ĐĎॹá>ţ˙ ąłţ˙˙˙Ż°˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ěĽÁq` řżSPbjbjqPqP 6—::%H˙˙˙˙˙˙¤ô ô ô ô ¸ ¸ ¸ Ě ´f´f´f8ěf<(gÔĚ °`hhhh4hj’°j,ÜjJ„L„L„L„%q„`щ`1$‘hx“śU¸ Stüiüi"StStUô ô h4hČjˇ€ˇ€ˇ€Stô h lhJ„ˇ€StJ„ˇ€ˇ€â‚ Œ ,.ƒhüg `}]ňi˙Ć´fg|Ŕú‚ćƒd€0°ƒ,.”'~.”.ƒ.”¸ .ƒ¸ôj´¨m–oŒ"q1ôjôjôjUU;€|ôjôjôj°StStStStĚ Ě Ě ¤VpbDĚ Ě Ě pbĚ Ě Ě ô ô ô ô ô ô ˙˙˙˙ SEMINAR: INTELLIGENCE, COMMAND AND CONTROL GENERAL EDUCATION 157 (FAS) Spring 2007 Updated 11/3/2006 GUEST SPEAKERS 1980-2006 Chronological and Alphabetical Listings (No 1983 session; two 1997 sessions; no 1998 session; no 2005 session) Full texts are available on-line for 1980-2006. Click on “Publications” at the web site of the  HYPERLINK "http://www.pirp.harvard.edu/" Program on Information Resources Policy, Harvard University 2006 Combating Global Terrorism: Bringing All Elements of National Power to Bear Darryl Williams Restructuring the U.S. Intelligence Community Gordon Lederman The Limitations of Recent Intelligence Reforms Joan A. Dempsey Government Advisory Boards: Improving the Business of Government? Lessons from the Trenches Ted Wackler Lawrence K. Gershwin Steven J. Spano National Infrastructure Protection: Risk Management for a Nation in a Threat-Driven Environment Robert Liscouski Issues Confronting Military Intelligence Robert B. Murrett 2005 – NO SEMINAR 2004 Risk Management in the Department of Defense Carol A. Haave Intelligence Analysis Mark M. Lowenthal Intelligence to Support Military Operations Robert B. Murrett Intelligence and Homeland Security After 9/11 John C. Gannon Intelligence and Homeland Security After 9/11 Joan A. Dempsey Securing Cyberspace Gregory J. Rattray Taking Responsibility for Our Security Robert Liscouski Control and Transformation Arthur K. Cebrowski Ryszard Kuklinski: A Case Officer’s View Aris Pappas 2003 “Catching Field Mice”: Intelligence and Policy in the Twenty-First Century Denis Clift Adapting the Military to the Homeland Defense and Homeland Security Missions Dale W. Meyerrose NIMA and the Intelligence Community Roberta E. Lenczowski A Conversation with the Assistant Secretary of Defense for C3I John P. Stenbit Future Conditions: The Character and the Conduct of War, 2010 and 2020 Patrick M. Hughes Analysis, Analysts, and Their Role in Government and Intelligence James M. Simon, Jr. Information Assurance in a Networked World Richard Hale 2002 Human Intelligence Robert B. Brannon Information Operations Gregory C. Radabaugh Improved Application of Information to the Battlefield—Revisited Robert A. Rosenberg The C4ISR-Enabled Warfighter Gary L. Salisbury The National Imagery and Mapping Agency Roberta E. Lenczowski The National Infrastructure Protection Center James B. Plehal Perspectives on National Security in the Twenty-First Century Warren B. Rudman 2001 Business Intelligence: Open Sources & Methods C. Kenneth Allard Challenges Facing the Defense Department in the Twenty-First Century Cheryl Roby Intelligence Venture Capital: A Process Richard O’Neill DISA and NCS Harry Raduege Commission to Assess United States National Security Space Management and Organization Thomas Moorman Asymmetric Approaches to Joint Vision 2020 Thomas Wilson