ࡱ>  XZKLMNOPQRSTUVW Tbjbj suQ%Q%'''$'''P1( =+'A->???A_|3h@$Y6-'tAAtt6Q%Q%??c2tQ%?'?t0'?WW'KuJN<*bw<'tsl|npl!rslslsl66чslslslttttslslslslslslslslsl $:   TITLE "Advanced Metering Infrastructure Attack Methodology" Advanced Metering Infrastructure Attack Methodology  Version  DOCPROPERTY Version \* MERGEFORMAT 1.0  DOCPROPERTY "Date completed" \* MERGEFORMAT Jan. 5, 2009 Change History AuthorDateVersionDescriptionMatthew Carpenter11/7/20080.1OutlineTravis Goodspeed11/12/20080.2Initial DraftMatthew Carpenter, Travis Goodspeed, Joshua Wright12/20/20080.3Updated DraftTravis Goodspeed12/23/20080.8Reorganization DraftJoshua Wright, Matthew Carpenter, Brad Singletary, Ed Skoudis12/31/20080.9Final DraftMatthew Carpenter, Joshua Wright1/5/20091.0First Release Contributing Authors: Matthew Carpenter, Travis Goodspeed, Bradley Singletary, Ed Skoudis, Joshua Wright Table of Contents  TOC \o "2-3" \h \z \t "Heading 1,1,Heading 7,1,Heading 8,2,Heading 9,3,No Number 1,1"  HYPERLINK \l "_Toc218951909" 1 Introduction  PAGEREF _Toc218951909 \h 5  HYPERLINK \l "_Toc218951910" 1.1 Purpose and Scope  PAGEREF _Toc218951910 \h 5  HYPERLINK \l "_Toc218951911" 1.2 Executive Summary  PAGEREF _Toc218951911 \h 7  HYPERLINK \l "_Toc218951912" 1.3 Glossary and Acronyms  PAGEREF _Toc218951912 \h 8  HYPERLINK \l "_Toc218951913" 1.4 Works Cited  PAGEREF _Toc218951913 \h 10  HYPERLINK \l "_Toc218951914" 1.5 References  PAGEREF _Toc218951914 \h 11  HYPERLINK \l "_Toc218951915" 1.6 Contact Information  PAGEREF _Toc218951915 \h 11  HYPERLINK \l "_Toc218951916" 2 Principles of Operational AMI Vulnerability Assessment  PAGEREF _Toc218951916 \h 13  HYPERLINK \l "_Toc218951917" 2.1 Impact to AMI Value Streams  PAGEREF _Toc218951917 \h 13  HYPERLINK \l "_Toc218951918" 2.2 Practical and Pertinent Vulnerability Analysis  PAGEREF _Toc218951918 \h 14  HYPERLINK \l "_Toc218951919" 2.3 Testing Team Expertise  PAGEREF _Toc218951919 \h 14  HYPERLINK \l "_Toc218951920" 2.4 Reproducible Findings  PAGEREF _Toc218951920 \h 15  HYPERLINK \l "_Toc218951921" 2.5 Risk Evaluation  PAGEREF _Toc218951921 \h 15  HYPERLINK \l "_Toc218951922" 2.6 Opportunities for Defensive Measures  PAGEREF _Toc218951922 \h 17  HYPERLINK \l "_Toc218951923" 3 Lab Construction  PAGEREF _Toc218951923 \h 18  HYPERLINK \l "_Toc218951924" 3.1 Connecting to Component Buses  PAGEREF _Toc218951924 \h 18  HYPERLINK \l "_Toc218951925" 3.2 Development Kits  PAGEREF _Toc218951925 \h 19  HYPERLINK \l "_Toc218951926" 3.3 Logic Analyzers and Oscilloscopes  PAGEREF _Toc218951926 \h 20  HYPERLINK \l "_Toc218951927" 3.4 JTAG ICD  PAGEREF _Toc218951927 \h 21  HYPERLINK \l "_Toc218951928" 3.5 Firmware Analysis Software  PAGEREF _Toc218951928 \h 21  HYPERLINK \l "_Toc218951929" 3.6 Probes  PAGEREF _Toc218951929 \h 22  HYPERLINK \l "_Toc218951930" 3.7 Spectrum Visualization and Analysis  PAGEREF _Toc218951930 \h 22  HYPERLINK \l "_Toc218951931" 3.8 Soldering and Rework Stations  PAGEREF _Toc218951931 \h 24  HYPERLINK \l "_Toc218951932" 3.9 Common Hardware Tools  PAGEREF _Toc218951932 \h 24  HYPERLINK \l "_Toc218951933" 3.10 Cryptographic Accelerators  PAGEREF _Toc218951933 \h 25  HYPERLINK \l "_Toc218951934" 3.11 Payload Statistical Distribution Tools  PAGEREF _Toc218951934 \h 25  HYPERLINK \l "_Toc218951935" 3.12 Networking Supplies  PAGEREF _Toc218951935 \h 25  HYPERLINK \l "_Toc218951936" 3.13 Contracted Lab Work  PAGEREF _Toc218951936 \h 26  HYPERLINK \l "_Toc218951937" 3.14 Custom Equipment  PAGEREF _Toc218951937 \h 26  HYPERLINK \l "_Toc218951938" 4 Vulnerabilities  PAGEREF _Toc218951938 \h 27  HYPERLINK \l "_Toc218951939" 4.1 Plaintext NAN Traffic  PAGEREF _Toc218951939 \h 28  HYPERLINK \l "_Toc218951940" 4.2 Bus Snooping  PAGEREF _Toc218951940 \h 28  HYPERLINK \l "_Toc218951941" 4.3 Improper Cryptography  PAGEREF _Toc218951941 \h 30  HYPERLINK \l "_Toc218951942" 4.3.1 Weak Key Derivation  PAGEREF _Toc218951942 \h 30  HYPERLINK \l "_Toc218951943" 4.3.2 Improper Re-Use of Keystream Data  PAGEREF _Toc218951943 \h 31  HYPERLINK \l "_Toc218951944" 4.3.3 Lack of Replay Protection  PAGEREF _Toc218951944 \h 31  HYPERLINK \l "_Toc218951945" 4.3.4 Insecure Cipher Modes  PAGEREF _Toc218951945 \h 31  HYPERLINK \l "_Toc218951946" 4.3.5 Weak Integrity Protection  PAGEREF _Toc218951946 \h 32  HYPERLINK \l "_Toc218951947" 4.3.6 Insufficient Key Length  PAGEREF _Toc218951947 \h 32  HYPERLINK \l "_Toc218951948" 4.3.7 Cryptographically Weak Initialization Vectors  PAGEREF _Toc218951948 \h 32  HYPERLINK \l "_Toc218951949" 4.4 Direct Tampering  PAGEREF _Toc218951949 \h 33  HYPERLINK \l "_Toc218951950" 4.5 Stored Keys and Passwords  PAGEREF _Toc218951950 \h 34  HYPERLINK \l "_Toc218951951" 4.6 Cryptographic Key Distribution  PAGEREF _Toc218951951 \h 34  HYPERLINK \l "_Toc218951952" 4.7 Insecure Primary Interfaces  PAGEREF _Toc218951952 \h 35  HYPERLINK \l "_Toc218951953" 4.8 Meter Authentication Weaknesses  PAGEREF _Toc218951953 \h 35  HYPERLINK \l "_Toc218951954" 4.9 NAN Authentication Weaknesses  PAGEREF _Toc218951954 \h 36  HYPERLINK \l "_Toc218951955" 4.10 Firmware Implementation Flaws  PAGEREF _Toc218951955 \h 37  HYPERLINK \l "_Toc218951956" 4.10.1 Buffer Overflow Conditions  PAGEREF _Toc218951956 \h 37  HYPERLINK \l "_Toc218951957" 4.10.2 Off-By-One Overwrite Conditions  PAGEREF _Toc218951957 \h 37  HYPERLINK \l "_Toc218951958" 4.10.3 Format String Vulnerabilities  PAGEREF _Toc218951958 \h 37  HYPERLINK \l "_Toc218951959" 4.10.4 Integer Overflow  PAGEREF _Toc218951959 \h 38  HYPERLINK \l "_Toc218951960" 4.11 Name Resolution Deficiencies  PAGEREF _Toc218951960 \h 38  HYPERLINK \l "_Toc218951961" 4.12 Weak Default Configuration Properties  PAGEREF _Toc218951961 \h 38  HYPERLINK \l "_Toc218951962" 4.13 Traffic Routing Deficiencies  PAGEREF _Toc218951962 \h 39  HYPERLINK \l "_Toc218951963" 4.14 Denial of Service Threats  PAGEREF _Toc218951963 \h 39  HYPERLINK \l "_Toc218951964" 4.15 Information Disclosure Threats  PAGEREF _Toc218951964 \h 40  HYPERLINK \l "_Toc218951965" 4.16 Static Authentication Credentials  PAGEREF _Toc218951965 \h 40  HYPERLINK \l "_Toc218951966" 4.17 Deficient Random Number Generators  PAGEREF _Toc218951966 \h 40  HYPERLINK \l "_Toc218951967" 4.18 Network Time Services  PAGEREF _Toc218951967 \h 42  HYPERLINK \l "_Toc218951968" 5 Attack Methodology  PAGEREF _Toc218951968 \h 43  HYPERLINK \l "_Toc218951969" 5.1 Reconnaissance  PAGEREF _Toc218951969 \h 44  HYPERLINK \l "_Toc218951970" 5.1.1 Document Enumeration  PAGEREF _Toc218951970 \h 44  HYPERLINK \l "_Toc218951971" 5.1.2 Hardware Overview  PAGEREF _Toc218951971 \h 45  HYPERLINK \l "_Toc218951972" 5.1.3 Communications RF Characterization  PAGEREF _Toc218951972 \h 46  HYPERLINK \l "_Toc218951973" 5.2 Initial Analysis  PAGEREF _Toc218951973 \h 46  HYPERLINK \l "_Toc218951974" 5.2.1 Case Tamper-Protection  PAGEREF _Toc218951974 \h 46  HYPERLINK \l "_Toc218951975" 5.2.2 Radio Packet Analysis  PAGEREF _Toc218951975 \h 47  HYPERLINK \l "_Toc218951976" 5.2.3 Schematic Capture  PAGEREF _Toc218951976 \h 47  HYPERLINK \l "_Toc218951977" 5.2.4 EEPROM Dumping  PAGEREF _Toc218951977 \h 47  HYPERLINK \l "_Toc218951978" 5.2.5 Microcontroller Dumping  PAGEREF _Toc218951978 \h 49  HYPERLINK \l "_Toc218951979" 5.2.6 Bus Snooping  PAGEREF _Toc218951979 \h 51  HYPERLINK \l "_Toc218951980" 5.2.7 Network Scanning  PAGEREF _Toc218951980 \h 51  HYPERLINK \l "_Toc218951981" 5.3 Deep Analysis  PAGEREF _Toc218951981 \h 51  HYPERLINK \l "_Toc218951982" 5.3.1 Fuzzing  PAGEREF _Toc218951982 \h 52  HYPERLINK \l "_Toc218951983" 5.3.2 Firmware Disassembly  PAGEREF _Toc218951983 \h 52  HYPERLINK \l "_Toc218951984" 5.3.3 Key Extraction  PAGEREF _Toc218951984 \h 52  HYPERLINK \l "_Toc218951985" 5.3.4 Firmware Code Analysis  PAGEREF _Toc218951985 \h 53  HYPERLINK \l "_Toc218951986" 5.3.5 Fault Tracing and Enumeration  PAGEREF _Toc218951986 \h 53  HYPERLINK \l "_Toc218951987" 5.3.6 Simulation  PAGEREF _Toc218951987 \h 54  HYPERLINK \l "_Toc218951988" 5.3.7 Power-Glitching Attacks  PAGEREF _Toc218951988 \h 54  HYPERLINK \l "_Toc218951989" 5.3.8 Clock-Glitching Attacks  PAGEREF _Toc218951989 \h 54  HYPERLINK \l "_Toc218951990" 5.3.9 Exploit Development  PAGEREF _Toc218951990 \h 54  HYPERLINK \l "_Toc218951991" 5.4 Exploitation  PAGEREF _Toc218951991 \h 55  HYPERLINK \l "_Toc218951992" 5.4.1 Unauthorized Device Authentication  PAGEREF _Toc218951992 \h 55  HYPERLINK \l "_Toc218951993" 5.4.2 Malicious Patching of Firmware  PAGEREF _Toc218951993 \h 55  HYPERLINK \l "_Toc218951994" 5.4.3 Manipulation of Reported Data  PAGEREF _Toc218951994 \h 55  HYPERLINK \l "_Toc218951995" 5.4.4 Collector/Network Gear Impersonation  PAGEREF _Toc218951995 \h 56  HYPERLINK \l "_Toc218951996" 6 Conclusion  PAGEREF _Toc218951996 \h 57  Introduction Purpose and Scope This document describes the AMI Security Acceleration Project (ASAP) Red Team approach to security testing of different AMI architectures. This document specifically focuses on external equipment employing embedded computer architectures, not physically protected by utility-premise security measures. This equipment includes the following resources: The AMI meter used for customer data collection; NAN Collectors and related up-stream network gear, up to but not including the head-end AMI system controller; Supporting data networks between the AMI meter and head-end, including: Broadband Power Line systems; Power Line Carrier systems; Public Switched Telephone Network (PSTN) systems; Radio Frequency communication systems including IEEE 802.15.4, ZigBee, 6LoWPAN, IEEE 802.11, IEEE 802.16, and proprietary systems. An illustrative representation of architectures included in the ASAP Red Team scope as defined in this document is shown in  REF _Ref218655960 \h Figure 1. While Home-Area-Network (HAN) devices are not specifically within scope of the initial ASAP Red Team security testing, the approach and attack-methodology described in this document may be applied to HAN devices as well.  Figure  SEQ Figure \* ARABIC 1. ASAP Red Team AMI Analysis Scope The ASAP Red Team consists of a group of experts in the field of security analysis and penetration testing, authorized to perform an in-depth security evaluation of AMI technology. Through their efforts, the ASAP project gains the perspective of how an adversarial attacker or group of attackers can exploit AMI technology, providing a valuable account of current strengths and weaknesses. This document includes a description of the lab equipment and toolset in use, a description of the principles of testing and vulnerability classes which can be pursued, as well as detailed attack methodology. The purpose of this document is to provide guidelines for utilities and vendors to test their own equipment or to outsource such testing with a better understanding of what to expect from their attack team. While this documents authors have attempted to communicate a significant level of depth clearly, it is important to note that these are simply guidelines for testing. A deep technical understanding of the involved equipment, protocols, electronics, and vulnerability research must be coupled with creativity and time for valuable testing results to be achieved. This document is comprised of four major sections: Constructing a Lab, Principles of Testing, Common Vulnerability Types, and Attack Methodologies. Wherever appropriate, we have attempted to provide a step-by-step walk-through with a hands-on feel to our descriptions. The scope of this document does not include utility-premise components such as head-end, metering data unification systems (MDUS), customer relationship management (CRM) systems, or other SCADA-related services which complete an AMI system. It should be noted that the principles of testing these systems are similar to the techniques described in this document. However, as they have different access constraints and tend to be implemented on larger-scale computers with complex multiprocessing operating-systems, the toolset, methodology, vulnerabilities and impact are quite different. Testing of these components is vital to the security of the power-grid, and future ASAP work will likely focus on them. Executive Summary Vulnerabilities exist in any complex system. Identifying weaknesses and evaluating their associated risk allow for these vulnerabilities to be addressed, protecting customers, utilities and vendors alike. The stakes are very high, impacting the ability to generate, distribute, and consume energy in a given region. This document is best read by vendor/utility security teams. It has been prepared to provide vendors the ability to understand the vulnerabilities and attacks in order to protect their equipment properly; to provide utilities the knowledge required to enlist appropriate skill sets for testing their own implementations; and to ensure test consistency among attack teams between different vendor architectures. Throughout the document, the authors aim to bring value both to the attack-team and the vendor/utility employing them. The ASAP Red Team recommends vendors and utilities create full-time security teams if none currently exist, and additionally employ internal and third-party attack teams to search for and illustrate vulnerabilities in the utility/vendor AMI architectures and the impact of exploitation. Security must be designed into and tested at every stage in the AMI rollout process, including AMI system design, manufacturing, delivery, storage, and implementation. Weaknesses in any stage of this process can lead to catastrophic failure of the power grid. Regular penetration-tests executed by qualified attack teams are a necessary proof of such security measures and can provide valuable insight to improve existing architectures. The ASAP Red Team recommends utilities and vendors perform the following security exercises regularly (see Conclusions for a more descriptive list): Physical Security Penetration Tests Enclave Aggregation System Penetration Tests Field Aggregation System Penetration Tests Field Fixed System Penetration Tests Embedded Device Security Analysis and Vulnerability Assessment This document focuses on the non-utility-premise equipment (Embedded Device Penetration Tests from the list above). Properly securing the AMI/SCADA systems which reside inside the utility perimeter is even more important than the systems which reside externally, because they can often affect more damage if compromised. For this reason, ASAP plans to address security testing of those systems as well. This document was completed first because less is publicly known about attacking these types of systems, whereas many security devices and processes exist to attack, analyze and secure enclave aggregation systems, upon which the utility-premise systems are most often built. Nearly every hacker conference discloses new and old attack methodologies for attacking them, while training organizations such as the SANS Institute offer classes on defending them. Glossary and Acronyms AMI Advanced Metering Infrastructure, a collection of systems used to evaluate data associated with the use of utility resources ARM Advanced RISC Machine, a processor used in embedded computer systems ASAP AMI Security Acceleration Project, a task force dedicated with evaluating the security of AMI-related technology attack team Authorized team attacking AMI technology in a lab and other simulated environments BPL Broadband over Power Lines, a MAC layer networking transport system utilizing Power Line Communications as a physical layer medium Chi-square Test A data evaluation function used to measure the randomness of data, particularly in random number generators compiler Software used to convert computer source code into machine language CRM Customer Relationship Management, a process used to track and store information about customers and prospects disassembler Software used to convert machine language code into assembly-level instructions Enclave aggregation systems Computing systems supporting the analysis of data from customer data collection systems located in a head-end or supporting facility, typically consisting of IA32/IA64 architecture platforms Field aggregation systems Computing systems supporting the analysis of data from customer data collection systems located in a dispersed manner to support regional neighborhood area networks, typically consisting of a wide variety of architecture platforms Field fixed endpoints Data collection devices installed by field personnel at a customer premise for data collection, reporting to field aggregation systems and ultimately to enclave aggregation systems FFT Fast Fournier Transform, an algorithm to represent the frequency domain of a signal firmware Software used to control embedded electronic devices HAN Home Area Network, representing customer-owned devices interfacing with a utility meter or associated device I2C Inter-Integrated Circuit, a multi-master serial bus protocol JDE JD Edwards Enterprise One, a suite of Oracle-based applications for enterprise resource planning JTAG Joint Test Action Group, a standard for interfacing circuit boards, microprocessors and other peripherals for debugging purposes MDUS Meter Data Unification and Synchronization System, a repository for the storage and processing of AMI-related data NAN Neighborhood Area Network, a collection of utility devices communicating within the same approximate geographic location PLC Power Line Communications, a physical layer transport system supporting protocols such as Broadband over Power Lines RF Channel A range of radio frequencies allocated for intended use with a specific application RF Spectrum A range of radio frequencies allocated without a specific use RNG Random Number Generator SAP System Analysis and Program Development (translation), a suite of applications for enterprise resource planning SCADA Supervisory Control And Data Acquisition, an industrial control system SMD Surface Mount Device, a method of mounting components to a circuit board SPI Serial Peripheral Interface, a master/slave serial bus protocol USRP Universal Software Radio Peripheral, a software-defined radio hardware platform Works Cited Aircrack-ng. December 31, 2008. http://www.aircrack-ng.org/doku.php AMI-SEC Task Force. "AMI System Security Requirements and Guidelines." December 17, 2008. ANSI. "C12.18 Protocol Specication for ANSI Type 2 Optical Port." NEMA, 1996. ANSI. "C12.22 Protocol Specication for Interfacing to Data Communication Networks, Draft." NEMA, December 28, 2007. Beck, Martin and Tews, Erik. "Practical Attacks Against WEP and WPA", December 31, 2008. http://dl.aircrack-ng.org/breakingwepandwpa.pdf Fluhrer, Scott; Mantin, Itsik and Shamir, Adi. "Weaknesses in the Key Scheduling Algorithm of RC4", December 31, 2008. