one's own behaviors. This also pertains to intrinsic motivation and setting personal goals.\nSocial awareness: The ability to have awareness of the emotions and social situations of others.\nRelationship skills: The skill to foster relationships and communicate within them.\nResponsible decision-making: The ability to solve problems and hold one's self accountable.\nCASEL also defines what it calls the best methods for implementing SEL at different levels, such as classrooms, schools, families and caregivers, and communities. These ideas are intended to help students to live socially and emotionally healthy lives both during and after their time in the school system, improving academic performance by reducing stress.\nAccording to Ammar Al-Ghabban, an independent education consultant, SEL fosters empathy and compassion, and is imperative for a successful school that effectively supports the mental wellbeing of staff and students. Speaking on the importance of empathy, molecular biologist John Medina states that the more empathy training students as well as teachers get, the better their grades will become. He says that it is important to make the classroom feel like a safe place for students to learn.Studies have shown that programs such as SPARK have been a successful tool for schools with a diverse population to introduce and encourage SEL skills.\nThe implementation of SEL is shown to be statistically associated with improving the social dynamics of schools by decreasing physical aggression and reducing bullying of students with disabilities. SEL is statistically linked with improving academic performance by 11 percentiles. Additionally, the implementation of SEL programs in schools as early as kindergarten is associated with decreasing likelihood of students growing up to use public housing, having involvement with the police, or spending time in a detention facility.\nProponents of SEL say it helps students to understand and control their emotions as well as learn to accept and understand the emotions of their classmates as they navigate through their educational careers. SEL is said to be important for teachers to understand and demonstrate in their classrooms in order to make the learning process more natural and easier to adjust to for students. Things like responsible decision making and positive relationship building are much easier to learn for students who are constantly exposed to examples of the behavior. When SEL is woven into lessons and the school environment, students relate better to the content, are more motivated to learn, and understand the curriculum more easily. Proponents say SEL can also lead to students learning important skills for the workplace as well, like teamwork, time management, and communication skills. Despite this, only three states (Illinois, Kansas, and Pennsylvania) have SEL standards for their K:12 curriculum.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "StatisticalLeader", + "PresentedIn", + "FieldOfWork", + "Uses", + "HasEdition", + "InterestedIn", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "QualifiesForEvent", + "DepictedBy", + "SupportsProgrammingLanguage", + "AppliesToPart", + "HasQuality", + "Occupation", + "IsPollinatedBy", + "ProducedSound", + "Promoted", + "Measures", + "LocatedIn", + "PartOf", + "ReplacedBy", + "HasEffect", + "FoundedBy", + "BasedOn", + "DateOfBirth", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Knowledge_15" +} \ No newline at end of file diff --git a/test/Language/Agbirigba.json b/test/Language/Agbirigba.json new file mode 100644 index 0000000000000000000000000000000000000000..ca48d8c2aa562d3720b9cf4474aeed183571526a --- /dev/null +++ b/test/Language/Agbirigba.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Agbirigba is a cant (or argot) based on the Ogbakiri dialect of the Nigerian language Ikwerre of Port Harcourt. There are about thirty speakers, from a persecuted section of the community.\nAgbirigba is unintelligible to other speakers of Ikwerre, but the rule for its derivation is simple: the consonant t is added before every CV syllable (or, more accurately, every CV mora). Some speakers add an epenthetic vowel to break up the resulting consonant cluster.\nThe addition of the t results in consonant clusters that do not occur in Ikwerre or other local languages. Some speakers pronounce Agbirigba with the resulting clusters. For speakers to break them up with vowels, the vowels are all high (one of the four vowels /i ɪ u ʊ/), and match the subsequent vowel in ATR, backness, nasality and tone.An NCV sequence becomes NtCV. For example, m̀fù 'horn' becomes ǹtfù or ǹtùfù.\nThere are some complications to this: if the following vowel is /a/, with no ATR quality for the epenthetic vowel to match, then the epenthetic vowel will be /i/ or /u/ depending on, apparently, whether the following consonant is coronal or velar, and if the tone of the following syllable (whether CV or CVV) is complex (rising or falling), then the first element of that tone will move to the epenthetic vowel.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_0" +} \ No newline at end of file diff --git a/test/Language/Balaibalan.json b/test/Language/Balaibalan.json new file mode 100644 index 0000000000000000000000000000000000000000..c3352377a75ac34b9b943ea112f13c21265ff0f9 --- /dev/null +++ b/test/Language/Balaibalan.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Balaibalan is the oldest known constructed language.\nBalaibalan is the only well-documented early constructed language that is not of European origin, and it is independent of the fashion for language construction that occurred in the Renaissance. In contrast to the philosophical languages which prevailed then, and the languages designed for facilitating worldwide communication or for use in literature or film most prominent today, Balaibalan was probably designed as a holy or poetic language for religious reasons, like Lingua Ignota and perhaps Damin. Balaibalan may also have been a secret language which was only known by an inner circle.Balaibalan may have been created by 14th century mystic Fazlallah Astarabadi, founder of Hurufism, or collectively by his followers in the 15th century, or perhaps by Muhyî-i Gülşenî, born in Edirne, a member of the Gülşenî sufi order in Cairo; in any case, the elaboration of the language was a collective endeavour. \nThe sole documentary attestation of Bâleybelen is a dictionary, copies of which are to be found in the Bibliothèque nationale de France in Paris and in the Princeton University Library.\nBalaibalan is an a priori language, written with the Ottoman alphabet (Arabic script). The grammar follows the lead of Persian, Turkish and Arabic; like Turkish, it is agglutinating. Much of the lexis appears wholly invented, but some words are borrowed from Arabic and the other source languages, and others can be traced back to words of the source languages in an indirect manner, via Sufi metaphor. ", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_1" +} \ No newline at end of file diff --git a/test/Language/Bot_Colony.json b/test/Language/Bot_Colony.json new file mode 100644 index 0000000000000000000000000000000000000000..23f97f8c094bd4bd105cb9fe204a1d5fcad346aa --- /dev/null +++ b/test/Language/Bot_Colony.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Bot Colony is an episodic adventure game by Montreal developer North Side Inc. In the game, the player uses a natural language parser to converse with robot characters. The game is played through a PC client, whose major functions are running the 3D world, speech-to-text, and communication with the server, the game's language processing and reasoning running on a server farm. The developer has written a novel of the same name, published in December 2010.\nAfter early prototypes in 2009 and a failed Kickstarter campaign in October 2013, the game was featured on Steam Greenlight in November 2013. It was cancelled in January 2015 because of low sales, but became available again in spring 2017 with an added introductory mission.\nBot Colony is set on Agrihan, an island in the Marianas in the Pacific, in 2021. Agrihan has become the private island of Nakagawa Corp, a large Japanese robot company, which relocated its R&D and manufacturing facilities there both to accommodate its rapid growth and to escape relentless industrial espionage by its fierce competitor, the North Korean KHT Corp. A 900-metre (3,000 ft) tall volcano covered with lush jungle rises from the centre of the island, surrounded by pristine beaches and coves. The traditional Japanese village on the island's western shore contrasts with the skyscrapers housing Nakagawa's R&D and living quarters on the northern side. People intermix naturally with robots on the island. As Nakagawa's robots will play a major role in the colonization of Mars, they need to achieve a high degree of autonomy.The player takes on the role of a specialist in robot cognition, who occasionally accepts challenging assignments involving white-collar crime. Nakagawa Corp calls the player and asks them to investigate the disappearance of three new-generation sensors. The player is warned that KHT may have infiltrated the island and will stop at nothing to get its hands on the sensors. The game starts with the player landing in an area of the island mostly staffed by robots and hence known as \"Bot Colony\". The player can fly through the island in a futuristic hovercraft, sail around it, or use rickshaw robots to move on its roads. Robots travel between facilities on the island using a specially designed monorail.\nThe game explores the circumstances of \"artificially intelligent\" robots reprogrammed by a devious spy to \"do as people do\", and to learn about human motivation and emulate human behaviour. While engaged in the adventure, the player probes the boundaries of knowledge and understanding of robots, and trades knowledge about humanity for robot information that will enable him to move on in the game.\nThe player's mission evolves from finding the sensors to chasing the North Korean spy who has indeed infiltrated the island. The first part of the Bot Colony novel relates how KHT managed to infiltrate Bot Colony. Towards the game's conclusion, the player is instrumental in preventing the outbreak of global war.\nThe player communicates with the game by speaking into a microphone, and the game uses speech-to-text software to interpret and react to the spoken words. Before beginning the game, a player is usually required to build an acoustic profile and train speech-to-text, unless typing is preferred.The player will need to control robots, vehicles, or cranes to complete missions, and may advance the story by playing cards or trading in the Bazaar, discussing food with a robotic waiter in the restaurant, training robotic animals to do tricks on the kabuki stage, or investigating a crime against a robot in Old Nakagawa. To compensate for the freedom nature of the game, intelligent help is provided in the form of Miki-05 (the player's PDA) through a conversational interface.\nThe player is forced to converse in order to advance in the game. North Side see this as an advance over some current state-of-the-art video games, in which the player chooses a pre-written selection from a dialogue tree. In Bot Colony the player can discover the story organically by querying characters about their environment and events they witnessed, guiding robots through complex tasks, negotiating transactions with robots and teaching them new concepts and new animations. These conversation-based interactions are mediated by speech-to-text and text-to-speech solutions integrated into the North Side dialogue pipeline as client and server side components.\nNorth Side Inc. started research on its natural language processing technology when it was founded in 2001, and at least initially, the business plan was to apply English to rapid scripting of simulations and scenarios. Bot Colony was first storyboarded in October 2007, when North Side decided that producing a video game was the best initial application of the company's natural language understanding and natural language generation technologies. The company invested in its own game engine, Anitron, as a test-bed for researching the integration of 3D graphics with language. As Anitron lacked rendering, the game was reworked with Havok Vision.The game's logic, animations and interactions are written in an English-based scripting language. A script describes in simple English how a game entity should react, when its context and probable goals are taken into account. North Side see their English-based scripting technology as having additional applications, such as rapid visualization of movie scripts, workflow visualization, evidence presentation, and exploring alternative courses of action. The developers also hope that the scripting language will enable players to extend the game world with their own content in a MMO environment in which players compete in some area (as in a Jeopardy!-style game for robots) or cooperate in a task. North Side plan for users to be able to design their own 3D content and deploy their own intelligent characters, inviting other users to experience their creations in the form of 3D animated shorts or games.\nThe NLP technology cost $20 million and the game itself $2 to $3 million to the developer.\nEarly technology prototypes were shown at GDC in San Francisco in March 2009 and at E3 in June 2010. A closed beta was announced on 13 November 2012 at the Montreal International Game Summit and featured the training level of the game, \"Intruder\". In \"Intruder\", the player remote-controls a robot to erase the traces of an intrusion, and discovers part of the background story through conversation with Jimmy, a domestic robot. A closed alpha of Bot Colony was started in March 2013 and was extended in June of the same year. An unsuccessful Kickstarter funding campaign ran for the game in October 2013, after which the game was added to the Steam Greenlight system in November 2013.\nBot Colony was cancelled on 29 January 2015 because of low sales; it had sold 814 units and made $10,000 of revenue. However, after fan protests it was made available again in spring 2017, with an added introductory mission.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_2" +} \ No newline at end of file diff --git a/test/Language/Chinese_Poetry_Congress.json b/test/Language/Chinese_Poetry_Congress.json new file mode 100644 index 0000000000000000000000000000000000000000..8048d8a7c51e0015b739525276a3356be615f662 --- /dev/null +++ b/test/Language/Chinese_Poetry_Congress.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Chinese Poetry Conference is an ongoing game show on China Central Television that tests competitors' memory and reciting of Chinese poetry, including classical and modern forms of shi, ci, and qu. It is related to several other game shows, such as Chinese Characters Dictation Competition and Chinese Idioms Congress.\nEvery episode of the show starts with quotations from a piece of classical Chinese poetry. In the first season, ten pieces were quoted. Note: the following pinyin tones show original, or standard pronunciation, not including tone sandhis on special syllables.In the second season, the off-stage contestants no longer read poems, and the presenter of the show read instead.\nThe show follows a two-part game. In the first part, there are 105 contestants competing, 5 that have done best in the previous episode on stage and 100 off stage . The ones on stage select their set of ten questions one by one, and answer them in order. Off-stage contestants answer simultaneously on iPads. If they answer correctly in 10 seconds, the number of other participants that answer incorrectly add to their score. Otherwise, their game is over. When a contestant's score surpasses another's, the latter is eliminated.The second part sees the best of the five challenging the contestant that has done best during the season, and they have to answer a series of tougher questions in order to win the challenge. One such segment is the fei hua ling, a section where the two contestants must constantly think of and recite verses that contain a particular character or reference a particular theme. The intensity of this section has contributed to the show's popularity.\nThe second season introduces a more \"reasonable\" gameplay: every episode, four contestants are selected from the hundred-contestants team, and follow part one from the first season; then the best of them has to challenge the fastest and most correct off-stage contestant to decide who would be the best of the episode, and may accept challenges from people that compete later. The first four contestants (in the opening episode) were chosen as the best performers of a non-broadcast written test and subsequent auditions.\nIn the fourth season, the questions are related to a certain keyword. If a contestant answers a question wrong, he or she is given a 'redemption' opportunity through succeeding at any of 3 challenges: completing a game of fei hua ling against 12 other participants from the entire off-stage participant panel, answering guessing game-style questions about poetry, or managing to recite one verse relating every of 12 given themes. The challenge for the contestant is chosen randomly. This opportunity is not presented on the second incorrect answer.\nThe first round contains nine questions:Identify the line. Choose the correct characters from 9 or 12 characters to form a line of a poem.\nMissing character/line. Fill in the missing character or complete the missing line.\nMultiple choice.\nEach of the two contestants must alternatively give two poem lines, containing a chosen character. The game ends when one of the two contestants cannot name another sentence.Winner of Round 2 and the returning champion play a best-of-nine final, all the questions are on the buzzer. The first 3 questions are related to drawings, where contestants are required to identify a line related to the painting. The next 6 questions are guessing questions related to four cues. 1 point will be given for each correct answer, and for each wrong answer, the opponent scores. First to score 5 points will be determined as the champion, and return for the next episode.The presenter of Chinese Poetry Congress is Dong Qing, known for co-hosting CCTV New Year's Gala for years. She serves as both a host and a narrator. During a re-recording, Dong, by accident, fell off the stage and hurt her kneecap. However, she insisted on continuing the recording under a cold compression, and eventually completed the show. Dong also performed, reciting a poem in Shanghainese, singing Su Shi's Shui diao ge tou, and quoting numerous Chinese idioms on air.Li Bo is a Nanjing Normal University literature professor, having been giving lessons at CCTV's Lecture Room, a program on which scholars share their works and make statements on various subjects. Li was also a judge on Chinese Idioms Congress.Meng Man is a master-advisor of Minzu University of China, working on ancient Chinese women. Meng was also a lecturer on Lecture Room and a judge on Chinese Idioms Congress.\nWang Liqun is a Henan University professor and Doctor-advisor and a pioneer on studying ancient Chinese literature and culture.\nKang Zhen is a Beijing Normal University professor and Doctor-advisor.\nThe people that answer questions off-stage are from all walks of life such as teachers, students, peasants, and the police, not restricted to Chinese residents. The ages range from 7 to 55. They follow the narrator's reciting opening poetry and count to the points that an on-stage contestant gets if their answer is incorrect. Due to the limited time of 10 seconds to answer on a tablet computer, a large quantity of contestants failed to complete verses that are usually taught in China's primary schools, for example, Meng Haoran's Ode to the Willow, leading to criticism on the team, as they were described as \"The regular studio audience\".In the fourth season, the team is divided into four groups: children, teenage students, working people from various employments, and duos (formed from friends, family, lovers, or other close relations).\nIn the 22nd Shanghai Television Festival, Chinese Poetry Congress was awarded the best variety show.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_3" +} \ No newline at end of file diff --git a/test/Language/Comparative_Semitics.json b/test/Language/Comparative_Semitics.json new file mode 100644 index 0000000000000000000000000000000000000000..503361b0ff064edd8f8d8625e6921d9a39f2cbf8 --- /dev/null +++ b/test/Language/Comparative_Semitics.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Comparative Semitics is a field of comparative linguistics and philology concerning the Semitic languages. While existing as a field of study in and of itself, comparative studies in Semitic languages are often taught as part of individual language curricula, or as part of theological language studies.\nThe early targums, or translations of the Hebrew Torah into Aramaic, represent what may be the earliest example of comparative philology between Semitic languages. The Targum Onkelos, possibly dating from the 1st century C.E, consists of nearly word by word translation of the pentateuch from Hebrew to Aramaic. These parallel translations were commonly read together during the Talmudic period, and continue to be read and taught to this day in the Yemenite Jewish tradition.The Masoretes were Jewish scholars in the 6th to 10th centuries C.E. in Palestine and Babylonia who began to standardize Biblical Hebrew. These scholars introduced a diacritical system for pronunciation called niqqud, and began to describe the grammar of the Hebrew language. It was these developments in grammatical study during the masoretic period that enabled later comparative studies by Hebrew literate Jews in the Arab world.Later on, during the Islamic golden age, many Hebrew scholars living in the Arab world noted similarities between Arabic, Aramaic and Hebrew. One of the earliest to note these comparisons was Judah ibn Quraysh from Tiaret in the 9th century C.E. Ibn Quraysh was also the first known scholar to draw a connection between the Semitic languages and the more distantly related Amazigh or Berber Languages.\nRabbi Saadia Gaon lived under the Abbasid Caliphate from the 9th to 10th centuries C.E., and is held to be one of the first Hebrew linguists. He is considered to be the father of Judeo-Arabic literature, and noted many comparisons between Hebrew, Aramaic and Arabic. Although he never dedicated a work specifically to the field of language comparison, Saadia Gaon published the first comprehensive Arabic interpretation of the Torah, the Tafsir Rasag. \nThe most significant evolution in early comparative Semitics was the identification of the structure and function of the semitic tri-literal root system by Judah ben David Hayyuj, a Moroccan Jew who lived in Cordoba in the 10th century. Influenced by Huyyuj, Rabbi Jonah Ibn Janah wrote the most influential contemporary grammatical text on Hebrew, the Kitab al-Anqih (Arabic: \"Book of Minute Research\"), or Sefer HaDikduk (Hebrew: \"Book of Grammar\"). This book included a table of Semitic roots, Sefer haShorashim (Hebrew: \"Book of Roots\"). Samuel Abraham Poznanski, a notable Hebrew linguist and ardent Zionist in the early 20th century, considered Jonah Ibn Janah to be the “forerunner of modern comparative linguistics.”\nHebrew, Aramaic, and Arabic are all holy languages, used to write foundational texts in Judaism, Christianity, and Islam. The study of some or all of these languages is a part of many Christian and Jewish theological curricula in universities, seminaries, and yeshivas.Academic study of the particular Semitic languages are often paired with comparative studies to understand the context and form of Semitic languages.Computational linguistics and bayesian phylogenetics techniques were used to analyze lexical data from 25 semitic languages in the Middle East and the Horn of Africa to test the Proto-Semitic language hypotheses. These studies determined that the root of the semitic languages tested likely originated in the near east 4300:7750 years before present.Palestinian spoken Arabic was shown to retain certain verb forms and words from Classical Hebrew, Mishnaic Hebrew, and Jewish Palestinian Aramaic.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_4" +} \ No newline at end of file diff --git a/test/Language/Directorate_of_Language_Planning_and_Implementation.json b/test/Language/Directorate_of_Language_Planning_and_Implementation.json new file mode 100644 index 0000000000000000000000000000000000000000..434bb2bbca5d304290e8cd84d0f1f4428b5524f9 --- /dev/null +++ b/test/Language/Directorate_of_Language_Planning_and_Implementation.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Directorate of Language Planning and Implementation (DLPI) is a directorate of the Government of Manipur in charge of the language planning and the implementation of language policy.\nThe first anniversary of the Directorate of Language Planning and Implementation coincided with 18th Manipuri Language Day, the annual commemorative celebration of the Meitei language's inclusion in the Eighth Schedule to the Indian Constitution. The directorate has become a key organiser of the annual event.\nDuring November 2013, in collaboration with the Central Institute of Indian Languages (CIIL), MHRD, Government of India, Mysore, the Department of Language Planning and Implementation organised a five-day training programme on Natural Language Processing (NLP) in relation to Meitei language in Lamphelpat. The event took up the initiatives for the provision of the very essential boost for Meitei language and for \"building of co-opera\" in the Linguistic Data Consortium of Indian Languages (LDCIL). Major significant tasks discussed and highlighted during the event were machine translation for Meitei language documents; Optical Character Recognition (OCR) for Meitei language spell checker, transcription (and transliteration) of Bengali script into Meitei script (Meitei: Meitei Mayek) and vice versa. The event's main objective was to set up \"building of co-opera\" containing millions of Meitei language words, phrases, word meanings, words' spelling checker in computers. Experts and scholars of socio-linguistic groups working on Meitei literature, including the Manipuri Sahitya Parishad (MSP), Culture Forum Manipur, KALAM, MEELAL, etc. also participated in the event. \nThe training program event was the first step in forwarding the development of Meitei language by the Directorate of Language Planning and Implementation.\nDuring May 2014, the Directorate of Language Planning and Implementation organised a 10-day workshop with the purpose of developing Meitei-language terminology to replace English in the areas of Physics, Economics and Geography. Experts, including professors of various departments of different universities, took part.\nDuring September 2014, the Directorate of Language Planning and Implementation organised another 10-day workshop., with the aim of producing translations of books on various subjects for secondary school students.\nDuring March 2016, the DLPI held a symposium on the theme of Multiculturalism and Aspects of Translation. The symposium had two sessions. In one session, various resource persons presented papers on different topics for the promotion of Meitei language. In another session, resource persons presented research papers to sharply increase the level of the translation works to impart the knowledge and understanding of Meitei language to people living outside the state of Manipur.\nDuring June 2017, the Directorate of Language Planning and Implementation organised a 10-day Meetei Mayek orientation programme for college teachers who teach Meitei language as a subject. The venue for the event was at the DM College of Arts, Imphal. In the event, Thokchom Radheshyam Singh, the then Education, Labour & Employment Minister, launched Meitei language textbooks (in Meitei Mayek) for the academic degree in Bachelor of Arts on e-book formats.\nDuring April 2018, the Directorate of Language Planning & Implementation organised a three-day conference on the topic \"Classical Language Status in respect of Manipuri Language\" at the conference hall of Manipur State Guest House, Sanjenthong, Imphal. Langpoklakpam Jayantakumar Singh, the then Minister of Art & Culture Department of the Government of Manipur, as a Chief Guest of the event, assured that he will take a leading role in the efforts of attaining classical language status for Meitei language for the sake of future generations. Thokchom Radheshyam Singh, the then minister of the Education Department of the Government of Manipur, as a President of the event, while calling upon the people to involve in the movement for inclusion of Meitei language in the classical language list.\nDuring November 2020, in response to the then education minister's statement of introducing Sanskrit as a subject in selected schools and colleges of Manipur, there were strong criticism of the minister's plan from the sides of various social organizations. A spearheading social organization, \"MEELAL\" (Meetei Erol Eyek Loinasillol Apunba Lup) demanded the Government of Manipur that there should be state language departments other than Directorate of Language Planning and Implementation (DLPI) and the concerned authorities should first work on the development and the promotion of Manipur's indigenous languages and Meetei Mayek writing system before promoting other languages.During January 2022, in a meeting with the Wakhallon Mannaba Apunba (WAMA), Leishemba Sanajaoba expressed that he was extremely unsatisfied with the negligence of the Department of Language Planning and Implementation in the documentation works for inclusion of Meitei language among the classical languages. The WAMA expressed that such negligence of the Language Department will make the efforts of Sanajaoba, of raising his voice in the Rajya Sabha, useless. The WAMA demanded the Government of Manipur for the change of the present director of Department of Language Planning and Implementation. According to the WAMA, Chitra, the present director, is unfit to hold the very directorial position because of her neglecting and irresponsible behaviours.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_5" +} \ No newline at end of file diff --git a/test/Language/Linguistic_distance.json b/test/Language/Linguistic_distance.json new file mode 100644 index 0000000000000000000000000000000000000000..7d40e05d741fa15c97de7a3400d509214103661d --- /dev/null +++ b/test/Language/Linguistic_distance.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Linguistic distance is the measure of how different one language (or dialect) is from another. Although they lack a uniform approach to quantifying linguistic distance between languages, linguists apply the concept to a variety of linguistic contexts, such as second-language acquisition, historical linguistics, language-based conflicts, and the effects of language differences on trade.\nThe proposed measures used for linguistic distance reflect varying understandings of the term itself. One approach is based on mutual intelligibility, i.e. the ability of speakers of one language to understand the other language. With this, the higher the linguistic distance, the lower is the level of mutual intelligibility.Because cognate words play an important role in mutual intelligibility between languages, these figure prominently in such analyses. The higher the percentage of cognate (as opposed to non-cognate) words in the two languages with respect to one another, the lower is their linguistic distance. Also, the greater the degree of grammatical relatedness (i.e. the cognates mean roughly similar things) and lexical relatedness (i.e. the cognates are easily discernible as related words), the lower is the linguistic distance. As an example of this, the Hindustani word pānch is grammatically identical and lexically similar (but non-identical) to its cognate Punjabi and Persian word panj as well as to the lexically dissimilar but still grammatically identical Greek pent- and English five. As another example, the English dish and German tisch 'table' are lexically (phonologically) similar but grammatically (semantically) dissimilar. Cognates in related languages can even be identical in form, but semantically distinct, such as caldo and largo, which mean respectively 'hot' and 'wide' in Italian but 'broth, soup' and 'long' in Spanish. Using a statistical approach (called lexicostatistics) by comparing each language's mass of words, distances can be calculated between them; in technical terms, what is calculated is the Levenshtein distance. Based on this, one study compared both Afrikaans and West Frisian with Dutch to see which was closer to Dutch. It determined that the Dutch and Afrikaans (mutual distance of 20.9%) were considerably closer than Dutch and West Frisian (mutual distance of 34.2%).\nHowever, lexicostatistical methods, which are based on retentions from a common proto-language : and not innovations : are problematic due to a number of reasons, so some linguists argue they cannot be relied upon during the tracing of a phylogenetic tree (for example, highest retention rates can sometimes be found in the opposite, peripheral ends of a language family). Unusual innovativeness or conservativeness of a language can distort linguistic distance and the assumed separation date, examples being Romani language and East Baltic languages respectively. On the one hand, continued adjacency of closely related languages after their separation can make some loanwords 'invisible' (indistinguishable from cognates), therefore, from lexicostatistical point of view these languages appear less distant then they actually are (examples being Finnic and Saami languages). On the other hand, strong foreign influence of languages spreading far from their homeland can make them share fewer inherited words than they ought to (examples being Hungarian and Samoyedic languages in the East Uralic branch).\nBesides cognates, other aspects that are often measured are similarities of syntax and written forms.To overcome the aforementioned problems of the lexicostatistical methods, Donald Ringe, Tandy Warnow and Luay Nakhleh developed a complex phylogenetical method relying on phonological and morphological innovations in 2000s.\nA 2005 paper by economists Barry Chiswick and Paul Miller attempted to put forth a metric for linguistic distances that was based on empirical observations of how rapidly speakers of a given language gained proficiency in another one when immersed in a society that overwhelmingly communicated in the latter language. In this study, the speed of English language acquisition was studied for immigrants of various linguistic backgrounds in the United States and Canada.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_6" +} \ No newline at end of file diff --git a/test/Language/Patter.json b/test/Language/Patter.json new file mode 100644 index 0000000000000000000000000000000000000000..34abe3c39d30f26a7206be38aab5bc64b7f11d4e --- /dev/null +++ b/test/Language/Patter.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Patter is a prepared and practiced speech that is designed to produce a desired response from its audience. Examples of occupations with a patter include the auctioneer, salesperson, dance caller, magician, and comedian.\nThe term may have been a colloquial shortening of \"Pater Noster\", or the Lord's Prayer, and may have referred to the practice of mouthing or mumbling prayers quickly and mechanically.\nFrom this, it became a slang word for the secret and equally incomprehensible mutterings of a cant language used by beggars, thieves, fences, etc., and then the fluent plausible talk that a cheap-jack employs to pass off his goods. Many illusionists, e.g., card magicians, use patter both to enhance the show and to distract the attention of the spectators.\nIn some circumstances, the talk becomes a different sense of \"patter\": to make a series of rapid strokes or pats, as of raindrops. Here, it is a form of onomatopoeia.\nIn hypnotherapy, the hypnotist uses a 'patter' or script to deliver positive suggestions for change to the client.\nIn London Labour and the London Poor (1851), Henry Mayhew divides the street-sellers of his time into two groups: the patterers, and everyone else.\nIn certain forms of entertainment, peep shows and Russian rayok, patter is an important component of a show. The radio DJ patter, known as Mcing, is among the roots of rapping. The form can be traced back as early as the 1890s among the other popular music styles like 'story ballads' and 'parlor waltzes.' Patter also has operatic origins as well, the form of the patter song being featured in the operettas of Gilbert and Sullivan. So important is patter to the Gilbert and Sullivan operetta form that it forms one of the seven identified tenants of their style. Patter then became a signature in the style known as savoy opera. The musical identification of patter is intrinsically linked to the flow of words in time.It is thus also used of any rapid manner of talking, and of a patter-song, in which a very large number of words have to be sung at high speed to fit the music. A western square dance caller may interpolate patter—in the form of metrical lines, often of nonsense—to fill in between commands to the dancers.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_7" +} \ No newline at end of file diff --git a/test/Language/Radical_interpretation.json b/test/Language/Radical_interpretation.json new file mode 100644 index 0000000000000000000000000000000000000000..283c1208afd7a512ad1a5140baa2e1ea29971eec --- /dev/null +++ b/test/Language/Radical_interpretation.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "Radical interpretation is interpretation of a speaker, including attributing beliefs and desires to them and meanings to their words, from scratch—that is, without relying on translators, dictionaries, or specific prior knowledge of their mental states. The term was introduced by American philosopher Donald Davidson (1973) and is meant to suggest important similarity to W. V. O. Quine's term radical translation, which occurs in his work on the indeterminacy of translation. Radical translation\nis translation of a speaker's language, without prior knowledge, by observing the speaker's use of the language in context.\nEven more so than radical translation did for Quine, radical interpretation plays an important role in Davidson's work, but the exact nature of this role is up for debate. Some see Davidson as using radical interpretation directly in his arguments against conceptual relativism and the possibility of massive error--of most of our beliefs being false. But Davidson seems to explicitly reject this reading in \"Radical Interpretation Interpreted\".\nThere is also a more narrow and technical version of radical interpretation used by Davidson: given the speaker's attitudes of holding particular sentences true in particular circumstances, the speaker's hold-true attitudes, the radical interpreter is to infer a theory of meaning, a truth theory meeting a modified version of Alfred Tarski's Convention T, for the speaker's idiolect. ", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_8" +} \ No newline at end of file diff --git a/test/Language/Unicode_font.json b/test/Language/Unicode_font.json new file mode 100644 index 0000000000000000000000000000000000000000..8e74a40ae76ce362aba2360841f1132cd129ad4d --- /dev/null +++ b/test/Language/Unicode_font.json @@ -0,0 +1,55 @@ +{ + "domain": "Language", + "document": "A Unicode font is a computer font that maps glyphs to code points defined in the Unicode Standard. The vast majority of modern computer fonts use Unicode mappings, even those fonts which only include glyphs for a single writing system, or even only support the basic Latin alphabet. Fonts which support a wide range of Unicode scripts and Unicode symbols are sometimes referred to as \"pan-Unicode fonts\", although as the maximum number of glyphs that can be defined in a TrueType font is restricted to 65,535, it is not possible for a single font to provide individual glyphs for all defined Unicode characters (154,998 characters, with Unicode 16.0). This article lists some widely used Unicode fonts (shipped with an operating system or produced by a well-known commercial font company) that support a comparatively large number and broad range of Unicode characters.\nThe Unicode standard does not specify or create any font (typeface), a collection of graphical shapes called glyphs, itself. Rather, it defines the abstract characters as a specific number (known as a code point) and also defines the required changes of shape depending on the context the glyph is used in (e.g., combining characters, precomposed characters and letter-diacritic combinations). The choice of font, which governs how the abstract characters in the Universal Coded Character Set (UCS) are converted into a bitmap or vector output that can then be viewed on a screen or printed, is left up to the user. If a font is chosen which does not contain a glyph for a code point used in the document, it typically displays a question mark, a box, or some other substitute character.Computer fonts use various techniques to display characters or glyphs. A bitmap font contains a grid of dots known as pixels forming an image of each glyph in each face and size. Outline fonts (also known as vector fonts) use drawing instructions or mathematical formulæ to describe each glyph. Stroke fonts use a series of specified lines (for the glyph's border) and additional information to define the profile, or size and shape of the line in a specific face and size, which together describe the appearance of the glyph.\nFonts also include embedded special orthographic rules to output certain combinations of letterforms (an alternative symbols for the same letter) be combined into special ligature forms (mixed characters). Operating systems, web browsers (user agent), and other software that extensively use typography, use a font to display text on the screen or print media, and can be programmed to use those embedded rules. Alternatively, they may use external script-shaping technologies (rendering technology or “smart font” engine), and they can also be programmed to use either a large Unicode font, or use multiple different fonts for different characters or languages.\nNo single \"Unicode font\" includes all the characters defined in the present revision of ISO 10646 (Unicode) standard, as more and more languages and characters\nare continually added to it, and common font formats cannot contain more than 65,535 glyphs (about half the number of characters encoded in Unicode). As a result, font developers and foundries incorporate new characters in newer versions or revisions of a font, or in separate auxiliary fonts intended specifically for particular languages.\nUCS has over 1.1 million code points, but only the first 65,536 (the Plane 0: Basic Multilingual Plane, or BMP) had entered into common use before 2000.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "LanguageUsed", + "Genre", + "AwardReceived", + "Creator", + "InfluencedBy", + "FieldOfWork", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "HasWrittenFor", + "InOppositionTo", + "HasQuality", + "Contains", + "LocatedIn", + "Founded", + "Developer", + "MathematicalInverse", + "FollowedBy", + "Country", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Language_9" +} \ No newline at end of file diff --git a/test/Law/Carceral_feminism.json b/test/Law/Carceral_feminism.json new file mode 100644 index 0000000000000000000000000000000000000000..91fecceefa7b10f80439b84f76b46e63cfe62882 --- /dev/null +++ b/test/Law/Carceral_feminism.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "Carceral feminism is a critical term for types of feminism that advocate for enhancing and increasing prison sentences that deal with feminist and gender issues. The term criticises the belief that harsher and longer prison sentences will help work towards solving these issues. The phrase \"carceral feminism\" was coined by Elizabeth Bernstein, a feminist sociologist, in her 2007 article, \"The Sexual Politics of the 'New Abolitionism'\". Examining the contemporary anti-trafficking movement in the United States, Bernstein introduced the term to describe a type of feminist activism which casts all forms of sexual labor as sex trafficking. She sees this as a retrograde step, suggesting it erodes the rights of women in the sex industry, and takes the focus off other important feminist issues, and expands the neoliberal agenda.\nBernstein argued that feminist support for anti-trafficking laws that equate prostitution with sex-trafficking have undercut the efforts of sex workers themselves in previous decades to organize for their rights, instead bolstering their criminalization. Evangelical Christians share this commitment to law-and-order in Bernstein's account, and later, Bernstein attributed their alliance to the broader political and economic shift in the US from a redistributive welfare state towards a \"carceral\" one that fosters criminalization and incarceration. She argued that for both feminists and evangelical Christians, politics of gender and sexuality have shifted attention from the family (i.e. issues of battering and abortion, respectively) outward to the public sphere (i.e. sex-trafficking) and in this shift, have intertwined the anti-trafficking movement with neoliberal politics. In her article, \"Carceral Politics as Gender Justice?\", Bernstein expanded on this analysis, using the case of the anti-trafficking movement to demonstrate how feminism has more generally become a vehicle of punitive politics in the US and abroad.Rape laws have gradually been liberalized across the Anglo-American world. Criminal law in these jurisdictions now recognizes that rape can be committed against any gender in a variety of circumstances that do not necessarily require penile penetration. Immunity for men who rape their wives within the context of marriage has been abolished. The evidence required for a rape conviction has also been relaxed as most laws now recognize rape where there is a lack of affirmative consent rather than the more strict requirement that there be an exertion of force by the defendant and active resistance by the victim.Domestic violence legislation has seen significant developments in the United States. Where the state had previously been reluctant to interfere in the private realm, it now views the home as a potential site for crime. The criminal protection order was an important precursor to the criminalization of domestic violence. Where such an order was issued against an individual, their presence at the home became a proxy for domestic violence. Anti-violence campaigns in the US in the 1970s and 1980s also led to policies that required police to make an arrest when responding to domestic violence calls, which resulted in increased arrests of both men and women.Before gendered violence was recognized by the government of Sweden, it was under the name of 'domestic violence'. During the 1990s, though, the women's shelter movement brought attention to specific behavior that highlighted violence in men, and a new name was given to gendered violence, 'men's violence against women'. When the 2000s came by, the view of feminist ideologies that backed 'men's violence against women' was questioned, ultimately taking the credibility out of that term, and reverting it back to what it was before the women's shelter movement.Feminist scholars have described the trajectory of feminist activism in other spheres similarly. In their studies of the feminist campaigns around the issues of domestic violence and sexual assault, for example, sociologist Beth Richie and political theorist Kristin Bumiller traced the development of the feminist anti-violence movement in the US from its original focus on social transformation to its nearly ubiquitous reliance on law and law-enforcement today. A similar trend has been described outside of the US context—for example, Miriam Ticktin argued that anti-immigrant sentiments in feminist campaigns against sexual violence in France have served border control and other forms of policing. Some examples of this are with Alex Press in the mentions of his Vox article about the #MeToo link that brought forth a movement about the incarceration of domestic violence victims. He argues that they should go against this type of feminism due to the reasoning of more women that are possibly in harm. Virginia Law discusses the critique of her view for carceral feminism that the term could also bring more harm for women such as it did with the Violence Against Women Act (VAWA). Anna Terwiel raises the awareness of needing additional change for carceral feminism such as, by bringing in more programs that require them to find ways on changing the perpetrator's behavior. Assuming that there should be consequences for the actions committed in these certain situations. Feminists are pushing for change that will impact the domestic violence community and not just from the individualistic standpoint.Activists have also challenged this mode of feminism. Feminists involved in the prison abolition movement, especially, have been critical of feminist alliances with prisons and policing. The national activist organization Incite! Women of Color Against Violence, for example, formed in 2000 with the conviction that the criminal justice system does not support but rather causes further harm for women, gender non-conforming, and trans people of color experiencing interpersonal violence. Since its introduction in 2007, the term \"carceral feminism\" has been used widely by activists to make such critiques and has made its way into discussions and debates in media forums such as Twitter and Vox. Activist and community organizer Marlihan Lopez argues that the goals of eliminating violence, and specifically gender-based violence, cannot be met within punitive and carceral systems. As opposed to carceral feminism that calls for putting perpetrators of gender-based violence in prison and imposing harsher sentences, activists such as Lopez work at the community level to equip communities with tools to intervene in patterns of harm while also developing mechanisms of accountability. Anti-carceral feminist activists call for the reallocation of funds and resources from the police and carceral systems to education, social housing, and other life-affirming social services.There are activists working towards sex worker justice who echo abolitionist and anti-carceral feminist calls to abolish police and prisons. Sex workers are often victims of gender-based violence and sexual assault by police officers, heightened by the criminalization and lack of security services surrounding their work. A critique of racialized anti-carceral feminists has been the cooptation of abolitionist language by white carceral feminists who call for the abolition of sex work, which they see as akin to sexual slavery of women.\nAngela Davis, in the chapter \"How Gender Structures the Prison System\" of her book Are Prisons Obsolete?, argues that carceral feminism intersects with the oppressive use of psychiatry to pathologize women who fight back against abuse and violence. She contends that while male offenders were seen as individuals who have violated the social contract and thus were granted redemption through prison time, female offenders were seen as fundamentally transgressing morality. In their role as women, they had failed and thus could not benefit from salvation. In the United States, Quaker reformers argued that women could be reformed, but did so in a way that maintained gendered norms of womanhood, which meant implementing a regime designed to turn criminalized women into models of domesticity. Davis further submits that this is why female prisoners serve on average longer sentences than men and are over-medicated, in order to keep them under the control and surveillance of the state, since the theory of eugenics stipulates that women who are genetically unfit due to insanity must be kept in jail for as long as possible so that they would bear fewer children. Davis also highlights how sexual violence against women in society is perpetuated and hidden behind prison walls. This abuse, along with racism and misogyny, is intensified in the prison system and sanctioned in an environment of punishment. \nIn Canada, Indigenous women are both overrepresented in the prison system and victims to a history of forced sterilisation in the name of eugenics. In 2022, Indigenous women accounted for half of the female population in federal penitentiaries. Starting in the late 1920’s, Canada sanctioned forced sterilization through laws such as Alberta’s Sexual Sterilization Act. Although no longer prohibited by law, there continue to be numerous reports of non-consensual sterilization on Indigenous women in Canada.\nMimi Kim, a researcher at California State University on feminist anti-carceral policies, uses the metaphor \"dancing with the devil\", in order to illustrate the ineffective cooperation between carceral feminists and the State in their attempt to decrease gender-based crimes through more criminalization and policing. Criticizing the mainstream feminist anti-violence movement as heavily reliant on the adversarial model of the female victim versus the male assailant when it comes to sexual violence, she proposes alternatives to the patriarchal criminal justice system, such as transformative justice practices and abolitionist initiatives, to comprehensively address all forms of harm. Kim fundamentally argues that the advance of carceral feminism has been framed by contradictions and paradoxes of reform politics. Carceral feminist strategies’ reliance on law enforcement to address gendered violence and harms have resulted in mandates that have contributed to mass incarceration. Kim highlights how anti-carceral feminism finds its roots communities of colour, who have suffered the most at the hands of state-sanctioned violence and punishment. Anti-carceral feminists have developed values and practices grounded in transformative justice, community-based responses to violence and community accountability. They, along with abolitionists, view the carceral state as the primary site for the perpetuation of violence and oppression that largely targets populations depending on racial, class, gender and other identity markers.\nAccording to the American Civil Liberties Union (ACLU), \"79% of women in federal and state prisons reported physical abuse and over 60% reported past sexual abuse\", and furthermore, \"As many as 90% of the women in prison today for killing men had previously been battered by those men\". This means that many of the women who are in prison are victims of sexual violence who may have committed the crimes that they were indicted for as a result of the sexual violence they experienced. The anti-carceral feminist movement pushes towards solving this issue and fighting the criminalization and incarceration of women who are victims of sexual and domestic violence.An initiative created to help illuminate and help these injustices is the Survived and Punished Organization, which began in 2015. This organization acknowledges that many of these women, such as BIPOC women, transgender women, and non-gender conforming people have experienced sexual and/or domestic violence. In a lot of cases, this history of sexual violence could give reason to their crime. The organization also explains how, once in prison, many of these people are subjected to more sexual violence or harassment by the guards or other individuals. The organization seeks to help women who end up incarcerated in domestic or sexual violence cases prove the crime they committed was potentially an act of self-defense. There are also circumstances where women are coerced into being an accomplice. Overall, this organization seeks to rectify a system which they believe wrongfully targets minority groups, people of color, and women. ACLU explains: \"The average prison sentence of men who kill their female partners is 2 to 6 years. Women who kill their partners are sentenced on average to 15 years, even though most women who kill their partners do so to protect themselves from violence initiated by their partners.\"\nThis means that women are being more harshly prosecuted for the same crime when, in a lot of cases, that crime was a response to their partners' violence. Based on this statistic, it can be seen that there is some inequity in sentence-length between genders. This alludes to the possibility that carceral feminism may result in the increased suffering and persecution of minority groups. Another example of how carceral feminism may affect minority groups can be seen through examining the case of The Central Park Five. In 1989, five African American and Latin American teenagers were arrested and convicted for the brutal rape of Trisha Meili in New York's Central Park. All of them received prison sentences ranging from 6 to 13 years. However, with the progression of technology and the addition of DNA evidence, it was revealed that the sole perpetrator of the rape was Matias Reyes, meaning that the other five men were innocent. This is a case where because of the harsh criminal sentences and punishments associated with rape cases, this can lead to potentially innocent people being wrongfully persecuted. Additionally, in this case, minority groups can be, as a result, more negatively affected by the harsher punishments that carceral feminism aims to support. Many feminists who are prison abolitionists also argue that these events reflect a historical trend of weaponizing the protection of white cisgender women against men of color and queer people by emphasizing on stereotypes that portray them as threatening or dangerous.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_0" +} \ No newline at end of file diff --git a/test/Law/Continuing_legal_education.json b/test/Law/Continuing_legal_education.json new file mode 100644 index 0000000000000000000000000000000000000000..8eb89a84689be2576093aa96659ecc6ab16a479b --- /dev/null +++ b/test/Law/Continuing_legal_education.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "Continuing legal education (CLE), also known as mandatory or minimum continuing legal education (MCLE) or, in some jurisdictions outside the United States, as continuing professional development, consists of professional education for attorneys that takes place after their initial admission to the bar. Within the United States, U.S. attorneys in many states and territories must complete certain required CLE in order to maintain their U.S. licenses to practice law. Outside the United States, lawyers in various jurisdictions, such as British Columbia in Canada, must also complete certain required CLE. However, some jurisdictions, such as the District of Columbia and Israel, recommend, but do not require, that attorneys complete CLE.\nIn New South Wales continuing legal education is regulated by the Law Society of New South Wales.No nationwide rules exist within the United States for CLE requirements or accreditation. Instead, each individual jurisdiction (i.e., each state, the District of Columbia, and each territory) exercises discretion on how to regulate U.S. attorneys, which includes establishing rules for CLE requirements and accreditation. This authority is typically vested in each jurisdiction's supreme court and delegated to special CLE commissions or boards.Nonetheless, various efforts have been made to promote uniformity of CLE programs across U.S. jurisdictions. For example, the American Bar Association (ABA) promulgated a model CLE rule for individual jurisdictions to adopt. Similarly, the Continuing Legal Education Regulators Association (CLEreg) created a uniform CLE application, a uniform CLE attendance certification, and a CLE distance learning glossary. CLEreg also created a CLE guide to assist its members in managing CLE programs.\nIn U.S. jurisdictions with mandatory CLE requirements, attorneys must typically earn a minimum number of CLE credits (measured in hours) over a set period of years. Also, some of these jurisdictions require a minimum number of CLE credits for specific topics (e.g., ethics, diversity training, elimination of bias, professional responsibility, basic skills, substance abuse, prevention of malpractice, and attorney-client disputes).\nU.S. attorneys typically earn CLE credits by completing legal training presented by experienced attorneys. The training may cover both legal theory and practical experiences in legal practice. Competency testing is not usually required in order for attorneys to earn CLE credits through legal training. Classroom training materials can be extensive and may represent the most current and advanced thinking available on a particular legal subject. Oftentimes, a portion of CLE credits may be earned through reading and other self-study. In recent years, many jurisdictions now allow attorneys to earn CLE credits as part of distance education courses taken on-line or by listening to audio downloads.\nAlternatively, experienced attorneys in some jurisdictions, such as New York, may also earn CLE credits for speaking or teaching at accredited CLE programs; for moderating or participating in panel presentations at accredited CLE activities; for teaching law courses at ABA-accredited law schools; for preparing students for and judging law competitions, mock trials and moot court arguments, including those at the high school or college level; for published legal research-based writing; and for providing pro bono legal services.\nLegal training or other activities often meet the rules for CLE requirements and accreditation in multiple jurisdictions. In these instances, nothing prohibits attorneys licensed in one or more of these jurisdictions from counting the training or other activities towards fulfillment of their CLE credit requirements for each of these jurisdictions.\nOpportunities for CLE are offered throughout the year by state bar associations, national legal organizations such as the American Bar Association, Federal Bar Association, law schools, and many other legal associations and groups such as non-profit CLE providers Practising Law Institute (PLI), American Law Institute Continuing Legal Education (ALI CLE; formerly American Law Institute-American Bar Association ALI-ABA), The Center for American and International Law (CAIL), and The Institute of American & Talmudic Law (IAT Law), as well as other private enterprises like SproutEd. Activities are usually open to all lawyers (and sometimes non-lawyers), but organizations often offer discounts to their own members. A recent trend is toward the provision and promotion of free CLE programs.\nUniquely, Kentucky allows all licensed attorneys in the state to complete their annual CLE requirement without a registration fee through a two-day program known as Kentucky Law Update, offered annually in at least seven locations throughout the state.\nSome attorneys, particularly those who have spent many years in active practice, have resisted CLE requirements as unconstitutional. However, in 1999, the Supreme Court of California upheld that state's CLE program against an Equal Protection Clause constitutional challenge.\nIn Canada, rules vary by jurisdiction (i.e., provinces and territories). For example, Alberta has a mandatory Continuing Professional Development (CPD) program, requiring preparation of annual CPD plans. Lawyers develop their plans and declare to the Law Society of Alberta on an annual basis that these are complete. The Legal Education Society of Alberta provides tools to facilitate compliance with these requirements.In Ontario the Law Society of Upper Canada, beginning in 2010, instituted mandatory CPD hours for all lawyers in the province.\nIn British Columbia, CPD is mandatory and lawyers are required to annually report their continuing legal education activities to the Law Society of British Columbia. The Continuing Legal Education Society of BC provides tools to facilitate compliance with these requirements. Practicing lawyers must complete a minimum of 12 hours of coursework and 50 hours of self study annually.\nThe Canadian Defence Lawyers association provides defence-oriented CLE.\nContinuing legal education required of members of the Integrated Bar of the Philippines (IBP) to ensure that throughout their career, they keep abreast with law and jurisprudence, maintain the ethics of the profession and enhance the standards of the practice of law (Rule 1, Bar Matter No. 850 : Supreme Court of the Philippines)", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_1" +} \ No newline at end of file diff --git a/test/Law/European_Judicial_Network.json b/test/Law/European_Judicial_Network.json new file mode 100644 index 0000000000000000000000000000000000000000..63daf671638b236903e9d6ddeb4802133a1ae97c --- /dev/null +++ b/test/Law/European_Judicial_Network.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "The European Judicial Network (EJN) is a network of contact points within the EU designed to facilitate judicial cooperation across borders. With a focus on serious crime (such as organized crime, corruption, drug smuggling and terrorism), it helps form and maintain contacts between agencies in member states.\nThe Network was created by Joint Action 98/428 in 1998, to fulfil recommendation no. 21 of the Action Plan to Combat Organised Crime adopted by the Council of the European Union on 28 April 1997.\nA priority of the EJN is the dissemination of information to its citizens, judges and legal practitioners, primarily through its Web site. The EJN's main functions are: Facilitating judicial cooperation among the Member States; travelling to meet the contact points of other State Members, as necessary; providing the local judicial authorities of their country with the necessary legal and practical information; providing the local judicial authorities of other member states the necessary legal and practical information; improving the coordination of the judicial cases.\nA member state's Contact Point can identify relevant other Contact Points via the European Justice Atlas.\nThe secretariat of the EJN functions as an independent autonomous unit within the staff of Eurojust, based in The Hague in the Netherlands.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_2" +} \ No newline at end of file diff --git a/test/Law/Judicial_populism.json b/test/Law/Judicial_populism.json new file mode 100644 index 0000000000000000000000000000000000000000..de742b48c8d4d7e012e33dd8089e5d752fb6d63d --- /dev/null +++ b/test/Law/Judicial_populism.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "Judicial populism or juridical populism is a phenomenon where the judgments and actions of the courts are driven by the perception of the masses or certain groups. The term, which some refer to as popular constitutionalism, has been described as a reaction to the perceived elitist bias in the legal system. \nJudicial populism can also refer to the actions of the courts that reflect public sentiment or those aimed at garnering public support for the judicial institution.\nJudicial populism is considered an aspect of populist politics, particularly the strand that claims to represent the interests of the people against a corrupt elite. Due to accusations of excessive privileges, inefficiencies, and possible corruption, there is an increased hostility towards the judicial system and the creation of an atmosphere of distrust for the courts. Activism among populist groups calls for judicial decisions that reflect the collective will of the people within a particular subculture. In response, there are court judgments that are made as a form of self-representation to appease the public, obtain support or legitimacy by reflecting public sentiment. This can be demonstrated in the so-called dialectic court proceedings, which no longer focus on the evaluation of evidence but their legitimacy. The position is that this type of populism can reduce the alienation or distance of the citizens to the judicial institution due to an expectation that decisions are more meaningful to their lives.\nThere are also theorists who maintain that judicial decisions are anti-democratic in character and view these decisions as judicial intervention. This position is prominent in the antagonism towards decisions involving social rights where the constitutional backgrounds of judges are considered inadequate due to issues of technical competence or a perceived judicial prejudice. It is also argued that judges are not elected to their positions and, for this reason, must not be allowed to decide on the social or economic path of a country.\nIn the United States, the call for judicial populism also emerges according to political ideologies. In the past, it came with the conservative assault to the so-called \"judicial supremacy\" as the courts outlawed segregation and created reproductive rights, among other issues. In the modern period, the call is often made by liberal critics who assail what is perceived as \"right-wing rulings\".\nAs a theory, judicial populism holds that the law emanates from some kind of collective general will. It is founded on democratic and participatory theory wherein the people or at least their elected representatives get to decide policy, the state's developmental path, and the administration of justice. Larry Kramer, for instance, argued that the people do not only share in construing the Constitution but also render the final judgment concerning its meaning. The concept is also a basis of the Chinese legal tradition established during the Cultural Revolution-era and its modern revival. It draws from the cultural belief of the non-finality of justice as well as the revolutionary values such as democratic justice and deliberative justice, which rely on the collective judgment of the people.Critics argue that instead of the courts serving as places that determine the liability for criminally relevant acts, the emergence of judicial populism crushes the criminal justice system as it transforms trials into methods of social control. The opposing concept to judicial populism is judicial professionalism. This view maintains that knowledge, rationality, and ethics should be the focus in legal practice. There is also a requirement for judges to be neutral and to avoid conflict of interest, a component that is present in judicial populism as the judge is involved in local affairs and forges a close relationship with the people.\nJudicial populism is distinguished from judicial activism, which is described as a phenomenon wherein judges allow their personal views to guide their decisions. Like judicial populism, the latter - as described by Bradley Canon - draws from the constitutional dialogue/constitutional interdependence paradigm, which describes the judiciary as a participant to the constitutional interactions that involve other government branches. Here, instead of an omnipotent institution, the judiciary operates according to a framework based on interdependency and interaction while assuming the role of active protector of core social values. However, judicial activism is about the forced reading of the law by judges with the goal different from the intention of the legislative branch.An example of judicial populism is Mark Tushnet's suggestion of a populist American constitutional law that advances the so-called \"thin Constitution\", which would codify constitutionally protected and enforceable positive economic and social rights. There is also the case of judicial elections, which has been identified as an instrument of popular constitutionalism. This framework emphasizes the importance of state judicial elections in the United States, particularly how the elected state justices can \"stimulate and structure constitutional deliberations\" on the national level.\nMass media has been cited for its role in dictating judicial agenda. It serves as a platform where the judicial institution is evaluated, facilitating new types of accountability regarding how justice is administered. For instance, it is claimed that media reporting has led to juristic activism that favor a populist expansion of fundamental rights and natural justice. \nCases of judicial populism include its emergence in Brazil since the mass protests of 2013. The series of political and economic crises that ensued have influenced the shift towards judicial decisions that involve judicial self-presentation before the public. It is also observed that judges at various points have made decisions sought by the masses or the middle class, promulgating decisions that have no legal arguments, no constitutional basis, and narrow constitutional protection in the name of justice.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_3" +} \ No newline at end of file diff --git a/test/Law/Law_French.json b/test/Law/Law_French.json new file mode 100644 index 0000000000000000000000000000000000000000..80b810f7c9d5d6ac7c28a082599c9c2a3cda2256 --- /dev/null +++ b/test/Law/Law_French.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "Law French (Middle English: Lawe Frensch) is an archaic language originally based on Anglo-Norman, but increasingly influenced by Parisian French and, later, English. It was used in the law courts of England from the 13th century. Its use continued for several centuries in the courts of England and Wales and Ireland. Although Law French as a narrative legal language is obsolete, many individual Law French terms continue to be used by lawyers and judges in common law jurisdictions.\nThe earliest known documents in which 'French', i.e. Anglo-Norman, is used for discourse on English law date from the third quarter of the thirteenth century, and include two particular documents. The first is the 1258 The Provisions of Oxford, consisting of the terms of oaths sworn by the 24 magnates appointed to rectify abuses in the administration of King Henry III, together with summaries of their rulings. The second is The Casus Placitorum (c. 1250 : c. 1270), a collection of legal maxims, rules and brief narratives of cases.In these works the language is already sophisticated and technical, well equipped with its own legal terminology. This includes many words which are of Latin origin, but whose forms have been shortened or distorted in a way which suggests that they already possessed a long history of French usage. Some examples include advowson from the Latin advocationem, meaning the legal right to nominate a parish priest; neif[e], from the Latin nātīvā, meaning a female serf, and essoyne or essone from the Latin sunnis, meaning a circumstance that provides exemption from a royal summons. Later essonia replaced sunnis in Latin, thus replacing into Latin from the French form.\nUntil the early fourteenth century, Law French largely coincided with the French used as an everyday language by the upper classes. As such, it reflected some of the changes undergone by the northern dialects of mainland French during the period. Thus, in the documents mentioned above, 'of the king' is rendered as del rey, or del roy, whereas by about 1330 it had become du roi, as in modern French, or du roy.\nDuring the 14th century, vernacular French suffered a rapid decline. The use of Law French was criticized by those who argued that lawyers sought to restrict entry into the legal profession. The Pleading in English Act 1362 (\"Statute of Pleading\") acknowledged this change by ordaining that thenceforward all court pleading must be in English, so \"every Man ... may the better govern himself without offending of the Law\". From that time, Law French lost most of its status as a spoken language. \nLaw French remained in use for the 'readings' (lectures) and 'moots' (academic debates), held in the Inns of Court as part of the education of young lawyers, but essentially it quickly became a written language alone. It ceased to acquire new words. Its grammar degenerated. By about 1500, gender was often neglected, giving rise to such absurdities as une home ('a (feminine) man') or un feme ('a (masculine) woman'). Its vocabulary became increasingly English, as it was used solely by English, Welsh and Irish lawyers and judges who often spoke no real French.\nIn the seventeenth century, the moots and readings fell into neglect, and the rule of Oliver Cromwell, with its emphasis on removing the relics of archaic ritual from legal and governmental processes, struck a further blow at the language. Even before then, in 1628, Sir Edward Coke acknowledged in his preface to the First Part of the Institutes of the Law of England, that Law French had almost ceased to be a spoken tongue. It was still used for case reports and legal textbooks until almost the end of 1600s, but only in an anglicized form. A frequently quoted example of this change comes from one of Chief Justice Sir George Treby's marginal notes in an annotated edition of Dyer's Reports, published 1688:\nRichardson Chief Justice de Common Banc al assises de Salisbury in Summer 1631 fuit assault per prisoner la condemne pur felony, que puis son condemnation ject un brickbat a le dit justice, que narrowly mist, et pur ceo immediately fuit indictment drawn per Noy envers le prisoner et son dexter manus ampute et fix al gibbet, sur que luy mesme immediatement hange in presence de Court.\n\"Richardson, Chief Justice of the Common Bench at the Assizes at Salisbury in Summer 1631 was assaulted by a prisoner there condemned for felony, who, following his condemnation, threw a brickbat at the said justice that narrowly missed, and for this, an indictment was immediately drawn by Noy against the prisoner and his right hand was cut off and fastened to the gibbet, on which he himself was immediately hanged in the presence of the Court.\"\nThe Proceedings in Courts of Justice Act 1730 made English, instead of Law French and Latin, the obligatory language for use in the courts of England and in the court of exchequer in Scotland. It was later extended to Wales, and seven years later a similar act was passed in Ireland, the Administration of Justice (Language) Act (Ireland) 1737.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_4" +} \ No newline at end of file diff --git a/test/Law/Legal_risk.json b/test/Law/Legal_risk.json new file mode 100644 index 0000000000000000000000000000000000000000..fe0d485273d608b2efd70d3332762b51a699afe3 --- /dev/null +++ b/test/Law/Legal_risk.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "Basel II classified legal risk as a subset of operational risk in 2003. This conception is based on a business perspective, recognizing that there are threats entailed in the business operating environment. The idea is that businesses do not operate in a vacuum and in the exploitation of opportunities and their engagement with other businesses, their activities tend to become subjects of legal liabilities and obligations.\nOne of the primary reasons why legal risk is associated with operational risk involves fraud since it is recognized as the most significant category of operational loss events and considered to be a legal issue as well. This, however, does not mean that legal risk is only confined to this conceptualization. For instance, there are specific sets of legal risks that are defined by European Union (EU) Law. In 2005, the European Central Bank declared that it will develop its own legal risk definition to help \"facilitate proper risk assessment and risk management, as well as ensure a consistent approach between EU credit institutions.\"\nFurther developing legitimate risk the board for any organization does not require many steps. This process won't prevent each lawsuit or administrative punishment, however, it can reduce lawful risks and enhance the organization's responses.\nHazard is intrinsic in any business undertaking, and great danger management is a fundamental part of maintaining a fruitful business. An organization's management has shifting degrees of control concerning hazards. A few dangers can be straightforwardly overseen; different dangers are largely outside the ability to control organization management. Everything an organization can manage is to attempt to expect potential dangers, survey the possible effect on the organization's business, and be ready with an arrangement to respond to unfavorable occasions.\nThere is no standard definition, but there are at least two primary/secondary definition sets in circulation.McCormick, R. 2004\nLegal risk is the risk of loss to an institution which is primarily caused by:(a) a defective transaction; or(b) a claim (including a defense to a claim or a counterclaim) being made or some other event occurring which results in a liability for the institution or other loss (for example, as a result of the termination of a contract) or;(c) failing to take appropriate measures to protect assets (for example, intellectual property) owned by the institution; or(d) change in law.\nMcCormick, R. 2004\nManagement of legal risk is not a precise science and subjective to the situation of the institution, and primarily caused by the lack of proper communication channel, undefined institutional objectives (such as the lack of policies and regulations), unclarified information flow between different personnel and department, lack of delegation of power to specify task on mitigation of risks.\nTsui TC. 2013\nThe cost and loss of income caused by legal uncertainty, multiplied by possibility of the individual event or legal environment as a whole. One of the most obvious legal risks of doing business not mentioned in the above definitions is the risk of arrest and prosecution.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_5" +} \ No newline at end of file diff --git a/test/Law/Legal_status_of_psilocybin_mushrooms.json b/test/Law/Legal_status_of_psilocybin_mushrooms.json new file mode 100644 index 0000000000000000000000000000000000000000..a545fdd8f7503bc0a34fa92cf075fa3895afc671 --- /dev/null +++ b/test/Law/Legal_status_of_psilocybin_mushrooms.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "The legal status of unauthorised actions with psilocybin mushrooms varies worldwide. Psilocybin and psilocin are listed as Schedule I drugs under the United Nations 1971 Convention on Psychotropic Substances. Schedule I drugs are defined as drugs with a high potential for abuse or drugs that have no recognized medical uses. However, psilocybin mushrooms have had numerous medicinal and religious uses in dozens of cultures throughout history and have a significantly lower potential for abuse than other Schedule I drugs.\nPsilocybin mushrooms are not regulated by UN treaties.\nMany countries, however, have some level of regulation or prohibition of psilocybin mushrooms (for example, the US Psychotropic Substances Act, the UK Misuse of Drugs Act 1971, and the Canadian Controlled Drugs and Substances Act).\nIn some jurisdictions, Psilocybe spores are legal to sell and possess, because they contain neither psilocybin nor psilocin. In other jurisdictions, they are banned because they are items that are used in drug manufacture. A few jurisdictions (such as the US states of California, Georgia, and Idaho) have specifically prohibited the sale and possession of psilocybin mushroom spores. Cultivation of psilocybin mushrooms is considered drug manufacture in most jurisdictions and is often severely penalized, though some countries and one US state (New Mexico) has ruled that growing psilocybin mushrooms does not qualify as \"manufacturing\" a controlled substance.\nIn the United States, psilocybin (and psilocin) were first subjected to federal regulation by the Drug Abuse Control Amendments of 1965, a product of a bill sponsored by Senator Thomas J. Dodd. The law—passed in July 1965 and effected on 1 February 1966—was an amendment to the federal Food, Drug and Cosmetic Act and was intended to regulate the unlicensed \"possession, manufacture, or sale of depressant, stimulant and hallucinogenic drugs\".  The statutes themselves, however, did not list the \"hallucinogenic drugs\" that were being regulated.  Instead, the term \"hallucinogenic drugs\" was meant to refer to those substances believed to have a \"hallucinogenic effect on the central nervous system\". Despite the seemingly strict provisions of the law, many people were exempt from prosecution. The statutes \"permit[ted] ... people to possess such drugs so long as they were for the personal use of the possessor, [for] a member of his household, or for administration to an animal\".  The federal law that specifically banned psilocybin and psilocin was enacted on 24 October 1968. The substances were said to have \"a high potential for abuse\", \"no currently accepted medical use\", and \"a lack of accepted safety\".  On 27 October 1970, both psilocybin and psilocin became classified as Schedule I drugs and were simultaneously labeled \"hallucinogens\" under a section of the Comprehensive Drug Abuse Prevention and Control Act known as the Controlled Substances Act. Schedule I drugs are illicit drugs that are claimed to have no known therapeutic benefit. Johns Hopkins researchers suggest that if psilocybin clears the current phase III clinical trials, it should be re-categorized to a schedule IV drug such as prescription sleep aids, but with tighter control.\nThe United Nations Convention on Psychotropic Substances (adopted in 1971) requires its members to prohibit psilocybin, and parties to the treaty are required to restrict use of the drug to medical and scientific research under strictly controlled conditions. However, the mushrooms containing the drug were not specifically included in the convention, due largely to pressure from the Mexican government.\nMost national drug laws have been amended to reflect the terms of the convention; examples include the UK Misuse of Drugs Act 1971, the US Psychotropic Substances Act of 1978, Australia Poisons Standard (October 2015), the Canadian Controlled Drugs and Substances Act of 1996,  and the Japanese Narcotics and Psychotropics Control Law of 2002.  The possession and use of psilocybin is prohibited under almost all circumstances, and often carries severe legal penalties.\nPossession and use of psilocybin mushrooms, including the bluing species of Psilocybe, is therefore prohibited by extension. However, in many national, state, and provincial drug laws, there has been a great deal of ambiguity about the legal status of psilocybin mushrooms, as well as a strong element of selective enforcement in some places.  Most US state courts have considered the mushroom a \"container\" of the illicit drugs, and therefore illegal. A loophole further complicates the legal situation—the spores of psilocybin mushrooms do not contain the drugs, and are legal to possess in many areas. Jurisdictions that have specifically enacted or amended laws to criminalize the possession of psilocybin mushroom spores include Germany (since 1998), and California, Georgia, and Idaho in the United States. As a consequence, there is an active underground economy involved in the sale of spores and cultivation materials, and an internet-based social network to support the illicit activity.On 3 November 2020, voters passed a ballot initiative in Oregon that made \"magic mushrooms\" legal for mental health treatment in supervised settings from 1 February 2021. There currently is a bill pending in the California State Legislature that would legalize the \"possession, obtaining, giving away, or transportation of, specified quantities of psilocybin, psilocyn, dimethyltryptamine (DMT), ibogaine, mescaline, lysergic acid diethylamide (LSD), and 3,4-methylenedioxymethamphetamine (MDMA).\" The bill has been approved by the California State Senate with 21 votes in favor of the same. The bill is currently in committee in the California State Assembly.In November 2020, the District of Columbia passed initiative 81; the short title of the initiative was the Entheogenic Plant and Fungus Policy Act of 2020 and it came into effect on March 15, 2021. This bill allows for the possession and non-for-profit gifting or distribution of psilocybin mushrooms, ibogaine, dimethyltryptamine (nn-DMT), and mescaline by similar measures as to the already in place bills for the possession and gifting of marijuana products.\nOn 5 October 2022, the Canadian province of Alberta announced it would be among the first to regulate and allow the use of psilocybin, LSD, MDMA, mescaline, ketamine, and DMT for medicinal purposes in drug-assisted psychotherapy. The new regulations came into effect in January 2023. In 2022, Colorado became the second US state to decriminalize psilocybin mushrooms.\nOn 5 February 2023, Australia approved psilocybin and MDMA in prescription medications for the treatment of PTSD and treatment resistant depression. This went into effect on 1 July 2023.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_6" +} \ No newline at end of file diff --git a/test/Law/New_York_Anti-Secession_Ordinance.json b/test/Law/New_York_Anti-Secession_Ordinance.json new file mode 100644 index 0000000000000000000000000000000000000000..f7991e6cf704ad95a9cf09137ed39be2d7d054b7 --- /dev/null +++ b/test/Law/New_York_Anti-Secession_Ordinance.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "The New York Anti-Secession Ordinance, also called as Anti-Secession Resolutions of the New York legislature (Chinese: 反脱离联邦决议/反脱離聯邦決議) is a temporary resolution passed in 1861 by the New York State Assembly before the outbreak of the American Civil War, calling on the Lincoln administration not to allow the Southern states to secede from the Union.\nIn 2005, the Chinese government cited New York's anti-secession resolutions when enacting its anti-secession law. The Ordinance is regarded by both Chinese jurisprudence and leading public opinion as a form of federal law. The Chinese media almost always referred to it as the \"Anti-Secession Act\" (Chinese: 反脱离联邦法/反脱離聯邦法) and reported it extensively afterwards, with only Initium Media arguing that it was inconsequential and that mainstream Chinese analysis was shallow and pseudohistorical.\nOn January 11, 1861, the New York State Assembly passed the ordinance. The full text is as follows.Concurrent resolutions tendering aid to the President of the United States in support of the Constitution and the Union.\nSTATE OF NEW YORK, IN ASSEMBLY,\nJanuary 11, 1861.\nWhereas, treason, as defined by the Constitution of the United States, exists in one or more of the States of this confederacy; and whereas, the insurgent State of South Carolina, after seizing the post-office, custom-house, moneys, and fortifications of the Federal Government, has, be firing into a vessel ordered by the Government to convey troops and provisions to Fort Sumter, virtually declared war; and whereas, the forts and property of the United States Government in Georgia, Alabama, and Louisiana have been unlawfully seized, with hostile intentions; and whereas, further, Senators in Congress avow and maintain their treasonable acts: Therefore,\nResolved (if the Senate concur), That the Legislature of New York, profoundly impressed with the value of the Union and determined to preserve it unimpaired, hail with joy the recent firm, dignified, and patriotic special message of the President of the United States, and that we tender to him, through the Chief Magistrate of our own State, whatever aid in men and money he may require to enable him to enforce the laws and uphold the authority of the Federal Government; and that in defense of the \"more perfect Union,\" which has conferred prosperity and happiness upon the American people, renewing the pledge given and redeemed by our fathers, we are ready to devote \"our fortunes, our lives, and our sacred honor\" in upholding the Union and the Constitution.