Crucified on a Cross of Goldwater-Nichols James M. Simon, Jr. 2000 The Doctrine of Command, Control, Communications and Intelligence: A Gentle Critique Hans Mark Managing Your E-Business: Electrifying Reality Albert J. Edmonds Networks, Information Technology, and Paved Cowpaths Dale W. Meyerrose Intelligence—Cult, Craft, or Business? Charles Allen I3I: Information, Information, Information, and Information Tim Hoechst Cyber Threats: Developing a National Strategy for Defending Our Cyberspace. Mark Montgomery Information Superiority for the Warfighter John J. Garstka Leading Complex Organizations: Lessons from a Tragic Organizational Failure Scott A. Snook 1999 Information Technology and Organizational Agility Charles J. Cunningham, Jr. Department of Defense Information Operations: A Critical Commentary Walter Jajko Protecting the Financial and Payment System by Dispelling Myths Kawika Daguio Future Threats and Challenges Patrick M. Hughes Critical Infrastructure Protection Peter H. Daly Providing Global Information Services to the Warfighter David J. Kelley Defensive Strategic Information Warfare: Challenges for the U.S. Greg Rattray Infrastructure Protection and Assurance Michelle Van Cleave Critical Foundations: Protecting America's Infrastructures R. Thomas Marsh Whither the Elephant? Public-Private Sector Dynamics in the Information Realm Randall M. Fort 1998 NO SEMINAR PRIVATE Fall 1997tc \l 1 "Fall 1998" Military Applications of Commercial SATCOM Systems Robert R. Rankine, Jr. FFRDC Business at MITRE Victor A. DeMarines C3I Issues from a United Nations Perspective – Revisited William R. Clontz Shaping the Intelligence Environment in the Information Age Kenneth A. Minihan Planning Information Operations for a Changing World John J. Sheehan The Smartcard as the Ultimate Thin Client: Looking Beyond the New York Smartcard Pilot Henry A. Lichstein Space Systems as Contributors to Information Superiority Keith R. Hall Spring 1997 Relationships Between Law Enforcement and Intelligence in the Post-Cold War Philip B. Heymann Information Warfare: Hierarchies or Networks? C. Kenneth Allard The Left Hand of Curiosity A. Denis Clift Ensuring Interoperability in Military Communications Systems: The J-6 Campaign Plan Douglas D. Buchholtz Perspectives on U.S. Intelligence Arnold Donahue CIA Paths Toward the Information Highway Charles Briggs Defense Science and Technology: Foundation of the Future Anita K. Jones 21st Century National Security Challenges David S. Alberts Strategic Information Warfare Greg Rattray 1996 A Proposed Restructuring of the Intelligence Community James R. Clapper, Jr. Congress and the Intelligence Community: Oversight and Reorganization Plans Mark M. Lowenthal The Pitfalls of Peacetime Military Bureaucracy Richard T. Reynolds Information Warfare: A Conceptual Framework Julie Ryan Command and Information Systems Arthur Cebrowski The Evolution of Intelligence and the Public Policy Debate on Encryption John M. McConnell Information Systems Support to DOD and Beyond Albert Edmonds Information War: Ready for Prime Time? Martin C. Libicki Defense Science Board Recommendations on Information Architecture for the Battlefield