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf EMBER EM250. "Single-Chip ZigBee/802.15.4 Solution", pp. 106. January 5, 2009. http://www.ember.com/pdf/EM250_Datasheet.pdf FIPS-PUB 74. "Guidelines for Implementing And Using The NBS Data Encryption Standard." January 5, 2009. http://www.itl.nist.gov/fipspubs/fip74.htm Goodspeed, Travis. "A Side-Channel Timing Attack of the MSP430 BSL." Blackhat USA. 2008. Goodspeed, Travis. "Practical attacks against the MSP430 BSL." 25th Chaos Communication Congress. 2008. Kaplan, Dave. "Report: TJX Breach Began in Minnesota Marshalls Parking Lot", SC Magazine, May 4 2007. December 31, 2008, http://www.scmagazineus.com/Report-TJX-breach-began-in-Minnesota-Marshalls-parking-lot/article/34954/ Kelly, Scott. "Security Implications of Using the Data Encryption Standard (DES)", IETF RFC 4772, December 2006. http://www.ietf.org/rfc/rfc4772.txt Kershaw, Mike. "How to Neuter Cryptography for Thousands of Users in Two Lines", December 31, 2008. http://kismetwireless.net/articles/2600-08-summer-ssl.txt SecurityFocus. "FreeBSD IPsec Replay Vulnerability", BUGTRAQ ID 17191, December 31, 2008. http://www.securityfocus.com/bid/17191/info Security Focus. "Windows NT Syskey Reused Keystream Vulnerability", BUGTRAQ ID 873, December 31, 2008. http://www.securityfocus.com/bid/873 Walker, John. "Ent", December 30, 2008. http://www.fourmilab.ch/random/ Warner, JS; Johnston, RG, "A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing", The Journal of Security Administration 25, 19 (2002). Wright, Joshua. "Pcaphistogram", December 30, 2008. http://802.11ninja.net/~jwright/code/pcaphistogram.pl Xilman, Paul. "2_1574L.c156", December 31, 2008. http://www.mersenneforum.org/showpost.php?p=124079&postcount=97 References Catsoulis, John. "Designing Embedded Hardware, Second Edition". New York, O'Reilly Press, 2006. Erickson, Jon. "Hacking, the Art of Exploitation." San Francisco, No Starch Press, 2008. Francillon, Aurlien, and Claude Castelluccia. "Code Injection Attacks on Harvard-Architecture Devices." 15th ACM Conference on Computer and Communications Security, 2008. December 29, 2009. http://www.ist-ubisecsens.org/publications/code_inject_attack_ccs08.pdf. Fortify Software. "Fortify Taxonomy: Software Security Errors", 2008. December 20, 2009. http://www.fortify.com/vulncat/en/vulncat. Goodspeed, Travis. "Tracing with MSP430simu, LaTeX, and PowerPoint". January 2, 2008. http://travisgoodspeed.blogspot.com/2008/01/tracing-with-msp430simu-latex-and.html Koizol, Jack, et al. "The Shellcoder's Handbook." Indianapolis, Wiley, 2004. Contact Information Please direct questions, comments and suggestions on this document to: Matthew Carpenter InGuardians, Inc. +1 202 517 6655 matt@inguardians.com Principles of Operational AMI Vulnerability Assessment To maximize the effectiveness and applicability of the security evaluation of AMI-related technology, the attack team should follow a series of testing principles supporting consistent technology analysis. Through these techniques, a team of analysts can produce a cohesive assessment of one or more target devices or AMI deployments. The resulting documentation will provide necessary information to remediate the threats and vulnerabilities that would otherwise hinder the successful deployment of AMI-based technology. Impact to AMI Value Streams The AMI System Security Architectural Description describes five categories of value streams for the adoption of AMI technology  REF _Ref218237952 \r \h [1]: Billing Customer Distribution System Installation System Each value stream represents tangible benefits for AMI adopters. When exposed to system vulnerabilities and risks, these values are threatened, effectively reducing the overall benefit of adopting AMI technology. As a key component of all security evaluation performed by the attack team, each attack or vulnerability should be evaluated in the scope of the affected value streams that threaten the overall AMI technology benefit for adopters. Through this analysis, each attack or vulnerability can be described such that utilities and vendors are able to evaluate the affected system impact with respect to the key utility value streams. Practical and Pertinent Vulnerability Analysis As a critical component of each security evaluation exercise, the attack team should work with vendors, the AMI security team, utilities and applicable third-parties to identify an appropriate scope for the analysis. The scope must take into account the resources of an adversary that may attempt to compromise the security and integrity of AMI-related technology. The resources accessible to a potential adversary will significantly influence the threats that require defense and mitigation strategies. For example, an attacker who has up to $10,000/USD in accessible resources for the purpose of exploiting AMI technology represents a different threat than a well-funded adversary whose goals exceed that of common mischief or simple service theft. The scope for the analysis should address the highest-level of attacker funding feasible, while the team must keep in mind all of the different levels of attack. For instance, the scope may include the resources available to a foreign government, but the attack team should be cautious not to ignore the attack vectors likely to be targeted by self-funded individuals. Based on the scope, the attack team should apply scientific analysis methods to enumerate and evaluate potential threats, collecting supporting data through observation and experimentation then designing further analysis test cases to evaluate through experimentation. Threats that are deemed irrelevant or impractical based on the identified adversary resources can be disregarded, focusing on the practical and pertinent threats immediately affecting customers, utilities and vendors. Noting these discarded threats, their likelihood and impact of exploitation should be considered additional value to a final report. Vendors and utilities must understand the contextual constraints the analysis project scope places on any engagement and subsequent report. Through this method, the attack team will focus on the areas of direct value for affected parties, providing the greatest possible benefit in the analysis and findings reporting. Testing Team Expertise In order to be effective in the analysis of AMI technology, the attack team will require expertise in multiple areas of information security, electrical and radio engineering. Due to the varied expertise requirements, it is anticipated that the attack team will be composed of several individuals with diverse backgrounds, collaborating on the analysis of AMI technology. Fields of expertise required for effective analysis include: Knowledge of the assembly language for processors used by meters and associated hardware Software vulnerability identification and analysis skills Experience writing software-based exploits RF modulation and coding analysis experience Experience analyzing standards-based protocols including infrared, IEEE 802.15.4/ZigBee, IEEE 802.16/WiMAX, BPL/PLC, ANSI C12.18/C12.19/C12.21/C12.22 and proprietary protocols Basic and advanced understanding of electronics and principles of electricity Safety training and experience working with high-voltage electronics Experience developing embedded technology including embedded software development programming and hardware engineering Analysis skills for evaluating cryptographic algorithms and associated functions Ability to creatively evaluate technology for the goal of subversion Reproducible Findings The attack team recognizes that any findings identifying security threats or vulnerabilities in AMI-related technology will be subject to significant scrutiny and analysis. Throughout the project, all security-related findings will be documented such that other analysts will have sufficient information to reproduce the findings for an independent findings evaluation, where desired. Methodologies and results should both be carefully documented to make results repeatable by other researchers, the associated vendor(s), and utility companies with access to similar resources to the testing team. Risk Evaluation The identification of risks to customers, utilities and vendors of AMI-related technology will be one of the deliverables for the attack team during the ASAP project. Where vendors and utilities have a finite amount of resources to apply to the mitigation of risks, it is necessary to provide an overall prioritization of identified threats such that threats of the greatest urgency are resolved before threats with little to no overall risk. To support the prioritization and evaluation of risk, the attack team should evaluate all threats and vulnerabilities with supporting documentation as follows: Risk Description Information describing the risk, citing references where applicable. Risk Probability The probability of the risk happening to a vendor based on the understanding of potential adversaries that require defensive measures. This probability should be recorded on a scale of 1 to 10 with 1 being least probable and 10 being the most probable. Risk Impact The potential impact of the risk to the utility or vendor should the threat be realized. The impact should be recorded on a scale of 1 to 10 with 1 being least impact and 10 being the greatest impact. Risk Data Quality Evaluation Risk evaluation requires unbiased and accurate data for credibility. The risk documentation should include the following data points to describe the quality of the risk data: Risk Understanding How well is the risk understood? Data Availability How complete is the data pertaining to the risk? Data Quality Is the data available relevant to the risk being described? Is the data current? Data Reliability How objective is the data that has been supplied to describe the threat? The reliability of data will increase with multiple data points from different sources coming to similar conclusions, or decrease if the data is highly biased or widely disparate across multiple sources. Risk Urgency Assessment What is the urgency of the risk? The completed risk data will be used to populate a quantitative risk evaluation model, providing the necessary information to the utility or vendor for prioritizing threat remediation, transfer or acceptance. An example of the quantitative risk evaluation model for evaluating the priority of risk remediation is shown in  REF _Ref218951414 \h Figure 2.  Figure  SEQ Figure \* ARABIC 2. Quantitative Risk Measurement Model Opportunities for Defensive Measures While the focus of the attack team is to identify vulnerabilities threatening AMI technology, such in-depth analysis will also reveal defensive measures for mitigating the impact or probability of threats. While not a definitive measure of the only strategy for defending against identified vulnerabilities, the attack team should identify strategies for the mitigation of vulnerabilities that may be adopted by the utility or the vendor. Lab Construction For the analysis of AMI devices, the ASAP Red Team recommends utilizing several classes of devices and technology. These resources provide insight into the workings of various components included in AMI system implementations with a focus on security analysis. Connecting to Component Buses The ability to capture and inject data onto a serial or serial-like data bus can be exceptionally useful for an attacker. Using commercial or open-source tools, an attacker not only can monitor vital information between components on the bus, such as configuration information or cryptographic keys, but also can interact quickly with components such as radios and EEPROMs without desoldering them from a circuit-board. For the I2C and SPI serial protocols, Total Phase provides excellent tools such as the Beagle I2C/SPI Protocol Analyzer and the Aardvark I2C/SPI Host Adapter devices. Total Phase provides these tools for between $250 and $350. The PC software for interacting with them is provided on Windows, Linux and Mac OS X. This software includes user applications which allow a technician to program memory chips easily and sniff bits from the bus. The low-level attacker may use the provided code libraries to write custom applications in various programming languages including C, C++, Python and Visual Basic. For example, a custom program might capture specific data on the bus to piece together a key which is stored in different areas of an EEPROM. This key information may then be sent to a wireless packet-sniffer which can decrypt traffic protected by the observed key. The Bus Pirate, shown in  REF _Ref217832194 \h Figure 3, is an open-source protocol adapter. While slower than the Total Phase Aardvark, its open-source hardware and firmware allow it to be modified for use with other protocols, including proprietary and vendor-specific protocols.  Figure  SEQ Figure \* ARABIC 3. Bus Pirate Development Kits In addition to analyzing existing hardware, it will often be necessary for the attack team to quickly fabricate new hardware from microcontrollers, reconfigurable logic boards, radios, and similar devices. With development kits for these components, tools can be rapidly assembled without the overhead traditionally associated with ground-up design and implementation. For example, Michael Poppitz of Germany has published a logic analyzer core for Digilent's Spartan 3 FPGA development board. This core can be loaded into the memory of the development board, creating a logic analyzer without the delay that would be necessary to purchase one. Microcontroller kits, particularly those with radios such as the Crossbow TelosB and the Atmel Raven, allow for the rapid prototyping of less timing-critical applications such as radio packet sniffers and protocol fuzzers, which cannot be purchased commercially. Development kits can also be acquired for the standard ZigBee HAN stack and for non-802.15.4 radios that will compose Neighborhood Area Networks (NANs). Such a kit, the Texas Instruments EZ430T2500, is shown in  REF _Ref217838987 \h Figure 4.  Figure  SEQ Figure \* ARABIC 4. EZ430T2500 Logic Analyzers and Oscilloscopes In addition to high-level protocol analyzers, such as those described in Section  REF _Ref218951511 \r \h 3.1, the team must be equipped with logic analyzers and oscilloscopes. A digital logic analyzer, by recording digital values, allows an engineer to determine the type of traffic that might not otherwise be readable. By reading logic recordings, it is also possible to recognize timing attacks and to decode bus protocols which are partially unknown, but not encrypted. For best results in low-power embedded systems, a 32-channel analyzer with a sample rate of late least 100 MHz should be used such as the Intronix LogicPort logic analyzer. An oscilloscope allows for a similar view of the analog world. Lacking the many channels of a digital logic analyzer, a scope is more appropriate for determining clock rates, decoding simple serial protocols of unknown voltage, and quickly locating signals for use with the digital analyzer. For use in AMI security analysis, we recommend a minimum sample rate of 100 MHz such as the Agilent Technologies U2701A modular oscilloscope. A screenshot of such a scope can be seen in  REF _Ref217839001 \h Figure 5.  Figure  SEQ Figure \* ARABIC 5. An oscilloscope's view of a voltage-glitching attack. JTAG ICD Although I2C and SPI protocol adapters will suffice for programming most serial memory chips, JTAG In Circuit Debugger (ICD) tools are indispensable for reprogramming and debugging microcontrollers. Many ARM-derived microcontrollers can be debugged with the standard Olimex JTAG USB OCD, but device-specific debuggers are required for working with the TI MSP430 and Atmel AVR chips. Firmware Analysis Software Given sufficient time and experience, an attacker with physical possession of an AMI device will successfully retrieve the device firmware. As such, the firmware must be evaluated for security threats and vulnerabilities through static analysis. If source code is not available, this process requires the attack team to disassemble the binary processor instructions from the firmware. Software to perform this disassembly ranges from primitive to advanced. Alternatively, the attack team could write its own disassembly software customized to meet its particular test methodology and needs. Most compilers ship with a primitive disassembler such as Objdump from the freely available GNU Compiler Collection (GCC). More advanced firmware analysis requires an advanced disassembler, one which is capable of constructing function-call and control-flow diagrams, drawing memory maps, and performing similar advanced functions. IDA Pro, a popular tool among software reverse engineers, supports many but not all embedded architectures, such as the Freescale MC1322X series of microprocessors. More obscure architectures are supported by various open-source utilities, such as MSP430Static for the TI MSP430. Probes In order to observe the electronic behavior of a meter, it is necessary to be able to probe the device electronically. Although oscilloscopes and logic analyzers often include simple probes, other types of probes such as sharp needles and grabber clips make it easy to monitor a signal without losing electric contact with a board. An example of a medical syringe converted for use as an electrical probe with LED polarity indicators is shown in  REF _Ref218409813 \h Figure 6.  