\nResolved (if the Senate concur), That the Union-loving representatives and citizens of Delaware, Maryland, Virginia, North Carolina, Kentucky, Missouri, and Tennessee, who labor with devoted courage and patriotism to withhold their States from the vortex of secession, are entitled to the gratitude and admiration of the whole people.\nAfter Chen Shui-bian's administration introduced the One Country on Each Side theory in 2002, the government of the People's Republic of China (PRC) promoted anti-secession legislation. In 2005, the Chinese government invited legal professionals to explore the enaction of a formal law against Taiwanese independence.On March 8, 2005, at the third session of the 10th National People's Congress, Wang Zhaoguo, Vice Chairman of the Standing Committee of the National People's Congress, invited scholars to participate in formulating a draft anti-secession law, and asked legal experts and experts on Taiwan to express their views. Rao Gopin, a professor at Peking University Law School, participated in many of the discussion sessions, studying legal issues related to Hong Kong from the perspective of international law and suggesting at the symposium that a law of national unity could be formulated by reference to the anti-secession act of America.\nThe International Herald Leader asked at the meeting whether China whether had drawn on the experience of the United States in enacting similar laws to prevent the independence of the Confederate States of America (CSA) before the American Civil War. Rao Gopin told reporters that anti-secession laws are not unique to China. Before the U.S. Civil War broke out in 1861, he said, the U.S. federal government enacted the Anti-Secession Act against the eleven southern CSA states that wanted to secede to maintain slavery. He said that the act was a federal law that was effective in all federal jurisdictions, and was the legal basis for the U.S. to use force against secessionists in the American South. Rao emphasized that the term used in the Chinese definition of the anti-secession law is also \"Anti-Secession,\" which he believes serves as circumstantial evidence that Chinese legislators are referencing U.S. law.\nOn March 14, 2005, the Third Session of the Tenth National People's Congress (NPC) voted to pass the Anti-Secession Law. Its passage was met with enthusiastic applause, followed by the signing of the law by Hu Jintao, President of the People's Republic of China.\nThe delegates at the meeting described the atmosphere as very solemn during the vote. However, there was controversy over the translation of the anti-secession law, as Taiwan argued that the English translation of the anti-secession law should be \"Anti-Separation Law\" instead of \"Anti-Secession Law\" as used by the Chinese side. NPC deputy Zhou Hongyu explained that the title refers to the U.S. Anti-Secession Act in the Chinese translation. As one of the earliest proponents of the proposal, Zhou believes that this translation leaves the U.S. with nothing to say and that Taiwan's response illustrates the correct naming, he stated.\nThis is because the counterpart of the U.S. Anti-Secession Act is called as the Anti-Secession Act, so we also use Secession, which means secession.\nOn March 14, 2005, Wen Jiabao responded to media questions during an international press conference at the Great Hall of the People in Beijing. After passing a reporter from Taiwan's Era News Channel, the question was asked by a CNN reporter.\nThe question I would ask is about the Anti-Secession Law. In the legislation you stated what you would call China's right to use non-peaceful means against Taiwan. Could you clarify what those means could be? And if there is a conflict, a broader conflict with the United States, could China build an army that could win any war it has to fight, as you stated in your address to the NPC?\nWen Jiabao responded that the Taiwan issue is purely a domestic matter for China, and cited a similar law in the United States as an example.\n...If you care to read the two American anti-secession resolutions adopted in 1861, you will find they are similar to our law. In the US, the civil war broke out shortly afterward. But here we don't wish to see such a situation.\nMarch 18, 2005, the nationalist Global Times described U.S. historical events in graphic detail. In the mid-19th century, black slavery on plantations was practiced in the American South but was becoming increasingly controversial, and in November 1832, South Carolina began to discuss secession from the Union. After Abraham Lincoln was elected president, the South Carolina legislature passed a secession act, followed by Florida, Georgia, Alabama, Mississippi, Louisiana, and Texas. Faced with the imminent division of the country, American people in the northern states rose up in support of the federal government. The Global Times claimed that, on January 11, 1861, the New York State Assembly passed the Anti-Secession Act, which was approved by the President of the United States, and that the law reads:The courts of the State of New York, well aware of the value of unity, are determined to preserve the unity of the country unimpaired ...... Unity has given prosperity and happiness to the people of the United States, and in defense of that unity ...... we are prepared to sacrifice our property, our lives, and our sacred honor.\nThe citizens and representatives of Maryland, Virginia, North Carolina, Kentucky, Missouri and Tennessee who stood for unity and resisted the nation's descent into secession with unparalleled courage and patriotism deserve the gratitude and admiration of the entire American nation.\nThe Global Times cited President Lincoln as a practitioner in the spirit of the Anti-Secession Act.\nIn his inaugural address, Lincoln reaffirmed the spirit of the Anti-Secession Act. He said, \"No state can lawfully secede from the Union by its own motion alone; all resolutions and acts made for that purpose are legally invalid, and violent action by any state or states against the authorities of the United States shall be considered, according to circumstances, as rebellion ...... The Union is not to be divided under the Constitution and laws.\" Lincoln's speech sounded the trumpet of the struggle against secession, and on April 12, the Southern rebels attacked the Northern armies and the American Civil War broke out.\nIn June 2005, the Chinese Communist Party's socialist paper, the Study Times, highlighted the Anti-Secession Act in its world history chapter, claiming that it was a law passed by the U.S. Congress.\nIn 2007, the Chinese Embassy in the United States published an op-ed of the People's Daily. The article refuted Chen Shui-bian's government's referendum on membership in the United Nations and cited the U.S. anti-secession act. The article stated.\nIn the United States, in addition to the Anti-Secession Act passed in the 1860s, every citizen is required to recite in the Pledge of Allegiance, \"I pledge allegiance to the flag of the United States of America and to the Republic for which it stands, one nation under God, indivisible, by which all men are free and righteous.\"\nIn fact, the Pledge of Allegiance was not composed until 1892, 31 years after the adoption of the New York Anti-Secession Ordinance.\nThe passage of China's Anti-Secession Law was acclaimed by the media within the People's Republic of China, especially when Wen Jiabao mentioned at a press conference that the law was modeled on the U.S. unification law, and was widely praised by public opinion. Major Chinese media at the time loudly publicized and quoted the purported U.S. Anti-Secession Act. Outside the official media, Chinese academic papers have been published comparing the differences between the Chinese and U.S. anti-secession acts.Macau's Xinhua-ao newspaper praised the Anti-Secession Law, characterizing both the new Chinese law and the supposed U.S. law as instruments of justice, and praised the wording of the translation. The commentary states, \"When the Chinese government introduced the Anti-Secession Law to the U.S. government, it translated \"分裂\" as \"SECESSION,\" which is the same as secession and treason in the American Civil War, highlighting the fact that China's Anti-Secession Law is the same sword of justice as the Anti-Secession Federal act in the glorious history of the Civil War between the south and the north.\nApple Daily pointed out that Wen Jiabao brought up two anti-secession resolutions of the United States of 1861, the Anti-Secession Act (Anti-Secession Resolutions of the New York Legislature, 1861) and the East Tennessee Anti-Secession Resolutions. The coverage also explained the passage of this resolution by the New York State Assembly:\nIn a press conference, Chinese Premier Wen Jiabao cited the emergence of two \"anti-secession laws\" in the United States before the Civil War as an excuse for China's anti-secession law. Wang Zhaoguo, vice chairman of the Chinese National People's Congress (NPC), pointed out earlier that the legal title and English translation of the bill are identical to the Anti-Secession Act (Anti-Secession Resolutions of the New York Legislature - 1861), which was enacted before the American Civil War. This resolution was passed by the New York State Legislature in January 1861 in response to attacks and occupations of federal government units in South Carolina, Georgia, Alabama, and Louisiana.\nIn 2021, Zhou Suyuan, a professor of history at Wuhan University, positively affirmed that the United States enacted the Anti-Secession Act and ultimately preserved the unity of the United States by limiting the secession of the Confederate States by Southern slaveholders.\nInitium Media found that the most similar documented U.S. law is the earlier Insurrection Act. Intuit pointed to a lengthy essay in the 2005 issue of the Chinese journal \"Comparative Study on Anti-Secession Law Between China and USA\", which does not actually cite text of the purported U.S. anti-secession law at all. Columnist Shi Qingye argues that borrowing from U.S. law cannot solve China's narrative dilemma in backing unification, and that the answer might be found in the abdication edict of the Qing Dynasty.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_7" +} \ No newline at end of file diff --git a/test/Law/The_Justice_of_Trajan_and_Herkinbald.json b/test/Law/The_Justice_of_Trajan_and_Herkinbald.json new file mode 100644 index 0000000000000000000000000000000000000000..83aa1e3db33fba01933c0b46cc94f3e8e51a2255 --- /dev/null +++ b/test/Law/The_Justice_of_Trajan_and_Herkinbald.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "The Justice of Trajan and Herkinbald was a set of four large panels painted by the Early Netherlandish painter Rogier van der Weyden that decorated one wall of a court-room in the Town Hall of Brussels. They represented the Justice of Trajan, a Roman emperor, and the Justice of Herkinbald, a legendary Duke of Brabant. The panels were intended as a reminder to judges to dispense impartial justice and were admired by generations of visitors, including Albrecht Dürer.\nThey were destroyed when the city was bombarded by the French in 1695 and are now known only from descriptions and from a tapestry copy in the Historical Museum of Bern.\nThe work is thought to have preoccupied van der Weyden for several years, and is believed to have been, in conception and execution, on a scale and breadth and skill to equal Jan van Eyck's Ghent Altarpiece. The panels were recorded and described in a number of sources until the 17th century; especially detailed are the inscriptions on the frames, which are likely the same as those contained on the edges of the tapestry.\nEach panel was about eleven feet in height and together they spanned a distance of about thirty five feet. The theme of the panels was justice safeguarded by divine intervention. The legends of Trajan and Herkinbald appear to occur together for the first time in 1308 in the Alphabetum Narrationum (Alphabet of Tales), a collection of over 800 tales attributed to Arnold of Liége (previously to Etienne de Besançon) arranged by themes and intended to be used as a basis for homilies. The theme Iustitia (Justice) included just these two legends, although the legend of Trajan is given in a slightly different version from that depicted in the paintings and tapestry.The first panel showed a widow begging justice from Trajan for the murder of her son and Trajan ordering the execution of the soldier accused by the woman (in the tale in the Alphabetum Narrationum, Trajan offered the widow his son as a replacement for her murdered son). The second panel depicted the story in the Golden Legend of Pope Gregory I's miraculous resurrection and conversion of Trajan, thus releasing him from Purgatory.\nGregory is shown holding Trajan's exhumed skull, in which the tongue has been miraculously preserved and thus able to utter the death sentence, demonstrating the justness of that sentence. Van der Weyden is known to have portrayed himself as a bystander in this scene. The third panel depicted Herkinbald on his death bed slitting the throat of his nephew, who had committed a rape. The fourth panel showed Herkinbald miraculously receiving the Host, despite refusing to confess the slaying of his nephew as a sinful act.\nBoth Nicholas of Cusa (in 1453) and Dubuisson-Aubenay (in the 1620s) mentioned that the work contained a self-portrait, generally thought to be faithfully reproduced in the 'Herkinbald slaying his nephew' passage.\nThe tapestry dates from about 1450. It measures 461 cm by 1053 cm (about 15 feet by 35 feet) and was probably woven in either Tournai or Brussels, two important centres of tapestry manufacture and both associated with van der Weyden. It is a wall tapestry, woven in wool, silk, and gold and silver thread.It was commissioned by George of Saluzzo on his appointment as Bishop of Lausanne in 1440. Saluzzo wanted a tapestry depicting justice scenes for the courtroom above his chapter house. He apparently knew that van der Weyden had painted these scenes and ordered them copied. It was not an exact copy but the earliest surviving work which depicts the same scenes.\nIn the passages depicting Pope Gregory I, one of the bystanders is more finely and carefully worked than the others, and this is almost certainly a copy of the self-portrait that van der Weyden had originally incorporated in his painting. It is one of only two self-portraits that survive, both as copies (of which the other has two versions), of van der Weyden. Campbell remarks it gives a better impression of van der Weyden's disdainful appearance than the other.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_8" +} \ No newline at end of file diff --git a/test/Law/Trigger_law.json b/test/Law/Trigger_law.json new file mode 100644 index 0000000000000000000000000000000000000000..fe8873fc321cd312e68eec1831503b6cac37bf2e --- /dev/null +++ b/test/Law/Trigger_law.json @@ -0,0 +1,59 @@ +{ + "domain": "Law", + "document": "A trigger law is a law that is unenforceable but may achieve enforceability if a key change in circumstances occurs.\nIn the United States, thirteen states, Arkansas, Idaho, Kentucky, Louisiana, Mississippi, Missouri, North Dakota, Oklahoma, South Dakota, Tennessee, Texas, Utah, and Wyoming, enacted trigger laws that would automatically ban abortion in the first and second trimesters if the landmark case Roe v. Wade were overturned. When Roe v. Wade was overturned on 24 June 2022, some of these laws were in effect, and presumably enforceable, immediately. Other states' trigger laws took effect 30 days after the overturn date, and others take effect upon certification by either the governor or attorney general. Illinois formerly had a trigger law (enacted in 1975) but repealed it in 2017.Eight states, among them Alabama, Arizona, West Virginia, and Wisconsin, as well as the already mentioned Arkansas, Mississippi, Oklahoma, and Texas, still have their pre-Roe v. Wade abortion bans on the law books. In North Carolina, a prohibition on abortions after 20 weeks (excepting medical emergencies) was passed in 1973 but unenforceable due to Roe v. Wade and a court ruling that it was unconstitutional until it was reinstated by U.S. District Judge William Osteen Jr. in August 2022. According to a 2019 Contraception Journal study, the reversal of Roe v. Wade and implementation of trigger laws (as well as other states considered highly likely to ban abortion), \"In the year following a reversal, increases in travel distance are estimated to prevent 93,546 to 143,561 women from accessing abortion\".\nThe Affordable Care Act allowed states to opt in to a program of health care expansion, which allowed more residents to qualify for Medicaid. The cost of this expansion was primarily borne by the federal government, but the percent paid by the federal government was scheduled to decrease each year, reaching 95% by 2017 and below 90% by 2021; the remainder would be assumed by the state. As of 2017, eight states had laws that would trigger an end to participation in Medicaid expansion, if federal funding fell below a particular level. Unlike abortion trigger laws prior to the overturning of Roe v. Wade, these are not unconstitutional at the moment and are only inactive because they rely on certain conditions to activate.In the 2015 Supreme Court decision Obergefell v. Hodges, all state constitutional and statutory bans of same-sex marriage were made null and void. However, if the precedent was overturned it would restore the bans in thirty-five states. In his concurring opinion in Dobbs v. Jackson Women's Health Organization, Supreme Court Justice Clarence Thomas said the court should reconsider the Obergefell ruling. Nevada became the first state to repeal its amendment banning same-sex marriage and recognize it in the Nevada state constitution in 2020.In July 2023, the Indianapolis City-County Council passed an assault weapons ban trigger law, which can only go into effect once the Indiana gun control state preemption law is repealed or invalidated.Richmond, California has strict ordinances related to rent control that will take effect in the event that the statewide Costa:Hawkins Rental Housing Act is repealed.The states of Iowa and New Hampshire have trigger laws mandating that the election administrators place the Iowa caucuses and the New Hampshire presidential primary ahead of any other state's nomination event for presidential candidates of major parties. The National Popular Vote Interstate Compact uses a trigger portion in which the Interstate compact comes into effect upon accession by enough states amounting to 270 electoral votes.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "CommissionedBy", + "ApprovedBy", + "IntendedPublic", + "UsedBy", + "InspiredBy", + "DepictedBy", + "RegulatedBy", + "HasQuality", + "Destroyed", + "LocatedIn", + "HasUse", + "HasParts", + "PartOf", + "HasEffect", + "LegislatedBy", + "NamedAfter", + "IndigenousTo", + "Country", + "SharesBorderWith", + "LanguagesSpokenWrittenOrSigned" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Law_9" +} \ No newline at end of file diff --git a/test/Life/Anthropopithecus.json b/test/Life/Anthropopithecus.json new file mode 100644 index 0000000000000000000000000000000000000000..19447f1fd629fd6c32bd0ae37246d5dea111b079 --- /dev/null +++ b/test/Life/Anthropopithecus.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "The terms Anthropopithecus (Blainville, 1839) and Pithecanthropus (Haeckel, 1868) are obsolete taxa describing either chimpanzees or archaic humans. Both are derived from Greek ἄνθρωπος (anthropos, \"man\") and πίθηκος (píthēkos, \"ape\" or \"monkey\"), translating to \"man-ape\" and \"ape-man\", respectively.\nAnthropopithecus was originally coined to describe the chimpanzee and is now a junior synonym of Pan. It had also been used to describe several other extant and extinct species, among others the fossil Java Man. Very quickly, the latter was re-assigned to Pithecanthropus, originally coined to refer to a theoretical \"missing link\". Pithecanthropus is now classed as Homo erectus, thus a junior synonym of Homo.\nThe genus Anthropopithecus was first proposed in 1841 by the French zoologist and anatomist Henri-Marie Ducrotay de Blainville (1777:1850) in order to give a genus name to some chimpanzee material that he was studying at the time.After the genus Anthropopithecus was established by De Blainville in 1839, the British surgeon and naturalist John Bland-Sutton (1855:1936) proposed the species name Anthropopithecus troglodytes in 1883 to designate the common chimpanzee. However, the genus Pan had already been attributed to chimpanzees in 1816 by the German naturalist Lorenz Oken (1779:1851). Since any earlier nomenclature prevails over subsequent nomenclatures, the genus Anthropopithecus definitely lost its validity in 1895, becoming from that date a junior synonym of the genus Pan.\nIn 1879, the French archaeologist and anthropologist Gabriel de Mortillet (1821:1898) proposed the term Anthropopithecus to designate a \"missing link\", a hypothetical intermediate between ape and man that lived in the Tertiary and that supposedly, following De Mortillet's theory, produced eoliths. In his work of 1883 Le Préhistorique, antiquité de l'homme (The Prehistoric: Man's Antiquity, below quoted after the 2nd edition, 1885), De Mortillet writes:\nNous sommes donc forcément conduits à admettre, par une déduction logique tirée de l’observation directe des faits, que les animaux intelligents qui savaient faire du feu et tailler des pierres à l’époque tertiaire, n’étaient pas des hommes dans l’acception géologique et paléontologique du mot, mais des animaux d’un autre genre, des précurseurs de l’homme dans l’échelle des êtres, précurseurs auxquels j’ai donné le nom d’Anthropopithecus. Ainsi, par le seul raisonnement, solidement appuyé sur des observations précises, nous sommes arrivés à découvrir d’une manière certaine un être intermédiaire entre les anthropoïdes actuels et l’homme.\nWe are therefore forced to admit, as a consequence of a logical deduction drawn from the direct observation of the facts, that intelligent animals who knew how to make fire and cut stones in the Tertiary Period, were not men in the geological and paleontological sense of the word, but animals of another kind, precursors of Man in the chain of beings, precursors to whom I gave the name Anthropopithecus. Thus, by reasoning alone, firmly supported by precise observations, we have come to discover with certainty a being intermediate between the present anthropoids and Man.\nWhen in 1905 the French paleontologist, paleoanthropologist and geologist Marcellin Boule (1861:1942) published a paper demonstrating that the eoliths were in fact geofacts produced by natural phenomena (freezing, pressure, fire), the argument proposed by De Mortillet fell into disrepute and his definition of the term Anthropopithecus was dropped. Yet the chimpanzee meaning of the genus persisted throughout the 19th century, even to the point of being a genus name attributed to fossil specimens. For example, a fossil primate discovered in 1878 by the British malacologist William Theobald (1829-1908) in the Pakistani Punjab in British India was first named Palaeopithecus in 1879 but later renamed Anthropopithecus sivalensis, assuming that these remains had to be brought back to the chimpanzee genus as the latter was being understood at the time. A famous example of a fossil Anthropopithecus is that of the Java Man, discovered in 1891 in Trinil, nearby the Solo River, in East Java, by Dutch physician and anatomist Eugène Dubois, who named the discovery with the scientific name Anthropopithecus erectus. This Dubois paper, written during the last quarter of 1892, was published by the Dutch government in 1893. In those early 1890s, the term Anthropopithecus was still being used by zoologists as the genus name of chimpanzees, so Dubois' Anthropopithecus erectus came to mean something like \"the upright chimpanzee\", or \"the chimpanzee standing up\". However, a year later, in 1893, Dubois considered that some anatomical characters proper to humans made necessary the attribution of these remains to a genus different than Anthropopithecus and he renamed the specimen of Java with the name Pithecanthropus erectus (1893 paper, published in 1894). Pithecanthropus is a genus that German biologist Ernst Haeckel (1834-1919) had created in 1868. Years later, in the 20th century, the German physician and paleoanthropologist Franz Weidenreich (1873-1948) compared in detail the characters of Dubois' Java Man, then named Pithecanthropus erectus, with the characters of the Peking Man, then named Sinanthropus pekinensis. Weidenreich concluded in 1940 that because of their anatomical similarity with modern humans it was necessary to gather all these specimens of Java and China in a single species of the genus Homo, the species Homo erectus. By that time, the genus Anthropopithecus had already been abandoned since 1895 at the earliest.\nThe term Anthropopithecus is scientifically obsolete in the present day but did become widespread in popular culture, mainly in France and Belgium:In his short story Gil Braltar (1887), Jules Verne uses the term anthropopithèque (Anthropopithecus) to describe the simian aspect of one of his characters, General McKackmale:\nIl dormait bien, le général Mac Kackmale, sur ses deux oreilles, plus longues que ne le comporte l’ordonnance. Avec ses bras démesurés, ses yeux ronds, enfoncés sous de rudes sourcils, sa face encadrée d’une barbe rêche, sa physionomie grimaçante, ses gestes d’anthropopithèque, le prognathisme extraordinaire de sa mâchoire, il était d’une laideur remarquable, : même chez un général anglais. Un vrai singe, excellent militaire, d’ailleurs, malgré sa tournure simiesque.\nHe slept well, did General MacKackmale, with both eyes shut, though longer than was permitted by regulations. With his long arms, his round eyes deeply set under their beetling brows, his face embellished with a stubbly beard, his grimaces, his semi-human gestures, the extraordinary jutting-out of his jaw, he was remarkably ugly, even for an English general. Something of a monkey but an excellent soldier nevertheless, in spite of his apelike appearance.\nIn the science-fiction novel La Cité des Ténèbres (The City of Darkness), written by French journalist and writer Léon Groc in 1926, the anthropopithèques (Anthropopithecuses) are a large herd of ape-men having reached a very low degree of civilisation.\nEnglish author George C Foster makes use of both Pithecanthropus (aka Java Man) and Eoanthropus in his 1930 novel Full Fathom Five. He dates the former, a discoverer that fire can be captured, to 500,000 years ago, and the latter, the first hominid to adopt clothing, to 200,000 years ago. For the purposes of the story, the conversations of both are rendered in contemporary English.\nThe Belgian comics author Hergé made the term anthropopithèque (Anthropopithecus) one of the numerous swear words of Captain Haddock in the comic album series The Adventures of Tintin.\nIn 2001, French singer Brigitte Fontaine wrote, sang and recorded the song titled Pipeau. In this song, the chorus repeats the term anthropopithèque (Anthropopithecus).\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_0" +} \ No newline at end of file diff --git a/test/Life/Formose_reaction.json b/test/Life/Formose_reaction.json new file mode 100644 index 0000000000000000000000000000000000000000..8a166c84c4e0bee2a68fd60b5736e80910b4fb8e --- /dev/null +++ b/test/Life/Formose_reaction.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "The formose reaction, discovered by Aleksandr Butlerov in 1861, and hence also known as the Butlerov reaction, involves the formation of sugars from formaldehyde. The term formose is a portmanteau of formaldehyde and aldose.\nThe reaction is catalyzed by a base and a divalent metal such as calcium. The intermediary steps taking place are aldol reactions, reverse aldol reactions, and aldose-ketose isomerizations. Intermediates are glycolaldehyde, glyceraldehyde, dihydroxyacetone, and tetrose sugars. In 1959, Breslow proposed a mechanism for the reaction, consisting of the following steps: \nThe reaction exhibits an induction period, during which only the nonproductive Cannizzaro disproportionation of formaldehyde (to methanol and formate) occurs. The initial dimerization of formaldehyde to give glycolaldehyde (1) occurs via an unknown mechanism, possibly promoted by light or through a free radical process and is very slow. However, the reaction is autocatalytic catalyzes the condensation of two molecules of formaldehyde to produce an additional molecule of 1. Hence, even a trace (as low as 3 ppm) of glycolaldehyde is enough to initiate the reaction. The autocatalytic cycle begins with the aldol reaction of 1 with formaldehyde to make glyceraldehyde (2). An aldose-ketose isomerization of 2 forms dihydroxyacetone (3). A further aldol reaction of 3 with formaldehyde produces tetrulose (6), which undergoes another ketose-aldose isomerization to form aldotetrose 7 (either threose or erythrose). The retro-aldol reaction of 7 generates two molecules of 1, resulting in the net production of a molecule of 1 from two molecules of formaldehyde, catalyzed by 1 itself (autocatalysis). During this process, 3 can also react with 1 to form ribulose (4), which can isomerize to give rise to ribose (5), an important building block of ribonucleic acid. The reaction conditions must be carefully controlled, otherwise the alkaline conditions will cause the aldoses to undergo the Cannizzaro reaction.\nThe aldose-ketose isomerization steps are promoted by chelation to calcium. However, these steps have been shown to proceed through a hydride shift mechanism by isotope labeling studies, instead of via an intermediate enediolate, as previously proposed.\nThe formose reaction is of importance to the question of the origin of life, as it leads from simple formaldehyde to complex sugars like ribose, a building block of RNA. In one experiment simulating early Earth conditions, pentoses formed from mixtures of formaldehyde, glyceraldehyde, and borate minerals such as colemanite (Ca2B6O115H2O) or kernite (Na2B4O7). However, issues remain with both the thermodynamic and kinetic feasibility of binding pre-made sugars to a pre-made nucleobase, as well as a method to selectively employ ribose from the mixture. Both formaldehyde and glycolaldehyde have been observed spectroscopically in outer space, making the formose reaction of particular interest to the field of astrobiology.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_1" +} \ No newline at end of file diff --git a/test/Life/Incorruptibility.json b/test/Life/Incorruptibility.json new file mode 100644 index 0000000000000000000000000000000000000000..5a992a9f5535b1a39c78439dcf77ccd695c652ee --- /dev/null +++ b/test/Life/Incorruptibility.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "Incorruptibility is a Catholic and Orthodox belief that divine intervention allows some human bodies (specifically saints and beati) to completely or partially avoid the normal process of decomposition after death as a sign of their holiness.\nIncorruptibility is thought to occur even in the presence of factors which normally hasten decomposition, as in the cases of saints Catherine of Genoa, Julie Billiart and Francis Xavier.\nIn Catholicism, if a body is judged as incorruptible after death, this is most often seen as a sign that the individual is a saint. Canon law allows inspection of the body so that relics can be taken and sent to Rome.The relics must be sealed with wax and the body must be replaced after inspection. These ritual inspections are performed very rarely and can only be performed by a bishop according to the requirements of canon law. A pontifical commission can authorize inspection of the relics and demand a written report. After solemn inspection of the relics, it can be decided that the body is presented in an open reliquary and displayed for veneration. Catholic law allows saints to be buried under the altar, so Mass can be celebrated above the remains.\nOnly part of a body might be incorrupt. In the case of Anthony of Padua, only his tongue and jaw were preserved, the rest of the body having decomposed. Bonaventure, one of the men who originally exhumed the corpse in 1263, saw this as a sign that Anthony was a \"messenger of God’s love.\" Likewise, one hagiography attributes the tongue's preservation to the \"perfection of the teachings formed upon it.\"\nIncorruptibility is seen as distinct from the good preservation of a body, or from mummification. Incorruptible bodies are often said to have the odour of sanctity, exuding a sweet or floral, pleasant aroma.Not every saint is expected to have an incorruptible corpse. Although believers see incorruptibility as supernatural, it is no longer counted as a miracle in the recognition of a saint.\nEmbalmed bodies are not recognized as incorruptibles. For example, although the body of Pope John XXIII remained in a remarkably intact state after its exhumation, Church officials remarked that the body had been embalmed and additionally that there was a lack of oxygen in his sealed triple coffin.\nThe remains of Bernadette Soubirous were inspected multiple times, and reports by the church tribunal confirmed that the body was preserved. The opening of the coffin was attended by multiple canons, the mayor and the bishop in 1919, and repeated in 1925. However, the face and hands were covered with a wax mask.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_2" +} \ No newline at end of file diff --git a/test/Life/Infections_associated_with_diseases.json b/test/Life/Infections_associated_with_diseases.json new file mode 100644 index 0000000000000000000000000000000000000000..f7fed61d8ac3ed0a782bcbe42778e7d39bc9fcb8 --- /dev/null +++ b/test/Life/Infections_associated_with_diseases.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "Infections associated with diseases are those infections that are associated with possible infectious etiologies that meet the requirements of Koch's postulates. Other methods of causation are described by the Bradford Hill criteria and evidence-based medicine.\nKoch's postulates have been modified by some epidemiologists, based on the sequence-based detection of distinctive pathogenic nucleic acid sequences in tissue samples. When using this method, absolute statements regarding causation are not always possible. Higher amounts of distinctive pathogenic nucleic acid sequences should be in those exhibiting disease, compared to controls. In addition, the DNA load should become lower with the resolution of the disease. The distinctive pathogenic nucleic acid sequences load should also increase upon recurrence.\nOther conditions are met to establish cause or association including studies in disease transmission. This means that there should be a high disease occurrence in those carrying a pathogen, evidence of a serological response to the pathogen, and the success of vaccination prevention. Direct visualization of the pathogen, the identification of different strains, immunological responses in the host, how the infection is spread and, the combination of these should all be taken into account to determine the probability that an infectious agent is the cause of the disease. A conclusive determination of a causal role of an infectious agent for in a particular disease using Koch's postulates is desired yet this might not be possible.\nThe leading cause of death worldwide is cardiovascular disease, but infectious diseases are the second leading cause of death worldwide and the leading cause of death in infants and children.\nOther causes or associations of disease are: a compromised immune system, environmental toxins, radiation exposure, diet and other lifestyle choices, stress, and genetics. Diseases may also be multifactorial, requiring multiple factors to induce disease. For example: in a murine model, Crohn's disease can be precipitated by a norovirus, but only when both a specific gene variant is present and a certain toxin has damaged the gut.A list of the more common and well-known diseases associated with infectious pathogens is provided and is not intended to be a complete listing.Infectious pathogen-associated diseases include many of the most common and costly chronic illnesses. The treatment of chronic diseases accounts for 75% of all US healthcare costs (amounting to $1.7 trillion in 2009).One of first examples of systematic study of disease causation was Avicenna, in the tenth century. The history of infection and disease were observed in the 1800s and related to the one of the tick-borne diseases, Rocky Mountain spotted fever. The cause of viral encephalitis was discovered in Russia based upon epidemiological clustering of cases. The virus causing this illness was isolated in 1937. The rash typical of Lyme borreliosis was identified the early 1900s. Historically, some chronic diseases were linked or associated with infectious pathogens.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_3" +} \ No newline at end of file diff --git a/test/Life/Nanobe.json b/test/Life/Nanobe.json new file mode 100644 index 0000000000000000000000000000000000000000..d2a2183c508df2ebb1081ba40ad0fa75e547d191 --- /dev/null +++ b/test/Life/Nanobe.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "A nanobe () is a tiny filamental structure first found in some rocks and sediments. Some scientists hypothesize that nanobes are the smallest form of life, ⁠1/ 10 ⁠ the size of the smallest known bacteria.\nNo conclusive evidence exists that these structures are, or are not, living organisms, so their classification is controversial.\nThe 1996 discovery of nanobes was published in 1998 by Uwins et al., from the University of Queensland, Australia. They were found growing from rock samples (both full-diameter and sidewall cores) of Jurassic and Triassic sandstones, originally retrieved from an unspecified number of oil exploration wells off Australia's west coast. Depths of retrieval were between 3,400 metres (2.1 mi) and 5,100 metres (3.2 mi) below the sea bed. While Uwins et al. present assertions against it, they do not exclude the possibility that the nanobes are from a surface contaminant, not from the rock units cited.\nThe smallest are just 20 nanometers in diameter. Some researchers believe that these structures are crystal growths, but the staining of these structures with dyes that bind to DNA might indicate that they are living organisms.\nThey are similar to the structures found in ALH84001, a Mars meteorite found in the Antarctic. A 2022 study concluded that ALH84001 did not contain Martian life; the discovered organic molecules were found to be associated with abiotic processes (ie, \"serpentinization and carbonation reactions that occurred during the aqueous alteration of basalt rock by hydrothermal fluids\") produced on the very early Mars four billion years ago instead.\nNanobes are similar in size to nanobacteria, which are also structures that had been proposed to be extremely small living organisms. However, these two should not be confused: Nanobacteria were thought to be cellular organisms, while nanobes are hypothesized (by some) to be a previously unknown form of life or protocells.\nIt is a living organism (contains DNA or some analogue, and reproduces).Has a morphology similar to Actinomycetes and fungi.\nNanobes are about 20 nm in diameter, which may be too small to contain the basic elements for an organism to exist (DNA, ribosomes, etc.), suggesting that if they grow and reproduce they would need to do so in an unconventional way.\nThe Martian meteorite ALH84001, discovered in 1984 in the Antarctic, contained similar tubular structures which some astrobiologists suggested could be evidence of life at an earlier time on Mars.\nA review in Microbes and Environments of the various ultra-small forms of proposed life states that the main criticism of nanobes is that they appear too small to contain the biochemical machinery needed to sustain life. The review also states that there is no evidence that nanobes are organisms in themselves and not fragments of larger organisms.Tony Taylor was one of the authors of the original nanobe paper. He argues that the conspicuous lack of phosphorus in the X-ray spectroscopy data and the failure to find DNA using various DNA amplification techniques demonstrates that nanobes do not have any DNA or RNA. He also argues that they may have a completely different mechanism for heredity, which would account for many of their unusual chemical and physical properties.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_4" +} \ No newline at end of file diff --git a/test/Life/Non-cellular_life.json b/test/Life/Non-cellular_life.json new file mode 100644 index 0000000000000000000000000000000000000000..0ddb33270910a1b88bf749edc344897409f66f8f --- /dev/null +++ b/test/Life/Non-cellular_life.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "Non-cellular life, also known as acellular life, is life that exists without a cellular structure for at least part of its life cycle. Historically, most definitions of life postulated that an organism must be composed of one or more cells, but, for some, this is no longer considered necessary, and modern criteria allow for forms of life based on other structural arrangements.\nResearchers initially described viruses as \"poisons\" or \"toxins\", then as \"infectious proteins\"; but they possess genetic material, a defined structure, and the ability to spontaneously assemble from their constituent parts. This has spurred extensive debate as to whether they should be regarded as fundamentally organic or inorganic — as very small biological organisms or as very large biochemical molecules. Without their hosts, they are not able to perform any of the functions of life - such as respiration, growth, or reproduction. Since the 1950s, many scientists have thought of viruses as existing at the border between chemistry and life; a gray area between living and nonliving.If viruses are borderline cases or nonliving, viroids are further from being living organisms. Viroids are some of the smallest infectious agents, consisting solely of short strands of circular, single-stranded RNA without protein coats. They are only known to infect flowering plants, of which some are of commercial importance. Viroid genomes are extremely small in size, ranging from 246 to 467 nucleobases. In comparison, the genome of the smallest viruses capable of causing an infection are around 2,000 nucleobases in size. Viroid RNA does not code for any protein. Its replication mechanism hijacks RNA polymerase II, a host-cell enzyme normally associated with synthesis of messenger RNA from DNA, which instead catalyzes \"rolling circle\" synthesis of new RNA using the viroid's RNA as a template. Some viroids are ribozymes, having catalytic properties which allow self-cleavage and ligation of unit-size genomes from larger replication intermediates.A possible explanation of the origin of viroids sees them as \"living relics\" from a hypothetical, ancient, and non-cellular RNA world before the evolution of DNA or of protein. This view, first proposed in the 1980s, regained popularity in the 2010s to explain crucial intermediate steps in the evolution of life from inanimate matter (abiogenesis).\nIn 2024, researchers announced the possible discovery of viroid-like, but distinct, RNA-based elements dubbed obelisks. Obelisks, found in sequence databases of the human microbiome, are possibly hosted in gut bacteria. They differ from viroids in that they code for two distinct proteins, dubbed \"oblins\", and for the predicted rod-like secondary structure of their RNA.The first universal common ancestor is an example of a proposed non-cellular lifeform, as it is the earliest ancestor of the last universal common ancestor, its sister lineages, and every currently living cell.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_5" +} \ No newline at end of file diff --git a/test/Life/Organism.json b/test/Life/Organism.json new file mode 100644 index 0000000000000000000000000000000000000000..51dc7d81b40a7a824eb465b5b85e0590fcebe132 --- /dev/null +++ b/test/Life/Organism.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "An organism is any living thing that functions as an individual. Such a definition raises more problems than it solves, not least because the concept of an individual is also difficult. Many criteria, few of them widely accepted, have been proposed to define what an organism is. Among the most common is that an organism has autonomous reproduction, growth, and metabolism. This would exclude viruses, despite the fact that they evolve like organisms. Other problematic cases include colonial organisms; a colony of eusocial insects is organised adaptively, and has germ-soma specialisation, with some insects reproducing, others not, like cells in an animal's body. The body of a siphonophore, a jelly-like marine animal, is composed of organism-like zooids, but the whole structure looks and functions much like an animal such as a jellyfish, the parts collaborating to provide the functions of the colonial organism.\nThe evolutionary biologists David Queller and Joan Strassmann state that \"organismality\", the qualities or attributes that define an entity as an organism, has evolved socially as groups of simpler units (from cells upwards) came to cooperate without conflicts. They propose that cooperation should be used as the \"defining trait\" of an organism. This would treat many types of collaboration, including the fungus/alga partnership of different species in a lichen, or the permanent sexual partnership of an anglerfish, as an organism.\nThe term \"organism\" (from the Ancient Greek ὀργανισμός, derived from órganon, meaning 'instrument, implement, tool', 'organ of sense', or 'apprehension') first appeared in the English language in the 1660s with the now-obsolete meaning of an organic structure or organization. It is related to the verb \"organize\". In his 1790 Critique of Judgment, Immanuel Kant defined an organism as \"both an organized and a self-organizing being\".Among the criteria that have been proposed for being an organism are:autonomous reproduction, growth, and metabolism\nnoncompartmentability : structure cannot be divided without losing functionality. Richard Dawkins stated this as \"the quality of being sufficiently heterogeneous in form to be rendered non-functional if cut in half\". However, many organisms can be cut into pieces which then grow into whole organisms.\nindividuality : the entity has simultaneous holdings of genetic uniqueness, genetic homogeneity and autonomy\nan immune response, separating self from foreign\n\"anti-entropy\", the ability to maintain order, a concept first proposed by Erwin Schrödinger; or in another form, that Claude Shannon's information theory can be used to identify organisms as capable of self-maintaining their information content\nOther scientists think that the concept of the organism is inadequate in biology; \nthat the concept of individuality is problematic; \nand from a philosophical point of view, question whether such a definition is necessary.\nProblematic cases include colonial organisms: for instance, a colony of eusocial insects fulfills criteria such as adaptive organisation and germ-soma specialisation. If so, the same argument, or a criterion of high co-operation and low conflict, would include some mutualistic (e.g. lichens) and sexual partnerships (e.g. anglerfish) as organisms. If group selection occurs, then a group could be viewed as a superorganism, optimized by group adaptation.\nAnother view is that attributes like autonomy, genetic homogeneity and genetic uniqueness should be examined separately rather than demanding that an organism should have all of them; if so, there are multiple dimensions to biological individuality, resulting in several types of organism.\nDiffering levels of biological organisation give rise to potentially different understandings of the nature of organisms. A unicellular organism is a microorganism such as a protist, bacterium, or archaean, composed of a single cell, which may contain functional structures called organelles. A multicellular organism such as an animal, plant, fungus, or alga is composed of many cells, often specialised. A colonial organism such as a siphonophore is a being which functions as an individual but is composed of communicating individuals. A superorganism is a colony, such as of ants, consisting of many individuals working together as a single functional or social unit. A mutualism is a partnership of two or more species which each provide some of the needs of the other. A lichen consists of fungi and algae or cyanobacteria, with a bacterial microbiome; together, they are able to flourish as a kind of organism, the components having different functions, in habitats such as dry rocks where neither could grow alone. The evolutionary biologists David Queller and Joan Strassmann state that \"organismality\" has evolved socially, as groups of simpler units (from cells upwards) came to cooperate without conflicts. They propose that cooperation should be used as the \"defining trait\" of an organism.Samuel Díaz‐Muñoz and colleagues (2016) accept Queller and Strassmann's view that organismality can be measured wholly by degrees of cooperation and of conflict. They state that this situates organisms in evolutionary time, so that organismality is context dependent. They suggest that highly integrated life forms, which are not context dependent, may evolve through context-dependent stages towards complete unification.\nViruses are not typically considered to be organisms, because they are incapable of autonomous reproduction, growth, metabolism, or homeostasis. Although viruses have a few enzymes and molecules like those in living organisms, they have no metabolism of their own; they cannot synthesize the organic compounds from which they are formed. In this sense, they are similar to inanimate matter. Viruses have their own genes, and they evolve. Thus, an argument that viruses should be classed as living organisms is their ability to undergo evolution and replicate through self-assembly. However, some scientists argue that viruses neither evolve nor self-reproduce. Instead, viruses are evolved by their host cells, meaning that there was co-evolution of viruses and host cells. If host cells did not exist, viral evolution would be impossible. As for reproduction, viruses rely on hosts' machinery to replicate. The discovery of viruses with genes coding for energy metabolism and protein synthesis fuelled the debate about whether viruses are living organisms, but the genes have a cellular origin. Most likely, they were acquired through horizontal gene transfer from viral hosts.There is an argument for viewing viruses as cellular organisms. Some researchers perceive viruses not as virions alone, which they believe are just spores of an organism, but as a virocell - an ontologically mature viral organism that has cellular structure. Such virus is a result of infection of a cell and shows all major physiological properties of other organisms: metabolism, growth, and reproduction, therefore, life in its effective presence.\nThe philosopher Jack A. Wilson examines some boundary cases to demonstrate that the concept of organism is not sharply defined. In his view, sponges, lichens, siphonophores, slime moulds, and eusocial colonies such as those of ants or naked molerats, all lie in the boundary zone between being definite colonies and definite organisms (or superorganisms).Scientists and bio-engineers are experimenting with different types of synthetic organism, from chimaeras composed of cells from two or more species, cyborgs including electromechanical limbs, hybrots containing both electronic and biological elements, and other combinations of systems that have variously evolved and been designed.An evolved organism takes its form by the partially understood mechanisms of evolutionary developmental biology, in which the genome directs an elaborated series of interactions to produce successively more elaborate structures. The existence of chimaeras and hybrids demonstrates that these mechanisms are \"intelligently\" robust in the face of radically altered circumstances at all levels from molecular to organismal.\nSynthetic organisms already take diverse forms, and their diversity will increase. What they all have in common is a teleonomic or goal-seeking behaviour that enables them to correct errors of many kinds so as to achieve whatever result they are designed for. Such behaviour is reminiscent of intelligent action by organisms; intelligence is seen as an embodied form of cognition.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_6" +} \ No newline at end of file diff --git a/test/Life/Oxygen_evolution.json b/test/Life/Oxygen_evolution.json new file mode 100644 index 0000000000000000000000000000000000000000..a9bf919ac04bcaf61f8d7733c72a274f490f8ba3 --- /dev/null +++ b/test/Life/Oxygen_evolution.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "Oxygen evolution is the chemical process of generating elemental diatomic oxygen (O2) by a chemical reaction, usually from water, the most abundant oxide compound in the universe. Oxygen evolution on Earth is effected by biotic oxygenic photosynthesis, photodissociation, hydroelectrolysis, and thermal decomposition of various oxides and oxyacids. When relatively pure oxygen is required industrially, it is isolated by distilling liquefied air.\nNatural oxygen evolution is essential to the biological process of all complex life on Earth, as aerobic respiration has become the most important biochemical process of eukaryotic thermodynamics since eukaryotes evolved through symbiogenesis during the Proterozoic eon, and such consumption can only continue if oxygen is cyclically replenished by photosynthesis. The various oxygenation events during Earth's history had not only influenced changes in Earth's biosphere, but also significantly altered the atmospheric chemistry. The transition of Earth's atmosphere from an anoxic prebiotic reducing atmosphere high in methane and hydrogen sulfide to an oxidative atmosphere of which free nitrogen and oxygen make up 99% of the mole fractions, had led to major climate changes and caused numerous icehouse phenomena and global glaciations.\nIn industries, oxygen evolution reaction (OER) is a limiting factor in the process of generating molecular oxygen through chemical reactions such as water splitting and electrolysis, and improved OER electrocatalysis is the key to the advancement of a number of renewable energy technologies such as solar fuels, regenerative fuel cells and metal:air batteries.\nPhotosynthetic oxygen evolution is the fundamental process by which oxygen is generated in the earth's biosphere. The reaction is part of the light-dependent reactions of photosynthesis in cyanobacteria and the chloroplasts of green algae and plants. It utilizes the energy of light to split a water molecule into its protons and electrons for photosynthesis. Free oxygen, generated as a by-product of this reaction, is released into the atmosphere.Water oxidation is catalyzed by a manganese-containing cofactor contained in photosystem II, known as the oxygen-evolving complex (OEC) or the water-splitting complex. Manganese is an important cofactor, and calcium and chloride are also required for the reaction to occur. \nThe protons are released into the thylakoid lumen, thus contributing to the generation of a proton gradient across the thylakoid membrane. This proton gradient is the driving force for adenosine triphosphate (ATP) synthesis via photophosphorylation and the coupling of the absorption of light energy and the oxidation of water for the creation of chemical energy during photosynthesis.\nIt was not until the end of the 18th century that Joseph Priestley accidentally discovered the ability of plants to \"restore\" air that had been \"injured\" by the burning of a candle. He followed up on the experiment by showing that air \"restored\" by vegetation was \"not at all inconvenient to a mouse.\" He was later awarded a medal for his discoveries that \"...no vegetable grows in vain... but cleanses and purifies our atmosphere.\" Priestley's experiments were further evaluated by Jan Ingenhousz, a Dutch physician, who then showed that the \"restoration\" of air only worked while in the presence of light and green plant parts.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_7" +} \ No newline at end of file diff --git a/test/Life/Pioneer_plaque.json b/test/Life/Pioneer_plaque.json new file mode 100644 index 0000000000000000000000000000000000000000..5612fd5251e70babfbd9a08fbeef8b401925e9db --- /dev/null +++ b/test/Life/Pioneer_plaque.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "The Pioneer plaques are a pair of gold-anodized aluminum plaques that were placed on board the 1972 Pioneer 10 and 1973 Pioneer 11 spacecraft, featuring a pictorial message, in case either Pioneer 10 or 11 is intercepted by intelligent extraterrestrial life. The plaques show the nude figures of a human male and female along with several symbols that are designed to provide information about the origin of the spacecraft.\nThe Pioneer 10 and 11 spacecraft were the first human-built objects to achieve escape velocity from the Solar System. The plaques were attached to the spacecraft's antenna support struts in a position that would shield them from erosion by interstellar dust.\nThe original idea, that the Pioneer spacecraft should carry a message from mankind, was first mentioned by Eric Burgess when he visited the Jet Propulsion Laboratory in Pasadena, California, during the Mariner 9 mission. He approached Carl Sagan, who had lectured about communication with intelligent extraterrestrials at a conference in Crimea.Sagan was enthusiastic about the idea of sending a message with the Pioneer spacecraft. NASA agreed to the plan and gave him three weeks to prepare a message. Together with Frank Drake he designed the plaque, and the artwork was prepared by Linda Salzman Sagan, who was Sagan's wife at the time. Additional artistic contributions were made by Jon Lomberg.\nBoth plaques were manufactured at Precision Engravers, San Carlos, California.\nThe first plaque was launched with Pioneer 10 on March 2, 1972, and the second followed with Pioneer 11 on April 5, 1973.\nIn May 2017, a limited edition of 200 replicas engraved from the original master design at Precision Engravers was made available in a Kickstarter Campaign, which also offered laser-engraved replicas.\nMaterial T6 gold-anodized aluminiumWidth inches (228.6 mm)\nHeight inches (152.4 mm)\nThickness.05 inches (1.27 mm)\nMean depth of engraving.015 inches (0.381 mm)\nMass: approx. 4.2 ounces (120 g)\nAt the top left of the plaque is a schematic representation of the hyperfine transition of hydrogen, which is the most abundant element in the universe. The spin-flip transition of a hydrogen atom's electron has a frequency of about 1420.405 MHz, which corresponds to a period of 0.704 ns. Light at this frequency has a vacuum wavelength of 21.106 centimetres (8.309 in) (which is also the distance the light travels in that time period). Below the symbol, the small vertical line—representing the binary digit 1—specifies a unit of length (21 cm) as well as a unit of time (0.7 ns). Both units are used as measurements in the other symbols.On the right side of the plaque, a nude man and woman are shown in front of the spacecraft. Between the brackets that indicate the height of the woman, the binary representation of the number 8 can be seen (1000). In units of the wavelength of the hyperfine transition of hydrogen this means 8 × 21 cm = 1.68 meters (5 ft 6 in).The small defect in the first zero is only in reproductions of the plaque (like here) and not on the original. It probably dates back to a printing error in the original article \"A Message from Earth\" which is the primary source for many of the copies of the engraving. In the replicas from the 2017 Kickstarter campaign mentioned above the delineation is correct.\nThe right hand of the man is raised as a sign of good will. Although this gesture may not be understood, it offers a way to show the opposable thumb and how the limbs can be moved.\nOriginally Sagan intended the humans to be shown holding hands, but soon realized that an extraterrestrial might perceive them as a single creature rather than two organisms.\nThe original drawings of the figures were based on drawings by Leonardo da Vinci and Greek sculptures.\nThe woman's genitals are not depicted in detail; only the mons pubis is shown. It has been claimed that Sagan, having little time to complete the plaque, suspected that NASA would have rejected a more intricate drawing and therefore made a compromise just to be safe. Sagan said that the decision to not include the vertical line on the woman's genitalia (pudendal cleft) which would be caused by the intersection of the labia majora was due to two reasons. First, Greek sculptures of women do not include that line. Second, Sagan believed that a design with such an explicit depiction of a woman's genitalia would be considered too obscene to be approved by NASA. According to the memoirs of Robert S. Kraemer, however, the original design that was presented to NASA headquarters included a line which indicated the woman's vulva, and this line was erased as a condition for approval of the design by John Naugle, former head of NASA's Office of Space Science and the agency's former chief scientist.\nThe radial pattern on the left of the plaque shows 15 lines emanating from the same origin. Fourteen of the lines have corresponding long binary numbers, which stand for the periods of pulsars, using the hydrogen spin-flip transition frequency as the unit. Since these periods will change over time, the epoch of the launch can be calculated from these values.The lengths of the lines show the relative distances of the pulsars to the Sun. A tick mark at the end of each line gives the Z coordinate perpendicular to the galactic plane.\nIf the plaque is found, only some of the pulsars may be visible from the location of its discovery. Showing the location with as many as 14 pulsars provides redundancy so that the location of the origin can be triangulated even if only some of the pulsars are recognized.\nThe data for one of the pulsars is misleading. When the plaque was designed, the frequency of pulsar \"1240\" (now known as J1243-6423) was known to only three significant decimal digits.388 second. The map lists the period of this pulsar in binary to much greater precision. Rounding this off at about 10 significant bits (100000110100000000000000000000) would have provided a hint of this uncertainty. This pulsar is represented by the long line pointing down and to the right.\nThe fifteenth line on the plaque extends to the far right, behind the human figures. This line indicates the Sun's relative distance to the center of the galaxy.\nThe pulsar map and hydrogen atom diagram are shared in common with the Voyager Golden Record.\nAt the bottom of the plaque is a schematic diagram of the Solar System. A small picture of the spacecraft is shown, and the trajectory shows its way past Jupiter and out of the Solar System. Both Pioneers 10 and 11 have identical plaques; however, after launch, Pioneer 11 was redirected toward Saturn and from there it exited the Solar System. In this regard the Pioneer 11 plaque is inaccurate.The Saturn flyby of Pioneer 11 would also greatly influence its future direction and destination as compared to Pioneer 10, but this fact is not depicted in the plaques.\nSaturn's rings could give a further hint to identifying the Solar System. Rings around the planets Jupiter, Uranus, and Neptune were unknown when the plaque was designed; however, unlike Saturn, the ring systems on these planets are not so easily visible and apparent as Saturn's. Pluto was considered to be a planet when the plaque was designed; in 2006 the IAU reclassified Pluto as a dwarf planet. Other large bodies classed as dwarf planets, such as Eris, are not depicted, as they were unknown at the time the plaque was made.\nThe binary numbers above and below the planets show the relative distance to the Sun. The unit is ⁠1/10⁠ of Mercury's orbit. Rather than the familiar \"1\" and \"0\", \"I\" and \":\" are used.\nBehind the figures of the human beings, the silhouette of the Pioneer spacecraft is shown in the same scale so that the size of the human beings can be deduced by measuring the spacecraft.One of the parts of the diagram that is among the easiest for humans to understand may be among the hardest for potential extraterrestrial finders to understand: the arrow showing the trajectory of Pioneer. Ernst Gombrich criticized the use of an arrow because arrows are an artifact of hunter-gatherer societies like those on Earth; finders with a different cultural heritage may find the arrow symbol meaningless.Art critic Craig Owens said that sexual bias is exhibited by the decision to have the man in the diagram perform the raised hand gesture to greet the extraterrestrials while the woman in the diagram has her hands at her sides. Feminists also took issue with this choice for the same reason. To appease these criticisms, a second illustration of a similar couple was provided, with the woman raising her hand instead.\nCarl Sagan regretted that the figures in the finished engraving failed to look panracial. Although this was the intent, the final figures were criticized for looking too white. Both had broad and flattened noses, and the woman was given epicanthial folds to resemble East Asian people. In the original drawing, the man was drawn with an \"Afro\" haircut, so an additional African physical trait would be included in the man to make the figures look more panracial, but that detail was changed to a \"non-African Mediterranean-curly haircut\" in the finished engraving. Furthermore, Carl Sagan said that Linda Sagan intended to portray both the man and woman as having brown hair, but the hair being only outlined, rather than being both outlined and shaded made their hair appear blonde instead. Other people had different interpretations of the race of people depicted by the figures. White people, Black people and East Asian people each tended to think that the figures resembled their own racial group, so, although some people were proud that their race appeared to have been selected to represent all of humankind, others viewed the figures as \"terribly racist\" for \"the apparently blatant exclusion\" of other races.\nLinda Sagan decided to make the figures nude to address the problem of the type of clothes they should wear to represent all of humanity and to make the figures more anatomically educational for extraterrestrials, but some viewed their nudity as pornographic. According to astronomer Frank Drake, there were many negative reactions to the plaque because the human beings were displayed naked. When images of the final design were published in American newspapers, one newspaper published the image with the man's genitalia removed and another newspaper published the image with both the man's genitalia and the woman's nipples removed. In one letter to a newspaper, a person angrily wrote that they felt that the nudity of the images made the images obscene. In contrast, in another letter to the same newspaper, a person was critical of the prudishness of the people who found depictions of nudity to be obscene. There have also been criticisms of the censorship of the female figure's genitals. Scientist and artist Joe Davis protested the depiction with his Poetica Vaginal project wherein he used an MIT radar dish to transmit the recordings of a vaginal detector.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_8" +} \ No newline at end of file diff --git a/test/Life/Survivorship_bias.json b/test/Life/Survivorship_bias.json new file mode 100644 index 0000000000000000000000000000000000000000..435ecb2e4711d55dafc70dee6270dcd1f560aacb --- /dev/null +++ b/test/Life/Survivorship_bias.json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "Survivorship bias or survival bias is the logical error of concentrating on entities that passed a selection process while overlooking those that did not. This can lead to incorrect conclusions because of incomplete data. \nSurvivorship bias is a form of selection bias that can lead to overly optimistic beliefs because multiple failures are overlooked, such as when companies that no longer exist are excluded from analyses of financial performance. It can also lead to the false belief that the successes in a group have some special property, rather than just coincidence as in correlation \"proves\" causality.\nThe parapsychology researcher Joseph Banks Rhine believed he had identified the few individuals from hundreds of potential subjects who had powers of extra-sensory perception (ESP). His calculations were based on the improbability of these few subjects guessing the Zener cards shown to a partner by chance. A major criticism that surfaced against his calculations was the possibility of unconscious survivorship bias in subject selections. He was accused of failing to take into account the large effective size of his sample; that is, all the subjects he rejected as not being \"strong telepaths\" because they had failed at an earlier testing stage. Had he done this, he might have seen that from the large sample, one or two individuals would probably achieve—purely by chance—the track record of success he observed.Writing about the Rhine case in Fads and Fallacies in the Name of Science, Martin Gardner explained that the experimenters had made such obvious mistakes not out of statistical naïveté, but rather as a result of subtly disregarding poorly performing subjects. He said that, even without trickery of any kind, if a large enough sample were taken, there would always be a certain number of subjects who demonstrated improbable success. To illustrate this, he speculates about what would happen if one hundred professors of psychology read Rhine's work and decided to make their own tests; he said that survivor bias would winnow out the typically failed experiments, while encouraging the lucky successes to continue testing. \nHe postulated that experiments confirming the null hypothesis (i.e., showing no result) would not be reported, but \"[e]ventually, one experimenter remains whose subject has made high scores for six or seven successive sessions. Neither experimenter nor subject is aware of the other ninety-nine projects, and so both have a strong delusion that ESP is operating.\" He concludes: \"The experimenter writes an enthusiastic paper, sends it to Rhine who publishes it in his magazine, and the readers are greatly impressed.\"\nIf sufficiently many scientists study a phenomenon, some will find statistically significant results by chance, and these are the experiments submitted for publication. Additionally, papers showing positive results may be more appealing to editors. This problem is known as positive results bias, a type of publication bias. To combat this, some editors now specifically call for the submission of \"negative\" scientific findings, where \"nothing happened\".\nSurvivorship bias is one of the research issues brought up in the provocative 2005 paper \"Why Most Published Research Findings Are False\", which shows that a large number of published medical research papers contain results that cannot be replicated.\nOne famous example of immortal time bias occurred in a study by Redelmeier and Singh, which was published in the Annals of Internal Medicine and purported to show that Academy Award-winning actors and actresses lived almost four years longer than their less successful peers. The statistical method used to derive this statistically significant difference, however, gave winners an unfair advantage, because it credited winners' years of life before winning toward survival subsequent to winning. When the data was reanalyzed using methods that avoided this immortal time bias, the survival advantage was closer to one year and was not statistically significant.\nIn finance, survivorship bias is the tendency for failed companies to be excluded from performance studies because they no longer exist. It often causes the results of studies to skew higher because only companies that were successful enough to survive until the end of the period are included. For example, a mutual fund company's selection of funds today will include only those that are successful now. Many losing funds are closed and merged into other funds to hide poor performance. In theory, 70% of extant funds could truthfully claim to have performance in the first quartile of their peers, if the peer group includes funds that have closed.In 1996, Elton, Gruber, and Blake showed that survivorship bias is larger in the small-fund sector than in large mutual funds (presumably because small funds have a high probability of folding). They estimate the size of the bias across the U.S. mutual fund industry as 0.9% per annum, where the bias is defined and measured as:\nAdditionally, in the financial field survivorship bias is the use of a current index membership set rather than using the actual constituent changes over time. Consider a backtest to 1990 to find the average performance (total return) of S&P 500 members who have paid dividends within the previous year. To use the current 500 members only and create a historical equity line of the total return of the companies that met the criteria would be adding survivorship bias to the results. S&P maintains an index of healthy companies, removing companies that no longer meet their criteria as a representative of the large-cap U.S. stock market. Companies that had healthy growth on their way to inclusion in the S&P 500 would be counted as if they were in the index during that growth period, which they were not. Instead there may have been another company in the index that was losing market capitalization and was destined for the S&P 600 Small-cap Index that was later removed and would not be counted in the results. Using the actual membership of the index and applying entry and exit dates to gain the appropriate return during inclusion in the index would allow for a bias-free output.\nMichael Shermer in Scientific American and Larry Smith of the University of Waterloo have described how advice about commercial success distorts perceptions of it by ignoring all of the businesses and college dropouts that failed. Journalist and author David McRaney observes that the \"advice business is a monopoly run by survivors. When something becomes a non-survivor, it is either completely eliminated, or whatever voice it has is muted to zero\". Alec Liu wrote in Vice that \"for every Mark Zuckerberg, there's thousands of also-rans, who had parties no one ever attended, obsolete before we ever knew they existed.\"In his book The Black Swan, financial writer Nassim Taleb called the data obscured by survivorship bias \"silent evidence\".\nDiagoras of Melos was asked concerning paintings of those who had escaped shipwreck: \"Look, you who think the gods have no care of human things, what do you say to so many persons preserved from death by their especial favour?\", to which Diagoras replied: \"Why, I say that their pictures are not here who were cast away, who are by much the greater number.\"Susan Mumm has described how survival bias leads historians to study organisations that are still in existence more than those that have closed. This means large, successful organisations such as the Women's Institute, which were well organised and still have accessible archives for historians to work from, are studied more than smaller charitable organisations, even though these may have done a great deal of work.\nJust as new buildings are being built every day and older structures are constantly torn down, the story of most civil and urban architecture involves a process of constant renewal, renovation, and revolution. Only the most beautiful, useful, and structurally sound buildings survive from one generation to the next. This creates a selection effect where the ugliest and weakest buildings of history have been eradicated (disappearing from public view, leaving the visible impression that all earlier buildings were more beautiful and better built).Whether it be movie stars, athletes, musicians, or CEOs of multibillion-dollar corporations who dropped out of school, popular media often tells the story of the determined individual who pursues their dreams and beats the odds. There is much less focus on the many people that may be similarly skilled and determined, but fail to ever find success because of factors beyond their control or other (seemingly) random events. There is also a tendency to overlook resources and events that helped enable such success, that those who failed didn't have. For example, a 2013 study found that 91% of artists were undiscovered on social media, and just 1.1% were mainstream or mega-sized. The overwhelming majority of failures are not visible to the public eye, and only those who survive the selective pressures of their competitive environment are seen regularly.\nDuring World War II, the statistician Abraham Wald took survivorship bias into his calculations when considering how to minimize bomber losses to enemy fire. The Statistical Research Group (SRG) at Columbia University, which Wald was a part of, examined the damage done to aircraft that had returned from missions and recommended adding armor to the areas that showed the least damage. The bullet holes in the returning aircraft represented areas where a bomber could take damage and still fly well enough to return safely to base. Therefore, Wald proposed that the Navy reinforce areas where the returning aircraft were unscathed,  inferring that planes hit in those areas were the ones most likely to be lost. His work is considered seminal in the then nascent discipline of operational research.In a study performed in 1987, it was reported that cats who fall from less than six stories, and are still alive, have greater injuries than cats who fall from higher than six stories. It has been proposed that this might happen because cats reach terminal velocity after righting themselves at about five stories, and after this point they relax, leading to less severe injuries in cats who have fallen from six or more stories. In 1996, The Straight Dope newspaper column proposed that another possible explanation for this phenomenon would be survivorship bias. Cats that die in falls are less likely to be brought to a veterinarian than injured cats, and thus many of the cats killed in falls from higher buildings are not reported in studies of the subject.Large groups of organisms called clades that survive a long time are subject to various survivorship biases such as the \"push of the past\", generating the illusion that clades in general tend to originate with a high rate of diversification that then slows through time.Survivorship bias can raise truth-in-advertising issues when the success rate advertised for a product or service is measured by reference to a population whose makeup differs from that of the target audience for the advertisement. This is especially important whenthe advertisement either fails to disclose the relevant differences between the two populations, or describes them in insufficient detail; and\nthese differences result from the company's deliberate \"pre-screening\" of prospective customers to ensure that only customers with traits increasing their likelihood of success are allowed to purchase the product or service, especially when the company's selection procedures or evaluation standards are kept secret; and\nthe company offering the product or service charges a fee, especially one that is non-refundable or not disclosed in the advertisement, for the privilege of attempting to become a customer.\nFor example, the advertisements of online dating service eHarmony.com fail a truth in advertising test because they fail the first two prongs and pass the third, when all three must be passed:\nthey claim a success rate significantly higher than that of competing services while generally not disclosing that the rate is calculated with respect to a viewership subset of individuals who possess traits that increase their likelihood of finding and maintaining relationships and lack traits that pose obstacles to their doing so, and\nthe company deliberately selects for these traits by administering a lengthy pre-screening process designed to reject prospective customers who lack the former traits or possess the latter ones, but \nthe company does not charge a fee for administration of its pre-screening test; thus its prospective customers face no \"downside risk\" other than wasting their time, expending the effort involved in completing the pre-screening process, and suffering disappointment.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_9" +} \ No newline at end of file diff --git a/test/Life/Tree_of_life_(biology).json b/test/Life/Tree_of_life_(biology).json new file mode 100644 index 0000000000000000000000000000000000000000..3e3b82057eaf96ea8b1b3dd4a6da067c56e9dda5 --- /dev/null +++ b/test/Life/Tree_of_life_(biology).json @@ -0,0 +1,59 @@ +{ + "domain": "Life", + "document": "The tree of life or universal tree of life is a metaphor, conceptual model, and research tool used to explore the evolution of life and describe the relationships between organisms, both living and extinct, as described in a famous passage in Charles Darwin's On the Origin of Species (1859).\nThe affinities of all the beings of the same class have sometimes been represented by a great tree. I believe this simile largely speaks the truth.\nTree diagrams originated in the medieval era to represent genealogical relationships. Phylogenetic tree diagrams in the evolutionary sense date back to the mid-nineteenth century.\nThe term phylogeny for the evolutionary relationships of species through time was coined by Ernst Haeckel, who went further than Darwin in proposing phylogenic histories of life. In contemporary usage, tree of life refers to the compilation of comprehensive phylogenetic databases rooted at the last universal common ancestor of life on Earth. Two public databases for the tree of life are TimeTree, for phylogeny and divergence times, and the Open Tree of Life, for phylogeny.\nAlthough tree-like diagrams have long been used to organise knowledge, and although branching diagrams known as claves (\"keys\") were omnipresent in eighteenth-century natural history, it appears that the earliest tree diagram of natural order was the 1801 \"Arbre botanique\" (Botanical Tree) of the French schoolteacher and Catholic priest Augustin Augier. Yet, although Augier discussed his tree in distinctly genealogical terms, and although his design clearly mimicked the visual conventions of a contemporary family tree, his tree did not include any evolutionary or temporal aspect. Consistent with Augier's priestly vocation, the Botanical Tree showed rather the perfect order of nature as instituted by God at the moment of Creation.In 1809, Augier's more famous compatriot Jean-Baptiste Lamarck (1744:1829), who was acquainted with Augier's \"Botanical Tree\", included a branching diagram of animal species in his Philosophie zoologique. Unlike Augier, however, Lamarck did not discuss his diagram in terms of a genealogy or a tree, but instead named it a tableau (\"depiction\"). Lamarck believed in the transmutation of life forms, but he did not believe in common descent; instead he believed that life developed in parallel lineages (repeated, spontaneous generation) advancing from more simple to more complex.\nIn 1840, the American geologist Edward Hitchcock (1793:1864) published the first tree-like paleontology chart in his Elementary Geology, with two separate trees for the plants and the animals. These are crowned (graphically) with the Palms and Man.\nThe first edition of Robert Chambers' Vestiges of the Natural History of Creation, published anonymously in 1844 in England, contained a tree-like diagram in the chapter \"Hypothesis of the development of the vegetable and animal kingdoms\". It shows a model of embryological development where fish (F), reptiles (R), and birds (B) represent branches from a path leading to mammals (M). In the text this branching tree idea is tentatively applied to the history of life on earth: \"there may be branching\".\nIn 1858, a year before Darwin's Origin, the paleontologist Heinrich Georg Bronn (1800:1862) published a hypothetical tree labelled with letters. Although not a creationist, Bronn did not propose a mechanism of change.\nCharles Darwin (1809:1882) used the metaphor of a \"tree of life\" to conceptualise his theory of evolution. In On the Origin of Species (1859) he presented an abstract diagram of a portion of a larger timetree for species of an unnamed large genus (see figure). On the horizontal base line hypothetical species within this genus are labelled A : L and are spaced irregularly to indicate how distinct they are from each other, and are above broken lines at various angles suggesting that they have diverged from one or more common ancestors. On the vertical axis divisions labelled I : XIV each represent a thousand generations. From A, diverging lines show branching descent producing new varieties, some of which become extinct, so that after ten thousand generations descendants of A have become distinct new varieties or even sub-species a10, f10, and m10. Similarly, the descendants of I have diversified to become the new varieties w10 and z10. The process is extrapolated for a further four thousand generations so that the descendants of A and I become fourteen new species labelled a14 to z14. While F has continued for fourteen thousand generations relatively unchanged, species B,C,D,E,G,H,K and L have gone extinct. In Darwin's own words: \"Thus the small differences distinguishing varieties of the same species, will steadily tend to increase till they come to equal the greater differences between species of the same genus, or even of distinct genera.\" Darwin's tree is not a tree of life, but rather a small portion created to show the principle of evolution. Because it shows relationships (phylogeny) and time (generations), it is a timetree. In contrast, Ernst Haeckel illustrated a phylogenetic tree (branching only) in 1866, not scaled to time, and of real species and higher taxa. In his summary to the section, Darwin put his concept in terms of the metaphor of the tree of life:The affinities of all the beings of the same class have sometimes been represented by a great tree. I believe this simile largely speaks the truth. The green and budding twigs may represent existing species; and those produced during each former year may represent the long succession of extinct species. At each period of growth all the growing twigs have tried to branch out on all sides, and to overtop and kill the surrounding twigs and branches, in the same manner as species and groups of species have tried to overmaster other species in the great battle for life. The limbs divided into great branches, and these into lesser and lesser branches, were themselves once, when the tree was small, budding twigs; and this connexion of the former and present buds by ramifying branches may well represent the classification of all extinct and living species in groups subordinate to groups. Of the many twigs which flourished when the tree was a mere bush, only two or three, now grown into great branches, yet survive and bear all the other branches; so with the species which lived during long-past geological periods, very few now have living and modified descendants. From the first growth of the tree, many a limb and branch has decayed and dropped off; and these lost branches of various sizes may represent those whole orders, families, and genera which have now no living representatives, and which are known to us only from having been found in a fossil state. As we here and there see a thin straggling branch springing from a fork low down in a tree, and which by some chance has been favoured and is still alive on its summit, so we occasionally see an animal like the Ornithorhynchus or Lepidosiren, which in some small degree connects by its affinities two large branches of life, and which has apparently been saved from fatal competition by having inhabited a protected station. As buds give rise by growth to fresh buds, and these, if vigorous, branch out and overtop on all sides many a feebler branch, so by generation I believe it has been with the great Tree of Life, which fills with its dead and broken branches the crust of the earth, and covers the surface with its ever branching and beautiful ramifications.\nThe meaning and importance of Darwin's use of the tree of life metaphor have been extensively discussed by scientists and scholars. Stephen Jay Gould, for one, has argued that Darwin placed the famous passage quoted above \"at a crucial spot in his text\", where it marked the conclusion of his argument for natural selection, illustrating both the interconnectedness by descent of organisms as well as their success and failure in the history of life. David Penny has written that Darwin did not use the tree of life to describe the relationship between groups of organisms, but to suggest that, as with branches in a living tree, lineages of species competed with and supplanted one another. Petter Hellström has argued that Darwin consciously named his tree after the biblical Tree of Life, as described in Genesis, thus relating his theory to the religious tradition.\nErnst Haeckel (1834:1919) constructed several trees of life. His first sketch, in the 1860s, shows \"Pithecanthropus alalus\" as the ancestor of Homo sapiens. His 1866 tree of life from Generelle Morphologie der Organismen shows three kingdoms: Plantae, Protista and Animalia. This has been described as \"the earliest 'tree of life' model of biodiversity\". His 1879 \"Pedigree of Man\" was published in his 1879 book The Evolution of Man. It traces all life forms to the Monera, and places Man (labelled \"Menschen\") at the top of the tree.In 1990, Carl Woese, Otto Kandler and Mark Wheelis proposed a novel \"tree of life\" consisting of three lines of descent for which they introduced the term domain as the highest rank of classification. They suggested and formally defined the terms Bacteria, Archaea and Eukarya for the three domains of life. It was the first tree founded on molecular phylogenetics and microbial evolution as its basis. The model of a tree is still considered valid for eukaryotic life forms. Trees have been proposed with either four or two supergroups. There does not yet appear to be a consensus; in a 2009 review article, Roger and Simpson conclude that \"with the current pace of change in our understanding of the eukaryote tree of life, we should proceed with caution.\"\nIn 2015, the third version of TimeTree was released, with 2,274 studies and 50,632 species, represented in a spiral tree of life, free to download.\nIn 2015, the first draft of the Open Tree of Life was published, in which information from nearly 500 previously published trees was combined into a single online database, free to browse and download. Another database, TimeTree, helps biologists to evaluate phylogeny and divergence times.