Robert Rosenberg 1995 Information Warfare and the Revolution in Military Affairs Michael L Brown The Three Revolutions in Military Affairs William A. Owens The Globalization of Telecommunications R.C. M. (Mark) Baker Effective Intelligence and Free Democracy - Is That an Oxymoron? Arthur V. Grant, Jr. The Liberty Incident A. Jay Cristol Global Reach Laydown Robert Lawrence Integrated Information Systems for the Warrior Albert Edmonds Coalition Warfare and Predictive Analysis John A. Leide 1994 Acquiring C3 Systems for the Department of Defense: Process and Problems Thomas P. Quinn From the Soviet Union to Russia: Contradictions and Implications Lewis Wallace, Jr. The Challenge of Leverage in the Post-Cold War Era John E. Rothrock Intelligence Analysis in Coalition Warfare John A. Leide Intelligence Needs in the Post Cold War Environment Keith R. Hall The Role of Army Intelligence in the National Foreign Intelligence Program James Davis C4I Issues Albert Edmonds Survivability and Space-Based Missile Warning Capabilities Richard L.Layman C3I Issues from a United Nations Perspective William R.Clontz Formal and Informal C3I Structures in the Desert Storm Air Campaign Richard T. Reynolds 1993 The Emergence of Data Systems: Cost and Technical Change in Military Systems Barry Horowitz The Structure and Missions of the Air Force Intelligence Command Gary W. O'Shaughnessey The Role of Intelligence in Economic and Other Crises Randall M. Fort Intelligence: The Science and Technology Connection Michelle Van Cleave Naval Intelligence in the Post-Cold War Era Edward D. Sheafer Defense Intelligence: Adaptability, Character, and Capability Walter Jajko Intelligence and Security Revisited: How Much is Enough? Nina Stewart The Copernican Pull Jerry O. Tuttle 1992 Command Plan and C3I Frank B. Horton C3 During Desert Shield and Desert Storm Roscoe M. Cougill Information Systems Security James J. Hearn The Role of the Current Intelligence Officer for the Chairman of the Joint Chiefs of Staff John M. McConnell The Process of Reorganization within the US Intelligence Community Richard L. Haver C3I in Transition Albert R. Lubarsky The Evolution of the U.S. Intelligence System in the Post-Soviet Era Richard J. Kerr C4I for the Warrior Richard C. Macke 1991 Command and Control and the Operational Environments of the Services C. Kenneth Allard Technology, Intelligence and Command David Y. McManis Desert Shield/Desert Storm and the Future of Force Projection John H. Cushman, Sr. Bureaucratic Problems in Formulating National Strategy Carnes Lord The U.S. Sinai Support Mission, 1975-1982 Charles L. Stiles Military Use of Satellite Communications John Ruddy C3: A View from Inside the Joint Staff Joseph Toma Restructuring the World of C3I Duane P. Andrews Global Communications Capabilities for the Banking Industry Eugene B. Lotochinski Coalition Command and Control in Desert Shield/Desert Storm Paul R. Schwartz 1990 The Congressional Intelligence Committees Thomas K. Latimer The Information Needs of Presidents James Lucas The Policy Aspect of Intelligence C. Norman Wood The White House Information Process Kenneth Duberstein Restructuring Military Policy to Reflect