Figure  SEQ Figure \* ARABIC 6. Medical syringe repurposed as an electrical probe Spectrum Visualization and Analysis In the analysis of HAN or NAN environments, spectrum visualization tools may be leveraged to evaluate the use of the RF spectrum to identify channels in use, channel bandwidth, utilization approximation, and interference sources. For HAN and NAN devices operating in the 2.4 GHz band, inexpensive visualization tools such as Wi-Spy are useful for identifying spectrum utilization behavior, as shown in  REF _Ref218410101 \h Figure 7. Other frequencies such as the 868/915 MHz bands can be assessed with software defined radio technology such as the Universal Software Radio Peripheral (USRP), shown in  REF _Ref217881871 \h Figure 8.  Figure  SEQ Figure \* ARABIC 7. Wi-Spy representation of RF activity at 2.4 GHz  Figure  SEQ Figure \* ARABIC 8. Universal Software Radio Peripheral As an implementation of a software-based radio, the USRP also performs as a digital spectrum analyzer, measuring the Fast Fourier Transform (FFT) of incoming signals, as shown in  REF _Ref217882604 \h Figure 9. FFT analysis tools are also accessible on some digital oscilloscopes.  Figure  SEQ Figure \* ARABIC 9. USRP FFT Display Soldering and Rework Stations In addition to probing a chip or bus in-place, it is often convenient or necessary to remove the chip, replacing it later without damaging either the chip or the board. While in the past it was common to find chips mounted in sockets allowing for easy removal or replacement, this is no longer the case. An SMD rework station, consisting of both a traditional soldering iron and a hot-air wand, is the perfect tool for removing or replacing soldered-on chips. A technician can heat a board to the point at which solder reflows, then lift a chip off of that board, using care to avoid damaging other components under the heat of the soldering iron. Resoldering is performed similarly, with perhaps the use of solder paste or an iron to correct the absence or surplus of solder as needed. Common Hardware Tools In the process of opening meters and extracting circuitry for analysis, the ASAP Red Team will require the use of common hardware tools, including but not limited to: Common screwdrivers (torx, Phillips, straight-edge) Various security-bit screwdrivers Hex wrenches, common wrenches, socket sets Wire cutters, dental picks, tweezers Magnifying glasses, loupes, stereo zoom microscopes SMD chip removal kits Security lock bits Lock-pick sets Cryptographic Accelerators Cryptographic acceleration hardware will aid the ASAP Red Team in the analysis of cryptographic properties including selected algorithms, cryptographic operating modes and key length. While costly cryptographic accelerators such as the Cavium OCTEON represent an opportunity to rapidly evaluate the properties of a selected cryptographic suite, other common hardware such as the Graphics Processing Unit (GPU) in high-end video cards used in desktop and laptop systems may also be used. Devices such as the NVIDIA GeForce GTX 280 video card shown in  REF _Ref217839029 \h Figure 10 provide a significant cryptographic processing advantage over traditional host processors.  Figure  SEQ Figure \* ARABIC 10. NVIDIA GeForce GTX Video Card Payload Statistical Distribution Tools In the analysis of data collected through bus analysis, packet sniffing or other means, ciphertext payload statistical distribution software algorithms may be applied to evaluate the quality of cryptographic algorithms and data. While some payload histogram tools are available as open-source components such as Joshua Wright's Pcaphistogram tool  REF _Ref218412801 \r \h [18] and John Walker's Ent  REF _Ref218419624 \n \h [14], other software must be constructed to suit the specific algorithm and data collection needs for vendor-specific implementations. Networking Supplies For the purposes of establishing and emulating network connectivity to a meter, or for the purpose of interacting with multiple systems in the process of analyzing AMI technology, the ASAP Red Team will require the use of common networking hardware and associated cabling, as well as specialty cables and interfaces such as C12.22 optical cables. A precise list of networking supplies will be influenced by the interfaces and technology leveraged by the AMI product being evaluated. Contracted Lab Work During the reverse engineering process of a meter under analysis, testers generally lack the design documents for the device. They might find it prudent to make use of various laboratory services, such as microscopic or X-ray photography, to assess the device's nature and overall organization. Such services are relatively time-consuming and can be costly, so timing and budget should be adjusted accordingly within the scope. Custom Equipment Most but not all of the relevant equipment needed for testing will be available for purchase commercially. However, it is expected that custom electronic prototypes will be useful in testing and analysis. For example, packet sniffers are unavailable for many of the proprietary radio protocols which might be present on the NAN. Further, equipment for the quantitative measurement of leaked infrared radiation could answer the question of exactly how much data will be leaked by a given infrared communication framework. To deal with these specialized needs, the testing team must be pragmatic, creating hardware equipment and the related software to operate it as necessary for testing. Vulnerabilities Throughout the analysis of AMI system components, the attack team must apply a common set of testing principles to confirm or negate the presence of vulnerabilities in the target systems. The nature of vulnerabilities to be evaluated can be broadly differentiated as being the fault of either design or implementation. Design flaws are those vulnerabilities which stem from the underlying architectural concepts of a system. Design security flaws are made at multiple levels, including chip-design, firmware, protocol, usage etc. Such flaws are often the fault of a standard or protocol, rather than any particular implementation; therefore expected to be found in many implementations regardless of processor, language, or programming competency. For example, a communications protocol which allows access to key elements of the meter without authentication would contain a design flaw. Frequently, such issues are caused by ease-of-use and other considerations being given priority over security. Traditional examples include the Windows Messaging subsystem neglecting to authenticate senders of system messages leading to so-called Windows shattering attacks, the Address Resolution Protocol's vulnerability to cache poisoning, and the use of clear-text password authentication in telnet sessions. Implementation flaws, by contrast, are vulnerabilities which are caused by programming mistakes. These vulnerabilities are most commonly the results of programmers failing to consider or to understand the full impact of their code. For example, suppose that a network protocol mandates that a given field be only 150 bytes in length and NULL-terminated. Many programmers will assume that the field is only 150 bytes long; therefore, they might use the standard C function strcpy() to copy data from one location to another. By crafting special network frames, an attacker who includes 160 bytes in that field before NULL-termination could then overwrite the ten bytes immediately following the memory buffer created for that field. This is known as a buffer overflow. There are many causes of buffer overflows, most of which are made possible by this abuse of API calls. Implementation-flaws lend themselves to automated analysis better than design-flaws, as the same types of programming flaws occur in many types of programming, from decryption-routines to authentication to message-parsing. The delineation between design and implementation flaws is important, because the thinking and analysis process for identifying these faults differs greatly. While implementation flaws may be discovered through fuzzing, emulation and other programmatic analysis, identifying design flaws often requires a greater understanding of system functionality, design, and implementation. Throughout the evaluation of AMI device security, analysts must consider both design and implementation flaws. Plaintext NAN Traffic Due to the rapid development and changing implementation specifications for the AMI product space, vendors are responsible for a number of implementation decisions that strongly influence the security of the system. Among these decisions, vendors must choose how they implement privacy and integrity controls to protect confidential data between a meter and enclave aggregation systems. In some cases, vendors will fully encrypt all traffic transmitted over the NAN, however, it is believed that other vendors will not use encryption, or will give the utility the option to use encryption at some configuration and deployment expense. The ASAP Red Team will leverage various traffic capture tools to collect NAN traffic for a given target, collecting information over wireless interfaces or other data sources. Once data is collected, cryptographic evaluation functions such as data entropy analysis and payload histogram analysis can be applied to evaluate the collected data, identifying the presence of plaintext or encrypted traffic. If plaintext NAN traffic is observed, the ASAP Red Team will further evaluate the content of data to identify the nature and information disclosure impact of observed transmissions. Bus Snooping Embedded systems commonly use peripheral devices such as radios or EEPROM chips, interfacing with microcontrollers through SPI, I2C or other types of serial bus interfaces. Although this is a convenient and industry standard method for interfacing peripheral devices with each other, it represents a security risk for a device with little or no physical protection. For example,  REF _Ref218315886 \h Figure 12 demonstrates the use of two electrical probes constructed from medical syringes connected to a protocol adapter to extract the firmware from an EEPROM device over an I2C bus. The extracted EEPROM data could contain executable code, configuration information or cryptographic keys, each of which could be stolen or modified. From a security perspective, it is helpful for developers to evaluate the potential gains for an attacker through bus snooping. While many hardware engineers would recognize the risk of using external memory to boot a secure device, the same engineers use an insecure serial bus to connect a radio chip to a microcontroller. Many radio chip manufacturers, in effort to reduce development costs and accelerate platform adoption have implemented cryptographic algorithms internally in hardware. Implementing cryptography in hardware, which would be claimed as a security feature on many datasheets, has introduced a vulnerability: traffic between the microcontroller and the radio is left unencrypted on the bus. Using a bus sniffer, such as the device described in Section  REF _Ref218925874 \r \h 3.3, an attacker is free to passively read information from the bus in an attempt to capture sensitive information. In order to sniff packets on the network, an attacker must simply connect an appropriate bus sniffer to the serial interface between the microcontroller and the radio. By capturing the data transmitted over this interface, an attacker is able to observe all communications between the two peripherals, capturing radio configuration information, cryptographic keys, network authentication credentials and other sensitive data. This collected data can then be levered on third-party devices to extend the attacker's access into the target network. Alternatively, an attacker could manipulate the target network by injecting new packets onto the bus. This provides them with a reliable communications mechanism to actively participate in the network, where any data originates from a legitimate node on the network. Through this mechanism, the attacker may choose to exploit any trust relationships established with the victim device, to deliver manipulated frames intended to exploit other systems, or for the manipulation of other services supporting the network and services it provides. As a defense against this attack, several unified radio chips manufacturers have produced technology which includes both the microcontroller and radio within the same physical package. These chips, which include the TI CC2480A1, Freescale MC1322X, and Ember EM250, limit the effectiveness of this style of attack by protecting the bus connecting the radio to the microcontroller. However, many radios include hardware-sniffing or similar functionality into the chip, and these unified chips may still communicate with other devices over exposed data buses. The Ember chip documentation recommends enabling sniffer modes and pins by default for rapid debugging and analysis, providing detailed register settings required to do so  REF _Ref218927358 \r \h [7].  Figure  SEQ Figure \* ARABIC 11. Snooping an I2C bus. Improper Cryptography While it is often trivial to identify the absence of cryptography as described in Section  REF _Ref218238086 \r \h 4.1, it is significantly more difficult to detect cryptography which is present but improperly used. Consider, for example, the Debian/OpenSSL vulnerability in which the OpenSSL RNG was mistakenly crippled. This critical vulnerability limited the number of possible keys of a given type to fewer than forty thousand, a number sufficiently small for an attacker to generate and store all possible keys in advance. Further, this issue went unnoticed for two years before being repaired, allowing many organizations to deploy systems with vulnerable keys unaware of their risk and exposure. Despite later patches that resolved the RNG flaw, users who have not replaced all keys generated with the flawed software remain vulnerable  REF _Ref218494701 \r \h [12]. Throughout the analysis of AMI-related technology, the ASAP Red Team should evaluate multiple cryptographic mistakes that would otherwise threaten the integrity of the system. Weak Key Derivation Many cryptographic algorithms require unpredictable data as an input to the key derivation functions responsible for creating symmetric or asymmetric keys. Without sufficiently random content as an input, all keys used by the algorithm are suspect, allowing an attacker who can reproduce the input data to reproduce keys and decrypt data or otherwise impersonate trusted devices. Weak key derivation has been observed in cryptographic implementation-flaws such as the OpenSSL/Debian flaw described earlier, as well as algorithmic flaws in the DES, Blowfish and RC4 ciphers  REF _Ref218495128 \r \h [6]. The ASAP Red Team should evaluate the input values used for deriving keys at device initialization time, measuring the entropy of input data and evaluating the Chi-square test results to evaluate the randomness of data. Improper Re-Use of Keystream Data In stream ciphers, key stream data cannot be re-used without threatening the integrity of the cryptosystem. For performance reasons and in through implementation mistakes, past cryptographic protocol implementations have re-used key stream data, thereby allowing an attacker who observes a plaintext/ciphertext pair to recover the plaintext of an unknown ciphertext value. This flaw was identified in late version of the Windows NT operating system, allowing an attacker to decrypt locally stored passwords  REF _Ref218494427 \r \h [14]. This vulnerability can also extend to block ciphers in Cipher Block Chaining (CBC) mode where the initial initialization vector is re-used, although this is generally less common. The ASAP Red Team should evaluate the use of key stream data to identify inappropriate re-use, identifying areas of protocols and system components that are threatened by this flaw. Lack of Replay Protection Some cryptographic primitives accept received data as valid after checking that the data decrypts properly. Without additional verification functions such as sequence enforcement, the algorithm is vulnerable to replay attacks, where an attacker can capture a valid encrypted data stream and retransmit the content. This vulnerability affects both stream ciphers and some modes of block ciphers, and has been observed in many cases including an implementation flaw in the FreeBSD IPsec stack where an attacker who observes encrypted data may retransmit the data repeatedly, potentially manipulating the source and destination systems  REF _Ref218495651 \r \h [14]. The analyst can identify systems vulnerable to replay attacks by identifying the lack of unique identifiers in each cryptographic frame, or by observing repeated ciphertext content transmitted by one or more sources. Active analysis can also be used to evaluate replay attack vulnerabilities by replaying valid cryptographic data and observing the system state and operation after receiving the replayed data. Insecure Cipher Modes While some encryption algorithms are considered secure, such as the Advanced Encryption System (AES) cipher, the use of a cipher in an insecure mode can threaten the integrity of the cryptosystem. For example, the AES Electronic Cookbook (ECB) mode is considered weak, allowing an attacker to deduce repetitions plaintext content from repeated ciphertext blocks. Through the analysis of firmware and cryptographic chips, the ASAP Red Team should identify ciphersuite modes used in AMI technology, identifying insecure modes that represent a threat to the system. Weak