\nIn 2016, a new tree of life (unrooted), summarising the evolution of all known life forms, was published, illustrating the latest genetic findings that the branches were mainly composed of bacteria. The new study incorporated over a thousand newly discovered bacteria and archaea.\nIn 2022, the fifth version of TimeTree was released, incorporating 4,185 published studies and 148,876 species, representing the largest timetree of life from actual data (non-imputed).\nThe prokaryotes (the two domains of bacteria and archaea) and certain animals such as bdelloid rotifers freely pass genetic information between unrelated organisms by horizontal gene transfer. Recombination, gene loss, duplication, and gene creation are a few of the processes by which genes can be transferred within and between bacterial and archaeal species, causing variation that is not due to vertical transfer. There is emerging evidence of horizontal gene transfer within the prokaryotes at the single and multicell level, so the tree of life does not explain the full complexity of the situation in the prokaryotes. This is a major problem for the tree of life because there is consensus that eukaryotes arose from a fusion between bacteria and archaea, meaning that the tree of life is not fully bifurcating and should not be represented as such for that important node. Secondly, unrooted phylogenetic networks are not true evolutionary trees (or trees of life) because there is no directionality, and therefore the tree of life needs a root.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "IndigenousTo", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "InterestedIn", + "ApprovedBy", + "ContributedToCreativeWork", + "Represents", + "UsedBy", + "AttributedTo", + "HasQuality", + "IsPollinatorOf", + "IsPollinatedBy", + "HasLyrics", + "LocatedIn", + "HasCharacteristic", + "PartOf", + "HasEffect", + "InstanceOf", + "PrimeFactor", + "ParentTaxon", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Life_10" +} \ No newline at end of file diff --git a/test/Mathematics/Akira_Yoshizawa.json b/test/Mathematics/Akira_Yoshizawa.json new file mode 100644 index 0000000000000000000000000000000000000000..dd34449a898de6f78c85cb77e754bf6ec0d9f17d --- /dev/null +++ b/test/Mathematics/Akira_Yoshizawa.json @@ -0,0 +1,44 @@ +{ + "domain": "Mathematics", + "document": "Akira Yoshizawa (Yoshizawa Akira, 14 March 1911 : 14 March 2005) was a Japanese origamist, considered to be the grandmaster of origami. He is credited with raising origami from a craft to a living art. According to his own estimation made in 1989, he created more than 50,000 models, of which only a few hundred designs were presented as diagrams in his 18 books. Yoshizawa acted as an international cultural ambassador for Japan throughout his career. In 1983, Emperor Hirohito awarded him the Order of the Rising Sun, 5th class, one of the highest honors bestowed in Japan.\nYoshizawa was born on 14th March 1911, in Kaminokawa, Japan, to the family of a dairy farmer. When he was a child, he took pleasure in teaching himself origami. He moved into a factory job in Tokyo when he was 13 years old. His passion for origami was rekindled in his early 20s, when he was promoted from factory worker to technical draftsman. His new job was to teach junior employees geometry. Yoshizawa used the traditional art of origami to understand and communicate geometrical problems.In 1937, he left factory work to pursue origami full-time. During the next 20 years, he lived in total poverty, earning his living by door-to-door selling of tsukudani (a Japanese preserved condiment that is usually made of seaweed). During World War II, Yoshizawa served in the army medical corps in Hong Kong. He made origami models to cheer up the sick patients, but eventually fell ill himself and was sent back to Japan. His origami work was creative enough to be included in the 1944 book Origami Shuko, by Isao Honda (本多 功). However, it was his work for the January 1952 issue of the magazine Asahi Graph that launched his career, which included the 12 zodiac signs commissioned by a magazine.\nIn 1954, his first monograph, Atarashii Origami Geijutsu (New Origami Art) was published. In this work, he established the Yoshizawa:Randlett system of notation for origami folds (a system of symbols, arrows and diagrams), which has become the standard for most paperfolders. The publishing of this book helped Yoshizawa out of his poverty. It was followed closely by his founding of the International Origami Centre in Tokyo in 1954, when he was 43.\nHis first overseas exhibition was organized in October 1955 by Gershon Legman, a leading player in the early years of the origami movement. The exhibition was held at the Stedelijk Museum in Amsterdam. Felix Tikotin, a Dutch dealer, acted as a liaison.\nYoshizawa lent many of his own origami models to other exhibitions around the world. He would never sell his origami figures, but rather gave them away as gifts to people, and let other groups and organizations borrow them for exhibiting.\nHis second wife, Kiyo Yoshizawa, served as his manager and taught origami to the other patients where he was hospitalized until his death.\nAlthough Yoshizawa pioneered many different origami techniques, wet-folding is one of his most significant contributions. This technique involves slightly dampening the paper before making a fold. Wet-folding allows the paper to be manipulated more easily, resulting in finished origami models that have a rounder and more sculpted look.Wet-folding is most often used with thicker paper; normal origami paper is very thin and thus prone to tearing when using the wet-folding technique. Yoshizawa believed the process was the most important part. He was known to say that, \"When you fold, the ritual and the act of creation is more important than the final result. When your hands are busy your heart is serene\".\nIn March 1998, Yoshizawa was invited to exhibit his origami in the Carrousel du Louvre in France. Although he had previously disliked his contemporaries, he was not opposed to having his photo taken with them. Many of his patterns had been diagrammed by his professional rivals, which angered Yoshizawa when he was younger. However, as he had aged, he found that he now enjoyed the company of his peers.Yoshizawa died on 14 March 2005 in a hospital in Itabashi, Tokyo, of complications from pneumonia, on his 94th birthday.\nAfter his death, he was featured in Between the Folds, a documentary about origami that called him the father of modern, sculptural approaches to origami.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Occupation", + "DateOfDeath", + "LocatedIn", + "EducationInstitution", + "CountryOfBirth", + "DateOfBirth", + "Spouse", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Mathematics_0" +} \ No newline at end of file diff --git a/test/Mathematics/Ethics_in_mathematics.json b/test/Mathematics/Ethics_in_mathematics.json new file mode 100644 index 0000000000000000000000000000000000000000..afe5fe78c322280cd0db350fb3f5da55b92ea72c --- /dev/null +++ b/test/Mathematics/Ethics_in_mathematics.json @@ -0,0 +1,44 @@ +{ + "domain": "Mathematics", + "document": "Ethics in mathematics is an emerging field of applied ethics, the inquiry into ethical aspects of the practice and applications of mathematics. It deals with the professional responsibilities of mathematicians whose work influences decisions with major consequences, such as in law, finance, the military, and environmental science. When understood in its socio-economic context, the development of mathematical works can lead to ethical questions ranging from the handling and manipulation of big data to questions of responsible mathematisation and falsification of models, explainable and safe mathematics, as well as many issues related to communication and documentation. The usefulness of a Hippocratic oath for mathematicians is an issue of ongoing debate among scholars. As an emerging field of applied ethics, many of its foundations are still highly debated. The discourse remains in flux. Especially the notion that mathematics can do harm remains controversial.\nThe ethical questions surrounding the practice of mathematics can be connected to issues of dual-use. An instrumental interpretation of the impact of mathematics makes it difficult to see ethical consequences, yet it might be easier to see how all branches of mathematics serve to structure and conceptualize solutions to real problems. These structures can set up perverse incentives, where targets can be met without improving services, or league table positions are gamed. While the assumptions written into metrics often reflect the worldview of the groups who are responsible for designing them, they are harder for non-experts to challenge, leading to injustices. As mathematicians can enter the workforce of industrialised nations in many places that are no longer limited to teaching and academia, scholars have made the argument that it is necessary to add ethical training into the mathematical curricula at universities.\nThe philosophical positions on the relationship between mathematics and ethics are varied. Some philosophers (e.g. Plato) see both mathematics and ethics as rational and similar, while others (e.g. Rudolf Carnap) see ethics as irrational and different from mathematics. Possible tensions between applying mathematics in a social context and its ethics can already be observed in Plato's Republic (Book VIII) where the use of mathematics to produce better guardians plays a critical role in its collapse.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Occupation", + "DateOfDeath", + "LocatedIn", + "EducationInstitution", + "CountryOfBirth", + "DateOfBirth", + "Spouse", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Mathematics_1" +} \ No newline at end of file diff --git a/test/Mathematics/George_Gheverghese_Joseph.json b/test/Mathematics/George_Gheverghese_Joseph.json new file mode 100644 index 0000000000000000000000000000000000000000..cfcee3034f328b61e644684fc35fb1caa4101fc9 --- /dev/null +++ b/test/Mathematics/George_Gheverghese_Joseph.json @@ -0,0 +1,44 @@ +{ + "domain": "Mathematics", + "document": "George Gheverghese Joseph, also known as G. G. Joseph is an Indian-born African mathematician who is a specialist in the history of mathematics. His works are mainly focused on the achievements of Kerala school of astronomy and mathematics and the transmission of mathematics from India to Europe.\nGeorge Gheverghese Joseph was born in Kerala, India. At the age of 9, his family moved to Mombasa, Kenya and he pursued his schooling in Kenya. He completed his degree in mathematics at the University of Leicester. After completing his degree, he worked as a school teacher for six years in Kenya and, then he did a master's degree at the University of Manchester, England. He qualified in Law in 2000. G. G. Joseph studied and conducted researches in applied mathematics and statistics, including multivariate analysis, mathematical programming, and demography. He is conducting three-month research on the history of mathematics in his native place every year. Through his series of researches, he argued that the infinite series was invented by Kerala mathematicians in 1350, before Europeans.\n", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Occupation", + "DateOfDeath", + "LocatedIn", + "EducationInstitution", + "CountryOfBirth", + "DateOfBirth", + "Spouse", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Mathematics_2" +} \ No newline at end of file diff --git a/test/Mathematics/Mathematical_diagram.json b/test/Mathematics/Mathematical_diagram.json new file mode 100644 index 0000000000000000000000000000000000000000..46572a64888b72a34512087c9d6eeab3451d5ab3 --- /dev/null +++ b/test/Mathematics/Mathematical_diagram.json @@ -0,0 +1,44 @@ +{ + "domain": "Mathematics", + "document": "Mathematical diagrams, such as charts and graphs, are mainly designed to convey mathematical relationships—for example, comparisons over time.\nA complex number can be visually represented as a pair of numbers forming a vector on a diagram called an Argand diagramThe complex plane is sometimes called the Argand plane because it is used in Argand diagrams. These are named after Jean-Robert Argand (1768:1822), although they were first described by Norwegian-Danish land surveyor and mathematician Caspar Wessel (1745:1818). Argand diagrams are frequently used to plot the positions of the poles and zeroes of a function in the complex plane.\nThe concept of the complex plane allows a geometric interpretation of complex numbers. Under addition, they add like vectors. The multiplication of two complex numbers can be expressed most easily in polar coordinates — the magnitude or modulus of the product is the product of the two absolute values, or moduli, and the angle or argument of the product is the sum of the two angles, or arguments. In particular, multiplication by a complex number of modulus 1 acts as a rotation.\nIn the context of fast Fourier transform algorithms, a butterfly is a portion of the computation that combines the results of smaller discrete Fourier transforms (DFTs) into a larger DFT, or vice versa (breaking a larger DFT up into subtransforms). The name \"butterfly\" comes from the shape of the data-flow diagram in the radix-2 case, as described below. The same structure can also be found in the Viterbi algorithm, used for finding the most likely sequence of hidden states.The butterfly diagram show a data-flow diagram connecting the inputs x (left) to the outputs y that depend on them (right) for a \"butterfly\" step of a radix-2 Cooley:Tukey FFT algorithm. This diagram resembles a butterfly as in the Morpho butterfly shown for comparison, hence the name.\nIn mathematics, and especially in category theory, a commutative diagram is a diagram of objects, also known as vertices, and morphisms, also known as arrows or edges, such that when selecting two objects any directed path through the diagram leads to the same result by composition.Commutative diagrams play the role in category theory that equations play in algebra.\nA Hasse diagram is a simple picture of a finite partially ordered set, forming a drawing of the partial order's transitive reduction. Concretely, one represents each element of the set as a vertex on the page and draws a line segment or curve that goes upward from x to y precisely when x < y and there is no z such that x < z < y. In this case, we say y covers x, or y is an immediate successor of x. In a Hasse diagram, it is required that the curves be drawn so that each meets exactly two vertices: its two endpoints. Any such diagram (given that the vertices are labeled) uniquely determines a partial order, and any partial order has a unique transitive reduction, but there are many possible placements of elements in the plane, resulting in different Hasse diagrams for a given order that may have widely varying appearances.In Knot theory a useful way to visualise and manipulate knots is to project the knot onto a plane—;think of the knot casting a shadow on the wall. A small perturbation in the choice of projection will ensure that it is one-to-one except at the double points, called crossings, where the \"shadow\" of the knot crosses itself once transverselyAt each crossing we must indicate which section is \"over\" and which is \"under\", so as to be able to recreate the original knot. This is often done by creating a break in the strand going underneath. If by following the diagram the knot alternately crosses itself \"over\" and \"under\", then the diagram represents a particularly well-studied class of knot, alternating knots.\nA Venn diagram is a representation of mathematical sets: a mathematical diagram representing sets as circles, with their relationships to each other expressed through their overlapping positions, so that all possible relationships between the sets are shown.The Venn diagram is constructed with a collection of simple closed curves drawn in the plane. The principle of these diagrams is that classes be represented by regions in such relation to one another that all the possible logical relations of these classes can be indicated in the same diagram. That is, the diagram initially leaves room for any possible relation of the classes, and the actual or given relation, can then be specified by indicating that some particular region is null or is not null.\nA Voronoi diagram is a special kind of decomposition of a metric space determined by distances to a specified discrete set of objects in the space, e.g., by a discrete set of points. This diagram is named after Georgy Voronoi, also called a Voronoi tessellation, a Voronoi decomposition, or a Dirichlet tessellation after Peter Gustav Lejeune Dirichlet.In the simplest case, we are given a set of points S in the plane, which are the Voronoi sites. Each site s has a Voronoi cell V(s) consisting of all points closer to s than to any other site. The segments of the Voronoi diagram are all the points in the plane that are equidistant to two sites. The Voronoi nodes are the points equidistant to three (or more) sites\nA wallpaper group or plane symmetry group or plane crystallographic group is a mathematical classification of a two-dimensional repetitive pattern, based on the symmetries in the pattern. Such patterns occur frequently in architecture and decorative art. There are 17 possible distinct groups.Wallpaper groups are two-dimensional symmetry groups, intermediate in complexity between the simpler frieze groups and the three-dimensional crystallographic groups, also called space groups. Wallpaper groups categorize patterns by their symmetries. Subtle differences may place similar patterns in different groups, while patterns which are very different in style, color, scale or orientation may belong to the same group.\nA Young diagram or Young tableau, also called Ferrers diagram, is a finite collection of boxes, or cells, arranged in left-justified rows, with the row sizes weakly decreasing (each row has the same or shorter length than its predecessor). ", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Occupation", + "DateOfDeath", + "LocatedIn", + "EducationInstitution", + "CountryOfBirth", + "DateOfBirth", + "Spouse", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Mathematics_3" +} \ No newline at end of file diff --git a/test/Mathematics/Mathematician.json b/test/Mathematics/Mathematician.json new file mode 100644 index 0000000000000000000000000000000000000000..f7c1c0fe668db73e6ad5f6d9133921489df7a066 --- /dev/null +++ b/test/Mathematics/Mathematician.json @@ -0,0 +1,44 @@ +{ + "domain": "Mathematics", + "document": "A mathematician is someone who uses an extensive knowledge of mathematics in their work, typically to solve mathematical problems. Mathematicians are concerned with numbers, data, quantity, structure, space, models, and change.\nOne of the earliest known mathematicians was Thales of Miletus (c. 624 : c. 546 BC); he has been hailed as the first true mathematician and the first known individual to whom a mathematical discovery has been attributed. He is credited with the first use of deductive reasoning applied to geometry, by deriving four corollaries to Thales's theorem.The number of known mathematicians grew when Pythagoras of Samos (c. 582 : c. 507 BC) established the Pythagorean school, whose doctrine it was that mathematics ruled the universe and whose motto was \"All is number\". It was the Pythagoreans who coined the term \"mathematics\", and with whom the study of mathematics for its own sake begins.\nThe first woman mathematician recorded by history was Hypatia of Alexandria (c. AD 350 : 415). She succeeded her father as librarian at the Great Library and wrote many works on applied mathematics. Because of a political dispute, the Christian community in Alexandria punished her, presuming she was involved, by stripping her naked and scraping off her skin with clamshells (some say roofing tiles).\nScience and mathematics in the Islamic world during the Middle Ages followed various models and modes of funding varied based primarily on scholars. It was extensive patronage and strong intellectual policies implemented by specific rulers that allowed scientific knowledge to develop in many areas. Funding for translation of scientific texts in other languages was ongoing throughout the reign of certain caliphs, and it turned out that certain scholars became experts in the works they translated, and in turn received further support for continuing to develop certain sciences. As these sciences received wider attention from the elite, more scholars were invited and funded to study particular sciences. An example of a translator and mathematician who benefited from this type of support was Al-Khawarizmi. A notable feature of many scholars working under Muslim rule in medieval times is that they were often polymaths. Examples include the work on optics, maths and astronomy of Ibn al-Haytham.\nThe Renaissance brought an increased emphasis on mathematics and science to Europe. During this period of transition from a mainly feudal and ecclesiastical culture to a predominantly secular one, many notable mathematicians had other occupations: Luca Pacioli (founder of accounting); Niccolò Fontana Tartaglia (notable engineer and bookkeeper); Gerolamo Cardano (earliest founder of probability and binomial expansion); Robert Recorde (physician) and François Viète (lawyer).\nAs time passed, many mathematicians gravitated towards universities. An emphasis on free thinking and experimentation had begun in Britain's oldest universities beginning in the seventeenth century at Oxford with the scientists Robert Hooke and Robert Boyle, and at Cambridge where Isaac Newton was Lucasian Professor of Mathematics & Physics. Moving into the 19th century, the objective of universities all across Europe evolved from teaching the \"regurgitation of knowledge\" to \"encourag[ing] productive thinking.\" In 1810, Alexander von Humboldt convinced the king of Prussia, Fredrick William III, to build a university in Berlin based on Friedrich Schleiermacher's liberal ideas; the goal was to demonstrate the process of the discovery of knowledge and to teach students to \"take account of fundamental laws of science in all their thinking.\" Thus, seminars and laboratories started to evolve.\nBritish universities of this period adopted some approaches familiar to the Italian and German universities, but as they already enjoyed substantial freedoms and autonomy the changes there had begun with the Age of Enlightenment, the same influences that inspired Humboldt. The Universities of Oxford and Cambridge emphasized the importance of research, arguably more authentically implementing Humboldt's idea of a university than even German universities, which were subject to state authority. Overall, science (including mathematics) became the focus of universities in the 19th and 20th centuries. Students could conduct research in seminars or laboratories and began to produce doctoral theses with more scientific content. According to Humboldt, the mission of the University of Berlin was to pursue scientific knowledge. The German university system fostered professional, bureaucratically regulated scientific research performed in well-equipped laboratories, instead of the kind of research done by private and individual scholars in Great Britain and France. In fact, Rüegg asserts that the German system is responsible for the development of the modern research university because it focused on the idea of \"freedom of scientific research, teaching and study.\"\nMathematicians usually cover a breadth of topics within mathematics in their undergraduate education, and then proceed to specialize in topics of their own choice at the graduate level. In some universities, a qualifying exam serves to test both the breadth and depth of a student's understanding of mathematics; the students who pass are permitted to work on a doctoral dissertation.", + "RE_label_set": [ + "HasPart", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "AwardReceived", + "Creator", + "InfluencedBy", + "SignificantEvent", + "Occupation", + "DateOfDeath", + "LocatedIn", + "EducationInstitution", + "CountryOfBirth", + "DateOfBirth", + "Spouse", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Mathematics_4" +} \ No newline at end of file diff --git a/test/Military/Army.json b/test/Military/Army.json new file mode 100644 index 0000000000000000000000000000000000000000..acd1705e29a9cc7f0a02f3c90c28649ad053e3b3 --- /dev/null +++ b/test/Military/Army.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "An army, ground force or land force is an armed force that fights primarily on land. In the broadest sense, it is the land-based military branch, service branch or armed service of a nation or country. It may also include aviation assets by possessing an army aviation component. Within a national military force, the word army may also mean a field army.\nIn some countries, such as France and China, the term \"army\", especially in its plural form \"armies\", has the broader meaning of armed forces as a whole, while retaining the colloquial sense of land forces. To differentiate the colloquial army from the formal concept of military force, the term is qualified, for example in France the land force is called Armée de terre, meaning Land Army, and the air and space force is called Armée de l'Air et de l’Espace, meaning Air and Space Army. The naval force, although not using the term \"army\", is also included in the broad sense of the term \"armies\" — thus the French Navy is an integral component of the collective French Armies (French Armed Forces) under the Ministry of the Armies. A similar pattern is seen in China, with the People's Liberation Army (PLA) being the overall military, the land force being the PLA Ground Force, and so forth for the PLA Air Force, the PLA Navy, and other branches.\nThough by convention, irregular military is understood in contrast to regular armies which grew slowly from personal bodyguards or elite militia. Regular in this case refers to standardized doctrines, uniforms, organizations, etc. Regular military can also refer to full-time status (standing army), versus reserve or part-time personnel. Other distinctions may separate statutory forces (established under laws such as the National Defence Act), from de facto \"non-statutory\" forces such as some guerrilla and revolutionary armies. Armies may also be expeditionary (designed for overseas or international deployment) or fencible (designed for : or restricted to : homeland defence).", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_0" +} \ No newline at end of file diff --git a/test/Military/Conduct_prejudicial_to_good_order_and_discipline.json b/test/Military/Conduct_prejudicial_to_good_order_and_discipline.json new file mode 100644 index 0000000000000000000000000000000000000000..f52b4c57c8bf201f59cdd690634e6623fd21a8bd --- /dev/null +++ b/test/Military/Conduct_prejudicial_to_good_order_and_discipline.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "Conduct prejudicial to good order and discipline is an offence against military law in many countries. It has existed in military law since before the 17th century and is an important offence which functions as a catch-all to criminalise offences against military order which are not specified elsewhere.\nThe offence of \"conduct prejudicial to good order and discipline\" has been described as one of the offences that forms the \"hardcore of military law\". The offence is present in the military law of many countries and is often considered a catch-all offence to criminalise misconduct that is not specified elsewhere. This kind of offence was first introduced to English military law in the 17th century, the law having previously been \"minute in its details\" with no catch-all article. However such articles were found in continental military law such as the Swedish Articles of Gustavus Adolphus issued in 1621 which allowed for \"whatsoever is not contained in these articles, and is repugnant to military discipline ... shall the several commanders make good, or see severally punished\". A form of this catch-all article was introduced to England in the Articles of War for 1625 which stated that \"all other disorders whatsoever are to be punished, as these formerly nominated\". This had been expanded on in the 1627 articles stated that \"all other abuses and offences not specified in these orders shall be punished according to the discipline of war and opinions of such officers and others shall be called to make a Councell of Warr\".\nThe article took on something of its modern form in 1642 when the Earl of Essex's Articles of War stated that \"all other faults, disorders and offences, not mentioned in these articles, shall be punished according to the general customs and laws of war\". The \"conduct to the prejudice\" concept was introduced at some point after 1700. By the late 18th century the offence had become article 23 of the British military law and allowed for the punishment of \"all disorders or neglects ... to the prejudice of good order and military discipline\". This part of British military law was adopted by the Continental Congress for use in the military of the United States in 1775. By 1835 the article was commonly known as the \"Devil's article\" within the British Army.\nThe charge is covered by section 129 of the National Defence Act of 1922. The act allows for two separate offences: conduct prejudicial to good order and discipline or an act prejudicial to good order and discipline.In Gambia the charge is covered by section 78 of the Gambia Armed Forces Act 1985.In the British Armed Forces the offence is covered by section 19 of the Armed Forces Act 2006, which applies to all branches. The offence is categorised as an offence of \"neglect of duty and misconduct\" and the covers \"an act that is prejudicial to good order and service discipline\" or causing the same through omission. A person may be tried for the offence at a court martial or through a summary hearing in front of their Commanding Officer. Unlike some offences in the Armed Forces Act it is not applicable to civilians subject to service discipline.A person found guilty of the offence may be punished by one or more of:\nImprisonment not exceeding two years duration.\nDismissal from His Majesty's service (with or without disgrace).\nDetention (in guardhouse or at the Military Corrective Training Centre) not exceeding two years duration. Only where the person being sentenced is not an officer.\nForfeiture of part or all of accrued seniority. Only where the person being sentenced is an officer.\nReduction in rank or disrating. Only for warrant or non-commissioned officers.\nA fine\nA community service order, only where the person being sentenced is also dismissed, is aged over 18 and resides in the UK.\nA formal reprimand for officers, warrant officers and NCOs.\nA service supervision and punishment order for a period of 30, 60 or 90 days for able seamen, marines, soldiers or airmen only. The offender forfeits one sixth of their pay for the period and may lose their leave entitlements and be made to perform extra work or drill.\nOrdered to pay compensation for any financial loss.\nIn the US Armed Forces the offence is covered by article 134 (the \"general article\") of the Uniform Code of Military Justice (UCMJ). This section states that \"all disorders and neglects to the prejudice of good order and discipline in the armed forces\" shall be tried by court martial and punished at the discretion of that court. The general article also covers offences which bring discredit upon the armed forces and \"crimes and offenses not capital\".The UCMJ requires that all acts be directly prejudicial to good order and discipline. Examples of misconduct prosecuted under the act includes a chief petty officer \"cross-dressing in public view\", a sergeant who mooned another servicemember's wife, and a seaman making unauthorized long-distance calls. Examples of conduct listed in the Manual for Courts-Martial include adultery, bribery, fraternization, gambling, straggling, and indecent language.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_1" +} \ No newline at end of file diff --git a/test/Military/Disarmament.json b/test/Military/Disarmament.json new file mode 100644 index 0000000000000000000000000000000000000000..8182f68271513a632af5c356c874583a74a5ea33 --- /dev/null +++ b/test/Military/Disarmament.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "Disarmament is the act of reducing, limiting, or abolishing weapons. Disarmament generally refers to a country's military or specific type of weaponry. Disarmament is often taken to mean total elimination of weapons of mass destruction, such as nuclear arms. General and Complete Disarmament was defined by the United Nations General Assembly as the elimination of all WMD, coupled with the “balanced reduction of armed forces and conventional armaments, based on the principle of undiminished security of the parties with a view to promoting or enhancing stability at a lower military level, taking into account the need of all States to protect their security.”\nAt the Hague Peace Conferences in 1899 and 1907 government delegations debated about disarmament and the creation of an international court with binding powers. The court was considered necessary because it was understood that nation-states could not disarm into a vacuum. After World War I revulsion at the futility and tremendous cost of the war was widespread. A commonly held belief was that the cause of the war had been the escalating buildup of armaments in the previous half century among the great powers (see Anglo-German naval arms race). Although the Treaty of Versailles effectively disarmed Germany, a clause was inserted that called on all the great powers to likewise progressively disarm over a period of time. The newly formed League of Nations made this an explicit goal in the covenant of the league, which committed its signatories to reduce armaments 'to the lowest point consistent with national safety and the enforcement by common action of international obligations'.One of the earliest successful achievements in disarmament was obtained with the Washington Naval Treaty. Signed by the governments of Great Britain, the United States, Japan, France, and Italy, it prevented the continued construction of capital ships and limited ships of other classification to under 10,000 tons displacement. The size of the three country's navies (the Royal Navy, United States Navy and Imperial Japanese Navy) was set at the ratio 5-5-3.\nIn 1921, the Temporary Mixed Commission on Armaments was set up by the League of Nations to explore possibilities for disarmament. It was made up not of government representatives but of famous individuals who rarely agreed. Proposals ranged from abolishing chemical warfare and strategic bombing to the limitation of more conventional weapons, such as tanks. A draft treaty was assembled in 1923 that made aggressive war illegal and bound the member states to defend victims of aggression by force. Since the onus of responsibility would, in practice, be on the great powers of the League, it was opposed by the First MacDonald ministry of the British government, whose opposition to the treaty, made official on 5 July 1924, \"effectively buried the proposal for good.\" \nAnother commission in 1926, set up to explore the possibilities for the reduction of army size, met similar difficulties. However acting outside the League. French Foreign Minister Aristide Briand and US Secretary of State Frank Kellogg drafted a treaty known as the Kellogg:Briand Pact, which denounced war of aggression. There were 65 signatories to the pact, but it set out no guidelines for action in the event of a war. It was in 1946 used to convict and execute Nazi leaders of war crimes.\nA final attempt was made at the Geneva Disarmament Conference from 1932 to 1937, chaired by former British Foreign Secretary Arthur Henderson. Germany demanded the revision of the Versailles Treaty and the granting of military parity with the other powers, while France was determined to keep Germany demilitarised for its own security. Meanwhile, the British and Americans were not willing to offer France security commitments in exchange for conciliation with Germany. The talks broke down in 1933, when Adolf Hitler withdrew Germany from the conference.\nNuclear disarmament refers to both the act of reducing or eliminating nuclear weapons and to the end state of a nuclear-free world, in which nuclear weapons are completely eliminated.In the United Kingdom, the Campaign for Nuclear Disarmament (CND) held an inaugural public meeting at Central Hall, Westminster, on 17 February 1958, attended by five thousand people. After the meeting a few hundred left to demonstrate at Downing Street.\nCND's declared policies were the unconditional renunciation of the use, production of or dependence upon nuclear weapons by Britain and the bringing about of a general disarmament convention. The first Aldermaston March was organised by the CND and took place at Easter 1958, when several thousand people marched for four days from Trafalgar Square, London, to the Atomic Weapons Research Establishment close to Aldermaston in Berkshire, England, to demonstrate their opposition to nuclear weapons. The Aldermaston marches continued into the late 1960s when tens of thousands of people took part in the four-day marches.\nIn 1961, US President John F. Kennedy gave a speech before the UN General Assembly where he announced the US \"intention to challenge the Soviet Union, not to an arms race, but to a peace race : to advance together step by step, stage by stage, until general and complete disarmament has been achieved.\" He went on to call for a global general and complete disarmament, offering a rough outline for how this could be accomplished:\nThe program to be presented to this assembly : for general and complete disarmament under effective international control : moves to bridge the gap between those who insist on a gradual approach and those who talk only of the final and total achievement. It would create machinery to keep the peace as it destroys the machinery of war. It would proceed through balanced and safeguarded stages designed to give no state a military advantage over another. It would place the final responsibility for verification and control where it belongs, not with the big powers alone, not with one's adversary or one's self, but in an international organization within the framework of the United Nations. It would assure that indispensable condition of disarmament : true inspection : and apply it in stages proportionate to the stage of disarmament. It would cover delivery systems as well as weapons. It would ultimately halt their production as well as their testing, their transfer as well as their possession. It would achieve under the eyes of an international disarmament organization, a steady reduction in force, both nuclear and conventional, until it has abolished all armies and all weapons except those needed for internal order and a new United Nations Peace Force. And it starts that process now, today, even as the talks begin. In short, general and complete disarmament must no longer be a slogan, used to resist the first steps. It is no longer to be a goal without means of achieving it, without means of verifying its progress, without means of keeping the peace. It is now a realistic plan, and a test : a test of those only willing to talk and a test of those willing to act.\nMajor nuclear disarmament groups include Campaign for Nuclear Disarmament, Greenpeace and International Physicians for the Prevention of Nuclear War. There have been many large anti-nuclear demonstrations and protests. On June 12, 1982, one million people demonstrated in New York City's Central Park against nuclear weapons and for an end to the Cold War arms race. It was the largest anti-nuclear protest and the largest political demonstration in American history. Following decades of campaigning the New Zealand government banned nuclear-armed and powered ships from entering the country's territorial waters in 1984 with the ban later extended to cover land and airspace.\nThe police disarmament movement is a political movement that advocates disarming police officers and law enforcement officers who regularly carry weaponry, such as those in the United States. Proposed police disarmament methods range from simply emphasizing de-escalation and less-lethal alternatives over lethal force; to limiting police access to firearms to specific units (such as police tactical units or authorised firearms officers) or to when authorized or necessary; to defunding or replacing police with other systems of public safety. The concept dates back to the 1900s and has historically been championed by anarchists and libertarians alike.Proponents of police disarmament cite police brutality and militarization, safety and trust concerns, and the potential in other public safety apparatuses instead of armed police, as factors that make police disarmament ideal or necessary. Critics of police disarmament argue the concept is unrealistic, citing the need for police officers to defend themselves, the inability of unarmed public safety agents to effectively handle violent crime and terrorism, and the necessity of law enforcement to maintain society.\nIn his definition of \"disarmament\", David Carlton writes in the Oxford University Press political dictionary, \"But confidence in such measures of arms control, especially when unaccompanied by extensive means of verification, has not been strengthened by the revelation that the Soviet Union in its last years successfully concealed consistent and systematic cheating on its obligations under the Biological Weapons Convention.\" He also notes, \"Now a freeze or a mutually agreed increase is not strictly speaking disarmament at all. And such measures may not even be intended to be a first step towards any kind of reduction or abolition. For the aim may simply be to promote stability in force structures. Hence a new term to cover such cases has become fashionable since the 1960s, namely, arms control.\"", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_2" +} \ No newline at end of file diff --git a/test/Military/History_Channel.json b/test/Military/History_Channel.json new file mode 100644 index 0000000000000000000000000000000000000000..d4e303cfd29d4cf1453e85e92067d82d6987c261 --- /dev/null +++ b/test/Military/History_Channel.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "History (stylized in all caps), formerly and commonly known as the History Channel, is an American pay television network and flagship channel owned by A&E Networks, a joint venture between Hearst Communications and The Walt Disney Company's General Entertainment Content Division.\nThe network was originally focused on history-based, social/science documentaries as well as the news. During the late 2000s, the History Channel pivoted into reality television programming. In addition to this change in format, the network has been criticized by many scientists, historians, and skeptics for broadcasting pseudo-documentaries and pseudoscientific, unsubstantiated, sensational investigative programming.\nAs of November 2023, History is available to approximately 63,000,000 pay television households in the United States-down from its 2011 peak of 99,000,000 households. International localized versions of the History Channel are available, in various forms, in India, Canada, Europe, Australia, the Middle East, Africa, Asia and Latin America.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_3" +} \ No newline at end of file diff --git a/test/Military/Impact_of_the_COVID-19_pandemic_on_the_military.json b/test/Military/Impact_of_the_COVID-19_pandemic_on_the_military.json new file mode 100644 index 0000000000000000000000000000000000000000..33c5c13608bfb26228d12591ee9489ab5e07e9de --- /dev/null +++ b/test/Military/Impact_of_the_COVID-19_pandemic_on_the_military.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "Armed forces play a crucial role when responding to crises and emergencies. In response to the COVID-19 pandemic, militaries were readily deployed in many countries to assist the civilian medical personnel and overwhelmed hospitals by creating additional hospitals and providing other additional resources. Apart from the management of the health crises, the pandemic has had a significant impact on the military operations. The security and defence related aspects including the missions, operations and training were adversely affected with the Covid-19. The broad spread of Covid can limit the defence forces' ability to carry out a mission. Many military training and exercises have been postponed or cancelled.\nRecruit training that involves several hundred recruits increased the safety risk during the Covid pandemic. Limiting the spread of Covid was a top priority to ensure that the training can be conducted without interruption. The immediate measure to limit the spread of the pandemic was to limit the movement of trainees and trainers through lockdown, quarantine and so on.The lockdowns and restrictions as a result of Covid-19 prevented the entry of trainers into institutes, reduced the number of new trainees and the final phase of induction training was left incomplete. The defences forces recruitment process including collective training activities and induction processing came to a halt as a result of Covid -19. The low recruitment rates and increased turnover rates in the military have led to the military strength falling below the minimum. The strength of the defence forces depends on competent staff. Military authorities have warned about the need for urgent measures to boost retention and increase recruitment to address the current shortage of defence force personnel as a result of Covid.\nThe Covid-19 pandemic adversely affected the physical and mental health of military veterans. Studies indicate that some military veterans without insomnia symptoms before the pandemic developed either subthreshold or clinical insomnia symptoms during the pandemic period.Military forces all over the world are adopting several measures to minimise the threats of the Covid pandemic on the military readiness to fulfil missions. The nature of responses of the defence forces during the Covid pandemic has significant impact on international safety missions.On 27 February, South Korea and the United States (US) cancelled joint military exercises scheduled for March 2020. The Israeli defence force implemented social distancing through measures such as splitting personnel's into separate shifts, reducing the number of personnel in a single room and minimising exposure between military personnel and civilians. Putting units into quarantine, using masks and other personal protective equipment and use of disinfectants were other methods adopted to contain the Covid pandemic in the Israeli defence force.On 11 March, the Norwegian Armed Forces cancelled the Cold Response 20 exercise planned to involve NATO and allied personnel.During the first wave of the pandemic in Italy, the Italian armed forces worked with the national government to provide civilian healthcare and logistical support throughout the country, in addition to serve as lockdown enforcement alongside the police.\nOn 25 March, president of France Emmanuel Macron launched \"Operation Resilience\" to enable the French armed forces to provide civilian support during the pandemic in France and overseas French territories.\nEuropean forces have mainly been deployed to support health capacities, provide logistical support and carry out security tasks.\nThe military exercises scheduled in the first half of 2020 were cancelled. The cancelled exercises include a joint fire exercise on the dynamic front, saber strike, joint warfighting assessment and swift response. On 16 March, the National Defense Industrial Association in the United States cancelled the 2020 Special Operations Forces Industry Conference scheduled for May 2020. On 25 March, the Department of Defense prohibited the deployment of servicemembers for 60 days to mitigate spread of the virus. On 27 March, the United States cancelled large-scale exercises involving thousands of troops in the Philippines that had been scheduled for May 2020. In addition, the movement of personnel and equipment from the US to Europe also ceased due to concerns over Covid-19. All the cancelled exercises were crucial to enhance NATO's military capabilities and improve their ability to defend against Russian aggression. On 6 April, the United States Forces Japan declared a Public Health Emergency on the Kanto Plain installations. In May 2020, the Department of Defense issued a memo banning survivors of COVID-19 from joining the military. In June 2020, the United States Navy came up with guidance to combat COVID-19 and deploy safely using the smallest effort possible.\nOn 20 March 2020, CJTF-OIR confirmed that certain troops would be withdrawing from Iraq due to the pandemic.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_4" +} \ No newline at end of file diff --git a/test/Military/Justus_Lipsius.json b/test/Military/Justus_Lipsius.json new file mode 100644 index 0000000000000000000000000000000000000000..fc3adb0a332662dd8f882912d78954466b93a508 --- /dev/null +++ b/test/Military/Justus_Lipsius.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "Justus Lipsius (Joest Lips or Joost Lips; October 18, 1547 : March 23, 1606) was a Flemish Catholic philologist, philosopher, and humanist. Lipsius wrote a series of works designed to revive ancient Stoicism in a form that would be compatible with Christianity. The most famous of these is De Constantia (On Constancy). His form of Stoicism influenced a number of contemporary thinkers, creating the intellectual movement of Neostoicism. He taught at the universities in Jena, Leiden, and Leuven.\nLipsius was born in Overijse, Brabant (in modern Belgium). His parents sent him early to the Jesuit college in Cologne, but they feared that he might become a member of the Society of Jesus, so when he was sixteen they removed him to the University of Leuven in Leuven.The publication of his Variarum Lectionum Libri Tres (1567), which he dedicated to Cardinal Granvelle, earned him an appointment as a Latin secretary, and a visit to Rome in the retinue of the cardinal. Here Lipsius remained for two years, devoting his spare time to the study of the Latin classics, collecting inscriptions and examining manuscripts in the Vatican. After he returned from Rome, he published a second volume of miscellaneous criticism (Antiquarum Lectionum Libri Quinque, 1575); compared with the Variae Lectiones of eight years earlier, it shows that he had advanced from the notion of purely conjectural emendation to that of emending by collation.\nIn 1570 he travelled through Burgundy, Germany, Austria, and Bohemia, where the University of Jena engaged him as a teacher for more than a year, a position which implied conformity to the Lutheran Church. On his way back to Leuven, he stopped some time in Cologne, where he must have comported himself as a Catholic.He then returned to Leuven, but the Eighty Years' War soon drove him to take refuge via Antwerp to the Northern Netherlands, where, in 1579, the newly founded University of Leiden appointed him professor of history. He held the position of rector of the university for four terms and was a driving force behind the growth and innovation in the early years.\nThe eleven years that Lipsius spent in Leiden were the period of his greatest productivity. It was during this time that he prepared his Seneca, and perfected, in successive editions, his Tacitus, and brought out a series of other works. Some were pure scholarship, some were collections from classical authors, and others were of general interest. One of this latter class was a treatise on politics (Politicorum Libri Sex, 1589), in which he showed that, though a public teacher in a country which professed toleration, he had not departed from the state maxims of Alva and Philip II. He wrote that a government should recognize only one religion, and extirpate dissent by fire and sword. This avowal exposed him to attacks, but the prudent authorities of Leiden saved him, by prevailing upon him to publish a declaration that his expression Ure, seca (\"Burn and cut\") was a metaphor for a vigorous treatment.\nIn the spring of 1590, leaving Leiden under pretext of taking the waters in Spa, he went to Mainz, where he reconciled with the Roman Catholic Church. This event deeply interested the Catholic world, and invitations from the courts and universities of Italy, Austria and Spain poured in on Lipsius. But he preferred to remain in his own country, and he finally settled in Leuven, as professor of Latin in the Collegium Buslidianum. In 1591 he undertook a grand tour of France, Italy and Germany with his young friend and later Amsterdam burgomaster Jacob Dircksz de Graeff.He was not expected to teach, and appointments as privy councillor and historiographer royal to King Philip II of Spain eked out his trifling stipend. He continued to publish dissertations as before, the chief being his De militia romana (1595) and his Lovanium (1605), intended as an introduction to a general history of Brabant.\nLipsius died in Leuven, at the age of 58.\nThe former headquarters of the European Council (2004:2017) and the Council of the European Union (1995:2017), the Justus Lipsius building, bears his name, having been constructed over the site of Rue Juste Lipse, which linked Rue Belliard to Rue de la Loi in the European Quarter of Brussels. The building is still used by both institutions for offices and low-level meetings and so Justus Lipsius features heavily in the EU-lexicon.In 2006, he was selected to appear on the 10 euro Justus Lipsius Silver commemorative Coin, minted by Belgium. The reverse side of the coin shows his portrait together with the years of his life (1547:1606).\nOne of the main buildings of Leiden University which serve as the Faculty of Humanities was named after Lipsius.\nThe German historian Gerhard Oestreich has argued that Lipsius's ideas about the ideal citizen, a man who acts according to reason, is answerable to himself, is in control of his emotions, and is ready to fight, had found wide acceptance in the turbulent times of the Reformation. The Lipsian view, translated to politics, would have been at the basis of rationalisation of the state and its apparatus of government, autocratic rule by the prince, discipline dispensed to subjects, and strong military defence. The principles would have laid the foundation for military revolution that transformed first European warfare and then the internal organisation of the European states themselves. These conclusions of Oestreich have met with some scepticism in the academic community, and the notion that Lipsius' political ideas had a decisive influence on political developments and military reforms in the Dutch Republic has been challenged.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_5" +} \ No newline at end of file diff --git "a/test/Military/Military\342\200\223entertainment_complex.json" "b/test/Military/Military\342\200\223entertainment_complex.json" new file mode 100644 index 0000000000000000000000000000000000000000..8b48fc4d0f762750a37966d7221d800557f8872c --- /dev/null +++ "b/test/Military/Military\342\200\223entertainment_complex.json" @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "The military:entertainment complex is the cooperation between militaries and entertainment industries to their mutual benefit, especially in such fields as cinema, multimedia, virtual reality, and multisensory extended reality.\nThough the term can be used to describe any military:entertainment complex in any nation, the most prominent complex is between the United States Department of Defense (DoD) and the film industry of the United States.\nDuring World War 2 the United States sought to use entertainment as a form of propaganda. In 1943 the Office of Strategic Services (a precursor to the CIA) circulated a memo stating the cinema is \"one of the most powerful propaganda weapons at the disposal of the United States\" and recommended \"the voluntary cooperation of all motion agencies not under the control of the JCS [Joint Chiefs of Staff]\".The United States Office of War Information utilized cinema for its own ends to rally the public behind the war effort. Director Elmer Davis stated \"The easiest way to inject a propaganda idea into most people's minds is to let it go in through the medium of an entertainment picture when they do not realize that they are being propagandized\".\nIn 1953 US President Dwight D. Eisenhower declared \"The hand of government must be carefully concealed, and, in some cases I should say, wholly eliminated\" and that \"a great deal of this particular type of thing would be done through arrangements with all sorts of privately operated enterprises in the field of entertainment, dramatics, music, and so on and so on.\"\nFollowing the 9/11 attacks there was an increase in collaboration between the US government and Hollywood. In the weeks after the attack Karl Rove and a number of senior governmental officials travelled to Hollywood where they had a number of meetings with studio executives. The studios, including the President of the Motion Picture Association of America, pledged to aid the administration's efforts.\nIn Hollywood, many movie and television productions are, by choice, contractually supervised by the DoD Entertainment Media Unit within the Office of the Secretary of Defense at the Pentagon, and by the public affairs offices of the military services maintained solely for the American entertainment industry in Hollywood, Los Angeles . Producers looking to borrow military equipment or filming on location at a military installation for their works need to apply to the DoD, and submit their movies' scripts for vetting. Ultimately, the DoD has a say in every U.S.-made movie that uses DoD resources, not available on the open market, in their productions.During World War II, Hollywood \"became the unofficial propaganda arm of the U.S. military\". The United States Office of War Information (OWI) had a unit exclusively dedicated to Hollywood called the Bureau of Motion Pictures. From 1942 to 1945, the OWI's Bureau of Motion Pictures reviewed 1,652 film scripts and revised or discarded any that portrayed the United States in a negative light, including material that made Americans seem \"oblivious to the war or anti-war.\" \nFour decades after the release of the 1954 adult animated film Animal Farm, Cold War historian Tony Shaw discovered, through looking at archives of the film, that the CIA had secretly purchased the rights to the film. The CIA also altered the ending of the film so that the pigs, who represent communists, were overthrown by the other animals on the farm.\nThe 1986 film Top Gun, produced by Don Simpson and Jerry Bruckheimer at Paramount Pictures, and with DoD assistance, aimed at rebranding the U.S. Navy's image in the post-Vietnam War era. During the showings of the film, military recruiters set up tables in cinemas during its premieres. However, claims enlistments spiked as high as 500% are a myth, and enlistments only rose by approximately 8% in 1986. By the end of the 1980s and early 1990s, Hollywood producers were stressing script writers to create military-related plots to gain production power from the U.S. military.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_6" +} \ No newline at end of file diff --git a/test/Military/Railway_troops.json b/test/Military/Railway_troops.json new file mode 100644 index 0000000000000000000000000000000000000000..ad7868be2cfac5dec11111b61f960967f5e4192f --- /dev/null +++ b/test/Military/Railway_troops.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "Railway troops are soldiers who are also railway engineers. They build, repair, operate or destroy militarily relevant railway lines and their associated infrastructure.\nThe establishment of railway troops by the great powers followed the emergence, rapid growth and rising importance of the railway network, when the advantages of the railway for the transport of troops, heavy weapons and supplies became recognised. Originally these were known (at least in the German-speaking areas of Europe) as field railways. In many countries, however, there were little or no military units of this type.In the American Civil War, unlimited authority over all railway lines in the North was given to General McClellan. To begin with, McClellan formed a construction corps from ordinary soldiers, but he soon recognised that the lack of training of these troops for technical work meant that a specially organised corps was needed within the Union Army for technically trained civil engineers and workers. During the war this branch of the army grew to about 25,000 men. They were divided into railway operating units as well as construction units with sub-units for line and bridge building.The construction units had the task of building new lines, repairing destroyed railway facilities or even destroying them themselves. The operating units managed the provision and proper use of operational materiel and services. For large construction projects, civilian workers were also contracted, for example, up to 1,400 carpenters were employed to build the Etowah and Chattahoochee Bridge.\nThe large and often decisive influence that these railway troops had on the course of the American Civil war, resulted in the European states establishing similar formations.\nIn 1866, Prussia formed three railway units during mobilisation for the Austro-Prussian War. These units comprised twelve railway engineers and a detachment of about 50 men provided by the Ministry of Trade.The 2nd Railway Regiment (II. Eisenbahnregiment) was linked to the Royal Prussian Military Railway at Berlin. This railway, which was part of the army budget was managed by the Royal Military Railway Division (Königliche Direction der Militäreisenbahn).\nThe activity of the railway regiment was similar to that of the American construction units, whilst operating commissions (Betriebskommissionen), specially raised by the Ministry of Trade, ran operations on the occupied railways.\nUntil the First World War, there was a Royal Bavarian Railway Battalion in Bavaria. A monument in the Bundeswehr Headquarters on Munich's Dachauer Straße (on the corner of Hedwig-Dransfeld-Allee) commemorates the Bavarian railway troops and is open to the public.Experience from the Austro-Prussia War led to plans for a permanent military organisation for field railways which, even during peacetime, would maintain a cadre of personnel trained in railway engineering. Because this could not be achieved by the outbreak of the Franco-Prussian War in 1870, field railway units were again raised: five Prussian units and one Bavarian unit. They were, however, considerably better equipped than those of 1866: each had 20 civilian engineers, 4 officers and about 200 foremen and soldiers. In addition, for larger construction tasks, additional civilian workers were engaged. The operation of railway in the occupied territories was again taken over by operating commissions. The railway units were frequently deployed during the Franco-Prussian War, for example in repairing bridges that had been destroyed and in constructing the railway to circumnavigate the fortress at Metz.In Prussia, on 1 October 1871, a railway battalion was formed, the basis for the subsequent railway regiment and for the Railway Brigade, established on 1 April 1890, which had 3 regiments each of two battalions of four companies. The Railway Brigade was given a depot management and an operating unit for the operation of the Royal Prussian Military Railway, whose officers and men were provided in turn by various the units within the Brigade.\nFrom 1 October 1899, the railway troops became part of the Corps of Transport (Verkehrstruppen) and were thus placed under the Inspector of Transport. Its men were trained in railway construction and railway operations and were intended to replace the old field railway units with railway companies and the operation commissions with railway operating companies and military railway divisions. In war, the railway troops were reinforced by reserves and Landwehr soldiers.\nTo train the railway troops, responsibility for managing the railway line from Berlin via Zossen to Jüterbog (Royal Prussian Military Railway) had been transferred to the army.\nIn addition to these facilities for the construction and operation of standard gauge railway, the railway troops managed materiel in order to be able to build and operate field railways. These were utilised on a large scale during the First World War behind the front line for the transport of troops and supplies. The field railways were subordinated to the Master of Field Railways (Chef des Feldeisenbahnwesens or FECH). Railways troops were also deployed to protect the Deutsche Reichsbahn during the Second World War.\nShortly after its foundation, the Bundeswehr established a railway engineering training and trials company which, in 1961, was renamed (Sp)PiLVsuKp 872 and became part of 870 Special Engineer Training and Trials Battalion (Spezialpionierlehr- und Versuchsbataillon 870) in the German Territorial Army. The company was disbanded in 1974 and its tasks taken on by other engineer units.In the NVA there continued to be railway engineer units. As a result, the history of railway troops in Germany ended with the disbandment of the NVA in 1990.\nThe Spanish Army maintained a railway engineering unit until 2008, this being the Railway Regiment No. 13 (Regimiento de Ferrocarriles Nº 13). It originated with the railway companies created in 1872, in each of the two then existing engineer regiments. In 1884, a Railway Battalion was created. This was increased to a regiment in 1912, further being increased to two regiments in 1936. During the Spanish Civil War, two railway groups were created, these being the Railway Mobilization and Practice Battalions Group and the Railway Sappers Battalions Group. In 1963, these were transformed into regiments. In 1994, the two regiments were merged into the single Railway Regiment No 13, which was disbanded in 2008.Until 2003, the Swiss Army had a branch of service for military railway operations and for a few years beyond that continued to have the so-called Eisenbahnsappeurkompanien (\"railway engineer companies\"). It operated the ten-storey underground K85 command bunker in Zürich, which was accessible via the Hirschengraben Tunnel and is not open to the public today.Russia: still maintains railway troops. For example, they deployed to Abkhazia in May 2008 in order to rebuild and repair destroyed and damaged railway lines.Italy: the Italian Army's Ferrovieri Engineer Regiment is the only one of its type in NATO.\nBrazil: still maintains two railway battalions, which are part of the engineering branch of the Brazilian Army.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_7" +} \ No newline at end of file diff --git a/test/Military/Training_Within_Industry.json b/test/Military/Training_Within_Industry.json new file mode 100644 index 0000000000000000000000000000000000000000..ee4853b96ce6a55f1c1c6f61242166b24df37883 --- /dev/null +++ b/test/Military/Training_Within_Industry.json @@ -0,0 +1,52 @@ +{ + "domain": "Military", + "document": "The Training Within Industry (TWI) service was created by the United States Department of War, running from 1940 to 1945 within the War Manpower Commission. The purpose was to provide consulting services to war-related industries whose personnel were being conscripted into the US Army at the same time the War Department was issuing orders for additional matériel. It was apparent that the shortage of trained and skilled personnel at precisely the time they were needed most would impose a hardship on those industries, and that only improved methods of job training would address the shortfall. By the end of World War II, over 1.6 million workers in over 16,500 plants had received a certification. The program continued post-war in Europe and Asia, where it aided reconstruction. It is most notable in the business world for inspiring the concept of kaizen in Japan. In addition, the program became the foundation of the Toyota Production System and the DoD resourced open source Management System (3.1).\nThe four basic training programs (10-hour sessions) developed by TWI were developed by experts on loan from private industry. Because of the intensity of the situation, a large number of experimental methods were tried and discarded. This resulted in a distilled, concentrated set of programs. Each program had introductory programs called \"Appreciation Sessions\" that were used to sell the programs to top management and introduce the programs to middle management of a company. Each program also had 'Train-the-Trainer' programs and handbooks called \"Institute Conductor's Manual\" for the master trainers. The TWI Service also developed a number of \"Staff Only\" training programs to support staff development and to improve the implementation success.The TWI trainers had to be invited to a factory in order to present their material. In order to market the service, they developed the Five Needs of the Supervisor: every supervisor needs to have Knowledge of the Work, Knowledge of Responsibility, Skill in Instructing, Skill in Improving Methods, and Skill in Leading. Each program was based on Charles Allen's 4-point method of Preparation, Presentation, Application, and Testing.\nThe 10-hour Sessions were:\nJob Instruction (JI) - a course that taught trainers (supervisors and experienced workers) to train inexperienced workers faster. The instructors were taught to break down jobs into closely defined steps, show the procedures while explaining the key points and the reasons for the key points, then watch the student attempt under close coaching, and finally to gradually wean the student from the coaching. The course emphasized the credo, \"If the worker hasn't learned, the instructor hasn't taught\". At the request of enterprises outside of manufacturing, variations to the JI program were developed for hospitals, office and farms.\nJob Methods (JM) - a course that taught workers to objectively evaluate the efficiency of their jobs and to methodically evaluate and suggest improvements. The course also worked with a job breakdown, but students were taught to analyze each step and determine if there were sufficient reason to continue to do it in that way by asking a series of pointed questions. If they determined some step could be done better by eliminating, combining, rearranging, or simplifying, they were to develop and apply the new method by selling it to the \"boss\" and co-workers, obtaining approval based on safety, quality, quantity, and cost, standardizing the new method, and giving credit.\nJob Relations (JR) - a course that taught supervisors to deal with workers effectively and fairly. It emphasized the lesson, \"People Must Be Treated As Individuals\".\nProgram Development (PD) - the meta-course that taught those with responsibility for the training function to assist the line organization in solving production problems through training.\nThere was also a short-lived course that taught union personnel (UJR) to work effectively with management.\nInternal training programs were; \"Management Contact Manual\" (1944) - a formal training course on how to sell the TWI programs to management, \"How to get Continuing Results from TWI Programs in a Plant\" (1944) - this training program was the out-growth of two years of practical experimentation and experience on what it took to have a successful implementation of TWI.Job Safety (JS) - While the US TWI Service chose to not develop a JS program, stating that safety was part of every job, Canada led the way with the first variant that was closely modeled on the JI program. This program was offered to England, which declined and developed a JS program that focused on discovery of risk and resolution. Copies of the British programs were circulated in Japan starting about 1948.\nProblem Solving (PS) - There are two different programs using similar names. The TWI Foundation released their PS program in 1946 and follows the standard J program format. TWI, Inc. released their program in 1955 and is a much more comprehensive program that revolves around using the JI, JR and JM programs for problem solving.\nDiscussion Leading (DL) - This is an early work in developing what is now recognized as facilitation skills. TWIF also produced a variant of this program called Conference Leading.\nThere were several groups that had an impact in the expansion of the TWI programs around the world - US State Department, US Army, British Ministry of Labour, International Labor Organization (ILO) and Standard Oil.In 1944, the British Ministry of Labour sent Frank Perkins to the US to evaluate the TWI programs. In the summer of 1944, Perkins returned to England to establish a similar program. The British Ministry of Labour actively promoted the TWI programs, listing 65 countries in addition to the US and England where TWI was known to be in use as of 1959. Expansion into Europe was led by Standard Oil, which led the translation efforts of the manuals into native languages. \nSome European TWI activity was done under the Marshall Plan by \"Visiting Experts\" (VE), with limited success. It was the later work by the ILO using the Standard Oil translations and re-translation efforts that established the TWI programs in Europe. The ILO TWI training program in Bangalore India has the distinction of training the first Japanese about 1947.\nAlthough the TWI program funding for application of the programs in the USA by the government ended in 1945, the US government did fund the introduction to the war-torn nations of Europe and Asia. Several private groups continued to provide TWI in the US and abroad. Channing Dooley, Walter Dietz, Mike Kane and Bill Conover (collectively known as \"the Four Horsemen\") continued the development of the 'J' programs by establishing the TWI Foundation. This group was responsible for continuing the spread of TWI throughout Europe and Asia. The Director of one of the district offices established TWI, Inc., and was hired by the US Government to provide TWI training in Japan. It was especially well received in Japan, where TWI formed the basis of the kaizen culture in industry. Kaizen, known by such names as Quality Circles in the West, was successfully harnessed by Toyota Motor Corporation in conjunction with the Lean or Just In Time principles of Taiichi Ohno. In the foreword to Dinero's book \"Training Within Industry\", John Shook relates a story in which a Toyota trainer brought out an old copy of a TWI service manual to prove to him that American workers at NUMMI could be taught using the \"Japanese\" methods used at Toyota. Thus, TWI was the forerunner of what is today regarded as a Japanese creation.The symbiosis between TWI program and Lean Management is such that one cannot effectively implement Lean Management without incorporating TWI principles. Lean Management's success largely depends on the competence and awareness of middle management, which TWI aims to develop. This focus on leadership skills, as emphasized in sources like Jeffrey Liker's \"Toyota Talent\" highlights TWI's pivotal role in shaping organizational culture in the context of Lean Management. The practical implementation of TWI Program within Lean Management underscores the program's enduring significance and its essential role in the successful transformation of middle management into effective leaders.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "DistributionFormat", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "MaintainedBy", + "PhysicallyInteractsWith", + "InterestedIn", + "OppositeOf", + "ProducedSound", + "LocatedIn", + "AdverseEffect", + "PartOf", + "Partner", + "PrimeFactor", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Military_8" +} \ No newline at end of file diff --git a/test/Nature/Bast_fibre.json b/test/Nature/Bast_fibre.json new file mode 100644 index 0000000000000000000000000000000000000000..15188b83865cdb725dbc126fde44e50865166597 --- /dev/null +++ b/test/Nature/Bast_fibre.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "Bast fibre (also called phloem fibre or skin fibre) is plant fibre collected from the phloem (the \"inner bark\", sometimes called \"skin\") or bast surrounding the stem of certain dicotyledonous plants. Some of the economically important bast fibres are obtained from herbs cultivated in agriculture, for instance flax, hemp, or ramie, but bast fibres from wild plants, such as stinging nettle, and trees such as lime or linden, willow, oak, wisteria, and mulberry have also been used. Bast fibres are soft and flexible, as opposed to leaf fibres from monocotyledonous plants, which are hard and stiff.\nSince the valuable fibres are located in the phloem, they must often be separated from the woody core, the xylem, and sometimes also from the epidermis. The process for this is retting, and can be performed by micro-organisms either on land (nowadays the most important) or in water, or by chemicals (for instance high pH and chelating agents), or by pectinolytic enzymes. In the phloem, bast fibres occur in bundles that are glued together by pectin and calcium ions. More intense retting separates the fibre bundles into elementary fibres, which can be several centimetres long. Often bast fibres have higher tensile strength than other kinds, and are used in high-quality textiles (sometimes in blends with cotton or synthetic fibres), ropes, yarn, paper, composite materials and burlap. An important property of bast fibres is that they contain a special structure, the fibre node, that represents a weak point, and gives flexibility. Seed hairs, such as cotton, do not have nodes.\nThe term \"bast\" derives from Old English bæst (\"inner bark of trees from which ropes were made\"), from Proto-Germanic *bastaz (\"bast, rope\"). It may have the same root as Latin fascis (\"bundle\") and Middle Irish basc (\"necklace\").Plants that have been used for bast fibre include flax (from which linen is made), hemp, jute, kenaf, kudzu, linden, milkweed, nettle, okra, paper mulberry, ramie, and roselle hemp.Bast fiber from oak trees forms the oldest preserved woven fabrics in the world. It was unearthed at the archeological site at Çatalhöyük in Turkey and dates to 8000-9000 years ago.\nBast fibres are processed for use in carpet, yarn, rope, geotextile (netting or matting), traditional carpets, hessian or burlap, paper, sacks, etc. Bast fibres are also used in the non-woven, moulding, and composite technology industries for the manufacturing of non-woven mats and carpets, composite boards as furniture materials, automobile door panels and headliners, etc. From prehistoric times through at least the early 20th century, bast shoes were woven from bast strips in the forest areas of Eastern Europe.\nWhere no other source of tanbark was available, bast has also been used for tanning leather.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_0" +} \ No newline at end of file diff --git a/test/Nature/Dicerandrol_C.json b/test/Nature/Dicerandrol_C.json new file mode 100644 index 0000000000000000000000000000000000000000..4c8489eb9e4f8cfddfccbe967953db257de88b7a --- /dev/null +++ b/test/Nature/Dicerandrol_C.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "Dicerandrol C is a natural product. It is a less toxic isomer of phomoxanthone A (PXA) and phomoxanthone B (PXB), all three of which are members of the class of phomoxanthone compounds. The phomoxanthones are named after the fungus Phomopsis, from which they were first isolated, and after their xanthonoid structure. Chemically, they are dimers of two tetrahydroxanthones that are covalently linked to each other. Dicerandrol C itself is a homodimer of two identical diacetylated tetrahydroxanthones. The position of the link between the two tetrahydroxanthones is the only structural difference between dicerandrol C and its isomers PXA and PXB: In PXA, the two xanthonoid monomers are symmetrically linked at C-4,4’, while in PXB, they are asymmetrically linked at C-2,4’, and in dicerandrol C, they are symmetrically linked at C-2,2’.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_1" +} \ No newline at end of file diff --git a/test/Nature/Green_flash.json b/test/Nature/Green_flash.json new file mode 100644 index 0000000000000000000000000000000000000000..243c4c07ce26db121441f5b8876dddd0675226c1 --- /dev/null +++ b/test/Nature/Green_flash.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "The green flash and green ray are meteorological optical phenomena that sometimes occur transiently around the moment of sunset or sunrise. When the conditions are right, a distinct green spot is briefly visible above the Sun's upper limb; the green appearance usually lasts for no more than two seconds. Rarely, the green flash can resemble a green ray shooting up from the sunset or sunrise point.\nGreen flashes occur because the Earth's atmosphere can cause the light from the Sun to separate, or refract, into different colors. Green flashes are a group of similar phenomena that stem from slightly different causes, and therefore, some types of green flashes are more common than others.\nGreen flashes may be observed from any altitude. They usually are seen at an unobstructed horizon, such as over the ocean, but are possible over cloud tops and mountain tops as well. They may occur at any latitude, although at the equator, the flash rarely lasts longer than a second.The green flash also may be observed in association with the Moon and bright planets at the horizon, including Venus and Jupiter. With an unrestricted view of the horizon, green flashes are regularly seen by airline pilots, particularly when flying westwards as the sunset is slowed. If the atmosphere is layered, the green flash may appear as a series of flashes.\nWhile observing at the Vatican Observatory in 1960, D.J.K. O'Connell produced the first color photograph of the green flash at sunset.\nGreen flash occurs because the atmosphere causes the light from the Sun to separate, or refract, into different frequencies. Green flashes are enhanced by mirages, which increase refraction. A green flash is more likely to be seen in stable, clear air, when more of the light from the setting sun reaches the observer without being scattered. One might expect to see a blue flash, since blue light is refracted most of all and the blue component of the sun's light is therefore the last to disappear below the horizon, but the blue is preferentially scattered out of the line of sight, and the remaining light ends up appearing green.With slight magnification, a green rim on the top of the solar disk may be seen on most clear-day sunsets, although the flash or ray effects require a stronger layering of the atmosphere and a mirage, which serves to magnify the green from a fraction of a second to a couple of seconds.\nWhile simple atmospheric refraction or lensing explains the background gradient of red-amber twilight, the primary potential cause of the bright, verdant discontinuity from that gradient known as the Green Flash may be due to naturally-occurring coherent (laser) light. Part of this phenomenon was recently discovered by researchers at the Washington University School of Medicine, regarding infrared-laser light converting-up (or upconverting) to visible-green laser light, causing what researchers there call \"a double hit\" of photons on the retina, creating the perception of bright neon green from an originally invisible infrared laser. \nDoubling the wavelength of green light yields roughly 1000-1100 nm infrared light, so the most likely hypothesis is that the Green Flash is coherent upconverted infrared (laser) light that \"double-hits\" the retina or camera lens, creating the effect of bright green (additionally, this explains why the Green Flash is also sometimes blue or purple; coherent infrared light can upconvert to any color of visible light if the conditions are met).\nThe \"green flash\" description relates to a group of optical phenomena, some of which are listed below:The majority of flashes observed are inferior-mirage or mock-mirage effects, with the others constituting only 1% of reports. Some types not listed in the table above, such as the cloud-top flash (seen as the Sun sinks into a coastal fog, or at distant cumulus clouds), are not understood.\nOn rare occasion, the amount of blue light is sufficient to be visible as a \"blue flash\".As an astronomical object sets or rises in relation to the horizon, the light it emits travels through Earth's atmosphere, which works as a prism separating the light into different colors. The color of the upper rim of an astronomical object could go from green to blue to violet depending on the decrease in concentration of pollutants as they spread throughout an increasing volume of atmosphere. The lower rim of an astronomical object is always red.A green rim is very thin and is difficult or impossible to see with the naked eye. In usual conditions, a green rim of an astronomical object gets fainter when an astronomical object is very low above the horizon because of atmospheric reddening, but sometimes the conditions are right to see a green rim just above the horizon.The following quote describes what was probably the longest observation of a green rim, which at times could have been a green flash. It was seen on and off for 35 minutes by members of the Richard Evelyn Byrd party from the Antarctic Little America exploration base in 1934:\nThere was a rush for the surface and as eyes turned southward, they saw a tiny but brilliant green spot where the last ray of the upper rim of the sun hung on the skyline. It lasted an appreciable length of time, several seconds at least, and no sooner disappeared than it flashed forth again. Altogether it remained on the horizon with short interruptions for thirty-five minutes.When it disappeared momentarily it seemed to have been shut off by a tiny spurt, an inequality in the skyline caused by the barrier surface.Even by moving the head up a few inches it would disappear and reappear again and after it had finally disappeared from view it could be recaptured by climbing up the first few steps of the antanea [sic] post.\nFor the explorers to have seen a green rim on and off for 35 minutes, there must have been some mirage effect present.\nA green rim is present at every sunset, but it is too thin to be seen with the naked eye. Often a green rim changes to a green flash and back again during the same sunset. The best time to observe a green rim is about 10 minutes before sunset. That is too early to use any magnification like binoculars or a telescope to look directly at the Sun without potential harm to the eyes. (Of course, a magnified image might be projected onto a sheet of paper for safe viewing.) As the Sun gets closer to the horizon, the green rim becomes fainter due to atmospheric reddening. According to the above, it is probably correct to conclude that although a green rim is present during every sunset, a green flash is rarer because of the required mirage.\nJules Verne's 1882 novel The Green Ray helped to popularize the green flash phenomenon. In Éric Rohmer's 1986 film The Green Ray (French: Le rayon vert), the main character, Delphine, eavesdrops on a conversation about Jules Verne's novel and the significance of the green flash, eventually witnessing the phenomenon herself in the final scene.\nIn \"Arthur's New Year's Eve\" from the first season of Arthur in 1996, Arthur Read, having never stayed up until midnight on New Year's Eve before, talks with his friends about what happens when the New Year comes. Despite not actually having stayed up themselves, they each share their take on the matter, Prunella Deegan telling him that there is an amazing green flash at midnight, but if it doesn't happen, then it has to stay the same year for another whole year.\nWalt Disney Pictures' 2007 movie Pirates of the Caribbean: At World's End references the green flash as a signal that a soul had returned from the dead.\nThe episode Trials and Determinations! of Pokémon the Series: Sun & Moon references the green flash when Ash's Rockruff evolves into Dusk Form Lycanroc after witnessing a green flash at sunset.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_2" +} \ No newline at end of file diff --git a/test/Nature/Homeosis.json b/test/Nature/Homeosis.json new file mode 100644 index 0000000000000000000000000000000000000000..81416078bdc3a0ecf261ef36d478463897edac1d --- /dev/null +++ b/test/Nature/Homeosis.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "In evolutionary developmental biology, homeosis is the transformation of one organ into another, arising from mutation in or misexpression of certain developmentally critical genes, specifically homeotic genes. In animals, these developmental genes specifically control the development of organs on their anteroposterior axis. In plants, however, the developmental genes affected by homeosis may control anything from the development of a stamen or petals to the development of chlorophyll. Homeosis may be caused by mutations in Hox genes, found in animals, or others such as the MADS-box family in plants. Homeosis is a characteristic that has helped insects become as successful and diverse as they are.\nHomeotic mutations work by changing segment identity during development. For example, the Ultrabithorax genotype gives a phenotype wherein metathoracic and first abdominal segments become mesothoracic segments. Another well-known example is Antennapedia: a gain-of-function allele causes legs to develop in the place of antennae.\nIn botany, Rolf Sattler has revised the concept of homeosis (replacement) by his emphasis on partial homeosis in addition to complete homeosis; this revision is now widely accepted.\nHomeotic mutants in angiosperms are thought to be rare in the wild: in the annual plant Clarkia (Onagraceae), homeotic mutants are known where the petals are replaced by a second whorl of sepal-like organs, originating in a mutation of a single gene. The absence of lethal or deleterious consequences in floral mutants resulting in distinct morphological expressions has been a factor in the evolution of Clarkia, and perhaps also in many other plant groups.\nFollowing the work on homeotic mutants by Ed Lewis, the phenomenology of homeosis in animals was further elaborated by discovery of a conserved DNA binding sequence present in many homeotic proteins. Thus, the 60 amino acid DNA binding protein domain was named the homeodomain, while the 180 bp nucleotide sequence encoding it was named the homeobox. The homeobox gene clusters studied by Ed Lewis were named the Hox genes, although many more homeobox genes are encoded by animal genomes than those in the Hox gene clusters.\nThe homeotic-function of certain proteins was first postulated to be that of a \"selector\" as proposed by Antonio Garcia-Bellido. \nBy definition selectors were imagined to be (transcription factor) proteins that stably determined one of two possible cell fates for a cell and its cellular descendants in a tissue. \nWhile most animal homeotic functions are associated with homeobox-containing factors, not all homeotic proteins in animals are encoded by homeobox genes, and further not all homeobox genes are necessarily associated with homeotic functions or (mutant) phenotypes.