Worldwide Political Changes James Cassity, Jr. Intelligence in Support of US Foreign Policy Gordon Negus The Philosophy of Intelligence W.O. Studeman The Role of the Air Force in US Counternarcotics Policy Joseph Zadarecky, II 1989 Command and Control Education and Research Stuart E. Johnson Some Business Analogies to C3I John Magee Future Directions for Defense Communications John T.Myers Four Vital Issues in C3I Charles Zraket Crisis Management at the FBI James M. Fox National Security and the Democratization of Information David Y. McManis The Role of the Joint Chiefs After the 1986 Defense Reorganization Act Robert T. Herres 1988 Intelligence Sources and Their Applications Rae Huffstutler Three Mile Island: A Case Study in C3I for Crisis Management Richard L. Thornburgh Special Operations and Low Intensity Conflict: A Congressional Perspective James R. Locher, III Strengthening the Chairman of the Joint Chiefs of Staff Robert T. Herres The Special Operations Command: Structure and Responsibilities Robert C. Kingston Tailoring C3I Systems to Military Users Jerry Tuttle The Evolution of Special Operations Forces Earl Lockwood Getting in Front of C4I2 Problems Frank J. Breth Putting C3I Development in a Strategic and Operational Context Ruth Davis 1987 The National Defense University's Command and Control Program Greg Foster Coming of Age in C3I Michael J. Zak Teaching Intelligence Robert L. DeGross The Information Management Marketplace Eugene B. Lotochinski Ideology and National Competitiveness George C. Lodge C3I: A National Security Council Perspective Rodney B. McDaniel Making Intelligence Better Fred R. Demech, Jr. Defense Reorganization: A View from the Senate James R. Locher, III Defense Reorganization: A View from the House Archie D. Barrett 1986 C3I Systems at the Joint Level Clarence E. McKnight Data Security in the Information Age Robert Conley Intelligence Techniques for the American Business Community Lionel Olmer The Role of the National Security Agency in Command, Control and Communications Harold Daniels The Quest for Good Intelligence Mark Lowenthal Data Base Publishing for Business Intelligence Richard Levine Information Technologies and Multinational Corporations John Grimes Technological Innovation and the Cost of Change Bobby R. Inman 1985 Centralization of Authority in Defense Organizations Samuel P. Huntington The Role of Intelligence within C3I Lincoln D. Faurer Structure and Mechanisms for Command and Control Richard G. Stilwell Politics and the Military  The Climate for Reform Archibald D. Barrett A Consultant's View Richard D. DeLauer A View from Inside OSD Donald C. Latham A CINC's View of Defense Organization Robert T. Herres Roles of the Joint Chiefs of Staff in Crisis Management Robert P. Hilton 1984 U.S.  