Integrity Protection Many encryption algorithms, particularly stream ciphers, do not validate the content of decrypted content without a separate integrity check function. By transmitting an integrity check value (ICV) associated with the plaintext content, the receiving station can decrypt data and validate the resulting plaintext against the observed ICV. The use of weak integrity check functions allow an attacker to manipulate ciphertext data, allowing them to selectively modify data while preserving a valid ICV (so-called "bit flipping" attacks), and may allow an attacker to decrypt ciphertext without knowledge of the encryption key. These vulnerabilities have been observed in the Temporal Key Integrity Protocol (TKIP) used by the IEEE 802.11i protocol for wireless networks, allowing an attacker to decrypt arbitrary frames  REF _Ref218496636 \r \h [5]. Insufficient Key Length Encryption ciphers may prove to provide inadequate protection against an attacker if an insufficient key length is used. This is most notable in symmetric ciphers such as the Data Encryption Standard (DES) where an attacker with approximately $15,000/USD in available computing resources can recover a DES key in approximately 12 hours  REF _Ref218497108 \r \h [12]. Asymmetric ciphers are also vulnerable to insufficient key length attacks, where, at the time of this writing, it is possible to factor the prime numbers used for RSA 512-bit encryption within one month  REF _Ref218497687 \r \h [19]. The ASAP Red Team should identify the key lengths used for both symmetric and asymmetric protocols. The appropriateness of the key lengths will be evaluated based on the determined resources of a potential adversary, discussed in Section  REF _Ref218931949 \r \h 2.2. Cryptographically Weak Initialization Vectors Stream ciphers including the RC4 algorithm have a key stream generation weakness when cryptographically weak initialization vectors (IVs) are used. If an attacker is able to identify consistent known plaintext in frames (such as protocol header information) and can collect a group of cryptographically weak IVs, they may be able to recover the encryption key used to protect data with fewer operations than the entire keyspace bounds. The RC4 weakness in the selection of IVs was first publicized by Scott Fluhrer, Itsik Mantin and Adi Shamir  REF _Ref218498126 \r \h [6], describing a vulnerability in the Wired Equivalence Protocol (WEP), once part of the IEEE 802.11 specification. This flaw was later widely exploited by tools such as the Aircrack-ng suite  REF _Ref218498294 \r \h [1], a contributing factor to an attack against a US-based retailer which revealed payment card data for 45.7 million customers  REF _Ref218498539 \r \h [11]. The ASAP Red Team should evaluate AMI technology for the use of stream ciphers, investigating the length and section of IV values. Direct Tampering Tamper-protection mechanisms are intended to protect against malicious modification of a meter device, and should be part of the ASAP Red Team analysis. As part of a defense-in-depth component, the tamperproof mechanisms represent an opportunity for a vendor to protect the consumer and utility from undesirable system modification. With enough experimentation, tamper-protection mechanisms will inevitably fail. As will most defenses, the goal must be to afford significant response-time and detection ability. Appropriate tamper-protections will delay an attacker from fully compromising the integrity of meter-data for alerts to be responded to, while possibly forcing attackers to harvest multiple meters. Utilities must implement effective alerting abilities for tracking missing meters, including a means to identify and annotate the reason for missing meters. This head-end capability will allow for better reporting at the utility, and increase the likelihood of detecting stolen meters or tampering. Tamper-protection mechanisms which should be evaluated include: Local tamper detection systems, including physical indicators that someone has tampered with a meter; Remote tamper detection systems, where a meter can remotely notify a head-end office that someone is tampering with a meter; System integrity protection systems, where a meter can protect the integrity of a system, including self-erasure of keys and firmware; Intended repair modes, used for authorized repair personnel from the utility company or vendor; Security of physical locks. Vendors and utilities must assume that an attacker has physical possession of a meter, either through sale from the vendor being targeted, or as the result of theft from a customer premise. Based on the analysis of the first meter, the attacker will be better prepared to compromise a second device. Unlike real-world adversaries, a contracted analysis team must maintain a delicate balance of time and monetary resources. If an analysis team is unable to devote the required time to successfully compromise the tamper-protections, it is in the vendor or utilitys best interest to provide devices without tamper-protections. The analysis should report the effectiveness of the tamper-protections, and move on to deeper layers of analysis. Assuming an attacker with enough time and stolen meters can defeat the tamper-protection methods, the rest of the meter still requires analysis. Stored Keys and Passwords Due to the requirement for authentication, encryption and integrity protection on meter devices, it is reasonable to expect that authentication credentials such as passwords or derived keys and related encryption key material will be stored locally on the meter device. The presence of stored keys and password content represents an opportunity for attackers who wish to compromise the meter or extend their access into the NAN. Depending on the authentication methods and cryptography utilized on the meter, various keys and authentication credentials may be recovered, including: Asymmetric keys: Asymmetric keys used in public key cryptography implementations are likely to be used for authentication and dynamic key derivation functions when a meter joins the NAN and potentially for upper-layer protocols. If attackers are able to recover the public/private key pair from a meter, they will be able to authenticate to the NAN while impersonating the victim meter, but will lack the ability to impersonate the NAN infrastructure. Symmetric keys: Symmetric keys are often used for shared-authentication methods, potentially present on the NAN but more likely to be found for protecting local interfaces for out-of-band management methods. Symmetric keys are often deployed in a distributed manner, where the compromise of a symmetric key may also provide access to a number of other devices sharing the same key. With access to stored configuration and firmware content, the attack team can evaluate data stored on a meter to extract key content. Recovered keys will be an important component of the project exploitation phase as described in section  REF _Ref217808571 \r \h 5.4. Depending on the cryptographic algorithms in use and the mechanisms used for rekeying a device, an attacker may insert itself in the middle of the rekeying mechanism to obtain new keys. For example, some PKI trust mechanisms may be vulnerable to MD5 and SHA1 collision vulnerabilities, allowing an attacker to generate a trusted root certificate authority. With their own CA signing certificate, an attacker can generate a new certificate for any entity in the PKI architecture, effectively allowing them to sniff and generate network traffic to/from any system. Cryptographic Key Distribution Enabling cryptography is not terribly difficult, as most radios support it in hardware and software libraries with these capabilities are readily available. Key management, however, is a much more difficult problem, one which is likely to be an implementation and management challenge for meter devices and associated technology. In the simplest case, symmetric keys might be preloaded into the firmware of every meter of a region. An attacker who accesses the memory of a single device, such as one which is stolen from a neighbor, will have gained the keys with which to access the entire network. With this key content, the attacker will have the ability to access the NAN as an authorized meter, impersonating any other device using shared keys within the region. Some deployments will use certificates, asymmetric keys and some fashion of Public Key Infrastructure (PKI) to validate the authenticity of another devices certificate. This arrangement is similar in design to SSL as used in the HTTPS protocol to secure web-based transactions. An attack threatening these systems includes the ability to spoof system update mechanisms for the insertion of an unauthorized certificate (or certificate authority certificate), allowing an attacker to decrypt and inject encrypted traffic to or from any system. Insecure Primary Interfaces Because infrared is very short-ranged communications, some vendors assume that its communications are less likely to be sniffed or altered by an attacker. Based on this faulty assumption, some vendors pay considerably less attention to the network security of a meter's infrared port than to its radios. As such, the infrared port is likely to be an effective attack vector. For example, the ANSI C12.18 Protocol Specification for ANSI Type 2 Optical Port specifies that a password be used to protect each meter from unauthorized access  REF _Ref218237584 \r \h [3]. Given that such passwords are likely to be shared among meters, an attacker with access to the firmware of one meter would then gain the ability to communicate with other meters over infrared. As ANSI C12.22 is intended for use over more easily sniffed networks, it uses cryptography to obscure the channel during this authentication  REF _Ref218237612 \r \h [4]. Unfortunately, the more important of the two vulnerabilities remains: every node contains a table of symmetric keys which can be used to access other meters. Had asymmetric cryptography been used in the standard, a meter with a hand-held reader's public key would have enough information to verify an authorized user, but not so much information as to be able to impersonate one when compromised. An attacker may also target other well-documented interfaces, such as those defined by ANSI C12.22 between the meter and the communications module. Meter Authentication Weaknesses The process of validating authentication credentials between a meter and NAN device will require many steps, all likely to take place before the use of cryptography in the network. Often, authentication processes appear architecturally sound, but can be manipulated by an adversary to impersonate legitimate devices, expose systems to denial of service conditions or to gain information which can later be used to undermine cryptographic protocols. As part of the ASAP Red Team analysis, the process of meter authentication will be scrutinized, identifying areas where insufficient techniques are utilized to protect against authentication-related attacks targeting current or future authentication exchanges. Several common weaknesses in authentication exchanges will be evaluated, including but not limited to: Poor nonce selection; Replay attack conditions; Memory exhaustion denial of service vulnerabilities; Protocol version negotiation manipulation; Authentication credential precomputation vulnerabilities; Predictable authentication credential deficiencies; Failed authentication account lockout and logging weaknesses; Certificate trust and validation weaknesses; Certificate revocation list checking practices; Plaintext authentication credential disclosure; Tunneled authentication protocol binding vulnerabilities. NAN Authentication Weaknesses While it is important to authenticate the meter device to the NAN before granting network access, it is also vital to perform mutual-authentication where the NAN is authenticated to the meter device. Failure to authenticate the NAN to the meter may result in an attacker's ability to manipulate one or more meter devices by impersonating the NAN and supporting back-end infrastructure components. Further, deficiencies in the order of NAN and meter authentication may reveal sensitive authentication credentials which could be leveraged by an attacker to bypass authentication restrictions. Further, the varying architectures of NAN implementations will complicate the techniques and protocols used for authentication. In some cases, meter devices will authenticate to a NAN collector device, or will leverage wide-area networking (WAN) protocols such as WiMAX or 2G/3G connectivity to communicate directly with the enclave aggregation systems. Other deployments leveraging mesh technology delegate routing, traffic forwarding and node authentication functionality to each meter in the NAN. In the latter case, secure authentication of a new node represents a significant challenge since any new node could be an attacker, wishing to manipulate communications within the NAN. During the analysis of the NAN authentication process, the ASAP Red Team will examine both the authentication properties and potential vulnerabilities described in Section  REF _Ref218257364 \r \h 4.8, as well as the properties of mutual authentication for NAN. In the case of mesh networking, the functions for authenticating new mesh routing nodes will be examined, as well as the traffic routing and topology discovery behavior that represents manipulation opportunities for an attacker. Firmware Implementation Flaws Implementation flaws in software and related firmware are a common source of security vulnerabilities, with an impact ranging from denial of service conditions to full system compromise where an attacker can execute code of their own choosing on a target device. During the ASAP Red Team analysis of meters and related AMI technology, several software-related vulnerability categories will be evaluated to identify a variety of flaws, including but not limited to, buffer overflow, off-by-one overwrite, format string, and integer overflow vulnerabilities. Each of the described implementation flaws represents an opportunity for an attacker to exploit the target system. While the opportunities to an attacker will be influenced by the exact conditions of the system at the time when the flaws are exploited, it is reasonable to achieve one or more of the following conditions: Denial of service; Unexpected functioning of the device; Manipulation of system variables; Arbitrary code execution of the attacker's choosing; Manipulation of local system function calls or functionality. Buffer Overflow Conditions A common source of vulnerabilities resulting from the under-allocation of memory buffer space or through the inappropriate use of system functions calls, a buffer overflow condition is exemplified when an attacker can influence a quantity of data to be written to a buffer that exceeds the intended buffer length. Buffer overflow conditions are common in the C programming language string handling functions, but are also found in functions with iterative loops that do not properly check the bounds of a destination buffer. Off-By-One Overwrite Conditions Related to a buffer overflow vulnerability, an off-by-one overwrite is a condition in which one iteration of a loop is executed, often allowing an attacker to write data beyond the end of the intended buffer. This condition is most frequently caused when the developer fails to evaluate the behavior of their code at the boundaries of an allocated buffer of memory. An off-by-one overwrite may simply cause a denial-of-service, or allow an attacker to overwrite vital data, sometimes a function pointer which can be used to divert execution to an attacker-provided buffer of malicious code. Format String Vulnerabilities Format string vulnerabilities are found when a developer does not provide a format-string for any of the various format-related C library functions (e.g. printf) which write attacker-provided data to a screen, printing it into another variable, or storing it in a log file. Using a format string vulnerability, an attacker may provide a format-string with several variations of the %x format directive to discover data higher in memory than the format string. However, because the C libraries provide the ability to write arbitrary data using the %n format directive, an attacker may be able to overwrite vital data, including function pointers which could allow an attacker to execute arbitrary code. Integer Overflow An integer overflow vulnerability is a condition where a numeric value is manipulated such that it is larger than can be naturally represented in the given number of bits in its associated variable. Depending on the platform, an integer value that exceeds its maximum value may wrap, returning to 0 or another value that is the inverse of the maximum value, or it may saturate, retaining the maximum result despite additional arithmetic operations. Integer overflows may be used to cause buffer overflows, or otherwise confuse the processor, leading to arbitrary code execution or denial of service. Name Resolution Deficiencies In order to make the identification of hosts simpler for humans and to accommodate extensibility and flexibility in contacting computing systems, many types of name-to-address resolution protocols have been developed. DNS, the most common of such protocols used on the Internet, was not designed to accommodate any sophisticated level of security, and is well-known as a significant vulnerability source in many Internet systems. The ASAP Red Team will evaluate standards-based and proprietary name resolution methods implemented for local and global resolution used by meter devices and supporting infrastructure. Common vulnerabilities in name-resolution protocols include: Meter name resolution cache poisoning; Response manipulation through race condition