\nThe concept of homeotic selectors was further elaborated or at least qualified by Michael Akam in a so-called \"post-selector gene\" model that incorporated additional findings and \"walked back\" the \"orthodoxy\" of selector-dependent stable binary switches.\nThe concept of tissue compartments is deeply intertwined with the selector model of homeosis because the selector-mediated maintenance of cell fate can be restricted into different organizational units of an animal's body plan.\nIn this context, newer insights into homeotic mechanisms were found by Albert Erives and colleagues by focusing on enhancer DNAs that are co-targeted by homeotic selectors and different combinations of developmental signals.\nThis work identifies a protein biochemical difference between the transcription factors that function as homeotic selectors versus the transcription factors that function as effectors of developmental signaling pathways, such as the Notch signaling pathway and the BMP signaling pathway.\nThis work proposes that homeotic selectors function to \"license\" enhancer DNAs in a restricted tissue compartment so that the enhancers are enabled to read-out developmental signals, which are then integrated via polyglutamine-mediated aggregation.\nLike the complex multicellularity seen in animals, the multicellularity of land plants is developmentally organized into tissue and organ units via transcription factor genes with homeotic effects.Although plants have homeobox-containing genes, plant homeotic factors tend to possess MADS-box DNA binding domains.\nAnimal genomes also possess a small number MADS-box factors.\nThus, in the independent evolution of multicellularity in plants and animals, different eukaryotic transcription factor families were co-opted to serve homeotic functions. \nMADS-domain factors have been proposed to function as co-factors to more specialized factors and thereby help to determine organ identity.\nThis has been proposed to correspond more closely to the interpretation of animal homeotics outlined by Michael Akam.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_3" +} \ No newline at end of file diff --git a/test/Nature/Jaramillo_reversal.json b/test/Nature/Jaramillo_reversal.json new file mode 100644 index 0000000000000000000000000000000000000000..696060785c6bf310e67bf4b9c29b71718314f8be --- /dev/null +++ b/test/Nature/Jaramillo_reversal.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "The Jaramillo reversal was a reversal and excursion of the Earth's magnetic field that occurred approximately one million years ago. In the geological time scale it was a \"short-term\" positive reversal in the then-dominant Matuyama reversed magnetic chronozone; its beginning is widely dated to 990,000 years before the present (BP), and its end to 950,000 BP (though an alternative date of 1.07 million years ago to 990,000 is also found in the scientific literature). \nThe causes and mechanisms of short-term reversals and excursions like the Jaramillo, as well as the major field reversals like the Brunhes:Matuyama reversal, are subjects of study and dispute among researchers. One theory associates the Jaramillo with the Bosumtwi impact event, as evidenced by a tektite strewnfield in the Ivory Coast, though this hypothesis has been claimed as \"highly speculative\" and \"refuted\". A later study found the deposition of the Ivory Coast strewn field and the onset of the Jaramillo reversal not to be contemporaneous as previously inferred. They are separated in time by 30,000 years.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_4" +} \ No newline at end of file diff --git a/test/Nature/Lofoten_Vortex.json b/test/Nature/Lofoten_Vortex.json new file mode 100644 index 0000000000000000000000000000000000000000..1108a57d2eb72f9bee10a7515d2ef0c33f0ade4f --- /dev/null +++ b/test/Nature/Lofoten_Vortex.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "The Lofoten Vortex, also called Lofoten Basin Vortex or Lofoten Basin Eddy, is a permanent oceanic anticyclonic eddy, located in the northern part of the Norwegian Sea, off the coast of the Lofoten archipelago. It was documented for the first time in the 1970s.\nDue to the presence of the permanent vortex, the Lofoten basin features a localised area with high levels of sea surface temperature and eddy kinetic energy. The local currents inside the vortex and the strong convection observed during winter generate a hot spot rich in nutrients, affecting the surrounding marine biology.\nMoreover, due to its extraordinary persistence and location, the Lofoten Vortex is likely to influence the dense water formation in the region.\nThe Lofoten Basin is a well-defined topographic depression of about 3250 m depth, situated between the Norwegian continental slope in the east, the Vøring Plateau and the Helgeland Ridge in the south and southwest, and the Mohn Ridge in the northwest. The complex bathymetric structure is pivotal to locate the two major ocean currents of the basin:the Norwegian Atlantic Slope Current (NwASC), which flows south-north all along the continental shelf of Norway;\nthe Norwegian Atlantic Front Current (NwAFC), which streams almost parallel to the slope current, but down the west side of the Vøring Plateau and then along the Mohn Ridge.\nThese currents play a key role in the mechanisms that guarantee the persistence of the Lofoten Vortex.\nThe vortex has been localised in the deepest part of the Lofoten Basin. It is an apparent permanent anticyclonic eddy, whose persistence has been documented in the past years by shipborne, Seagliders and satellite measurements.\nThe estimated radius of the vortex is 15:20 km and presents a 1200 m thick core of Atlantic Water (warm and saline) swirling at velocities that reach 0.8 m/s at 600:800 m depth. The velocity structure is similar to a Rankine vortex, characterised by a slow, outward decrease in azimuthal velocities.\nRAFOS floats trapped in the core of the Lofoten Vortex revealed that the vortex centre travelled 1850 km in 15 months, with an average drifting speed of 1 to 5 km/day, but with peaks reaching 15 km/day. From these measurements, a general downslope and counter-clockwise movement of the vortex around the deepest part of the Lofoten Basin is detected.\nFrom salinity and temperature profiles it is possible to see that the internal hydrography of the vortex is characterised by a doubly convex lens structure. The doming isotherms, upward at around 200 m and downward at approximately 600 m depth, are visible in a vertical mean temperature profile. This structure reveals that the deep Lofoten Basin is a major convection site in the Nordic Seas, specifically in winter: inside the Lofoten Vortex, the Atlantic Water penetrates up to 800 m depth, much deeper than in any other location of the same sea. \nStrong seasonality characterises the density profile of the vortex: during summer a double core structure is detectable, with a shallow pycnocline created by the stratification of surface water heated by the sun. On the other hand, in winter the surface's cooling creates strong convection that homogenises the density profile and deepens the pycnocline up to 1200 m depth.\nThe Lofoten Vortex has two surface features that are useful for its detection.First, on a sea surface temperature (SST) map, the vortex is recognisable as a negative SST anomaly. The cold-core surface signature, however, cannot be consistently detected by satellites' records, therefore it is not usually addressed as a reliable tracking method.\nBeing an anticyclonic structure, the Lofoten Vortex can instead be analysed as a positive sea level anomaly (SLA). Satellites measuring SLA highlighted the persistent existence of the vortex in 83% of the available datasets, with a lifetime spanning from 90 days up to more than one year. The longest registered vortex lasted for two years, from May 2002 to April 2004.\nIt is necessary to point out that in the period between two identified vortices, it is uncertain if the vortex disappeared or was simply not detected. That could be the case when the vortex adopts a submesoscale structure, with a non-detectable SLA.\nTwo mechanism has been identified so far, both playing an important role in the formation and the sustainment of the Lofoten Vortex:Merging of smaller anticyclones generated by the NwASC.\nWintertime convection.\nThe Lofoten vortex is situated in the deepest parts of the topographic depression of the Lofoten Basin. Due to the instabilities of the basin’s eastern boundary current (NwASC), cyclones and anticyclones are shed off from the east.As shown by experiments in a rotating tank, cyclones climb upslope in an anticyclonic spiral relative to the centre of a seamount, and anticyclones will descend towards the centre of a bottom depression in a cyclonic spiral. Likewise, the anticyclones released from the Norwegian Atlantic Slope Current (NwASC) spiral counterclockwise towards the deepest part of the Lofoten Basin. Some of the anticyclones terminate within the basin, whilst the longer-lasting trajectories (of 3:6 months) are traced back to the slope region related to the elevated eddy kinetic energy.\nThe anticyclonic source region can be divided into two areas of generation, following different paths into the basin:\nThe southernmost track lies right off the 3200 m isobath and follows a direct route into the basin;\nThe other paths travel along curved trajectories and then move cyclonically along outer routes, roughly tracing the 3000 m isobath.\nAs the anticyclones from the northernmost-lying sources have a longer travel time, they are subject to seasonal variability and are exposed to longer cooling periods, leaving them denser (than the vortices taking the direct route from the boundary current).\nWhen the boundary current is stronger, it is more unstable and will shed more eddies toward the west. In terms of seasonality, all the paths from the boundary current to the vortex show a maximum transport over the course of autumn and winter, with a maximum in January:February, and a minimum during spring and summer. Among the tracks, the one in the middle (between the southernmost and the northernmost source regions) has the maximum transport and yields a less pronounced seasonal variability. In the time-mean, a distinct maximum transport of approximately 2.5 Sv is found near 69.2° N.\nWhen the anticyclones have propagated southwestward from the east and into the trough of the Lofoten Basin, they establish a quasi-stationary vortex surrounded by cyclones and weaker anticyclones. These weaker anticyclonic vortices occasionally merge with the stronger Lofoten Vortex. The merging process is difficult to detect, but they are estimated to be 4-7 mergers a year with two seasonal peaks in late winter and in autumn, and a minimum in early winter.During a merging event, a vertical alignment between the light core anticyclones and the denser Lofoten Vortex occurs, creating a double-core. The lighter vortices may encounter the Lofoten Vortex at various depths, but on lighter isopycnals. Over the course of an alignment, the core is subject to a massive vertical compression of about 100 m or more. In accordance with conservation of potential vorticity, there is a rapid and substantial increase in anticyclonic spin. The maximum increase in vorticity is often found at 600:700 m depth, indicating that the lower core is most frequently squeezed.\nThe negative vortices may also only partially merge. In this case, the core interacting with the Lofoten Vortex is situated on a shallower isopycnal. Moving closer to the Lofoten Vortex, a vertical alignment is initiated, but not completed. The cores have started to compress, but no connection between them is established. After separating again, the vortices are left intensified.\nMeteorological events above the centre of the Lofoten Basin play a vital role in the development of deep wintertime convection that mixes water down to a mean wintertime mixing depth of 600 m. An inverse vertical distribution of salinity causes the sinking water to be warmer than the underlying one. This results in formation of a localised, vertically homogeneous, positive thermohaline anomaly in the intermediate and upper parts of the deep layer. The increase in the thermohaline anomaly in winter and spring is accompanied by the deepening and shrinking of the vortex to the Rossby radius of deformation of about 10 km. Conversely, the Lofoten Vortex expands to 5-7 times the Rossby radius of deformation during summer. Warming causes the doubly convex internal structure to “separate” from the surface, decreasing the depth of the lower convection boundary and increasing the horizontal scale of the vortexThe Norwegian Atlantic Current (NwAC) is considered the northern branch of the Atlantic Meridional Overturning Circulation (AMOC). Its two limbs, the NwASC and the NwAFC, carry warm and saline Atlantic Water (AW) poleward to the Arctic Ocean.Most of the dense water production in the Nordic Seas takes place on the east side of the Mohn Ridge system, in the Lofoten Basin. The AW, travelling northward, progressively loses heat to the atmosphere. Through the eddy activity of the Lofoten Basin and the persistence of the Lofoten Vortex, the residence time of the warm water is lengthened, leading to additional cooling of the AW before it reaches the Arctic Ocean. Due to heat loss, the temperature decreases and the light-to-dense water transformation takes place.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_5" +} \ No newline at end of file diff --git a/test/Nature/Mfinda.json b/test/Nature/Mfinda.json new file mode 100644 index 0000000000000000000000000000000000000000..10b509ef38bddc310b597fd2d2eaa59c48ffda58 --- /dev/null +++ b/test/Nature/Mfinda.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "Mfinda is a spiritual concept of the forest in Kongo religion.\nNature is essential to Kongo spirituality. While simbi (pl. bisimbi) nature spirits later became more associated with water, or kalûnga, they were also known to dwell in the forest, or mfinda (finda in Hoodoo). The Kingdom of Kongo used the term chibila, which referred to sacred groves, where they would venerate these forest spirits. The Kingdom of Loango called them bakisi banthandu, or spirits of the wilderness. The Kingdom of Ndongo preferred the name xibila (pl. bibila).The Kongo people also believed that some ancestors inhabited the forest after death and maintained their spiritual presence in their descendants' lives. These particular ancestors were believed to have died, traveled to Mpémba, and then were reborn as bisimbi. Thus, The Great Mfinda existed as a meeting point between the physical world and the spiritual world. The living saw it as a source of physical nourishment through hunting and spiritual nourishment through contact with the ancestors. One expert on Kongo religion, Dr. Fu-Kiau, even described some precolonial Kongo cosmograms with mfinda as a bridge between the two worlds.\nMfinda is also where Kongo secret societies, such as Kinkimba and Lemba, initiated new healers. Expert healers, known as banganga (sing. nganga) underwent extensive training to commune with the ancestors in the spiritual realm and seek guidance from them. These new initiates learned how to locate nature spirits and build a connection. Once they became official banganga, it became their duty to seek them out in the forest and venerated them with shrines, sacred trees, and minkisi (sing. nkisi). In return, the ancestor or nature spirit would pass on untold history, advise the nganga, or allow them to harness their powers for healing or protection.The concept of mfinda as a spiritual space also emerged in the colonial United States through trans-Atlantic slavery and became known locally as finda. Bakongo descendants saw the wilderness as a symbol of freedom but also sorrow. Because early enslaved Bakongo had no ancestors on this side of kalûnga (which became synonymous with the Atlantic Ocean), it meant they had no blood tie to the new lands in which they were transported. Thus, banganga had no way to connect to the spiritual world. To remedy this, some Bakongo and Mbundu willingly committed acts of sacrificial suicide so that they could become ancestors or simbi and connect the living to Mpémba, the spiritual world. The finda then became a sacred space, where sightings of \"cymbee\" spirits were often recorded by Black Americans. Today, the finda is still a significant element in Hoodoo.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_6" +} \ No newline at end of file diff --git a/test/Nature/Rangeland_management.json b/test/Nature/Rangeland_management.json new file mode 100644 index 0000000000000000000000000000000000000000..36131f84b3f287751d5c484606d457420c6d02be --- /dev/null +++ b/test/Nature/Rangeland_management.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "Rangeland management (also range management, range science, or arid-land management) is a natural science that centers around the study of rangelands and the \"conservation and sustainable management [of Arid-Lands] for the benefit of current societies and future generations\". Range management is defined by Holechek et al. as the \"manipulation of rangeland components to obtain optimum combination of goods and services for society on a sustained basis\". The United Nations (UN) has declared 2026 the International Year of Rangelands and Pastoralists, with the Food and Agriculture Organization leading the initiative.\nThe earliest form of Rangeland Management is not formally deemed part of the natural science studied today, although its roots can be traced to nomadic grazing practices of the Neolithic Revolution when humans domesticated plants and animals under pressures from population growth and environmental change. Humans might even have altered the environment in times preceding the Neolithic through hunting of large-game, whereby large losses of grazing herbivores could have resulted in altered ecological states; meaning humans have been inadvertently managing land throughout prehistory.Rangeland management was developed in the United States in response to rangeland deterioration and in some cases, denudation, due to overgrazing and other misuse of arid lands as demonstrated by the 20th century \"Dust Bowl\" and described in Hardin's 1968 \"Tragedy of the Commons\". Historically, the discipline focused on the manipulation of grazing and the proper use of rangeland vegetation for livestock.\nRange management's focus has been expanded to include the host of ecosystem services that rangelands provide to humans world-wide. Key management components seek to optimize such goods and services through the protection and enhancement of soils, riparian zones, watersheds, and vegetation complexes, sustainably improving outputs of consumable range products such as red meat, wildlife, water, wood, fiber, leather, energy resource extraction, and outdoor recreation, as well as maintaining a focus on the manipulation of grazing activities of large herbivores to maintain or improve animal and plant production. With increasing levels of rangeland degradation, for example as evident through woody plant encroachment, active rehabilitation efforts become part of rangeland management.Pastoralism has become a contemporary anthropological and ecological study as it faces many threats including fragmentation of land, conversion of rangeland into urban development, lack of grazing movement, impending threats on global diversity, damage to species with large terrain, decreases in shared public goods, decreased biological movements, threats of a \"tragedy of enclosures\", limitation of key resources, reduced biomass and invasive plant species growth. Interest in contemporary pastoralist cultures like the Maasai has continued to increase, especially because the traditional syncreticly-adaptive ability of pastoralists could promise lessons in collaborative and adaptive management for contemporary pastoralist societies threatened by globalization as well as for contemporary non-pastoralist societies that are managing livestock on rangelands.\nThe United States Society for Range Management is \"the professional society dedicated to supporting persons who work with rangelands and have a commitment to their sustainable use\". The primary Rangeland Management publications include the Journal of Range Management, Rangelands, and Rangeland Ecology & Management.As climate change continues to disrupt a host of rangeland functions, the Society for Range Management has declared that it \"is committed to promoting adaptation to and mitigation of climate change through the sponsorship of workshops, symposia, research and educational publications, and appropriate policy recommendations. The Society will strive to maximize opportunities and minimize challenges posed by climate change to promote productive rangeland ecosystems that ensure food security, human livelihoods, and continued delivery of diverse ecosystem services\".\" Emerging evidence suggests that rangelands are extremely vulnerable to the threats of climate change, as more severe heatwaves, droughts, evaporation, and catastrophic flood events will consequentially alter ecological states, and negatively affect forage production, both of which will negatively impact ecosystem functioning and the sustainable production of ecosystem services. In an open letter to the White House in 2017, the president of the SRM offered President Trump the society's support in seeking management strategies to mitigate climate-induced phenomenon like drought and forest fires, a subject which was brought to the national debate stage and which has received significant push-back by Trump and his administration. Likewise in 2021 the SRM and several other institutions sent an open letter to President Biden urging for more research and development funding to be provisioned toward agricultural and food systems research, especially as climate change threatened national security of agricultural resources.\nThe Australian Rangeland Society is the peak group of rangeland professionals in Australia. It is an independent and non-aligned association of people interested in the management and sustainable use of rangelands. Rangeland Management publications from the Society include The Rangeland Journal and the Range Management Newsletter.In the United States, the study of range science is commonly offered at land-grant universities including New Mexico State University, Colorado State University, Oregon State University, North Dakota State University, South Dakota State University, Texas A&M University, Texas Tech University, the University of Arizona, the University of Idaho, the University of Wyoming, Utah State University, and Montana State University. The Range Science curriculum is strongly tied to animal science, as well as plant ecology, soil science, wildlife management, climatology and anthropology. Courses in a typical Range Science curriculum may include ethology, range animal nutrition, plant physiology, plant ecology, plant identification, plant communities, microbiology, soil sciences, fire control, agricultural economics, wildlife ecology, ranch management, Socioeconomics, cartography, hydrology, Ecophysiology, and environmental policy. These courses are essential to entering a range science profession.Students with degrees in range science are eligible for a host of technician-type careers working for the federal government under the Bureau of Land Management, the United States Fish and Wildlife Service, the Agricultural Research Service, the United States Environmental Protection Agency, the NRCS, or the US Forest Service as range conservationists, inventory technicians, range monitoring/animal science agents, field botanists, natural-resource technicians, vegetation/habitat monitors, GIS programming assistants, general range technicians, and as ecological assessors, as well as working in the private sector as range managers, ranch managers, producers, commercial consultants, mining and agricultural real estate agents, or as Range/ Ranch Consultants. Individuals who complete degrees at the M.S. or P.h.D. level, can seek academic careers as professors, extension specialists, research assistants, and adjunct staff, in addition to a number of professional research positions for government agencies such as the US Department of Agriculture and other state run departments.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_7" +} \ No newline at end of file diff --git a/test/Nature/Swamp_Legend.json b/test/Nature/Swamp_Legend.json new file mode 100644 index 0000000000000000000000000000000000000000..d4edd00d03ab79b745dbc055f2c588ff6de0cef0 --- /dev/null +++ b/test/Nature/Swamp_Legend.json @@ -0,0 +1,54 @@ +{ + "domain": "Nature", + "document": "Swamp Legend (\"Sumpflegende\") is a 1919 oil-on-cardboard painting by Swiss German painter Paul Klee. It has been in the Städtische Galerie im Lenbachhaus in Munich since 1982, but its ownership was disputed due to its provenance. The painting was one of the works that the Nazis declared \"degenerate art\", and they confiscated it from the Landesmuseum Hannover in 1937. However, it was not owned by the museum, but was there on a loan from the art historian Sophie Lissitzky-Küppers. In July 2017 it became known that her heirs had reached an agreement with the city of Munich abouts its ownership.\nThe painting belongs to a series of \"cosmic landscapes\" that Klee created in a large number between 1917 and 1919, where its expressed a symbolic conception of nature. In abstract color spaces, dominated by sulphurous yellow and contrasted with violet, the objects arrange themselves in a naïve way. In the dreamlike scenery, the human figure itself becomes a piece of nature. As Klee wrote in his Diaries: “Earlier (even as a child) the landscape was very clear to me. A scenery for moods of the soul. Dangerous times begin now, when nature wants to swallow me, I am nothing anymore, but I have peace.”The painting was purchased shortly after its completion by Paul Küppers, the director of the Hannoverscher Künstlerverein, and his wife Sophie, later Lissitzky-Küppers, directly from the artist's studio in Munich. In 1926, Sophie Lissitzky-Küppers loaned the painting to the Hanover Provincial Museum, along with 15 other modernist works. On July 5, 1937, it was confiscated there by the National Socialist Art Commission as part of the campaign against “Degenerate Art”. From July 19, 1937, it was presented in the eponymous abusive exhibition on the so-called \"Dada Wall\".In 1941, one of Hitler's official art dealers, Hildebrand Gurlitt bought the picture from the German Reich for 500 Swiss francs. In 1962 it was auctioned at the Lempertz auction house in Cologne, despite a reference to its origin and the assumption that it was still owned by Sophie Lissitzky-Küppers, and acquired by the Swiss collector Ernst Beyeler. He sold it to the Rosengart Gallery in Lucerne, where it was from 1973 to 1982. It was then acquired for DM 700,000 by the Gabriele Münter and Johannes Eichner Foundation and the city of Munich, which loaned it to the Städtische Galerie im Lenbachhaus.\nIn 1992, Jen Lissitzky, the son of Sophie Lissitzky-Küppers, filed a lawsuit demanding restitution at the Munich District Court. The lawsuit was dismissed because of the statute of limitations. The principles of lifting the statute of limitations according to the Washington Declaration, to which the public museums in Germany have committed themselves, do not apply in this case, since the Lenbachhaus is a private foundation. At the end of March 2012, the heirs filed another lawsuit against the city of Munich for the picture to be handed over, on the grounds that there were new documents as evidence.\nIn July 2017 it became known that the heirs had reached an agreement with the city of Munich. Accordingly, the heirs should be paid compensation and the painting will remain in the Lenbachhaus. The price was not mentioned.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "InfluencedBy", + "NamedAfter", + "Uses", + "AppointedBy", + "Represents", + "UsedBy", + "QualifiesForEvent", + "HasQuality", + "IsPollinatedBy", + "ProducedSound", + "LocatedIn", + "HasUse", + "Causes", + "HasParts", + "PartOf", + "HasEffect", + "Country", + "LocatedInTheAdministrativeTerritorialEntity", + "CountryOfCitizenship" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Nature_8" +} \ No newline at end of file diff --git a/test/People/Bibliography_of_Abul_Hasan_Ali_Hasani_Nadwi.json b/test/People/Bibliography_of_Abul_Hasan_Ali_Hasani_Nadwi.json new file mode 100644 index 0000000000000000000000000000000000000000..89ce04a1b4f97800b248e17c8c318f29432f544e --- /dev/null +++ b/test/People/Bibliography_of_Abul_Hasan_Ali_Hasani_Nadwi.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "This bibliography of Abul Hasan Ali Hasani Nadwi is a selected list of generally available scholarly resources related to Abul Hasan Ali Hasani Nadwi, a leading Islamic scholar, philosopher, writer, preacher, reformer and a Muslim public intellectual of 20th century India, the author of numerous books on history, biography, contemporary Islam and the Muslim community in India. He wrote a 7 volume autobiography in Urdu titled Karwan-e-Zindagi in 1983:1999. In this work, he tried to cover all the information related to himself as well as the remarkable events of his life. This list will include his biographies, theses written on him and articles published about him in various journals, newspapers, encyclopedias, seminars, websites etc. in APA style.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_0" +} \ No newline at end of file diff --git a/test/People/Coat_of_arms_of_the_Prince_of_Wales.json b/test/People/Coat_of_arms_of_the_Prince_of_Wales.json new file mode 100644 index 0000000000000000000000000000000000000000..a96f3f0e1c135fdb9643fffdc01fdbeaabe2f503 --- /dev/null +++ b/test/People/Coat_of_arms_of_the_Prince_of_Wales.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "The coat of arms of the Prince of Wales is the official personal heraldic insignia of the Princes of Wales, a title traditionally granted to the heir apparent of the reigning monarch of the United Kingdom of Great Britain and Northern Ireland, formerly the Kingdom of Great Britain and before that the Kingdom of England. \nThe coat of arms devised for Charles III, then Prince of Wales, in 1958, were the same as his granduncle, Edward VIII, had used as prince of Wales since 1911 (see below for references), and contained the badges and elements taken from all four of the constituent countries of the United Kingdom as well as from the many titles the prince holds as heir apparent. These arms lapsed when Charles became king.\nSince Edward I awarded it to his son the future Edward II, the heir apparent to the English throne has been created with the title Prince of Wales. William was so created by Charles III on the 2nd day of his reign. The College of Arms has yet to assign William, and Charles III has yet to settle on William by royal warrant, a version of the royal arms that depicts elements of his title as prince of Wales.\nThe history of the coat of arms is closely linked with those of the Coat of arms of England and the Coat of arms of the United Kingdom. However, as the noted antiquarian and heraldist Charles Boutell wrote in 1863, \"The Arms of the Prince of Wales have a distinct individuality of their own, with which nothing ought to be directly associated\".\nThe coronets of the Prince and the Peers of the realm were regulated by Charles II by Royal Warrant, signed on 9 February 1661. Part of the warrant proclaimed: \"Our Will and Pleasure therefore is, That the Son and Heir Apparent of the Crown for the time being, shall use and bear his Coronet composed of Crosses and Flower-de-Lized with one Arch; and in the midst a Ball and Cross, as hath our Royal Diadem\".In other words, the heraldic coronet used in the Prince of Wales's coat of arms is similar to the heraldic crown used in the Royal arms, except that instead of two intersecting arches it has only one. Boutell wrote that: \"It should be noticed, however, that this coronet belongs to the prince as eldest son of the Sovereign and heir-apparent to the Throne, and not as Prince of Wales\". The coronet is also used by the Prince of Wales's consort, in her coat of arms.\nThe heir's coronet was confirmed in another Royal Warrant signed on 19 November 1917 by George V. The warrant proclaimed: \"by the son and heir apparent of the sovereign and his successors a coronet composed of crosses and fleurs-de-lis with one arch and in the midst a ball and cross as in the royal crown.\"\nCurrently there are three physical examples of coronets used at one time or other as part of the Honours of the Principality of Wales: the Coronet of Frederick, the Coronet of George and the Coronet of Charles. However, these physical manifestations have not affected the graphical representation of the coronet in heraldic art.\nBeginning with the reign of Edward I, a label of three points Azure (or blue) was used by his son, the future Edward II, to differentiate his arms from those of his father. Without such a label their arms would be identical. Within heraldry this system of differentiating arms is called cadency. The label is placed on the chief (or top) of the shield of arms, with the ends extending across from the dexter to the sinister sides of the shield. It was Edward the Black Prince, heir of Edward III, who first used a label of three points Argent, also white or silver. This has been the label of the heir apparent ever since, without regard to the system of cadency used by other members of the royal family.The Prince of Wales's crest follows closely that of the Sovereign, but always with the appropriate label of difference displayed. This crest depicts a \"Lion Or, passant guardant, wearing a coronet of the Heir, and differenced on the shoulders with a label of three points Argent.\" The lion always stands on a larger coronet of the Heir, which then sits on a golden helmet or the Royal Helm. From the sides flow the gold and ermine mantling of the royal family.Similarly to the crest, the prince's supporters follow those of the Sovereign. On either side of the shield of arms and standing on gold scrollwork are the royal supporters: the Lion and the Unicorn. Both beasts have the prince's label charged around their necks, again as an appropriate mark of difference. The lion on the dexter side, an ancient symbol of England, is crowned with the coronet of the Heir. The beast has been a supporter of the English royal arms since the reign of Henry VIII. The white unicorn of Scotland on the sinister side was incorporated into the royal arms from the Scottish royal arms after the Union of the crowns in 1603.Prince William was appointed a Knight of the Garter in 2008. Since the founding of the Order in 1348, almost every Prince of Wales has been appointed to the Order. The Order of the Garter is represented in the coat of arms by its namesake the blue buckled garter, which bears in gold letters the motto Honi soit qui mal y pense, middle French for \"Shame on him who thinks evil of it\".Under the coat of arms is a scroll bearing the motto Ich dien, German for \"I serve\". The motto of uncertain origin first appeared on the arms of Edward of Woodstock ('The Black Prince'). Prince Edward was created Prince of Wales by his father Edward III on 12 May 1343. Legend holds that the Black Prince took the motto as well as the ostrich feathers from John the Blind of Bohemia, who was killed fighting against the prince and his father at the Battle of Crécy in 1346. The motto is also a near homophone for Eich Dyn, \"Your Man\" in Welsh.The Prince of Wales as part of his full achievement of arms has many Heraldic badges, which represent the history and sovereignty of his many titles.The Prince of Wales's feathers badge comprises \"a plume of three ostrich feathers Argent enfiled by a royal coronet of alternate crosses and fleur-de-lys Or\" with the motto Ich dien on a dark blue ribbon. The badge is probably the most recognisable element of the Prince of Wales's heraldic achievement as a personal insignia of the prince and also of the Principality of Wales itself. In a personal capacity the badge is granted as a royal warrant of appointment to companies that regularly supply goods and services to the Prince. As of 2018 there were 170 companies entitled to display this badge with the words \"By Appointment to HRH The Prince of Wales\" underneath. The badge can be depicted on all premises, delivery vehicles, stationery and advertisements as well as on the individual products themselves. Other organisations associated with Wales or the Prince incorporate the badge into their own insignia including many Welsh regiments of the British Army (such as the Royal Regiment of Wales) and the Welsh Rugby Union.Feathers used as either a crest or a badge have been an ancient heraldic badge of the House of Plantagenet. However, it was not until its incorporation into the heraldic achievements of the Black Prince that the feathers have become an omnipresent feature of the coats of arms of the Prince of Wales.\nOn 10 December 1901 a warrant signed by Edward VII approved the addition of a badge of the Red Dragon to the coat of arms of the Prince of Wales. The proclamation specified \"on the sinister side a representation of the Badge of Wales, namely, on a mount vert a Dragon, passant gules, differenced (as in the Crest) with a label of three points argent.\" This was to complement the feathers badge, which was to be depicted on the dexter side of the prince's crest.The Red Dragon, or Y Ddraig Goch, has been a symbol associated with Wales since the 7th century. It was not until the beginning of the House of Tudor that the Red Dragon became a royal badge of the kings of England. Henry Tudor (later King Henry VII) displayed the Dragon on his battle standard. The red dragon became an official royal badge of the sovereign (representing Wales) according to a warrant issued in 1801. The warrant at the same time also confirmed the Tudor rose as a royal badge for England, the thistle for Scotland and the golden harp for Ireland.\nThe arms of the Duke of Cornwall are: \"Sable, fifteen bezants, five, four, three, two and one.\" These arms were derived from those of Richard of Cornwall, King of the Romans, son and heir of King John, who was also Count of Poitiers (or Poitou), represented by arms made up of peas (pois) or gold coins.Upon the accession of the prince's mother as Elizabeth II on 6 February 1952, Prince Charles was automatically made the Duke of Cornwall. As such he is able to display the arms of the duchy on his coat of arms. This title has been granted to every heir apparent since 17 March 1337, in accordance with a charter issued by Edward III for his eldest son and heir Edward of Woodstock. A royal warrant of 21 June 1968 augmented this arms with two supporters \"on either side, a Cornish chough proper supporting an ostrich feather Argent, penned Or\", and a motto: \"Houmont\" (or Houmout), meaning courage.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_1" +} \ No newline at end of file diff --git a/test/People/Dilorom_Yuldosheva.json b/test/People/Dilorom_Yuldosheva.json new file mode 100644 index 0000000000000000000000000000000000000000..9f87ed1fda58e9d2a4420d24269116fd6123d50b --- /dev/null +++ b/test/People/Dilorom_Yuldosheva.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "Dilorom Yuldasheva (born ) is an Uzbek woman who overcame disability. She lost her legs in an accident with a combine harvester. She overcame her disability to become a businesswoman employing 40 others. Her example was recognised and she was one of the BBC's 100 Inspiring Women and she was given a national courage award in 2024.\nYuldasheva was married and she worked in the fields in the Denov district of Uzbekistan. She was handfeeding a combine harvester when her long clothes became entangled in the machinery. As a result, she had both her legs amputated and she was immobile as her family could not afford a wheelchair. She told her husband that he should marry again but he told her that she should never raise that matter again.Within two years of the accident she had created a sewing business which employed forty other women. She wanted women to not have to work in the fields. She organised training and obtained contracts so that they could create uniforms for businesses and schools.\nYuldasheva received visits from people who offered their sympathies and they would take their selfies with her. The visitors brought a chair and a make-up box which they used in the photos. It was a week later that she learned that the chair actually belonged to a local elderly woman. She returned the chair and the make-up box was retrieved. She became resigned to the exploitation but she noted her own disappointment at losing the chair as she had been temporarly mobile. Even with a chair she could not travel far as her family live over a mile from a road and that path needs to be covered before the start of any car journey. The dresses that she makes are delivered by her son on his bicycle.\nIn 2024 she was recognised as one of the BBC's 100 inspiring women for 2024. As a result, she also received a national \"Mardlik\" courage award in December 2024, in a meeting chaired by the President. The President's daughter and assistant Saida Mirziyoyeva was tasked with making a film about Yuldosheva, and at least four more, in 2025. The President announced wide-ranging targets to improve the support for those with disabilities. Yuldosheva thanked the President for his help and for continuing to deliver peace.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_2" +} \ No newline at end of file diff --git a/test/People/Favorite_son.json b/test/People/Favorite_son.json new file mode 100644 index 0000000000000000000000000000000000000000..7c84324b08dfb8a9e2cf2a23416aaabe7465886b --- /dev/null +++ b/test/People/Favorite_son.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "Favorite son (or favorite daughter) is a political term.\nAt the quadrennial American national political party conventions, a state delegation sometimes nominates a presidential candidate from the state, or less often from the state's region, who is not a viable candidate in the view of other delegations, and votes for this candidate in the initial ballot. The technique allows state leaders to negotiate with leading candidates in exchange for the delegation's support in subsequent ballots.\nSerious candidates usually, but not always, avoided campaigning in favorite sons' states. If a party's leader in a state, usually the governor, was unsure of whom to support, as the favorite son the state party could avoid disputes. Conversely, a party leader who has chosen a candidate might become a favorite son to keep other candidates' campaigns out of the state, or prevent a rival local politician from becoming a favorite son. The favorite son may explicitly state that the candidacy is not viable, or that the favorite son is not a candidate at all. The favorite son may hope to receive the vice-presidential nomination, Cabinet post or other job, increase support for the favorite son's region or policies, or just the publicity from being nominated at the convention.\nThe technique was widely used in the 19th and early 20th centuries. Since nationwide campaigns by candidates and binding primary elections have replaced brokered conventions, the technique has fallen out of use, as party rule changes in the early 1970s required candidates to have nominations from more than one state.\nA politician whose electoral appeal derives from their native state, rather than their political views is called a \"favorite son\". For example, in the United States, a presidential candidate will usually win the support of their home state(s). A particularly notable instance of this occurred in 1984, when challenger Walter Mondale lost 49 of 50 states against popular incumbent Ronald Reagan, winning only his home state of Minnesota.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_3" +} \ No newline at end of file diff --git a/test/People/Grammar_Nazi.json b/test/People/Grammar_Nazi.json new file mode 100644 index 0000000000000000000000000000000000000000..1b3ba9545b6efa068dbe2394e949b91c8b01ddfa --- /dev/null +++ b/test/People/Grammar_Nazi.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "Grammar nazi/spelling nazi or grammar pedant/spelling pedant is a term for a pedant who compulsively criticizes or corrects others' grammar mistakes, typos, misspellings, and other errors in speech or writing. The term originated in 1990s discussion forums as a way to insult those who overly correct others' grammar. \"Grammar Nazis\" often correct mistakes humorously, though this can reinforce arbitrary standards of linguistic correctness. These corrections often reflect literacy privilege. The term is often criticized for being a lighthearted use of the word Nazi. Grammar nazis are often criticized themselves for being rude or harsh.\nThe Nazis were the German government and military responsible for the Holocaust during World War II. They were extremely authoritarian. By the 1950s-60s, \"nazi,\" when written in lowercase, became a term for anyone seen as extremely authoritarian. Early examples include \"surf nazis\" who were fanatical about surfing. The term \"grammar nazi\" appeared on a Usenet forum as early as 1990, and gained wider recognition after the \"Soup Nazi\" character on Seinfeld in 1995.With the spread of social media, grammar nazis have become more common, as it is easier than ever to correct typos and misspellings. Grammar nazis are particularly prevalent on Facebook, Reddit, and X (Twitter).In 2016, Reese Lansangan released the song Grammar Nazi about a woman upset with her love interest's grammar. The song went viral and is even used to teach English. The song Word Crimes by \"Weird Al\" Yankovic highlights the issues with grammar policing through humor, though it also sparks debate about literacy privilege and social inequality. Grammar nazis have even been found to be helpful to English learners.One aspect of grammar nazis that is often criticized is their insistence on grammatical \"purism.\" Grammar nazis strictly adhere to traditional grammar rules. However, their focus on minute details detracts from effective communication. These pedants fail to recognize the many dialects of English, such as African American English, as correct. This can exhibit racism or classism. They fail to acknowledge the difference between standard and linguistic grammar. Grammar nazis strictly adhere to etymological fallacy, and fail to recognize that words can have separate informal meanings.Many grammar pedants will rely on incorrect or outdated grammatical rules. Languages change over time, and formal grammar is not the only correct manner of speaking and writing. Conversational grammar is incredibly different. For example, a grammar nazi would be against using split infinitives, even though they are grammatically correct, and perfectly acceptable conversationally.Calling a grammar nazi a \"nazi\" is giving the word nazi a more lighthearted meaning in that context. Many argue that this is not an ethical practice, regarding the atrocities committed by the Nazis during WW2. Additionally, correcting people's grammar compulsively is oftentimes rude. These pedants can also be racist by not recognizing ethnic dialects.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_4" +} \ No newline at end of file diff --git "a/test/People/Jes\303\272s_Garc\303\255a.json" "b/test/People/Jes\303\272s_Garc\303\255a.json" new file mode 100644 index 0000000000000000000000000000000000000000..85950d060b9ed11ea58c753c427240b179fcbc67 --- /dev/null +++ "b/test/People/Jes\303\272s_Garc\303\255a.json" @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "Jesús García Corona (13 November 1881 : 7 November 1907) was a Mexican railroad brakeman who died while preventing a train loaded with dynamite from exploding near Nacozari, Sonora, in 1907. As \"el héroe de Nacozari\", he is revered as a national hero and many streets, plazas, and schools across Mexico are named after him.\nGarcía was born in Hermosillo, Sonora. He was one of eight children. At the age of 17 he got a job with Moctezuma Copper Company, but due to his age, he was made a waterboy. He was promoted to switchman, then to brakeman and eventually to fireman.Jesús García was the railroad brakeman for the train that covered the line between Nacozari, Sonora, and Douglas, Arizona. On 7 November 1907 the train was stopped in the town and, as he was resting, he saw that some hay on the roof of a car containing dynamite had caught fire. The cause of the fire was that the locomotive's smokebox was failing and sparks were going out from the smokestack. The wind blew them and got into the dynamite cars. García drove the train in reverse downhill at full-steam six kilometers out of the town before the dynamite exploded, killing him and sparing the population of the mining town.In his honor a statue was raised and the name of the town of Nacozari was changed to Nacozari de García. He was declared Hero of Humanity by the American Red Cross, many streets in Mexico carry his name, and the Estadio Héroe de Nacozari sports stadium in Hermosillo is also named after him. García's sacrifice is remembered in the corrido (ballad) \"Máquina 501\", sung by Pancho \"el Charro\" Avitia, and Mexican railroad workers commemorate 7 November every year as the Día del Ferrocarrilero (Railroader's Day). His heroism is also recounted in the ballad, \"Jesus Garcia\" sung by Arizona State's official balladeer, Dolan Ellis, who wanted to let the world know of the \"Casey Jones of Mexico\" who saved the town. García was awarded, posthumously, the American Cross of Honor.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_5" +} \ No newline at end of file diff --git "a/test/People/Master\342\200\223slave_(technology).json" "b/test/People/Master\342\200\223slave_(technology).json" new file mode 100644 index 0000000000000000000000000000000000000000..c7b164fca4a56265784acb7c08fec9be850fc536 --- /dev/null +++ "b/test/People/Master\342\200\223slave_(technology).json" @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "In engineering, master:slave is a relationship between two systems in which one controls the other. In some cases one master controls just one slave system, but in others there are multiple slave systems controlled by the same master. Sometimes the master is a different kind of system than the slave, but sometimes there are multiple similar systems and one of them is designated the master in order to centralize external (i.e. user) control of the collection.\nDue to its connection to slavery, the terminology is a subject of controversy and has been replaced with alternative terms in some cases.\nA master clock provides time signals used to synchronize one or more slave clocks as part of a clock network; a slave clock receives and displays the time from a master; though it may be able to keep time itself if the master is not working.A serial peripheral interface (SPI) bus typically has a single master controlling multiple slaves.\nI2C and I3C are also an example of master-slave technology.\nModbus uses a master device to initiate connection requests to slave devices.\nAn edge-triggered flip-flop can be created by arranging two gated latches in a master:slave configuration. It is so named because the master latch controls the slave latch's value and forces the slave latch to hold its value, as the slave latch always copies its new value from the master latch.\nIn photography, secondary, or slave, flash units are connected to a master unit to provide synchronized lighting.\nParallel audio duplication often entails multiple recording devices (i.e. for cassette tape or compact disc) linked together so that operating the controls of a master device triggers the same commands on slave devices.\nRailway locomotives operating in the same train (for example, to pull a load too heavy for a single locomotive) may be configured for master:slave operation with all but one of the locomotives controlled from the first. See Multiple-unit train control.\nIn a hydraulic system, a master cylinder is a control device that converts force into hydraulic pressure that drives movement in a slave cylinder at the other end of the hydraulic line. A common application is a vehicle brake system.\nThe term master is used in many technology contexts that do not refer to a relationship of control. Master may be used to mean a copy that has more significance than other copies in which case the term is an absolute concept; not a relationship. Sometimes the term master-slave is used in contexts that do not imply a controlling relationship.In database replication, the master database is the authoritative source. A replica database, sometimes called a slave, is synchronized to it but is not controlled by it.\nA Parallel ATA (aka IDE) hard drive interface supports two hard drives on a cable, which are designated master and slave. The distinction is required by the interface even though neither drive has control or priority over the other.\nThe master:slave terminology was first used in 1904. The terminology was used in 1988 for RFC 1059 and in 1997 for RFC 2136, related to the domain name system. In 2020, Paul Vixie commented on his choice of words:\nI introduced the master/slave terminology in RFC 2136, because I needed names for the roles in an AXFR/IXFR transaction, and the zone transfer hierarchy could be more than one layer deep, such that a server might initiate some AXFR/IXFR's to the \"primary master\" but then respond to AXFR/IXFR's from other servers. In retrospect I should have chosen the terms, \"transfer initiator\" and \"transfer responder\". However, the hydraulic brake and clutch systems in my car had \"master cylinders\" and \"slave cylinders\", and so I did not think I was either inventing a new use for the words \"master\" and \"slave\", or that my use of them for this purpose would be controversial.\nSaid hydraulic brakes for the automotive industry were patented in 1917 by Malcolm Loughead. The term slave cylinder was used in other patent applications, including one by Robert Esnault-Pelterie, published in 1919.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_6" +} \ No newline at end of file diff --git a/test/People/People.json b/test/People/People.json new file mode 100644 index 0000000000000000000000000000000000000000..dfc4cd1611b2e2e73ad6dcacfaf0f525828464df --- /dev/null +++ b/test/People/People.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "A people is any plurality of persons considered as a whole. Used in politics and law, the term \"a people\" refers to the collective or community of an ethnic group or nation. The term \"the people\" refers to the public or common mass of people of a polity. As such it is a concept of human rights law, international law as well as constitutional law, particularly used for claims of popular sovereignty.\nChapter One, Article One of the Charter of the United Nations states that \"peoples\" have the right to self-determination. Though the mere status as peoples and the right to self-determination, as for example in the case of Indigenous peoples (peoples, as in all groups of indigenous people, not merely all indigenous persons as in indigenous people), does not automatically provide for independent sovereignty and therefore secession. Indeed, judge Ivor Jennings identified the inherent problems in the right of \"peoples\" to self-determination, as it requires pre-defining a said \"people\".Both the Roman Republic and the Roman Empire used the Latin term Senatus Populusque Romanus, (the Senate and People of Rome). This term was fixed abbreviated (SPQR) to Roman legionary standards, and even after the Roman Emperors achieved a state of total personal autocracy, they continued to wield their power in the name of the Senate and People of Rome.The term People's Republic, used since late modernity, is a name used by states, which particularly identify constitutionally with a form of socialism.\nIn criminal law, in certain jurisdictions, criminal prosecutions are brought in the name of the People. Several U.S. states, including California, Illinois, and New York, use this style. Citations outside the jurisdictions in question usually substitute the name of the state for the words \"the People\" in the case captions. Four states — Massachusetts, Virginia, Pennsylvania, and Kentucky — refer to themselves as the Commonwealth in case captions and legal process. Other states, such as Indiana, typically refer to themselves as the State in case captions and legal process. Outside the United States, criminal trials in Ireland and the Philippines are prosecuted in the name of the people of their respective states.The political theory underlying this format is that criminal prosecutions are brought in the name of the sovereign; thus, in these U.S. states, the \"people\" are judged to be the sovereign, even as in the United Kingdom and other dependencies of the British Crown, criminal prosecutions are typically brought in the name of the Crown. \"The people\" identifies the entire body of the citizens of a jurisdiction invested with political power or gathered for political purposes.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_7" +} \ No newline at end of file diff --git a/test/People/Person.json b/test/People/Person.json new file mode 100644 index 0000000000000000000000000000000000000000..e589007442586398783e7dffe093ee724808c51d --- /dev/null +++ b/test/People/Person.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "A person (pl.: people or persons, depending on context) is a being who has certain capacities or attributes such as reason, morality, consciousness or self-consciousness, and being a part of a culturally established form of social relations such as kinship, ownership of property, or legal responsibility. The defining features of personhood and, consequently, what makes a person count as a person, differ widely among cultures and contexts.\nIn addition to the question of personhood, of what makes a being count as a person to begin with, there are further questions about personal identity and self: both about what makes any particular person that particular person instead of another, and about what makes a person at one time the same person as they were or will be at another time despite any intervening changes.\nThe plural form \"people\" is often used to refer to an entire nation or ethnic group (as in \"a people\"), and this was the original meaning of the word; it subsequently acquired its use as a plural form of person. The plural form \"persons\" is often used in philosophical and legal writing.\nThe criteria for being a person... are designed to capture those attributes which are the subject of our most humane concern with ourselves and the source of what we regard as most important and most problematical in our lives.Personhood is the status of being a person. Defining personhood is a controversial topic in philosophy and law, and is closely tied to legal and political concepts of citizenship, equality, and liberty. According to common worldwide general legal practice, only a natural person or legal personality has rights, protections, privileges, responsibilities, and legal liability.\nPersonhood continues to be a topic of international debate, and has been questioned during the abolition of slavery and the fight for women's rights, in debates about abortion, fetal rights, and in animal rights advocacy.\nVarious debates have focused on questions about the personhood of different classes of entities. Historically, the personhood of women, and slaves has been a catalyst of social upheaval. In most societies today, postnatal humans are defined as persons. Likewise, certain legal entities such as corporations, sovereign states and other polities, or estates in probate are legally defined as persons. However, some people believe that other groups should be included; depending on the theory, the category of \"person\" may be taken to include or not pre-natal humans or such non-human entities as animals, artificial intelligences, or extraterrestrial life.\nPersonal identity is the unique identity of persons through time. That is to say, the necessary and sufficient conditions under which a person at one time and a person at another time can be said to be the same person, persisting through time. In the modern philosophy of mind, this concept of personal identity is sometimes referred to as the diachronic problem of personal identity. The synchronic problem is grounded in the question of what features or traits characterize a given person at one time.Identity is an issue for both continental philosophy and analytic philosophy. A key question in continental philosophy is in what sense we can maintain the modern conception of identity, while realizing many of our prior assumptions about the world are incorrect.\nProposed solutions to the problem of personal identity include continuity of the physical body, continuity of an immaterial mind or soul, continuity of consciousness or memory, the bundle theory of self, continuity of personality after the death of the physical body, and proposals that there are actually no persons or selves who persist over time at all.\nIn ancient Rome, the word persona (Latin) or prosopon (πρόσωπον; Ancient Greek) originally referred to the masks worn by actors on stage. The various masks represented the various \"personae\" in the stage play.The concept of person was further developed during the Trinitarian and Christological debates of the 4th and 5th centuries in contrast to the word nature. During the theological debates, some philosophical tools (concepts) were needed so that the debates could be held on common basis to all theological schools. The purpose of the debate was to establish the relation, similarities and differences between the logos (Ancient Greek: Λóγος, romanized: Lógos/Verbum) and God. The philosophical concept of person arose, taking the word \"prosopon\" (Ancient Greek: πρόσωπον, romanized: prósōpon) from the Greek theatre. Therefore, the logos (the Ancient Greek: Λóγος, romanized: Lógos/Verbum), which was identified with the Christ, was defined as a \"person\" of God. This concept was applied later to the Holy Ghost, the angels and to all human beings. Trinitarianism holds that God has three persons.\nSince then, a number of important changes to the word's meaning and use have taken place, and attempts have been made to redefine the word with varying degrees of adoption and influence. According to Jörg Noller, at least six approaches can be distinguished:\n\"The ontological definition of the person as \"an individual substance of a rational nature\" (Boethius).\nThe self-consciousness-based definition of the person as a being that \"can conceive itself as itself\" (John Locke).\nThe moral-philosophical definition of the person as \"an end in itself\" (Immanuel Kant). In current analytical debate, the focus has shifted to the relationship between bodily organism and person.\nThe theory of animalism (Eric T. Olson) states that persons are essentially animals and that mental or psychological attributes play no role in their identity.\nConstitution theory (Lynne Baker), on the other hand, attempts to define the person as a natural and at the same time self-conscious being: the bodily organism constitutes the person without being identical to it. Rather, it forms with it a \"unity without identity\".\n[... Another idea] for conceiving the natural-rational unity of the person has emerged recently in the concept of the \"person life\" (Marya Schechtman).\"\nOther theories attribute personhood to those states that are viewed to possess intrinsic or universal value. Value theory attempts to capture those states that are universally considered valuable by their nature, allowing one to assign the concept of personhood upon those states. For example, Chris Kelly argues that the value that is intuitively bestowed upon humans, their possessions, animals, and aspects of the natural environment is due to a value monism known as \"richness.\" Richness, Kelly argues, is a product of the \"variety\" and the \"unity\" within an entity or agent. According to Kelly, human beings and animals are morally valued and entitled to the status of persons because they are complex organisms whose multitude of psychological and biological components are generally unified towards a singular purpose in any moment, existing and operating with relative harmony.\nPrimus defines people exclusively as their desires, whereby desires are states which are sought for arbitrary or nil purpose(s). Primus views that desires, by definition, are each sought as ends in and of themselves and are logically the most precious (valuable) states that one can conceive. Primus distinguishes states of desire (or 'want') from states which are sought instrumentally, as a means to an end (on the basis of perceived 'need'). Primus' approach can thus be contrasted to Kant's moral-philosophical definition of a person: whereas Kant's second formulation of the categorical imperative states that rational beings must never be treated merely as a means to an end and that they must also always be treated as an end, Primus offers that the aspects that humans (and some animals) desire, and only those aspects, are ends, by definition.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_8" +} \ No newline at end of file diff --git a/test/People/Section_Eleven_of_the_Constitution_of_South_Africa.json b/test/People/Section_Eleven_of_the_Constitution_of_South_Africa.json new file mode 100644 index 0000000000000000000000000000000000000000..1e1ec5668dd88a9ad0a87684182ab2594a86558c --- /dev/null +++ b/test/People/Section_Eleven_of_the_Constitution_of_South_Africa.json @@ -0,0 +1,49 @@ +{ + "domain": "People", + "document": "Section Eleven of the Constitution of South Africa, part of the Bill of Rights, guarantees the right to life. This section has been interpreted to prohibit the death penalty, but not to prohibit abortion. It also has important implications for euthanasia, self-defence, the use of force by law enforcement, and the provision of life-saving healthcare.\nUnder the heading \"Life\", the section states, in full, \"Everyone has the right to life.\" Unlike the right to life in many other human rights instruments, this section is unqualified; it does not make an exception for the death penalty, but neither does it explicitly state that the death penalty is forbidden.\nOne of the first decisions by the Constitutional Court was the 1995 case of S v Makwanyane, in which the court addressed the constitutionality of the death penalty. The principal judgment, by President of the Court Arthur Chaskalson, found the death penalty to be unconstitutional not because it violated the right to life, but because it violated the prohibition of cruel, inhuman and degrading punishment elsewhere in the Bill of Rights. However, a majority of the judges of the court held that the death penalty also violated the right to life.In the 2001 case of Mohamed v President of the Republic of South Africa the Constitutional Court dealt with the extradition of suspects under circumstances where they may face the death penalty. The court held that the South African government cannot extradite suspects for capital offences without obtaining an assurance from the jurisdiction requesting extradition that they will not be sentenced to death (or that, if they are, the death penalty will not be carried out). This was reaffirmed in the 2012 case of Minister of Home Affairs v Tsebe. However these protections do not extend to South African citizens outside South Africa: in Kaunda v President of the Republic of South Africa the court held that the South African government was not obliged to intervene diplomatically to protect South African citizens being extradited from Zimbabwe to Equatorial Guinea on capital charges.\nThe Choice on Termination of Pregnancy Act, 1996, which permits elective abortions in the first trimester and for broadly-specified reasons in the second trimester, was challenged in Christian Lawyers' Association v Minister of Health, on the basis that it violated the foetus' right to life. The Transvaal Provincial Division of the High Court dismissed the case, ruling that the word \"everyone\" in section 11 does not extend to unborn foetuses, which do not have legal personality under the Bill of Rights.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "LocatedInTimeZone", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "PresentedIn", + "PositionHeld", + "Uses", + "AppointedBy", + "DedicatedTo", + "UsedBy", + "ExemplarOf", + "IssuedBy", + "LocatedIn", + "PartOf", + "Spouse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "People_9" +} \ No newline at end of file diff --git a/test/Philosophy/Cryptoterrestrial_hypothesis.json b/test/Philosophy/Cryptoterrestrial_hypothesis.json new file mode 100644 index 0000000000000000000000000000000000000000..bf0a3f997a0418b3139c3fcd8cd0e01724293ae8 --- /dev/null +++ b/test/Philosophy/Cryptoterrestrial_hypothesis.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "The cryptoterrestrial hypothesis proposes that reports of flying saucers or UFOs are evidence of a hidden, Earth-based, technologically-advanced civilization.\nAaron John Gulyas, a scholar of conspiracy theories, characterized the so-called hypothesis as \"really more of a thought experiment designed to raise questions\", while others note that \"even people open to [the cryptoterrestrial hypothesis] remain sceptical\". In 2024, authors in a philosophy journal described the cryptoterrestrial hypothesis as a suggestion that \"sounds absolutely crazy\".\nDuring the late 19th century, a variety of authors promoted ideas of an undiscovered superior civilization, variously located in mythical places such as Shambhala, Atlantis, Lemuria, or inside a hollow earth. In 1864, Jules Verne's novel Journey to the Center of the Earth imagined a hidden world beneath the Earth's surface. In 1871, the novel The Coming Race was published anonymously; it discussed a subterranean superhuman race with psionic powers. In subsequent years, Theosophy founder Helena Blavatsky spread tales of superhuman masters hidden in the mountains of Tibet. In the ensuing decades, occultists alleged the existence of secret superhuman societies in a variety of mythical places including Shambhala, Atlantis, Thule, Hyperborea, Mu, Lemuria, or even the interior of a Hollow Earth. In his 1895 novel The Time Machine, H.G. Wells wrote about Morlocks, a hidden, subterranean race of technological humanoids who feed on helpless surface-dwellers. The 1933 novel Lost Horizon and its 1937 film adaptation depict Shangri-La, a Tibetan paradise inhabited by peaceful, nearly-immortal people. The 1935 serial The Phantom Empire starred Gene Autry as a singing cowboy who stumbles upon an ancient subterranean civilization living beneath his own ranch.\nDuring the mid-1940s, an obscure sub-culture developed around the science-fiction magazine Amazing Stories and its tales of Richard Sharpe Shaver, claimed to be non-fictional. Since 1945, the magazine had published Shaver's claims to be in communication with subterranean beings concerned about atomic pollution who piloted disc-shaped craft.In the October 1947 issue of Amazing Stories, editor Raymond Palmer argued the flying disc flap was proof of Richard Sharpe Shaver's claims. That same issue carried a letter from Shaver in which he argued the truth behind the discs would remain a secret.\nWrote Shaver: \"The discs can be a space invasion, a secret new army plane — or a scouting trip by an enemy country...OR, they can be Shaver's space ships, taking off and landing regularly on earth for centuries past, and seen today as they have always been — as a mystery. They could be leaving earth with cargos of wonder-mech that to us would mean emancipation from a great many of our worst troubles— and we'll never see those cargos...I predict that nothing more will be seen, and the truth of what the strange disc ships really are will never be disclosed to the common people. We just don't count to the people who do know about such things. It isn't necessary to tell us anything.\"\nAfter Shaver's death in 1975, his editor Raymond Palmer admitted that \"Shaver had spent eight years not in the Cavern World, but in a mental institution\" being treated for paranoid schizophrenia.\nOn June 24, 1947, during the first summer of the Cold War, civilian pilot Kenneth Arnold gave a report of seeing hypersonic disc shaped craft flying over Washington State. Arnold's claim was reported in papers nationwide, igniting a craze of copycat reports. mainstream experts concluded the reports were caused by social contagion. By July 7, Arnold was suggesting the reports might caused by extraterrestrial spaceships. While some interpreted UFO reports as evidence of extraterrestrials, a few authors suggested non-human terrestrials were responsible. During the 1947 flying disc craze, Theosophists like Meade Layne suggested that flying saucers came from Earth's 'etheric plane' while Hollow Earth conspiracy theorists suggested that the UFO reports were being caused by a technological civilization beneath the surface of the Earth. Others suggested the UFO reports might be caused by animals indigenous to Earth's atmosphere. In the mid 20th-century, authors like Morris Jessup and Erich von Däniken suggested extra-terrestrials might have arrived on Earth in pre-historic times, a possibility depicted in the 1969 Kubrick film 2001: A Space Odyssey. In his 1956 book They Knew Too Much About Flying Saucers author Gray Barker suggested the saucers might come from an inner Earth, a connection also explored by Albert K. Bender in his 1962 book Flying Saucers and the Three Men. In 1960, Raymond Bernard's book Flying Saucers from the Earth's Interior further popularized the idea. Beginning in the 1970s, authors like John Keel and Jacques Vallee suggested UFO reports might be linked to supernatural beings they termed 'ultra-terrestrials'.\nIn the 2000s, author Mac Tonnies coined the term \"crypto-terrestrial\" to describe theoretical hidden indigenous humanoids. Tonnies compared his \"Crypto-terrestrial Hypothesis\" with what he termed the Null Hypothesis of UFOs, the idea that \"UFOs can be universally ascribed to misidentified natural phenomena and sightings of unconventional earthly aircraft\". Tonnies contrasted his cryptoterrestrial hypothesis with the 'ultraterrestrial hypothesis' of the 1970s, writing: \"Keel and Vallee have both ventured essentialy 'occult' ideas in cosmological terms; both ... require a revision of our understanding of the way reality itself works. But the cryptoterrestial hypothesis is grounded in a more familiar context. I'm not suggesting unseen dimensions of the need for ufonauts to 'downshift' to our level of consciousness. Rather I'm asking if it's feasible that the alleged aliens that occupy historical and contemporary mythology are flesh-and-blood human-like creatures that live right here on Earth.\" Tonnies and his cryptoterrestrials were featured in the writings of fringe UFO authors like Nick Redfern, Jerome Clark, Paul Kimball, and Hal Puthoff.\nThe 1973 science-fiction story Chains of the Sea features apparently-extraterrestrial visitors who are essentially indifferent to humans but interact with hidden intelligent beings native to Earth. In the 1989 film The Abyss, deep sea divers investigating the wreck of a nuclear-armed submarine make contact with an advanced civilization indigenous to Earth's oceans. In a 1996 episode of The X-Files titled \"Jose Chung's From Outer Space\", a UFO contactee is revealed to be a fantasy-prone personality when he conveys a message from \"Lord Kinbote\", a creature who comes \"not from outer space, but from inner space... from within the Earth's molten core\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_0" +} \ No newline at end of file diff --git a/test/Philosophy/Harald_Lesch.json b/test/Philosophy/Harald_Lesch.json new file mode 100644 index 0000000000000000000000000000000000000000..7335a863c60a481350d82a06c45bd16e17cd4f4f --- /dev/null +++ b/test/Philosophy/Harald_Lesch.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "Harald Lesch (born 28 July 1960) is a German physicist, astronomer, natural philosopher, author, television presenter, professor of physics at the Ludwig Maximilian University of Munich (LMU) and professor of natural philosophy at the Munich University of Philosophy.\nLesch was born in Gießen, Hesse. After completing secondary school in 1978 at the Theo-Koch-Schule in Grünberg, Hesse, Lesch studied physics at the University of Giessen, then at the University of Bonn, where he completed his doctoral degree in 1987 and worked at the Max-Planck-Institute for Radio Astronomy. From 1988 to 1991 he was a research assistant at the state observatory at Heidelberg-Königstuhl. In 1992 he was a visiting professor at the University of Toronto. In 1994 he was habilitated at the University of Bonn.Since 1995, Lesch has been a professor of theoretical astrophysics at the Institute for Astronomy and Astrophysics at the LMU Munich. Additionally, he teaches natural philosophy at the University for Philosophy in Munich. His main areas of research are cosmic plasma physics, black holes, and neutron stars. He is the expert on astrophysics in the Deutsche Forschungsgemeinschaft (DFG) (German Research Society) and a member of the Astronomische Gesellschaft (Astronomical Society). He is also a textbook author.Lesch has made television appearances for the longstanding, self-presented production of the channel BR-alpha: alpha-Centauri, Lesch & Co., Denker des Abendlandes (Thinkers of the Western World), and Alpha bis Omega (From Alpha to Omega). He also presented shorter television series. His presentations attempt to make complex physical or philosophical issues more accessible to the public. In 2005 he was awarded the Communicator Prize by the DFG and the Stifterverband für die Deutsche Wissenschaft (Foundation for German Scholarship) for his television appearances and publications. To honor his work on making scientific findings understandable to the broad public, the Naturforschende Gesellschaft zu Emden (nature research society) awarded him an honorary membership on 15 March 2011.\nFor many years, Lesch has presented a number of television series for the channel BR-alpha, beginning with alpha-Centauri, in which he is to be seen since 1998. In \"Lesch & Co.\" and \"Denker des Abendlandes\" (thinkers of the occident), he converses with the philosophy professor Wilhelm Vossenkuhl about philosophical topics. Alpha bis Omega deals with contradiction and consistency of religion and natural science, through conversations between Lesch and the Catholic theologist Thomas Schwartz.In celebration of the Year of Einstein 2005, BR-alpha aired the 8-part series The Physics of Albert Einstein, where in each episode, one single scientific finding of Einstein was introduced by Lesch, who explained its significance. Starting in August 2007, the 16-part program The 4 Elements was aired weekly, which deals with the structure of the world, and in addition to scientific aspects, also handles cultural-historical aspects.\nFor the Pay-TV channel Syfy he differentiates scientifically based and fictional components of Star Trek in the series Star Trek : Science vs. Fiction. From April to the end of 2007, Lesch moderated the weekly 5-minute program sci_xpert for this channel, which dealt with viewer questions, which mostly had to do with feasibility of science fiction concepts (such as \"How realistic are the huge spaceships from Independence Day?\"), but which also addressed purely scientific topics (for example \"What is gravity?\"), which were handled in the tradition of alpha-Centauri. There were a total of 35 episodes.\nSince September 2008, Lesch has been presenting the ZDF scholarly magazine Abenteuer Forschung (Adventures in Research). His predecessor was Joachim Bublath, who presented the show for many years.\nAt the start of the \"International Year of Astronomy 2009\", Lesch moderated in ZDF the 2½ hour special \"How Light Was Born: the Long Night with Harald Lesch\", in which he, between short documentary films, led conversations with the cabaret artist and hobby-philosopher Christoph Süß, the physics professor Günther Hasinger, and the theology professor Thomas Schwartz.\nSince 2010, Lesch presents the show \"Lesch's Kosmos\", a 15-minute programme on the German documentary channel ZDFneo that deals with issues from various scientific fields.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_1" +} \ No newline at end of file diff --git a/test/Philosophy/John_Locke_Lectures.json b/test/Philosophy/John_Locke_Lectures.json new file mode 100644 index 0000000000000000000000000000000000000000..7f5fd6e2f80d18adda6166c00272a1775b279a80 --- /dev/null +++ b/test/Philosophy/John_Locke_Lectures.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "The John Locke Lectures are a series of annual lectures in philosophy given at the University of Oxford. Named for British philosopher John Locke, the Locke Lectures are the world's most prestigious lectures in philosophy, and are among the world's most prestigious academic lectures. They were established in 1950 by the bequest of Henry Wilde. Another comparable lecture series is the Gifford Lectures, which are delivered annually at several universities in Scotland.\nThe first lecture series was offered to Ludwig Wittgenstein, who eventually declined. He felt uncomfortable giving formal lectures where the audience would not be asking or answering questions.\nThe lectures began as an uncertain biennial series, with the first lecturer from 1950 to 1951, and missing the second slot from 1952 to 1953. Between 1969 and 2001, the lectures became gradually more frequent. Since 2001, the lecture notes have been made available electronically.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_2" +} \ No newline at end of file diff --git a/test/Philosophy/Karen_Detlefsen.json b/test/Philosophy/Karen_Detlefsen.json new file mode 100644 index 0000000000000000000000000000000000000000..638e623ce7cfa78928c8203ae48be8d272e005ce --- /dev/null +++ b/test/Philosophy/Karen_Detlefsen.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "Karen Elizabeth Detlefsen is the Vice Provost for Education at the University of Pennsylvania, where she is also Professor of Philosophy in the School of Arts and Sciences and Affiliated Faculty of the Alice Paul Center for Research on Gender, Sexuality, and Women. She serves on the Editorial Board of the Journal of the History of Ideas.\nDetlefsen earned her Ph.D. in Philosophy at the University of Toronto, an M.A. from the University of Western Ontario, and a B.A. in English and Philosophy from the University of Calgary. In 2021 she was an American Council of Learned Societies fellow. In 2021 Detlefsen was named vice-provost at the University of Pennsylvania.Detlefsen works on early modern philosophy, with particular specialization in the role of women in philosophy and the philosophy of education and of science.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_3" +} \ No newline at end of file diff --git a/test/Philosophy/Naive_realism.json b/test/Philosophy/Naive_realism.json new file mode 100644 index 0000000000000000000000000000000000000000..ca647f5a50bb3d1dda1bfbcafcfd693f12f60838 --- /dev/null +++ b/test/Philosophy/Naive_realism.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "In philosophy of perception and epistemology, naïve realism (also known as direct realism or perceptual realism) is the idea that the senses provide us with direct awareness of objects as they really are. When referred to as direct realism, naïve realism is often contrasted with indirect realism.\nAccording to the naïve realist, the objects of perception are not representations of external objects, but are in fact those external objects themselves. The naïve realist is typically also a metaphysical realist, holding that these objects continue to obey the laws of physics and retain all of their properties regardless of whether or not there is anyone to observe them. They are composed of matter, occupy space, and have properties, such as size, shape, texture, smell, taste and colour, that are usually perceived correctly. The indirect realist, by contrast, holds that the objects of perception are simply representations of reality based on sensory inputs, and thus adheres to the primary/secondary quality distinction in ascribing properties to external objects.\nIn addition to indirect realism, naïve realism can also be contrasted with some forms of idealism, which claim that no world exists apart from mind-dependent ideas, and some forms of philosophical skepticism, which say that we cannot trust our senses or prove that we are not radically deceived in our beliefs; that our conscious experience is not of the real world but of an internal representation of the world.\nThe naïve realist is generally committed to the following views:Metaphysical realism: There exists a world of material objects, which exist independently of being perceived, and which have properties such as shape, size, color, mass, and so on independently of being perceived\nEmpiricism: Some statements about these objects can be known to be true through sensory experience\nNaïve realism: By means of our senses, we perceive the world directly, and pretty much as it is, meaning that our claims to have knowledge of it are justified\nAmong contemporary analytic philosophers who defended direct realism one might refer to, for example, Hilary Putnam, John McDowell, Galen Strawson, John R. Searle, and John L. Pollock.\nSearle, for instance, disputes the popular assumption that \"we can only directly perceive our own subjective experiences, but never objects and states of affairs in the world themselves\". According to Searle, it has influenced many thinkers to reject direct realism. But Searle contends that the rejection of direct realism is based on a bad argument: the argument from illusion, which in turn relies on vague assumptions on the nature or existence of \"sense data\". Various sense data theories were deconstructed in 1962 by the British philosopher J. L. Austin in a book titled Sense and Sensibilia.\nTalk of sense data has largely been replaced today by talk of representational perception in a broader sense, and scientific realists typically take perception to be representational and therefore assume that indirect realism is true. But the assumption is philosophical, and arguably little prevents scientific realists from assuming direct realism to be true. In a blog post on \"Naive realism and color realism\", Hilary Putnam sums up with the following words: \"Being an apple is not a natural kind in physics, but it is in biology, recall. Being complex and of no interest to fundamental physics isn't a failure to be \"real\". I think green is as real as applehood.\"\nThe direct realist claims that the experience of a sunset, for instance, is the real sunset that we directly experience. The indirect realist claims that our relation to reality is indirect, so the experience of a sunset is a subjective representation of what really is radiation as described by physics. But the direct realist does not deny that the sunset is radiation; the experience has a hierarchical structure, and the radiation is part of what amounts to the direct experience.\nSimon Blackburn has argued that whatever positions they may take in books, articles or lectures, naive realism is the view of \"philosophers when they are off-duty.\"\nFor a history of direct realist theories, see Direct and indirect realism § History.Many philosophers claim that it is incompatible to accept naïve realism in the philosophy of perception and scientific realism in the philosophy of science. Scientific realism states that the universe contains just those properties that feature in a scientific description of it, which would mean that secondary qualities like color are not real per se, and that all that exists are certain wavelengths which are reflected by physical objects because of their microscopic surface texture.John Locke notably held that the world only contains the primary qualities that feature in a corpuscularian scientific account of the world, and that secondary qualities are in some sense subjective and depend for their existence upon the presence of some perceiver who can observe the objects.\nNaïve realism in philosophy has also inspired work on visual perception in psychology. The leading direct realist theorist in psychology was J. J. Gibson. Other psychologists were heavily influenced by this approach, including William Mace, Claire Michaels, Edward S. Reed, Robert Shaw, and Michael Turvey. More recently, Carol Fowler has promoted a direct realist approach to speech perception.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_4" +} \ No newline at end of file diff --git a/test/Philosophy/Philosophy.json b/test/Philosophy/Philosophy.json new file mode 100644 index 0000000000000000000000000000000000000000..c4ca111fe3df50188dd25b090bc92da4cd29ef59 --- /dev/null +++ b/test/Philosophy/Philosophy.json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "Philosophy ('love of wisdom' in Ancient Greek) is a systematic study of general and fundamental questions concerning topics like existence, reason, knowledge, value, mind, and language. It is a rational and critical inquiry that reflects on its own methods and assumptions.\nHistorically, many of the individual sciences, such as physics and psychology, formed part of philosophy. However, they are considered separate academic disciplines in the modern sense of the term. Influential traditions in the history of philosophy include Western, Arabic:Persian, Indian, and Chinese philosophy. Western philosophy originated in Ancient Greece and covers a wide area of philosophical subfields. A central topic in Arabic:Persian philosophy is the relation between reason and revelation. Indian philosophy combines the spiritual problem of how to reach enlightenment with the exploration of the nature of reality and the ways of arriving at knowledge. Chinese philosophy focuses principally on practical issues in relation to right social conduct, government, and self-cultivation.\nMajor branches of philosophy are epistemology, ethics, logic, and metaphysics. Epistemology studies what knowledge is and how to acquire it. Ethics investigates moral principles and what constitutes right conduct. Logic is the study of correct reasoning and explores how good arguments can be distinguished from bad ones. Metaphysics examines the most general features of reality, existence, objects, and properties. Other subfields are aesthetics, philosophy of language, philosophy of mind, philosophy of religion, philosophy of science, philosophy of mathematics, philosophy of history, and political philosophy. Within each branch, there are competing schools of philosophy that promote different principles, theories, or methods.\nPhilosophers use a great variety of methods to arrive at philosophical knowledge. They include conceptual analysis, reliance on common sense and intuitions, use of thought experiments, analysis of ordinary language, description of experience, and critical questioning. Philosophy is related to many other fields, including the sciences, mathematics, business, law, and journalism. It provides an interdisciplinary perspective and studies the scope and fundamental concepts of these fields. It also investigates their methods and ethical implications.