U.S.S.R. Information Competition W. Scott Thompson Decision Making, Crisis Management, Information and Technology Richard S. Beal Warning as a Peacekeeping Mechanism David McManis Television News and the National Interest Leo Cherne CostEffective Rearmament James W. Stansberry Strategic Defense: A Challenge for C3I Robert A.Rosenberg C3I and Crisis Management Stuart Branch With AT&T in Iran Hubert L. Kertz with Anthony G. Oettinger 1983 - NO SEMINAR 1982 Strategic Connectivity Richard H. Ellis Planning for DefenseWide Command and Control Hillman Dickinson A Tactical Commander's View of C3I Thomas H. McMullen C3 Priorities Gerald P. Dinneen Air Force C3I Systems Robert T. Marsh Policy and National Command Richard G. Stilwell The View from the Hot Seat Richard D. DeLauer Foreign Affairs, Diplomacy and Intelligence William G. Miller 1981 Meeting Military Needs for Intelligence Systems James M. Osborne The Convergence of C3I Techniques and Technology William O. Baker A Major Contractor's View of C3I Richard D. DeLauer C3I and the Commander: Responsibility and Accountability John H. Cushman Funding C3I Charles W. Snodgrass The Uses of Intelligence David C. Richardson Congress and C3I Charles Rose Issues in Intelligence B.R. Inman 1980 C3I and Telecommunications at the Policy Level William Odom Worldwide C3I and Telecommunications Raymond Tate The Influence of Policy Making on C3I Robert Rosenberg C3I and the National Military Command System Lee Paschall Oil Crisis Management A.K. Wolgast The Developing Perspective of Intelligence William E. Colby Managing Intelligence for Effective Use B. R. Inman Watchdogging Intelligence Lionel Olmer David S. Alberts 1997 Kenneth Allard 1991,1997, 2001 Charles Allen 2000 Duane P. Andrews 1991 R.C. M. (Mark) Baker 1995 William O. Baker 1981 Archie D. Barrett 1985,1987 Richard S. Beal 1984 Stuart Branch 1984 Robert B. Brannon 2002 Frank J. Breth 1988 Charles Briggs 1997 Michael L. Brown 1995 Douglas D. Buchholtz 1997 Dean W. Cash 2002 James Cassity, Jr. 1990 Arthur Cebrowski 1996,2004 Leo Cherne 1984 James R. Clapper, Jr. 1996 A. Denis Clift 1997, 2003 William R. Clontz 1994, 1997 William E. Colby 1980 Robert Conley 1986 Roscoe M. Cougill 1992 A. Jay Cristol 1995 Charles J. Cunningham, Jr. 1999 John H. Cushman 1981,1991 Kawika Daguio 1999 Peter H. Daly 1999 Harold Daniels 1986 James Davis 1994 Ruth Davis 1988 Robert L. De Gross 1987 Richard D. DeLauer 1981,1982,1985 Victor A. DeMarines 1997 Fred R. Demech, Jr. 1987 Joan A. Dempsey 2004, 2006 Hillman Dickinson 1982 Gerald P. Dinneen 1982 Arnold Donahue 1997 Kenneth Duberstein 1990 Albert Edmonds 1994,1995,1996,2000 Richard H. Ellis 1982 Lincoln Faurer 1985 Randall M. Fort 1993, 1999 Greg Foster 1987 James M. Fox 1989 John C. Gannon 2004 John J. Garstka 2000 Lawrence K. Gershwin 2006 Arthur V. Grant, Jr. 1995 Alfred M. Gray 1991 John Grimes 1986 Carol A. Haave 2004 Richard Hale 2003 Keith R. Hall 1994, 1997 Richard L. Haver 1992 Michael Hayden 2001 James J. Hearn 1992 Robert T. Herres 1985,1988,1989 Philip B. Heymann 1997 Robert Hilton 1985 Tim Hoechst 2000 Barry Horowitz 1993 Frank B. Horton 1992 Rae Huffstutler 1988 Patrick M. Hughes 1999, 2003 Samuel P. Huntington 1985 B. R. Inman 1980,1981,1986 Walter Jajko 1993, 1999 Stuart E. Johnson 1989 Anita Jones 1997 David J. Kelley 1999 Joseph K. Kellogg, Jr. 2002 Patrick F. Kennedy 2002 Richard J. Kerr 1992 Hubert L. Kertz 1984 Robert C. Kingston 1988 Donald Latham 1985 Thomas K. Latimer 1990 Robert Lawrence 1995 Richard L. Layman 1994 Gordon Lederman 2006 John A. Leide 1994,1995 Roberta E. Lenczowski 