exploits; Denial of service attacks against name servers; Gratuitous name resolution injection; Name server hosting services and other accessibility methods; Name server configuration and implementation; Name server entry manipulation. Weak Default Configuration Properties The implementation of strong security practices is often a challenging process, requiring detailed working knowledge of the environment, organizational tolerance for risk and an understanding of the impact of security features for other systems in use. As a result, few products are developed with a strong security configuration by default, requiring the end-user or system administrators to enable or apply the desired security options. When deployed using the vendor-specified default settings, these systems are often exposed to multiple vulnerabilities. In the analysis of both deployed AMI systems and the settings used by vendors for default configuration properties, the ASAP Red Team will identify system settings that expose products in their default configuration. These settings may include: Default configuration authentication credentials including passwords and encryption keys; Insecure remote management and communication protocols; Inadequate logging settings; Default or other untrustworthy certificates and key pairs; Weak authentication for locally accessible interfaces. Traffic Routing Deficiencies Many modern networked systems rely on intelligent devices with dynamic route selection for the forwarding of traffic through the network. The security of the routing and forwarding decisions influences the integrity and availability of traffic throughout the network. If adversaries are able to manipulate traffic-forwarding decisions, they may be able to insert themselves into the network to enable man-in-the-middle attacks. The ASAP Red Team will evaluate the behavior of traffic routing, path discovery, topology enumeration and path availability introduction to examine the integrity of routing behavior in the NAN and greater WAN environment. Careful evaluation will be applied to any opportunities where an adversary could influence traffic routing to manipulate large quantities of meter devices. Denial of Service Threats Denial of service threats are a common source of vulnerabilities in which an attacker is able to manipulate a system, preventing or prohibiting access to intended functionality. Many conditions are accessible to trigger denial of service conditions, which will be examined during the course of the ASAP Red Team evaluation. While it is not believed that an exhaustive taxonomy of denial of service conditions will be documented (nor is it likely desirable), the most prevalent conditions will be identified, prioritized by the risk evaluation criteria specified in Section  REF _Ref218931949 \r \h 2.2. Information Disclosure Threats While the use of cryptographic primitives serves to protect the confidentiality of data transmitted over a network medium, seldom does the confidentiality extend to the entire information exchange between nodes. Data including protocol headers and trailers as well as authentication and key negotiation exchanges are often transmitted in plaintext. This data potentially represents valuable information for an adversary, even without knowledge of the encryption keys in use. Not only can this information be useful by itself, it can also assist an attacker in exploiting other components of a system. In addition to technical information, an attacker may also derive power usage information from the behavior of a meter. The ability to identify power usage presents a customer privacy threat, as this information may be leveraged to identify when customers are home. Furthermore, an attacker may possibly determine what types of appliances customers are using, and extrapolate additional sensitive information about the customer's usage patterns and living habits. The ASAP Red Team will evaluate data transmitted by AMI meters and related infrastructure over networks to identify information disclosure threats delivered without privacy controls. Static Authentication Credentials In addition to the default passwords evaluated in Section  REF _Ref218271139 \r \h 4.12, the analysis team will also evaluate firmware and configuration data for the presence of fixed or static authentication credentials that cannot be changed by the end-user. The presence of such credentials has been identified in numerous vendor products, introduced and potentially forgotten for debugging and testing purposes, or simply as a result of a design flaw. The use of static credentials represents a threat to the technology adopter, potentially allowing an attacker to access the system through the use of these credentials. Deficient Random Number Generators The generation of random numbers is a vitally important operation for ensuring the integrity and confidentiality of cryptographic protocols. Unfortunately, many implementations fail to implement an adequate random number generation (RNG) function, threatening the security of all functions relying on random numbers. During the assessment of meters and related AMI technology, the ASAP Red Team will evaluate multiple facets of RNG implementations: RNG Seed Initialization: A common flaw in the implementation of RNGs is the failure to adequately seed the process with unique and unpredictable content. When a RNG is seeded with a value that is predictable or otherwise limited in entropy, it may be possible for an attacker to predict future random values. The ASAP Red Team will examine the frequency of RNG seeding, as well as the data used to initialize the RNG to evaluate potential weaknesses that threaten the integrity of the system. RNG Predictability Analysis: Using attractor analysis and information gleaned from the analysis of applicable protocols using random numbers, the ASAP Red Team will evaluate a sampling of random numbers to determine the predictability of future random values. Using a metric of the data sampling space (the number of random values observed) and the number of potential guesses for an adversary, it is possible to evaluate the RNG to determine if an attacker can determine and potentially manipulate future random number selections. RNG Value Chart: Using a variety of available tools, the ASAP Red Team will chart the distribution of a sampling of random numbers to visualize attractors indicating deficiencies in the RNG selection. Weak RNG implementations with imperfections in the randomness of data will be characterized as having geometric patterns in the RNG value chart, indicating that the implementation does not select random numbers from the entire available value pool. By comparison, an ideal RNG will appear as a well-dispersed cloud of values, without significant patterns or attractors. An example of a weak RNG implementation with distinct attractors is shown in  REF _Ref218315886 \h Figure 12, contrasted with a well-distributed RNG implementation shown in  REF _Ref218315917 \h Figure 13.  Figure  SEQ Figure \* ARABIC 12. Random number charting indicating a weak RNG  Figure  SEQ Figure \* ARABIC 13. Random number chart indicating a well-distributed RNG Network Time Services A commonly overlooked aspect of security is a devices concept of the current time. Synchronizing time between many different systems has been the focus of significant research, yielding excellent technologies such as the Network Time Protocol (NTP), Global Positioning System technology (GPS). However, these services include their own weaknesses, representing opportunities for an attacker to manipulate their representation of time. The NTP protocol is widely deployed for time synchronization throughout the Internet, but is vulnerable to a number of threats including time-server impersonation attacks, man-in-the-middle attacks, race conditions and key recovery attacks. Impersonating a GPS satellite using GPS satellite simulators allows an attacker to send false information to a target, manipulating the time on the target device  REF _Ref218950012 \r \h [17]. By manipulating the time of a target device, an attacker may be able to incur several types of mischief and havoc, including metrology data overwriting and forcing polls for events such as firmware updates. These two types of attacks could be leveraged to damage the integrity of rate and billing data, and potentially cause various forms of denial of service including network, firmware delivery servers, and meters themselves. Attack Methodology With an appropriate toolset, a firm understanding of the attack surface, and knowledge of the categories of vulnerabilities commonly found in computing and network devices, the attack team is ready to apply the attack principles on specific AMI system implementations. The attack methodology can be categorized into four phases: Reconnaissance: In the reconnaissance phase, the attack team begins collecting pertinent information for the systems to be evaluated. Resources can be collected from publicly available sources as well as through analysis of accessible AMI hardware devices; Initial Analysis: Once the reconnaissance phase is complete, information about the devices including hardware configuration, accessible interfaces, adopted standards and more will be considered and identified for further analysis and vulnerability pursuit. In this phase, the security attack team examines the areas that represent potential risk areas on devices while searching through data collected during reconnaissance for valuable information including cryptographic key content, wireless configuration features and basic firmware and code analysis. At the end of the initial analysis phase, the analysts will have identified areas that require additional analysis that represent potentially fruitful attack avenues while potentially discounting other areas that may not be practically exploited or otherwise require resources to exploit that are outside of the scope of the investigation; Deep Analysis: The deep analysis phase is the most time-intensive part of the attack methodology, exercising an in-depth analysis of a target device. In this phase, the security attack team leverages the tools available to perform debugging and tracing of devices including analysis of system firmware for the identification of potential vulnerabilities. Exploit development, when applicable, will be one component of the deep analysis phase to turn firmware vulnerabilities into privileged access in the HAN or NAN environment. Exploitation: Following the deep analysis phase, the attack team enters the exploitation phase of the analysis where developed exploits, attack tools and other techniques are used to attack the system. Each phase of the attack methodology remains iterative; at any point, new discoveries or attack opportunities may require a return to analysis phases leading up to potential system exploitation. In order to most effectively target system components of interest, the reconnaissance phase is completed with as much detail as possible so as not to overlook potential attacker opportunities. Documentation and reporting are vital components, and should include the output of each attack methodology phase, as shown in  REF _Ref217894265 \h Figure 14.  Figure  SEQ Figure \* ARABIC 14. Iterative attack methodology Reconnaissance The reconnaissance phase establishes a baseline of data regarding the technology being evaluated, providing the security attack team with the resources to further assess meters and associated technology. In this phase of the analysis, the security team will leverage documentation from multiple sources as part of the initial technology enumeration, as well as various analysis tools, such as packet sniffers, which allow for a detailed observation of live equipment operation within a lab or production deployment. Document Enumeration Public documentation and marketing material provide a wealth of information pertinent to attack. New features in a product revision announcement often indicate code that is newer and less thoroughly reviewed for vulnerabilities. The team's understanding of an AMI component's features and intended behavior will provide insight into security weaknesses as well as context for binary code analysis. Sources of public information pertinent to analysis include, but are not limited to: Marketing literature, Component datasheets, Component application notes, Operating manuals, Radio block diagrams, External and internal photographs, Operational descriptions, Schematic diagrams, FCC test reports, and Patent filings. Available documentation will vary greatly between manufacturers. In some cases, an adversary may resort to attacking publicly accessible systems or collecting resources from trash receptacles for a target manufacturer to obtain access to otherwise private information, including internal support base access, firmware updates, unpublished press releases, and similar sensitive information. Evaluation of the security of enterprise computing resources for a particular vendor is beyond the scope of ASAP, but no vendor should neglect to secure their enterprise environments properly or to consider this threat to their products. Throughout the document enumeration phase, the ASAP Red Team should identify the sources of information that is collected. These sources may include information retrieved from publicly accessible-sources, from documentation released under NDA, through unauthorized information access or from word-of-mouth and casual conversations with informed personnel. By evaluating the sources of information leveraged for the analysis of target devices, vendors and utilities can evaluate their data prevention systems. Hardware Overview The visual inspection of a meter will reveal additional information about the configuration and use of the device. Items of interest include out-of-band management interfaces, tamper-protection measures, physical layout and connections, and antennas. The following (incomplete) list provides a starting-point for analysis during this phase: Analyze the antenna size and shape, which reveals the intended band of operation Document which ICs (particularly microcontrollers and EEPROMs) are connected to the board, what they are connected to, and which pins are used to connect them Identify and document any interfaces to microcontrollers including JTAG, ICP/ISP, IR, RS232, Ethernet, SPI, I2C, etc Identify physical organization of circuit-boards; related components are most often grouped together, providing context for determining their purpose Identify groupings of long traces on the circuit-boards; these are likely a bus of some sort, interesting for logic-analyzers and providing context to the relationship between sections of the circuit. Communications RF Characterization In order to perform network analysis (sniffing) and injection attacks, the attack-team must first identify key radio information, including frequency spectrum, modulation, channel selection, frequency hopping patterns, and higher-level protocols. An example set of this information follows for a ZigBee implementation: Frequency range: 2.4GHz / 868KHz / 915KHz (802.15.4) Modulation: 2.4GHz: MSK, 868/915KHz: BPSK Channel Selection: Manual: 16/10/1 channels for 2.4GHz/915KHz /868KHz Channel Access: CSMA-CA Hopping Pattern: N/A Higher-level protocol: ZigBee (Security-Enhanced Profile) The attack-team can find information available from the communication chips datasheet and the FCC test reports. Initial Analysis During the second phase in the attack sequence, the team will begin to interact with the target devices. Using the information gathered in the reconnaissance phase, the team will leverage a variety of tools and techniques to identify vulnerabilities or technical areas worthy of further analysis (see Deep Analysis phase). While much of the work will be influenced by information gathered in the reconnaissance phase, several techniques will be useful for assaying the security of most target devices. Case Tamper-Protection Although it is not strictly necessary for the attacker to bypass tamper-protection, it is very valuable once infrared, radio, and key-management vulnerabilities have been corrected. For this reason, the team will investigate methods of preventing the detection and reporting of tampering. Radio Packet Analysis By use of either a compatible radio receiver or a bus protocol analyzer, the team will capture a number of digital radio packets, both from the NAN and the HAN. The presence or absence of cryptography should be immediately apparent by comparing just a few packets visually. The bits of an encrypted packet appear random; therefore, non-random bits indicate unencrypted traffic. Further, if bits are random within each packet, yet identical packets are seen to repeat, an analyst can deduce that the cryptography is likely vulnerable to a ciphertext replay attack. During this phase of the attack, the team will most likely develop an attack tool based on the radio chip which will provide many different attack-vectors. This tool may be developed by simply co-opting the radio chip on another target-device, or by purchasing a development kit for the appropriate radio chip external to the target device. The attacks available once this tool is complete include packet-capture, injection, fuzzing and jamming. Schematic Capture Once in possession of a meter, the team should device thorough documentation of all integrated circuits, interfaces, buses, and peripherals. The intended functionality and purpose of each device will be further ascertained through hardware reverse-engineering aided by public integrated circuit databases and manufacturer documentation. EEPROM Dumping Serial flash and EEPROM memory devices on a circuit board provide no means of protection, and they are thus immediately available to any attacker who cares to dump them with the equipment described in Section  REF _Ref218951511 \r \h 3.1. The team will review the use of such devices, manipulating them by a variety of method to extract interesting data. The simplest of these attacks to perform, photographed in  REF _Ref217832464 \h Figure 11 on page  PAGEREF _Ref217832481 \h 30, involves the use of two electric probes and a shared ground to dump an I2C EEPROM's contents. The multi-master features of I2C allow this to be performed while the device is still active. The two probes, modified hypodermic syringes, are tapping the Serial Data (SDA) and Serial Clock (SCL) lines. SPI is more difficult to tap, yet not insurmountable. Because it lacks the multi-master mode of I2C, any attempt to read or write the memory chip will result in interference from the master microcontroller. Three methods exist by which the memory chip may be accessed without the microcontroller's interference. First, the EEPROM may be desoldered by use of the SMD rework station described in Section  REF _Ref217832584 \n \h 3.8. Once removed, it can be soldered to a fresh board or connected to a ZIF socket and its contents extracted to a computer, as shown in  REF _Ref217895112 \h Figure 15. While this method is certainly among the easiest, two alternative methods are available, each with a discrete advantage.  