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_5" +} \ No newline at end of file diff --git a/test/Philosophy/Virtuality_(philosophy).json b/test/Philosophy/Virtuality_(philosophy).json new file mode 100644 index 0000000000000000000000000000000000000000..6197adcde96aec0f48d2037b1e957b600480f20c --- /dev/null +++ b/test/Philosophy/Virtuality_(philosophy).json @@ -0,0 +1,52 @@ +{ + "domain": "Philosophy", + "document": "Virtuality is a concept with a long history in philosophy, its most notable recent version being that developed by French thinker Gilles Deleuze.\nDeleuze used the term virtual to refer to an aspect of reality that is ideal, but nonetheless real. An example of this is the meaning, or sense, of a proposition that is not a material aspect of that proposition (whether written or spoken) but is nonetheless an attribute of that proposition. In Bergsonism, Deleuze writes that \"virtual\" is not opposed to \"real\" but opposed to \"actual\", whereas \"real\" is opposed to \"possible\". Deleuze identifies the virtual, considered as a continuous multiplicity, with Bergson's \"duration\": \"it is the virtual insofar as it is actualized, in the course of being actualized, it is inseparable from the movement of its actualization.\"Deleuze argues that Henri Bergson developed \"the notion of the virtual to its highest degree\" and that he based his entire philosophy on it. Both Henri Bergson, and Deleuze himself build their conception of the virtual in reference to a quotation in which writer Marcel Proust defines a virtuality, memory as \"real but not actual, ideal but not abstract\".\nAnother core meaning has been elicited by Denis Berthier, in his 2004 book Méditations sur le réel et le virtuel (\"Meditations on the real and the virtual\"), based on uses in science (virtual image), technology (virtual world), and etymology (derivation from virtue—Latin virtus). At the same ontological level as \"the possible\" (i.e. ideally-possible) abstractions, representations, or imagined \"fictions\", the actually-real \"material\", or the actually-possible \"probable\", the \"virtual\" is \"ideal-real\". It is what is not real, but displays the full qualities of the real—in a plainly actual (i.e., not potential)—way. The prototypical case is a reflection in a mirror: it is already there, whether or not one can see it; it is not waiting for any kind of actualization. This definition allows one to understand that real effects may be issued from a virtual object, so that our perception of it and our whole relation to it, are fully real, even if it is not. This explains how virtual reality can be used to cure phobias.Brian Massumi shows the political implications of this. According to Massumi in Parables for the Virtual, the virtual is something \"inaccessible to the senses\" and can be felt in its effects. His definition goes on to explain virtuality through the use of a topological figure, in which stills of all of the steps in its transformation superposed would create a virtual image. Its virtuality lies in its inability to be seen or properly diagramed, yet can be figured in the imagination.\nHowever, note that the writers above all use terms such as \"possible\", \"potential\" and \"real\" in different ways and relate the virtual to these other terms differently. Deleuze regards the opposite of the virtual as the actual. Rob Shields argues that the opposite of the virtual is the material for there are other actualities such as a probability (e.g., \"risks\" are actual dangers that have not yet materialized but there is a \"probability\" that they will). Among Deleuzians, Alexander Bard & Jan Söderqvist even argue (in agreement with Quentin Meillassoux) in Process and Event that virtuality must be separated from potentiality, and consequently suggest the potential of the current as the link between the virtual of the future and the actual of the past.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "Creator", + "CitesWork", + "InfluencedBy", + "Location", + "PresentedIn", + "PositionHeld", + "Uses", + "OfficeHeldByHeadOfGovernment", + "Affiliation", + "InspiredBy", + "NominatedBy", + "HasWrittenFor", + "Promoted", + "EducatedAt", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Philosophy_6" +} \ No newline at end of file diff --git a/test/Politics/Favorite_son.json b/test/Politics/Favorite_son.json new file mode 100644 index 0000000000000000000000000000000000000000..dcd3059fa67aa33913dccd5ae6801851a6be5145 --- /dev/null +++ b/test/Politics/Favorite_son.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "Favorite son (or favorite daughter) is a political term.\nAt the quadrennial American national political party conventions, a state delegation sometimes nominates a presidential candidate from the state, or less often from the state's region, who is not a viable candidate in the view of other delegations, and votes for this candidate in the initial ballot. The technique allows state leaders to negotiate with leading candidates in exchange for the delegation's support in subsequent ballots.\nSerious candidates usually, but not always, avoided campaigning in favorite sons' states. If a party's leader in a state, usually the governor, was unsure of whom to support, as the favorite son the state party could avoid disputes. Conversely, a party leader who has chosen a candidate might become a favorite son to keep other candidates' campaigns out of the state, or prevent a rival local politician from becoming a favorite son. The favorite son may explicitly state that the candidacy is not viable, or that the favorite son is not a candidate at all. The favorite son may hope to receive the vice-presidential nomination, Cabinet post or other job, increase support for the favorite son's region or policies, or just the publicity from being nominated at the convention.\nThe technique was widely used in the 19th and early 20th centuries. Since nationwide campaigns by candidates and binding primary elections have replaced brokered conventions, the technique has fallen out of use, as party rule changes in the early 1970s required candidates to have nominations from more than one state.\nA politician whose electoral appeal derives from their native state, rather than their political views is called a \"favorite son\". For example, in the United States, a presidential candidate will usually win the support of their home state(s). A particularly notable instance of this occurred in 1984, when challenger Walter Mondale lost 49 of 50 states against popular incumbent Ronald Reagan, winning only his home state of Minnesota.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_0" +} \ No newline at end of file diff --git a/test/Politics/Golden_age_of_Jewish_culture_in_Spain.json b/test/Politics/Golden_age_of_Jewish_culture_in_Spain.json new file mode 100644 index 0000000000000000000000000000000000000000..32d588a9a3ae95b8b5bdfde903879f1bc14641f0 --- /dev/null +++ b/test/Politics/Golden_age_of_Jewish_culture_in_Spain.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "The golden age of Jewish culture in Spain was a Muslim ruled era of Spain, with the state name of Al-Andalus, lasting 800 years, whose state lasted from 711 to 1492 A.D. This coincides with the Islamic Golden Age within Muslim ruled territories, while Christian Europe experienced the Middle Ages.\nUnder Muslim rule, Jews were labeled as \"protected people\" — \"dhimmi\" which afforded them religious freedom and protection, exclusion from military service, offered many but not all rights. The coexistence in Muslim society allowed Jewish religious, cultural, and economic life to flourish into a parallel Golden Age.\nThe nature and length of this \"Golden Age\" has been debated, as there were at least three periods during which non-Muslims were oppressed. A few scholars give the start of the Golden Age as 711:718, the Muslim conquest of Iberia. Others date it from 912, during the rule of Abd al-Rahman III. The end of the age is variously given as 1031, when the Caliphate of Córdoba ended; 1066, the date of the Granada massacre; 1090, when the Almoravids invaded; or the mid-12th century, when the Almohads invaded.\nHaving invaded southern Spain and coming to rule in a matter of seven years, Islamic rulers were confronted with many questions relating to the implementation of Islamic rule of a non-Islamic society. The coexistence of Muslims, Jews, and Christians during this time is revered by many writers. Al-Andalus was a key center of Jewish life during the early Middle Ages.María Rosa Menocal, a specialist in Iberian literature at Yale University, claims that \"tolerance was an inherent aspect of Andalusian society\". Menocal's 2003 book, The Ornament of the World, argues that the Jewish dhimmis living under the Caliphate were allowed fewer rights than Muslims but were still better off than in the Christian parts of Europe. Jews from other parts of Europe made their way to al-Andalus, where in parallel to Christian sects regarded as heretical by Catholic Europe, they were not just tolerated, but where opportunities to practise faith and trades were open without restriction save for the prohibitions on proselytisation and, sometimes, on synagogue construction.\nBernard Lewis takes issue with this view, calling it ahistorical and exaggerated. He argues that Islam traditionally did not offer equality or even pretend that it did and argues that it would have been both a \"theological as well as a logical absurdity.\" However, he also states:\nGenerally, the Jewish people were allowed to practice their religion and live according to the laws and scriptures of their community. Furthermore, the restrictions to which they were subject were social and symbolic rather than tangible and practical in character. That is to say, these regulations served to define the relationship between the two communities, and not to oppress the Jewish population.\nMark R. Cohen, Professor of Near Eastern Studies at Princeton University, in his Under Crescent and Cross, calls the idealized interfaith utopia a \"myth\" that was first promulgated by Jewish historians such as Heinrich Graetz in the 19th century as a rebuke to Christian countries for their treatment of Jews. This myth was met with the \"counter-myth\" of the \"neo-lachrymose conception of Jewish-Arab history\" by Bat Ye'or and others, which also \"cannot be maintained in the light of historical reality\".\nPrior to 589, the Jewish population of Spain was tolerated by its Arian Visigoth rulers and placed on equal footing with the other ethnic and religious communities of the region. The Arians may have preferred the Jewish population to the Catholic one, as they did not fear political enmity from the Jews. The Visigoths were mainly indifferent towards Jews and allowed them to grow and prosper. After the Visigoths joined the Catholic Church, they placed ever greater economic burdens on the Jewish population, and later persecuted them severely. It is possible that Jews welcomed the Muslim Arab and mainly-Berber conquerors in the 8th century.A period of tolerance dawned for the Jews of the Iberian Peninsula. Their number was considerably augmented by immigration from North Africa in the wake of the Muslim conquest. Immigrants from North Africa and the Middle East bolstered the Jewish population and made Muslim Spain probably the largest centre of contemporary Jews. Especially after 912, during the reign of Abd al-Rahman III and his son, Al-Hakam II, the Jews prospered culturally, and some notable figures held high posts in the Caliphate of Córdoba. Jewish philosophers, mathematicians, astronomers, poets and rabbinical scholars composed highly-rich cultural and scientific work. Many devoted themselves to the study of the sciences and philosophy, composing many of the most valuable texts of Jewish philosophy. Jews took part in the overall prosperity of Muslim Al-Andalus. Jewish economic expansion was unparallelled. In Toledo, after the Christian reconquest in 1085, Jews were involved in translating Arabic texts to the romance languages in the so-called Toledo School of Translators, as they had been previously in translating Greek and Hebrew texts to Arabic. Jews also contributed to botany, geography, medicine, mathematics, poetry and philosophy.\n'Abd al-Rahman's court physician and minister was Hasdai ibn Shaprut, the patron of Menahem ben Saruq, Dunash ben Labrat and other Jewish scholars and poets. In following centuries, Jewish thought flourished under famous figures such as Samuel Ha-Nagid, Moses ibn Ezra, Solomon ibn Gabirol and Judah Halevi. During 'Abd al-Rahman's term of power, the scholar Moses ben Hanoch was appointed rabbi of Córdoba, and as a consequence al-Andalus became the center of Talmudic study, and Córdoba the meeting-place of Jewish savants.\nIt was a time of partial Jewish autonomy. As \"dhimmis\", \"protected non-Muslims\", Jews in the Islamic world paid the jizya, which was administered separately from the zakat paid by Muslims. The jizya has been viewed variously as a head tax, as payment for non-conscription in the military (as non-Muslims were normally prohibited from bearing arms or receiving martial training) or as a tribute. Jews had their own legal system and social services. Monotheist religions of the People of the Book were tolerated but conspicuous displays of faith, such as bells and processions, were discouraged.\nComparing the treatment of Jews in the medieval Islamic world and medieval Christian Europe, the Jews were far more integrated in the political and economic life of Islamic society, and usually faced far less violence from Muslims, but there were some instances of persecution in the Islamic world as well from the 11th century. The Islamic world classified Jews and Christians as dhimmis and allowed Jews to practice their religion more freely than they could in Christian Europe.\nOther authors criticize the modern notion of Al-Andalus being a tolerant society of equal opportunities for all religious groups as a \"myth\". Jews were living in an uneasy coexistence with Muslims and Catholics, and the relationship between the groups was more often than not marked by segregation and mutual hostility. In the 1066 Granada massacre of much of the Jewish population of the city, the Jewish death toll was higher than in the much-publicized Christian pogroms in the Rhineland slightly later. The notable Jewish philosopher Moses Maimonides (1135:1204) was forced to flee from Al-Andalus to avoid conversion by the Almohads. In Letter to Yemen, Maimonides wrote:\nDear brothers, because of our many sins Hashem has cast us among this nation, the Arabs, who are treating us badly. They pass laws designed to cause us distress and make us despised.... Never has there been a nation that hated, humiliated and loathed us as much as this one.\nWith the death of Al-Hakam II in 976, the caliphate began to dissolve, and the position of the Jews became more precarious under the various smaller kingdoms. The first major persecution was the 1066 Granada massacre, which occurred on 30 December in which a Muslim mob stormed the royal palace in Granada, crucified the Jewish Vizier Joseph ibn Naghrela and massacred many of the Jewish population of the city. According to one source, \"more than 1,500 Jewish families, numbering 4,000 persons, fell in one day\". It was the first persecution of Jews on the Peninsula under Islamic rule.Beginning in 1090, the situation deteriorated further with the invasion of the Almoravids, a puritan Muslim dynasty from Morocco. Even under the Almoravids, some Jews prospered although far more so under Ali III, than under his father, Yusuf ibn Tashfin. Among those who held the title of \"vizier\" or \"nasi\" in Almoravid times were the poet and physician Abu Ayyub Solomon ibn al-Mu'allam, Abraham ibn Meïr ibn Kamnial, Abu Isaac ibn Muhajar and Solomon ibn Farusal. The Almoravids were ousted from the peninsula in 1148, but the region was again invaded, this time by the even more puritanical Almohads.\nDuring the reign of the Berber dynasties, many Jewish and even Muslim scholars left the Muslim-controlled portion of Iberia for the city of Toledo, which had been reconquered in 1085 by Christian forces.\nThe major Jewish presence in Iberia continued until the Jews were forced to leave or to convert to Christianity in the Alhambra Decree of 1492 and a similar decree by Portugal in 1496.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_1" +} \ No newline at end of file diff --git a/test/Politics/Grapus.json b/test/Politics/Grapus.json new file mode 100644 index 0000000000000000000000000000000000000000..b5ca424aac41b6f4011c27dfcacf9630f7924235 --- /dev/null +++ b/test/Politics/Grapus.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "Grapus was a collective of graphic artists working together between 1970 and 1991 that sought to combine excellence in design with a social conscience.\nThe work of the Grapus design collective belonged to the public square; it represented a dialogue between governments and citizens, culture and politics, and in the final analysis, the message and the form. Its visual communication in the public square was bold and honest; it was aware of its presence and its impact, and at the same time, it was informed by the socio-cultural parameters of time in all its dimensions—past, present, and expected future—which provided a contest for experimentation and innovation. Throughout their history, Grapus remained communists and idealists and continued to be operated collectively: all work left the studio signed ‘Grapus,\" even when their studio numbers had grown to around 20, operating in three separate collectives.\nGrapus is a collective of French designers and they were founded after the student movements of Paris in May 1968. Grapus sought to 'change life' by the twine dynamics of graphic arts and political action. The collective scorned the commercial advertising, and adhering to its founders idealistic principles, tried to bring culture to politics, and politics to culture.The meaning behind Grapus's name was described by Bernard that it was functional-sounding, had vulgar overtones, and also had a \"whiff of history to it,\" referring to French revolutionary Gracchus Babeuf. Another interpretation for the creation of the name Grapus, is it was a play on the words crapules staliniennes (Stalinist scum), was both a gesture of political allegiance and a sardonic provocation to potential critics.\nThe group was founded in France in 1970 by Pierre Bernard, who had studied with the Polish poster designer Henryk Tomaszewski; François Miehe; and Gérard Paris-Clavel, who had met during the student movement of May 1968 and were influenced by the subversive ideas and practices of the Situationist International. Alex Jordan and Jean-Paul Bachollet joined the group in 1975. After Miehe’s departure in 1978, the core of the group found its equilibrium.\nThe group's members were all members of the Communist party, and the group maintained an explicit political, social and cultural engagement. They at first rejected assignments with commercial and government clients, instead working with experimental theatre groups, progressive town councils, the Communist Party itself, the Communist trade union CGT, educational causes, and social institutions. Even in later years, when the staff had grown to 20, operating in three distinct groups, they signed all of their work simply \"Grapus.\"\nGrapus wore its Marxist heritage proudly, remaining devoted to the plebeian immediacy of posters, leaflets and bumper stickers. Among its recurring elements of style are the use of handwritten text, the use of an extensive symbolic vocabulary (e.g. hand, foot, moon, sun), and the convergence of diverse techniques (e.g. drawing, painting, photography, text), a technique known as \"detournement, the rerouting of a message through acts of visual vandalism.\" Beginning in 1978, Grapus gained exposure in important exhibitions in Paris (Musée de l'Affiche), Amsterdam (Stedelijk Museum), Aspen, Colorado and Montréal (Musée d'art contemporain).\nIn 1990, after receiving the French \"Grand prix national des arts graphiques\", the collective faced a difficult ideological test when they had the opportunity to design the visual identity of the Louvre Museum. Bernard was in favour of taking the assignment, believing that design for cultural institutions could be a tool for social change. His partners wanted to design exclusively for social causes, found the Louvre to be elitist, and believed that taking the job would compromise their convictions. As a result, the collective decided to part ways in January 1991. Bernard, however, remains committed to a conception of design as a powerful tool for social commitment: \"The dissemination of public graphic design to the most socially and/or culturally deprived, is one of the means to achieve the desired aims of community and social justice.\"\n\"We are going to make images for you which will have real meaning. We are going to make true political images.\"Graphic activists, came from their understanding of meaning and how to manipulate it. \"We discovered semiology and it was very important to us,\" says Bernard. \"It allowed us to deconstruct images, so we could say to political commissioning bodies.\nThis was something that was absolutely essential to Grapus. The idea was to form a production group, an artistic collective, to create high-quality images for the political struggle of the French Communist Party. It was both a political and a graphic commitment.\nGrapus had a highly distinctive style. They provided inspiration to graphic design students all over the world through their idealistic principles. They often used bright colours, sensual forms, handwritten text, high-spirited visual pranks, and also very extensive symbolic vocabulary. The technique they used was known as detournement, which is the rerouting of a message through acts of visual vandalism.They were considered in France as the M/M's punk/grunge aesthetic. This aesthetic challenged the older graphic design establishment. In the early 2000, when bands like Air and Daft Punk emerged, \"the French music scene was completely dead.\" As a result, marketing music in France was enjoying a huge injection of finance. Since then, the so-called \"French Touch\" has helped young French graphic designers to emerge. Through their work as graphic designers and creative directors in the fields of art, fashion and music, \"Amzalag\" and Augustyniak have established M/M as a powerful force in contemporary French culture.\nTheir work focused heavily on posters. One important thing about these posters was that the subjects were new, at least for the French. They were theatrical posters, cinema posters dealing with poetry, sports. These subjects were not being addressed in France because, for the most part, poster-makers were working in advertising, more often than not for products.Grapus's clients also speak to the group's controversial work. Clients didn’t tend to stay with Grapus very long. That’s one of the reasons why Grapus had financial problems, Grapus attitude towards day-to-day life excited clients, but at the same time it makes clients take risks. Clients don’t like to take one risk after another.\n\"Even in the successful campaigns, our clients often had a feeling that they had been abused by us. They felt that we rather forced their hands, that we’d expressed ourselves in their place. At some point they agree to the means of expression we use : they claim it as their own since we do the work in their name. Nevertheless they felt a bit frustrated. Perhaps that’s because we didn’t behave like suppliers, slavishly following their instructions. Rather, we were like equal partners, working towards a common goal, which they had decided to share with us by offering us the job. They may have felt slightly dispossessed. We are very aware of it with the passage of time, when we’ve spoken to them again later, or when other people have spoken to them.\" : Pierre Bernard\nThe posters were a vital part of the struggle shared by students and workers, expressing its key ideas in the most direct public language available, inscribing the streets of Paris with these urgent messages, and attaining a level of visibility and impact on the consciousness of spectators, in some locations, normally achieved only by commercial advertising\nGrapus's split up was linked to a desire to continue the form of action which Grapus represented. In order to continue the Grapus mode of production, to begin a new form of adventure with new people. Their mode of production is one of conflict. \"We are in conflict with the clients, but there is also conflict between us. Everyone can talk about and work on everyone else’s project.\" That principle of creative conflict has been very difficult to maintain in the 80s. When the old-timers start arguing between themselves, the younger people just leave. It’s like a conflict between the bosses rather than a conflict between creative peers. For the younger members of Grapus to play their part completely, we need complete equality. Thus forming three new Grapus groups.The group's original members have maintained their principles in their work. Pierre Bernard, along with Dirk Behage and Fokke Draaijer, founded the Atelier de Création Graphique (ACG). They took the Louvre job and, among other works, designed the identity for the national parks of France, and signage for the Centre Pompidou. The ACG works in the areas of publishing, publicity and signage, as well as creating visual identity. Pierre Bernard has been a member of the Alliance Graphique Internationale since 1987, received the Erasmus Prize in 2006, and teaches graphic design in Paris at the École nationale supérieure des arts décoratifs (ENSAD).\nGérard Paris-Clavel joined with Vincent Perrottet to begin the studio les Graphistes Associés. Shortly thereafter, he left and formed the group Ne Pas Plier (\"do not bend\"), which broke with the traditional conception of a graphic studio by refusing \"corporate\" work, allying itself instead with sociologists, social workers, labourers, and other workers for public education.\nAlex Jordan founded the studio Nous Travaillons Ensemble (NTE: \"we work together\") with Ronit Meirovitz and Anette Lenz, with whom he had worked within Grapus. They intended to pursue a seamless continuation of the Grapus approach, without being constricted by a paralyzing ideology. Since its creation in 1986, NTE has worked in partnership with the photographers’ association le bar Floréal, and has also collaborated on numerous works with the multidisciplinary organisation la Forge.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_3" +} \ No newline at end of file diff --git a/test/Politics/Latino_vote.json b/test/Politics/Latino_vote.json new file mode 100644 index 0000000000000000000000000000000000000000..44a64b9aa8b64929341d1e189ce6a2293ddb4e55 --- /dev/null +++ b/test/Politics/Latino_vote.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "The Latino vote or refers to the voting trends during elections in the United States by eligible voters of Latino background. This phrase is usually mentioned by the media as a way to label voters of this ethnicity, and to opine that this demographic group could potentially tilt the outcome of an election, and how candidates have developed messaging strategies to this ethnic group.\nPer the Pew Research Center, the top states with the highest percentage of eligible Latino voters in 2020 were: New Mexico (42.8%), California (30.5%), Texas (30.4%), Arizona (23.6%), Florida (20.5%), Nevada (19.7%), Colorado (15.9%), New Jersey (15.3%), New York (14.8%), Connecticut (12.3%), Illinois (11.6%), and Rhode Island (11.3%).In 2006, the percentage of Latinos who participate in political activities varies, but rarely exceeds half of those eligible. In general, Latinos participate in common civic activities, such as voting, at much lower rates than nearby non-Latino whites or blacks. Approximately 57.9 percent of U.S. citizen adult Latinos were registered to vote at the time of the 2004 election, and 47.2 percent turned out to vote. The voter registration and turnout rates are approximately 10 percent lower than those of non-Latino blacks and 18 percent lower than those of non-Latino whites.To explain low voter turnout among Latinos, researchers have analyzed voter participation demographics throughout many years. Per a 2002 study, researchers have found many explanations as towards why Latinos have a low voter turnout. There are explanations that account for physical barriers such as lack of transportation. As well as systemic barriers such as, harassment, discrimination, inadequate numbers of polling booths, inconvenient placements of polling booths, and biased administration of election laws may suppress Latino access to registering and voting.\nOne of the biggest explanation for low Latino voter turn outs is associated with accurately measuring the Latino vote based on a general population that includes many non-citizens. The number of adult non-U.S. citizens rose from 1.9 million in 1976 to more than 8.4 million in 2000, a 350 percent increase. Thus, the share of Latino nonparticipants are overwhelmingly non-U.S. citizens.\nAnother explanation for low levels of Latino voter turnout stems from the relatively young age of the Latino population. For example, 40 percent of the California Latino population was under eighteen years of age in 1985.\nIndividuals with lower incomes vote at lower rates than people with higher incomes. In terms of income, the general argument is that individuals with higher socioeconomic status have the civic skills, the participatory attitudes, and the time and money to facilitate participation. Education is also positively related to participation and vote choice, as Latinos with a college degree and postgraduate training are more likely to vote. More than 30 percent of Latino adult citizens have less than a high school education, while 12 percent of non-Latino white adult citizens have less than a high school education. Therefore, low participation may result from low levels of knowledge about the political process that should be garnered through formal education.\nThis does vary based on country of origin. A 2003 study discussed how female Mexican-Americans and those attaining higher levels of income were more likely to register, and in turn, participate in voting. The same study concluded that education and marital status posed the primary barriers to Puerto Rican voter registration. These sorts of variations in factors seem to be present across many Latino communities in the United States. Additionally, studies have shown that the presence of Latino/a candidates on the ballot tends to yield a higher voter turnout among these communities. This is in part due to the strong association between cultural identification and partisanship. The ever-growing presence of Latino/a voters in politics is representative of the group's growing presence across the United States, making up over 30% of the population in swing or politically significant states such as Texas, Arizona, or California. It's also worth noting that large migrating populations, such as the increase of Cuban-Americans in Florida, have a strong impact for similar reasons. Community identification proves a strong factor in voter registration, particularly among working Latinas. Puerto Ricans in Southern states have similar turnout rates, presumably for similar reasons; that said, there does exist quite a bit of variation in numbers across states, in part due to the aforementioned factors.\nAmong other minority communities in the US, turnout seems to be increased by the presence of a member of their race on the ballot, black voter turnout rose significantly with Obama's two presidential campaigns and then fell back again in 2016.\nAlthough turn out for Latinos is low, it has been noted that Latinos residing in communities with a large Latino population are more likely to turn out to vote.\nThere is a significant amount of literature dedicated to analyzing what influences Latino vote choices. One strong determinant has been found to be religion, which is believed to play a role in defining the political attitudes and behaviors of Latino voters. Latinos have long been associated with Catholicism with respect to faith and religious identity and with the Democratic Party with regard to political allegiance and identity. Although most Latinos affiliate themselves with the Democratic Party, the Latino National Political Survey, has found a consistent finding that Latinos identify themselves ideologically as moderates and conservatives. Social conservatism usually originates from religion, which oftentimes predicts Latino's opposition to abortion, same-sex marriage, support for the death penalty, and support for traditional gender roles. Religion's ideological role is undeniable in its political influence in both parties. While shared collective identity that is often associated with a particular religion, political beliefs are often a result of community values, rather than solely religious. Notably, in 2006 and 2008, the Democratic party held an advantage in Latino/a voter turnout and results. During these election cycles, and still to a degree today, the Democratic party appeals to issues such as immigration and healthcare, while the Republican party tends to continue on social issues and religion-based appeal.Although the Latina vote, in particular, is sometimes seen as a product of social movements in many media outlets, some scholars in the social sciences argue that it is a movement in and of itself born out of historical left-wing advocacy. For example, LLEGÓ, the National Latina/o Lesbian, Gay, Bisexual, and Transgender Organization (1987:present) remains a leader in Latina activism in the United States. Organizations such as LLEGÓ have had historical impact over the political ideologies of its members, and has greatly influenced political participation over the years within these often overlooked communities. Considering the aforementioned important role played by ethnic and religious identity, these organizations cultivate a sense of collective political pride. In turn, voting turnout is often seen to increase with regards to historical and current members of LLEGÓ and other groups.\nPolitical ads have also been studied to determine how they influence Latino voting behavior. In a study conducted by Abrajano, it was concluded that different political ads influence Latino vote choices depending on how assimilated individuals are to American life. For Spanish dominated Latinos, political ads that tapped into ethnic identity seemed to be the most influential. On the other hand, for assimilated Latinos, ethnic appeals did have some influence but exposure to more informative policy ads in English or Spanish had a greater impact on these voters' decision to vote. During political movements in the 1960s and 1970s such as the women's liberation movement and the Chicano movement, Latina females began to unite around ideals similar to those embraced by feminist voter organizations including the Third World Women's Alliance and other Bay Area activist groups. According to a study performed using the November 2000 CPS, education appeared to hold the greatest influence over Latina voter registration and choice, among income, employment, and homeowner status. However, this study was conducted across the United States. Keeping this in mind, it is important to reconcile the issues important to singular communities with these overarching themes. For example, considering the growing Latino/a populations in Florida from Puerto Rico, factors of registration and choice will differ greatly between these groups and Latinos/as in other parts of the state.\nAfter the Marxist-Leninist socialist Fidel Castro overthrew the Cuban military leader Fulgencio Batista, he made significant changes throughout the island. Among these changes was the seizure of private property, businesses, and lands without any compensation.While Castro made improvements in healthcare, literacy rates, education, and public services in rural areas, he also repressed civil and political rights by shutting down the free press, jailing free thinkers and protesters, and imposing a one-party state.\nFrom 1959 to 1962, there was a large-scale exodus of Cuban people, known as the \"Golden Exile.\" This was the first wave of migration, primarily consisting of middle and upper-middle-class, well-educated white-collar workers whose belongings were seized. These experiences have had a lasting socio-psychological impact on Cuban immigrants, instilling a deep fear of socialism that is passed down to future generations. Therefore, when Republicans highlight anti-socialist messaging, it resonates with this group of people.\nIn the United States, the Latino vote is often associated with immigration issues such as immigration reform, immigration enforcement, and amnesty for undocumented immigrants. However, immigration could be an issue no more important than unemployment or the economy for many Latino American citizens.Data from both the 2002 and 1999 National Surveys on Latinos revealed that over 60% percent of Latinos favor a larger government with more government programs, even if this means higher taxes. A 1992 study indicated that government programs that Latinos are more likely to advocate for are those that focus on issues such as crime control and drug prevention, child care services, environmental protection, science and technology, defense, and programs for refugees and immigrants\nAccording to the National Exit Poll, in 2012 60% of Latino voters identified the economy as the most important issue the country was facing. Education is also a constant preoccupation among Latino voters. Latinos emphasize education, mentioning such issues as expanding the number of schools, reducing class sizes, and adding to the cultural sensitivity of teachers and curricula. Other educational concerns expressed by Latinos include ensuring that children are able to advance to the next educational level. Following the economy and education, health care (18%), the federal budget deficit (11%) and foreign policy (6%), were other concerns among the Latino population.\nLatino voters were a crucial part of President Joe Biden's electoral victory in the 2020 presidential election. He won 65% of the Latino vote, and Donald Trump won 32%, according to Edison Research exit polls. In the swing states of Arizona and Nevada, Latino voters made the difference for Joe Biden. Many Latino voters in Nevada are members of the Culinary Union Local 226 and supported Biden based on right-to-work standards.In heavily urbanized northeastern states and California, Biden secured overwhelming majorities among Latino voters, as has long been the case for Democratic presidential candidates.\nHowever, Latino voters proved that they were not monolithic. In Florida, Trump earned strong Latino support among Cuban and South American communities in Miami-Dade County and 46% of the overall Latino vote statewide, much higher than his 35% in 2016. This shift occurred due to the anti-socialist messaging of Trump's campaign. Still, it’s important to note that in every county outside of Miami-Dade County, Latinos opted to vote for Biden by a 2 to 1 margin. In the end, Biden won the majority of Florida’s Latino electorate.\nAdditionally, in heavily Latino South Texas, Biden lost ground compared to Hillary Clinton in 2016, especially in rural counties. However, he still carried the Latino vote in the Rio Grande Valley by double digits and 58% statewide.\nLatinos proved to be extremely helpful in Donald Trump’s victory in the 2024 presidential election. Nationwide, according to exit polling from CNN, he won 46% of the Latino vote, a 14-point shift from four years prior and the largest share since exit polling of Latinos began in 1976, surpassing George W. Bush's 44% record in 2004. He also won Latino men outright, with 54% of their vote. Much like when Latinos were considered to be crucial in delivering President Joe Biden the White House in 2020, Trump's improvement in several swing states was the difference in winning back several states he lost to Biden, such as Arizona, Nevada, Michigan, and Pennsylvania.This shift was most noticeable in Texas and Florida, where Trump widened his electoral margins from 2020. Miami-Dade County, home to the heavily Latino city of Miami, gave 55% of their vote to Trump, the first time this has occurred since 1988. Statewide, he won 58% of Latino voters. In South Texas, especially the Rio Grande Valley and other counties along the border, the vote shedding by Democrats that began four years prior became much more apparent, as Donald Trump flipped Hidalgo, Cameron, Webb, Duval, Starr, Culberson, Maverick, and Willacy County. Each of these counties are vastly majority Latino, some having not voted for a Republican presidential candidate for nearly a century. For example, Webb County last voted for a Republican for President in 1912, while Maverick and Starr County had not voted for a Republican since 1896 and 1904, respectively. Statewide, Trump received 55% of Texas' Latino vote.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_2" +} \ No newline at end of file diff --git a/test/Politics/Peruvian_Public_Ministry_controversy.json b/test/Politics/Peruvian_Public_Ministry_controversy.json new file mode 100644 index 0000000000000000000000000000000000000000..ea9a883e9a4f02c3478b2c64a4a88176ec29894c --- /dev/null +++ b/test/Politics/Peruvian_Public_Ministry_controversy.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "An investigation surrounding the Public Ministry of Peru, known as Operation Valkyrie V (Spanish: Operación Valquiria V) resulted with a controversy surrounding the Attorney General of Peru, Patricia Benavides, who was alleged to head a criminal organization. The scandal revolved around alleged irregularities with the decisions of electing the Ombudsman of Peru Josué Gutiérrez Cóndor, dismissing former attorney general Zoraida Ávalos and attempts to remove the members of the National Board of Justice (JNJ), all in reported attempts for Benavides to main control of the Public Ministry by nominating allies in judicial positions. \nMessages discovered during investigations reportedly showed Benavides collaboration with members of the Congress of Peru from Advance Country, Popular Force and We Are Peru, that thirty-seven congressmen collaborated with her and that Benavides protected certain legislators from investigations. Further testimony from Benavides' aide Jaime Villanueva to investigators said that Popular Force leader Keiko Fujimori and President of Congress Alejandro Soto Reyes supported Benavides with dissolving the JNJ while Fujimori ally Martha Moyano called for the removal of two investigators involved in the Lava Jato case.\nPeruvian attorney general Patricia Benavides' sister, judge Emma Benavides Vargas, was investigated for alleged connections to a criminal organization and reportedly releasing a pair of drug traffickers in exchange for money. Benavides fired Bersabeth Revilla, the prosecutor tasked with investigating her sister in July 2022. On 3 August 2022, Benavides denied using her position to protect her sister.The National Board of Justice (JNJ) opened preliminary investigations of Benavides firing Revilla and her educational background in early 2023. Fujimorist lawmakers defended Benavides from being investigated by the National Board of Justice (JNJ). In March 2023, it was reported that during investigations of Benavides, she was heard in phone call audio with Antonio Camayo, a businessman involved in the Cuellos Blancos scandal and that she was allegedly attempting to obstruct investigations into audio recordings of herself and of her sister Emma. It was reported that Emma had nearly a dozen phone calls with Edwin Oviedo, the former head of the Peruvian Football Federation who was implicated as one of the main funders in the Cuellos Blancos scandal.\nIn mid-August 2023, Benavides filed a lawsuit to the Constitutional Court of Peru to demand an end to investigations. By late-August 2023, IDL-Reporteros wrote that Inés Tello, a member of the JNJ who was tasked with investigating Benavides, established in her preliminary report that Benavides had removed Revilla from her position in order to protect her sister Emma from charges and that she also made unexplained changes to the investigatory team of the Cuellos Blancos scandal. Tello then reportedly recommend disciplinary procedures against Benavides.On 29 August 2023, the Constitutional Court would order the suspension of investigations against Benavides by the JNJ. Following this, Congress would attempt to remove Tello from her position on the JNJ in early September 2023, approving an expedited investigation against the JNJ. The move by Congress was condemned by some Peruvian media outlets and international NGOs; newspaper La República and a letter signed by NGOs including the Center for Justice and International Law (CEJIL), Due Process of Law Foundation, Fundación Construir, Fundación para la Justicia y el Estado Democrático de Derecho (FJEDD), Human Rights Watch, the International Commission of Jurists, Observatorio Derechos y Justicia (ODJ), Robert F. Kennedy Human Rights and the Washington Office on Latin America described the actions as a \"parliamentary coup\". The letter signed by the NGOs also called for the application of the Inter-American Democratic Charter. The Inter-American Commission on Human Rights, the Inter-American Court of Human Rights and the United Nations office in Peru would express concern about Congress’ actions against the JNJ and call for maintaining a balance of powers. On 16 September, thousands marched in Lima protesting against the actions of Congress and sharing support for the JNJ.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_4" +} \ No newline at end of file diff --git a/test/Politics/Policy_learning.json b/test/Politics/Policy_learning.json new file mode 100644 index 0000000000000000000000000000000000000000..b75e9eeebda179829d97a462a362d186b8ed39b7 --- /dev/null +++ b/test/Politics/Policy_learning.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "Policy learning is the increased understanding that occurs when policymakers compare one set of policy problems to others within their own or in other jurisdictions. It can aid in understanding why a policy was implemented, the policy's effects, and how the policy could apply to the policymakers' jurisdiction. Before a policy is adopted it goes through a process that involves various combinations of elected official(s), political parties, civil servants, advocacy groups, policy experts or consultants, corporations, think tanks, and multiple levels of government. Policy can be challenged in various ways, including questioning its legality. Ideally, policymakers develop complete knowledge about the policy; the policy should achieve its intent and efficiently use resources.\nPolicy learning through globalization has helped government organizations become more competitive. Policymakers have easy access to global policy knowledge through the internet, access to think tanks, international institutions such as the United Nations, International Monetary Fund (IMF) or the World Bank and individual experts.\nIn the 1960s academics started to study how policymakers learn about policies. During that time countries were experiencing social, political, economic and technological change. Researchers discovered that governments in different countries faced similar problems in policies and programs amidst uncertainty on how to handle problems in financing its welfare programs. Policymakers start to learn about policy through facts, first-hand experiences or from the experiences of others.Policy instruments and policy implementation are the steps to policy learning. Policymakers review policy objectives, tools and implementation strategies. When implementations fail, reviews look for the cause(s). Adjustments in objectives, tools and implementation are considered.\nInstrumental policy learning is the acquisition of knowledge about the effectiveness of various policy instruments and implementations. Policymakers must make choices about the appropriate policy intervention tool(s) to use. The intent is to discover the most effective tool(s) that consume the least resources.Policymakers can employ seven major policy instrument types.\nDirect provision:services that governments provide directly, such as publicly operated schools\nSubsidies:cash infusions given by government to reduce the cost for the producer or consumer, such as dairy farmers who receive subsidies to keep consumer costs low.\nTaxation:collection of money from individuals and/or businesses, such as a value-added tax.\nContract:an agreement between a government and a private entity to provide goods or services.\nAuthority:government action implementing legislation with accompanying enforcement.\nRegulation:government action driven by administrative action rather than legislation, governing domains such as the environment and public health. (Some private groups regulate themselves independent of the government.)\nExhortation:encouragement without coercion, such as campaigns against littering or encouraging fire prevention.\nAfter choosing a policy instrument, the details for employing the instrument must be arranged. Implementation carries risks of failing in various ways, such as ineffectiveness, unacceptable delays and excessive costs. Practices that improve success rates include setting reasonable expectations, allowing adequate time and sufficient resources, having clear communication and understanding policy objectives, minimizing the number of approvals, simplifying management structures and aligning all relevant groups around the implementation, along with mechanisms to adapt the implementation in accord with subsequent experience to correct problems and take advantage of new opportunities.\nThe top-down approach involves allowing high-level policymakers set objectives and define implementation strategies. Lower level implementers carry out the policy. Objectives must be clearly defined and the implementation tools must be selected based on the implementation strategy. Policy designers need to assess the commitment of policy implementers who could be teachers, police officers, social workers or private sector workers.One example of the top-down approach was in 1973 when the US Congress passed a policy limiting the driving speed to 55 mph on America’s freeways under the National Maximum Speed Law. The policy objective was to reduce gasoline consumption. In addition to increased travel times, a side effect was the reduction of freeway fatalities.\nThe bottom-up approach helps policymakers to evaluate whether policy goals are open to more than one interpretation. Does the policy implement a statute, or reflect rules, practices and/or norms such as energy policy or criminal procedure? Are the policy goals internally consistent? How will the policy affect the activities of workers who directly provide services? Bottom-up approaches require policymakers to involve both service providers and service recipients in refining goals, strategies and activities. This bottom-up approach starts from consumer-facing bureaucrats and moves up to the top policymakers. Should the policy face pushback, policymakers must be open to negotiations for a compromise approach. The bottom-up approach emphasizes low level policy implementers, but policy learners must not attempt to frustrate the goals of top policymakers.In America, the No Child Left Behind Act (NCLB) adopted policies that would have benefited from bottom-up perspectives. When NCLB was passed, many states struggled to figure out what was required. All states had to get their education plans approved by U.S. Department of Education. Once the education plan was approved, each state had to incorporate NCLB into the state's framework of educational governance and to use the legislation to achieve the state's own goals. If the U.S. federal government had consulted with each state about its education policies, performances, and future goals, teachers and the government would have had a better understanding on what policy objectives were achievable.\nPolicy learning has not been embraced in some countries. Some countries that were once colonized fear that embracing policies recommended by outsiders will allow other countries to exploit their resources. Rockefeller (1966) claimed that in Latin America in the early 1960s free-market policies were in competition with communist propaganda in Latin American countries. At the time American business were claimed to be exploiting the people and their resources. However, companies such as Chase Manhattan Bank launched a program in Panama to improve cattle raising by training ranchers to follow the scientific advances of seeding, feeding and breeding cattle more effectively. This process improved the quality of beef, which encouraged higher meat consumption, improved dietary standards and made Panama a beef exporter.European countries created the Euro to simplify trading between European Union countries. Adopting the Euro would remove currency risk and the cost of currency conversion, and provide a common monetary policy among members. Policy learning took places as more European countries learned that joining the Eurozone would give them access to other markets. Citizens of EU member countries could travel to other EU countries within the Schengen area without transiting a border checkpoint. The learning did not reach all policy sectors. Some EU countries kept their budgets in near balance amid strong growth and employment, while others' budgets were so far out of balance that their overall debt created fears about their ability to make their payments.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_5" +} \ No newline at end of file diff --git a/test/Politics/Political_consulting.json b/test/Politics/Political_consulting.json new file mode 100644 index 0000000000000000000000000000000000000000..1194baa9cbee392466391dec77e1a67aac51c005 --- /dev/null +++ b/test/Politics/Political_consulting.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "Political consulting is a form of consulting that consists primarily of advising and assisting political campaigns. Although the most important role of political consultants is arguably the development and production of mass media (largely television, direct mail, and digital advertising), consultants advise campaigns on many other activities, ranging from opposition research and voter polling, to field strategy and get out the vote efforts.\nPresident William McKinley's closest political adviser Mark Hanna is sometimes described as the first political consultant. Whitaker and Baxter established the first true political consulting firm, Campaigns, Inc., which focused exclusively on political campaigns in California in the 1930s:1950s. However, political consulting blossomed with the increasing use of television advertising for campaign communications in the 1960s.Joseph Napolitan was the first person to describe himself as a political consultant; The New York Times described him in a 1968 profile as \"that newest American phenomenon, the professional campaign manager\" and a \"pioneering campaign consultant\". In recent years, political consulting has become more commonplace throughout the world and has extended its reach to campaigns at all levels of government. Many consultants work not only for campaigns, but also for parties and political action committees, while some focus on public relations and research work. Many consultants also take up official positions inside governments while working for an officeholder of the ruling party.\nPolitical consultants sometimes act as political strategists, a senior political consultant who promote the election of certain candidates or the interests of certain groups. This is achieved by planning campaign strategies, coordinating campaign staffers, and arranging events to publicize candidates or causes.Political consultants act as public relations specialists, salespeople and managers. By using many forms of marketing-suitable media, including advertising and press releases, the general goal of political consultants is to make voters aware of their candidates' party platform.\nAs political consulting has expanded worldwide, journalists have noted the influence of political consulting on candidates, voters, presidents and governments of different nations. Well-known American political consultants such as James Carville, Joseph Napolitan and David H. Sayers, have traveled to other continents, acting as consultants on several political campaigns and advising heads of state. For example, Napolitan acted as a consultant of French President Valéry Giscard d'Estaing, several Venezuelan presidents, and Costa Rica's Óscar Arias Sánchez, and Dick Morris \"has consulted for candidates in other countries of the western hemisphere, including the campaigns of Fernando de la Rua for President of Argentina, Jorge Batlle for President of Uruguay, Vicente Fox for President of Mexico, and Raphael Trotman for President of Guyana.\" Many Latin American political consultants have also led political campaigns outside of their native countries. One such example is Brazilian political consultant João Santana, who simultaneously led three winning presidential campaigns in Latin America: Danilo Medina, in the Dominican Republic; Hugo Chávez, in Venezuela; and José Eduardo dos Santos, in Angola, in the African continent. Venezuelan political strategist JJ Rendon (who lives in United States), has also been recognized internationally, having been ranked as one of the top five most prominent Latin American consultants by the U.S.-based publication Campaigns & Elections (Latin American edition) and who was the 2014 winner of The Victory Awards for his work as the lead strategist of successful presidential campaigns of Juan Manuel Santos in Colombia (including his reelection campaign in 2014), Porfirio Lobo and Juan Orlando Hernández in Honduras and Enrique Peña Nieto in Mexico, among others. João Santana has been described by the news magazine Veja as \"capable of mapping out the weaknesses of adversaries with an acupuncturist's precision.\" Rendon has been described by Miami New Times as the \"Latin America's Karl Rove\". \nNotable political consultants are: David Plouffe, Steve Bannon, Kellyanne Conway, Lynton Crosby, Joel Benenson, Brad Parscale, Michael Spreng (Angela Merkel), Dominic Cummings, Anne Méaux, Michel von Tell, Alastair Campbell, Paul Manafort, Ivan Redondo, Michel Barnier, Philipp Maderthaner, Prashant Kishor.\nAs political consulting has become more prevalent, consultants have become subject to increasing scrutiny and involvement in scandals as journalists have devoted considerable attention to their activities. Some successful political consultants, such as James Carville and Newt Gingrich, capitalize on their consulting fame to become professional pundits. Such political consultants routinely appear on television news programs, write books and are treated as social media celebrities.Some detractors accuse political consultants of putting their own interests and images ahead of their clients. Some consultants allege that too many consultants put their own financial interests ahead of the campaigns they are hired to serve, take on too many clients, or focus too much energy on building their own reputations.In 2007, the Washington Post noted that Democratic presidential candidate John Edwards employed Harrison Hickman, a principal at Global Strategy Group, as his campaign pollster. The article described this hire as evidence of the \"pitfalls of hiring consultants who conduct work for corporate clients and campaigns at the same time\", noting that:\"...Edwards's own pollster, Harrison Hickman, is a principal at Global Strategy Group, which represents a range of corporate clients -- including oil and pharmaceutical companies -- that don't always mesh with the candidate's message.\"\nCritics of the political consulting industry blame consultants for what they see as problems in the American election system.Consultant salaries have risen, which has increased the cost of political campaigns.\nCritics of consulting's influence on politics say that changes to the campaign landscape have further entrenched certain consultants, regardless of their track records\".\nPolitical consultants may be opposed to low-budget campaigns of grassroots candidates.\nActivist groups charge that political consultants are a major obstacle to participatory democracy and election reform.\nSocial media has dramatically changed the way in which modern political campaigns are run. With younger and more tech-savvy citizens entering into the voting population, social media are the platforms on which the politicians need to establish themselves and engage with the public. In years to come, social media is anticipated to overtake traditional media in terms of importance to political campaigns. For example, in Australia 86% of Australians access the Internet, and with a 17,048,864 voting age population (according to IDEA), around 14,662,023 voting population has access to Internet, and 65% of them use social media, which means 9,530,314 Australian voters use social media (The 2013 Yellow™ Social Media Report found that among internet users 65% of Australians use social media, up from 62% last year).\nThe implication of this for political consulting is that social media are the channels through which an increasingly larger portion of the population receives political messages. As a consequence, unless a political consultant addresses the part of the electorate which can preferentially be reached through social media, the portion of the electorate which will be reached through traditional communication technologies will increasingly shrink in the future. For instance, social media is already the main source of information for 26% of young voters in Spain.\nThe American Association of Political Consultants is the major trade association for political consultants in the United States, with thousands of members. Like other professional organizations, it propagates a code of ethics and gives out awards. Similar organizations for political consultants exist for many other countries and regions.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_6" +} \ No newline at end of file diff --git a/test/Politics/Politics_of_outer_space.json b/test/Politics/Politics_of_outer_space.json new file mode 100644 index 0000000000000000000000000000000000000000..40391ec4ff21e6a383777b50259a2d4b4ec09802 --- /dev/null +++ b/test/Politics/Politics_of_outer_space.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "The politics of outer space includes space treaties, law in space, international cooperation and conflict in space exploration, international economics, and the hypothetical political impact of any contact with extraterrestrial intelligence.\nAstropolitics has its foundations in geopolitics and is a theory that is used for space in its broadest sense.\nInternational cooperation on space projects has resulted in the creation of new national space agencies. By 2005, there were 35 national civilian space agencies.\nThe Artemis Accords build on a number of treaties that affect the conduct of states and their commercial industries in the exploration and use of space, including the 1967 Outer Space Treaty, the 1972 Liability Convention, and the 1975 Registration Convention. NASA has stated that in leading the Artemis program, international partnerships will prepare for a historic human mission to Mars while playing a key role in achieving a sustainable and robust presence on the Moon. The core of the Artemis agreement requires that all activities be conducted for peaceful purposes, consistent with the principles of the Outer Space Treaty. International cooperation under the Artemis Agreement aims not only to promote space exploration, but also to strengthen peaceful relations between nations.US Air Force judge advocate Matthew King, writing in a personal capacity, has looked at the major powers' cooperation in space matters in the light of international geo-political relationships on earth. He holds that joint engagement in space matters, especially for the United States, China and Russia, can be viewed via two alternative lenses: it can facilitate peace and understanding (a lens he refers to as an olive branch) or it can hide true relationships (the lens of a fig leaf).In recent years, the advancement in technology and engineering have made mining asteroid more plausible. The global space mining market is estimated to be worth $14.71 billion by 2025, as indicated by market research. Although the industry could be years away from successfully mining asteroids, this renewed interest in asteroid mining for metal extraction has the potential to influence the global market of rare metal and create a new geopolitical order.Outer space has been a ground for geopolitical competition since the Cold War, and the expected growth in asteroid mining could bring about a new geopolitical order organized around resources extraction. Access to rare metals from asteroids could position nation-states and their private sectors competitively. Countries with technological capacity to explore space and finance a new and costly asteroid mining endeavour are better positioned to dominate the global supply chain for such metals, while a handful of countries will lag behind. This threatens to drive a resource race in outer space and could create similar patterns of conflict around resources extraction to what has been experienced on earth.\nThe expansion of resource extraction in outer space will require the development of a legal regulatory framework that adequately governs asteroid mining activities. The two current treaties that govern activities in outer space are the Outer Space Treaty and the Moon Treaty. Ratified by 98 countries in 1976, the Outer Space Treaty prevents sovereign or private ownership of outer space and its resources, asserting it belongs to all mankind but does not prevent exploitation of its resources. Ratified in 1979, the Moon Treaty clears some of the vague language surrounding the heritage for humankind outline in the Outer Space Treaty. Similar to the Outer Space Treaty, its provisions outline the Moon and other celestial bodies are “not subject to national appropriation by claim of sovereignty, by means of use or occupation, or by any other means” It also introduces a number of provisions that limit activities in outer space. While those provisions have implications for the development of space mining industry, Article 11.7 of the treaty has serious implications for countries that wish to assert monopoly over the emerging asteroid mining industry.\nArticle 11.7: The main purposes of the international regime to be established shall include. The orderly and safe development of the natural resources of the moon;\n2. The rational management of those resources;\n3. The expansion of opportunities in the use of those resources;\n4. An equitable sharing by all States Parties in the benefits derived from those resources, whereby the interests and needs of the developing countries, as well as the efforts of those countries which have contributed either directly or indirectly to the exploration of the moon, shall be given special consideration.\nGiven the limitation the Moon treaty place on states, it has not been ratified by key players in the space frontier, such as the US, China, and Russia.\nBoth the Outer Space Treaty and the Moon Treaty lack a robust enforcement mechanism that holds states and private entities accountable for their violation of the agreements. The lack of clarity over claims for ownership could result in conflicts among countries and private companies. While International efforts to reconsolidate a regulatory framework to govern future mining activities are much needed, they have been slow. Establishing rules on transparency, resource sharing, and mechanisms to guide conflict resolutions are needed to support the growing economy of asteroid mining.\nSeveral countries have conducted research missions to asteroids. While the US, EU, Japan, Russia, and China have all had successful asteroid missions, only the US and Japan were able to bring samples from an asteroid. With geological surveys for metals often preceding the militarization of territories and the expansion of nation-states in terrestrial context, research missions to asteroids allude to the expansion of state ambition to dominate a large-scale extraterrestrial extractive regime.\nWhile asteroid mining remains in its infancy, countries are competing to dominate it. However, the difficulty of reaching consensus on global treaties has led countries to branch out to legitimatize the economic exploration and exploitation of asteroids, through passing national law, and relying on loopholes in the international law.\nIn 2015, the US passed the U.S Commercial Space Launch Competitiveness Act. While the act does not position the US as a state to have authority or ownership in outer space, it positions its citizens to have ownership over resources acquired from space. This allows the U.S. to adhere to Outer Space Treaty but also allow to its private entities to carry out mining activities on Asteroids, once feasible. AstroForge, a US start-up with a mission focused on developing technology for asteroid mining, announced two commercial missions to asteroids that were launched in 2023.\nIn 2016, the government of Luxembourg introduced a legal framework that support and guide the private activities of mining asteroids. To grant certainty investors, it passed a law that explicitly permits private entities to own and sell resources extracted from asteroids. The government also pledged to support research and start-ups focused on space exploration and extraterrestrial resource extraction with a funding of approximately US$225 million. Relative to the US, the Luxembourg Space Act provides more clarity and position the country more competitively to engage in asteroid mining. Given its strategic location in Europe, Luxembourg intends to establish itself as a Silicon Valley for space activities.\nDespite the differences in passed legislation, the goal remains the same: to emerge as a leader in the new asteroid mining frontier and obtain the economic benefits associated with it. Current and future developments in asteroid mining do not indicate whether competition in this frontier will lead to positive changes in international law or allow for the harmonization of national laws among states. Nevertheless, the steady growth in asteroid mining will have implications for the geopolitics of terrestrial and extraterrestrial resource extraction.\nSpace activities entail an environmental costs, which also affect countries that don't participate, prompting questions of environmental justice.The historical dominance of nations in space activities has progressively been challenged by private companies, such as SpaceX and Blue Origin, which have established profitable businesses primarily by providing satellite launching services. This fast-paced new market led to the expression \"NewSpace\", to contrast it with the \"OldSpace\" of the cold war era.\nSince the mid-20th century, it has become possible for a different actors, such as national armies and government agencies, scientists and private companies, to carry out a variety of space activities, such as the regulation of outer space through international law, the deployment of missile and anti-satellite weapons, the establishment of exploration, communication and navigation satellites, and space travel for tourism and habitat expansion.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_7" +} \ No newline at end of file diff --git a/test/Politics/Social_Credit_Party_of_Great_Britain_and_Northern_Ireland.json b/test/Politics/Social_Credit_Party_of_Great_Britain_and_Northern_Ireland.json new file mode 100644 index 0000000000000000000000000000000000000000..424858d1aa6957a10765d628792977c87df8cd61 --- /dev/null +++ b/test/Politics/Social_Credit_Party_of_Great_Britain_and_Northern_Ireland.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "The Social Credit Party of Great Britain and Northern Ireland was a political party in the United Kingdom. It grew out of the Kibbo Kift, which was established in 1920 as a more craft-based alternative for youth to the Boy Scouts.\nThe organisation was led by John Hargrave, who gradually turned the movement into a paramilitary movement for social credit. With its supporters wearing a political uniform of green shirts, in 1932 it became known as the Green Shirt Movement for Social Credit and in 1935 it took its final name, the Social Credit Party. At this point C. H. Douglas, the originator of Social Credit and the ideological leader of the group, disavowed the Greenshirts as he did not support the establishment of a political party based on his ideas. The party published the newspaper Attack and was linked to a small number of incidents in which green-painted bricks were thrown through windows, including at 11 Downing Street, the official residence of the Chancellor of the Exchequer. The leadership stated that they had formed the party after a series of independent candidates, espousing various forms of Social Credit, had sought election and they feared that this proliferation of interpretations could lead to the ideological message being confused and weakened.The party stood a single candidate in the 1935 general election, Wilfred Townend, who polled 11% of the vote in Leeds South. Despite this lack of success, Hargrave was invited by William Aberhart to take an advisory post in the Government of the Province of Alberta, Canada, that had been formed by the Social Credit Party of Alberta. There were an additional two Independent candidates who stood advocating a National Dividend; Reginald Kenney in Bradford North and H.C. Bell in Birmingham Erdington.\nThe party began to decline when political uniforms were banned by the Public Order Act 1936. Its activities were curtailed during World War II, and attempts to rebuild afterwards around a campaign against bread rationing had little success. Hargrave stood again in the 1950 general election, but after he gained only 551 votes, the party disbanded itself in 1951.\nIn 1976, C. J. Hunt, treasurer of the Social Credit Political League, formed a new party under the old name. This short-lived group was based in Bradford, West Yorkshire, where it was active in local politics.\nNotable supporters of Social Credit or \"monetary reform\" in Britain in the 1920s and 1930s included aircraft manufacturer A. V. Roe, scientist Frederick Soddy, author Henry Williamson, military historian J. F. C. Fuller and Sir Oswald Mosley, in 1928-30 a member of the Labour Government but later the leader of the British Union of Fascists. Rolf Gardiner had published articles by both Hargrave and Douglas in his journal Youth although this was during the 1920s and he had no formal links to the Social Credit Party.In the early part of its existence Lord Tavistock had been loosely associated with the party although he would later lend his support to the British People's Party, as a result of which that group espoused elements of Social Credit.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_8" +} \ No newline at end of file diff --git a/test/Politics/Town_hall_meeting.json b/test/Politics/Town_hall_meeting.json new file mode 100644 index 0000000000000000000000000000000000000000..72e67c3db148b5ca8ee71c23c1ab83c4880fdccd --- /dev/null +++ b/test/Politics/Town_hall_meeting.json @@ -0,0 +1,59 @@ +{ + "domain": "Politics", + "document": "Town hall meetings, also referred to as town halls or town hall forums, are a way for local and national politicians to meet with their constituents either to hear from them on topics of interest or to discuss specific upcoming legislation or regulation. During periods of active political debate, town halls can be a locus for protest and more active debate. The term originates mainly from North America, and is unfamiliar in British English where politicians instead hold surgeries.\nDespite their name, town hall meetings do not necessarily take place in a town hall. They are commonly held in a range of venues, including schools, libraries, municipal buildings, and churches. A number of officials have also experimented with digital formats for town halls. Town hall meetings organized by national politicians are often held in a variety of locations distributed across a voting district so that elected representatives can receive feedback from a larger proportion of constituents.\nHistorically, no specific rules or guidelines have defined a town hall meeting. Any event that allows constituent participation with a politician may be called a town hall, including gatherings in person, group phone calls, or events on Internet platforms such as Facebook or Twitter. Attendees use town halls to voice their opinions and question elected officials, political candidates, and public figures. In contrast to town meetings, a type of direct democratic rule that originated in colonial New England, attendees do not vote on issues during town hall meetings.\nIn the United States, town halls are a common way for national politicians to connect or reconnect with their constituents during recesses, when they are in their home districts away from Washington, D.C.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "FollowedBy", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "InfluencedBy", + "SignificantEvent", + "PresentedIn", + "Uses", + "ConferredBy", + "RatifiedBy", + "InterestedIn", + "ContributedToCreativeWork", + "UsedBy", + "SupportedSportsTeam", + "HasQuality", + "IsPollinatedBy", + "InvestigatedBy", + "ProducedSound", + "LocatedIn", + "PartOf", + "Origin", + "HasEffect", + "FoundedBy", + "LegislatedBy", + "EducatedAt", + "MemberOf", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Politics_9" +} \ No newline at end of file diff --git a/test/Religion/Christianity_and_animal_rights.json b/test/Religion/Christianity_and_animal_rights.json new file mode 100644 index 0000000000000000000000000000000000000000..0390dfa9969746e0b2f07262221650429cd5fee3 --- /dev/null +++ b/test/Religion/Christianity_and_animal_rights.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "The relationship between Christianity and animal rights is complex, with different Christian communities coming to different conclusions about the status of animals. The topic is closely related to, but broader than, the practices of Christian vegetarians and the various Christian environmentalist movements.\nMany Christian philosophers and socio-political figures have stated that Christians should follow the example of Jesus and treat animals in a way that expresses compassion and demonstrates the respectful stewardship of humanity over the environment. William Wilberforce, a co-founder of the Royal Society for the Prevention of Cruelty to Animals, is an example. Large organizations in which a variety of different groups work together, such as the Humane Society of the United States, have undertaken religious outreach using such arguments.\nAndrew Linzey has pointed out it would be wrong to see Christianity as an inherent enemy of animal rights since Christian theology, like all other religious traditions, has some unique insights into viewing animal life as having fundamental value.\nThroughout history, there have been Christian thinkers who have raised ethical questions about the moral status of animals. Francis of Assisi is perhaps the most well-known example.\nVarious church founders have recommended vegetarianism for ethical reasons, such as William Cowherd from the Bible Christian Church, Ellen G. White from the Seventh-day Adventists and John Wesley, the founder of Methodism. Cowherd helped to establish the world's first Vegetarian Society in 1847. Wesley's vegetarian views inspired a later generation to establish the American Vegetarian Society in 1850. Christian denominations like Seventh Day Adventists have central vegetarian doctrines incorporated.\nAlthough animal sacrifice is a theme in the Old Testament, the rise of Christianity brought an end to animal sacrifice in communities where it took hold. The concept of the Peaceable Kingdom found in the Hebrew Bible, describes peaceful coexistence of animals such as wolves and lambs.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_0" +} \ No newline at end of file diff --git a/test/Religion/Counter-apologetics.json b/test/Religion/Counter-apologetics.json new file mode 100644 index 0000000000000000000000000000000000000000..e28ec20326cbfbc3ea68a44ffce19630d17e9691 --- /dev/null +++ b/test/Religion/Counter-apologetics.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "Within criticism of religion, counter-apologetics is a field of thought that criticizes religious apologetics. Every religious apologist criticizes the defense of other religions, though the term counter-apologetics is frequently applied to criticism of religion in general by freethinkers and atheists. Luke Muehlhauser, the former executive director of the Machine Intelligence Research Institute, defines counter-apologetics as \"a response to Christian apologetics...examining the claims and tactics of Christian apologists and then equipping [a thinker] with skeptical responses to them\".\nChristian apologist and blogger J.W. Wartick wrote \"counter-counter apologetics\" in response to Matt Dillahunty's Iron Chariots counter-apologetics encyclopedia, named for a passage in Judges 1 in which God was unable to lead the Israelites to victory over an enemy because that enemy had chariots of iron.\nOn his blog, as part of his \"why they don't believe\" series (\"why they reject Christianity and/or theism\"), Christian apologist and theologian Randal Rauser invited an anonymous blogger who calls himself Counter Apologist to explain his counter-apologetics, and Rauser provided his own counter-arguments.\nThe New Testament is well understood to contain apologetics, but counter-apologetics also appears in Christian theology. Theologian John Milbank has written in a 2012 work that Christianity \"makes room for\" counter-apologetics by not being a Gnostic system of thought, and notes the \"authentic Christian fusion of apologetic and counter-apologetic\" as it stands in opposition to the anti-materialist nihilism of Browning's Caliban. Likewise, Biblical scholar and theologian Loveday Alexander has written that analysis of the Bible's books Luke and Acts by two other authors shows they contain counter-apologetic features perhaps to convey a pro-Roman perspective to the reader.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_1" +} \ No newline at end of file diff --git "a/test/Religion/El_T\303\255o.json" "b/test/Religion/El_T\303\255o.json" new file mode 100644 index 0000000000000000000000000000000000000000..e5bb7bf29bf219c4f22822459915880dc7778dd0 --- /dev/null +++ "b/test/Religion/El_T\303\255o.json" @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "El Tío (The Uncle), is believed in Cerro Rico, Potosí, Bolivia to be the \"Lord of the Underworld\". There are many statues of this devil-like spirit in the mines of Cerro Rico. El Tío is believed to rule over the mines, simultaneously offering protection and destruction. Some figures are in the shape of a goat.\nMiners bring offerings such as cigarettes, coca leaves, and alcohol for the statues and believe that if El Tío is not fed, he will take matters into his own hands. Villagers of Potosi ritually slaughter a llama and smear its blood on the entrance to the mines.\nThe miners of Cerro Rico are Catholics and they believe in both Christ and El Tío. However, worship of El Tío is condemned strongly by the Catholic Church. Images of El Tío are usually not allowed outside of the mines, as this is seen as the realm of God and El Tío has no place there. Likewise, Christian symbolism is not allowed inside the mines, as this \"Underworld\" is seen as El Tío's realm.\nEvery year, the Carnaval de Oruro is held, and costumes and statues of El Tío are paraded around in a ceremony that represents his defeat at the hands of the Archangel Michael. This is the only time that images of El Tío are allowed above the surface of the mines.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_2" +} \ No newline at end of file diff --git a/test/Religion/Flushing_Remonstrance.json b/test/Religion/Flushing_Remonstrance.json new file mode 100644 index 0000000000000000000000000000000000000000..1271020b3803ce13b5cc4b44d1bb01234e9bbca1 --- /dev/null +++ b/test/Religion/Flushing_Remonstrance.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "The Flushing Remonstrance was a 1657 petition to Director-General of New Netherland Peter Stuyvesant, in which some thirty residents of the small settlement at Flushing requested an exemption to his ban on Quaker worship. It is considered a precursor to the United States Constitution's provision on freedom of religion in the Bill of Rights.\nIn 1645, New Netherland governor Willem Kieft granted a patent to a group of English colonists from the New England Colonies to settle in the colony. The majority of the colonists settled down in the newly established colonial settlement of Vlissingen. Kieft's patent granted the English colonists, most of them non-Anglican Protestants, the same freedom of religion which existed in the Dutch Republic, which was one of the most religiously tolerant nations in Europe.Eleven years later, new governor Peter Stuyvesant, having adopted a hardline stance towards the practice of any faiths which were not part of the Dutch Reformed Church (including the various forms of Protestantism practised by the English colonists), issued an ordinance in 1656 which formally proscribed all religious congregations in the colony not part of the Reformed Church. Stuyvesant's ordinance, which was immensely controversial in the colony, stood against the approximately hundred-year development of religious tolerance in the Dutch Republic. During this period when the Dutch were revolting against Spanish rule, rebelling against an imposed Inquisition, attempting to form a national identity, and trying to unify Calvinist and Catholic provinces. The Dutch toleration debates were lengthy, bumpy, heated, and full of political intrigue and even assassination. The writer Thomas Broderick states, \"I believe the true Dutch legacy is not one of toleration but of discussion. New Amsterdam and the Republic show us that a robust, open public discourse is the surest way to eventual social improvement. Toleration and acceptance are political and moral imperatives, and the Flushing remonstrance and great Dutch toleration debates in Europe and North America teach us that social change takes time, open dialogue, disagreement, and failure before progress is to be made.\"\nStuyvesant's policy was not very different from the one evolving in the Netherlands: an official recognition of the Dutch Reformed Church bundled with broad tolerance within the church and a policy of connivance, turning a blind eye to non-conformist religious practices. At the same time, Stuyvesant also opposed Jewish arrival in New Amsterdam. On another front, the Stuyvesant family was broadly tolerant. Judith, Stuyvesant's wife, was a fierce advocate for New York's slaves, promoting the practice of baptism as a first step toward freedom.\nHis policy met with resistance from many English colonists in Vlissingen, Rustdorp and 's-Gravesande, all of which had been host to previous Quaker missions. Stuyvesant's actions, however, also met with the support of other English colonists, including local magistrates, who informed on those embracing unorthodox teachings and meeting in small and unsanctioned religious meetings of lay people called conventicles. Thus, Stuyvesant found himself drawn into the religious debates of the English Atlantic World and debates in England which culminated in the Conventicle Act 1664.\nThis policy resulted in numerous acts of religious persecution and harassment. In 1656 William Wickenden, a Baptist minister from Rhode Island, was arrested by Dutch colonial authorities, jailed, fined, and exiled for baptizing Christians in Flushing. In the same year Robert Hodgson was arrested, tried, and sentenced to two years of manual labor with slaves for his preaching of Quakerism. In 1661, in the town of Rustdorp, Henry Townsend (Norwich) and Samuel Spicer were fined for holding Quaker conventicles and Townsend was banished as well. Stuyvesant sent three new magistrates, all English colonists, and six colonial militiamen to gather information on dissidents. The militiamen were billeted in the homes of the dissidents until they agreed to conform. In 1662, in 's-Gravesande, Samuel Spicer and his mother, Micha, along with John and Mary Tilton were imprisoned and later banished. They moved to Oyster Bay, then outside of the authority of New Netherland, and returned to their town after 1664 when the English took control of the colony.\nThe Flushing Remonstrance was signed at the home of Edward Hart, the town clerk, on December 27, 1657, by a group of Dutch citizens who were affronted by persecution of Quakers and the religious policies of Stuyvesant. None of them were Quakers. The site of the signing is presently occupied by the former State Armory, now a police facility, on the south side Northern Boulevard between Linden Place and Union Street. The Remonstrance ends with:In response Stuyvesant dismissed the local government and chose new Dutch replacements as leaders. Four who signed were arrested by order of Stuyvesant. Two immediately recanted, but the writer of the remonstrance, Edward Hart, and sheriff of Flushing Tobias Feake remained firm in their convictions. Both men were remanded to prison where they survived in isolation on rations of bread and water for over a month. After friends and family petitioned Stuyvesant on behalf of the elderly Hart, the clerk was released on penalty of banishment. Feake held out for a few more weeks, but eventually recanted and was pardoned after being fined and banned from holding public office.\nStuyvesant asserted that he was not violating the signers' \"freedom of conscience,\" only their right to worship outside of family prayer meetings. In addition he proclaimed March 13, 1658 a Day of Prayer for the purpose of repenting from the sin of religious tolerance.\nSubsequently, John Bowne of the colony allowed Quakers to meet in his house. He was arrested in 1662 and brought before Stuyvesant. Unrepentant, Bowne was sentenced to banishment to the Dutch Republic, though he was of English descent and spoke no Dutch. After several months in Europe, Bowne petitioned the directors of the Dutch West India Company. After a month of deliberation, the Dutch West India Company agreed to support Bowne, and advised Stuyvesant by a letter (1663) that he was to end religious persecution in the colony. One year later, in 1664, the colony was captured by English forces. The John Bowne House, built before 1662, still stands in historic preservation.\nThe Quaker Meeting House in Flushing, built 1694, is now the oldest house of worship in continuous use in New York State.\nThe 30 signers were:Hart signed first as clerk of the group; each of several other signers wrote an X that is labeled as their mark.