2002, 2003 Richard Levine 1986 Martin C. Libicki 1996 Henry A. Lichstein 1997 Robert Liscouski 2004, 2006 James R. Locher III 1987,1988 Earl Lockwood 1988 George C. Lodge 1987 Carnes Lord 1991 Eugene Lotochinski 1987,1991 Mark Lowenthal 1986,1996,2004 Albert R. Lubarsky 1992 James Lucas 1990 Richard C. Macke 1992 John Magee 1989 Hans Mark 2000 R. Thomas Marsh 1982, 1999 John M. McConnell 1992,1996 Rodney B. McDaniel 1987 Clarence E. McKnight 1986 David McManis 1984,1989,1991 Thomas H. McMullen 1982 Robert B. Murrett 2004, 2006 Carmen Medina 2001 Dale W. Meyerrose 2000, 2003 William G. Miller 1982 Kenneth A. Minihan 1997 Mark Montgomery 2000 Thomas Moorman 2001 John T. Myers 1989 Gordon Negus 1990 William Odom 1980 Lionel Olmer 1980,1986 Richard O’Neill 2001 James M. Osborne 1981 Gary W. O'Shaughnessey 1993 William A. Owens 1995 Aris Pappas 2004 Lee Paschall 1980 James B. Plehal 2002 Thomas P. Quinn 1994 Gregory C. Radabaugh 2002 Harry Raduege 2001 Robert R. Rankine 1997 Greg Rattray 1997,1999,2004 Richard T. Reynolds 1994,1996 David C. Richardson 1981 Cheryl Roby 2001 Charles Rose 1981 Robert Rosenberg 1980,1984,1996,2002 Nicholas Rostow 2001 John E. Rothrock 1994 John Ruddy 1991 Warren B. Rudman 2002 Julie Ryan 1996 Gary L. Salisbury 2002 Paul R. Schwartz 1991 Edward D. Sheafer 1993 John J. Sheehan 1997 James M. Simon 2001, 2003 Charles W. Snodgrass 1981 Scott A. Snook 2000 Steven J. Spano 2006 James W. Stansberry 1984 John P. Stenbit 2003 Nina Stewart 1993 Charles L. Stiles 1991 Richard G. Stilwell 1982, 1985 W.O. Studeman 1990 Raymond Tate 1980 Scott W. Thompson 1984 Richard L. Thornburgh 1988 Joseph Toma 1991 Jerry Tuttle 1988, 1993 Michelle Van Cleave 1993, 1999 Ted Wackler 2006 Lewis Wallace 1994 Darryl Wiliams 2006 Craig Wilson 1989 Thomas Wilson 2001 A. K. Wolgast 1980 C. Norman Wood 1990 Joseph Zadarecky,III 1990 Michael Zak 1987 Charles Zraket 1989 * No session in 1983    page \* arabic1 +GQR[dg€ŤžŃŕńóô   " S T ďŕÔČź°źŁ–ź–źŠźŠź~qdWJq=h„5@ˆţ˙OJQJ^Jh=|n5@ˆţ˙OJQJ^Jh´`“5@ˆţ˙OJQJ^JhU|5@ˆţ˙OJQJ^JhĹR5@ˆţ˙OJQJ^Jh´`“@ˆţ˙OJQJ^JhŁT@ˆţ˙OJQJ^JhĹR>*@ˆţ˙OJQJ^Jh=|n>*@ˆţ˙OJQJ^Jha[Ž@ˆţ˙OJQJ^JhĹR@ˆţ˙OJQJ^Jh=|nCJOJQJ^JhĹRCJOJQJ^JhĹR5CJOJQJ\^JhĹR5>*CJOJQJ\^J+GSf€ŤóôT ż Ŕ Á Â Ç  & U g — Š đđăŮĎĎĎĎŮŮĹĹĹĹĹĹĹĹŸ $ Ć0ý*$a$gd:V­ $ Ć0ý*$a$ $ ĆH*$a$ $ ĆH*$a$ $ Ć*$a$gdŁT$ Ć0**$a$gd„%P9P:PRPýýýýT U V €  ‚ ˝ ž Á Â Ç Č   & ' T U g – ¨ Š ňâÖĂâľâÖŠ“†w“j[OCh:V­@ˆţ˙OJQJ^JhýyŢ@ˆţ˙OJQJ^JhŒĹh=|n@ˆţ˙OJQJ^JhŒĹhŒĹOJQJ^JhElhEl@ˆţ˙OJQJ^JhElhElOJQJ^Jh&OJQJ^Jh=|n@ˆţ˙OJQJ^Jh N@ˆţ˙OJQJ^JhĹR0J!@ˆţ˙OJQJ^J%jhĹR@ˆţ˙OJQJU^JhĹR@ˆţ˙OJQJ^JjhĹR@ˆţ˙OJQJU^JhĹR5@ˆţ˙OJQJ^JŠ ó ÷   > ž ˛ Ű đ ń   7 H _ s   ´ ă ô   # 4 L _ ‡ š ś Ě Ţ ő ö  óćó×˿˳˿§››››ƒ›w›ƒ›ƒ››ƒkƒ›_hĹR@ˆţ˙OJQJ^Jh0$@ˆţ˙OJQJ^Jhĺ5°@ˆţ˙OJQJ^Jhóř@ˆţ˙OJQJ^JhUÚ@ˆţ˙OJQJ^Jh N@ˆţ˙OJQJ^Jhcl)@ˆţ˙OJQJ^Jh]RŔ@ˆţ˙OJQJ^Jh+Ž@ˆţ˙OJQJ^Jh=|n@ˆţ˙OJQJ^JhElh=|n@ˆţ˙OJQJ^JhElh&OJQJ^JhElh:V­OJQJ^J#Š    + , > Ÿ ˛ Ü đ ń   7 H _ s   ´ ă ô # 5 J _ ńççççççççççççççççççççççççç $ Ć0ý*$a$ Ć0ý„Đ*$^„Đgd&_ ‡ š ś Ě ö  Vb°ÄéAS›Żň4ABG[őőőőőőőőőçőőőőőőőőőőőÚőőő $„Đ„Đ^„Đ`„Đa$ $ & F Ć0ý*$a$ $ Ć0ý*$a$ 4ALéëűBC´ŢTU]^_chi}~ţ˙ŸĽČ"Ę"“$”$˙$%T%U%((R)S)Ň)Ó)Ś+§+÷+ř+//z/{/Ń0Ň022’2“2”2öđäöÚöäđöäöäǸŁÇ–äǸÇä‰ä–ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ä‰ähĹR@ˆţ˙H*OJQJ^JhĹR>*@ˆţ˙OJQJ^J(jŤhĹR>*@ˆţ˙OJQJU^JhĹR>*@ˆţ˙OJQJ^J%jhĹR>*@ˆţ˙OJQJU^Jh›sÁOJQJ^JhĹR@ˆţ˙OJQJ^J hĹRCJhĹROJQJ^J6[o‡žŕö)Rj™Ťéüý0Bˆ–żŃßďGőőőőőőőőőőőëőőőâŐőőőőőőő $„Đ„Đ^„Đ`„Đa$$„Đ`„Đa$ „Đ„Đ]„Đ`„Đ $ Ć0ý*$a$GX„”żŐÖŰÜ2Br†˝Ńů FTĄłßń>OPQVWőőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć0ý*$a$WŠ§ěű<LkŁłěţAPyËÝ-?