Figure  SEQ Figure \* ARABIC 15. Extracted EEPROM Connected to ZIF Socket The second method is a passive tap, in which the MISO and MOSI lines are observed but not modified. In this configuration, memory requests are recorded. The analyst has the advantage of knowing the sequence of memory fetches and writes, but it is inconvenient for the tester to change a request. A third method involves lifting the CE (Chip Enable) pin of either the microcontroller or the memory chip as shown in  REF _Ref217894927 \h Figure 16. This allows the chip to be disabled temporarily, causing I/O pins to switch to a high impedance mode. By lifting the CE pin of a memory chip and soldering another into the bus, the attacker can temporarily replace a surface-mount chip with a ZIF socket holding a DIP chip that can be quickly replaced for experimentation.  Figure  SEQ Figure \* ARABIC 16. Lifting the Chip Enable Pin Microcontroller Dumping In addition to the valuable information found in external, serial EEPROM chips, many microcontrollers and system-on-chip (SOC) devices hold very useful information. In some ways, this data is more valuable in that often it is the only source of executable code. Due to the increased complexity of these devices and less standardization between vendors, many different interfaces exist for programming and debugging these chips. The following are some of the most common. JTAG, also known as the Joint Test Action Group or IEEE 1149.1, is a protocol for accessing test-points within an ASIC chip, debugging a microcontroller, and programming the memory of a device, such as a microcontroller or an FPGA. While most microcontrollers have a JTAG fuse which can be blown to disable debugging access, many manufacturers leave the fuse intact for debugging purposes. The fuse itself might be physical, in which case it can be bypassed with an invasive micro-electronic probe station, such as the one shown in  REF _Ref217838650 \h Figure 17. It might also be an EEPROM cell, in which case semi-invasive optical attacks can often reset the chip to its unprotected state. With access to the JTAG interface, the attack team can utilize the appropriate Flash Emulation Tool (FET) to retrieve the contents of volatile and non-volatile memory for further analysis. An example of the MSP Flash Emulation Toolkit used for retrieving the firmware of a MSP430 device is shown in  REF _Ref217839502 \h  \* MERGEFORMAT Figure 18. Spy-Bi-Wire and similar protocols are variants of JTAG which require fewer wires. This is made possible by the use of bidirectional I/O. Spy-Bi-Wire is popular in newer TI chipsets. Serial Bootstrap Loaders are a software method by which microcontrollers may be programmed. Rather than requiring custom testing hardware, such as that used by JTAG, a bootloader is placed within the permanent masked ROM of each chip. The chip can then be programmed with little more than a level-converter and a serial port. Bootloaders are often vulnerable to timing attacks which allow code to be forcibly extracted  REF _Ref218237554 \r \h [6]. Further, voltage-glitching attacks can be used to skip individual instructions of the bootloader code, allowing software protection measures to be bypassed  REF _Ref218237468 \r \h [10]. Serial Bootstrap Loaders are common in many microcontrollers, and have even been added to some architectures which do not include them from the factory (e.g. AVR ATmega processors when used in Arduino toolsets). I2C, SPI and other protocols are sometimes used for the programming of microcontrollers. Such chips rarely offer a code-protection feature. InCircuit Serial Programmers (ICSP), common in AVR and PIC microcontrollers, often use the SPI protocol and wiring.  Figure  SEQ Figure \* ARABIC 17. Flylogic Engineering's portable probe station  Figure  SEQ Figure \* ARABIC 18. MSP430 Flash Emulation Toolkit Bus Snooping Bus snooping, described in depth in section  REF _Ref217838877 \r \h 4.2, is performed at this stage. While the potential discoveries from bus-snooping could include numerous categories of flaws, the attack-team at this point will focus on looking for configuration and security information such as radio configuration, crypto-keys, and other protocols which give context for how the device operates and allow control of the various components on the circuit-board. Network Scanning Interacting with a meter network, such as by C12.22, requires the possession of a network adapter capable of communicating using the supported network protocols. For versatility, the team might find it expedient to build such an adapter that may be used with compromised authentication credentials to access NAN resources. Such a device would be configured with the ability to enumerate and identify other devices on the NAN, representing privilege escalation opportunities for the attacker. Deep Analysis Using the information gathered in the initial analysis phase, the attack team can then identify system functions and potential vulnerability areas that demonstrated merit with a reasonable probability of further success in exploiting the system. The actionable tasks for the deep analysis phase are strongly influenced by the initial analysis phase, but will reasonably consist of several techniques believed to be likely attack vectors. Fuzzing Fuzzing is the art of interacting with an application in unorthodox and sometimes random ways often causing a vulnerable application to crash or otherwise behave incorrectly. Fuzzers often inject increasingly large data into buffers attempting to cause an overflow, manipulate numbers in protocol fields to cause an overflow or underflow condition, and/or insert special characters into various fields hoping to cause some unexpected control sequence. Fuzzing should be performed wherever interaction with the target system is allowed, including: Network interaction over radio interfaces; Direct system bus interaction; Local infrared management ports; Local serial management ports. While vulnerabilities which can be remotely exploited are the highest value due to the scale of attack potential, vulnerabilities which require touching an individual meter are also valuable. Firmware Disassembly An attacker can only understand a limited amount about an application without analyzing the code that makes it work. Disassembling firmware is the act of converting machine-language processor instructions back to human-readable assembly language. Once the firmware is obtained, running it through disassembly routines will allow for much deeper analysis, providing both data and context to target-device operation. Key Extraction Since it is known that the C12.18 and C12.22 leverage a shared secret for authentication, the attack team will carefully review the firmware and EEPROM data contents for that secret. A combination of ASCII data analysis for plaintext C12.18 password storage and code block reference analysis (such as identifying references made by a function known to perform authentication) will be used to recover authentication credentials. The locations of cryptographic keys will be identified through the use of data entropy analysis. Since cryptographic keys have a high entropy level compared to that of executable code or other non-random memory contents, graphing the distribution of entropy throughout firmware or EEPROM data will reveal the approximate location of key content with a peak of high entropy, as shown in  REF _Ref217839965 \h Figure 19. In this example, an unusually high entropy level is detected at approximately 44,000 blocks offset, corresponding to the location of an asymmetric RSA key stored in memory.  Figure  SEQ Figure \* ARABIC 19. Entropy visualization for an example binary Firmware Code Analysis Once an appropriate disassembler is obtained, the firmware will be analyzed for vulnerabilities, and used to provide context to other analysis and attacks. For instance, the attack team may use disassembled firmware first to identify the code which implements a particular feature, and then use that code to extract pertinent cryptographic key information from a specific location in an external EEPROM. The attack team will also look for memory copy loops which may be manipulated to cause a buffer overflow. Analyzing firmware will also help to identify where appropriately timed power-glitching and clock-glitching attacks may be most beneficial. Fault Tracing and Enumeration Microcontroller software can be subjected to fuzzing techniques, just as workstation software can. The difficulty, however, lies in identifying when a fault has occurred. The team will accomplish this by two methods. First, many chips reset pins to high-impedance input states on a reset. Second, software may be extracted from a microcontroller and run within a simulator, where the analyst can observe other deviations from proper execution. Once a fault condition has been identified which will crash the victim machine, the exact behavior of the test case packet is analyzed to determine the vulnerable region of code. Once this is understood, a new packet can be crafted to inject executable code or perform a similarly malicious function. Simulation Through the use of available system emulators, the attack team may simulate the hardware of a meter with extracted firmware to aid in the analysis of firmware functionality and response to malformed stimuli through fuzzing. By using an emulated environment, the attack team will have access to more sophisticated monitoring and debugging tools which may prove useful in the development and testing of exploits in a controlled environment. Power-Glitching Attacks Due to the operating characteristics of microcontrollers, manipulating the power input to a microcontroller may cause it to behave inappropriately. Carefully executed, an attacker can manipulate this behavior in a predictable fashion. For instance, providing slightly less than the required power for a given microcontroller to operate may allow the microcontrollers instruction pointer to increment but not perform the instruction. An attacker may leverage a power-glitching attack to manipulate the system microcontroller to skip authentication failure processing routines or other undesirable instructions, granting access to meter and NAN resources without adequate authentication credentials. Clock-Glitching Attacks If a microcontroller is configured for use with an external clock, an attacker may be able to manipulate the system behavior to their benefit. For example, if an attacker forces two clock signals at a rate that is slightly faster than the target microcontroller can accommodate, they may be able to manipulate the system to skip the execution of a particular instruction. In this technique, an attacker may use a digital I/O pin from an attack microcontroller to provide the accelerated clock for the target microcontroller. Similar to power-glitching, this technique may provide the ability to skip failed-authentication routines or other undesirable instructions, granting the attacker greater control over the system. Exploit Development Based on the vulnerabilities discovered through firmware code analysis, tracing and enumeration, runtime evaluation and fuzzing, the attack team will develop and evaluate exploits to manipulate an unmodified meter mirroring a customer premise deployment environment. The purpose and intent of payloads will vary, but may include meter denial-of-service conditions requiring a field service visit to repair, power service termination or instantiation, service utilization reporting manipulation or other desirable conditions for an attacker. Exploitation Exploitation will often consist of piecing together multiple attack-vectors discovered during earlier phases to leverage false-assumptions, design flaws and poor programming. As such, this necessarily is the least descriptive section of the document. The exploitation phase is the culmination of all the other phases of attack, with the express goals of disrupting value-streams as defined by  REF _Ref218237952 \n \h [1]. While business value-streams are the ultimate goal, gaining control over a meter, collector/bridge, a meters data, or a network are the basic building-blocks of most attacks. When evaluating potential directions, the attack-team should begin with knowledge theyve gained about the target architecture or device; knowledge about how it works, how it was intended to work, and how outside influence can be applied to modify the behavior of the system. Successful exploitation comes from creatively piecing together different weaknesses to form one or more substantial attacks. While this phase will differ with each engagement, several potential attacks are worth mentioning as their value at this stage is easily understood. Note: Because engagements have set time-limitations, the attack-team will likely not be able to develop exploits for every promising attack. These undeveloped attacks should be documented with indications of vulnerability and potential mitigations. Unauthorized Device Authentication Authentication allows varying levels of access to any given system. The ability to circumvent or otherwise manipulate the authentication process to gain access to a device is a primary goal. Potential methods of unauthorized authentication include buffer overflows in networking or serial communication, power-glitching to skip out of a failed authentication loop or validation routine, or identifying an outlier condition which either skips validation or the authentication process completely. Malicious Patching of Firmware If an attacker successfully updates the firmware of a device, they can completely control the device. Authentication routines are no longer an issue and other vulnerabilities are not required. The discussion immediately revolves around the methods an attack has to update the firmware, and how much work and time is involved to update 100,000 devices. Manipulation of Reported Data Power is stolen every day. While new and exciting ways of stealing energy is interesting, manipulating the reported data, either in-meter or in-transit, opens many other questions. Perhaps the bigger problem is charging customers 100 times more than they should be. Perhaps the problem is reporting negative usage causing a utility to pay the customer. Many other interesting possibilities exist. Such manipulation may take place using wireless man-in-the-middle (MITM) style attacks as well as by attacking the bus on the circuit-board. Collector/Network Gear Impersonation By convincing meters that you are a collector or other control system entity, an attacker may be able to force control messages to perform such tasks as turning off the power latch, updating firmware, or attacking HAN devices. Potential ways of successfully executing such an attack may include stealing symmetric keys from a meter, private/public keys from a legitimate collector, or any other such authentication information. Conclusion Vulnerabilities exist in any complex system. Identifying and evaluating weaknesses allows for these vulnerabilities to be addressed, protecting customers, utilities and vendors alike. The stakes are very high, impacting the ability to generate, distribute, and consume energy in a given region. Security analysis is inherently a snapshot in time. Because systems change over time, and people have access to changed systems with and without authorization, vendors and utilities should perform regular reviews of their architectures, using both internal and third-party attack teams. Because of the creative and complex nature of this type of security analysis, regular reviews will likely find more vulnerabilities than only a one-off analysis, even if nothing is changed in the system itself. Changing the scope or approach between engagements can further serve to improve findings. For example, including source-code analysis to a previously black-box only analysis can change the attack-teams perspective and improve findings. Alternately, performing a black-box analysis even after analysis with source code will likely yield new findings, because the perspective has changed, removing inevitable assumptions about the target system. The ASAP Red Team recommends utilities and vendors perform the following security exercises regularly: Physical Security Penetration Tests Production/Manufacturing Delivery Storage Installation Enclave Aggregation System Penetration Tests CRM (SAP, JDE, etc) MDUS Head-Ends Corporate Network and Systems Internet-facing systems Field Aggregation Systems Neighborhood Collectors Bridges Supporting NAN and WAN Networking Equipment Field Fixed Systems Utility Meters Data Collection Devices Supporting HAN Technologies To achieve the best results, an attack-team requires appropriate funding, project scope, time, toolset and skill set. Management must understand the impact of scope on the results of an analysis. While third-party analysis can often yield more professional and fruitful results, internal attack teams should be built and challenged. Their internal knowledge can help discover more obscure weaknesses and the experience gained from attacking a system will positively impact the rest of their work. Internal security evangelism is born from such knowledgeable employees This document has discussed security-analysis scoping and described toolsets, principles of testing and attack methodology for external AMI components not protected by the physical security measures of a utility.     