\nJohn Bowne's account of the Flushing Remonstrance and its aftermath is found in his journal of events. Bowne, who had arrived in 1651, soon began to host Quaker meetings in his home, although he did not convert until 1659. He was to become a leader of American Quakers and a correspondent of Quaker founder George Fox.The earliest version of the document in English dates also from 1657 as an official copy of the original, but the original, likely in Dutch, has been lost. This early handwritten copy suffered singeing in the burning of the New York State Capitol in 1911, yet remains essentially complete. It has seldom been in public anywhere.The Queens Borough President's Office held a celebration of the 350th anniversary of the Remonstrance in 2007. Descendants of the signers, Bowne, Stuyvesant, and the arresting officer were invited and in attendance, and the original copy of the Remonstrance was brought down from the State Archives in Albany for several weeks' public display.\nBowne Park, John Bowne High School, and an elementary school in Flushing, Queens are named in John Bowne's honor.\nPS 21 in Flushing is named after Edward Hart, the writer of the Remonstrance.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_3" +} \ No newline at end of file diff --git a/test/Religion/Gaia_philosophy.json b/test/Religion/Gaia_philosophy.json new file mode 100644 index 0000000000000000000000000000000000000000..39a07229566855766b141b2d11e2a7bdcf0206ae --- /dev/null +++ b/test/Religion/Gaia_philosophy.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "Gaia philosophy (named after Gaia, Greek goddess of the Earth) is a broadly inclusive term for relating concepts about, humanity as an effect of the life of this planet.\nThe Gaia hypothesis holds that all organisms on a life-giving planet regulate the biosphere in such a way as to promote its habitability. Gaia concepts draw a connection between the survivability of a species (hence its evolutionary course) and its usefulness to the survival of other species. While there were a number of precursors to Gaia hypothesis, the first scientific form of this idea was proposed as the Gaia hypothesis by James Lovelock, a UK chemist, in 1970. The Gaia hypothesis deals with the concept of biological homeostasis, and claims the resident life forms of a host planet coupled with their environment have acted and act like a single, self-regulating system. This system includes the near-surface rocks, the soil, and the atmosphere. Gaia hypothesis criticism]]). These theories are, however, significant in green politics.\nThere are some mystical, scientific and religious predecessors to the Gaia philosophy, which had a Gaia-like conceptual basis. Many religious mythologies had a view of Earth as being a whole that is greater than the sum of its parts (e.g. some Native American religions and various forms of shamanism).Isaac Newton wrote of the earth, \"Thus this Earth resembles a great animal or rather inanimate vegetable, draws in æthereall breath for its dayly refreshment & vitall ferment & transpires again with gross exhalations, And according to the condition of all other things living ought to have its times of beginning youth old age & perishing.\"\nPierre Teilhard de Chardin, a paleontologist and geologist, believed that evolution fractally unfolded from cell to organism to planet to solar system and ultimately the whole universe, as we humans see it from our limited perspective. Teilhard later influenced Thomas Berry and many Catholic humanist thinkers of the 20th century.\nLewis Thomas believed that Earth should be viewed as a single cell; he derived this view from Johannes Kepler's view of Earth as a single round organism.\nBuckminster Fuller is generally credited with making the idea respectable in Western scientific circles in the 20th century. Building to some degree on his observations and artifacts, e.g. the Dymaxion map of the Earth he created, others began to ask if there was a way to make the Gaia theory scientifically sound.\nIn 1931, L.G.M. Baas Becking delivered an inaugural lecture about Gaia in the sense of life and earth. \nOberon Zell-Ravenheart in 1970 in an article in Green Egg Magazine, independently articulated the Gaia Thesis.\nMany believe that these ideas cannot be considered scientific hypotheses; by definition a scientific hypothesis must make testable predictions. As the above claims are not currently testable, they are outside the bounds of current science. This does not mean that these ideas are not theoretically testable. As one can postulate tests that could be applied, given enough time and space, then these ideas should be seen as scientific hypotheses.\nThese are conjectures and perhaps can only be considered as social and maybe political philosophy; they may have implications for theology, or thealogy as Zell-Ravenheart and Isaac Bonewits put it.\nAccording to James Kirchner there is a spectrum of Gaia hypotheses, ranging from the undeniable to radical. At one end is the undeniable statement that the organisms on the Earth have radically altered its composition. A stronger position is that the Earth's biosphere effectively acts as if it is a self-organizing system which works in such a way as to keep its systems in some kind of equilibrium that is conducive to life. Today many scientists consider that such a view (and any stronger views) are unlikely to be correct. An even stronger claim is that all lifeforms are part of a single planetary being, called Gaia. In this view, the atmosphere, the seas, the terrestrial crust would be the result of interventions carried out by Gaia, through the coevolving diversity of living organisms.The most extreme form of Gaia theory is that the entire Earth is a single unified organism with a highly intelligent mind that arose as an emergent property of the whole biosphere. In this view, the Earth's biosphere is consciously manipulating the climate in order to make conditions more conducive to life. Scientists contend that there is no evidence at all to support this last point of view, and it has come about because many people do not understand the concept of homeostasis. Many non-scientists instinctively and incorrectly see homeostasis as a process that requires conscious control.\nThe more speculative versions of Gaia, including versions in which it is believed that the Earth is actually conscious, sentient, and highly intelligent, are usually considered outside the bounds of what is usually considered science.\nBuckminster Fuller has been credited as the first to incorporate scientific ideas into a Gaia theory, which he did with his Dymaxion map of the Earth.The first scientifically rigorous theory was the Gaia hypothesis by James Lovelock, a UK chemist.\nA variant of this hypothesis was developed by Lynn Margulis, a microbiologist, in 1979.\nHer version is sometimes called the \"Gaia Theory\" (note uppercase-T). Her model is more limited in scope than the one that Lovelock proposed.\nWhether this sort of system is present on Earth is still open to debate. Some relatively simple homeostatic mechanisms are generally accepted. For example, when atmospheric carbon dioxide levels rise, plants are able to grow better and thus remove more carbon dioxide from the atmosphere. Other biological effects and feedbacks exist, but the extent to which these mechanisms have stabilized and modified the Earth's overall climate is largely not known.\nThe Gaia hypothesis is sometimes viewed from significantly different philosophical perspectives. Some environmentalists view it as an almost conscious process, in which the Earth's ecosystem is literally viewed as a single unified organism. Some evolutionary biologists, on the other hand, view it as an undirected emergent property of the ecosystem: as each individual species pursues its own self-interest, their combined actions tend to have counterbalancing effects on environmental change. Proponents of this view sometimes point to examples of life's actions in the past that have resulted in dramatic change rather than stable equilibrium, such as the conversion of the Earth's atmosphere from a reducing environment to an oxygen-rich one.\nDepending on how strongly the case is stated, the hypothesis conflicts with mainstream neo-Darwinism. Most biologists would accept Daisyworld-style homeostasis as possible, but would certainly not accept the idea that this equates to the whole biosphere acting as one organism.\nA very small number of scientists, and a much larger number of environmental activists, claim that Earth's biosphere is consciously manipulating the climate in order to make conditions more conducive to life. Scientists contend that there is no evidence to support this belief.\nA social science view of Gaia theory is the role of humans as a keystone species who may be able to accomplish global homeostasis. Whilst a few social scientists who draw inspiration from 'organic' views of society have embraced Gaia philosophy as a way to explain the human-nature interconnections, most professional social scientists are more involved in reflecting upon the way Gaia philosophy is used and engaged with within sub-sections of society. Alan Marshall, in the Department of Social Sciences at Mahidol University, for example, reflects upon the way Gaia philosophy has been used and advocated in various societal settings by environmentalists, spiritualists, managers, economists, and scientists and engineers. As Marshall explains, most social scientists had already given up on systems ideas of society in the 1960s before Gaia philosophy was born under James Lovelock's ideas since such ideas were interpreted as supporting conservatism and traditionalism. Gaia theory also influenced the dynamics of green politics.Rosemary Radford Ruether, the American feminist scholar and theologian, wrote a book called Gaia and God: An Ecofeminist Theology of Earth Healing.A book edited by Allan Hunt Badiner called Dharma Gaia explores the ground where Buddhism and ecology meet through writings by the Dalai Lama, Gary Snyder, Thich Nhat Hanh, Allen Ginsberg, David Abram, Joanna Macy, Robert Aitken, and 25 other Buddhists and ecologists.\nGaianism, an earth-centered philosophical, holistic, and spiritual belief that shares expressions with earth religions and paganism while not identifying exclusively with any specific religion, sprang from the gaia hypothesis.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_4" +} \ No newline at end of file diff --git a/test/Religion/Joshua_Project.json b/test/Religion/Joshua_Project.json new file mode 100644 index 0000000000000000000000000000000000000000..5570eb01d68c56d70e41ffc83faec89df5e1db9e --- /dev/null +++ b/test/Religion/Joshua_Project.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "The Joshua Project is an evangelical Christian organization based in Colorado Springs, United States, which seeks to coordinate the work of missionary organizations to track the ethnic groups of the world with the fewest followers of evangelical Christianity. To do so, it maintains ethnologic data to support Christian missions. It also tracks the evangelism efforts among 17,446 people groups worldwide—a people group being \"the largest group within which the Gospel can spread as a church planting movement,\" according to the project's website—to identify people groups as of yet unreached by Christian evangelism.\nThe project began in 1995 within the former AD2000 and Beyond Movement, which itself sprang from the 1989 Global Consultation on World Evangelization (GCOWE) prior to the Second International Congress on World Evangelization. From 2001 through 2005 the Joshua Project was at different times informally connected with the Caleb Project, and the International Christian Technologists Association (ICTA) and World Help. In 2006, the Joshua Project officially became part of the U.S. Center for World Mission, later called the Venture Center.The goal of the project is to bring definition to the unfinished task of the Great Commission by providing accurate, regularly updated ethnic people group information critical for understanding the scope of the work required.\nFocusing on ethnicity, the project maintains a database of \"unreached peoples\" listed by country and language. As of 2010, they list 9,803 ethnic groups. These are further divided into 16,350 peoples-by-countries, counting national minorities individually for each of 236 countries, of which 6,642 are classified as \"unreached peoples\". Ethnic groups are organized hierarchically in 251 \"People Clusters\" which in turn are divided in 16 \"Affinity Blocs\" (Arab World, East Asians, Eurasians, Horn of Africa-Cushitic, Iranian-Median, Jews, Latin-Caribbean Americans, Malay peoples, North American peoples, Pacific Islanders, South Asians, Southeast Asians, Sub-Saharan Africans, Tibetan / Himalayan peoples, Turkic peoples and Unclassified). Each ethnicity is listed as speaking at least one of 6,510 languages.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_5" +} \ No newline at end of file diff --git a/test/Religion/Religion_in_space.json b/test/Religion/Religion_in_space.json new file mode 100644 index 0000000000000000000000000000000000000000..038434566d8e8a5e85be9d0be5c2346e4d0d112a --- /dev/null +++ b/test/Religion/Religion_in_space.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "Astronauts and other spaceflight participants have observed their religions while in space; sometimes publicly, sometimes privately. Religious adherence in outer space poses unique challenges and opportunities for practitioners. Space travelers have reported profound changes in the way they view their faith related to the overview effect, while some secular groups have criticized the use of government spacecraft for religious activities by astronauts.\nOn Christmas Eve, 1968 astronauts Bill Anders, Jim Lovell, and Frank Borman read from the Book of Genesis as Apollo 8 orbited the Moon. A lawsuit by American Atheists founder Madalyn Murray O'Hair alleged that the observance amounted to a government endorsement of religion in violation of the First Amendment, but the case was dismissed.Apollo 11 astronaut Buzz Aldrin, a Presbyterian, performed a communion service for himself using a kit provided by his church. Aldrin had told flight director Chris Kraft of his plans and intended to broadcast the service back to Earth but opted not to at the request of Deke Slayton, due to the continuing controversy over Apollo 8's reading.A microfilm Bible brought to the surface of the Moon by Apollo 14 astronaut Ed Mitchell was auctioned off in 2011. It was a King James Version created after three astronauts lost their lives in the Apollo 1 fire. Ed White, one of the astronauts who perished, had wanted to take a Bible to the Moon.\nOn the 2009 STS-128 flight to the International Space Station, astronaut Patrick Forrester brought a fragment of a Missionary Aviation Fellowship aircraft which had been used by the Operation Auca martyrs in Ecuador in 1956.\nSeveral members of the crew of the Space Shuttle Challenger tragedy mission STS-51-L were people of faith. Among them were Commander Dick Scobee and Pilot Michael J. Smith. Scobee was a Baptist who met his wife June at a church social event. After the tragedy, she would go on to write an article in Guidepost Magazine about how their faith helped her through the tragic time. Smith and his family attended a non-denominational Christian church in a community close to their home near Houston's NASA JSC Space Center.\nRick Husband, the Commander of the ill-fated STS-107 Columbia tragedy mission, was also a devout Christian. On the last-request forms that astronauts fill out before every flight, he left his pastor a personal note: \"Tell them about Jesus; he's real to me.\" Later his wife Evelyn wrote a book about their life with him as an astronaut and the importance of their Christian faith entitled High Calling: The Courageous Life and Faith of Space Shuttle Columbia Commander Rick Husband. Likewise, his STS-107 crewmate Michael P. Anderson was also a devout Christian and when not on a mission for NASA, was an active member of the Grace Community Church choir.\nA signed message from Pope Paul VI was included among statements from dozens of other world leaders left on the Moon on a silicon disk during the Apollo 11 mission. Following the mission, William Donald Borders, Bishop of the Roman Catholic Diocese of Orlando, told the Pope that the 1917 Code of Canon Law placed the Moon within his diocese, as the first explorers had departed from Cape Kennedy which was under his jurisdiction. The claim was neither confirmed nor denied by the Pope, and the Moon is not recognized as part of the diocese in any official capacity.Following Buzz Aldrin's communion on the Moon, other astronauts have done the same in Earth orbit. Three Catholic astronauts on Space Shuttle mission STS-59 received Holy Communion on 17 April 1994. NASA astronaut Michael S. Hopkins took a supply of six consecrated hosts to the International Space Station in September 2013, allowing him to receive the Eucharist weekly during his 24-week mission.\nIn May 2011, Pope Benedict XVI of the Catholic Church talked to the crew of the Space Shuttle Endeavour while it was in Earth orbit.\nIn Russia, spaceflight crews are blessed by Russian Orthodox priests before launch, and their Soyuz rockets are also blessed on the launch pad. Cosmonaut Aleksandr Viktorenko initiated the crew blessing tradition when he requested one for the launch of Soyuz TM-20 in 1994.Russian Orthodox Christmas was celebrated on the International Space Station, on January 7, 2011. Cosmonauts had the day off, but one of the other crew posted on Twitter, \"Merry Christmas to all Russia.\" The whole crew also celebrated on December 25, two weeks prior.\nCosmonauts sometimes at the request of Russian Orthodox church carry religious icons to space, which upon return to Earth are distributed to churches.\nMuslims in space struggle with fulfilling their religious obligations including kneeling and facing Mecca to pray in microgravity traveling at several kilometres per second. The issue first came up when Sultan bin Salman bin Abdulaziz Al Saud, a Saudi prince, flew aboard STS-51-G and again when Anousheh Ansari flew as a tourist to the International Space Station. In preparation for Malaysian Sheikh Muszaphar Shukor's trip to the ISS in 2007, the National Fatwa Council created \"Muslim Obligations in the International Space Station\" outlining permissible modifications to rituals such as kneeling when praying (not required in space), facing Mecca (or just Earth) when praying (left to the astronaut's best abilities at the start of prayer), and washing (a wet towel will suffice).In February 2014, the General Authority of Islamic Affairs and Endowment (GAIAE) from Saudi Arabia issued a fatwa forbidding devout Muslims from participating as crew members in Mars One's proposed one-way mission to Mars. Speaking for the clerical group, Farooq Hamada explained that, \"Protecting life against all possible dangers and keeping it safe is an issue agreed upon by all religions and is clearly stipulated in verse 4/29 of the Holy Quran: Do not kill yourselves or one another. Indeed, Allah is to you ever Merciful.\"\nTime and date-related observances are important in Judaism, and there have been considerations on the observance of time by Jewish astronauts.American astronaut Jeffrey Hoffman took multiple Jewish objects to space on his space flights from 1985 to 1996: a miniature Torah scroll, a yad, a Torah breastplate, mezuzot, menorahs, a dreidel, hand-woven tallit, and kiddush cups.\nIn January 2003, a microfilm Torah, a handwritten copy of the Shabbat kiddush, and a miniature Torah scroll rescued from the Bergen-Belsen concentration camp were taken to space by Israeli astronaut Ilan Ramon aboard the Space Shuttle Columbia. Ramon and the rest of the crew died when the shuttle disintegrated during reentry. In September 2006, Canadian astronaut Steve MacLean took another Torah from Bergen-Belsen aboard the Space Shuttle Atlantis to the International Space Station as a tribute to Ramon.\nIn December 2006, American astronaut Sunita Williams took a copy of the Bhagavad Gita to the International Space Station. In July 2012, she took there an Om symbol and a copy of the Upanishads. On 27 February 2021, PSLV-C51 carried a digital copy of the Bhagavad Gita into space on an SD card.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_6" +} \ No newline at end of file diff --git a/test/Religion/Religious_identity.json b/test/Religion/Religious_identity.json new file mode 100644 index 0000000000000000000000000000000000000000..19f2d865d6024a586d479d4acafd52953ff9b9c6 --- /dev/null +++ b/test/Religion/Religious_identity.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "Religious identity is a specific type of identity formation. Particularly, it is the sense of group membership to a religion and the importance of this group membership as it pertains to one's self-concept. Religious identity is not necessarily the same as religiousness or religiosity. Although these three terms share a commonality, religiousness and religiosity refer to both the value of religious group membership as well as participation in religious events (e.g. going to church). Religious identity, on the other hand, refers specifically to religious group membership regardless of religious activity or participation.\nSimilar to other forms of identity formation, such as ethnic and cultural identity, the religious context can generally provide a perspective from which to view the world, opportunities to socialize with a spectrum of individuals from different generations, and a set of basic principles to live out. These foundations can come to shape an individual's identity.\nDespite the implications that religion has on identity development, the identity formation literature has mainly focused on ethnicity and gender and has largely discounted the role of religion. Nevertheless, an increasing number of studies have begun to include religion as a factor of interest. However, many of these studies use religious identity, religiosity, and religiousness interchangeably or solely focus on religious identity and solely religious participation as separate constructs.\nOf these types of research studies, researchers have examined the various factors that affect the strength of one's religious identity over time. Factors that have been found to affect levels of religious identity include gender, ethnicity, and generational status.\n'Identity' is one of the most used terms in the social sciences and has different senses in different research paradigms. In addition to psychological studies, sociologists and anthropologists also apply the term 'religious identity' and examine its related processes in given social contexts. For example, one important study conducted in the United States after the events of September 11, 2001, explored the meaning-making among American Muslims and how changes in identity ascription (what people think about another group of people) affected how Muslims sought to represent themselves. Other studies have applied concepts appropriated from race and gender identity theory such as disidentification which undermines essentialist accounts of religious identity : that an individual has a 'fixed' religious identity, independent of pre-existing systems of representation and individuals' positioning within them.\nIndividuals who share the same religious identity are called coreligionists.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_7" +} \ No newline at end of file diff --git a/test/Religion/Ritual_behavior_in_animals.json b/test/Religion/Ritual_behavior_in_animals.json new file mode 100644 index 0000000000000000000000000000000000000000..e249cd1dae4cf2fa42171efd51a00a41fab2e0bd --- /dev/null +++ b/test/Religion/Ritual_behavior_in_animals.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "Animal faith is the study of animal behaviours that suggest proto-religious faith. It is commonly believed that religion and faith are unique to humans, largely due to the typical dictionary definition of the word religion (see e.g. Wiktionary or Dictionary.com) requiring belief in a deity, which has not been observed in non-human animals. However, by using a \"non-anthropocentric and non-anthropomorphic prototype definition\" of religion, such as the one developed by James Harrod in his 2011 work \"A Trans-Species Definition of Religion,\" scientists can study animal religious practices and behaviors.\nRitual behaviors are most commonly studied in chimpanzees, elephants, and dolphins, but such behaviors have also been observed in other animals, such as magpies, crows and orcas.\nTheologian and biologist Oliver Putz notes that, since chimpanzees are capable of moral agency, it is possible for Christians to understand them as having been made in the image of God. Furthermore, Nancy R. Howell suggests that \"chimpanzees and bonobos may have the precursors for culture and spirituality, such as connectedness, interdependence and sociality and a level of 'symbolic capacity'\". Primatologist Jane Goodall goes further, noting that some chimpanzees may \"dance\" at the onset of heavy rain or when they come across a waterfall. She speculates that \"their 'elemental' displays are precursors of religious ritual\".Pliny the Elder reported supposed elephant reverence for the celestial bodies:The elephant is the largest of them all, and in intelligence approaches the nearest to man. It understands the language of its country, it obeys commands, and it remembers all the duties which it has been taught. It is sensible alike of the pleasures of love and glory, and, to a degree that is rare among men even, possesses notions of honesty, prudence, and equity; it has a religious respect also for the stars, and a veneration for the sun and the moon.\nWhile grief is common to many animals, funeral rituals are not. However, they are well documented in African elephants.Ronald K. Siegel writes that:\none cannot ignore the elaborate burying behaviour of elephants as a similar sign of ritualistic or even religious behaviour in that species. When encountering dead animals, elephants will often bury them with mud, earth and leaves. Animals known to have been buried by elephants include rhinos, buffalos, cows, calves, and even humans, in addition to elephants themselves. Elephants have [been] observed burying their dead with large quantities of food, fruit, flowers and colourful foliage.\nBoth wild and captive chimpanzees engage in ritualized behaviors at the death of a group member. These behaviors begin with group or individual silence, which may last for hours and followed by behaviors such as distinctive vocalizations; grooming the carcass; solemn visitation and gazing at the carcass by group members; displays; and lamentation-like whimpers or hoo-calls of distress.\nAttention to the dead is not unique to elephants or chimpanzees. Dolphins have been known to stay with recently deceased members of their pod for several days, preventing divers from getting close. However, the reasons for this remain obscure. While scientists can observe their actions, the thought processes that motivate them are beyond current study.\nTahlequah (a.k.a. J35), a female orca, carried the carcass of her newborn infant for 17 days. Whether this was a \"tour of grief\" or merely instinct is debated.\nCrows and other corvids also seem to participate in funeral-like ritualistic behavior, including gathering around and holding vigils over the carcass.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_8" +} \ No newline at end of file diff --git a/test/Religion/Siladhara_Order.json b/test/Religion/Siladhara_Order.json new file mode 100644 index 0000000000000000000000000000000000000000..4104fc68e2f2db01589e643582f4014d18571754 --- /dev/null +++ b/test/Religion/Siladhara_Order.json @@ -0,0 +1,55 @@ +{ + "domain": "Religion", + "document": "The Sīladharā Order is a Theravada Buddhist female monastic order established by Ajahn Sumedho at Chithurst Buddhist Monastery, England. Its members are known as Sīladharās.\nIn 1983, he obtained permission from the Sangha in Thailand, to give a ten-precept pabbajjā to women, giving them official recognition as female renunciants trained in the Ajahn Chah lineage. The reasons for its establishment are due to the historical loss of the bhikkhunī (nun's) ordination in Theravada Buddhism, limiting renunciation for female Theravadins to ad hoc roles such as the thilashins and maechis, neither of which garner recognition from modern-day Theravada Buddhists as genuine renunciants.\nAjahn Sumedho enlisted Ajahn Sucitto to train the nuns from 1984 to 1991. By 2008, sīladharās were trained in the discipline of more than one hundred precepts, including rules based on the pāṭimokkha of the bhikkhunī order. The order waxed and waned throughout its brief history, peaking at around 14, mostly living at Amaravati Buddhist Monastery.In order to not violate national laws governing religious ordinations in predominantly Theravāda countries, with the notable exception of Sri Lanka, the Sīladharā Order is formally considered junior to that of bhikkhus or fully ordained men. Over the last twenty years, many siladhāras have therefore sought full bhikkhunī ordination with commensurate privileges, recognition and responsibilities enjoyed by male monastics. Making full ordination available to women is a cultural issue with significant implications for the welfare of young girls living in poverty in Asian countries where Theravada Buddhism is prevalent, especially Burma, Thailand, Cambodia, Laos and Sri Lanka. Speaking of Thailand, Lynne Hybels writes, \"Young men in desperately poor families such as those in Chiang ai can bring honor to their families by becoming monks, but girls are expected to provide financially. Traffickers understand this vulnerability, prey on it, and easily lure girls into life in the brothel.\" Such ordinations, however, are according to Buddhism itself motivated by wrong view; in particular, by careerism or economism, rather than by a sense of saṁvega and genuine renunciation.After years of thorough discussion, Ajahn Sumedho issued a \"Five-Point Declaration\" concerning women's roles and rights in the Amaravati monastic community. This affirmed the status quo of seniority of male over female monastics. The declaration holds that while some teaching and management responsibilities are shared between the two orders according to capability, the Siladhara Order is unequivocally junior to that of the monks.\nMany consider the \"Five-Point Declaration\" to be discriminatory against women. Some monastics and scholars also consider it to be an inaccurate interpretation of the vinaya and other texts, similar to the Three-Fifths Compromise in the United States Constitution or other codified examples of discrimination such as coverture. In addition, the violations of national law that had been sought to avoid were distinct from the vinaya itself, as argued by Ajahn Brahmavaṁso on the same matter.\nDespite Ajahn Sumedho's best efforts at balancing contending interests, many female monastics living at Amaravati at the time left the monastery citing discrimination and lack of compassion on the part of Amaravati leadership. Subsequently, two sīladharās from this group founded a community in the United States. Along with numerous other women in recent years, these former Sīladharās have taken full bhikkhunī ordination.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AdjacentStation", + "FacetOf", + "Creator", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PresentedIn", + "OfficeHeldByHeadOfGovernment", + "InterestedIn", + "SignificantPerson", + "ContributedToCreativeWork", + "Represents", + "IssuedBy", + "Contains", + "LocatedIn", + "PartOf", + "HasEffect", + "WorshippedBy", + "FollowedBy" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Religion_9" +} \ No newline at end of file diff --git a/test/Science/AllTrials.json b/test/Science/AllTrials.json new file mode 100644 index 0000000000000000000000000000000000000000..1fbcf61558198ce4ff26acb3069a97997f080797 --- /dev/null +++ b/test/Science/AllTrials.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "AllTrials (sometimes called All Trials or AllTrials.net) is a project advocating that clinical research adopt the principles of open research. The project summarizes itself as \"All trials registered, all results reported\": that is, all clinical trials should be listed in a clinical trials registry, and their results should always be shared as open data.\nAt the center of the organisation is a petition signed by over 85,000 individuals and\n599 organisations (as of August 2015):\nThousands of clinical trials have not reported their results; some have not even been registered.\nInformation on what was done and what was found in these trials could be lost forever to doctors and researchers, leading to bad treatment decisions, missed opportunities for good medicine, and trials being repeated.\nAll trials past and present should be registered, and the full methods and the results reported.\nWe call on governments, regulators and research bodies to implement measures to achieve this.\nBen Goldacre, author of Bad Science and Bad Pharma, is a founder of the campaign and its most public spokesperson. In 2016, he participated in the launch of the OpenTrials database.\nAllTrials is an international initiative of Bad Science, BMJ, Centre for Evidence-based Medicine, Cochrane Collaboration, James Lind Initiative, PLOS and Sense about Science and is being led in the US by Sense about Science USA, Dartmouth's Geisel School of Medicine and the Dartmouth Institute for Health Policy & Clinical Practice.\nThe project is a reaction to under-reporting of research.A substantial proportion (estimates range from one-third to one-half) of medical research goes unpublished. It has also been shown that negative findings are less likely to be published than positive ones, even in the absence of conflicts of interest.\nMuch medical research is done by the pharmaceutical industry, which have a conflict of interest reporting results which may hurt sales of their products. There is a measurable funding bias in reporting; studies have shown that published drug studies funded by pharmaceutical companies are much more likely to support the use of the tested drug than studies with other funding. Industry-funded trials are also less likely to be published.\nIf the statistical methods used to analyse the trial are not chosen before the study it started, there is a danger that researchers will intentionally or unintentionally pick the method that gives the results they expect, or which gives the most significant results. This makes the analysis statistically invalid.\nNot publishing trials which fail to find a clear effect exposes trial volunteers to pointless risk and wastes research effort (as the same trial is repeated over and over). It also biases the medical literature, making it report effects where none exist (since, given enough trials, eventually one will find a difference by pure chance).\nPre-trial registration makes non-publication and changes in analysis methods obvious to medical reviewers. It also enables authors of meta-studies to track down and analyse missing data. Finally, it lets doctors and patients know when a trial is looking for volunteers.\nThere are other sources of bias, such as the conditions sometimes attached to funding by funding agencies with a financial interest in the trial's outcome. Medical researchers may be asked to agree to allow the funding agency to censor results. Some funding agencies may also refuse to give the medical researcher access to the raw data, giving them only the finished analysis, or even a draft paper, and asking them to put their name to it. This is not acceptable academic practice, and some academic journals require that authors sign a statement that they have not entered into such agreements.\nBen Goldacre, a physician and spokesperson for the campaign, would like to address the systematic flaws in clinical research which cause data to be lost after it is gathered.\nThe campaign has been widely covered, and supported, in the academic press. The British Medical Journal and PLOS are founding members. Nature and The Lancet both published supportive articles in January 2014.There has also been mainstream media coverage.\nThere has been criticism from the Pharmaceutical Research and Manufacturers of America (PhRMA), with senior vice-president Matt Bennett saying that trial data disclosure measures which AllTrials has recommended to the European Medicines Agency \"could risk patient privacy, lead to fewer clinical trials, and result in fewer new medicines to meet patient needs and improve health.\".AllTrials have published a detailed statement of exactly what they want to see published, which states \"The AllTrials campaign is not calling for individual patient data to be made publicly available\".\nA 2012 editorial published by senior regulators from the European Medicines agency largely agreed with AllTrials, saying \"We consider it neither desirable nor realistic to maintain the status quo of limited availability of regulatory trials data\". They were also of the opinion that adequate standards for protection of personal data could be written. However, they warned that third party reanalysis was neither a guarantee of quality nor of lack of conflict of interest, which, in the worst case, could lead to negative public health consequences.\nThey suggested that reanalyses should therefore be subject to the same regulations as sponsor analyses, such as registering analysis plans. They argued against completely unrestricted access to data, but in favor of broader access. AllTrials is not calling for completely unrestricted access to raw data, so the scope of disagreements is limited to what restrictions should be in place.\nThe campaign is an initiative of Sense about Science, Centre for Evidence Based Medicine, The Dartmouth Institute for Health Policy and Clinical Practice, James Lind Alliance, Cochrane Collaboration, BMJ Group, PLOS, and Bad Science. The petition statement of AllTrials has been signed by organizations including Wellcome Trust, British Library, Medical Research Council (UK), British Heart Foundation, Institute for Quality and Efficiency in Health Care, National Institute for Health and Care Excellence, BioMed Central, National Physicians Alliance, Royal Society of Medicine, Health Research Authority, American Medical Student Association, GlaxoSmithKline, and others.As of May 2017, The AllTrials petition has been signed by 90,282 people and 721 organisations. In October 2016, AllTrials published a road map detailing steps that various types of organisations can take to get more trials registered and more results reported.\n85 investors with >€3.5 trillion (£2.45trn; $3.83trn) of investments have supported AllTrials (as of July 2015), with Peter van der Werf of RobecoSAM saying: \"We deem this to be a financially material factor and encourage all companies to gain credibility regarding their approach to clinical trial transparency by signing up to the AllTrials principles.\". The Laura and John Arnold Foundation provided early and ongoing financial support.\nThe original policy of the Coalition for Epidemic Preparedness Innovations required that funded parties pre-register any trials in a clinical trials registry, publish results within a year of study completion (except with compelling reason and permission of CEPI), publish results in open-access articles, and have mechanisms for securely sharing underlying data and results, including negative results, in a way that preserves trial volunteer privacy. In May 2018 the CEPI proposed changing the policy to remove these provisions. The policy was changed by the CEPI in December 2018.\nThe European Federation of Pharmaceutical Industries and Associations and Pharmaceutical Research and Manufacturers of America have expressed interest in lobbying against the campaign. Campaign supporters criticized Hoffmann-La Roche's plans to be more open but not to the extent requested by AllTrials.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_0" +} \ No newline at end of file diff --git a/test/Science/Classification_of_the_sciences_(Peirce).json b/test/Science/Classification_of_the_sciences_(Peirce).json new file mode 100644 index 0000000000000000000000000000000000000000..8ebd6053127d0288adb4ca727d0c099b70192344 --- /dev/null +++ b/test/Science/Classification_of_the_sciences_(Peirce).json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "The philosopher Charles Sanders Peirce (1839:1914) did considerable work over a period of years on the classification of \nsciences (including mathematics). His classifications are of interest both as a map for navigating his philosophy and as an accomplished polymath's survey of research in his time. Peirce himself was well grounded and produced work in many research fields, including logic, mathematics, statistics, philosophy, spectroscopy, gravimetry, geodesy, chemistry, and experimental psychology.\nPhilosophers have done little work on classification of the sciences and mathematics since Peirce's time. Noting Peirce's \"important\" contribution, Denmark's Birger Hjørland commented: \"There is not today (2005), to my knowledge, any organized research program about the classification of the sciences in any discipline or in any country\". As Miksa (1998) writes, the \"interest for this question largely died in the beginning of the 20th century\". It is not clear whether Hjørland includes the classification of mathematics in that characterization.In 1902 and 1903 Peirce elaborates classifications of the sciences in: \"A Detailed Classification of the Sciences\" in Minute Logic (Feb.:Apr. 1902), Collected Papers of Charles Sanders Peirce (CP) v. 1, paragraphs 203:283\nJuly 1902 application to the Carnegie institution (MS L75)\n\"An Outline Classification of the Sciences (CP 1.180-202) in his \"A Syllabus of Certain Topics in Logic\" (1903), wherein his classifications of the sciences take more or less their final form\nHowever, only in the \"Detailed Classification\" and the Carnegie application does he discuss the taxa which he used, which were inspired by the biological taxa of Louis Agassiz.\nIn 1902, he divided science into Theoretical and Practical. Theoretical Science consisted of Science of Discovery and Science of Review, the latter of which he also called \"Synthetic Philosophy\", a name taken from the title of the vast work, written over many years, by Herbert Spencer. Then, in 1903, he made it a three-way division: Science of Discovery, Science of Review, and Practical Science. In 1903 he characterized Science of Review as:...arranging the results of discovery, beginning with digests, and going on to endeavor to form a philosophy of science. Such is the nature of Humboldt's Cosmos, of Comte's Philosophie positive, and of Spencer's Synthetic Philosophy. The classification of the sciences belongs to this department.\nPeirce had already for a while divided the Sciences of Discovery into:\n(1) Mathematics : draws necessary conclusions about hypothetical objects\n(2) Cenoscopy : philosophy about positive phenomena in general, such as confront a person at every waking moment, rather than special classes, and not settling theoretical issues by special experiences or experiments\n(3) Idioscopy : the special sciences, about special classes of positive phenomena, and settling theoretical issues by special experiences or experiments\nThus Peirce ends up framing two fields each of which is philosophy in a sense: cenoscopic philosophy which precedes the special sciences, and synthetic philosophy (that is to say, science of review), which does take advantage of the results of all the sciences of discovery and develops, for instance, classifications of the sciences.\nPeirce opens his 1903 classification (the \"Syllabus\" classification) with a concise statement of method and purpose:\nThis classification, which aims to base itself on the principal affinities of the objects classified, is concerned not with all possible sciences, nor with so many branches of knowledge, but with sciences in their present condition, as so many businesses of groups of living men. It borrows its idea from Comte's classification; namely, the idea that one science depends upon another for fundamental principles, but does not furnish such principles to that other. It turns out that in most cases the divisions are trichotomic; the First of the three members relating to universal elements or laws, the Second arranging classes of forms and seeking to bring them under universal laws, the Third going into the utmost detail, describing individual phenomena and endeavoring to explain them. But not all the divisions are of this character....\nThe following table is based mostly on Peirce's 1903 classification, which was more or less the final form. But see after the table for discussion of his later remarks on the divisions of logic.\nIn a piece which the Collected Papers editors called \"Phaneroscopy\" and dated as 1906, Peirce wrote (CP 4.9):...I extend logic to embrace all the necessary principles of semeiotic, and I recognize a logic of icons, and a logic of indices, as well as a logic of symbols; and in this last I recognize three divisions: Stecheotic (or stoicheiology), which I formerly called Speculative Grammar; Critic, which I formerly called Logic; and Methodeutic, which I formerly called Speculative Rhetoric\nThus the three main 1903 departments of logic were now sub-departments of the study of the logic of symbols.\nIn a letter to J. H. Kehler, printed in The New Elements of Mathematics v.3, p. 207 and dated 1911, Peirce wrote:\nI have now sketched my doctrine of Logical Critic, skipping a good deal. I recognize two other parts of Logic. One which may be called Analytic examines the nature of thought, not psychologically but simply to define what it is to doubt, to believe, to learn, etc., and then to base critic on these definitions is my real method, though in this letter I have taken the third branch of logic, Methodeutic, which shows how to conduct an inquiry. This is what the greater part of my life has been devoted to, though I base it upon Critic.\nThere in 1911 Peirce does not mention the 1906 division into logics of icons, indices and symbols. Critic and Methodeutic appear, as in 1902 and 1903, as the second and third main departments of logic. Analytic is now the first department and the word \"Stechiology\" goes unused. He includes in Analytic the consideration of issues which, back in his 1902 Carnegie Institute application, he had discussed in sections on logic with headings such as \"Presuppositions of Logic\" and \"On the Logical Conception of Mind\" that he had placed before the sections on logic's departments (stechiology, critic, and methodeutic).\nOn the question of the relationship between Stechiology and the Analytic that seems to have replaced it, note that, in Draft D of Memoir 15 in his 1902 Carnegie Institute application, Peirce said that stechiology, also called grammatica speculativa, amounts to an Erkenntnisslehre, a theory of cognition, provided that that theory is stripped of matter irrelevant and inadmissible in philosophical logic, irrelevant matter such as all truths (for example, the association of ideas) established by psychologists, insofar as the special science of psychology depends on logic, not vice versa. In that same Carnegie Institute application as in many other places, Peirce treated belief and doubt as issues of philosophical logic apart from psychology.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_1" +} \ No newline at end of file diff --git a/test/Science/Geographic_information_science.json b/test/Science/Geographic_information_science.json new file mode 100644 index 0000000000000000000000000000000000000000..29de8987068eeadb064e53eedcb7e9e0faa04ea3 --- /dev/null +++ b/test/Science/Geographic_information_science.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "Geographic information science (GIScience, GISc) or geoinformation science is a scientific discipline at the crossroads of computational science, social science, and natural science that studies geographic information, including how it represents phenomena in the real world, how it represents the way humans understand the world, and how it can be captured, organized, and analyzed. It is a sub-field of geography, specifically part of technical geography. It has applications to both physical geography and human geography, although its techniques can be applied to many other fields of study as well as many different industries. \nAs a field of study or profession, it can be contrasted with geographic information systems (GIS), which are the actual repositories of geospatial data, the software tools for carrying out relevant tasks, and the profession of GIS users. That said, one of the major goals of GIScience is to find practical ways to improve GIS data, software, and professional practice; it is more focused on how gis is applied in real life as opposed to being a geographic information system tool in and of itself. The field is also sometimes called geographical information science.\nBritish geographer Michael Goodchild defined this area in the 1990s and summarized its core interests, including spatial analysis, visualization, and the representation of uncertainty. GIScience is conceptually related to geomatics, information science, computer science, and data science, but it claims the status of an independent scientific discipline. Recent developments in the field have expanded its focus to include studies on human dynamics in hybrid physical-virtual worlds, quantum GIScience, the development of smart cities, and the social and environmental impacts of technological innovations. These advancements indicate a growing intersection of GIScience with contemporary societal and technological issues. Overlapping disciplines are: geocomputation, geoinformatics, geomatics and geovisualization. Other related terms are geographic data science (after data science)\nand geographic information science and technology (GISci&T), with job titles geospatial information scientists and technologists.\nSince its inception in the 1990s, the boundaries between GIScience and cognate disciplines are contested, and different communities might disagree on what GIScience is and what it studies. In particular, Goodchild stated that \"information science can be defined as the systematic study according to scientific principles of the nature and properties of information. Geographic information science is the subset of information science that is about geographic information.\" Another influential definition is that by geographic information scientist (GIScientist) David Mark, which states:Geographic Information Science (GIScience) is the basic research field that seeks to redefine geographic concepts and their use in the context of geographic information systems. GIScience also examines the impacts of GIS on individuals and society, and the influences of society on GIS. GIScience re-examines some of the most fundamental themes in traditional spatially oriented fields such as geography, cartography, and geodesy, while incorporating more recent developments in cognitive and information science. It also overlaps with and draws from more specialized research fields such as computer science, statistics, mathematics, and psychology, and contributes to progress in those fields. It supports research in political science and anthropology, and draws on those fields in studies of geographic information and society.In 2009, Goodchild summarized the history of GIScience and its achievements and open challenges.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_2" +} \ No newline at end of file diff --git a/test/Science/Life-cycle_greenhouse_gas_emissions_of_energy_sources.json b/test/Science/Life-cycle_greenhouse_gas_emissions_of_energy_sources.json new file mode 100644 index 0000000000000000000000000000000000000000..99aa31ebaf23aeabe643780921eab20d9d28995d --- /dev/null +++ b/test/Science/Life-cycle_greenhouse_gas_emissions_of_energy_sources.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "Greenhouse gas emissions are one of the environmental impacts of electricity generation. Measurement of life-cycle greenhouse gas emissions involves calculating the global warming potential (GWP) of energy sources through life-cycle assessment. These are usually sources of only electrical energy but sometimes sources of heat are evaluated. The findings are presented in units of global warming potential per unit of electrical energy generated by that source. The scale uses the global warming potential unit, the carbon dioxide equivalent (CO2e), and the unit of electrical energy, the kilowatt hour (kWh). The goal of such assessments is to cover the full life of the source, from material and fuel mining through construction to operation and waste management.\nIn 2014, the Intergovernmental Panel on Climate Change harmonized the carbon dioxide equivalent (CO2e) findings of the major electricity generating sources in use worldwide. This was done by analyzing the findings of hundreds of individual scientific papers assessing each energy source. Coal is by far the worst emitter, followed by natural gas, with solar, wind and nuclear all low-carbon. Hydropower, biomass, geothermal and ocean power may generally be low-carbon, but poor design or other factors could result in higher emissions from individual power stations.\nFor all technologies, advances in efficiency, and therefore reductions in CO2e since the time of publication, have not been included. For example, the total life cycle emissions from wind power may have lessened since publication. Similarly, due to the time frame over which the studies were conducted, nuclear Generation II reactor's CO2e results are presented and not the global warming potential of Generation III reactors. Other limitations of the data include: a) missing life cycle phases, and, b) uncertainty as to where to define the cut-off point in the global warming potential of an energy source. The latter is important in assessing a combined electrical grid in the real world, rather than the established practice of simply assessing the energy source in isolation.\nAs of 2020 whether bioenergy with carbon capture and storage can be carbon neutral or carbon negative is being researched and is controversial.Individual studies show a wide range of estimates for fuel sources arising from the different methodologies used. Those on the low end tend to leave parts of the life cycle out of their analysis, while those on the high end often make unrealistic assumptions about the amount of energy used in some parts of the life cycle.Since the 2014 IPCC study some geothermal has been found to emit CO2 such as some geothermal power in Italy: further research is ongoing in the 2020s.\nOcean energy technologies (tidal and wave) are relatively new, and few studies have been conducted on them. A major issue of the available studies is that they seem to underestimate the impacts of maintenance, which could be significant. An assessment of around 180 ocean technologies found that the GWP of ocean technologies varies between 15 and 105 g/kWh of CO2eq, with an average of 53 g/kWh CO2eq. In a tentative preliminary study, published in 2020, the environmental impact of subsea tidal kite technologies the GWP varied between 15 and 37, with a median value of 23.8 g/kWh), which is slightly higher than that reported in the 2014 IPCC GWP study mentioned earlier (5.6 to 28, with a mean value of 17 g/kWh CO2eq).\nIn 2021 UNECE published a lifecycle analysis of environmental impact of electricity generation technologies, accounting for the following impacts: resource use (minerals, metals); land use; resource use (fossils); water use; particulate matter; photochemical ozone formation; ozone depletion; human toxicity (non-cancer); ionising radiation; human toxicity (cancer); eutrophication (terrestrial, marine, freshwater); ecotoxicity (freshwater); acidification; climate change, with the latter summarized in the table above.\nIn June 2022, Électricité de France publishes a detailed Life-cycle assessment study, following the norm ISO 14040, showing the 2019 French nuclear infrastructure produces less than 4 g/kWh CO2eq.\nBecause most emissions from wind, solar and nuclear are not during operation, if they are operated for longer and generate more electricity over their lifetime then emissions per unit energy will be less. Therefore, their lifetimes are relevant.Wind farms are estimated to last 30 years: after that the carbon emissions from repowering would need to be taken into account. Solar panels from the 2010s may have a similar lifetime: however how long 2020s solar panels (such as perovskite) will last is not yet known. Some nuclear plants can be used for 80 years, but others may have to be retired earlier for safety reasons. As of 2020 more than half the world's nuclear plants are expected to request license extensions, and there have been calls for these extensions to be better scrutinised under the Convention on Environmental Impact Assessment in a Transboundary Context.\nSome coal-fired power stations may operate for 50 years but others may be shut down after 20 years, or less. According to one 2019 study considering the time value of GHG emissions with techno-economic assessment considerably increases the life cycle emissions from carbon intensive fuels such as coal.\nFor residential heating in almost all countries emissions from natural gas furnaces are more than from heat pumps. But in some countries, such as the UK, there is an ongoing debate in the 2020s about whether it is better to replace the natural gas used in residential central heating with hydrogen, or whether to use heat pumps or in some cases more district heating.As of 2020 whether natural gas should be used as a \"bridge\" from coal and oil to low carbon energy, is being debated for coal-reliant economies, such as India, China and Germany. Germany, as part of its Energiewende transformation, declares preservation of coal-based power until 2038 but immediate shutdown of nuclear power plants, which further increased its dependency on fossil gas.Although the life cycle assessments of each energy source should attempt to cover the full life cycle of the source from cradle-to-grave, they are generally limited to the construction and operation phase. The most rigorously studied phases are those of material and fuel mining, construction, operation, and waste management. However, missing life cycle phases exist for a number of energy sources. At times, assessments variably and sometimes inconsistently include the global warming potential that results from decommissioning the energy supplying facility, once it has reached its designed life-span. This includes the global warming potential of the process to return the power-supply site to greenfield status. For example, the process of hydroelectric dam removal is usually excluded as it is a rare practice with little practical data available. Dam removal however is becoming increasingly common as dams age. Larger dams, such as the Hoover Dam and the Three Gorges Dam, are intended to last \"forever\" with the aid of maintenance, a period that is not quantified. Therefore, decommissioning estimates are generally omitted for some energy sources, while other energy sources include a decommissioning phase in their assessments.Along with the other prominent values of the paper, the median value presented of 12 g CO2-eq/kWhe for nuclear fission, found in the 2012 Yale University nuclear power review, a paper which also serves as the origin of the 2014 IPCC's nuclear value, does however include the contribution of facility decommissioning with an \"Added facility decommissioning\" global warming potential in the full nuclear life cycle assessment.\nThermal power plants, even if low carbon power biomass, nuclear or geothermal energy stations, directly add heat energy to the earth's global energy balance. As for wind turbines, they may change both horizontal and vertical atmospheric circulation. But, although both these may slightly change the local temperature, any difference they might make to the global temperature is undetectable against the far larger temperature change caused by greenhouse gases.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_3" +} \ No newline at end of file diff --git a/test/Science/Open-notebook_science.json b/test/Science/Open-notebook_science.json new file mode 100644 index 0000000000000000000000000000000000000000..02d6e92d354d9b4603f2dc5729775dc31b0fee31 --- /dev/null +++ b/test/Science/Open-notebook_science.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "Open-notebook science is the practice of making the entire primary record of a research project publicly available online as it is recorded. This involves placing the personal, or laboratory, notebook of the researcher online along with all raw and processed data, and any associated material, as this material is generated. The approach may be summed up by the slogan 'no insider information'. It is the logical extreme of transparent approaches to research and explicitly includes the making available of failed, less significant, and otherwise unpublished experiments; so called 'dark data'. The practice of open notebook science, although not the norm in the academic community, has gained significant recent attention in the research and general media as part of a general trend towards more open approaches in research practice and publishing. Open notebook science can therefore be described as part of a wider open science movement that includes the advocacy and adoption of open access publication, open data, crowdsourcing data, and citizen science. It is inspired in part by the success of open-source software and draws on many of its ideas.\nA public laboratory notebook makes it convenient to cite the exact instances of experiments used to support arguments in articles. For example, in a paper on the optimization of a Ugi reaction, three different batches of product are used in the characterization and each spectrum references the specific experiment where each batch was used: EXP099, EXP203 and EXP206. This work was subsequently published in the Journal of Visualized Experiments, demonstrating that the integrity data provenance can be maintained from lab notebook to final publication in a peer-reviewed journal.Without further qualifications, Open Notebook Science implies that the research is being reported on an ongoing basis without unreasonable delay or filter. This enables others to understand exactly how research actually happens within a field or a specific research group. Such information could be of value to collaborators, prospective students or future employers. Providing access to selective notebook pages or inserting an embargo period would be inconsistent with the meaning of the term \"Open\" in this context. Unless error corrections, failed experiments and ambiguous results are reported, it will not be possible for an outside observer to understand exactly how science is being done. Terms such as Pseudo or Partial have been used as qualifiers for the sharing of laboratory notebook information in a selective way or with a significant delay.\nThe arguments against adopting open notebook science fall mainly into three categories which have differing importance in different fields of science. The primary concern, expressed particularly by biological and medical scientists is that of 'data theft' or 'being scooped'. While the degree to which research groups steal or adapt the results of others remains a subject of debate it is certainly the case that the fear of not being first to publish drives much behavior, particularly in some fields. This is related to the focus in these fields on the published peer reviewed paper as being the main metric of career success.The second argument advanced against open notebook science is that it constitutes prior publication, thus making it impossible to patent and difficult to publish the results in the traditional peer reviewed literature. With respect to patents, publication on the web is clearly classified as disclosure. Therefore, while there may be arguments over the value of patents, and approaches that get around this problem, it is clear that open notebook science is not appropriate for research for which patent protection is an expected and desired outcome. With respect to publication in the peer reviewed literature the case is less clear cut. Most publishers of scientific journals accept material that has previously been presented at a conference or in the form of a preprint. Those publishers that accept material that has been previously published in these forms have generally indicated informally that web publication of data, including open notebook science, falls into this category. Open notebook projects have been successfully published in high impact factor peer reviewed journals but this has not been tested with a wide range of publishers. It is to be expected that those publishers that explicitly exclude these forms of pre-publication will not accept material previously disclosed in an open notebook.\nA third argument advanced against open notebook science is that it vitiates independence of competing research and hence may result in lack of all important independent verification of results. This is not the same as data-scooping, but the much more subtle possibility of allowing data that is co-evolving to influence each other. In traditional science large experimental collaborations often establish fire-wall rules preventing communication between members of competing collaborations to prevent not just data leakage but also influencing the methodology by which data is analyzed. \nThe final argument relates to the problem of the 'data deluge'. If the current volume of the peer reviewed literature is too large for any one person to manage, then how can anyone be expected to cope with the huge quantity of non:peer-reviewed material that could potentially be available, especially when some, perhaps most, would be of poor quality? A related argument is that 'my notebook is too specific' for it to be of interest to anyone else. The question of how to discover high quality and relevant material is a related issue. The issue of curation and validating data and methodological quality is a serious issue and one that arguably has relevance beyond open notebook science but is a particular challenge here.\nThe Open Notebook Science Challenge, now directed towards reporting solubility measurements in non-aqueous solvent, has received sponsorship from Submeta, Nature and Sigma-Aldrich. The first of ten winners of the contest for December 2008 was Jenny Hale.Logos can be used on notebooks to indicate the conditions of sharing. Fully open notebooks are marked as \"all content\" and \"immediate\" access. Partially open notebooks can be marked as either \"selected content\" and/or \"delayed\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_4" +} \ No newline at end of file diff --git a/test/Science/Roatan_Institute_for_Marine_Sciences.json b/test/Science/Roatan_Institute_for_Marine_Sciences.json new file mode 100644 index 0000000000000000000000000000000000000000..40b2e31c509f20a3ff1de244a4639be0addc11cb --- /dev/null +++ b/test/Science/Roatan_Institute_for_Marine_Sciences.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "Roatan Institute for Marine Sciences (RIMS) is a scientific research center located in Roatán, department of Islas de la Bahía, in the Republic of Honduras.\nIt is part of Anthony's Key Resort, a tourist complex belonging to the Galindo family, that offers accommodations in bungalows, kayaking, spas, excursions and various interactions with captive dolphins such as swimming. It was founded in 1989 with the purpose of investigating coral reefs and aquatic life in general in the coastal zones of Honduras and the surrounding areas. The institute also has a small marine museum and the \"Dolphin Discovery Camp\" for the study of dolphin behavior (two when it started) and in 2017 the population of the dolphinarium was twenty-six cetaceans. Of these, seven were captured wild, one was rescued and eighteen were born there. They are spread over two coastal enclosures, one on the small island of Bailey's Key (Dolphin Encounter) and the other on the main island of Roatán (Dolphin Presentation).\nThe institute has scientific research programs that are visited by students from colleges, universities, and high schools from abroad.\nHéctor and Iván are two of the dolphins, whose behavior was studied by the psychologist Dr. Stan Kuczaj. These dolphins use complex language with each other, which is the basis of scientific study to understand them better.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_5" +} \ No newline at end of file diff --git a/test/Science/Science_in_Action_(book).json b/test/Science/Science_in_Action_(book).json new file mode 100644 index 0000000000000000000000000000000000000000..b2c6b30665523bc7776e3a8faff85bde79be1e2a --- /dev/null +++ b/test/Science/Science_in_Action_(book).json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "Science in Action: How to Follow Scientists and Engineers Through Society (ISBN 0-674-79291-2) is a seminal book by French philosopher, anthropologist and sociologist Bruno Latour first published in 1987. It is written in a textbook style, proposes an approach to the empirical study of science and technology, and is considered a canonical application of actor-network theory. It also entertains ontological conceptions and theoretical discussions making it a research monograph and not a methodological handbook per se.\nIn the introduction, Latour develops the methodological dictum that science and technology must be studied \"in action\", or \"in the making\". Because scientific discoveries turn esoteric and difficult to understand, it has to be studied where discoveries are made in practice. For example, Latour turns back time in the case of the discovery of the \"double helix\". Going back in time, deconstructing statements, machines and articles, it is possible to arrive at a point where scientific discovery could have chosen to take many other directions (contingency). Also the concept of \"black box\" is introduced. A black box is a metaphor borrowed from cybernetics denoting a piece of machinery that \"runs by itself\". That is, when a series of instructions are too complicated to be repeated all the time, a black box is drawn around it, allowing it to function only by giving it \"input\" and \"output\" data. For example, a CPU inside a computer is a black box. Its inner complexity doesn't have to be known; one only needs to use it in his/her daily activities.\nHenning Schmidgen describes Science in Action as an anthropology of science, a manual where the main purpose is “a trip through the unfamiliar territory of “technoscience””. Similarly Science in Action has been described as \"A guide that explains how to account for processes of making knowledge, facts, or truths. A guide designed to be used on site, while observing the negotiations and struggles that precede ready-made science\".\nLatour's work, including Science in Action, has been extremely influentially on the field of Science and technology studies having been taught at preeminent institutions such as Massachusetts Institute of Technology. However there were some critics of it such as Olga Amsterdamska's who stated in a book review: \"Somehow, the ideal of a social science whose only goal is to tell inconsistent, false, and incoherent stories about nothing in particular does not strike me as very appealing or sufficiently ambitious.\" Despite this harsh rejoinder, her criticism had little impact on the field.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_6" +} \ No newline at end of file diff --git a/test/Science/Scientist.json b/test/Science/Scientist.json new file mode 100644 index 0000000000000000000000000000000000000000..0b997cb07877915dd94124ade7bbd6553bf5ec43 --- /dev/null +++ b/test/Science/Scientist.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "A scientist is a person who researches to advance knowledge in an area of the natural sciences.\nIn classical antiquity, there was no real ancient analog of a modern scientist. Instead, philosophers engaged in the philosophical study of nature called natural philosophy, a precursor of natural science. Though Thales (c. 624:545 BC) was arguably the first scientist for describing how cosmic events may be seen as natural, not necessarily caused by gods, it was not until the 19th century that the term scientist came into regular use after it was coined by the theologian, philosopher, and historian of science William Whewell in 1833.\nThe roles of \"scientists\", and their predecessors before the emergence of modern scientific disciplines, have evolved considerably over time. Scientists of different eras (and before them, natural philosophers, mathematicians, natural historians, natural theologians, engineers, and others who contributed to the development of science) have had widely different places in society, and the social norms, ethical values, and epistemic virtues associated with scientists—and expected of them—have changed over time as well. Accordingly, many different historical figures can be identified as early scientists, depending on which characteristics of modern science are taken to be essential.Some historians point to the Scientific Revolution that began in 16th century as the period when science in a recognizably modern form developed. It was not until the 19th century that sufficient socioeconomic changes had occurred for scientists to emerge as a major profession.\nKnowledge about nature in classical antiquity was pursued by many kinds of scholars. Greek contributions to science—including works of geometry and mathematical astronomy, early accounts of biological processes and catalogs of plants and animals, and theories of knowledge and learning—were produced by philosophers and physicians, as well as practitioners of various trades. These roles, and their associations with scientific knowledge, spread with the Roman Empire and, with the spread of Christianity, became closely linked to religious institutions in most European countries. Astrology and astronomy became an important area of knowledge, and the role of astronomer/astrologer developed with the support of political and religious patronage. By the time of the medieval university system, knowledge was divided into the trivium—philosophy, including natural philosophy—and the quadrivium—mathematics, including astronomy. Hence, the medieval analogs of scientists were often either philosophers or mathematicians. Knowledge of plants and animals was broadly the province of physicians.Science in medieval Islam generated some new modes of developing natural knowledge, although still within the bounds of existing social roles such as philosopher and mathematician. Many proto-scientists from the Islamic Golden Age are considered polymaths, in part because of the lack of anything corresponding to modern scientific disciplines. Many of these early polymaths were also religious priests and theologians: for example, Alhazen and al-Biruni were mutakallimiin; the physician Avicenna was a hafiz; the physician Ibn al-Nafis was a hafiz, muhaddith and ulema; the botanist Otto Brunfels was a theologian and historian of Protestantism; the astronomer and physician Nicolaus Copernicus was a priest. During the Italian Renaissance scientists like Leonardo da Vinci, Michelangelo, Galileo Galilei and Gerolamo Cardano have been considered the most recognizable polymaths.During the Renaissance, Italians made substantial contributions in science. Leonardo da Vinci made significant discoveries in paleontology and anatomy. The Father of modern Science,Galileo Galilei, made key improvements on the thermometer and telescope which allowed him to observe and clearly describe the solar system. Descartes was not only a pioneer of analytic geometry but formulated a theory of mechanics and advanced ideas about the origins of animal movement and perception. Vision interested the physicists Young and Helmholtz, who also studied optics, hearing and music. Newton extended Descartes's mathematics by inventing calculus (at the same time as Leibniz). He provided a comprehensive formulation of classical mechanics and investigated light and optics. Fourier founded a new branch of mathematics — infinite, periodic series — studied heat flow and infrared radiation, and discovered the greenhouse effect. Girolamo Cardano, Blaise Pascal Pierre de Fermat, Von Neumann, Turing, Khinchin, Markov and Wiener, all mathematicians, made major contributions to science and probability theory, including the ideas behind computers, and some of the foundations of statistical mechanics and quantum mechanics. Many mathematically inclined scientists, including Galileo, were also musicians.\nThere are many compelling stories in medicine and biology, such as the development of ideas about the circulation of blood from Galen to Harvey. Some scholars and historians attributes Christianity to having contributed to the rise of the Scientific Revolution.\nDuring the age of Enlightenment, Luigi Galvani, the pioneer of bioelectromagnetics, discovered animal electricity. He discovered that a charge applied to the spinal cord of a frog could generate muscular spasms throughout its body. Charges could make frog legs jump even if the legs were no longer attached to a frog. While cutting a frog leg, Galvani's steel scalpel touched a brass hook that was holding the leg in place. The leg twitched. Further experiments confirmed this effect, and Galvani was convinced that he was seeing the effects of what he called animal electricity, the life force within the muscles of the frog. At the University of Pavia, Galvani's colleague Alessandro Volta was able to reproduce the results, but was sceptical of Galvani's explanation.Lazzaro Spallanzani is one of the most influential figures in experimental physiology and the natural sciences. His investigations have exerted a lasting influence on the medical sciences. He made important contributions to the experimental study of bodily functions and animal reproduction.\nFrancesco Redi discovered that microorganisms can cause disease.\nUntil the late 19th or early 20th century, scientists were still referred to as \"natural philosophers\" or \"men of science\".English philosopher and historian of science William Whewell coined the term scientist in 1833, and it first appeared in print in Whewell's anonymous 1834 review of Mary Somerville's On the Connexion of the Physical Sciences published in the Quarterly Review. Whewell wrote of \"an increasing proclivity of separation and dismemberment\" in the sciences; while highly specific terms proliferated—chemist, mathematician, naturalist—the broad term \"philosopher\" was no longer satisfactory to group together those who pursued science, without the caveats of \"natural\" or \"experimental\" philosopher. Whewell compared these increasing divisions with Somerville's aim of \"[rendering] a most important service to science\" \"by showing how detached branches have, in the history of science, united by the discovery of general principles.\" Whewell reported in his review that members of the British Association for the Advancement of Science had been complaining at recent meetings about the lack of a good term for \"students of the knowledge of the material world collectively.\" Alluding to himself, he noted that \"some ingenious gentleman proposed that, by analogy with artist, they might form [the word] scientist, and added that there could be no scruple in making free with this term since we already have such words as economist, and atheist—but this was not generally palatable\".\nWhewell proposed the word again more seriously (and not anonymously) in his 1840 The Philosophy of the Inductive Sciences:\nThe terminations ize (rather than ise), ism, and ist, are applied to words of all origins: thus we have to pulverize, to colonize, Witticism, Heathenism, Journalist, Tobacconist. Hence we may make such words when they are wanted. As we cannot use physician for a cultivator of physics, I have called him a Physicist. We need very much a name to describe a cultivator of science in general. I should incline to call him a Scientist. Thus we might say, that as an Artist is a Musician, Painter, or Poet, a Scientist is a Mathematician, Physicist, or Naturalist.\nHe also proposed the term physicist at the same time, as a counterpart to the French word physicien. Neither term gained wide acceptance until decades later; scientist became a common term in the late 19th century in the United States and around the turn of the 20th century in Great Britain. By the twentieth century, the modern notion of science as a special brand of information about the world, practiced by a distinct group and pursued through a unique method, was essentially in place.\nMarie Curie became the first woman to win the Nobel Prize and the first person to win it twice. Her efforts led to the development of nuclear energy and Radiotherapy for the treatment of cancer. In 1922, she was appointed a member of the International Commission on Intellectual Co-operation by the Council of the League of Nations. She campaigned for scientist's right to patent their discoveries and inventions. She also campaigned for free access to international scientific literature and for internationally recognized scientific symbols.As a profession, the scientist of today is widely recognized. However, there is no formal process to determine who is a scientist and who is not a scientist. Anyone can be a scientist in some sense. Some professions have legal requirements for their practice (e.g. licensure) and some scientists are independent scientists meaning that they practice science on their own, but to practice science there are no known licensure requirements.In modern times, many professional scientists are trained in an academic setting (e.g., universities and research institutes), mostly at the level of graduate schools. Upon completion, they would normally attain an academic degree, with the highest degree being a doctorate such as a Doctor of Philosophy (PhD). Although graduate education for scientists varies among institutions and countries, some common training requirements include specializing in an area of interest, publishing research findings in peer-reviewed scientific journals and presenting them at scientific conferences, giving lectures or teaching, and defending a thesis (or dissertation) during an oral examination. To aid them in this endeavor, graduate students often work under the guidance of a mentor, usually a senior scientist, which may continue after the completion of their doctorates whereby they work as postdoctoral researchers.After the completion of their training, many scientists pursue careers in a variety of work settings and conditions. In 2017, the British scientific journal Nature published the results of a large-scale survey of more than 5,700 doctoral students worldwide, asking them which sectors of the economy they would like to work in. A little over half of the respondents wanted to pursue a career in academia, with smaller proportions hoping to work in industry, government, and nonprofit environments.Other motivations are recognition by their peers and prestige. The Nobel Prize, a widely regarded prestigious award, is awarded annually to those who have achieved scientific advances in the fields of medicine, physics, and chemistry.\nSome scientists have a desire to apply scientific knowledge for the benefit of people's health, the nations, the world, nature, or industries (academic scientist and industrial scientist). Scientists tend to be less motivated by direct financial reward for their work than other careers. As a result, scientific researchers often accept lower average salaries when compared with many other professions which require a similar amount of training and qualification.\nScientists include experimentalists who mainly perform experiments to test hypotheses, and theoreticians who mainly develop models to explain existing data and predict new results. There is a continuum between two activities and the division between them is not clear-cut, with many scientists performing both tasks.Those considering science as a career often look to the frontiers. These include cosmology and biology, especially molecular biology and the human genome project. Other areas of active research include the exploration of matter at the scale of elementary particles as described by high-energy physics, and materials science, which seeks to discover and design new materials. Others choose to study brain function and neurotransmitters, which is considered by many to be the \"final frontier\". There are many important discoveries to make regarding the nature of the mind and human thought, much of which still remains unknown.\nThe number of scientists is vastly different from country to country. For instance, there are only four full-time scientists per 10,000 workers in India, while this number is 79 for the United Kingdom, and 85 for the United States.According to the National Science Foundation, 4.7 million people with science degrees worked in the United States in 2015, across all disciplines and employment sectors. The figure included twice as many men as women. Of that total, 17% worked in academia, that is, at universities and undergraduate institutions, and men held 53% of those positions. 5% of scientists worked for the federal government, and about 3.5% were self-employed. Of the latter two groups, two-thirds were men. 59% of scientists in the United States were employed in industry or business, and another 6% worked in non-profit positions.Scientist and engineering statistics are usually intertwined, but they indicate that women enter the field far less than men, though this gap is narrowing. The number of science and engineering doctorates awarded to women rose from a mere 7 percent in 1970 to 34 percent in 1985 and in engineering alone the numbers of bachelor's degrees awarded to women rose from only 385 in 1975 to more than 11000 in 1985.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_7" +} \ No newline at end of file diff --git a/test/Science/Sonnet_to_Science.json b/test/Science/Sonnet_to_Science.json new file mode 100644 index 0000000000000000000000000000000000000000..2f3ea634a73615bb3dbc50e4f8d8ed1925af9f6c --- /dev/null +++ b/test/Science/Sonnet_to_Science.json @@ -0,0 +1,52 @@ +{ + "domain": "Science", + "document": "\"Sonnet to Science\" (originally \"Sonnet — To Science\") is an 1829 poem by Edgar Allan Poe, published in Al Aaraaf, Tamerlane, and Minor Poems.\nPoe asks why science preys on the poet. Science is peering, destructive and interested only in cold realities. It will not allow the poet to soar in fantasy or even to sit peacefully dreaming beneath a tree.In mid-November 1829, Poe agreed with the Baltimore firm Hatch and Dunning to publish his second volume of poetry, entitled Al Aaraaf, Tamerlane, and Minor Poems. This volume was the first instance in which Poe published his verse under his own name as opposed to his first publication, Tamerlane and Other Poems, which was only attributed to “a Bostonian”.A later published version of this poem includes the following note, “Private reasons—some of which have reference to the sin of plagiarism, and other to the date of Tennyson’s first poems—have induced me, after some hesitation, to re-publish these, the crude compositions of my earliest boyhood. They are printed verbatim—without alteration from the original edition—the date of which is too remote to be judiciously acknowledged.”\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "Creator", + "CitesWork", + "InfluencedBy", + "Uses", + "SupportedSportsTeam", + "HasWrittenFor", + "InOppositionTo", + "AttributedTo", + "HasQuality", + "Studies", + "LocatedIn", + "PartOf", + "Author", + "PublishedIn", + "FollowedBy", + "MathematicalInverse", + "PrimeFactor" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Science_8" +} \ No newline at end of file diff --git a/test/Society/Aging_offender.json b/test/Society/Aging_offender.json new file mode 100644 index 0000000000000000000000000000000000000000..1a8ab80fe60ec19ce30ad38c2f4b5b1dce154765 --- /dev/null +++ b/test/Society/Aging_offender.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "An aging offender or an elderly offender is an individual over the age of 55 who breaks the law or is in prison. The numbers of elderly individuals breaking the law and being placed in prison is increasing, and presents a number of problems for correctional facilities in terms of health care and provision, as well as mental, social and physical health and healthcare issues for the inmates themselves. Incarceration also tends to accelerate the aging process.\nThe First Annual Conference on Elderly Criminals took place in 1982 in Albany, New York. This, along with the dates of a number of investigations into the issues surrounding aging offenders, highlights the issue as one that has come to notice only recently. This is mainly a result of general views of criminologists that age has no impact on offending, and that offenders tail off as age increases. This issue is also compounded due to the vague definition of the term \"old\" in a quantitative state.Early investigations in 1984 were the earliest into links between age and crime, investigating rates of murder, abuse and theft through different age ranges. Concerns over differing sentences for those of different ages were also raised. Criminal Justice System officials of Maryland in the United States recorded a rise in the percentage of inmates over 55 from 4.9% to 6.8% between 1990 and 1997, and in 2001 Maryland predicted that 225,000 elderly offenders would be incarcerated by 2005. Again by 2001, the National Institute of Corrections recorded that 23 of the 50 Departments of Corrections across the US provided for elderly inmates.\nThe US National Institute of Corrections identified a number of issues relating to an aging prison population structure, including both physical and mental health, death, nutritional problems, the social and emotional needs of elderly inmates, and the need to recognise differences between normal aging and aging accelerated by being in prison.Health care is identified as a paramount concern, because in many countries elderly inmates do not qualify for state funded healthcare, with the US National Institute of Corrections identifying that inmates over 60 cost three times more than those of a younger age to house in prison. It was calculated in 2006 that prisoners over the age of 55 on average suffer from three chronic ailments for which continual medication is required. Such issues were highlighted in both Maryland, Iowa and Utah State corrections reports for 2001, 2004 and 2006 respectively. The latter recorded an increase from 3.5% to 5.2% of the total prison population being classed as elderly offenders. A total of 13% was calculated for 2010, with Utah also concluding that medical care would be the most costly problem of the aging prison structure.The Alberta Law Foundation Situational Report of 1995 also stated that: \"aging is an ongoing process and is effected by cultural and environmental experiences that may influence coping, adaptation and behaviour. Incarceration tends to accelerate the aging process\"\nSurveys conducted of criminals over the age of 55 being imprisoned for the first time revealed higher stress rates and a greater difficulty to adjust. This is both due to the culture shock, and overcoming the difficulties of having led a criminal-free life for a longer period of time and thus finding it more difficult to come to terms with breaking the law. Physical weakness or mental fragility in relation to younger inmates, and the fact that offenders are cut off from their families can also have a great impact on aging offenders.In many cases, as the age of an offender increases the likelihood of re-offending decreases, as the elderly are less capable of coping with a criminal lifestyle and grow tired of being punished. However, as a criminal ages the type of crime can evolve, with crimes such as embezzlement, fraud, gambling and drunkenness either being unlimited by age or peaking when a criminal is of the age of 50 or above.