@ASTőőőőőőőőőőőőőőőőőőîőőőőőá $$$ Ć*$a$ Ć0ý*$ $ Ć0ý*$a$€´Íćü6KˆžÔć>SŸŤŹú=Qm~Óę őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$HY“¤ĎâNfłÇ÷ :Gh{ĹŮ  A U Ź ż őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$ż Ŕ Ĺ Ć !!?!R!{!’!Ô!ë!""(":"j"{"Ś"ś"ť"ź"##Z#o#Ł#ś#â#őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$â#ň#'$7$ƒ$‘$$Ž$ę$ý$+%>%ƒ%™%š%Ÿ% %î%˙%A&Z&‘&Ł&Ř&î&'/'n'}'őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$}'ˇ'Ć'Ű'í'î'ó'ô' ((F(Z(x(‰(ĺ(ů(=)P)c)x)ž)Đ)ĺ)ř)ů)ţ)˙)E*Y*őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$Y**’*Ń*č* +.+Y+m+—+¤+Ě+Ú+ú+ ,J,b,Ÿ,˛,ł,¸,š,ä,ř,-+-N-_-„-őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$„-™-ß-ô-".1.Q.a.š.ą.˛.ˇ.¸.ä.ů./&/T/c/}/Ž/Ź/ť/ć/ö/ 070S0f0őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$f0g0l0m0š0Ź0ę01O1f1Ÿ1˛1ó1212@2l2|2Ÿ2°2đ2őőőőőőőŕÓżő­ő­ő­ő­ő­$ Ć„Đ„0ý*$^„Đ`„0ýa$$$ Ć„Đ„0ý*$^„Đ`„0ýa$ $$$ Ć*$a$$$$ Ć„Đ„0ý*$^„Đ`„0ýa$ $ Ć*$a$”2•2ş2ť2j3k30414C5D588.;/;O;P;k<l<‡<ˆ<ś<ˇ<ń=ň=B>C>^>_>´>ľ>??X?Y?ó?ô?@@žBŁB]DqDwDxD^ErE‡EĄEŕEôEiH~HúHIII˘I§IňćňćňćňćňćňćňćňćňćňćňćňćňćňćňćňćňćňćňćÚćÎÂÎćśćÂćŞćÂćžÂžć’hÚ=l=€==†=‡=š=Ü=>#>F>\>—>Ş>¸>őőőőőőőőőőőőőőőőőőőőőőőőőőőő $ Ć*$a$¸>Ń>ě>??'?@?O?P?U?V?‡?—?ž?Ď?÷? @;@L@d@t@Ą@ľ@ß@î@ AA1Aőőőőőőőőőőőőőőőőőőőőőőőőőőč $ Ć čP*$a$ $ Ć*$a$1APAcAyA“AŠAČAÝAđABB/BEB_BqB‰B¤B´BĎBéBCC/CFCZCzC”C§CşCňňňňňňňňňňňňňňňňňňňňňňňňňňňň $ Ć čP*$a$şCĎCŕCđCD*DDD]DxDDŚDşDŇDőD EE:ELE^ErE‡EĄEťEĎEŕEôEFF5Fňňňňňňňňňňňňňňňňňňňňňňňňňňňň $ Ć čP*$a$5FIF]F}F”F§F¸FĚFáFöFG-GHG`GwGˆGGšGŃGćGűGH&H=HRHiH~H–HˇHňňňňňňňňňňňňňňňňňňňňňňňňňňňň $ Ć čP*$a$ˇHËHâHúHI4IGI\ImIŠI¨IŔIŃIçI÷IJ!J=JUJoJŒJ¤JÁJÔJńJK K5KIKňňňňňňňňňňňňňňňňňňňňňňňňňňňň $ Ć čP*$a$§I¤JşJŔJÁJôKL…L—L›L L"N7NLO]OpO„O%P&P(P)P+P,P-P.P0P1P3P4P5P6P8P9P:PPLPMPôčÜčôĐôÄôÄôÜôÜôÜôşśŽś¨ś¨ś¨ś˘š‹‡ś‡ymymjhĹROJQJUhĹROJQJ hĹRCJhĹRjhĹRUhmHnHuhĹR@ˆý˙CJ hĹRCJ hÜŠCJjhÜŠUhÜŠjhÜŠCJUhČbŠ@ˆţ˙OJQJ^Jhc(:@ˆţ˙OJQJ^Jh3@ˆţ˙OJQJ^JhÚ*˘> Endnote ReferenceH*:@:  Footnote TextCJ@&˘!@ Footnote ReferenceH*N@N TOC 1) Ɛ$ „Đ„Đ„0ý¤ŕ*$]„Đ^„Đ`„0ýJJ TOC 2% Ɛ$ „Đ„ „0ý*$]„Đ^„ `„0ýJJ TOC 3% Ɛ$ „Đ„p„0ý*$]„Đ^„p`„0ýJJ TOC 4% Ɛ$ „Đ„@ „0ý*$]„Đ^„@ `„0ýJJ TOC 5% Ɛ$ „Đ„„0ý*$]„Đ^„`„0ýBB TOC 6 Ɛ$„Đ„0ý*$^„Đ`„0ý:: TOC 7„Đ„0ý*$^„Đ`„0ýBB TOC 8 Ɛ$„Đ„0ý*$^„Đ`„0ýBB TOC 9 Ɛ$ „Đ„0ý*$^„Đ`„0ýN @N Index 1% Ɛ$ „Đ„ „`ú*$]„Đ^„ `„`úN N Index 2% Ɛ$ „Đ„ „0ý*$]„Đ^„ `„0ý>.>  TOA Heading *$ Ɛ$.". CaptionCJ:ţOň˙: _Equation Caption0U@˘0 Hyperlink>*B*FV@˘!F FollowedHyperlink >*B* ph€€‚ţO2‚SeminarHeading_Author#$$dŔţ¤d1$@&a$!5CJKHOJQJhmHnHuZ^@BZ Normal (Web)$¤d¤d1$[$\$CJOJQJaJhSHSH˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙SH–˙˙˙˙+GSf€ŤóôTżŔÁÂÇ&Ug—Š+,>Ÿ˛Üđń 7H_s ´ăô#5J_‡šśĚö Vb°ÄéAS›Żň4ABG[o‡žŕö ) R j ™ Ť é ü ý  0 B ˆ – ż Ń ß ď G X „ ” ż Ő Ö Ű Ü 2 B r † ˝ Ń ů F T Ą ł ß ń >OPQVWŠ§ěű<LkŁłěţAPyËÝ-?@AST€´Íćü6KˆžÔć>SŸŤŹú=Qm~Óę HY“¤ĎâNfłÇ÷ :Gh{ĹŮAUŹżŔĹĆ?R{’Ôë(:j{ŚśťźZoŁśâň'7ƒ‘Žęý+>ƒ™šŸ î˙AZ‘ŁŘî/n}ˇĆŰíîóô  F Z x ‰ ĺ ů =!P!c!x!ž!Đ!ĺ!ř!ů!ţ!˙!E"Y""’"Ń"č" #.