PAGE   TITLE \* MERGEFORMAT Advanced Metering Infrastructure Attack Methodology DOCPROPERTY "Date completed" \* MERGEFORMAT Jan. 5, 2009 PAGE \* roman iv DOCPROPERTY Version \* MERGEFORMAT 1.0 PAGE 58  DOCPROPERTY Title \* MERGEFORMAT Advanced Metering Infrastructure Attack Methodology DOCPROPERTY Version \* MERGEFORMAT 1.0 DOCPROPERTY "Date completed" \* MERGEFORMAT Jan. 5, 2009 CDwx ( ) : ; D I P Q R b c m n q r     ( * ; E I K a b ȽȽȽȽȽȽȽȽȽȽȽȽȽȽȽȵȵȭhMCJaJhhCJaJhy h"CJaJh"CJaJhy h"6CJ]aJjh)h"U h)h"hjh"Uh"Dyz{|?Wkd$$Ifl40D%  t%644 laWkd$$Ifl40D%` t%644 la $Ifgd" +$Ifgd"|}~ $$Ifa$gd"Wkd$$Ifl40D%  t%644 la ,$Ifgd"    ]XSJJJ $Ifgd"#gd"gd"Bkd$$IflD%% t%644 la ,$Ifgd"Ukd$$Ifl0D% t%644 la ( ) ; E I Q @kda$$Ifl   \:," t0  644 lap( $Ifgd"Q R c n r I@@@@ $Ifgd"kd;$$Ifl   \:," t0  644 lap( I@@@@ $Ifgd"kd$$Ifl   \:," t0  644 lap(  I@@@@ $Ifgd"kd$$Ifl   \:," t0  644 lap(  F Q U a I@7@@ $Ifgdh $Ifgd"kd$$Ifl   \:," t0  644 lap(a b I@@@@ $Ifgd"kdk$$Ifl   \:," t0  644 lap(   ! # $ - . ͲnchmHnHu-h56;CJOJQJ\aJmHnHu*jg hh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHuh"6;\jh"6;U\ hJh" h/Fh"hhh"hMCJaJh"CJaJ! I@@@@ $Ifgd"kd7$$Ifl   \:," t0  644 lap( I@@@@ $Ifgd"kd$$Ifl   \:," t0  644 lap( I@@@@ $Ifgd"kd$$Ifl   \:," t0  644 lap(    - IDDDD?#gd"gd"kd $$Ifl   \:," t0  644 lap(   ) * + , - . / 0 1 M N |iWi#j hUmHnHu$h:CJOJQJaJmHnHu*ja hh0JUmHnHuhmHnHuhh0JmHnHu-h56;CJOJQJ\aJmHnHu$jhh0JUmHnHu#j hUmHnHuhmHnHujhUmHnHu- / 6 _8J q22_1 !  !  ! N O P S T e f g ɶɫ׶ɁkɶɫY׶#j hUmHnHu*jU hh0JUmHnHuhmHnHu#j hUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHuhh0JmHnHu$jhh0JUmHnHu*j[ hh0JUmHnHu"          / 0 1 3 4 5 6 7 8 T U V W Z [ e f g ҿ衒j衒X#jhUmHnHu*jIhh0JUmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu*jOhh0JUmHnHuhh0JmHnHuhmHnHu" <=>X߭ߢkTߢ-h56;CJOJQJ\aJmHnHu*j=hh0JUmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu*jChh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHuXYZ\]^_`a}~|iWi#jhUmHnHu$h:CJOJQJaJmHnHu*j7hh0JUmHnHuhmHnHuhh0JmHnHu-h56;CJOJQJ\aJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#jhUmHnHu12356789:VWXY\]stuɶɫ׶ɁkɶɫY׶#jhUmHnHu*j+hh0JUmHnHuhmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHuhh0JmHnHu$jhh0JUmHnHu*j1hh0JUmHnHu"'()CDEGHIJҿ衒j衒X#jhUmHnHu*jhh0JUmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu*j%hh0JUmHnHuhh0JmHnHuhmHnHu"JKLhijkno߭ߢkTߢ-h56;CJOJQJ\aJmHnHu*jhh0JUmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu*jhh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHu     *+,-01NOPjklnopqrs|iWi#jhUmHnHu$h:CJOJQJaJmHnHu*j hh0JUmHnHuhmHnHuhh0JmHnHu-h56;CJOJQJ\aJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#jhUmHnHu+,-/01234ɶɫ׶ɁkɶɫY׶#j~hUmHnHu*jhh0JUmHnHuhmHnHu#jhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHuhh0JmHnHu$jhh0JUmHnHu*jhh0JUmHnHu"4PQRSVW_`a{|}ҿ衒j衒X#jrhUmHnHu*jhh0JUmHnHu#jxhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu*jhh0JUmHnHuhh0JmHnHuhmHnHu" +,-/01234PQRSVWz{|߭ߢk߭ߢY#jfhUmHnHu*jhh0JUmHnHu#jlhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu*jhh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHu" !"#&'<=>XYZ̢̭k̢Y#jZ!hUmHnHu*j hh0JUmHnHu#j` hUmHnHujhUmHnHuhmHnHu*jhh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu"Z\]^_`a}~*ӲӲӲkӲ*j"hh0JUmHnHu#jT"hUmHnHu*j!hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHujhUmHnHuhmHnHu"*+,./0123OPQRVWjklnX*j$hh0JUmHnHu#jH$hUmHnHu*j#hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#jN#hUmHnHu"   !;<=?@ABCD`abcdnX*j&hh0JUmHnHu#j<&hUmHnHu*j%hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu#jB%hUmHnHuhmHnHujhUmHnHu!BHm/j#SU !  !  !  !  ! detuvϮڒ|iWiڒ#j0(hUmHnHu$h:CJOJQJaJmHnHu*j'hh0JUmHnHuhmHnHu$jhh0JUmHnHu#j6'hUmHnHujhUmHnHuhmHnHuhh0JmHnHu-h56;CJOJQJ\aJmHnHu!%&'ABCEFGHIJfghilmɶɫ׶ɁkɶɫY׶#j$*hUmHnHu*j)hh0JUmHnHuhmHnHu#j*)hUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHuhh0JmHnHu$jhh0JUmHnHu*j(hh0JUmHnHu" !"#()JKLfghjklmҿ蠑i蠑W#j,hUmHnHu*j+hh0JUmHnHu#j+hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu*j*hh0JUmHnHuhh0JmHnHuhmHnHu"mno  ()*,-߬ߡj߬ߡX#j .hUmHnHu*j-hh0JUmHnHu#j-hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu*j,hh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHu"-./01MNOPUVopqˬˡjˡX#j0hUmHnHu*j/hh0JUmHnHu#j/hUmHnHujhUmHnHuhmHnHu*j.hh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu"GHIcdeghijklӿӱӱӿӱjӱW$h:CJOJQJaJmHnHu*jw1hh0JUmHnHu#j0hUmHnHu*j}0hh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHujhUmHnHuhmHnHu" !"#$%ABCDGHfgnX*jk3hh0JUmHnHu#j2hUmHnHu*jq2hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#j1hUmHnHu"gh    nX*j_5hh0JUmHnHu#j4hUmHnHu*je4hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu#j3hUmHnHuhmHnHujhUmHnHu"012LMNPQRSTUqrstwxײnײX*jS7hh0JUmHnHu#j6hUmHnHu*jY6hh0JUmHnHuhmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu#j5hUmHnHujhUmHnHuhmHnHuhh0JmHnHu" <=>?EF`ab|}~ӲğޟlZğl#j8hUmHnHu'h6CJOJQJ]aJmHnHu*jM8hh0JUmHnHuhmHnHu$jhh0JUmHnHu#j7hUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHuhh0JmHnHu"   234NOPRSTUVWɵɪ׵ɀjɵɪX׵#j:hUmHnHu*jA:hh0JUmHnHuhmHnHu#j9hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHuhh0JmHnHu$jhh0JUmHnHu*jG9hh0JUmHnHu"Wstuv|}ҿ蠑iV蠑$h:CJOJQJaJmHnHu*j5<hh0JUmHnHu#j;hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu*j;;hh0JUmHnHuhh0JmHnHuhmHnHu3456:;`ab|}~nX*j)>hh0JUmHnHu#j=hUmHnHu*j/=hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#j<hUmHnHu"J !!!<"""K##$o$$)%%%8&&&8'''N(( !  !  !  !     ' ( ) C D E G H I J K L h i j k o p nX*j@hh0JUmHnHu#j?hUmHnHu*j#?hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu#j>hUmHnHuhmHnHujhUmHnHu"p !!!!!!!!!9!:!;!"Z"["\"]"`"a"o"p"q""ɲɧײ}gTɧ$h:CJOJQJaJmHnHu*jDhh0JUmHnHuhmHnHu#jDhUmHnHujhUmHnHuhmHnHu-h56;CJOJQJ\aJmHnHuhh0JmHnHu$jhh0JUmHnHu*jDhh0JUmHnHu"""""""""""""""""""""""""""##lZl#jvFhUmHnHu'h6CJOJQJ]aJmHnHu*jEhh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#j|EhUmHnHu#####(#)#*#D#E#F#H#I#J#K#L#M#i#j#k#l#q#r#############ɵɪ׵ɀjɵɪX׵#jjHhUmHnHu*jGhh0JUmHnHuhmHnHu#jpGhUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHuhh0JmHnHu$jhh0JUmHnHu*jFhh0JUmHnHu"##########$ $ $ $ $$$$$-$.$/$0$5$6$L$M$N$h$ҿ衒jV衒'h6CJOJQJ]aJmHnHu*jIhh0JUmHnHu#jdIhUmHnHujhUmHnHuhmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHu*jHhh0JUmHnHuhh0JmHnHuhmHnHuh$i$j$l$m$n$o$p$q$$$$$$$$$$$$$$$$$$$$$$$$$%%mW*jKhh0JUmHnHu#jXKhUmHnHu*jJhh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#j^JhUmHnHu"%%"%#%$%&%'%(%)%*%+%G%H%I%J%O%P%^%_%`%z%{%|%~%%%%%%%%%%%%mW*jMhh0JUmHnHu#jLMhUmHnHu*jLhh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu#jRLhUmHnHuhmHnHujhUmHnHu"%%%%%%%%%%%%%&&&&& &&&&1&2&3&5&6&7&8&9&:&V&W&X&Y&ײmײW*jOhh0JUmHnHu#j@OhUmHnHu*jNhh0JUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu#jFNhUmHnHujhUmHnHuhmHnHuhh0JmHnHu"Y&^&_&o&p&q&&&&&&&&&&&&&&&&&&&&&&&&&&&&''ұÞݞlZÞl#j4QhUmHnHu$h:CJOJQJaJmHnHu*jPhh0JUmHnHuhmHnHu$jhh0JUmHnHu#j:PhUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHuhh0JmHnHu"''' '''''1'2'3'5'6'7'8'9':'V'W'X'Y'^'_'s't'u''''''''''ɵɪ׵ɀjɵɪX׵#j(ShUmHnHu*jRhh0JUmHnHuhmHnHu#j.RhUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHuhh0JmHnHu$jhh0JUmHnHu*jQhh0JUmHnHu"''''''''''''''''''' ( (((((+(,(-(G(H(I(K(L(M(N(ҿ蠑i蠑W#jUhUmHnHu*jThh0JUmHnHu#j"ThUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu*jShh0JUmHnHuhh0JmHnHuhmHnHu"N(O(P(l(m(n(o(t(u(((((((((((((((((((((()))))߬ߡj߬ߡX#jWhUmHnHu*jVhh0JUmHnHu#jVhUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu*jUhh0JUmHnHuhmHnHuhh0JmHnHu$jhh0JUmHnHu")) ) ) )')()))*)/)0)G)H)I)c)d)e)g)h)i)j)k)l)))))))))))))ˬˡjˡX#jYhUmHnHu*jXhh0JUmHnHu#j XhUmHnHujhUmHnHuhmHnHu*jWhh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu"( )j))(*|**P++%,u,w,x,,,-'..../J//J1&gd%gdgd"gd"%gd"gd" !  !  ! )))))))))))))***!*"*#*%*&*'*(*)***F*G*H*I*L*M*Y*Z*[*u*ӿӱӱӿӱjӱW$h:CJOJQJaJmHnHu*j{Zhh0JUmHnHu#jYhUmHnHu*jYhh0JUmHnHuhmHnHuhh0JmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHujhUmHnHuhmHnHu"u*v*w*y*z*{*|*}*~*******************++lZl#j[hUmHnHu'h6CJOJQJ]aJmHnHu*ju[hh0JUmHnHuhmHnHuhh0JmHnHu$h:CJOJQJaJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#jZhUmHnHu++ +++-+.+/+I+J+K+M+N+O+P+Q+R+n+o+p+q+v+w+++++++++++++ɵɪ׵ɀjɵɪX׵#j]hUmHnHu*ji]hh0JUmHnHuhmHnHu#j\hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHuhh0JmHnHu$jhh0JUmHnHu*jo\hh0JUmHnHu"+++++++,,,,, ,",#,$,%,&,',C,D,E,F,G,H,R,S,T,n,ҿ蠑iR蠑-h56;CJOJQJ\aJmHnHu*j]_hh0JUmHnHu#j^hUmHnHujhUmHnHuhmHnHu'h6CJOJQJ]aJmHnHu$jhh0JUmHnHu*jc^hh0JUmHnHuhh0JmHnHuhmHnHun,o,p,r,s,t,u,v,,,,,,,,,,,,,,,,,,,,,,,,- -qqqq``qqqqqqq hv B*fHphq h"B*fHphq &hh"B*fHphq h"jh"6;U\aJ-h56;CJOJQJ\aJmHnHu$jhh0JUmHnHuhmHnHujhUmHnHu#j_hUmHnHu -"------.,.4.5.6.A../I0J0`0a0b0i0j0k0m0J1K1S1T1j1k1l1m111wsjb^V^VjV^jhHUhHj`hl[UhmHnHuh/jW`hHB*UfHphq )jhHB*UfHphq hHB*fHphq h"fHq hfHq hB*fHphq h"B*fHphq hAB*fHphq !J1L11133"6079:D;V=*@@@A;A`AADEEE $IfgduP=K$ $Ifgd"K$% & Fgd"%gd"gd"gd"gdH $$a$gdH122(232D2F222233333$3.3/303;3<3>3?3B3C3F3G3P3Q3T3U3\3]3_3`3d3e3f3g3r3s3u3v3y3z333333333333333333333333333ŽŲhh"B*phh"B*phh??B*ph hAB*fHphq h??B*fHphq hv B*fHphq F3333333333334444 4 44444!4"4+4,4/4047484:4;4?4@4E4F4I4J4S4T4V4Z4c4i4p4v4w4x4~44444444444444444444444444445555 5 555565;5<5?5@5h5gh"B*phhh"B*phh"B*phY@5F5G5Q5R5U5V5^5_5`5a5e5f5o5p5}5~555555555555555555555555555555555556 6666666!6/707777777778!888۹۹ hAB*fHphq h??B*fHphq h"B*fHphq h"B*phhh"B*phI8{9}992:4:J:o:::A;C;;;<<<<X<Y<<<<<<<<===S>T>s>u>??w?y??????@@@@@@AA_A`ApAABBBBBBB0C2CCCCCC׽׹Ͻ׽׽ hqfhDF<h? hahDF< hwXh" h5gh"h"hA hqfh" hAB*fHphq h"B*fHphq DCCDEDFDDDDE8EEEEEETFUF`FaFFFFgd"@kd$$IflDD tD644 la $Ifgd"bkd$IfK$L$l,0'C''' tC644 lap$Ifgd"K$QQQRBSTTIUUXVVWWX+YY=ZZ2[[ \\gdTMx & F"^`gd*w & F"^`gdSi & F"^`gd V & F"^`gd"gd"QQQQQToTTTUHUIUWU{UUUUUUUUUUVVV,V-VWVXVW(W4W5W;WEFJKNOWXZ[bcmnvwyz}~ՁցNPكڃ!h[h"H*hA h('h"hnAh hh"h" hKyhf2 S![]/1ӅՅac߆ɇ !.9:?ŒÌˌ̌ h&Ch"jXOhl[UjNhqUh"CJOJQJ^JaJ h('h"jhl[Uh5qhmHnHuhjthqUjh"U hFOTh"h%hAh"9ĊŒČSZ<>9;gdb gdb $$a$gdb gd"gd" $$a$gd"gd"O\def48PX]^p P~‘ÑđőǑgiŗߗ/ݹ͹՚jhb Uhb hn 5hAh[h"H* h"h"jhl[UhmHnHujqhqUjh"Uh-3hjhjh`nUjh`nUh`nh5qh"6/0189:;<=EF\]^_FIJ`abijkl,-.56789:BCYZ[\׽۲תןߪד׌תjfhl[U hb hb jihl[UhOjhhqUjh"UjhhqUh"CJOJQJ^JaJhnAjhl[Uh"hb hmHnHuhjhb UjhqU4}ѡ^/NQp|գ -:;UV_cklpqtuxyŤƤѤҤߤhTMx h8h"hDfh=;hWV}j1hl[Uhj[1h"Uh"hmHnHujh"UJ؝ٝ-K^tOq -H1X $$a$gd"%gdDf%gdgdgdgd" $$a$gd"gd"gd" '(,-/034:;ABKLNOZ[]^efnors}~¥å˥̥֥ץۥܥ  !%h" h8h"a%&()-/67;<>?BCIJQRUVYZ_`dnoʦ˦ϦЦۦܦ 0189DEQWZ[^_ghjkhc; hs3h"jh.UhmHnHuhjh"Ujh"U h8h"h"Lkopyz§çΧϧۧܧ '(2367;=BCGHOPYZ_`cdmnpq|}ͨΨϨӨԨhJOhj_;hc;Ujhc;Uhc;h^h" h8h"S "$%013489<=EFOPSTXYcdijmn}~ëīūƫ˫̫ѫҫګ۫վh? hhh:hh@h" h8h"hc;hj;hJOUhJOjhJOUKXGX e{?L/gd4gdNDTgd"gdWV}gdWV}gd"gdgd"gd""#'(*+2356:;>?ABIJTU^_cdfgrsuv{|GMN\]`adehiklopxyͭέϭѭҭڭۭ߭hWV} h8hWV} h8h"h"\ %()1289ABEFQRUVZ[]^abmnst}~ȮɮԮծ׮خޮ߮  $%)*,-3467 h8hWV}hWV}a789>?GHUV_a X]bgxyñű.789<-ĺ˺de{QSK>Lߺ߶ɶɲɮߪhv<h4hOhm,hu hLh"h!rhNDTh:h6 h hQ5 h h"h" hKyh" hH9h"hAhWV} h8hWV}A,478CDWhk2;Hs/_i*/Bsx34MNORSVa !0I]j<h{}Ujh{}Uh:hmHnHuhjY<hv<Ujhv<Uh{}h4hv<J]`jlln%@CGJLdf$Y_'BPUivwx}~/1  "#%12349ɱɩɱh[h"H* h"$Xh"hmHnHujh"Uh"j=h.UhjS=hT'UjhT'UhT'h~h:h4h{}B:P,rk!=rsgdZgdCgdS_Sgdggds%+gd%+Jgd%+Jgd"gd"gd" $$a$gd"9y| "09=MOfVXݾ嶾ݧƧ᧜§hS_Sh A h%+Jhs%+hs%+jhGZ$UjhGZ$UhGZ$hAhSijhU\&UjhU\&UhU\&h%+Jhjh"Ujh"Uh":jk<=;QRkŹŮŪɟ؟ɔjh*wUhqh*whZ hCh\\h\\ hS_ShS_ShCj hgUjhgUhAhgh%+J hs%+hS_Sh A hSihS_Shs%+hU\&hjhU\&UjhU\&U0klmpqrs&pNP*JͺͶ讶նѶ蓶||h~hIhI6jhS5UjhS5UhS5hSijhIUjhIUhIjhDUjhDUhDhAh0h%+J hZhZh*whjh*wUjh*wU0s*k|mw"h- & Fgd2gd2gd%gdxvgdSgd"gd"gd~gd0gd%+JJKdefij()BCDGHjk{|z|@BmLUOQ"ܾܺh{hc$h.Xhhxvh:hShK>hch"jwhSiUjhSiUjhSiUhSihAhj}h~Uh~jh~U:"hx*,-<suSV {ce  "$GHOn48`ab{|}·ճͳͳjqh2U hh2hlho@h2B*ph ho@h2hnh:h.Xh"hjh2Ujh2UhAh h26h2< W ,H 4  a w    + _    *d%gd2gd2=gdl=gd"=gd2gd"gdngd"  ( 4     cdhvHJ OQ13~*+DEFIJlmv)+  12STu{ݿݳݨݻΝΝΝΝΝh~Q h\h"jkh"Ujh"Uh:h7@. hw!h"hAh2 h)h"hlh" hh2hjh2Ujh2U>d~m 3U`~A!R!##u%k&gd~QgdE>gdo?gd"%gd2gd2gd"gd"|~_`}~K M @!A!I!R!""#####$$,&.&'''''(((())**%+N+,,2,3,,,=-?-..X/Y/r/s/#0%000hp"= hBph~Q h/h" hi4h"h2?h~Q hE>hE>h2 ho`h"h{ h)h" hLho?h:ho? hh"h"hA@k&&&&']''''**O++++,3,-Y/s/11J4666h9gdp"=gd~Q%gd"gd"gd"%gd~Q0111111111111L3N3i3k3{44444455T5_55556666-7.7G7H7I7M7N77788g9h99::N:Z:M;d;;;<<:=ӸӭөөӢөӚөөhT9h"5 h1h"hAjeh"Ujh"U h"hp"=h.Xh:hK>h" h)h" hLhp"=jhUjhUhhp"=:h99:L;M;:=N?AA`BbBBBBC&CDF=HPHIJ & Fgdp"=gdp"=gd"gdP"gdP"$a$gd"gd" $$a$gd"gd"gd":=U=N?\?]?@@AAAAAAAAAA;BS?SASBSaSpSKXSXVXXYZ[C[E[,\.\\\\\S^a^^ͽͲ䩽ѡљљђ͎͎hCyh:hBkhJ h h"jh"Uj\h.UhmHnHuj[hp"=Ujhp"=Uhn)hp"=6hp"=h" hP"hP"hP"h:hj[hiUhijhiU3JN+PPPSS SaSpStUUWlWWWWWWXX/XEXUXVX%gd"gd"gd"gd" $$a$gd"gdp"=gd" & Fgd"VXZ\\]/^^__*``abVbbbbc)ccccceeg)ggd" & F!gd" & F gd"gd"gd"gdp"=^^^_____`accgg)g]ikkNk[k\kbk}l~ll]m^m_mxmymzm}m~mmmmn.n/nEnFnGnNnPnQnRnUnZn[nunvnwnynznnnnnnnnn޻֧jrh"UhmHnHujzrh"Ujh"UjqhUjhUhh{ he[h" h h"hCyh[h"H*h"hp"==)g]ik-k~llmop}rrrrsuuvv-vx||,,.gd" $$a$gd"gd"gd"gdp"=nooooooooppp papcppp#q/q0q1q8q9qRqSqTqWqXqqqqqqqqqqrr:r]rbrgr|r}r~rrrrrrrrjsrsssssss^tktlttҾjhp"=U he[hp"=jnth.UhmHnHujsh"Uhjtsh"Ujh"Uhp"=h[h"H*h" he[h"@ttttttttttuuuuuuuuuvv-v?vvvxxy.y5y6ykyqyzzzzz/z0z1z8z:z;zzzzx{z{û͎߯͡͡͡͡͡͡졃{{hp"=B*phhzPXhp"=B*phjTShp"=Uh hp"=5 h hp"= he[h"jh"Uh"jfh.Uhp"=OJQJ^Jhp"= hkphp"= he[hp"=hmHnHuhjhp"=Ujhp"=U0z{{{{||||||||(|||||^}j}}}u~v~w~~~~~~~~345NOPTU+,-侭xphp"=h"5jThp"=UhjNThp"=Ujhp"=Uhp"=h hp"=5 h hp"= hhB*mHnHphuhhB*phhp"=B*ph$jShzPXhp"=B*UphjhzPXhp"=B*UphhzPXhp"=B*ph)-.04,-56LMOPR`ŁƁǁԁ <>[ۻ۴۴ۨۍx h{lh" hi h" h hp"=hAhj 8hp"=Ujhp"=Uhp"=jh+U hzPXh" hLGh"hmHnHujh"UjHUh.Uh" h h"h h"5hp"=h"5hp"=h"5H*/Ɓǁԁks P $$a$gd"gdh%gdh%gdapgd"gdp"=gd"gd"gd" $$a$gd" jks "57?Fhhj Y[1PҏӏŐƐȐɐ˾ˮ˓tttjh31h"U h31h"j9h+B*UphhUh"B*phhmHnHu h31hj8h"B*Uphjh"B*Uphh"B*phhzPXh"B*ph h0 h"haphhhA hzPXh"h"hp"=-e}09Qa%:Wd`Rgd"gdhgdhgd"gdapgd"gd"ɐ]fceٔ۔:ABtv')dMfh-/0ߚ8fěś͛Λޛ'WÜŜȜ*:^`hPh:hhhNOh?B*phh?B*phh"B*phhNOh"B*ph h Th"hAhaph" h31h"G$%VW]_   ӣգrtߥEG¦uwШҨpqBD;=߮ʯ̯`d鲫 h$7haphap hEh" hfh" h{Th" hPh"hj(kh"Ujh"UhA hzPXh"h"hhhPCqΫz`Dz "Odisó&gdg%gdg% & Fgdap%gdapgdapgd"gd"gd"di"NOr"#+1IJef۴ݴ)+VXstuvxy{|~ٷڷ۷ܷ  jh`n0J6U ha1h`njh`nUh`n h`n0Jjh`n0JUh?jh?U h-h" h-haphA h$7hghg hDF<hDF<hDF< h$7haphap6ó۳#Jfgtuwxz{}~۷ $Ifgd"h]hgd" &`#$gd"gdap% & Fgdap%gdap% & Fgdg۷123`a>kdk$$Ifl4\|u,"= n t0644 la $$Ifa$gd" $Ifgd" $$Ifa$gd",-/0134Z[^_cdeflmopqrʸ˸̸͸-.:;?@ABRSTλ¬ƑƑƑ덉 h-h"h"h?h{h+0J6mHnHuhQ Kh`n0J6jhQ Kh`n0J6U hIh`nh`njh`nU ha1h`nheh`n0J6hl[0J6mHnHujh`n0J6U h`n0J6.abcdeq̸VQOC: $Ifgd" &`#$gd"gd"kdl$$Ifl4\|u,"= n t0644 la $Ifgd"̸<=>kdm$$Ifl4\|u,"= n t0644 la $$Ifa$gd" $Ifgd" $$Ifa$gd"=>?@ABCDEFVQOOOOOOgd"kdn$$Ifl4\|u,"= n t0644 la $Ifgd" FGHIJKLMNOPQRSTgdap9 0&P1h:p"/ =!p"#$% 6&P1h:p"/ =!p"#$% $$If!vh55#v#v:V l4 t%6+55/ / $$If!vh55#v#v:V l4 t%6+55/ / $$If!vh55#v#v:V l4 t%6+55/ / }$$If!vh55#v#v:V l t%655/ / K$$If!vh5%#v%:V l t%65%$$If!vh5555#v:V l  t0  65/  / p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p($$If!vh5555#v:V l  t0  65/ p(}DyK _Toc218951909}DyK _Toc218951909}DyK _Toc218951910}DyK _Toc218951910}DyK _Toc218951911}DyK _Toc218951911}DyK _Toc218951912}DyK _Toc218951912}DyK _Toc218951913}DyK _Toc218951913}DyK _Toc218951914}DyK _Toc218951914}DyK _Toc218951915}DyK _Toc218951915}DyK _Toc218951916}DyK _Toc218951916}DyK _Toc218951917}DyK _Toc218951917}DyK _Toc218951918}DyK _Toc218951918}DyK _Toc218951919}DyK _Toc218951919}DyK _Toc218951920}DyK _Toc218951920}DyK _Toc218951921}DyK _Toc218951921}DyK _Toc218951922}DyK _Toc218951922}DyK _Toc218951923}DyK _Toc218951923}DyK _Toc218951924}DyK _Toc218951924}DyK _Toc218951925}DyK _Toc218951925}DyK _Toc218951926}DyK _Toc218951926}DyK _Toc218951927}DyK _Toc218951927}DyK _Toc218951928}DyK _Toc218951928}DyK _Toc218951929}DyK _Toc218951929}DyK _Toc218951930}DyK _Toc218951930}DyK _Toc218951931}DyK _Toc218951931}DyK _Toc218951932}DyK _Toc218951932}DyK _Toc218951933}DyK _Toc218951933}DyK _Toc218951934}DyK _Toc218951934}DyK _Toc218951935}DyK _Toc218951935}DyK _Toc218951936}DyK _Toc218951936}DyK _Toc218951937}DyK _Toc218951937}DyK _Toc218951938}DyK _Toc218951938}DyK _Toc218951939}DyK _Toc218951939}DyK _Toc218951940}DyK _Toc218951940}DyK _Toc218951941}DyK _Toc218951941}DyK _Toc218951942}DyK _Toc218951942}DyK _Toc218951943}DyK _Toc218951943}DyK _Toc218951944}DyK _Toc218951944}DyK _Toc218951945}DyK _Toc218951945}DyK _Toc218951946}DyK _Toc218951946}DyK _Toc218951947}DyK _Toc218951947}DyK _Toc218951948}DyK _Toc218951948}DyK _Toc218951949}DyK _Toc218951949}DyK _Toc218951950}DyK _Toc218951950}DyK _Toc218951951}DyK _Toc218951951}DyK _Toc218951952}DyK _Toc218951952}DyK _Toc218951953}DyK _Toc218951953}DyK _Toc218951954}DyK _Toc218951954}DyK _Toc218951955}DyK _Toc218951955}DyK _Toc218951956}DyK _Toc218951956}DyK _Toc218951957}DyK _Toc218951957}DyK _Toc218951958}DyK _Toc218951958}DyK _Toc218951959}DyK _Toc218951959}DyK _Toc218951960}DyK _Toc218951960}DyK _Toc218951961}DyK _Toc218951961}DyK _Toc218951962}DyK _Toc218951962}DyK _Toc218951963}DyK _Toc218951963}DyK _Toc218951964}DyK _Toc218951964}DyK _Toc218951965}DyK _Toc218951965}DyK _Toc218951966}DyK _Toc218951966}DyK _Toc218951967}DyK _Toc218951967}DyK _Toc218951968}DyK _Toc218951968}DyK _Toc218951969}DyK _Toc218951969}DyK _Toc218951970}DyK _Toc218951970}DyK _Toc218951971}DyK _Toc218951971}DyK _Toc218951972}DyK _Toc218951972}DyK _Toc218951973}DyK _Toc218951973}DyK _Toc218951974}DyK _Toc218951974}DyK _Toc218951975}DyK _Toc218951975}DyK _Toc218951976}DyK _Toc218951976}DyK _Toc218951977}DyK _Toc218951977}DyK _Toc218951978}DyK _Toc218951978}DyK _Toc218951979}DyK _Toc218951979}DyK _Toc218951980}DyK _Toc218951980}DyK _Toc218951981}DyK _Toc218951981}DyK _Toc218951982}DyK _Toc218951982}DyK _Toc218951983}DyK _Toc218951983}DyK _Toc218951984}DyK _Toc218951984}DyK _Toc218951985}DyK _Toc218951985}DyK _Toc218951986}DyK _Toc218951986}DyK _Toc218951987}DyK _Toc218951987}DyK _Toc218951988}DyK _Toc218951988}DyK _Toc218951989}DyK _Toc218951989}DyK _Toc218951990}DyK _Toc218951990}DyK _Toc218951991}DyK _Toc218951991}DyK _Toc218951992}DyK _Toc218951992}DyK _Toc218951993}DyK _Toc218951993}DyK _Toc218951994}DyK _Toc218951994}DyK _Toc218951995}DyK _Toc218951995}DyK _Toc218951996}DyK _Toc218951996}DyK _Ref218655960EDDdL  C (AFigure1bCvkse~<Ca{nyCvkse~%ILa%v/T<.lwa_I3!vS@2߭ObjUNE+kCIVvcZ Qwa_I?P}BN1s(e@Z /^C'9sYDV_P uHrKn7er[]Q9T(!