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_0" +} \ No newline at end of file diff --git a/test/Society/Confessional_society.json b/test/Society/Confessional_society.json new file mode 100644 index 0000000000000000000000000000000000000000..7ad60f36ad0ac51b0b97cc55f001820cb34bde84 --- /dev/null +++ b/test/Society/Confessional_society.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Confessional society describes the emerging trend of people to share daily life and thoughts with strangers through new information and communication tools. The term has been coined by Polish sociologist Zygmunt Bauman. He defined it as a society which is 'notorious for effacing the boundary which once separated the private from the public'. One of the examples used by Bauman is the social media platform Facebook, which he likens to an online \"confessional… where inner-truths [about its users] are revealed\"; he also described mobile phones and similar portable communication devices as \"portable electronic confessionals\".\nBauman sees this a form of a pervasive marketing strategy in which consumers became producers, and are encouraged by social media platforms to advertise or market themselves to others, to increase their own visibility (and corresponding platform visibility and ad revenue). In the modern society, therefore, fame and celebrity status, associated with and sometimes achieved through extreme display of one's private life on the Internet, are \"an ultimate goal or dream\" for many, although Bauman at the same time observes that such a summary risks oversimplification of a more nuanced system. The concept of the marketing society has been analyzed in the context of market research studies, with David Beer observing this trend means that increasingly, people are sharing data about themselves that previously, marketing companies had to struggle to acquire, and concluding that \"If Bauman’s vision is correct, then the market researcher operating in this confessional society will be researching people marketing themselves.\" In 2013 Beer would describe the term \"confessional society\" as \"increasingly influential\".\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_1" +} \ No newline at end of file diff --git a/test/Society/Conflict_theories.json b/test/Society/Conflict_theories.json new file mode 100644 index 0000000000000000000000000000000000000000..417ceecd472554d42cbde44bad7c3a5c905edabc --- /dev/null +++ b/test/Society/Conflict_theories.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Conflict theories are perspectives in political philosophy and sociology which argue that individuals and groups (social classes) within society interact on the basis of conflict rather than agreement, while also emphasizing social psychology, historical materialism, power dynamics, and their roles in creating power structures, social movements, and social arrangements within a society. Conflict theories often draw attention to power differentials, such as class conflict, or a conflict continuum. Power generally contrasts historically dominant ideologies, economies, currencies or technologies. Accordingly, conflict theories represent attempts at the macro-level analysis of society.\nMany political philosophers and sociologists have been framed as having conflict theories, dating back as far as Plato's idea of the tripartite soul of The Republic, to Hobbes' ideas in The Leviathan. Other historical political philosophers associated with having \"conflict theories\" include Jean Bodin, Adam Smith, John Stuart Mill, Thomas Robert Malthus, Karl Marx, and Georg Simmel. Georg Simmel was one of the earliest sociologists to formally use \"conflict\" as a framework to understand social change, writing about the topic in his 1908 book, \"Conflict and the Web of Group Affiliations\".\nWhile many conflict theories set out to highlight the ideological aspects inherent in traditional thought, conflict theory does not refer to a unified school of thought, and should not be confused with, for instance, social conflict theory, or any other specific theory related to social conflict.\nTwo early conflict theorists were the Polish-Austrian sociologist and political theorist Ludwig Gumplowicz (1838:1909) and the American sociologist and paleontologist Lester F. Ward (1841:1913). Although Ward and Gumplowicz developed their theories independently they had much in common and approached conflict from a comprehensive anthropological and evolutionary point-of-view as opposed to Marx's rather exclusive focus on economic factors.Gumplowicz, in Grundriss der Soziologie (Outlines of Sociology, 1884), describes how civilization has been shaped by conflict between cultures and ethnic groups. Gumplowicz theorized that large complex human societies evolved from war and conquest. The winner of a war would enslave the losers; eventually a complex caste system develops. Horowitz says that Gumplowicz understood conflict in all its forms: \"class conflict, race conflict, and ethnic conflict\", and calls him one of the fathers of conflict theory.\nWhat happened in India, Babylon, Egypt, Greece, and Rome may sometimes happen in modern Europe. European civilization may perish, over flooded by barbaric tribes. But if anyone believes that we are safe from such catastrophes he is perhaps yielding to an all too optimistic delusion. There are no barbaric tribes in our neighborhood to be sure — but let no one is deceived, their instincts lie latent in the populace of European states.\nConflict theories were popular in early sociology, and accordingly often date back to the early 1900s founders of Sociology, and particularly the ideas of Émile Durkheim, Max Weber, Georg Simmel, Karl Marx, and Lester Frank Ward.\nÉmile Durkheim (1858:1917) saw society as a functioning organism. Functionalism concerns \"the effort to impute, as rigorously as possible, to each feature, custom, or practice, its effect on the functioning of a supposedly stable, cohesive system,\" The chief form of social conflict that Durkheim addressed was crime. Durkheim saw crime as \"a factor in public health, an integral part of all healthy societies.\" The collective conscience defines certain acts as \"criminal.\" Crime thus plays a role in the evolution of morality and law: \"[it] implies not only that the way remains open to necessary changes but that in certain cases it directly prepares these changes.\"\nMax Weber's (1864:1920) approach to conflict is contrasted with that of Marx. While Marx focused on the way individual behavior is conditioned by social structure, Weber emphasized the importance of \"social action,\" i.e., the ability of individuals to affect their social relationships.\nKarl Marx (1818:1883) based his conflict theory on a dialectical materialist account of history, Marxism posited that capitalism, like previous socioeconomic systems, would inevitably produce internal tensions leading to its own destruction. Marx ushered in radical change, advocating proletarian revolution and freedom from the ruling classes, as well as critiqued political economy. At the same time, Karl Marx was aware that most of the people living in capitalist societies did not see how the system shaped the entire operation of society. Just as modern individuals see private property (and the right to pass that property on to their children) as natural, many of the members in capitalistic societies see the rich as having earned their wealth through hard work and education, while seeing the poor as lacking in skill and initiative. Marx rejected this type of thinking, viewing it as something Friedrich Engels termed false consciousness, the use of misdirection by the ruling class to obfuscate the exploitation intrinsic to the relationship between the proletariat and the ruling class. Marx wanted to replace this false consciousness with something Friedrich Engels termed class consciousness, the workers' recognition of themselves as a class unified in opposition to capitalists and ultimately to the capitalist system itself. In general, Marx wanted the proletarians to rise up against the capitalists and overthrow the capitalist system.\nThe history of all hitherto existing society is the history of class struggles.\nFreeman and slave, patrician and plebeian, lord and serf, guild-master and journeyman, in a word, oppressor and oppressed, stood in constant opposition to one another, carried on an uninterrupted, now hidden, now open fight, a fight that each time ended, either in a revolutionary reconstitution of society at large or in the common ruin of the contending classes.\nLester Frank Ward directly attacked and attempted to systematically refute the elite business class' laissez-faire philosophy as espoused by the hugely popular social philosopher Herbert Spencer. Ward's Dynamic Sociology (1883) was an extended thesis on how to reduce conflict and competition in society and thus optimize human progress. At the most basic level, Ward saw human nature itself to be deeply conflicted between self-aggrandizement and altruism, between emotion and intellect, and between male and female. These conflicts would be then reflected in society and Ward assumed there had been a \"perpetual and vigorous struggle\" among various \"social forces\" that shaped civilization. Ward was more optimistic than Marx and Gumplowicz and believed that it was possible to build on and reform present social structures with the help of sociological analysis.\nC. Wright Mills has been called the founder of modern conflict theory. In Mills's view, social structures are created through conflict between people with differing interests and resources. Individuals and resources, in turn, are influenced by these structures and by the \"unequal distribution of power and resources in the society.\" The power elite of American society, (i.e., the military:industrial complex) had \"emerged from the fusion of the corporate elite, the Pentagon, and the executive branch of government.\" Mills argued that the interests of this elite were opposed to those of the people. He theorized that the policies of the power elite would result in \"increased escalation of conflict, production of weapons of mass destruction, and possibly the annihilation of the human race.\"Gene Sharp (1928-2018) was a professor emeritus of political science at the University of Massachusetts Dartmouth. He is known for his extensive writings on nonviolent struggle, which have influenced numerous anti-government resistance movements around the world. In 1983 he founded the Albert Einstein Institution, a non-profit organization devoted to studies and promotion of the use of nonviolent action in conflicts worldwide. Sharp's key theme is that power is not monolithic; that is, it does not derive from some intrinsic quality of those who are in power. For Sharp, political power, the power of any state—regardless of its particular structural organization—ultimately derives from the subjects of the state. His fundamental belief is that any power structure relies upon the subjects' obedience to the orders of the ruler or rulers. If subjects do not obey, leaders have no power. Sharp has been called both the \"Machiavelli of nonviolence\" and the \"Clausewitz of nonviolent warfare.\" Sharp's scholarship has influenced resistance organizations around the world. More recently, the protest movement that toppled President Mubarak of Egypt drew extensively on his ideas, as well as the youth movement in Tunisia, and the earlier ones in the Eastern European colour revolutions that had previously been inspired by Sharp's work.\nA recent articulation of conflict theory is found in Canadian sociologist Alan Sears' book A Good Book, in Theory: A Guide to Theoretical Thinking (2008):\nSocieties are defined by inequality that produces conflict, rather than which produces order and consensus. This conflict based on inequality can only be overcome through a fundamental transformation of the existing relations in the society, and is productive of new social relations.\nThe disadvantaged have structural interests that run counter to the status quo, which, once they are assumed, will lead to social change. Thus, they are viewed as agents of change rather than objects one should feel sympathy for.\nHuman potential (e.g., capacity for creativity) is suppressed by conditions of exploitation and oppression, which are necessary in any society with an unequal division of labour. These and other qualities do not necessarily have to be stunted due to the requirements of the so-called \"civilizing process,\" or \"functional necessity\": creativity is actually an engine for economic development and change.\nThe role of theory is in realizing human potential and transforming society, rather than maintaining the power structure. The opposite aim of theory would be the objectivity and detachment associated with positivism, where theory is a neutral, explanatory tool.\nConsensus is a euphemism for ideology. Genuine consensus is not achieved, rather the more powerful in societies are able to impose their conceptions on others and have them accept their discourses. Consensus does not preserve social order, it entrenches stratification, a tool of the current social order.\nThe State serves the particular interests of the most powerful while claiming to represent the interests of all. Representation of disadvantaged groups in State processes may cultivate the notion of full participation, but this is an illusion/ideology.\nInequality on a global level is characterized by the purposeful underdevelopment of Third World countries, both during colonization and after national independence. The global system (i.e., development agencies such as World Bank and International Monetary Fund) benefits the most powerful countries and multi-national corporations, rather than the subjects of development, through economic, political, and military actions.\nAlthough Sears associates the conflict theory approach with Marxism, he argues that it is the foundation for much \"feminist, post-modernist, anti-racist, and lesbian-gay liberationist theories.\"\nConflict theory has three assumptions:\nHumans are self-interested.\nSocieties operate under perpetual scarcity of resources.\nConflict is pervasive and unavoidable within social groups and between social groups.\nConflict theory has been criticised for being too politicised by its association with Marx and its widespread use by advocates in numerous causes and movements. Critics also argue it downplays unity in society while taking a negative view of society.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_2" +} \ No newline at end of file diff --git a/test/Society/Figure_and_ground_(media).json b/test/Society/Figure_and_ground_(media).json new file mode 100644 index 0000000000000000000000000000000000000000..6bc249cb8a49da06122b445ed53f9def31f8054c --- /dev/null +++ b/test/Society/Figure_and_ground_(media).json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Figure and ground is a concept drawn from Gestalt psychology by media theorist Marshall McLuhan in the early 1970s. This concept underpins the meaning of his famous phrase, \"The medium is the message\". The concept was an approach to what was called \"perceptual organization.\" He began to use the terms figure and ground as a way \"to describe the parts of a situation\" and \"to help explain his ideas about media and human communication.\" The concept was later employed to explain how a communications technology, the medium or figure, necessarily operates through its context, or ground.\nTo McLuhan, \"'figure' refers to something that jumps out at us, something that grabs our attention, [whereas] ‘ground’ refers to something that supports or contextualizes a situation and is usually an area of unattention.\" When we first experience a new image or sensation, there are certain aspects of the object that grab our attention and engage us and certain aspects that we unintentionally ignore. We should not focus on just the \"figure\" or the \"ground\" though, as McLuhan believed that both were equally as important to understanding the full meaning of the situation. \"This distinction between that which is perceived and that which is blocked out in order to focus perception is central for McLuhan.\"McLuhan used different words to describe the figure/ground relationship, sometimes using content for figure and environment or, more often, medium for ground.\n\"McLuhan looked at media through a figure/ground relationship.\" To him, people tended to focus on only specific parts of the media, and disregard other parts. \"To examine the total effect of any medium, McLuhan pointed out that we need to look at both figure AND ground, and their relationship to one another.\" He believed that \"only focusing on the ‘content’ of the media was like looking at figures without examining their ground.\" \"The ground, or environment, is not a passive container, but active processes that influence the relationships between all of the elements in it\".\nMcLuhan believed that to fully grasp the impact of a new technology in regard to figure (medium) and ground (context), one must understand that the whole is greater than the sum of its parts. Neither piece is definitive without the other. His Understanding Media explores different grounds as they are structured by different media including print, radio, and television.\nAl Held, a well-known artist, exemplifies this idea in one of his paintings. The work is called The Big N and it \"provides us with an introduction to the concepts of figure and ground.\" Looking at a glance, you might draw your attention to the black triangles. \"Once you were given the name of the painting, however, the frame became linked to the figures, and an 'N' suddenly appeared.\" In understanding the work, it is important to look at the bigger picture. Al Held's painting is well known for its display of framing, or context, and its importance to the meaning of the overall situation. If either the frame or the painting itself were to change, the interpretation of the work might shift. Pertaining to media, we must look at both the figure and the ground to \"understand [its] effects.\" The ground which media creates gives a context for human communication, and thus \"directs human action in unique and important ways.\"\nMcLuhan argued that we must study media in their historical context, particularly in relation to those technologies that preceded them. The present environment, itself made up of the effects of previous technologies, gives rise to new technologies, which, in turn, further shapes societies and individuals.\nFurthermore, all technologies have embedded within them their own assumptions about time and space. Again, the message conveyed by the medium can only be understood if the medium is concurrently analyzed with the environment in which it is used — and which, simultaneously, it effectively creates. McLuhan believed that an examination of the figure-ground relationship can offer a critical commentary on culture and society.\nAlternately, the idea of \"figure\" can also refer to content of a particular medium, while \"ground\" refers to the medium itself. McLuhan's aphorism \"The medium is the message\" can thus be read as an attempt to draw attention away from a preoccupation with the figure/message to a consideration of the importance of the ground/medium.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_3" +} \ No newline at end of file diff --git a/test/Society/Harvest_Festival_(United_Kingdom).json b/test/Society/Harvest_Festival_(United_Kingdom).json new file mode 100644 index 0000000000000000000000000000000000000000..0eb17cbb0c533b3f43b1e9ec25e9c483f7945d75 --- /dev/null +++ b/test/Society/Harvest_Festival_(United_Kingdom).json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "The Harvest Festival is a celebration of the harvest and food grown on the land in the United Kingdom. It is about giving thanks for a successful crop yield over the year as winter starts to approach. The festival is also about giving thanks for all the good and positive things in people's lives, such as family and friendships. Harvest Festivals have traditionally been held in churches but also in schools and sometimes in pubs. Some estates and farms used to hold the harvest festival in a barn. In some towns and villages the harvest festivals are set so that the different churches do not have it on the same day. People bring in produce from their garden, allotment or farm, and even tinned and packaged food. Often there is a Harvest Supper at which some of the produce may be eaten. Typically surplus produce is given away to a local charity, hospital or children's home, or auctioned for charity.\nMost churches, especially in rural areas, hold a Harvest Festival but the timing varies according to local tradition. Also, many church schools hold one mid-week. Harvest Festivals in the United Kingdom take place on different dates after the end of harvest, usually in September or October, depending on what crops are grown and when they are harvested locally. Unlike Thanksgiving in the US, the date has not been made an official public holiday. Though Harvest Thanksgiving Day itself is a Sunday, many parades, festivals and services occur on other days around the same date.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_4" +} \ No newline at end of file diff --git a/test/Society/Music_Declares_Emergency.json b/test/Society/Music_Declares_Emergency.json new file mode 100644 index 0000000000000000000000000000000000000000..739d15eb45d1600d480c33082b3a3dc16505e15f --- /dev/null +++ b/test/Society/Music_Declares_Emergency.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Music Declares Emergency (MDE) is an environmental pressure group with no commercial or political affiliations whose purpose is to create a vehicle for musicians and the music industry to bring their influence to bear on climate breakdown mitigation.\nMDE was launched in July 2019, by a working group of UK musicians and music industry executives in conjunction with Julie's Bicycle, a non-profit environmental charity for the creative industries. Signatories to its declaration of intent include artists across pop, classical and folk genres as well as organisations such as Abbey Road Studios, Universal Music, Warner Music and Sony.\nIts stated aims are to encourage the music industry to innovate new practices to reduce, and ultimately remove, the carbon footprint of the music industry and to work with artists to engage all communities in the debate while calling on the government to target a 2030 date for net-zero emissions.\nIn 2019, MDE was awarded IMPALA's Outstanding Contribution award. In 2020, MDE was nominated as the charity partner of the Scottish Album of the Year Awards and curated announcements on zero carbon commitments in conjunction with labels Ninja Tune and the Beggars Group.\nIn 2020, an MDE delegation including Fay Milton (from the band Savages), Edwin Congreave (from the band Foals), Peter Quicke (Co-CEO Ninja Tune) and Alison Tickell (CEO of Julie's Bicycle) met with Frans Timmermans, Vice-President of the European Commission, to discuss the role that music can play in supporting the EU Green Deal and contribute to Europe's green recovery strategy.[6]\nIn 2020, singer Billie Eilish signified her support by wearing and projecting their slogan, 'No Music on a Dead Planet', during her global live stream event.\nIn 2021 it collaborated in the launch of EarthPercent with the aim of raising funding from the industry itself to subsidise organisations working on the climate emergency, including those focused on the music industry.\nAround Earth Day on 22 April 2021, composer Errollyn Wallen launched MDE's 'Turn Up The Volume' campaign on BBC Radio 4's Loose Ends, a series of interviews and seminars which involved artists such as Melanie C, Declan McKenna, Peter Hook and Annie Mac.\nActive MDE groups exist in Germany, France, Switzerland, Chile, Canada, and the USA.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_5" +} \ No newline at end of file diff --git a/test/Society/Public_humanities.json b/test/Society/Public_humanities.json new file mode 100644 index 0000000000000000000000000000000000000000..ef21fd31f460aaab4c6e2d8519c80b032843bd68 --- /dev/null +++ b/test/Society/Public_humanities.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Public humanities is the work of engaging diverse publics in reflecting on heritage, traditions, and history, and the relevance of the humanities to the current conditions of civic and cultural life. Public humanities is often practiced within federal, state, nonprofit and community-based cultural organizations that engage people in conversations, facilitate and present lectures, exhibitions, performances and other programs for the general public on topics such as history, philosophy, popular culture and the arts. Public Humanities also exists within universities, as a collaborative enterprise between communities and faculty, staff, and students.\nPublic humanities projects include exhibitions and programming related to historic preservation, oral history, archives, material culture, public art, cultural heritage, and cultural policy. The National Endowment for the Humanities notes that public humanities projects it has supported in the past include \"interpretation at historic sites, television and radio productions, museum exhibitions, podcasts, short videos, digital games, websites, mobile apps, and other digital media.\" Many practitioners of public humanities are invested in ensuring the accessibility and relevance of the humanities to the general public or community groups.\nThe American Council of Learned Societies' National Task Force on Scholarship and the Public Humanities suggests that the nature of public humanities work is to teach the public the findings of academic scholarship: it sees \"scholarship and the public humanities not as two distinct spheres but as parts of a single process, the process of taking private insight, testing it, and turning it into public knowledge.\" Others, such as former museum director Nina Simon and Harvard professor Doris Sommer, suggest a more balanced understanding of the ways in which history, heritage, and culture are shared between the academy and the public. These approaches draw on the notion of shared historical authority.\nSubfields of the public humanities include public history, public sociology, public folklore, public anthropology, public philosophy, historic preservation, museum studies, museum education, cultural heritage management, community archaeology, public art, and public science.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_6" +} \ No newline at end of file diff --git a/test/Society/Social_conflict_theory.json b/test/Society/Social_conflict_theory.json new file mode 100644 index 0000000000000000000000000000000000000000..232ee73d391440f02a91f150e8b4382932672764 --- /dev/null +++ b/test/Society/Social_conflict_theory.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "Social conflict theory is a Marxist-based social theory which argues that individuals and groups (social classes) within society interact on the basis of conflict rather than consensus. Through various forms of conflict, groups will tend to attain differing amounts of material and non-material resources (e.g. the wealthy vs. the poor). More powerful groups will tend to use their power in order to retain power and exploit groups with less power.\nConflict theorists view conflict as an engine of change, since conflict produces contradictions which are sometimes resolved, creating new conflicts and contradictions in an ongoing dialectic. In the classic example of historical materialism, Karl Marx and Friedrich Engels argued that all of human history is the result of conflict between classes, which evolved over time in accordance with changes in society's means of meeting its material needs, i.e. changes in society's mode of production.\nConsider the relationship between the owner of a housing complex and a tenant in that same housing complex. A consensus theorist might suggest that the relationship between the owner and the tenant is founded on mutual benefit. In contrast, a conflict theorist might argue the relationship is based on a conflict in which the owner and tenant are struggling against each other. Their relationship is defined by the balance in their abilities to extract resources from each other, e.g. rent payments or a place to live. The bounds of the relationship are set where each is extracting the maximum possible amount of resources out of the other.Conflict can take many forms and involve struggle over many different types of resources, including status. However, formal conflict theory had its foundations in the analysis of class conflict, and the example of the owner and the tenant can be understood in terms of class conflict. In class conflict, owners are likely to have relative advantages over non-owners. For example, the legal system underlying the relationship between the owner and tenant can be biased in favor of the owner. Suppose the owner wishes to keep the tenant's security deposit after that tenant has moved out of the owner's residence. In legal systems based on English common law, the owner is only required to notify the tenant that the security deposit is being withheld. To regain the security deposit, the tenant must file a lawsuit. The tenant bears the burden of proof and is therefore required to prove that the residence was adequately cleaned before move-out. This can be a very difficult or even impossible task.\nTo summarize the example, conflict theorists view the relationship between the owner and tenant as being built primarily on conflict rather than harmony. Even though the owner-tenant relationship may often appear harmonious, any visible harmony is only a product of the law and other elements of the superstructure which constrain the relationship and which are themselves a product of an even deeper conflict, class conflict. A conflict theorist would say that conflict theory holds more explanatory power than consensus theory in this situation since consensus theory cannot explain lawsuits between owners and tenants nor the legal foundations of the asymmetrical power relationship between the two.\nFrom a social-conflict theorist/Marxist point of view social class and inequality emerges because the social structure is based on conflict and contradictions. Contradictions in interests and conflict over scarce resources between groups is the foundation of social society, according to the social conflict theory. The higher class will try to maintain their privileges, power, status and social position—and therefore try to influence politics, education, and other institutions to protect and limit access to their forms of capital and resources. Whereas the lower class—in contradiction to the higher class—has very different interests. They do not have specific forms of capital that they need to protect. All they are interested in is in gaining access to the resources and capital of the higher class. For example, education: the lower class will do everything to gain access to the higher class resources based on democratizing and liberalizing education systems because these forms of capital are thought to be of value for future success. The various institutions of society such as the legal and political system are instruments of ruling class domination and serve to further its interests. Marx believed that western society developed through four main epochs—primitive communism, ancient society, feudal society and capitalist society. Primitive communism is represented by the societies of pre-history and provides the only example of the classless society. From then all societies are divided into two major classes—master and slaves in ancient society, lords and serfs in feudal society and capitalist and wage laborers in capitalist society.Weber sees class in economic terms. He argues that classes develop in market economies in which individuals compete for economic gain. He defines a class as a group of individuals who share a similar position in market economy and by virtue of that fact receive similar economic rewards. Thus a person's class situation is basically his market situation. Those who share a similar class situation also share similar life chances. Their economic position will directly affect their chances of obtaining the things defined as desirable in their society.\nSocial conflict theory is also used to understand gender inequalities. One theory that is based on social-conflict ideas is radical feminist theory and feminism in general. According to a professor of political science in Belgrade, Jelena Vukoičić, radical feminism is a feminist theory that starts from the idea of conflict between the sexes as a fundamental conflict, and oppression against women as a direct implication of patriarchy. This theory rests on the assumption that all social activity is the result of certain restrictions and coercion, and although every social system contains specific forms of interactive constraints, they do not have to cause repression.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_7" +} \ No newline at end of file diff --git a/test/Society/Social_structure_of_Romania.json b/test/Society/Social_structure_of_Romania.json new file mode 100644 index 0000000000000000000000000000000000000000..bfba2ad6cb78a81b88f20d4e13ce179cf89d378b --- /dev/null +++ b/test/Society/Social_structure_of_Romania.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "The following is a description of the social structure of Romania divided into three distinct categories.\nBefore World War II, Romania was primarily agrarian; in the late 1940s, about three-quarters of the population were engaged in subsistence agriculture from ever-shrinking plots of land (due to an increasing rural population). Although some industrial activity was encouraged by state contracts and foreign investment, industrial development was slow and failed to create alternative employment opportunities for the overpopulated and impoverished countryside. Atop the low social pyramid stood a disproportionately powerful social elite, a remnant of the nobility that had once owned most of the land in the Kingdom of Romania (1881:1947). Although reforms between 1917 and 1921 had left them with only 15% of the arable land, this aristocracy retained a powerful voice in political affairs.After World War II, Romania's social structure was drastically altered by the imposition of a political system envisioning a classless, egalitarian society. Marxist-Leninist doctrine holds that the establishment of a socialist state (in which the working class possesses the means of production and distribution of goods and political power) will ensure the eventual development of communism. Under communism, there would be no class conflict or exploitation of man by his fellow man. There would be an abundance of wealth, shared equally by all. The road to communism requires the primacy of the working class and the elimination of the ruling class and bourgeoisie. In Romania the latter was easily accomplished, but most of the population were peasants and not workers.The Communist government (imposed by the Soviet Union in 1945) eliminated opposition to their consolidation of power by appeals to the working class. Disruption caused by World War II assisted the new government; much of the ruling elite had either emigrated or been killed, and many survivors left with the retreating German forces as the Red Army approached. Most Jews (who had constituted a large segment of the communal and financial elite before the war) either died in fascist Romania or fled the country over the next few years.\nMeasures taken during the early days of communist rule eradicated what remained of the upper crust. Land reforms in 1945 eliminated large holdings, depriving the aristocracy of their power and economic base. The currency reform of 1947 (which essentially confiscated all money for the state) was ruinous for members of the commercial and industrial bourgeoisie who had not fled with their fortunes. The state also expropriated commercial and industrial properties; by 1950 90% of all industrial output was state-controlled, and by 1953 only 14% of shops were privately owned.\nAlthough opposition from the more economically and socially advanced members of society was eliminated almost immediately, the task of creating an industrial working class (in whose name the communists claimed power) had just begun. In 1950, less than 25% of the population lived in cities or worked in factories. Conditions in the countryside, however, were poised for change in the direction the regime required. The war and Soviet occupation had left the peasantry starving, with much of their livestock and capital destroyed. Their problems were compounded by a drought in 1945:1946, followed by a famine in which thousands died. More important for the regime, many of the peasants became detached from the land and were willing to work in factory jobs resulting from the Communist Party's industrialization program.\nFrom the late 1970s to the 1980s there was a growing economic crisis, leading to a sharp decline in living standards. The response by Nicolae Ceaușescu, which made liberal use of austerity, led to heightened societal tensions and even worse conditions for working people. In December 1989, the government headed by Nicolae Ceaușescu was forcibly overthrown, with rioting in Bucharest.", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_8" +} \ No newline at end of file diff --git a/test/Society/Superficiality.json b/test/Society/Superficiality.json new file mode 100644 index 0000000000000000000000000000000000000000..f22d792d44a3595d89c9f5ca905e90293bc7e545 --- /dev/null +++ b/test/Society/Superficiality.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "In social psychology, superficiality refers to a lack of depth in relationships, conversation and analysis. The principle of \"superficiality versus depth\" is said to have pervaded Western culture since at least the time of Plato. Social psychology considers that in everyday life, social processing veers between superficiality and a deeper form of processing.\nSocrates sought to convince his debaters to turn from the superficiality of a worldview based on the acceptance of convention to the examined life of philosophy, founded (as Plato at least considered) upon the underlying Ideas. For more than two millennia, there was in the Platonic wake a general valorisation of critical thought over the superficial subjectivity that refused deep analysis. The salon style of the Précieuses might for a time affect superficiality, and play with the possibility of treating serious topics in a light-hearted fashion; but the prevailing western consensus firmly rejected elements such as everyday chatter or the changing vagaries of fashion as superficial distractions from a deeper reality.By contrast, Nietzsche opened the modernist era with a self-conscious praise of superficiality: \"What is required is to stop courageously at the surface, the fold, the skin, to adore appearance, to believe in forms, tones, words, in the whole Olympus of appearance! Those Greeks were superficial : out of profundity!\".His (still) preference for superficiality was however over-shadowed for most of the 20th century by modernism's full subscription to the depth/surface model, and to the privileging of the former over the latter. Frederic Jameson has highlighted four main modernist versions of the belief in a deeper reality - Marxist, psychoanalytic, existential, and semiotic - in each of which reality is understood to be concealed behind an inauthentic surface or façade. Jameson contrast these models sharply with the lack of depth, the ahistoricity, the surface-focus and flatness of the postmodern consciousness, with its new cult of the image and the simulacrum.\nIn the last third of the 20th century, Lyotard began challenging the Platonic view of a true meaning hidden behind surface as a theatrical world-view, insisting instead that sense manifestations had their own reality which necessarily impacted upon the purely verbal order of intelligibility. Similarly, deconstruction has increasingly sought to undo the depth/surface hierarchy, proposing in ironic style that superficiality is as deep as depth. The result has been the call to abandon the idea that behind appearances there is any ultimate truth to be found; and in consequence the growing postmodern replacement of depth by surface, or by multiple surfaces. That process of substitution was well under way by the 1990s, when notoriously \"surface was depth\", and in the new millennium has led to a state of what has been called hypervisibility: everything is on view. In this new era of exposure we are all submerged in what the psychoanalyst Michael Parsons has called \"the totalist world where there is a horror of inwardness; everything must be revealed\".\nIf postmodernism's proponents welcomed the way a new transcendence of the surface /depth dichotomy allowed a fuller appreciation of the possibilities of the superficial - the surface consciousness of the now, as opposed to the depths of historical time - critics like J. G. Ballard object that the end-product is a world of \"laws without penalties, events without significance, a sun without shadows\": of surface without depth. They see postmodern superficiality as a by-product of the false consciousness of global capitalism, where surface distractions, news, and entertainment supersaturate the zapping mind in such a way as to foreclose the possibility of envisioning any critical alternative.\nAlmost all depth psychologies defy the postmodern to value depth over surface—to aim, in David Cooper's words, for \"change from the depths of oneself upwards into the superficies of one's social appearance\". Debates may rage over whether to begin analysis at the surface or by way of deep interpretations, but this is essentially a question of timing. Thus for example Jungians would highlight at the start of therapy what they call the persona-restoring phase as an effort to preserve superficiality, but would later optimally see the client moving from the surface to deeper emotion and creativity.Fritz Perls by contrast maintained that \"the simplicity of the Gestalt approach is that we pay attention to the obvious, to the utmost surface. We don't delve into a region which we don't know anything about, into the so-called 'unconscious'\". A similar focus on the superficial has fuelled much of the Freud Wars of late modernity, in which, according to Jonathan Lear, \"the real object of attack—for which Freud is only a stalking-horse—is the very idea that humans have unconscious motivation\". Given a choice of surface or depth—\"are we to see humans as having depth, layers of meaning which lie beneath the surface of their own understanding?\"—he asks: \"Or are we to take ourselves as transparent to ourselves...to ignore the complexity, depth and darkness of human life\"; the postmodern bias remains towards superficiality.\nSocial psychology considers that in everyday life social processing veers between superficiality, where we rely on first impressions and immediate judgements, and a deeper form of processing in which we seek to understand the other person more fully. In the ordinary course of life, we necessarily take others at face-value, and use ideal types/stereotypes to guide our daily activities; while institutions too can rely on the superficial consensus of groupthink to preclude deeper investigation.Some circumstances however necessitate a shift from superficial to extensive processing. When things become serious, we must put more and deeper thought into understanding, leaving superficial judgements to cases where the stakes are low, not high.\nEntertainer Bill Hicks often criticized consumerism, superficiality, mediocrity, and banality within the media and popular culture, describing them as oppressive tools of the ruling class, meant to \"keep people stupid and apathetic.\"Web 2.0 in particular is often seen as specifically fostering superficiality, replacing deep, measured analysis by noisy but unfiltered observation.\nAldous Huxley's novel After Many a Summer is his examination of American culture, particularly what he saw as its narcissism, superficiality, and obsession with youth. Freud had similarly explored what was at the start of the 20th century a conventional contrast between the (historical) depth of Europe and the superficiality of America; but towards the century's close, another European, Baudrillard, would return to the image of America as a shallow, cultureless desert, only to praise it in postmodern terms \"because you are delivered from all depths there : a brilliant, mobile, superficial neutrality\".\nPride and Prejudice has been analysed in terms of the movement from the superficiality of Elizabeth Bennet's initially favourable appraisal of Whickham : her first impressions : to her deeper realisation of the value of Mr Darcy.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_9" +} \ No newline at end of file diff --git a/test/Society/Vienna_Institute_of_Demography.json b/test/Society/Vienna_Institute_of_Demography.json new file mode 100644 index 0000000000000000000000000000000000000000..c855cdada0e22a751b5ae75a3adf86a358d22524 --- /dev/null +++ b/test/Society/Vienna_Institute_of_Demography.json @@ -0,0 +1,57 @@ +{ + "domain": "Society", + "document": "The Vienna Institute of Demography (VID) (until 2002: Institut für Demographie/IfD) is a research institute of the division for humanities and social sciences within the Austrian Academy of Sciences (ÖAW) and part of the three \"pillar institutions\" of the Wittgenstein Centre for Demography and Global Human Capital.\nAfter some groundwork by researchers interested in having a population studies institute in Austria, among them Wilhelm Winkler and Gustav Feichtinger, the Institut für Demographie was established in November 1975 as a non-university research institute of the Austrian Academy of Sciences in close cooperation with the Austrian Statistical Central Office (now Statistik Austria). Founding director was Lothar Bosse (1914:1996), a German-born philosopher, mathematician and economist who remained at the head of IfD for twelve years. In the first few years, research activities were limited by budget restrictions and focussed on theory and basic research as well as applied demography. From the beginning, there was an emphasis on informing the public about population issues and research results, by publications such as \"Demographische Informationen\" (since 1981, in German with English abstracts).Bosse was succeeded by Richard Gisser who headed the institute 1987:1989 and again 1993:2001 (interim directorship was taken by social scientist Rainer Münz) and continues to be leader of the research group on Demography of Austria.\nIn the period of 1985 to 2000, the institute and the research topic of demography received increasing attention, though there was some competition for scientific staff with the newly founded Max Planck Institute for Demographic Research in Rostock, Germany.\nAfter positive independent evaluations and the commitment of special funds, the ÖAW decided to substantially expand and internationalise the institute in 2001. Under the designated new director Wolfgang Lutz, the IfD changed its name and working language, employed more scientific and administrative staff, expanded its research agenda as well as its publication efforts and moved to new and successively larger premises in the 4th district (2002:2007 at Prinz-Eugen-Strasse 8-10, then 2007:2015 at Wohllebengasse 12-14).\nResearch activity at VID continued to expand and received favourable attention by policy-makers and scientific peers, which showed in VID members participating in or coordinating major research projects, for instance within the European Union’s Framework Programmes, and obtaining recognition by being awarded sizeable grants from the European Research Council (ERC). Director Wolfgang Lutz received the Wittgenstein Award in 2010 and, with the 1.5 million euro prize money, established the Wittgenstein Centre for Demography and Global Human Capital.\nAt its 40th anniversary in 2015, VID moved to the WU campus in Vienna’s 2nd district, celebrating this and other occasions with a symposium on \"Demography that Matters\".\nIn 2023 Marc Luy, research group leader of the VID research group on Health and Longevity, became director of the institute, while Alexia Fürnkranz-Prskawetz and Tomas Sobotka serve as deputy directors. [1]\nVID employs about 40 researchers, most of them from the fields of economics, mathematics/statistics, geography, health studies and sociology, to cover the major research topics of demography or population science: fertility, mortality and migration as well as a number of other fields of interest. Over time, the institute’s research focus has expanded from its core competences in Austrian and later European demography to a global perspective on the relevant issues of population and human capital development.There are seven main areas of research, assigned to different research groups though there is considerable permeability and cooperation:\nDemography of Austria (led by Richard Gisser and Isabella Buber-Ennser)\nComparative European Demography (Tomáš Sobotka)\nPopulation Economics (Michael Kuhn and Gustav Feichtinger)\nHealth and Longevity (Marc Luy)\nHuman Capital Data Lab (Anne Goujon)\nIn addition to the individual contributions of VID researchers to a number of scientific journals, the institute issues the following regular publications:Vienna Yearbook of Population Research (VYPR)—since 2003, the \"Yearbook\" features peer-reviewed research articles (in English) addressing population trends as well as a broad range of theoretical and methodological issues in population research, usually taking the form of the proceedings of last year’s VID/Wittgenstein conference, which is always dedicated to a particular demographic topic. Besides that, the VYPR also publishes Demographic Debates with invited contributions on topics related to the ongoing scientific arguments in the field. Finally, contributions on Data & Trends map long-term developments as well as recent trends in various components of population change in Austria and in Europe.\nDemografische Forschung aus erster Hand—a newsletter in German language (in cooperation with the Max Planck Institute for Demographic Research), for information of journalists and policymakers in Germany, Austria and Switzerland, approx. four times a year\nVID Working Papers—occasional articles in English, mostly by VID researchers\nForschungsberichte (Research Reports)—occasional articles, mostly in German and also usually by VID researchers\nEuropean Demographic Data Sheet—every other year, VID presents the relevant data on a selected topic (such as ageing, migration, fertility etc.) on an A1-size poster with maps and figures\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "Platform", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "Grants", + "SignificantEvent", + "PresentedIn", + "PositionHeld", + "Uses", + "TakesPlaceInFictionalUniverse", + "InspiredBy", + "DepictedBy", + "HasQuality", + "LocatedIn", + "Causes", + "HasParts", + "PartOf", + "Founded", + "HasEffect", + "Author", + "PublishedIn" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Society_10" +} \ No newline at end of file diff --git a/test/Sports/2024_Orienteering_World_Cup.json b/test/Sports/2024_Orienteering_World_Cup.json new file mode 100644 index 0000000000000000000000000000000000000000..42acacc18f94a46b61eabe5be13ce41205492cc5 --- /dev/null +++ b/test/Sports/2024_Orienteering_World_Cup.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "The 2024 Orienteering World Cup is the 29th edition of the Orienteering World Cup. It consists of seven individual events and three relay events. These are split over four rounds taking place in Switzerland, Italy, Hungary and Finland. The World Cup was broadcast on public television in Sweden (SVT) Finland (YLE) and Switzerland (SRF)\nThis edition of the World Cup started with Sprint races in Switzerland and Italy. In Switzerland, Joey Hadorn and Tove Alexandersson won the first race of the first round, held in Knock-out sprint format. The second race was a sprint won by Natalia Gemperle and Emil Svensk. The second round was the first time the World Cup had been in Genoa, and was held in Voltri and Nervi. Kasper Harlem Fosser and Simona Aebersold won the sprint race, and the next day the Sprint relay was won by Switzerland.\nThe third round of the World Cup was held in Hungary, and was characterized by hot conditions. The world cup round was combined with the European Orienteering Championships. The first race was won by Eirik Langedal Breivik and Simona Aebersold In the long distance the next day, Kasper Fosser and Tove Alexandersson were the victors. The relay event was won by Switzerland and Norway.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_0" +} \ No newline at end of file diff --git a/test/Sports/Blood_rule.json b/test/Sports/Blood_rule.json new file mode 100644 index 0000000000000000000000000000000000000000..be98ee19698c9b0a3906349a13bc4875eac6a83b --- /dev/null +++ b/test/Sports/Blood_rule.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "A blood rule is a rule used in many sports that generally states that an athlete that receives an open wound, is bleeding, or who has blood on them or their clothes, must immediately leave the playing area to receive medical attention. Though they may be able to play again later, they cannot continue until the wound is taken care of, bleeding has stopped, and all contaminated equipment has been replaced. The main concern addressed by these rules is the spread of infectious diseases.\nSome sports where this is used are Australian Rules Football, NCAA Baseball, and some major American sports leagues.\nIn the National Rugby League, for example, play stops whilst the player's medical staff attends to the wound. If the bleeding is not stopped to the referee's satisfaction, the player must then leave the field for further attention. In sports such as association football, a player may leave the field without being substituted immediately, his team playing short-handed until he re-enters play, is replaced, or the match ends (if the injury cannot be satisfactorily healed and the team is out of substitutions).\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_1" +} \ No newline at end of file diff --git a/test/Sports/Combined_track_and_field_events.json b/test/Sports/Combined_track_and_field_events.json new file mode 100644 index 0000000000000000000000000000000000000000..dc10ccf6e682ea3084cc82b453e9595e0c3a587c --- /dev/null +++ b/test/Sports/Combined_track_and_field_events.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "Combined track and field events are competitions in which athletes participate in a number of track and field events, earning points for their performance in each event, which adds to a total points score. Outdoors, the most common combined events are the men's decathlon and the women's heptathlon. Due to stadium limitations, indoor combined events competition have a reduced number of events, resulting in the men's heptathlon and the women's pentathlon. Athletes are allocated points based on an international-standard points scoring system, such as the decathlon scoring table. Other longer combined events do exist, such as the icosathlon (double decathlon) for men and the tetradecathlon for women. Indoors, both men and women compete in the tetradecathlon, with slightly different events to the women's outdoor version.\nThe throws pentathlon consists of all four Olympic throwing events plus the weight throw. In Sweden, the \"Castorama\" is also contested, which consists of all throws except the weight throw.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_2" +} \ No newline at end of file diff --git a/test/Sports/Ground_billiards.json b/test/Sports/Ground_billiards.json new file mode 100644 index 0000000000000000000000000000000000000000..674a4ee69af2b7b981c2a442c479a2ff37356b61 --- /dev/null +++ b/test/Sports/Ground_billiards.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "Ground billiards is a modern term for a family of medieval European lawn games, the original names of which are mostly unknown, played with a long-handled mallet (the mace), wooden balls, a hoop (the pass), and an upright skittle or pin (the king). The game, which cue-sports historians have called \"the original game of billiards\",  developed into a variety of modern outdoor and indoor games and sports such as croquet, pool, snooker, and carom billiards. Its relationship to games played on larger fields, such as hockey, golf, and bat-and-ball games, is more speculative. As a broader classification, the term is sometimes applied to games dating back to classical antiquity that are attested via difficult-to-interpret ancient artworks and rare surviving gaming artifacts.\nDating back to at least the 15th century as a tabletop game,   and in recognizable form to as early as the 14th,  this proto-billiards game appears to have been ancestral to croquet (19th century), trucco (17th century; also known as trucks or lawn billiards), pall-mall (16th century), jeu de mail (15th century), and indoor cue sports (15th century if not earlier : what is usually meant by billiards today). The location of origin is obscure, with various scholars tracing it to medieval France, Italy, Spain, England, Germany, or more than one of these areas. More exotic and earlier origins have also been proposed. Even in the late 17th to early 18th centuries, indoor billiards was essentially the same game, with smaller equipment and played on a bounded table, with or without pockets.    Use of the king pin declined first in most areas, followed by the abandonment of the port arch, though many variants featured both as well as pockets,  while the king survived and even multiplied in some cases, leading to such modern cue games as five-pins. Some later stick-and-ball games, including cricket, also evolved multiple pin targets over time. Ground and table billiards were played contemporaneously,  and the outdoor version remained known until at least the beginning of the 19th century;  derived lawn games like croquet continue to the present day.\nThe game's relationships to bowling, golf, hockey, and bat-and-ball games are not entirely certain. It is clear that bowling, in its ancestral form of skittles, shares a common origin with ground billiards, as the two game types share both the basic objective, to direct a rolling ball towards one or more targets, and similar equipment, aside from the mace.  Some contemporary sources depict the same game being played both with the hand and with a mace, and show a distinctive teardrop-shaped king pin design,  with a rounded, wide bottom and a slender top. This pin shape suggests that it may have been the origin of the modern bottom-heavy design of bowling pins and similar skittles of various sizes used in a wide variety of games. A conical king or jack, or sometimes a spherical jack or pallino, as used in modern bowls, boules, bocce, and pétanque, has been employed in lawn-bowling games since at least as early as the 13th century in England; all these games have the same basic objective, to get as close to the jack as possible with one's own ball. Conical king pins are found in depictions and actual surviving game equipment (of carved stone) from Ancient Egypt.: ch. 1  Later equipment was typically made of wood, sometimes also with clay, bone, or ivory pieces.\nThe Dutch game het kolven, a precursor of golf dating to at least the early 13th century, seems to be intermediate between ground billiards on the one hand, and both golf and ice hockey on the other (and its name is etymologically cognate with golf). It was played in a wicker-bounded court during warm weather,  and on ice in the winter, like bandy. Players used maces (kolven) very similar to those shown in early ground billiards illustrations. At least one variant of it used holes in the ground, reminiscent of both golf holes and billiards pockets, instead of above-ground targets.  The modern version, kolf or kolven, uses a tall, flat-bottomed king pin (paal, 'pole, stake').\nEngravings dating back to c. 1300  show a game being played that is an early variant of either ground billiards or one-on-one field hockey (assuming there was any significant difference other than game speed and vigour), sometimes within a bounded area. A similar game has survived to modern times, in the form of box hockey (which uses a flat puck in a confined space, and archways or \"mouse holes\" cut into wooden barriers, rather than stand-alone arches).\nThere are hints that ground billiards may be far more ancient than the Late Medieval period.  At least as early as 360 BCE, Romans played a somewhat golf-like game called paganica that could have degenerated to simpler, smaller-scale lawn games during the Dark Ages. Third century BCE Greece has also been proposed. Earlier still, a bas relief dating to c. 600 BCE depicts an ancient Greek ball game, a possible ancestor of both ground billiards and field hockey, which may have been called kerētízein or kerhtízein (κερητίζειν) because it was played with an implement shaped like a horn (kéras, κέρας). It appears to be basically the same as the Medieval European activity of c. 1300 CE.  An ancient Greek game said (in Leila Dorion's and Julia Shepherd's 1928 History of Bowling and Billiards) to be \"analogous to billiards\" was reported in Greek writings around 400 BCE, contemporary with the game's play.\nBilliards scholars Victor Stein and Paul Rubino conclude in The Billiard Encyclopedia that there is an unbroken chain of game evolution from very widespread prehistoric ball-and-stick games and rituals, through the civilizations of classical antiquity, to modern lawn and cue sports in Europe and Asia.: ch. 1  Even polo : a cavalry-training sport with origins among the Iranic peoples of the central Asian steppes and directly attested since at least the Parthian Empire (247 BCE : 224 CE) of Ancient Persia : is essentially the same core game as field hockey or team ground billiards, but played on horseback with a longer cue-mallet.  A set of gaming pieces, buried with a child dating to c. 3300 BCE in Egypt, features stone balls, skittles, and an arch (no cue/mace was included in the recovered artifacts).  Stein and Rubino, among other researchers, believe that games such as early ball-and-stick activities, chess, and many others were primarily brought into Europe from the Near East and Middle East by returning Crusaders from the 12th century onward, and that the pastimes were kept alive and evolving on that continent principally by the Christian clergy.: ch. 1  Ireland has also been proposed as a time and place of origin; the stick-and-ball game hurling (also called camogie, as a women's sport) dates to the 1200s there.\nLate medieval ground billiards is seen as the precursor of many later, more familiar outdoor and indoor games, including croquet and its variants, and table-based billiards games including snooker, pool (or pocket billiards, including nine-ball, eight-ball, etc.), pocketless carom billiards varieties, and the hybrid pocket:carom English billiards. Ground billiards is described as \"the original game of billiards\" by Michael Ian Shamos in The Encyclopedia of Billiards,  an assessment echoed word-for-word by Stein and Rubino.\nGames played with crook-footed sticks and a ball have been found throughout history around the world. For example, in Inner Mongolia in modern-day China, the Daur people have been playing beikou, a game similar to modern field hockey, for about 1,000 years.\nStein and Rubino also devote considerable historico-cultural analysis to the Ancient Egyptian lawn/court and board games with equipment similar to medieval European lawn billiards and to bat-and-ball games, and they speculate that for the Egyptians there may have been rich religious symbology involved. They note the resemblance of the games' ball, shooting stick, and king pin to the orb, sceptre or ceremonial mace (which originally had a crook at the top like a gaming mace), and crown of imperial regalia, which later were adopted by the pagan Romans and (in modified form) in turn by medieval rulers of Christendom. It is suggestive that games like ground billiards in the medieval Christian world were for centuries primarily the purview of and preserved by the clergy and the nobility, with peasant game-playing suppressed to the extent possible by many rulers, as unproductive.: ch. 1\nThe exact rules of game play, and whether these rules were consistent from region to region, are unknown. English rules recorded in Charles Cotton's The Compleat Gamester (1674), for an indoor version played on a billiards table, indicate that the general offensive goal of the game is to use a club-like cue, called the mace or tack, to drive one's own ball through a hoop, called the pass, port, argolis, or ring, thus earning a chance to shoot at the upright king pin or sprigg, and to use defensive position play to thwart an opponent's ability to do likewise, e.g. by kissing an opposing ball to an unfavorable location  (still a key strategy in many cue sports and lawn games). Points were scored for touching the king pin with one's ball without knocking the pin over (which would cost the loss of a point). Games were played to a set number of points, such as five or seven, and could be between two (or sometimes more) individual competitors or doubles teams, each with one ball. Neutral object balls were not mentioned in Cotton's work or depicted in any contemporary illustrations. Cotton's indoor version made use of pockets in the sides of the table as hazards, with additional scoring opportunities, and some outdoor ground-billiards courts may have used golf-style holes for the same purpose.An outdoor form of the game that survived until the early 20th century was trucco. Its rules were covered in popular works like the Victorian advice book Enquire Within upon Everything, which also called it simply \"lawn billiards\" (and which covered the related game croquet separately). Trucco, in this well-documented form, was played in a round area at least 8 yards (7.3 m) in diameter by two players (or more, in two teams). The game used large, heavy balls and iron-headed maces like giant spoons which were used to toss rather than roll one's ball toward the port, by this stage a freely rotating metal ring mounted on a stake and almost flush with the ground. Scoring shots included passing one's ball through the port, and striking an opponent's ball with one's own (a cannon or carom shot, in billiards terms, or in croquet called a roquet). Part of the strategy of this form of the game was using such shots to get close enough to the port for a shot at it to be easier (failing to go dead-center would likely result in not just a miss but rotation of the ring to an unpredictable position, or even in knocking the ring down, which was a foul with a penalty). A prior form, illustrated in an early-17th-century English painting, shows a smaller, rectangular court, and only one ball between two players. Some continental European forms did involve a king pin.\nThe balls, mace, and other equipment for ground-billiards games were probably most commonly made of wood. The Complete Gamester, covering only the indoor variant favored by the wealthy, recommended hardwood such as lignum vitae for maces, and expensive ivory for balls and other equipment, but ivory's fragility would have made it impractical for the larger-scale and more forceful outdoor version of the game. Enquire Within suggested lignum vitae or boxwood for the balls. Early king pins were sometimes made of bone. Clay was also popular for balls in such games (including lawn-bowling varieties). Some illustrations suggest port hoops made of decorative wrought iron, while others are clearly of wood, stone, or another carved substance, and later examples are thin and wiry, similar to modern croquet hoops (wickets). The nature of the mace appears to move from crude to elegant over time, with earlier illustrations showing simple hammer- or crook-like implements, with players stooping, while later woodcuts and tapestries show a long, thin device more like a golf putter, and in basic form very similar to later, and more delicate and ornate maces used for table billiards before leather-tipped straight cues became the norm in those games. Similarly, the nature of the playing court appears to have evolved, beginning as any informal patch of ground, and becoming carefully delimited courts of turf or clay bounded by low (often wicker) barriers.: ch. 1  Trucco, as an informal game played mostly at pubs and country houses, could be played anywhere the ground was relatively flat (the conventional Victorian rules simply called for at least 4 yards (3.7 m) from the outer edge of the playing area to the ring on every side). Most woodcuts and other illustrations of ground-billiards games show two players. A few show more (typically waiting and observing on the sidelines), but it is unclear if these represent teams, doubles, individual players in a many-player game, or people waiting their turn.\nA mid-20th-century version of ground billiards (aside from the aforementioned box hockey) has been played on a 30 by 60 ft (approximately 9 by 19 m) clay court.  This may have been an influence from croquet, as roque, an early-20th-century Olympic variant of croquet, used a court of the same dimensions.The term \"king pin\" or \"kingpin\", which today may refer to essential components of any system, from bosses of organized crime syndicates to the main support bolt in the axle assemblies (trucks) of skateboards, appears to derive from its usage as a key component of ground billiards, early skittle bowling, and related games. \nThe traditional green of billiards, pool, and snooker cloth represents a green lawn, and the earliest indoor table-top billiards games were played on a patch of turf brought indoors and put in a raised box, an idea first recorded in the court of King Louis XI of France (1461:1483).\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_3" +} \ No newline at end of file diff --git a/test/Sports/Lamex_Omara_Apitta.json b/test/Sports/Lamex_Omara_Apitta.json new file mode 100644 index 0000000000000000000000000000000000000000..8ff36a594aedcefa37763d3a02b034c9d2564a2a --- /dev/null +++ b/test/Sports/Lamex_Omara_Apitta.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "Lamex Omara Apitta is a Ugandan Civil Servant, economist, policy analyst and a sports administrator/organizer. He was the commissioner of Physical Education and Sports at the Ministry of Education and Sports. He is currently serving as a member at Uganda Human Rights Commission after his appointment by the President of Uganda.\nHis father (Nikaroni Apitta) was the founder of Boroboro Tigers FC who died in 2017. He holds a MBA, M.A in Public Administration and Management, and a Post Graduate Diploma in Sports Management.He served as the Commissioner of Physical Education at the Ministry of Education and Sports before resigning. He currently serves as a member at Uganda Human Rights Commission.He has served at the Uganda Advisory Board of Trade (Now defunct) as Personnel Officer, the Ministry of Energy and Environment Protection and established the Department of Energy Conservation as the Caretaker Head of the Department in-the-making, and he was part of the NEAP team that worked to create the National Environment Management Authority (NEMA) for Uganda.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_4" +} \ No newline at end of file diff --git a/test/Sports/Revival_(sports_team).json b/test/Sports/Revival_(sports_team).json new file mode 100644 index 0000000000000000000000000000000000000000..e3b5b6bd308e9576670c2832eb33eb7fc9ece644 --- /dev/null +++ b/test/Sports/Revival_(sports_team).json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "In sports, a revival is a new club or franchise is using a name or colours of a previously active team. The previously active team may be defunct, temporarily suspended or may have transferred its operations to another city. The new team may be a new team or franchise, or it may be a transferred team taking over a previous team's colours and/or name. Sports teams names or nicknames are copyrighted in North America and elsewhere. Therefore, permission often must be granted from the owner or family of the defunct team.\nSports teams are organized in various ways and the term is used differently in different situations. A team can be simply not fielded for a season, but the parent organization still exists. A team and franchise can relocate to another city, and adopt a new nickname. At some point, sometimes decades later, a new team, with a new organization, then revives the team, name or colours in the original city. It may or may not be granted possession of the original team's history (team records, championships and the like)A team can be members of a sports association that fields several teams. A team at one level may be discontinued, then 'revived' in another year, such as the Central Plains Junior hockey team in 2012, after the team did not field a team in the AAA midget bracket the previous season.In professional sports in North America, there are several examples whereby a team relocated, taking its franchise and franchise history with it to the new city. The teams were renamed and used a new nickname. The revived teams were not granted possession of the old team's history.Major League Baseball\nThe Milwaukee Brewers are named after an earlier club, which relocated to St. Louis, Missouri and eventually became the Baltimore Orioles, and a minor-league club named the Brewers. The Baltimore Orioles are named after an earlier club, which relocated to New York, New York and became the New York Yankees. The Washington Nationals are named after an earlier club, which relocated to Minneapolis, Minnesota and became the Minnesota Twins.\nNational Hockey League (NHL)\nThe Ottawa Senators ice hockey team is named after an earlier Senators ice hockey team. Founded in 1883, the team was a member of the National Hockey League (NHL) from 1917 to 1934. After the 1933:34 season, the NHL franchise relocated to St. Louis, Missouri. The Ottawa Senators continued as a senior amateur, and later a professional, team until 1954. The founders of the current franchise received permission from the descendants of Tommy Gorman, who owned the Senators in 1954, to use the name. The new Senators also adopted the colours of the original franchise.\nIn 2011, the Atlanta Thrashers were sold and relocated to Winnipeg, Manitoba, where the team was renamed the Winnipeg Jets. The 'original' Winnipeg Jets team existed from 1972 to 1996 until it moved to Phoenix in 1996 to become the Phoenix Coyotes. The Jets' team name and trademarks had reverted to the possession of the NHL after the move, although the franchise history (retired jerseys, team statistics) is continued by the Coyotes. While the new team revived the Jets name, new jerseys and team colours were developed.\nIn two cases, a newly granted franchise has revived a team that was inactive, and has been granted the rights to the previous team's history:The Cleveland Browns were a professional football team from 1946 until owner Art Modell moved the club to Baltimore in 1995. However, in a deal with the NFL and the City of Cleveland, the team was declared inactive for three years until a new expansion club, under the old name and colors, was established in 1999. The new Browns are considered a continuation of the old franchise.\nThe Montreal Alouettes are named after an earlier franchise which became defunct in 1981. The Baltimore Stallions, which were formed through expansion, relocated to Montreal after playing in Baltimore from 1994 until 1996. The CFL considers all clubs that have played in Montreal since 1946 as one franchise in their league records, including those of the original Alouettes (1946:1981), Montreal Concordes (1982:1985) and Montreal Alouettes (1986). The Alouettes and the CFL, however, do not recognize the Baltimore franchise, or its records, as part of the official team history.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_5" +} \ No newline at end of file diff --git a/test/Sports/Sporting_colours.json b/test/Sports/Sporting_colours.json new file mode 100644 index 0000000000000000000000000000000000000000..c33b9108831df3c29d47376cf279f56cd8a88fd6 --- /dev/null +++ b/test/Sports/Sporting_colours.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "Sporting colours or just colours (sometimes with a modifier, e.g. club colours or school colours) are awarded to members of a university or school who have excelled in a sport. Many schools do not limit their use to sport but may also give colours for academic excellence or non-sporting extra-curricular activities, Colours are traditionally indicated by the wearing of a special tie or blazer.\nMany university colours are known by the name of the colour used, which is usually the colour worn by the university's sports teams, e.g. Blue at Oxford and Cambridge, Palatinate at Durham, Pink at Trinity College Dublin or Red at Bristol. These are similar to the varsity letters awarded by American universities.\nThe level of representation required for the award of a colour varies between the different schemes. A full Palatinate at Durham, a Royal Blue at Liverpool or Full Colours at Cardiff require a student to have represented their country, while at Oxford the requirement for a full Blue is to have represented the university in a varsity match against Cambridge in an eligible sport. In many colour award schemes, it is possible to receive a half colour. These are normally given for lower levels of achievement than a full colour.\nUniversity colours were first introduced in the second University Boat Race between Oxford and Cambridge in 1836. Durham adopted palatinate purple for its degree hoods at about the same time. At Cambridge, teams would seek permission of the boat club to use their blue colour; by the 1860s the established sports with full blue status were rowing, cricket and athletics. In 1884, the rugby and football clubs awarded themselves blues following their varsity matches (against Oxford), leading to a debate at the Cambridge Union that was decisively lost by the boat club. The hockey club also gained full blue status (in 1894) before the system was formalised by the establishment of the blues committee in 1912.The award of Palatinates for sports at Durham dates to at least 1883, when the cricket \"Eleven\" were permitted to wear the \"university coat\" (i.e. blazer) of palatinate purple rather than the claret coat of the club, and the award of both Palatinates and half Palatinates was well established by the end of the century. Manchester adopted maroon in 1905. Trinity College Dublin adopted Pink in 1950.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_6" +} \ No newline at end of file diff --git a/test/Sports/The_Foundation_for_Global_Sports_Development.json b/test/Sports/The_Foundation_for_Global_Sports_Development.json new file mode 100644 index 0000000000000000000000000000000000000000..5ab67beda9fbd0e7cdeb5f362991f8c49d157bf8 --- /dev/null +++ b/test/Sports/The_Foundation_for_Global_Sports_Development.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "The Foundation for Global Sports Development is a 501(c) organization which creates and supports programs promoting sportsmanship, education, fair play and ethics for children around the world. Attorney David Ulich is president of the foundation and author and psychologist Steven Ungerleider is vice president of the board of the foundation.\nIn 2015, the foundation pledged $75,000 to the International Paralympic Committee (IPC) in order to spread education and awareness about the IPC's efforts in the United States.The foundation helped fund the film Munich ’72 and Beyond about the Munich massacre released in 2016, as well as a memorial to the 11 Israelis that were killed by terrorists at the 1972 Munich Olympics. The film has been nominated for an Emmy in the Outstanding Category of the 38th Annual News & Documentary Awards.\nIn April 2017, the foundation co-hosted a symposium on anti-doping issues in sport at Pepperdine University in Malibu. Sir Philip Craven, president of the International Paralympic Committee delivered the keynote speech.\nThe Foundation for Global Sports Development founded the Playmakers Program which works with youth programs to bring kids to the Olympics. The program sent 50 at-risk kids that attended the Boys & Girls Clubs of San Francisco to the Vancouver Olympics in 2010. In 2012, the foundation worked with SOS Outreach to help a group of teens go to the Olympics in London through the Playmakers program. In 2016, 50 teens from the Denver area participated in a three day trip to the Olympic Training Center in Colorado Springs through the Playmakers program.The foundation's team of champion ambassadors works with youths worldwide through mentorship programs and motivational speeches as well as podcasts and blogs. In 2016, Candace Cable, a Paralympian, was included on the team of champion ambassadors.\nThe foundation partnered with the Agitos Foundation to support projects with National Paralympic Committees in 2015. In 2016, 49 coaches from 23 countries received training in the \"Elite Para Powerlifting Coaching Course\" supported by the Agitos Foundation and the Foundation for Global Sports Development in preparation for the Rio 2016 Paralympic Games.Since 2013 the foundation has partnered with the World Curling Federation to present the Olympic Celebration Tour. This tour helps generate interest in the sport of curling by bringing an Olympic curler to member associations and curling clubs around the world.\nThe foundation established the Athletes in Excellence Award, which honors competing and retired athletes around the globe who have been leaders and champions in sport as well as in their communities. In 2015, the honor was awarded to 12 athletes around the world. The foundation awards the recognized athletes with a $10,000 unrestricted grant to further service and career goals.The organization also gives a Humanitarian Award to leader and champions for social, economic, political or environmental justice and equality. In 2010, the award was given to Richard W. Pound, the founding chair of the World Anti-Doping Agency. The award went to Philip Craven the IPC president, in 2012. In 2014, the organization honored Arne Ljungqvist, the chairman of the medical commission of the International Olympic Committee (IOC) and former vice chairman of the World Anti-Doping Agency. In 2016, the award was given to Anita DeFrantz of the IOC.\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_7" +} \ No newline at end of file diff --git a/test/Sports/The_Sporting_Spirit.json b/test/Sports/The_Sporting_Spirit.json new file mode 100644 index 0000000000000000000000000000000000000000..2ac771ffe52608ee6a9b567073ce1276c25548ac --- /dev/null +++ b/test/Sports/The_Sporting_Spirit.json @@ -0,0 +1,59 @@ +{ + "domain": "Sports", + "document": "\"The Sporting Spirit\" is an essay by George Orwell published in the magazine Tribune on 14 December 1945, and later in Shooting an Elephant and Other Essays, a collection of Orwell's essays published in 1950. The essay was written on the heels of the 1945 tour of Great Britain by the Soviet football team FC Dynamo Moscow. The essay became famous for Orwell's description of international sporting competitions as \"war minus the shooting\", a phrase that has since been used as a metaphor for sports when referred to in popular media and for actions evoking hyper-nationalism and national pride.\nOrwell uses the examples of football, cricket, and boxing to argue that sport, while never intended to generate bonds of friendship, generates politicized and hyper-nationalistic emotions that can only stoke ill-will between nations.\nOrwell wrote \"The Sporting Spirit\" in 1945 close on the heels of the publication of Animal Farm the same year. While Orwell was not known to have written extensively about sport earlier, the essay was considered to be in recognition of the political symbolism that sport represented as a tool that could invoke feelings of hyper-nationalism. The essay represented some of Orwell's own hostile attitude towards the Stalin regime in the Soviet Union, as drawn out by his response to the 1945 tour of Great Britain by the Soviet football team FC Dynamo Moscow. The tour itself was considered groundbreaking and came after the combined Allied victory in World War II. While the tour was seen as an opportunity for the English to see the sport behind the Iron Curtain, on the Soviet side there was a meeting that the team members had with Stalin along with Lavrentiy Beria, chief of the Soviet secret police and patron of the football club where the need for victory over the capitalist opponents was emphasized.Orwell starts the essay with a critical view on the then just concluded Great Britain tour by the Moscow-based football club, Dynamo Moscow, and makes the assertion that the events during the tour eroded whatever little goodwill existed between the Soviets and the British. He specifically notes the incidents during the game between the visiting side and the Arsenal team where two of the players came into blows on the pitch, and a later game with Rangers that was a \"free for all\" before the visiting team ended the tour refusing to play an all-England team. He summarizes his view of the tour as an exercise that only created fresh animosity between the sides and viewpoints that varied based on the position on the political spectrum a person was on.Orwell does not hide his contempt for using sport as a metaphor for creating goodwill between international sides be it in cricket, football, or even the Olympic Games and says that sport was never intended to create bonds of friendship between nations. He cites the example of the 1936 Summer Olympics held in Berlin, as an international event that generated \"orgies of hatred\".\nHe uses cricket as an example and goes on to say that a game as graceful and as well mannered as it is on the outside is prone to hyper-competitive events like the Bodyline series, or the behaviour of the visiting Australian cricket team in England in 1921. He calls sports like football and boxing as being significantly worse, specifically calling out boxing games between the whites and the \"coloured\" boxers in front of cheering mixed crowds as being amongst the most horrible sights. He further goes on to emphasize the role of competitive sport in younger nations where the notion of nationalism as well as competing in games at a national level is relatively new. He uses the examples of Burma, India, and Spain to talk about riots and violence that break out in football games that often require riot police to temper. He does not spare the audiences either and accuses them of being charged with jingoism as they cheer their own and attempt to rattle out the opposition. It is here that Orwell makes an assertion that sport does not have much to do with fair play and it encourages a perverse pleasure in watching violence and calls it as \"war minus the shooting\".\nOrwell goes on to talk about the evolution of sport from the ancient Roman times, but the notion of national rivalry as a relatively newer addition. He further calls the financial motivations in countries like the United Kingdom and the United States, as another reason for degeneration of the sport to events that can generate and arouse savage passions in the quest to attract the maximum crowds. He calls this shift in sport as being bound to the rise of nationalism, the urge to associate with the larger power units and seeing all of the actions as contributing to a nation's \"competitive prestige\". He returns to the rivalry between nation states and says that one could not do worse than organising games between traditional rivals like the Germans and Czechs, Indians and British, Russian and Poles, or Jews and Arabs, and hoping for the game to better the relations between the groups, arguing that the politically charged hyper-nationalistic events would only increase the ill-will between the groups.\nOrwell returns to the tour of Dynamo Moscow, and makes the case that Britain should very much send a team to the Soviet Union, but, it should be a \"second rate\" team which would stand no chance of winning. He ends the essay by saying that there are sufficient troubles in the world already and Britain should not add to them by \"encouraging young men to kick each other on the shins amid the roars of infuriated spectators.\"\n", + "RE_label_set": [ + "SharesBorderWith", + "HasPart", + "OwnerOf", + "NominatedFor", + "OfficeHeldByHeadOfState", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AcademicDegree", + "AwardReceived", + "InfluencedBy", + "NamedAfter", + "SignificantEvent", + "PositionHeld", + "Uses", + "AppointedBy", + "UsedBy", + "InOppositionTo", + "HasQuality", + "LocatedIn", + "HasParts", + "PartOf", + "HasEffect", + "Author", + "Partner", + "PublishedIn", + "CountryOfCitizenship", + "HeadquartersLocation", + "Organizer", + "MemberOf" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Sports_8" +} \ No newline at end of file diff --git a/test/Technology/Creative_technology.json b/test/Technology/Creative_technology.json new file mode 100644 index 0000000000000000000000000000000000000000..c4083598f8b37b9901c6f380c64edc758202abc6 --- /dev/null +++ b/test/Technology/Creative_technology.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "Creative technology is a broadly interdisciplinary and transdisciplinary field combining computing, design, art and the humanities. The field of creative technology encompasses art, digital product design, digital media or an advertising and media made with a software-based, electronic and/or data-driven engine. Examples include multi-sensory experiences made using computer graphics, video production, digital music, digital cinematography, virtual reality, augmented reality, video editing, software engineering, 3D printing, the Internet of Things, CAD/CAM and wearable technology.\nIn the artistic field, new media art and internet art are examples of work being done using creative technology. Performances, interactive installations and other immersive experiences take museum-going to the next level and may serve as research processes for humans' artistic and emotional integration with machines. Some believe that \"creativity has the potential to be revolutionised with technology\", or view the field of creative technology as helping to \"disrupt\" the way people today interact with computers, and usher in a more integrated, immersive experience.