#Y#m#—#¤#Ě#Ú#ú# $J$b$Ÿ$˛$ł$¸$š$ä$ř$%+%N%_%„%™%ß%ô%"&1&Q&a&š&ą&˛&ˇ&¸&ä&ů&'&'T'c'}'Ž'Ź'ť'ć'ö' (7(S(f(g(l(m(š(Ź(ę()O)f)Ÿ)˛)ó)*1*@*l*|*Ÿ*°*đ*ý*ţ*++F+T+m+~+˜+Ź+×+ď+,+,\,q,,Ś,Ů,đ,"-6-<-=-b-z-Ľ-ś-ř-.K.`.r.˜.Ş.ß.ń../=/s/…/†/‹/Œ/Ç/ß/ 00V0m0Ś0ž0Ř0î0 11K1_11˛1ł1š1ş1č1ý1B2U222Ŕ2Î2î2323I3i3z3‘3˝3ž3Ń3Ň3×3Ř3ń3454J4o4…4•4Ş4Â4Ö4ô4 5(5>5l5€55†5‡5š5Ü56#6F6\6—6Ş6¸6Ń6ě677'7@7O7P7U7V7‡7—7ž7Ď7÷7 8;8L8d8t8Ą8ľ8ß8î8 9919P9c9y9“9Š9Č9Ý9đ9::/:E:_:q:‰:¤:´:Ď:é:;;/;F;Z;z;”;§;ş;Ď;ŕ;đ;<*<D<]<x<<Ś<ş<Ň<ő< ==:=L=^=r=‡=Ą=ť=Ď=ŕ=ô=>>5>I>]>}>”>§>¸>Ě>á>ö>?-?H?`?w?ˆ??š?Ń?ć?ű?@&@=@R@i@~@–@ˇ@Ë@â@ú@A4AGA\AmAŠA¨AŔAŃAçA÷AB!B=BUBoBŒB¤BÁBÔBńBC C5CIC\CnC€C—CŹCÂCŢCôCDD,DAD[DnD…DĄDżDŘDéDűD E5EKE[EqEE˜EŽEĹEÚEôEF"F7FPFeFwFŽF­FŔFŇFéFGG-GLG]GpG„G–GŠGźGĐGęGűGH%H'H(H*H+H,H-H/H0H2H3H4H5H7H8H9H:H;HŸ˛Üđ VbTH˜0€€Ř˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€˜0€€€Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Iˆ0 Kˆ0 Iˆ0 Iˆ0 Iˆ0 š0€€€š0€€€š 0€€€Kˆ00œ° T Š ”2§IMPSP),-0<FJŠ _ [GWż â#}'Y*„-f0đ2ś59Ř;¸>1AşC5FˇHIKŽMPSP*./123456789:;=>?@ABCDEGHIRP+U˝SHX˙„!”˙•€đ@đ  @ń˙˙˙€€€÷đ’ đđ0đ( đ  đđB đS đżË˙ ?đđÜđđÄđ( đ@ő2@ő2F đđŒ đ Ł đ<€‚ƒ„żË˙?ż #"ń ż€đđ đÎţ˙˙đ"#ˇq@˙˙ _Hlt488486777 _Hlt488486806 _Hlt488487046 _Hlt488486931 _Hlt488486946›  TH@@@@@œžžĄĄTH˙˙1¤–”×|¤–TÖ|¤–ÔÖ|¤–”Ő|¤–TÔ| ¤–Ô×| ¤–Ő| ¤–”Ô| ¤–ÔÔ| ¤–TŐ|¤–ÔŐ|¤–Ö|¤–Ô|¤–”Ó|¤–TÓ|¤–Ó|¤–<“¤– Ž¤–t•Î¤–ÜÁC ¤–ŔC ¤–¤7 ¤–LŠx¤–ŒZ|¤–ŹM; ¤–äz¤–|K; ¤–óă ¤–ÔK|!¤–,–Î"¤–TJ #¤–J $¤–ÔJ %¤–”J &¤–TJ '¤–J (¤–ÔJ )¤–”J *¤–TJ +¤–J ,¤–ÔJ -¤–”J .¤–TJ /¤–J 0¤–ÔŢ|1¤–”Ţ|2¤–TŢ|3¤–Ţ|4¤–ÔÝ|99o o x ‡ ’   ;;ąą%%űű44đđ22#!#!Ž!Ž!3#F#F#­( + +++ż1ż1Œ3Œ3Ś<Ś< = =‡=‡=TH      !"%#$&'()*+,-./0==w † ‘ ˜ ˜   ??¸¸--˙˙GG÷÷88%!%!’!’!7#M#M#ž(++'+'+Ă1Ă133Ź<Ź<====TH  !"$%#&'()*+,-./0:*€urn:schemas-microsoft-com:office:smarttags€Street€B0*€urn:schemas-microsoft-com:office:smarttags€country-region€;*€urn:schemas-microsoft-com:office:smarttags€address€9!*€urn:schemas-microsoft-com:office:smarttags€State€91*€urn:schemas-microsoft-com:office:smarttags€place€=,*€urn:schemas-microsoft-com:office:smarttags €PlaceName€=)*€urn:schemas-microsoft-com:office:smarttags €PlaceType€8/*€urn:schemas-microsoft-com:office:smarttags€City€ ُ 10/11,,,)1010101!101/1/10101001/11,,)10101/1//1^f 8=¨ąčďńőBGirŹłW^™ÂËÍÔŐŢřü\aşĂöKR”  _ i ¤ Ş ő ű ç î ł ť Ç Đ Ô Ţ é đ őú>DEKáëHOŔÇňűCI•œIR x}ŕéÚá˝ĆqzMT  '°ľ­ľěńôü5=KY'.w|R Y J!O!o!w!ň!÷!Š"‘"Ő#Ů#V$a$ç%î%X&`&‚&’&Ł&Ź&['b'‡''((_(e( (Ť(Z)`)Ť)ą)Ş*Ż*z+}+¤+Ť+ă+î+š, ,ä,ę,..Ÿ.¨.00ĺ0ě0&1,1W1]1‡2Ž2Ć2Ě2ů23<3G33˘3Ą4¨455<5S6Z6B8J8k8r8ď8ű899$9+9::P:Y:w:~::™:¨:Ž:Ř:Ý:ô:ú:9;@;M;T;”;š;›;Ą;<<4<=<L<R<™< <==z==é=î=*>/>g>m>‡>Ž>ĺ>đ>O?T?đ?ő?p@x@†@‹@Ą@Ť@Ő@Ü@ë@ô@A AA%AtAAA˜A˛AşAÜAáAuB|BŽBľBÜBĺBCC‡CŒCĘCŘCôCřC DD D&DLDUDaDhDxDDŠD‘D)E/E=EEEeEkE¸EżE,F1F@FJFXF_F˛FşF GGPGWGwG~GŻGśG×GäGňGőGH H%H%H'H'H(H(H*H+H,H-H/H0H2H3H8H9H:HTHńŇ ř ťÂ)/Żľ & ç'é''(,(L.O.Ž0‘0D9I9Â9Ç9ž:Ł:Ž;“;<)<r>|>=?G?@•@.A3A„A‰AA§A7B?@ABCDEFGHIJKţ˙˙˙MNOPQRSţ˙˙˙UVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžţ˙˙˙ Ą˘Ł¤ĽŚţ˙˙˙¨ŠŞŤŹ­Žţ˙˙˙ý˙˙˙ý˙˙˙˛ţ˙˙˙ţ˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙Root Entry˙˙˙˙˙˙˙˙ ŔFŕŐŹňi˙Ć´€Data ˙˙˙˙˙˙˙˙˙˙˙˙L1Table˙˙˙˙T>”WordDocument˙˙˙˙6—SummaryInformation(˙˙˙˙˙˙˙˙˙˙˙˙ŸDocumentSummaryInformation8˙˙˙˙˙˙˙˙§CompObj˙˙˙˙˙˙˙˙˙˙˙˙q˙˙˙˙˙˙˙˙˙˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ţ˙ ˙˙˙˙ ŔFMicrosoft Office Word Document MSWordDocWord.Document.8ô9˛q