\nCreative technology has been defined as \"the blending of knowledge across multiple disciplines to create new experiences or products\" that meet end user and organizational needs. A more specific conceptualization describes it as the combination of information, holographic systems, sensors, audio technologies, image, and video technologies, among others with artistic practices and methods. The central characteristic is identified as an ability to do things better.Creative technology is also seen as the intersection of new technology with creative initiatives such as fashion, art, advertising, media and entertainment. As such, it is a way to make connections between countries seeking to update their culture; a winter 2015 Forbes article tells of 30 creative technology startups from the UK making the rounds in Singapore, Kuala Lumpur and New York City in an effort to raise funds and make connections.\nCreative technology facilities may be organized as arts, research or job development entities, such as the UK's Foundation for Art and Creative Technology which has presented hundreds of new media and digital artworks from around the world, or a recently established $20.5 million project in Hawaii specializing in film industry job training and workforce development programs which plans to offer robotics, computer labs, recording studios and editing bays, pitched as a \"game-changing\" opportunity to bring new skills and jobs to Kauai. Degrees in this field were designed to address needs for cross-disciplinary interaction and aim to develop lateral thinking skills across more rigidly defined academic areas. Some educators have complained that creative technology tools, though \"widely available\", are difficult to use for young populations.The first major corporation to have a corporate officer bearing the title creative technology was The Walt Disney Company, which gave it first to the imagineer, Bran Ferren in 1993, who eventually became Disney's president of creative technology in 1998. At about the same time, the first educational research center in the United States was created to bridge these disciplines across industry, academia and the defense communities, designated the University of Southern California's, Institute for Creative Technologies. The ICT was established with funding by the US Army.\nMarketers and advertisers are also looking toward the power of creative technology to re-engage customers. The UK's Marketing Agencies Association is promoting creative technology as a way to build a more connected and personalized engagement with prospective customers, which launched a Creative Technology Initiative in early 2015. Industry associations and developers, arts organizations and agency creatives alike call for more investment in technology, which has lagged behind the sea change in the industry that is introducing more technology into creative fields such as Google. Many advertising agencies and other businesses have begun to create internal labs for research in creative technology. For example, Unilever created its Foundry Project as a way for the company to \"embrace the mentality of hacking, deploying and scaling\"; they share their discoveries and view the lab as a way to incorporate technology into the company, drive experimentation and engage with strategic partners. The Adobe Creative Technologies lab collaborated with the MIT Media Lab, one of the most notable endeavors in the creative technology field, to give artists the ability to draw geometric designs with a computer without having to master text-based programming or math.\n\"Creativeapplications.Net (CAN) is a community of creative practitioners working at the intersection of art, media and technology.\"A pepper grinder that disabled wifi in the household when twisted was introduced by the head of creative technology at agency Clemenger BBDO.\nZKM has an annual prize for creative apps, the App Art Awards\nITP (the Interactive Telecommunications Program) has a class in \"Creative Computing\"\n\"The Eyeo Festival brings together a rich intersection of people doing fascinating things with technology. Artists, data designers, creative coders, AI & XR explorers, storytellers, researchers, technology & platform developers all cross paths and share inspiration at Eyeo\"\nArtist Jake Lee-High created an interactive street experience for the premiere of Showtime (TV network) Penny Dreadful\n\"Fake Love promotes major brands with immersive, wildly imaginative multimedia spectacles, from light-projected racetracks for Lexus to virtual reality (VR) videos for the New York Times Company\"\nThe works of Becky Stern, an electronics and fashion artist based in New York City.\n\"You’re waving your hands in-front of a big screen and the designs and patterns mimic your movements; You walk into a company’s lobby and a digital wall displays a beautiful, abstract visualization based on the company's sales data\"\nFIT has an annual Creative Technology Exhibition\nProfessionals who work in the field of creative technology tend to have a background as developers and may work in digital or entertainment media, with an advertising agency or in a new electronic product development role. In an advertising agency setting, a professional with a job description including creative technology may be a designer who became interested in technology, or a developer who focuses on the bigger picture of experience design. Department heads in creative technology may be charged with integrating new technologies into the agency's departments, leveraging partnerships with cutting edge providers and platforms. For example, the head of creative technology at Grey Global Group in New York \"created an in-house lab... which highlights new tech each month with exhibits, events and workshops.\" Members of the team may have the ability to both write computer code and build electronics for prototypes.The creative technologist job title is likely to refer to a developer who understands the creative process and (often) the world of advertising. The person is actually making and coding and may be building web projects, mobile apps and other digital experiences. They are trying out new concepts and ideas, and modifying; this is recognized as similar to the artistic process but applied to media, advertising and other creative industries. Creative technologists have been referred to as technology-focussed individuals who either sit within or work closely with the creative team, recognizing that siloed departments of technology and design have historically led to bad agency work. Responsibilities described in a 2014 job posting for \"Creative Technologist\" at Google included \"collaborating on the ideation and development of 'never been done before' digital experiences in partnership with top brands and agencies\", and \"contributing to the development of cutting edge prototypes in the field of creative technology\". There are several resources that list companies that work in the field of creative technology.\nA Master or Bachelor degree in creative technologies or creative technology is a broadly interdisciplinary and transdisciplinary course of study combining fields of computer technology, design, art and the humanities. Established as a modern degree addressing needs for cross-disciplinary interaction, one of its fundamental objectives is to develop lateral thinking skills across more rigidly defined academic areas recognized as a valuable component in expanding technological horizons. The Creative Technology & Design (CT&D) subject area at Fashion Institute of Technology offers specialized courses and both credit and non-credit programs. According to FIT's web site, the mission of this transdisciplinary subject area is to elevate students’ understanding of advanced design concepts, as well as their command of cutting-edge technologies. The Creative Technology 2-year portfolio program at Miami Ad School description reads, \"You are a techie with creative passion and talent : or : a creative with a knack for tech...It's about how we integrate machine learning and artificial intelligence into a creative environment\". Creative Technology is also seen as an industry and skill set for the emerging economy, as in this quote by a University of Texas at Austin dean at the opening of a new school at the University presumed to become the largest academic unit in the college: \"The School of Design and Creative Technologies moves UT Austin more assertively into emerging creative, commercial disciplines that are driving culture and economies in the 21st century\".", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_0" +} \ No newline at end of file diff --git a/test/Technology/Developer_relations.json b/test/Technology/Developer_relations.json new file mode 100644 index 0000000000000000000000000000000000000000..9a1c0f8f6d6e889b1e87ce3567d444b51fe5655e --- /dev/null +++ b/test/Technology/Developer_relations.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "Developer relations, abbreviated as DevRel, is an umbrella term for practices employed by an organization that builds developer-facing software to connect with the developers that use that software. Developer relations is a form of platform evangelism and the activities involved are sometimes referred to as a developer program or a DevRel program. DevRel programs often include the following:\nDeveloper marketing: Outreach and engagement activities to create awareness and encourage developers to use a product.\nDeveloper education: Product documentation and resources such as videos to aid learning a product.\nDeveloper experience: Often referred to as \"zeroth customer\" and \"friction logging\", devrel programs include using the product directly, finding problems, and improving the developer experience.\nDeveloper success: Activities to nurture and retain developers as they build and scale with a product.\nCommunity: Events, forums, and social groups around the product.\nApple is considered to have created the first DevRel program in the 1980s, starting with Mike Murray, who coined the term software evangelist to persuade third-party developers to develop software and applications for the Macintosh platform. Mike Boich was Apple's first Software Evangelist for the Macintosh project and hired Guy Kawasaki who would become Apple's Chief Evangelist and popularize their DevRel program.In 1997, the Microsoft Developer Relations Group created and distributed resources aimed at advancing Microsoft’s success through the support of independent software vendors (ISVs). This strategy, detailed in presentations and emails, focused on facilitating the development and distribution of applications based on the Windows platform. The success of evangelists was measured by the amount of Windows applications their ISVs built and marketed. \nIn the following decades many companies formed DevRel programs. In the 2010s companies like New Relic, Twilio, EngineYard, and SendGrid branded DevRel programs as a \"Developer-First approach\".\nDevRel theoretically intersects engineering, marketing, product management, and community management.There are several different types of roles/job titles in DevRel including:\nDeveloper Advocates (aka Developer Evangelists): Focus on getting the word out (i.e., evangelizing) through various means such as speaking at conferences, attending meetups, hosting hackathons, creating code samples, building webinars, hosting virtual office hours and/or advocating by acting as a liaison between the community and internal product teams. They likely have coding experience and may collect feedback, create demos/code samples, or find solutions to issues with the product.\nDeveloper Experience (DX) Practitioners: Own user experience initiatives for products developers use. DX encompasses both products and documentation, and DX practitioners may deal with SDK or API design, onboarding flows, and documentation.\nTechnical Community Managers: Community managers who focus on conversations of a technical nature, about technical aspects of a product. They may identify and track opportunities for Developer Advocacy teams to educate and inspire their peer developers.\nDeveloper Marketers: Target and capture software developers' attention to grow awareness, adoption and advocacy of tools, solutions, and platforms. They focus on solving real-world problems by providing solutions to help developers improve their workflows and increase development efficiency. They also facilitate developer advocacy by empowering and evangelizing developers to champion a target product.\nTechnical Writers: Technical writers produce content such as online help, manuals, white papers, etc. A technical writer is often considered a DevRel role.\nDevRel practitioners may report to different groups within an organization : both technical and non-technical. In a 2021 survey, DevRel practitioners when asked \"Which department does your DevRel team report to?\" answered the following:Annual salaries for DevRel practitioners vary from less than US$50,000 to over $250,000 in some cases. A survey from 2021 indicates that the largest segment of annual salaries was between $100,000 and $150,000.Organizations which practice DevRel may be Developer-first or Developer-plus (aka Dev +) depending on their primary business model. Developer-First companies (e.g., Stripe, Camunda, PerceptiLabs, Unity, and Twilio) have a business-to-developer model (B2D) focused on selling products specifically designed to be used by developers. Developer-Plus companies (e.g., Slack, Spotify, Apple, Qualcomm, and Santander) tend to be business-to-business (B2B) or business-to-consumer (B2C). While the primary focus of Developer-Plus companies is to create and sell products for businesses or consumers, they also make products or services available to developers which benefit or enhance their strategy including: opening new market channels, creating new use cases, contributing to innovation strategies, or optimizing/enhancing existing products.In 2021, a survey showed that 63.6% of organizations with DevRel programs were Developer-Plus, and 36.4% were Developer-First.\nRegardless of Developer-Plus or Developer-First, companies are recognizing the growing power developers have in influencing purchasing decisions. This includes new companies focused on making tools for developers, and existing companies whose primary focus was elsewhere, which are now recognizing the developer opportunity. Thus, business leaders are now involved in starting new DevRel programs at their companies or increasing the impact of their existing programs.Products or services targeted at developers comprise an estimated $49 billion (in 2021) Developer-Led landscape that spans many categories including:\nSoftware Delivery Lifecycle (SDLC): SDLC solutions for processes such as designing, developing, and testing software.\nDev Tools: Tools for building software.\nDev Infrastructure: Hardware and software that support the distributed, repeatable construction of software.\nDev Platforms: Developer-interfacing, code-first, and API-only runtimes.\nTwilio, is an example of a Developer-First company, and more specifically an API-first company, that helped to shape the API economy (business models and practices designed around APIs), popularize DevRel programs, and became known for platform evangelism. Notably, their three-word billboard in Silicon Valley that simply said: \"Ask Your Developer\", followed by the Twilio logo, is credited with having started conversations between executives and developers in strategic decision making.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_1" +} \ No newline at end of file diff --git a/test/Technology/Food_model.json b/test/Technology/Food_model.json new file mode 100644 index 0000000000000000000000000000000000000000..740b4db512b02f9a17d7fde79a36b7d21a716e41 --- /dev/null +++ b/test/Technology/Food_model.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "Food models, also known as fake foods, food figurines or \"food samples\" , are scale models or replicas of a food item or dish made from plastic, wax, resin, or a similar inedible material. They are commonly used as mockups in restaurant display windows and shelves in Japan, although other countries like South Korea and China also use such models for similar purposes in restaurants, food booths, and food carts.\nUsing food models allow food vendors to advertise to consumers a three-dimensional image of their products, while avoiding the need to put real food on display unattended for prolonged periods of time, which can get contaminated, spoiled, or attract unpleasant pests like flies, cockroaches and ants.\nIn Japan, shokuhin sampuru, taken from the English \"sample\", are widespread. In the late Edo period, in the 1800s, food sellers displayed a plate of real food each day in lieu of a written menu. During the early Shōwa period, in the late 1920s, Japanese artisans and candle makers developed food models that made it easy for patrons to order without the use of menus, which were not common in Japan at that time. Paraffin was used to create these until the mid-1980s, but because its colors faded when exposed to heat or sunlight, manufacturers later switched to polyvinyl chloride, which is \"nearly eternal\".The plastic models are mostly handmade from polyvinyl chloride and sculpted to look like the actual dishes. The models can be custom-tailored to individual restaurants and even common items such as ramen can be modified to match each establishment's food or regional differences. During the molding process, the imitation ingredients are often chopped up and combined in a manner similar to actual cooking.\nMany restaurants in Japan use replicas to display their popular dishes in their windows and attract customers. The plastic food manufacturers fiercely guard their trade secrets as business is lucrative; the plastic food industry in Japan, by conservative estimates, has revenues of billions of yen per year. A single restaurant may order a complete menu of plastic items costing over a million yen (equivalent to about 7,900 Euros or US$ 9,600). The plastic replicas are much more expensive than the food they imitate, but can last indefinitely. For this reason, many companies that manufacture fake food have stagnant or declining profits. Because some individual pieces can be very expensive, sometimes restaurants rent the pieces instead of buying them outright. They are also sold to the general public in some retail stores in Tokyo's \"Kitchen Town\" restaurant supply district. \nThe craftsmanship has been raised to an art form. Japanese plastic food models by the Maizuru Company were exhibited at London's Victoria and Albert Museum in 1980. Regular competitions are held in making fake food dishes out of plastic and other materials.\nFake and replica foods are used in many ways, such as props for backgrounds in movies, television shows, theatrical plays, television commercials, print ads, and trade shows. Food models are also used to display lifelike replicas of real foods for restaurants, grocery chains, museums, banquet halls, casino buffets, cruise ships, and in many other instances in which real foods cannot be displayed. For instance, the American company Fake Foods began when fast food restaurants Wendy's needed artificial kale for their salad bar display.In the 2010s, models of foods and dishes were also used for nutrition education and consumer research.\nIn North America, fake food is often used for retail displays. Furniture retailers use it in showrooms (such as a bowl of fake apples) to give their furniture settings a lived-in look.\nSometimes at weddings, the bride and groom opt to have an elaborately decorated dummy wedding cake for show while everyone is served slices of sheet cake.\nModern manufacturing technologies and high quality plastic materials provide realistic-looking fake food replicas, but approximately 95% of all fake food is still handcrafted. Artisans and highly trained craftsmen make realistic fake food, often painting them by hand to create a realistic look and feel.\nWhen fake food is made using a mold, the mold is created by dipping real food into silicone. A liquid plastic, typically polyvinyl chloride, is chosen in a color that matches the food, before being poured into the mold and heated in an oven until it solidifies. (When a food sample is not available or would disintegrate or melt in the mold during casting, a clay model of the food must instead be sculpted.) After setting for ten to thirty minutes, any excess vinyl buildup is trimmed off, and the replica is painted either by hand or airbrush. If the food comprises several parts, such as a hamburger or sushi roll, the item is assembled from separate vinyl pieces.\nWhile some large-scale fake food manufacturing companies exist, others are small shops with a single proprietor. Fake food items can be found and purchased in Kappabashi-dori, the food supply street in Tokyo and also at Doguyasuji located in Namba, Osaka. Factories can be found in Gujō, Gifu. Iwasaki Be-I is the biggest plastic food manufacturer in Japan, founded by Takizo Iwasaki in 1932. Maiduru is another old and large manufacturer.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_2" +} \ No newline at end of file diff --git a/test/Technology/Geomatics.json b/test/Technology/Geomatics.json new file mode 100644 index 0000000000000000000000000000000000000000..26d91950655c59ae18b4d628daec8bccc6c3bf45 --- /dev/null +++ b/test/Technology/Geomatics.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "Geomatics is defined in the ISO/TC 211 series of standards as the \"discipline concerned with the collection, distribution, storage, analysis, processing, presentation of geographic data or geographic information\". Under another definition, it consists of products, services and tools involved in the collection, integration and management of geographic (geospatial) data. Surveying engineering was the widely used name for geomatic(s) engineering in the past. Geomatics was placed by the UNESCO Encyclopedia of Life Support Systems under the branch of technical geography.\nThe term was proposed in French (\"géomatique\") at the end of the 1960s by scientist Bernard Dubuisson to reflect at the time recent changes in the jobs of surveyor and photogrammetrist. The term was first employed in a French Ministry of Public Works memorandum dated 1 June 1971 instituting a \"standing committee of geomatics\" in the government.The term was popularised in English by French-Canadian surveyor Michel Paradis in his The little Geodesist that could article, in 1981 and in a keynote address at the centennial congress of the Canadian Institute of Surveying (now known as the Canadian Institute of Geomatics) in April 1982. He claimed that at the end of the 20th century the needs for geographical information would reach a scope without precedent in history and that, in order to address these needs, it was necessary to integrate in a new discipline both the traditional disciplines of land surveying and the new tools and techniques of data capture, manipulation, storage and diffusion.\nGeomatics includes the tools and techniques used in land surveying, remote sensing, cartography, geographic information systems (GIS), global navigation satellite systems (GPS, GLONASS, Galileo, BeiDou), photogrammetry, geophysics, geography, and related forms of earth mapping. The term was originally used in Canada but has since been adopted by the International Organization for Standardization, the Royal Institution of Chartered Surveyors, and many other international authorities, although some (especially in the United States) have shown a preference for the term geospatial technology, which may be defined as synonym of \"geospatial information and communications technology\".\nAlthough many definitions of geomatics, such as the above, appear to encompass the entire discipline relating to geographic information : including geodesy, geographic information systems, remote sensing, satellite navigation, and cartography :, the term is almost exclusively restricted to the perspective of surveying and engineering toward geographic information. Geoinformatics and Geographic information science has been proposed as alternative comprehensive term; however, their popularity is, like geomatics, largely dependent on country.\nThe related field of hydrogeomatics covers the area associated with surveying work carried out on, above or below the surface of the sea or other areas of water. The older term of hydrographics was considered too specific to the preparation of marine charts, and failed to include the broader concept of positioning or measurements in all marine environments. The use of different data processing technologies in hydrography does not change the purpose of its research.\nHealth geomatics can improve our understanding of the important relationship between location and health, and thus assist us in Public Health tasks like disease prevention, and also in better healthcare service planning. An important area of research is the use of open data in planning lifesaving activities. \nMining geomatics is the use of information systems to integrate and process spatial data for monitoring, modelling, visualisation and design of mining operations. \nA growing number of university departments which were once titled \"surveying\", \"survey engineering\" or \"topographic science\" have re-titled themselves using the terms \"geomatics\" or \"geomatics engineering\", while others have switched to program titles such as \"spatial information technology\", and similar names.\nThe rapid progress and increased visibility of geomatics since the 1990s has been made possible by advances in computer hardware, computer science, and software engineering, as well as by airborne and space observation remote-sensing technologies.\nGeomatics engineering is a rapidly developing engineering discipline which focuses on spatial information (i.e. information that has a location). The location is the primary factor used to integrate a very wide range of data for spatial analysis and visualization. Geomatics engineers design, develop, and operate systems for collecting and analyzing spatial information about the land, the oceans, natural resources, and manmade features.Geomatics engineers apply engineering principles to spatial information and implement relational data structures involving measurement sciences, thus using geomatics and acting as spatial information engineers. Geomatics engineers manage local, regional, national and global spatial data infrastructures. Geomatics engineering also involves aspects of Computer Engineering, Software Engineering and Civil Engineering.\n", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_3" +} \ No newline at end of file diff --git a/test/Technology/History_of_timekeeping_devices_in_Egypt.json b/test/Technology/History_of_timekeeping_devices_in_Egypt.json new file mode 100644 index 0000000000000000000000000000000000000000..0700245b1c9cec9b707319a170d0c46dd34de7dc --- /dev/null +++ b/test/Technology/History_of_timekeeping_devices_in_Egypt.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "The ancient Egyptians were one of the first cultures to widely divide days into generally agreed-upon equal parts, using early timekeeping devices such as sundials, shadow clocks, and merkhets (plumb-lines used by early astronomers).\nObelisks were also used by reading the shadow that they make. The clock was split into daytime and nighttime, and then into smaller hours.\nDespite Herodotus's attribution of the invention of the sundial to the Babylonians in 430 BCE, the earliest known sundials were simple gnomons of Egyptian origin invented around 3500 BCE . More complex devices were developed over time, the earliest surviving one is a limestone sundial that dates back to 1500 BCE, discovered in the Valley of the Kings in 2013. It was found in a housing area of construction workers and its division of daytime into 12 parts was possibly used to measure work hours.Shadow clocks were modified sundials that allowed for greater precision in determining the time of day, and were first used around 1500 BCE. Their major innovation was a modified, more precise gnomon that allowed for the division of night time into 50 parts, with an additional two \"twilight hours\" in the morning and evening. The shadow clock gnomon was made up of a long stem divided into six parts, as well as an elevated crossbar that cast a shadow over the marks. This early clock was positioned eastward in the morning, while at noon it was rotated to face west to measure shadows cast by the setting sun. The concept of measured shadows were adapted into larger, more public designs in the form of obelisks. Markers around the obelisk would indicate units of time, including morning and afternoon as well as the summer and winter solstices for ceremonial purposes.\nUsing plumb-lines called merkhets, the Egyptians could calculate time at night, provided the stars were visible. Used since at least 600 BCE, two of these instruments were aligned with Polaris, the North pole star, creating a north:south meridian. By observing certain stars as they crossed the line created with the merkhets, they could accurately gauge time.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_4" +} \ No newline at end of file diff --git a/test/Technology/Wei-Ying_Ma.json b/test/Technology/Wei-Ying_Ma.json new file mode 100644 index 0000000000000000000000000000000000000000..1a9768b5f5ef85022e9a21174df1ee419f044d47 --- /dev/null +++ b/test/Technology/Wei-Ying_Ma.json @@ -0,0 +1,53 @@ +{ + "domain": "Technology", + "document": "Wei-Ying Ma is known for his contributions to the field of computer science, including his academic achievements and leadership in technological innovation. He has authored over 300 papers and obtained 169 patents as of January 2024. He has served on the editorial boards of the ACM Transactions on Information System (TOIS) and the ACM/Springer Multimedia Systems Journal. He also served as a program co-chair of the International Conference on World Wide Web (WWW) 2008, a program co-chair of the Pacific Rim Conference on Multimedia (PCM) '07, and the general co-chair of the Asia Information Retrieval Symposium (AIRS) '08. He was the general co-chair of ACM Special Interest Group on Information Retrieval (SIGIR) 2011 and also a member of the International World Wide Web Conferences Steering Committee from 2010 through 2016. As Vice President and head of the AI lab at ByteDance, he led the development of AI-powered technologies integrated into platforms like Douyin, TikTok, and Jinri Toutiao, which impacted digital content creation and distribution. Wei-Ying Ma currently holds the position of Huiyan Chair Professor at Tsinghua University and serves as the Chief Scientist at the Institute for AI Industry Research (AIR), a program he established alongside Dr. Ya-Qin Zhang in 2020.\nWei-Ying Ma obtained a Bachelor of Science in Electrical Engineering from National Tsing Hua University in Taiwan in 1990. He furthered his studies at the University of California, Santa Barbara, earning a Master of Science in 1994, and a Ph.D in Electrical and Computer Engineering in 1997. During his doctoral studies, Ma was involved in the Alexandria Digital Library project, focusing on the development of innovative image retrieval systems and segmentation solutions.He began his professional career at Hewlett-Packard Labs in Palo Alto, California, where he focused on multimedia content analysis and adaptation. Ma joined Microsoft Research Asia (MSRA) in 2001 and took the position of Assistant Managing Director. In this role, he supervised research groups that were instrumental in the development of technologies for Microsoft's Bing Search Engine and Microsoft Advertising. He developed techniques for web page analysis by utilizing visual cues to extract structured data. This work led to the creation of Microsoft Academic Search, a search engine that offers automatic entity summaries and improved user navigation. Additionally, he led projects such as the Microsoft Graph Engine, facilitating knowledge graph processing for web search and natural language understanding, and the creation of the Microsoft Concept Graph, a comprehensive repository of concepts and facts derived from extensive web and search data. Furthermore, he led developing the Distributed Machine Learning Toolkit, which aimed to improve the efficiency and scalability of machine learning tasks involving large datasets.Wei-Ying Ma joined ByteDance in 2016, assuming the position of Vice President and Head of the AI Lab in 2017. During his time at ByteDance, Ma established the ByteDance AI Lab to focus on research and technology development in machine learning, computer vision, and natural language processing. Ma contributed to the development of AI-powered content creation and dissemination technologies integrated into ByteDance's products, including Douyin, TikTok, Jinri Toutiao, CapCut, and Lark. The number of AI researchers increased from five in 2016, to 150 by the end of 2018. He and his team worked on the development of machine learning models for content analysis, video analysis systems, and innovative techniques for music generation, recommendation, speech recognition, and content creation.\nMa left ByteDance in 2020. His departure coincided with regulatory challenges faced by TikTok worldwide. The app was banned in India in June of that year. There was also a possible ban by the US Government due to security concerns and suspicions that Beijing could force the owner, who is of Chinese descent, to turn over user data.\nUpon Leaving Bytedance, Ma transitioned to AI Industry Research (AIR), a research institute under Tsinghua University in Beijing. This initiative, led by scientist and entrepreneur Dr. Ya-Qin Zhang, established a center dedicated to scientific research and technological innovation focusing on areas such as autonomous driving, AI+IoT, and neuromorphic computing.\nAdditionally, Ma co-founded Helixon, a startup aimed at advancing next-generation AI for antibody design and protein therapeutics discovery. He also served as Director of the Health Computing Research Center at the Beijing Academy of Artificial Intelligence (BAAI) from 2021 to 2023 advancing AI applications in healthcare.\nAs of 2024, Ma is leading AI initiatives for scientific applications, with a specific emphasis on AI-driven drug discovery and generative AI for biology and chemistry.\nWei-Ying Ma has been recognized with several awards throughout his career. In 2009, he received the Management Excellence Trailblazer Award at Microsoft for his contributions within the organization. In 2010, he was honored as a Distinguished Alumni of the school of EECS at Tsinghua University. His contributions to the field were further acknowledged when he received the ACM Distinguished Member award in the US in 2010. In 2023, Wei-Ying Ma was recognized as an ACM Fellow in the US for his leadership and significant contributions to web search and data mining. Additionally, for his work at ByteDance, Ma received the Wu Wenjun Artificial Intelligence Science and Technology Award.", + "RE_label_set": [ + "HasPart", + "OwnerOf", + "NominatedFor", + "Follows", + "HasWorksInTheCollection", + "SaidToBeTheSameAs", + "DifferentFrom", + "AwardReceived", + "Creator", + "InfluencedBy", + "NotableWork", + "PositionHeld", + "Uses", + "ContributedToCreativeWork", + "UsedBy", + "PracticedBy", + "HasWrittenFor", + "IsPollinatorOf", + "ProducedSound", + "Studies", + "DevelopsFrom", + "PartOf", + "FoundedBy", + "MemberOf", + "Occupation" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Technology_5" +} \ No newline at end of file diff --git a/test/Universe/Cosmology.json b/test/Universe/Cosmology.json new file mode 100644 index 0000000000000000000000000000000000000000..0af30cb0fd04c0554e0133b13440ef79706ca061 --- /dev/null +++ b/test/Universe/Cosmology.json @@ -0,0 +1,42 @@ +{ + "domain": "Universe", + "document": "Cosmology (from Ancient Greek κόσμος (cosmos) 'the universe, the world' and λογία (logia) 'study of') is a branch of physics and metaphysics dealing with the nature of the universe, the cosmos. The term cosmology was first used in English in 1656 in Thomas Blount's Glossographia, and in 1731 taken up in Latin by German philosopher Christian Wolff in Cosmologia Generalis. Religious or mythological cosmology is a body of beliefs based on mythological, religious, and esoteric literature and traditions of creation myths and eschatology. In the science of astronomy, cosmology is concerned with the study of the chronology of the universe.\nPhysical cosmology is the study of the observable universe's origin, its large-scale structures and dynamics, and the ultimate fate of the universe, including the laws of science that govern these areas. It is investigated by scientists, including astronomers and physicists, as well as philosophers, such as metaphysicians, philosophers of physics, and philosophers of space and time. Because of this shared scope with philosophy, theories in physical cosmology may include both scientific and non-scientific propositions and may depend upon assumptions that cannot be tested. Physical cosmology is a sub-branch of astronomy that is concerned with the universe as a whole. Modern physical cosmology is dominated by the Big Bang Theory which attempts to bring together observational astronomy and particle physics; more specifically, a standard parameterization of the Big Bang with dark matter and dark energy, known as the Lambda-CDM model.\nTheoretical astrophysicist David N. Spergel has described cosmology as a \"historical science\" because \"when we look out in space, we look back in time\" due to the finite nature of the speed of light.\nPhysics and astrophysics have played central roles in shaping our understanding of the universe through scientific observation and experiment. Physical cosmology was shaped through both mathematics and observation in an analysis of the whole universe. The universe is generally understood to have begun with the Big Bang, followed almost instantaneously by cosmic inflation, an expansion of space from which the universe is thought to have emerged 13.799 ± 0.021 billion years ago. Cosmogony studies the origin of the universe, and cosmography maps the features of the universe.In Diderot's Encyclopédie, cosmology is broken down into uranology (the science of the heavens), aerology (the science of the air), geology (the science of the continents), and hydrology (the science of waters).\nMetaphysical cosmology has also been described as the placing of humans in the universe in relationship to all other entities. This is exemplified by Marcus Aurelius's observation that a man's place in that relationship: \"He who does not know what the world is does not know where he is, and he who does not know for what purpose the world exists, does not know who he is, nor what the world is.\"\nPhysical cosmology is the branch of physics and astrophysics that deals with the study of the physical origins and evolution of the universe. It also includes the study of the nature of the universe on a large scale. In its earliest form, it was what is now known as \"celestial mechanics,\" the study of the heavens. Greek philosophers Aristarchus of Samos, Aristotle, and Ptolemy proposed different cosmological theories. The geocentric Ptolemaic system was the prevailing theory until the 16th century when Nicolaus Copernicus, and subsequently Johannes Kepler and Galileo Galilei, proposed a heliocentric system. This is one of the most famous examples of epistemological rupture in physical cosmology.Isaac Newton's Principia Mathematica, published in 1687, was the first description of the law of universal gravitation. It provided a physical mechanism for Kepler's laws and also allowed the anomalies in previous systems, caused by gravitational interaction between the planets, to be resolved. A fundamental difference between Newton's cosmology and those preceding it was the Copernican principle—that the bodies on Earth obey the same physical laws as all celestial bodies. This was a crucial philosophical advance in physical cosmology.\nModern scientific cosmology is widely considered to have begun in 1917 with Albert Einstein's publication of his final modification of general relativity in the paper \"Cosmological Considerations of the General Theory of Relativity\" (although this paper was not widely available outside of Germany until the end of World War I). General relativity prompted cosmogonists such as Willem de Sitter, Karl Schwarzschild, and Arthur Eddington to explore its astronomical ramifications, which enhanced the ability of astronomers to study very distant objects. Physicists began changing the assumption that the universe was static and unchanging. In 1922, Alexander Friedmann introduced the idea of an expanding universe that contained moving matter.\nIn parallel to this dynamic approach to cosmology, one long-standing debate about the structure of the cosmos was coming to a climax : the Great Debate (1917 to 1922) : with early cosmologists such as Heber Curtis and Ernst Öpik determining that some nebulae seen in telescopes were separate galaxies far distant from our own. While Heber Curtis argued for the idea that spiral nebulae were star systems in their own right as island universes, Mount Wilson astronomer Harlow Shapley championed the model of a cosmos made up of the Milky Way star system only. This difference of ideas came to a climax with the organization of the Great Debate on 26 April 1920 at the meeting of the U.S. National Academy of Sciences in Washington, D.C. The debate was resolved when Edwin Hubble detected Cepheid Variables in the Andromeda Galaxy in 1923 and 1924. Their distance established spiral nebulae well beyond the edge of the Milky Way.\nSubsequent modelling of the universe explored the possibility that the cosmological constant, introduced by Einstein in his 1917 paper, may result in an expanding universe, depending on its value. Thus the Big Bang model was proposed by the Belgian priest Georges Lemaître in 1927 which was subsequently corroborated by Edwin Hubble's discovery of the redshift in 1929 and later by the discovery of the cosmic microwave background radiation by Arno Penzias and Robert Woodrow Wilson in 1964. These findings were a first step to rule out some of many alternative cosmologies.\nSince around 1990, several dramatic advances in observational cosmology have transformed cosmology from a largely speculative science into a predictive science with precise agreement between theory and observation. These advances include observations of the microwave background from the COBE, WMAP and Planck satellites, large new galaxy redshift surveys including 2dfGRS and SDSS, and observations of distant supernovae and gravitational lensing. These observations matched the predictions of the cosmic inflation theory, a modified Big Bang theory, and the specific version known as the Lambda-CDM model. This has led many to refer to modern times as the \"golden age of cosmology\".\nIn 2014, the BICEP2 collaboration claimed that they had detected the imprint of gravitational waves in the cosmic microwave background. However, this result was later found to be spurious: the supposed evidence of gravitational waves was in fact due to interstellar dust.\nOn 1 December 2014, at the Planck 2014 meeting in Ferrara, Italy, astronomers reported that the universe is 13.8 billion years old and composed of 4.9% atomic matter, 26.6% dark matter and 68.5% dark energy.\nReligious or mythological cosmology is a body of beliefs based on mythological, religious, and esoteric literature and traditions of creation and eschatology. Creation myths are found in most religions, and are typically split into five different classifications, based on a system created by Mircea Eliade and his colleague Charles Long. Types of Creation Myths based on similar motifs:\nCreation ex nihilo in which the creation is through the thought, word, dream or bodily secretions of a divine being.\nEarth diver creation in which a diver, usually a bird or amphibian sent by a creator, plunges to the seabed through a primordial ocean to bring up sand or mud which develops into a terrestrial world.\nEmergence myths in which progenitors pass through a series of worlds and metamorphoses until reaching the present world.\nCreation by the dismemberment of a primordial being.\nCreation by the splitting or ordering of a primordial unity such as the cracking of a cosmic egg or a bringing order from chaos.\nCosmology deals with the world as the totality of space, time and all phenomena. Historically, it has had quite a broad scope, and in many cases was found in religion. Some questions about the Universe are beyond the scope of scientific inquiry but may still be interrogated through appeals to other philosophical approaches like dialectics. Some questions that are included in extra-scientific endeavors may include: Charles Kahn, an important historian of philosophy, attributed the origins of ancient Greek cosmology to Anaximander.", + "RE_label_set": [ + "HasPart", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "CitesWork", + "InfluencedBy", + "UsedBy", + "IsPollinatedBy", + "HasParts", + "PartOf", + "HasEffect", + "FoundedBy", + "OppositeOf", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Universe_0" +} \ No newline at end of file diff --git a/test/Universe/Global_brain.json b/test/Universe/Global_brain.json new file mode 100644 index 0000000000000000000000000000000000000000..716db15ee300a3a1d57dfcbec9208f69b398391c --- /dev/null +++ b/test/Universe/Global_brain.json @@ -0,0 +1,42 @@ +{ + "domain": "Universe", + "document": "The global brain is a neuroscience-inspired and futurological vision of the planetary information and communications technology network that interconnects all humans and their technological artifacts. As this network stores ever more information, takes over ever more functions of coordination and communication from traditional organizations, and becomes increasingly intelligent, it increasingly plays the role of a brain for the planet Earth. In the philosophy of mind, global brain finds an analog in Averroes's theory of the unity of the intellect.\nProponents of the global brain hypothesis claim that the Internet increasingly ties its users together into a single information processing system that functions as part of the collective nervous system of the planet. The intelligence of this network is collective or distributed: it is not centralized or localized in any particular individual, organization or computer system. Therefore, no one can command or control it. Rather, it self-organizes or emerges from the dynamic networks of interactions between its components. This is a property typical of complex adaptive systems.The World Wide Web in particular resembles the organization of a brain with its web pages (playing a role similar to neurons) connected by hyperlinks (playing a role similar to synapses), together forming an associative network along which information propagates. This analogy becomes stronger with the rise of social media, such as Facebook, where links between personal pages represent relationships in a social network along which information propagates from person to person.\nSuch propagation is similar to the spreading activation that neural networks in the brain use to process information in a parallel, distributed manner.\nAlthough some of the underlying ideas were already expressed by Nikola Tesla in the late 19th century and were written about by many others before him, the term \"global brain\" was coined in 1982 by Peter Russell in his book The Global Brain. How the Internet might be developed to achieve this was set out in 1986. The first peer-reviewed article on the subject was published by Gottfried Mayer-Kress in 1995, while the first algorithms that could turn the world-wide web into a collectively intelligent network were proposed by Francis Heylighen and Johan Bollen in 1996.Reviewing the strands of intellectual history that contributed to the global brain hypothesis, Francis Heylighen distinguishes four perspectives: organicism, encyclopedism, emergentism and evolutionary cybernetics. He asserts that these developed in relative independence but now are converging in his own scientific re-formulation.\nIn the 19th century, the sociologist Herbert Spencer saw society as a social organism and reflected about its need for a nervous system. Entomologist William Wheeler developed the concept of the ant colony as a spatially extended organism, and in the 1930s he coined the term superorganism to describe such an entity. This concept was later adopted by thinkers such as Joël de Rosnay in the book Le Cerveau Planétaire (1986) and Gregory Stock in the book Metaman (1993) to describe planetary society as a superorganism.The mental aspects of such an organic system at the planetary level were perhaps first broadly elaborated by palaeontologist and Jesuit priest Pierre Teilhard de Chardin. In 1945, he described a coming \"planetisation\" of humanity, which he saw as the next phase of accelerating human \"socialisation\". Teilhard described both socialization and planetization as irreversible, irresistible processes of macrobiological development culminating in the emergence of a noosphere, or global mind (see Emergentism below).\nThe more recent living systems theory describes both organisms and social systems in terms of the \"critical subsystems\" (\"organs\") they need to contain in order to survive, such as an internal transport system, a resource reserve, and a decision-making system. This theory has inspired several thinkers, including Peter Russell and Francis Heylighen to define the global brain as the network of information processing subsystems for the planetary social system.\nIn the perspective of encyclopedism, the emphasis is on developing a universal knowledge network. The first systematic attempt to create such an integrated system of the world's knowledge was the 18th century Encyclopédie of Denis Diderot and Jean le Rond d'Alembert. However, by the end of the 19th century, the amount of knowledge had become too large to be published in a single synthetic volume. To tackle this problem, Paul Otlet founded the science of documentation, now called information science. In the 1930s he envisaged a World Wide Web-like system of associations between documents and telecommunication links that would make all the world's knowledge available immediately to anybody. H. G. Wells proposed a similar vision of a collaboratively developed world encyclopedia that would be constantly updated by a global university-like institution. He called this a World Brain, as it would function as a continuously updated memory for the planet, although the image of humanity acting informally as a more organic global brain is a recurring motif in many of his other works.Tim Berners-Lee, the inventor of the World Wide Web, too, was inspired by the free-associative possibilities of the brain for his invention. The brain can link different kinds of information without any apparent link otherwise; Berners-Lee thought that computers could become much more powerful if they could imitate this functioning, i.e. make links between any arbitrary piece of information. The most powerful implementation of encyclopedism to date is Wikipedia, which integrates the associative powers of the world-wide-web with the collective intelligence of its millions of contributors, approaching the ideal of a global memory. The Semantic web, also first proposed by Berners-Lee, is a system of protocols to make the pieces of knowledge and their links readable by machines, so that they could be used to make automatic inferences, thus providing this brain-like network with some capacity for autonomous \"thinking\" or reflection.\nThis approach focuses on the emergent aspects of the evolution and development of complexity, including the spiritual, psychological, and moral-ethical aspects of the global brain, and is at present the most speculative approach. The global brain is here seen as a natural and emergent process of planetary evolutionary development. Here again Pierre Teilhard de Chardin attempted a synthesis of science, social values, and religion in his The Phenomenon of Man, which argues that the telos (drive, purpose) of universal evolutionary process is the development of greater levels of both complexity and consciousness. Teilhard proposed that if life persists then planetization, as a biological process producing a global brain, would necessarily also produce a global mind, a new level of planetary consciousness and a technologically supported network of thoughts which he called the noosphere. Teilhard's proposed technological layer for the noosphere can be interpreted as an early anticipation of the Internet and the Web.Systems theorists and cyberneticians commonly describe the emergence of a higher order system in evolutionary development as a \"metasystem transition\" (a concept introduced by Valentin Turchin) or a \"major evolutionary transition\". Such a metasystem consists of a group of subsystems that work together in a coordinated, goal-directed manner. It is as such much more powerful and intelligent than its constituent systems. Francis Heylighen has argued that the global brain is an emerging metasystem with respect to the level of individual human intelligence, and investigated the specific evolutionary mechanisms that promote this transition.In this scenario, the Internet fulfils the role of the network of \"nerves\" that interconnect the subsystems and thus coordinates their activity. The cybernetic approach makes it possible to develop mathematical models and simulations of the processes of self-organization through which such coordination and collective intelligence emerges.\nIn 1994 Kevin Kelly, in his popular book Out of Control, posited the emergence of a \"hive mind\" from a discussion of cybernetics and evolutionary biology.In 1996, Francis Heylighen and Ben Goertzel founded the Global Brain group, a discussion forum grouping most of the researchers that had been working on the subject of the global brain to further investigate this phenomenon. The group organized the first international conference on the topic in 2001 at the Vrije Universiteit Brussel.\nAfter a period of relative neglect, the Global Brain idea has recently seen a resurgence in interest, in part due to talks given on the topic by Tim O'Reilly, the Internet forecaster who popularized the term Web 2.0, and Yuri Milner, the social media investor. In January 2012, the Global Brain Institute (GBI) was founded at the Vrije Universiteit Brussel to develop a mathematical theory of the \"brainlike\" propagation of information across the Internet. In the same year, Thomas W. Malone and collaborators from the MIT Center for Collective Intelligence have started to explore how the global brain could be \"programmed\" to work more effectively, using mechanisms of collective intelligence. The complexity scientist Dirk Helbing and his NervousNet group have recently started developing a \"Planetary Nervous System\", which includes a \"Global Participatory Platform\", as part of the large-scale FuturICT project, thus preparing some of the groundwork for a Global Brain.\nIn July 2017, Elon Musk founded the company Neuralink, which aims to create a brain-computer interface (BCI) with significantly greater information bandwidth than traditional human interface devices. Musk predicts that artificial intelligence systems will rapidly outpace human abilities in most domains and views them as an existential threat. He believes an advanced BCI would enable human cognition to remain relevant for longer. The firm raised $27m from 12 Investors in 2017.\nA common criticism of the idea that humanity would become directed by a global brain is that this would reduce individual diversity and freedom, and lead to mass surveillance. This criticism is inspired by totalitarian forms of government, as exemplified by George Orwell's character of \"Big Brother\". It is also inspired by the analogy between collective intelligence or swarm intelligence and insect societies, such as beehives and ant colonies, in which individuals are essentially interchangeable. In a more extreme view, the global brain has been compared with the Borg, a race of collectively thinking cyborgs conceived by the Star Trek science fiction franchise.Global brain theorists reply that the emergence of distributed intelligence would lead to the exact opposite of this vision. James Surowiecki in his book The Wisdom of Crowds argued that the reason is that effective collective intelligence requires diversity of opinion, decentralization and individual independence.\n", + "RE_label_set": [ + "HasPart", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "CitesWork", + "InfluencedBy", + "UsedBy", + "IsPollinatedBy", + "HasParts", + "PartOf", + "HasEffect", + "FoundedBy", + "OppositeOf", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Universe_1" +} \ No newline at end of file diff --git a/test/Universe/Hardness.json b/test/Universe/Hardness.json new file mode 100644 index 0000000000000000000000000000000000000000..77e1daca5356e1bcca6af065aa93fbc41f4e9853 --- /dev/null +++ b/test/Universe/Hardness.json @@ -0,0 +1,42 @@ +{ + "domain": "Universe", + "document": "In materials science, hardness (antonym: softness) is a measure of the resistance to localized plastic deformation, such as an indentation (over an area) or a scratch (linear), induced mechanically either by pressing or abrasion. In general, different materials differ in their hardness; for example hard metals such as titanium and beryllium are harder than soft metals such as sodium and metallic tin, or wood and common plastics. Macroscopic hardness is generally characterized by strong intermolecular bonds, but the behavior of solid materials under force is complex; therefore, hardness can be measured in different ways, such as scratch hardness, indentation hardness, and rebound hardness. Hardness is dependent on ductility, elastic stiffness, plasticity, strain, strength, toughness, viscoelasticity, and viscosity. Common examples of hard matter are ceramics, concrete, certain metals, and superhard materials, which can be contrasted with soft matter.\nThere are three main types of hardness measurements: scratch, indentation, and rebound. Within each of these classes of measurement there are individual measurement scales. For practical reasons conversion tables are used to convert between one scale and another.Scratch hardness is the measure of how resistant a sample is to fracture or permanent plastic deformation due to friction from a sharp object. The principle is that an object made of a harder material will scratch an object made of a softer material. When testing coatings, scratch hardness refers to the force necessary to cut through the film to the substrate. The most common test is Mohs scale, which is used in mineralogy. One tool to make this measurement is the sclerometer.Another tool used to make these tests is the pocket hardness tester. This tool consists of a scale arm with graduated markings attached to a four-wheeled carriage. A scratch tool with a sharp rim is mounted at a predetermined angle to the testing surface. In order to use it a weight of known mass is added to the scale arm at one of the graduated markings, the tool is then drawn across the test surface. The use of the weight and markings allows a known pressure to be applied without the need for complicated machinery.\nIndentation hardness measures the resistance of a sample to material deformation due to a constant compression load from a sharp object. Tests for indentation hardness are primarily used in engineering and metallurgy. The tests work on the basic premise of measuring the critical dimensions of an indentation left by a specifically dimensioned and loaded indenter. Common indentation hardness scales are Rockwell, Vickers, Shore, and Brinell, amongst others.Rebound hardness, also known as dynamic hardness, measures the height of the \"bounce\" of a diamond-tipped hammer dropped from a fixed height onto a material. This type of hardness is related to elasticity. The device used to take this measurement is known as a scleroscope. Two scales that measures rebound hardness are the Leeb rebound hardness test and Bennett hardness scale. Ultrasonic Contact Impedance (UCI) method determines hardness by measuring the frequency of an oscillating rod. The rod consists of a metal shaft with vibrating element and a pyramid-shaped diamond mounted on one end.There are five hardening processes: Hall-Petch strengthening, work hardening, solid solution strengthening, precipitation hardening, and martensitic transformation.In solid mechanics, solids generally have three responses to force, depending on the amount of force and the type of material:They exhibit elasticity—the ability to temporarily change shape, but return to the original shape when the pressure is removed. \"Hardness\" in the elastic range—a small temporary change in shape for a given force—is known as stiffness in the case of a given object, or a high elastic modulus in the case of a material.\nThey exhibit plasticity—the ability to permanently change shape in response to the force, but remain in one piece. The yield strength is the point at which elastic deformation gives way to plastic deformation. Deformation in the plastic range is non-linear, and is described by the stress-strain curve. This response produces the observed properties of scratch and indentation hardness, as described and measured in materials science. Some materials exhibit both elasticity and viscosity when undergoing plastic deformation; this is called viscoelasticity.\nThey fracture—split into two or more pieces.\nStrength is a measure of the extent of a material's elastic range, or elastic and plastic ranges together. This is quantified as compressive strength, shear strength, tensile strength depending on the direction of the forces involved. Ultimate strength is an engineering measure of the maximum load a part of a specific material and geometry can withstand.\nBrittleness, in technical usage, is the tendency of a material to fracture with very little or no detectable plastic deformation beforehand. Thus in technical terms, a material can be both brittle and strong. In everyday usage \"brittleness\" usually refers to the tendency to fracture under a small amount of force, which exhibits both brittleness and a lack of strength (in the technical sense). For perfectly brittle materials, yield strength and ultimate strength are the same, because they do not experience detectable plastic deformation. The opposite of brittleness is ductility.\nThe toughness of a material is the maximum amount of energy it can absorb before fracturing, which is different from the amount of force that can be applied. Toughness tends to be small for brittle materials, because elastic and plastic deformations allow materials to absorb large amounts of energy.\nHardness increases with decreasing particle size. This is known as the Hall-Petch relationship. However, below a critical grain-size, hardness decreases with decreasing grain size. This is known as the inverse Hall-Petch effect.\nHardness of a material to deformation is dependent on its microdurability or small-scale shear modulus in any direction, not to any rigidity or stiffness properties such as its bulk modulus or Young's modulus. Stiffness is often confused for hardness. Some materials are stiffer than diamond (e.g. osmium) but are not harder, and are prone to spalling and flaking in squamose or acicular habits.\nThe key to understanding the mechanism behind hardness is understanding the metallic microstructure, or the structure and arrangement of the atoms at the atomic level. In fact, most important metallic properties critical to the manufacturing of today’s goods are determined by the microstructure of a material. At the atomic level, the atoms in a metal are arranged in an orderly three-dimensional array called a crystal lattice. In reality, however, a given specimen of a metal likely never contains a consistent single crystal lattice. A given sample of metal will contain many grains, with each grain having a fairly consistent array pattern. At an even smaller scale, each grain contains irregularities.There are two types of irregularities at the grain level of the microstructure that are responsible for the hardness of the material. These irregularities are point defects and line defects. A point defect is an irregularity located at a single lattice site inside of the overall three-dimensional lattice of the grain. There are three main point defects. If there is an atom missing from the array, a vacancy defect is formed. If there is a different type of atom at the lattice site that should normally be occupied by a metal atom, a substitutional defect is formed. If there exists an atom in a site where there should normally not be, an interstitial defect is formed. This is possible because space exists between atoms in a crystal lattice. While point defects are irregularities at a single site in the crystal lattice, line defects are irregularities on a plane of atoms. Dislocations are a type of line defect involving the misalignment of these planes. In the case of an edge dislocation, a half plane of atoms is wedged between two planes of atoms. In the case of a screw dislocation two planes of atoms are offset with a helical array running between them.\nIn glasses, hardness seems to depend linearly on the number of topological constraints acting between the atoms of the network. Hence, the rigidity theory has allowed predicting hardness values with respect to composition.\nDislocations provide a mechanism for planes of atoms to slip and thus a method for plastic or permanent deformation. Planes of atoms can flip from one side of the dislocation to the other effectively allowing the dislocation to traverse through the material and the material to deform permanently. The movement allowed by these dislocations causes a decrease in the material's hardness.\nThe way to inhibit the movement of planes of atoms, and thus make them harder, involves the interaction of dislocations with each other and interstitial atoms. When a dislocation intersects with a second dislocation, it can no longer traverse through the crystal lattice. The intersection of dislocations creates an anchor point and does not allow the planes of atoms to continue to slip over one another A dislocation can also be anchored by the interaction with interstitial atoms. If a dislocation comes in contact with two or more interstitial atoms, the slip of the planes will again be disrupted. The interstitial atoms create anchor points, or pinning points, in the same manner as intersecting dislocations.\nBy varying the presence of interstitial atoms and the density of dislocations, a particular metal's hardness can be controlled. Although seemingly counter-intuitive, as the density of dislocations increases, there are more intersections created and consequently more anchor points. Similarly, as more interstitial atoms are added, more pinning points that impede the movements of dislocations are formed. As a result, the more anchor points added, the harder the material will become.\nCareful note should be taken of the relationship between a hardness number and the stress-strain curve exhibited by the material. The latter, which is conventionally obtained via tensile testing, captures the full plasticity response of the material (which is in most cases a metal). It is in fact a dependence of the (true) von Mises plastic strain on the (true) von Mises stress, but this is readily obtained from a nominal stress : nominal strain curve (in the pre-necking regime), which is the immediate outcome of a tensile test. This relationship can be used to describe how the material will respond to almost any loading situation, often by using the Finite Element Method (FEM). This applies to the outcome of an indentation test (with a given size and shape of indenter, and a given applied load).However, while a hardness number thus depends on the stress-strain relationship, inferring the latter from the former is far from simple and is not attempted in any rigorous way during conventional hardness testing. (In fact, the Indentation Plastometry technique, which involves iterative FEM modelling of an indentation test, does allow a stress-strain curve to be obtained via indentation, but this is outside the scope of conventional hardness testing.) A hardness number is just a semi-quantitative indicator of the resistance to plastic deformation. Although hardness is defined in a similar way for most types of test : usually as the load divided by the contact area : the numbers obtained for a particular material are different for different types of test, and even for the same test with different applied loads. Attempts are sometimes made to identify simple analytical expressions that allow features of the stress-strain curve, particularly the yield stress and Ultimate Tensile Stress (UTS), to be obtained from a particular type of hardness number. However, these are all based on empirical correlations, often specific to particular types of alloy: even with such a limitation, the values obtained are often quite unreliable. The underlying problem is that metals with a range of combinations of yield stress and work hardening characteristics can exhibit the same hardness number. The use of hardness numbers for any quantitative purpose should, at best, be approached with considerable caution.\n", + "RE_label_set": [ + "HasPart", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "CitesWork", + "InfluencedBy", + "UsedBy", + "IsPollinatedBy", + "HasParts", + "PartOf", + "HasEffect", + "FoundedBy", + "OppositeOf", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Universe_4" +} \ No newline at end of file diff --git a/test/Universe/International_communication.json b/test/Universe/International_communication.json new file mode 100644 index 0000000000000000000000000000000000000000..1172e2131d7144dcac8201ade9804cdfd2853dd0 --- /dev/null +++ b/test/Universe/International_communication.json @@ -0,0 +1,42 @@ +{ + "domain": "Universe", + "document": "International communication (also referred to as the study of global communication or transnational communication) is the communication practice that occurs across international borders. The need for international communication was due to the increasing effects and influences of globalization. As a field of study, international communication is a branch of communication studies, concerned with the scope of \"government-to-government\", \"business-to-business\", and \"people-to-people\" interactions at a global level. Currently, international communication is being taught at colleges worldwide. Due to the increasingly globalized market, employees who possess the ability to effectively communicate across cultures are in high demand. International communication \"encompasses political, economic, social, cultural and military concerns\".\nEfficient communication networks played crucial roles in establishing ancient imperial authority and international trade. The extent of empire could be used as an 'indication of the efficiency of communication'. Ancient empires such as Rome, Persia, Axum and China, all utilized writing in collecting information and dispersing, creating enormous postal and dispatch systems. As early as in fifteenth century, news had been disseminated trans-nationally in Europe. 'The wheat traders of Venice, the silver traders of Antwerp, the merchants of Nuremberg and their trading partners shared economic newsletters and created common values and beliefs in the rights of capital.'In 1837, Samuel Morse invented the telegraph. The telegraph worked by transmitting electrical signals over a wire laid between stations. It was the first mode of communication to eliminate the effect of distance, allowing for a near instantaneous connection. Given its speed and reliability in delivering information, telegraph offered opportunities for capital and military expansion. It also increased market integration. It did so by lowering the cost of trade by increasing the capacity utilization of shipping. As showed in Table 1.1, the establishment of cable hardware signifies global power order in late nineteenth and early twentieth century.Table 1.1 Cabling the world\nThe newspaper industry and international telegraph networks mutually facilitated each other. Telegraph communications drastically altered the way in which news was produced. The individual items of modern newspapers became no longer selected on the basis of spatial proximity, but following newly emerging journalistic criteria of news relevance. As the supply and demand of the newspaper industry rapidly increased in the nineteenth century, news agencies were established successively.The French Havas Agency was founded in 1835, the German agency Wolffs Telegraphisches Bureau in 1849, and the British Reuters in 1851. These three European agencies began as financial-data services for bankers, but eventually started to operate internationally and extended their coverage to world news. They were all subsidized by their respective governments. By 1866, national news agencies were beginning to rise in many European countries. While they covered and sold news locally, they relied on the major services for coverage and sales abroad.\nThe global media and news agencies have played a fundamental role in contemporary globalization, making possible the feeling of instant communication and the experience of global connection. They have played a pioneering role in the use of new technologies, such as the telegraph, which have altered the nature of news. Technological innovation continues to be a major area of competition between global news agencies.\nWestern countries seized the chances to implement radio communication after the first radio transmissions of human voice in 1902. But the two mechanisms of radio broadcasting were distinctively different. In the US, the Radio Act of 1927 confirmed its status as an advertising-funded commercial enterprise, while in Britain, the public broadcasting pioneer British Broadcasting Corporation set up in the same year. During the First World War and the Second World War, radio broadcasting played a significant role in both domestic public opinion management and international diplomacy propaganda abroad.Even in the Cold War times, this radio-dominated international communication still featured in propaganda respective ideologies. The prominent example is the Voice of America, which ran a global network to indoctrinate \"American dream\" to its international audience. Radio also played an important role in the ideological confrontation between the east and the west. Broadcasts could penetrate the \"Iron Curtain\" and directly address the \"enemy\", which was extremely important in the early days of the Cold War. Western broadcasting offered an alternative channel for the flow of new information and ideas. Around a one third of Soviet urban adults and about half of East European adults were regular listeners of Western broadcasts at the time.\nShortwave transmission sites, known as \"number stations\" were used by both the United States and Soviet governments to send propaganda to foreign countries. They were also a secure means of sending coded messages to intelligence officers operating in other countries. As long as an agent had the station, the air time, and encryption code, he could receive a one-time message that only he could understand.\nNot only Western countries have been impacted by communication through the use of radio broadcasting. An example of this is the 1994 Rwandan Genocide. In April 1994, a plane carrying the presidents of Rwanda and neighboring Burundi crashed under mysterious circumstances. This sparked a massing killing spree that took place over the next three months and left over a million Rwandans dead. The Rwandan media have been accused of inciting hatred that led to violence by using an ethical framework to report a political struggle, as well as spreading fear, rumors, and panic. They also incited ordinary citizens to take part in the massacres. Through its broadcasts, popular radio station RTLM attracted unemployed youth and Interhahamwe militia, a far-right organization.\nSince the cold war officially ended in 1990, the intense relations of super powers halted with the collapse of the Soviet Union, and the emergence of the Third World countries, the unequally developed communication order can no longer exist. The Third World called for ceasing their marginalized communication status. Especially when international communications stepped into the information age, 'the convergence of telecommunication and computing and the ability to move all type of data : pictures, words, sounds : via the Internet have revolutionized international information exchange.' The New World Information and Communication Order debate changed the trajectory of international communication. This was a series of debates that happened in the 1980s about information flow across the world.When communicating internationally it is important to take culture into consideration. Though English has become the language of business, many businesses fail to recognize that the language used does not determine how business is conducted. Therefore, it is important to understand that intercultural and international communication are interchangeable. Effective communication between international business partners is critical for global success, and underlying national and organizational cultural differences in international business-related relationships can create hurdles to effective communication, which can hinder performance. The New World Information and Communication Order (NWICO) was one of the major shift in the history of international communication.As a tourist it may be acceptable to maintain the cultural norms from a country of origin when visiting, though attempting to adapt would be appreciated. However, when conducting business it is important to recognize cultural differences, especially when communicating. At the turn of the century there was a large amount of research based on the needs of those that travel abroad in order to commercialize products or services. The list of researchers includes Hofstede, 1991; Storti, 1994; Ansari & Jackson, 1995; Cushner & Brislin, 1996; Adler, 1997; Mead, 1998; and Marx, 1999. From those studies Gibson's volume becomes an important source of information for business professionals interested in succeeding internationally. As explained by Douglas Storey, there was a change in style and strategy of American diplomacy since 1979 after the first addition of Glen Fisher's book appeared.\nDespite the reason for international communication it is important to understand that international communication is not limited to the language spoken during communication.\nThere are two broadly conceived approaches to the creation of international communications regulations. The first would be internationalizing a minimum standard by agreement among the parties. The second is to allow the parties to denote exceptions for specific points about which they may be unable to reach agreement. Though the second approach falls short of uniformity it permits higher standards by allowing some parties to opt out.\nInternational communication is widely spread and multilayered in contemporary society, however it is not considered as a separate academic discipline because of its overlapping with other subjects. International communication is 'a topic field rather than a discipline field' and international communication studies is a mode of 'organizing inquiry'.John D. H. Downing proposed ten categories within which international communication should be conducted\ntheories of international communication\ncore international communication processes\nglobal media firms\nglobal media policies\nGlobal news flows\nworld cinema\ndevelopment communication\nthe Internet\nintellectual property law\nnon-hegemonic communication flows\nMehdi Semati listed the wide range of research subjects in international communication, which includes, but not limited to the following.\nCommunication and development(development communication)\nTechnology transfer\nDevelopment journalism\nModernization theory\nDependency theories\nNation, nationalism, and national cultural\nState, nation-state, and sovereignty\nInternational relations and communication\nGlobal communicative access\nCultural imperialism\nMedia imperialism\nTransnational corporations, transnational media corporations\nInternational organizations and communication\nInternational television and radio broadcasting\nBroadcasting and propaganda\nTheories of the press\nFree flow of information\nInternational traffic in media content\nGlobal news flow\nInternational news agencies\nTrans-border data flow\nInternational (tele) communication technology\nInternational (tele) communication policy and regulation\nCross-cultural media receptions studies\nGlobalization\nHamid Mowlana stated four key interrelated approaches to international communication\nidealistic-humanistic\nproselytization\neconomic\nthe political\nOne of the most obvious manifestations of international communication are world news, when the media of one country cover news from abroad. But, apart from journalism, international communication also occurs in other areas (culture, technology, sciences) and the nature of the \"information\" that is circulated can be classified in a wide variety of categories, such as cultural (music, films, sports, TV shows from one country to another), scientific (research papers published abroad, scientific exchange or cooperation), and intelligence (diplomacy reports, international espionage, etc.).\nTypically the study of international communication includes a deep attention to the circulation of news among different countries (and the resulting imbalances, from which came the concept of news flow), the power of media organizations (such as conglomerates and news agencies), issues such as cultural imperialism and media imperialism, and the political role that international cooperation can have in enhancing the media industry (and society as a whole) in a given region, such as proposed by development communication or communication for development.\nSome renowned scholars in international communication include Wilbur Schramm, Ithiel de Sola Pool, Johan Galtung, Anthony Smith, Robert Stevenson, Jeremy Tunstall, Armand Mattelart, Oliver Boyd-Barrett, Ali Mohammadi, Annabelle Sreberny, Cees J. Hamelink, Daya Kishan Thussu and Chris Paterson. Journals in this field include International Communication Gazette, the Journal of International Communication and Language Problems and Language Planning.\nThe Second World War was a catalyst for international communication. Analytical tools for communications research are used to mobilize domestic public support for war, to understand enemy propaganda, and to develop psychological warfare techniques to influence the morale and opinions of allies and enemies. The Rockefeller Foundation convened and funded a communications seminar every month from 1939 to 1940 years at the New York headquarters. The initial purpose was to bring together leading scholars interested in communication to provide theoretical guidance for future communication studies, including Lasswell and Lazarsfeld. When the United States entered the war at the end of 1941, with the outbreak of the European economic crisis, communication research became an important factor in discussing government policies.Media development can be said to be independent media created by private interventions during the transition period through international intervention. Even before the emergence of technology, communication has been at the forefront of relationship building and business development. Today, newer advancements like texting and messaging apps have allowed for even more efficient international communication.New Media: Internet and Wireless Communication.\nIn the 1980s and 1990s, with the establishment and development of fiberoptic cables, satellites and the Internet, and the gradual proliferation are eroding space and time barriers and increasing speed, and reducing the cost of transmitting various information. This trend has pushed international communication to globalization.", + "RE_label_set": [ + "HasPart", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "CitesWork", + "InfluencedBy", + "UsedBy", + "IsPollinatedBy", + "HasParts", + "PartOf", + "HasEffect", + "FoundedBy", + "OppositeOf", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Universe_2" +} \ No newline at end of file diff --git a/test/Universe/Negative_energy.json b/test/Universe/Negative_energy.json new file mode 100644 index 0000000000000000000000000000000000000000..993399c06480dd3afd74dac8cae69fb2caee7931 --- /dev/null +++ b/test/Universe/Negative_energy.json @@ -0,0 +1,42 @@ +{ + "domain": "Universe", + "document": "Negative energy is a concept used in physics to explain the nature of certain fields, including the gravitational field and various quantum field effects.\nGravitational energy, or gravitational potential energy, is the potential energy a massive object has because it is within a gravitational field. In classical mechanics, two or more masses always have a gravitational potential. Conservation of energy requires that this gravitational field energy is always negative, so that it is zero when the objects are infinitely far apart. As two objects move apart and the distance between them approaches infinity, the gravitational force between them approaches zero from the positive side of the real number line and the gravitational potential approaches zero from the negative side. Conversely, as two massive objects move towards each other, the motion accelerates under gravity causing an increase in the (positive) kinetic energy of the system and, in order to conserve the total sum of energy, the increase of the same amount in the gravitational potential energy of the object is treated as negative.A universe in which positive energy dominates will eventually collapse in a Big Crunch, while an \"open\" universe in which negative energy dominates will either expand indefinitely or eventually disintegrate in a Big Rip. In the zero-energy universe model (\"flat\" or \"Euclidean\"), the total amount of energy in the universe is exactly zero: its amount of positive energy in the form of matter is exactly cancelled out by its negative energy in the form of gravity. It is unclear which, if any, of these models accurately describes the real universe.\nFor a classically rotating black hole, the rotation creates an ergosphere outside the event horizon, in which spacetime itself begins to rotate, in a phenomenon known as frame-dragging. Since the ergosphere is outside the event horizon, particles can escape from it. Within the ergosphere, a particle's energy may become negative (via the relativistic rotation of its Killing vector). The negative-energy particle then crosses the event horizon into the black hole, with the law of conservation of energy requiring that an equal amount of positive energy should escape. In the Penrose process, a body divides in two, with one half gaining negative energy and falling in, while the other half gains an equal amount of positive energy and escapes. This is proposed as the mechanism by which the intense radiation emitted by quasars is generated.\nNegative energies and negative energy density are consistent with quantum field theory.In quantum theory, the uncertainty principle allows the vacuum of space to be filled with virtual particle-antiparticle pairs which appear spontaneously and exist for only a short time before, typically, annihilating themselves again. Some of these virtual particles can have negative energy. This behaviour plays a role in several important phenomena, as described below.In the Casimir effect, two flat plates placed very close together restrict the wavelengths of quanta which can exist between them. This in turn restricts the types and hence number and density of virtual particle pairs which can form in the intervening vacuum and can result in a negative energy density. Since this restriction does not exist or is much less significant on the opposite sides of the plates, the forces outside the plates are greater than those between the plates. This causes the plates to appear to pull on each other, which has been measured. More accurately, the vacuum energy caused by the virtual particle pairs is pushing the plates together, and the vacuum energy between the plates is too small to negate this effect since fewer virtual particles can exist per unit volume between the plates than can exist outside them.It is possible to arrange multiple beams of laser light such that destructive quantum interference suppresses the vacuum fluctuations. Such a squeezed vacuum state involves negative energy. The repetitive waveform of light leads to alternating regions of positive and negative energy.According to the theory of the Dirac sea, developed by Paul Dirac in 1930, the vacuum of space is full of negative energy. This theory was developed to explain the anomaly of negative-energy quantum states predicted by the Dirac equation. A year later, after work by Weyl, the negative energy concept was abandoned and replaced by a theory of antimatter.  The following year, 1932, saw the discovery of the positron by Carl Anderson.The intense gravitational fields around black holes create phenomena which are attributed to both gravitational and quantum effects. In these situations, a particle's Killing vector may be rotated such that its energy becomes negative.Virtual particles can exist for a short period. When a pair of such particles appears next to a black hole's event horizon, one of them may get drawn in. This rotates its Killing vector so that its energy becomes negative and the pair have no net energy. This allows them to become real and the positive particle escapes as Hawking radiation, while the negative-energy particle reduces the black hole's net energy. Thus, a black hole may slowly evaporate.Negative energy appears in the speculative theory of wormholes, where it is needed to keep the wormhole open. A wormhole directly connects two locations which may be separated arbitrarily far apart in both space and time, and in principle allows near-instantaneous travel between them. However physicists such as Roger Penrose regard such ideas as unrealistic, more fiction than speculation.A theoretical principle for a faster-than-light (FTL) warp drive for spaceships has been suggested, using negative energy. The Alcubierre drive is based on a solution to the Einstein field equations of general relativity in which a \"bubble\" of spacetime is constructed using a hypothetical negative energy. The bubble is then moved by expanding space behind it and shrinking space in front of it. The bubble may travel at arbitrary speeds and is not constrained by the speed of light. This does not contradict general relativity, as the bubble's contents do not actually move through their local spacetime.Speculative theoretical studies have suggested that particles with negative energies are consistent with Relativistic quantum theory, with some noting interrelationships with negative mass and/or time reversal.", + "RE_label_set": [ + "HasPart", + "Follows", + "SaidToBeTheSameAs", + "DifferentFrom", + "CitesWork", + "InfluencedBy", + "UsedBy", + "IsPollinatedBy", + "HasParts", + "PartOf", + "HasEffect", + "FoundedBy", + "OppositeOf", + "MathematicalInverse" + ], + "NER-label_set": [ + "CARDINAL", + "DATE", + "EVENT", + "FAC", + "GPE", + "LANGUAGE", + "LAW", + "LOC", + "MONEY", + "NORP", + "ORDINAL", + "ORG", + "PERCENT", + "PERSON", + "PRODUCT", + "QUANTITY", + "TIME", + "WORK_OF_ART", + "MISC" + ], + "id": "Universe_3" +} \ No newline at end of file