>/Xˈszbwt6:w C 1f2'9.ŠOQǠ p4ja0P>79\\NInler(Y,R9$6: Cnw"Q1l=};[Y=~SajGq(`c8lEBN^?{=皢gVec ?/q)?˗SN?@S)[bx58m#bƬhܓܛ߹S=Eľ>\]9H@Zl4LօHzsyWtgЄO7 ȩS+j >5 oDŽ.9=XIϋ}wwr]%oķb ~g'rqHvB^ Uoљ hM+ӓE⸜)y5f wq΄F WP~8^]c֙x|j;l# |? mq`n'YhLjƱnX5զ lsgǹ܀3r;a<4 bb"W!GfC$׆q\sx5ޔg|K>Ѷ3#@ey#ŰIQw] 14ƙaug]1ضwjʧ)f6E1>gSEm6eƏ|c|0#avW>`BQaOpj/$EemtVXNlq?hbXJ< di㓮qwnWwjsĔ` d9晭zF? :mwmFi Lf ΠἏwpķZH<rgX×՘O&Sޙm#sC?~'GmEC<tŭl0%ҭc7t 2Y W p6UpSw6~©݇\WħH<ɷ9toMw*!+:< qLc w `6. yf<ZSS !0LMa<5 qqTbS]$y\Mu$K?kQ4*)HqOl~|jtGvҳ0 +!@uk9=sTNH !lM`S?OQcߌG3Xs" ?:aj ` 7~)<Ԑ,@SUSaJ9CܟXNѽ!R#]Qh}|^8YqLNJ= 3X/ᦘ⸥LbH:F'ʐO`U)`1Sb wD# i=LΞ #B1+U[CIJpe-8SzNp-zMrM1ecG(qc}M<Ncħܐ_ q MT29j=]ϳOJ-U2)Ƙʷ68$,e- )1U#ć])JG`jGIhP+Dj˳ r^ɛlM~1>.Vַ2p^'`Zs|RY|ϛ䞋}OK9v\\LH#W\|܂= t!vܮ k+9o*=jfWɧ5/p8%БR[{8;)킐G!̔B.)0p`3 ` !ƢTkΧr[#\DZ!,  |㠎]9%iɡ8\_7TY_".9?q0`s, c 'Jbx8eѭj_jʧLbX-0e@c|YlG3`TH/7#S"R)Ý9ک-±9z3^YA8066.XՆhzF35r^  `> l]֊e7T-/ET kmj`9=0zV(R+ocLG=ģ'^S+'rރO`" asWT|4hzO|)'DQ o|(RN>MυœȮSP7^:TbEU`Ak [3SCɊr*O&#s8C~ޔ?Ap{þST,؅Ig<K 0R4}Xǰdkې6/SB=aKpBN`$1<X b"n !N`]{9Ik/,~܇QG$W='pop7U724T [ߔt?;a~|>.Ez!{XąD rF*/0OM/X iHj*% ~++=Ђo0&7e4;Sz %-rǺ^3~9nvUsN)PSaJԉX}#FҋwʧZ͵kj:F-6utաHYΧ6;ͧ"y5Zs_2R hEJ{?px0U$u`@ᄏ-Ynnko'өս|jw 7ׯ^aOOozu/1ċ_]]o/..oS~2'o\c9v=*O]^[x*"U{!jo(7@05V'|p̳7"[wO%2jr d6Ԟ𩿼񁡆"7(uTOEoy섌c|jB`ݒxf؊j_|:!QxSyZ}B EPذߪs) j).R4WeeV7Į{)⼨4?j_.v_ȟiȪ{˧.0P8t`RP>_T(0S_m )֝S9~-~i2x_S^ȨU ǚfy=Jwc_]Mm>U-Z kJsTA>V1$H2|ƳW 1U:P-I> S w^5SNz/ ϱ*^]_x?t΄lP(&:Ȉ<;7^)+)MK{-Z_~7W-&(1DؐC^⛫ۅZ>8b.cjI'.ԐCX$ Д5砤?>%(~ο+'gLn'FJ"%1TʩQlU$kԲ79CKWם<Tv~|WQr'X#dDSOpKV11#}_Tg3(]? ue$s1iTloV|Bsp#ȩ3ҍș8`pPWS\}+Sf=SٛM}961`Å+`KoiN. }@¥Nm7V_۫29E7h"DEsȩSz`+2r}>f)e&MYI|Jjo&on=`u{"fP I*(1RwO6dxz=Smħ{ھ÷Y9b|`ʧTboK"'? wSNQJãGёvVVCiX)6S:$5{@yJ{q ʧk-uHm}+VyHzlzo.gq0H{||9:> pR|~LAN^>B.Ftrj6+H!Ho{ߠdv]D$Q=IQx}vdn3>qEyŁ@)uN>5 7%Ӭ0H}DJ'8@(K/k/(Ԥ 3OX)}t=z.uw ?h4POAb@Ih`ZQ)/G'aH Jz-S7If|J" -=Ԟk+r'@1@UNp@7*['_x#I( dۈUtbjL?2?5B9%/UuQ3X6K13:NNNw b# SthSOp⑆k;L1,!F]ȩʩ-ɩmPEZ7-f&> Tnu%s^q0 gzvbpM;瀴_=>PC1Mt2^^d|L) j4_[zurT1ZDSO18;*8>4Br?_\xD 8O>)BF|\J'[BQ3=rr ~;z3qcQ$z|_ 98~cqW''[ʩh/)tSwOtM| j:|8!,{j sT>)"lлZ]#ޏk\wVSb:qssG6U15DGwO~2q}?)MkvؘO @ 6ǐI>%Jq|fU)D] ⌑&xGָ6yVjzK쇑YQ\iu_=6NS("9CܡT&e⸩ϧ*P?3ɃO>xg<--wǥ)"/@3KD yiYEΟwOQ,SzfW}|s.3uPgO=e>*c ?J|9cNW.{0jX^zOKBo؈~h_~8[iqg_,Ol&2+Z5S?ʌ?tb*'ԁe넅4ha !eWTSI%u)m̧BB2 k $mk[T7}YNvfZ m 3r~dQtp_wE:}::<O@1Z)W?BQf˩ڬGslbNG6USrjObZJD'{f!lykJS`DG̷6٫_bg+f=r9UͧIhjħ*1\׿M6*SF So[-h:ּ]}ސO!*'s=cOAoiJrKjv)Q&Ж_ SSuv·8 L&/^:ѝSx8d`PT˨_v ScaXGxdqȟ&u1U"7Bi]%[bێOś7CsSIp~9u7ЗP~h}Dو*rOՖ)w-X3{<0P=с̓z2E _Mʋ[ȩb*v̧$- FSA-$*rjQܔ-0U`JNi'QtraKo9ɽrja*? DBNU6MC,Ig!Jּ} R>)!1F|5CST~-t6Ԏ(:.d-m?|%TyUC9O")pǷ! _wo^t# z`FNQB7 vՋ/Uxn)YӬ|j>Pkj|j\n!.$zI󼭦|g.,"EȧjSU˩1,hv F wp+n'$ͮ 1#}Οy{Uգ˲I*Hk(|jDtR^ȧ?N R}ozaXcfK EDOI$ IK[VNK_LޡمPy9ya_dpj&# g S()~!1J+WdXE}?ҋt]𩕑9ѿIX.\N֒sVFm>@ lӂE\Řu<3pSӦW)]JEI ZJP4{D=8~#2[酢.T8{N\YEC2`W0Y짪J.c=e?_Xh ]7L,@>щLeGCN2)OU)"sc+ɖ)ɧ|l| |%5ٯ냉2)_ k_4S"3(#C>E?f!ͳS50%E_iz.{wܡ| LM SU`,o.JrjOl҉#Tst7HRS# )tIc{|Ô _Bi()-җ󧨯/+sv*9Y4{uX A"8 4OM! nt"Bq)zj>\\L~HJJN  9Elj[E}y m^ ySjħfSݤ滤ު܇좭M?U5JDž҅ Qr7jhIZI|X3~EwrjdPlC1 M1衡h&F:`WnZ@hZS)ZU 9oE՟A4(m7 0Okc>ad@Y`'QI?n6(yhtdfk*}|I:"b1!._aTn iLї鴊~C>%Y&\VUPO ^yʏqK2-do& X ]? td{S^̭f=iaǤEy}r*QS~E: ]+aHעљDDX>;!msLA`+ 93] &2qHx\J*"qGQxJVuQ3D-#N'O8:r:0b#aE &AnpK|.AipI9\jw T}ܸz[ie|7Slb:ht@]sΘӐ [5,f٨!,'WN5OՒD w@8 oS%ڗjJ0SB_>;#X YQ} eSae3ݛT54cU>d)j=MrJS*fm>P[gS )ᄠoR|I$rJd)碪X+4rJP%S"G$zurTL{bÜ96pwMo:Ll [ESF$zx]L1HO'c ,Ȍsg[:N3۴M?m` ``D';+S<>*JFj5ޯ,bglq ""dwaM JT-Ec*, ld '.̸87l18e+wAT})T_sjP}#" S?%SY>4eDg ?db&?4&Q+G ?exp?Έ6 1\ 5uWq#f|}+ϼ}z-[ߜIIE:8@%Ȏ%x6uy"%j\7U|J1>)I( ghXdL)xύ^+]|D؈O au!V˩%>%("֏$U5&6obx+0(a~ M #` 'нeu884yn#>BNa`/cV՗h$-l.1 H"y!A%(+aƷ0E}HS܍K6hĦیO!omx1 DOIeS¥(Oe> %Jl>!P)ufy @Q`et|JŔGp 4I<;Xky6SÂv@} `OQ)Xa 2Ț{0@fD,KY%'Ĉ> !VO4q |^/NLgGp#9˄3fZzU6S yvQ^Z_$]jZD9O3XF&5`0sJQk#3lƧ)Cu)1)|EmxV4/*/芡 *Mm_S,w&"À}|#etʉ|9U?Um]f~5L2P4Vh}#Cwa9%>4C0>%dB >x#p헆y様P#ks`?[*j.D`XVN:Pc l8zmb]ϧ7TUr 9o&c.0pAMHɭj}Mt,^Ʊ)*aߥ@!b\4:mƧxvȗ$ AɡSK1 "1 L/~-a,/U jYJ~uơh})4U)xUxU?` S6uC{XZ7 oƧ6QtF| <,*Ea#c-'ݯ'UO!`I]b^ޏ!k%#ZB 446׬`'>  I#$19z*\`ǀAzq7S)ohWeZ$;_L>}"*z/-F*U{SSrnCt%b_rZ3"HTxm$e!%jS.Eo2~Ҋԍ=Q_`+pF )(3 DuƧA܋3#K 9̒\N)B+iT4A ֣(րa`1oJbzN̙sFVU_~I| z?UŮ'LfQ%MDMe'P4}x\TE6R~bÌjQO-5񏗗ޟ^HJ.`j*S LV!$k=zxR_&| .h$|\$1wV+Z+ W<sj}5w'S'襚rj9oU8v=aJ V m/V-+0L秧wNZ'J1%%ٓJ_=񩲩s*ޏ,ҋyD±w1d?pβd(}w4&|ħj FE5SOi;PM:2WRIL%qrj.sq1vXϗʤSrņlS*|U>s_~ypOKk9%Jt)f?9'C3ԔU9En͝\Rg;`{wy<)Os{=m,e9?%_֋\C8oJ[ )ϗxv_;O7)i|#l/ٗh'pzzGS7S)&zgkCݏLdm~Gӂf߰!-߽{PJohʧJ%j:UYբ.<_ˆ8 a*LC)(0?@U`*ՔSe* M9'^Tҕ?v.;ϺO S_QPûS&rjz$,"/nmy:Ht?Fp_$ :k#Cy7DГcJ6DNQUm݇1-֣ ?` wϑS+SOH`  HnM>&6SRIJFk6U-AEW^Qg~L;*4?~K) xD)ݵM9EVYuof\1q0+[W!pxz~Mz['n(G}ɠ4w~1PU/ 8¼]!ULR`/R*dz-=%?P%&(莓jR?x p@<G>(ZꥍT^/y!b*gKK5D`|2H4S#ɠFo\A^tysonS;}Ws5A2 \NQ0I3CvV9k?ط!9h)^ȩMѰoP@rt5SbpD,5*Y(wBĄGuc_DF0>JgG)2m$l//y~",pJFnƧ(.n,:b3uL۫ɾ05RL/~4pƈ&c췎w"fb6S iQ?55]7~JF}zWTzOuŌ c)̂3 VHW\TN_x(w7{>TXgo˻aZS:Ga L /;P'x[ŴBmA:psQAmizٝKL|*^_`ȳ*SҁY_5>x> G$z³/F" 1K9~C~u__"pdp^8_#;GBV蛢lv,71UvV>ç"~}%3(+}h"z(bGWPEHQ2nT$6}z]ڼ NS!T5&P:+V`xLTՒS0g!ifwJuikg({S6\l *zǵ5tTQ?RS/ʳT“fct"ZPb@X( W|͌TZS=m~Y._a.Y4Pb*'Ŭ~yH=>5чT@P/jP{4S*m:*1scw"T| +̢<9|j~sCnay(C%a:eZJ':FJ?v -ot^vm<Џ{nî2 t=XP-$wC]_P)I$qq: jHCLڨSI}`r ]|uQ)[*/P#(t=WNE՟潦&B qP["%u堍:rop ̳)_kO|Ld0*TG)xff˟aN>YYr m?E)6,5oW7u=/"՝'V%X:)T"E}nr| y$H6߮yRJm~tL%7L3h+y)! __g:" |UfSK;goXھ0%x)3\`* o11֗E~ov"CT˗lTK||jv{}5Ƨ%\>%,7W7pJMY"U5f*U=>ՊW4+M+'z+m剟#hCTL֡^^/T]=S3j6rF_'=ˣS"l'[^T"{`XS 7LA5ա,;$SlS=Jܐ<#ň}ݒ>) !S]5߬ ^uT|Nlzs5KŧKʹc>$ \VT>)ɫvS/}xz㙏-cﴄ))c.S pY}spz;AUݐwYOmU7j?H$rx&o״>yZNSs} :}{՝SJ ͋1M]F_\]aBQo[_}aE} 2HVLwW/,|3vŸTgv |tBx ZS|_'HC 7P-]l}C5%?[S+z;{c'ߢ Sʿx}}ۛXnnt->rS}S^]/89\E.!GW%T KCW.;2GRelAG#ΠrxIPkquG}5r~<_Eޅ*c tC_ŏJge("ZEE+;68݉;`5Zz' As\ `#ɍhA[ttԖxT> mt! #D?eQ^}WR JPϦ/Q ̌g#YJA#`j<W'a2_ppNPJe6ѫT*M*uySBUi/7FjfIENDB`$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539gѦp$IfK$L$l!vh553#v#v3:V l, t 65539gѦp$IfK$L$l!vh553#v#v3:V l, t 65539gѦp$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh553#v#v3:V l, t 65539p$IfK$L$l!vh5'5#v'#v:V l, tC6,5'59/ pG$$If!vh5D#vD:V l tD65D}DyK _Ref218237952}DyK _Ref218951414DdL  C (AFigure2b%+;VK ]uU,{n%+;VK ]uUPNG  IHDR,"t7tEXtSoftwareMicrosoft Office5qPLTE3f3333f333ff3fffff3f3f̙3f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙333333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffffff3fffffff3fff̙ffff3fffff3f̙3333f33̙3ff3ffff̙f3f̙3f̙̙3f̙3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3fg'tRNS@f pHYs@@bCc[ cmPPJCmp0712Hs IDATx^];b8td}&^beSX/T2>HT2D#&C.g : enl@wҬtCq,qvp5:?P,%Kg gmN !է(b[Y9K&KS)ήpi~ZJdɴYTlbUD=ھ\ahՏ9 ?=uYeYiFS^_IA0aB$ ~9 Vz/>2v>J+K- ~ъf8eL@V،] ĪGxր Z`Ż-#}Yܞ/Ŷ p󵎱Z snw嬌y}_5azH%|*i۟uVnwsRP[@ֶ[ykccFxhIƇ$藘!uR Y;ėc`$½ոh꿇[s.nzi0gq9,\7qOWI}b`M7#D)Nh[B VElKor9s Y|dYgE|>*F@szU)<%̆#% >T'Wuw}rk1Ng>7r\R{16 YUe ,.BKsV9_k{= {.@FU|?YqR"j;0db#4W_!ŕ5铞F,e\#pO9\dƃdz2tXk&PjKjAg,^ Wh:K)u˘jrq8+b=9&8DqGݑUG]~2|cbM#,^D0Ի5_Bg1V[;ˠ`d$6gbZ~wҘ -1rX֐熝,;-tGn}p_%gf<Ҵ >SzG/j;8ʼR`Rv:Mo>FQ麟lOۮit-Q9FJZ#r9w84خE$+x:A^ݮ(FY;K d{ BKφ]e{|Ӳ[FSt3vYcrEC}sUlҽukK,^Ƅ`Sga%w/ }-e{oe9f1.q̾7lΈc,q|jk7h#mEi3XZvў_VgCsT ~[z1o-1 dUgX4W=̱ɑm9w2WV[wYbx͋g燗fa(ՓzZlW;lgyYOȆQ-[Ee g%T%΢'=Cn\ekR #o_VZuKKԵ{RvU 5HU>6XS23[Z><}(94:Uu37ރ7ԭa{7b~qXՠ;wkY3Yuco߻a2QƳҙTz/c>˰K;.V9k@!h㬳DhqZ֊0s DTMY%)-3r&%FQgQ~[q*t?P@KkYwghrnaVny kΈMM5)-`ײF_g))JW3{abSsEg7"~'ʹ%E+G7*˙ q.g&?~!:T7~㋜h p*k~-`J(U#gx *; AV}cNOw+;WY&t~h,S5E/ܚ3gQ zy9grݩ۲1[y&%mӛMÑZaQ2L?'Tr%b%ɶ9MЅvgQVv.̈::D[ƳhmeB5dU~gl5ΒՉ@0U`^a+HCI謲}Þ?$ߧ3&*CZ~Ab>bg;&Ygըi/̆yRj{Κ*PEM?7t5L YB6_gC1o8s|3|tV}ލ\oIn;',;nZ& 5K,w¸ɝV*|O+P̾ڗnS䬜`}Y8P&;U {U ڻP4wr:xʌ$W I+^õm%wf.xު{Sl%~=d7lO{߯ {@ FZ]gaRg+9wκΒSzoĽ8 FjK?ޙχ-LFȺj:! n;L SY wqNou̡Xt笛#m.v(5޶Zb.ou0%vY:S!%j 5Y]n-{OܲyZY7 7ꬶku^u}0@ϺgOJq_%nκhlݮICuVJgVW% m9nD֣%g\g]_˷rW TeuWlp5}Jt*Nt*Jvatܑ,46,W؛N3fN+5\Z`h<+ Q@G/l8Ӎq̈́6 VI_uGAq.Y\dv\uW-Li8eu)?վuSD&hM- Ϯ,:;=v,E"?S`a% Hgvb ,nY5N`ysGYSNgquP ȈƮXg[/0ad(Jkq:C-3,]~Z'ϥ':KB͟Cg8+-#,9;4);NEH}^-a5:9kUT.%uv]]m[)q~7ٙDpJJ(Ұy,h9LxrEa,YG"uHRUa0P` W!a0V:w-胼>t(ZR-aWw_igp>;gUءߣ/<>(H\=7:CB;6;A0؇I4>F!j˭7 bgn:G.6sUÅ[GYe!+}B߿ѿ /e}ˡf})ﻫ>K:boΊ?kOAȒ~GV,ҏIMw a\=bXu ^Z\:ә {$|g|욛͖7$ R:ovg4%E/V~v%ƄCVeD =+!냳bl_5; <5}; pٷxog~#Yv 7xog~dhz!B`,GNqV!#ЮvGΖ(< K.Z>38H *f &Jg~1GOкID9h+uF:9Sq4g [O||g-͘40!:u| ~GOqVY"5$Г>>\0Ȓy_Fd2i:8Fꪣqm?K^X#j+P#o|_M!k!>:͈{t􈠼Et^Jdy@CWYW]*Wq|z\gIdьH)!m{k_oIDYATφɆyi:ðVROSKOOLʔJ՚n' /+MHRy/)^IENDB`}DyK _Ref217832194xDdL  C (AFigure3RJx&+ZEVS&&x5{Fx&+ZEVS&JFIFggC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;7" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?[FojrԈ#AI۪O`^ T{2BUZg嫓m2n _jFQl=l=T>+-NOvt׏FN~n-4kKApk8M^&>`4DGlLgl*-5xd}0p+xψUT`YE0am7P >*Ŀ1oWpMJɛNJC%xS6Uv{c5@A oߤ󬦙IR 5#5SI#65#H5UU2׭M {Sڲټzu\TUa\ )D@{foZbiQ\M-<̰r7__M%q}̴&dR*Pk+tw,܁]ۅi#.>KKZuO[eOy)<+;kݤ*,Ͻs<.Z/;+fiI9-#&So4z$Kq̈{;G0k<3⤺`k%;z[kBREo[3gGXo=j2A$4rP9..oa7s\˲X_pj|EYIGKbw?5S!E(bJÞ]yWb݃u644nn5WԱ6ASK]Õvo#wo?ojUw?sMmFZamQi90Y v>Uؾ-.|v/Vֳ.u=*"[v5u+(s[RbuֺkOt>a榗V-."w1n$?\V%t&f'9cJķzf;d:1Hk/x6(䁉ۺMՑ,wH.yB)SW9J2[5roI5wNc$Ն**>U'o$̢7~06\ԣA֬xGtJ9'.oa$ "<&Y z `tN5fKzMi P[P7%sW<Fr{떳iIU _Eg5R2sx.W'7bk,hX/>iw.Ȕ7}洟IʷT C4a`sKr|Oyi?I1G4'i|OcLQ.d)?M77OGjk-ϸY\cM7W?/i9vB~%j|K}f("g,7w_/ik| 4MEKZR .pFh/+m3qhv-]Ny"y3\aM0Ck&wݼul,$*sgЅ:t]wBI5 5Eg݇m&RyRJOz4[3MsҶTkw⹝J[DekjM LݴuvWs_bNj)HÞ9F-cRle`z8iRxmeU;~'K|(.eAiHɭ<9fa2$msex*DTܑqFw}kZD#y_j5%qDw EWVs+`UB>TW&wbӀOĸ5'vBkeUWB W̷ىsҸXYۮ#OmKݍt[2f1&29*0 J%\QUHZ$Y2kF[4v;vy {S+*6.u[KR+}j]KQTXeܽj}_|17;&?+z­?iܸSj&=˩|rj$\E3'ݍqYʚ;bۦ1J}yG_?*Ii+u^]O⳧k=1@Y#QUb77wUdO4K)Ugڭxv cmAWrH|af#(3*4A =}JN 4%Qxd/l]RNcMd\rNffv☺HG+,N/ X֊4 Q7wsF6E(N$M>g\U4d#8cV06o~`]d+5cxREg5ӔyNBAIg,z̧s=Ctؐd̝95yab-KQҵ l9 hƒŞݯ-;$*KR׺yr0;J>h:U<ڭYObaRta}bk+Nd<ҪޛImAޠL9L.@EMw*\YL)dLpN? u #s~$a$ű=cU8s Q4>UҦi_a=pVkmuMafb΁*n'Ld<ծfdž(/5h>"u2 -{+K܈"`ʬ?{T֥bmJPjZ\%ãwJv:W iY#s_c]Mcd^3ju+1HFzӺN:!r &c14B)b*V1:>?a.筺M<$9"ːA9*8l@q$q~rb5b-3Rp4= *ofy$|A8֯&;8?J4+exR?‹~O5-5%׏w/~_m6kg^ƹO۴ Q 6? uy4=^?'lOZ|c`v l7rIߣ9ýU`ؓ=k=x 1+RxL*$Ȕz#언#Z{ UX_۠]gk li FOC9QEMNjE:UJ(z ⍼SOj0:7@?cg sUPU"NWEʥ9mƨ!Ağ}MR.Fc 8鯃+.J=ӄvMh.P0[FId)qyrekn/d`>^ǽC E Gm̐(1}jQDSlbJsF o;DD$rѳdH?ƼWWGb#Ԣ"Uy.&ʫJAwiX^Dsc͠+{ֵE;{@=pyZۜsEtַi7,n#FQ4ΨՎ֓iw>Cs\-J;1Hx{Z=󐳱^UryI+8#4K5IW$/OcW2V8ơG)树;R4bG֧i@ #JG4(.C:+ 9nU9"IdmB}5jiu{o s!]g|Ymڄ:u,iH꼳n9 YSONZE[E%צ F%0(+裊y>鶲P"_Ҽ.9472=)n+g,=Vy?w FTW, y?@ˤQNq).:"s~!^C 1f3kg5j>- 1c/;F7B+o$%bLWYF>NSdRT,x F rzPX<{ӋV0઀=MD֛ fra֬\j EVgw'jzSj1|N ;Q'zvP mJ%isPg}/{ 8i1r~QKuXjm Ē :gT\;;jw$WPZįos0?a]i\R̿2=}kѠҴh&YyWkoE  h־ق <{5pϹ%6MRBqudlp*OV\R4 Z ɤUVv '֬cz **J1!Z^ ݽvVuEpX 'wye"[U$ }Ek%/ٮ&^y3D#{V5lhP >}0R ozU > [Jd,X:nư|,b>C=bYKJ(ji+ ;Gt؋yn%aOjXr:RZnI3Uܽ7+)F84; sqL+խ7q %牕+-*;ckY7zo;O'NqO&Ops\U#ʝ;&D:ԪkPGdgSSސib}wE]_G%:ٳ}^v{G*_kѝ5BFR~UǶ*r02OXPNUs!r:5n5f%lsR;xδ4mGQa->iHqI*Gt~Y]`Kl}@юZ|;%Mw2?4ҺhW};ⰕXEc/5\kQ8!湫};Pm3LǺvkeGl+KVjzf%$o!xqXƥk᭎Z޷{܏sZKN >},lvk%BA/l⾵{yIs27x{A]?K1irOXDx1gvU &+4+-`7iךV/,a |* c&vm 5umP#X!Z|*un{(D-J{]_Tf@HxuI gRԕȇͻfŶwKcX>l8ݏzZxoA4q@$daBA·42O,V7Uxv Ugo2ls@:7waiRW苶 ?wqR=qZ2Gss:M&m`W.W dnvWQ!SLrW)[{!#t דE:,IN:~Bmc%bOYM>agR1z\J|9-\"%F"Ay6՝⾭Vcɋc iaie-чsj\X^*Q|1 XwvmpQLՍ]:BP{fѷ2B+qb'`떞B) cZ&Io1 @qǵd]jwQy.@=ZҜuV&mu3N=jxai3]HEvR mm8M?OC'n=+`lk*\ÄvE#Y)ʽ.sʡIpk/QwbٕgjQMR6ԥo(yT{7kvMj\Ch5uf6=,lͽZ $=,ZvrzT*IhsTz-ICIkBzN\('ҫ,9AS=k^znm{Wri0ʁy5:-ĨU`dSɬCgn#H11v:iu&Ff"&E`h0ij%j5Dړicr=ޚsl?Ң?E]_GxwxWOLj P}s͞KԮ4]3Yqۉwgo,I$Z:\ZH_+UݑРƵtXs#B /1ᯯD6A᷻InyʉG$V׵.y8u_hӈmu6nG1yϰjF]_AW<­ F[I4z/{̫mis|м Kҙ9P~&XB13f__ݦVqN)7))=.i&i_nzf<}^Ԣ].ˬ:Gkw,pkҞ-loYܮ$tn[IGp5tڄZ]x'fYʼn,4ҷS&zVWIn!0v2N}KCխ{cbk@PB-7)1ZolѧmUcƦe@ &_jhZfGwQ!]n In4+)4{[B6\_@^+lAGQ#rpCxYdhՖ5M.Q->- +"oaU5RT+c$,@_4ۛ["@pF\Zu&'K?0xJ_xzVG G|uh֚]̋t^]h?J\QȖs4]/Sd] *zkGk؎S=u_|;}qm{pZLAڽc[Y%ͱTZV_&K ~xz_X5NGQQMgrHsBnqefs`s4}Rt7얲L;{VEEdsEo NJ8mKJ3RI#$c.~R]N0BCҩ]KinX ;dĄ`cq֞oMyq+ 8n%"U:5EfBa [h[<%DRX۸ڍM`?,78>$t6Gx[R4+r֚P7hkV{V4`y,HHVMyerzU\ҳ6_^04Y$%\.5Y3H7;\ɰar+gA4,g!Qjʵ=.+jNgTkCVcSic>Z2pF 4i(i% s\Nppu'\OD Eps$ȆI6 2^C$ȊyCz~4ˉK&C$jp5i;ԨZJe<ÀH!,˖GYہT滒v B寧_曉6)2ҽEk5 7 9*+̌ޱzO'jzM.:UW<~>B.WSa9rxT? ްf1n]Hw!1/+MY!%5d^ѻv5(5cS;:r(!= 4r)ǥ7xtR_Ewa~sMF{Bۏʧ[H2@9TҩWdp2p:gڣX̚$(9)]cZHwŠ1s[5k-"KIsw?/V>}I] W6eƒ-e$zS!R2(QhH\3,|5iyC*ʹW0>dol^nw"p3uXYs&QY^V"0\BS0iHr@[Ϋs& ӱa!ҺlHͻV.-|Cok0 e?>K:h}g=e^M=4!YMC!F #ҭ&m?f֭#[{[hi`c񬛋 ˾Q fl`cbzӌI!9],%=>^*!)NPǥs2\L"B(8ɮ[OHHTcR=;.%pgҌyIC08] zEF8gZ?;۷4ҷ8Bq'6\\cFw lԉɲٮӥeB'O#qffqߦAGs1ooa,dx #l+dsq/0k>X[BB2o^W8<ѓ)ǁɫ$iȧƅbOqP臃IW2W8$ voiľ;dWLok4E|WX\Gmkl&toݿ^9or tuWCi~Dr+xIU"4X^=.THTVevڿ>n,#ws#ћʼ|Pj׷6..@(>W{5K*w9c"P9KZw *$ZePta+Ư^'Y9$6ջoC*`Q]GhGR[ǻc9j𿊠mrHtcjjS98sԄаΊX\^󢺰3*ۢԿM&3H\syoo0'\WfmRLG dM}/jCczn{6<(T>Ϙ_t[rMR5mdCEqul &;{sx`*6yѮ>/\e׽Ixc5_ىHGz40Bt2KpNf[VEzEhɵV4XۭswBZV;v/Gm:կi- ߈,-{ēFmGWҾé28pEXwq*ز1ۊj游_= Xs-Fn¡t >+kgϙcҧ>!fTgrhJvQ[ܡdC4mU?[ u d&G@`jҼiic6yw)V❧z⾹H$ؕTԟOjYZAi4|CxVܛx-$`3z֕r^ , 2:f\zH1ȲoǚvU+KuĐM'Tݾk w18w+M::IN\.P>Aho`;Y$`*tW$ԮdO)~Mǥ׮,-3,kǷzao<%$3$jpeB[oAK "ϥPյ s/d⣚)nW$w|uܶhQrpڪImpp=Ev1'/*\hv=Mwӟ0֦[IjsI]dr$TKeDI#j =":Ὼham9OǯdSR1ilϒH C1yRmp3ʙBa2;0k >V]AS!_hǡ2_3Ŏ94[\X'fi 7xŇUu8-Hs`Uicq&JWZ6݌YhYء1NM.ky$$aK(fWI"0pV]6.Mn1=iS祇8rr΋YrK7v5tfy'%q?J nNG; JaԎfrJMjRدjׄhboLj ⱍ[%]Z]j? ּsGs]?$L#zWRGfT+rc??avgUmlO/t*]?̨J(OAW|E\\vMjJn<W-4챪[8YKIENvf'.brM=b:CZxm<ȵKIfmc'R ͧn8IrBaғ"k[{!W4dݭepXO)on&㺂F 9m+/ڝΣypPBhtگ$u`oMѬѵn.oSXgrkG^N^ F (Yz5g O='٠sjƜn +vKC\&&dvEՕm#6~kԟ>ֺi7rY@ܚ|ʇ{]6K}Inṽ< b֬YC16qWk;}OF1\Lk|ҐdY/Vue,QʞJ!Ars{)fɡ+Wnȧ% "q[[JYX#8U"-*H$PvΠ*֣,AO[$ҡӵ{{{6w[ch e䟩Yr;e.{ #(l$}]J%ջ՛{;'\Mn2F}WұW}*kSqKAs7wȚFKH2>)!M.h6o8c})H$rc 񻸯b-.Zw6|Oj}.#>j#YiC܍/-ƢKz0T.{졉*W-&!Xj95O ՚bO֚[rB;.* ]I8Q 1=O5ΈqA3|@՛fܥQŔu8MglOw.=y1 ^{Wt}|&ejYS6tΊݳwp .>4u$ [7r}MK\ǖUU%vݣ; KʌJڌwS="E.}p4ԯʙy W|[ڜMnN$o[k+Smb I-w23ܞ+t{jUv7wʤ]G&(EbcԞOAJ'V`F+Kv:fke=N<aOd=_b׉)ᶙAu9 .9)|39:k;g-u+T+=OM'vm[VB'Ҵ+kK [)kJGĞ~cZ#[y779_u/m# b;W(FGt&F1`Wjm~JvnJyhDҎơ\:Uy-mΠ\J+A#UO2kGP50GnD'[ݎ*w?h#vB8FsG{6܇*;2=T}w7#Gdedg\P[哳$eɪ]_hX AXMwHQBGSҼöp(6 99c'E״Xe}qsTKCLVU,qqޝrĹiz>mX˖*8> 2*F@C}+5m_3]h1dlHFO*xWQon%lr}5}VƑOqAi$`+oźݚWD I2ǧZ۰i}KİiR@(eo ^%$G3A+4R>ƗsC4;XkB-6.D6R,yljtgu~T;!k"2{/Mj6{E'~[ϽwRwFL=khr>kV^ƛ,;XhZw]1 rև$њA~jbg*>GpwwfVMzs (.@U~"qUmˑK:GWk녷29ªiqo$.⮹GQ7:E`u쌷 OH/*֮k[ n-YW]W$) Гv {C[J9N\c>M pըKcvSO=NjxAd7#ަSe@Z2ylN|p)hz>t-R0xU>Ylś"j瞕wFmY:)&P') luTnH?y"%ܒn=[PEmQyXNRnZo{ 泌dW!eg1aY7/Uܹ=*KJM؟fV {Lu>j]̲z(U+X\vQuܵ:ݺ<5,$U!H-[9?(mxI[m'~9^ʷ;5$ӯ"hsFpE}oTs"3#$\^ĦbvĒݿ:ܰdhX8aEb'Zkk3) zݎkxRKi%y%2l.j׆:džPO*9Z}߈m7LT`3&ϕWXwZM ΡQl$֞y]Z%;]rZWv<Žwj} ZLtffa.kvD }*s\ ܱޫm]dC nOZ\&i3z~:߶ZsOO7='9tvz ,je҆ah:`4$jqֳsFmM+AAkf%ͷ* ɫX0оȵ( F`mukk1gŰ#[^*쵭1~pad|=W⹅et<^ږ% [vW֏4V >Ms{{־-n]Id0El"a{-\DܣJT[rВ2Yȿbԣ u,Ihsi>ػr`?x}VѮs YZ42sQp+30{xlcb$ It>F%W>SkRDr°^U[V54ė6z4UN^o=IV7I*y+# EG{.4]w Ra]6IV$4+'_?r=_W&Ӣ{bvO7"V6$VẔHSzjNtrƃcF3^G{]U>T̀*{~~-BVΓNK;c΂}^iMFVSd`eD_XK\%fW*a Q!N#!_;Tdߨ(qXݡ>^C}nۄ5l1^bes=?D;#RNrj޵=n@'icFH}z^ښKSMfl($Tc48ێƺ ]0…AlmqYKŪ]Xi,Nxv2jv-h$b *)=YjbmR]$jzVhi֒NҬ;G"{:Ivg>?ОCN.xg6p}~cڲU''-$#=ĚƷVYqcqq+]쑡.IsdrWV]pAjKX\)(6ʭͪ68،MEm h~|>N;pb2ItRO@=kX.u Uwni­^nUHZ&Ӵ + |خ~mPU#xk8SMV1'٭("%qpÐjkWA ׫).W(E]bu !}+{!f$ YG򯿽V@!7?9<-A$:tP##h>f@bytBh$N}kQ9hgYJRG. "8;VIUXECOMwnֳIՔ3D#HmJ_MJ%vsw~ް! y5Ym^GjEX} *]2,^ڟIBWVfsb7E]^MN3;gPf#սn{M;9SvɅoV|LRV9ո؋[i& v^*:Fvmrº-" *ݕ2s#) Ae`ӾslZlHQ\cݶ#-⹿N2$ 9q֩FիLڝ߽@E˥ͪX^)K!F`|NFVt(p zɬt)zs-'^[tXQ٤Vڊ"t'$˷kKq0T;O"&7k&(4orU 2q GџV1 ͒Wyrv[ 8Gu 8?Zx>^V x$SN/v%[UV̒q:;YdMncI+{iMI!9{Ne7 `z V4֋Wׅ+5;=m"`doާ_SUZgu'wcjv " J)<={I=XT4j36חepbQ~"[ӵHb4Ydi:^纱 BNYJJʹhS+_w.VX`RWxYA2+lUX3ɿOEz؉cv.C}+a;h@X2jB^ZtKu=fBQf@2TƦh|AP&R5EAS[sմ# ]+u -5HS7'-(6튈k$hz.JP/!ݏ|+xVOK8Q `=7ƶW=Lw%ۋ{+Ki24سiu0f\լd'ss;״@mwî]a=+Cc3扄QC3扏cWG$/i;E ^nImqI ^ouEC\Xbag̶e} 3+0*t2r+B? *}kMdԱX fiU"4jkb"2jċ˗Xe"[\0aOӊӞOY0PH+.Wȥ{]E,5=֑1U">zn&% -L~*H_ƞjZ8њ}9٢λiH_ ׆UK5jD+Y5Ί|,䯺"Եkk颍7t4R2 aq \|+s<vݙٹ WGhHןeQۼ+jt$9 xCĒqVIc߂ϣKE# z'|6Zͭ; dp9(Jf_74J61n>DTn alU_z>5OVZ`m˨%CcmؚI>VjL[v7>P>U5 J4&Pj6ZtR60=+NS1XU pOe'5nD\olszn.ZF AF\7ijImK [f"64K?zΕ'9ZN6[ZY$INڳ=jkIm!w#M-5h"7$Nxҥ_oDdc'^е3 !]DAp? ԂSɝW,2+s_^#w>UF~m  lh)zwIuwԟöiwBm1:Qs?юuD6֪h%/a+.I-epCKOױ=n 0b^Vk =sW^+`]>TG]2i$&-;^> Hn紂T\$=ax2n&fwM&ydr KN+5cm`FȹO& V%D67YT$|dQgᩅIs))n8ަzs+?1Fk> x!ya\Z?n⽭hax@_Rۯ<<-E'snpP*pFq[ ՖRk9=eMoVpXEVu` ?w$Nw=>|r0jhWT4-DxBA)>b +ȜZ{.c`((|pE>nP4 `OP8k-lczw޿yyXo6:ʝyn]1j#E9꧆Sou[KD.S\֩V%DFOP;X6Vdb]NzKO \yc~a[=+4)\S9I礻U攰#3Lk;;y.I1+|?4wg?g~-:va@!1ʼbJ{ IصϖY3rTx +.>A:tөX\>FC\NMMRG @OJZ` V`z \E8`}kZï. 6W5Ey|߼faBrA)WiekEecZvKG-ex+R="8 [b 9JBUG1,OݨVSfAL0WX970KumĈ?u"CcTU@%6E} wgև%YEwvk׈cW;ټ>5o(}]5Շ%GџC sA2LΊu}]]x_G51qm}s=m+1JBBXz|K=ţ9\Kmy1hnrV:DIxf[sq{y,/m Eծ%hfR Oe.ܥdr5:zvۯ-ݮ2WZ*ssTgo`kq(VOwY|=i6SHn(F~%ԮHMG[iM*.M8ݷ .<^4JDd A]Wm]y\JЂI5-Gw;r:~yaYca2B|/eos%PA7uaذCΥHSqMjڛAdPp{I)?u}}KC(|*sѮG%԰+IכScU8n_Y_}>qxnbzEu&晭BCQ Qi0yvpkM?_uIs3ˮ,I6p^B^xWMQ602~=5tUZ"a;C+c)Y"igicl^qZ2Dd`T1<n-tG5I&ѴTUMV嵸b_[)? 2ZX 0Gqc`gLMmظOjce=1eR|c~3"6AsL𠻶bLSs3_HgW*9bs V 65<3%کA,G[^6KMJt0G|;Z-UT]FlqV8jVׁuiu;ފ&$zU`l! @)Q\x2P"WzRjZBj'|KӵO8/>'^Wc1ĚLދ=r˔'Xt5]m(!r=릌Ejͣ z%J% FFq<# OHm>vh2ױqT.2lj.ӴQyd #nn5(T\oR!^0+_Q)nynP}+!ìalQB1T9ri̧b땎V]fol Tkɑ!uux[JFP cS¿Z)އ/mv z [ZGi pH n8zm6*/4j8cZ=[\uj>bBLsSwrNi@e=;V"&\ lg֫󉶌n(@3JerЫq@)HH? \Ƒ)I1O)}ijE" yАMp)]P#^ȷ% =H;Ib=BH΢Eʸi:wU%u9 2 Fa}U[H=ѥhOڡ褳#P Ec#Vv%#1;FдqEԧiNҷ)59x=r8/T>}vocFa\RVԝu%t_aLbxikWG .Ã]M^L-Vhv>EJL35HT|Qo"B1rJgc|<5 ˣsa$JP}DnD'k\-1d@-5yj~9QgkfYo$,@n?t5vT D9sI(ۨ+j;jv}r<\*`t!)9 m^aFmUEy?Yu 683\SoUSŽשMzvڣ޽JDӡ ww5|2[bxy>XAvNp*~H0G۱Yjf-i^4m`U+{"լa@ւZ@FHZ)iDV Xn=k)gOOjt%fUʗnAO=5GYYΛ+[9Ygl`=y2=iyXiڄOOsz뻭d[H'W\XsRjF@ݰ^Rث襷؆Q,W]cgXx(yɖ-=)6LSS e2RWv {A t=+ZȵiU6?W⶷hZB?1ޙyʜdR=6]e+926~ VN$Z>$MST!beWzqj H5J;4M񍭜ճH4R{?-PcmI u[FW!N =)phb3iiJty'EzaO!UWú]GGVqj~H1=nb}Z;|uYjz+ttT_Kߍ=Gc[S^*]c:fX-EMQ07VNAH|/+;(8g0A͸zWq>eRjάW59n5_iZ}&sע˛t1ܭ5 Kn3 ?YRx X+C$]8 |.K=p+&kͭآhTmpMþBt$cjb]:K8r_VO1["1ZFDc ÓV[frk-ݿsbrF(9_ź;}cah+:rdlM, yprz~)5YyxZJ-ڡG`4 1Q_L<9iޕZĨW}r{VWdy56XѫV)Glbӭ#} ȼ֞f̲}`zIvzj7ܥe6XTe$?Zʹ#(ĺ Gk RȉM-Βk².bV݂;=̲vPp*9> :c*݋Zʐ:0xG✙ֺRVF.MLOZG_JG9U8Hhj3hn߼c?xw_Ei6 Sa>agzwyۭg%1Cӳ %T]=!ԏ1Pll#9=jȨ+L"jSTiBTļPp~[`Mճ@/e8[SH*[O$I Ij5,jY(s,t+p3kϵk%F2#^2+XSr/˗Ǣ7h9J@,ܟlׇx6麌F=q^çnjOIDc;5mT$wniFsj?r0嚒\rֽPjYqqt?5ل~=\U8`+ \i^*@^}ߛ\cwV:v9>Il?YXeooA^t[UK I&4jzJ1fj% ? ^j"=^zq\3*sTP[#Zqtq+|k"TEֻkپSB]ECVTgqՒ$-뜹B&..2L@DhIe*GGwA,?rkZ"1Sֲ94Dh&.crܻzMGݥXXzsZg!ޜ#cKT6+Q9OX07R53Ҁs3J,)iwF~nky,Ў8 "lW,d[HAJʳp՞ؽ)(R%GZ(AsXIN2C \.uBvGH@u rOqy3\5#('m)'9my73$֬UZ>?J0Pg W$ndI_ bAd^_ K0 {V%6- I&3h6 9dPC^xMKYyyɯ8Ӧ0!Rb5j棈DPㄝ}f3'j@+#Ie07I2>[r,#hSҫy=iXn.|D\^;jj٬,%&/Lyjc ݸ/}Yl]Ep0r29 p t:.r*%FqM<xsNd=Nlbދepf'yUbXjrwadu7~%HW'XIrԚƒYVj!{li~j%N8]5q$B3ZƔ9| zUֻ y W?='=J]12tcۭQggciz2[69wQZ7)nW3NXjD!CRr@S'R d6 c!9AaVzgJX>) w5ϻP2Lc?0g:?LE12|.z?c?iX+370TQSȇ_^-ͤ0R?(;?.){4?h~0S 81x>|\w?i? |h- /0tQO;~h5M_>5fa袎Qs2o}8'3Wk3K=wtlVkdvVRZXUkɓQR[ILLhD\u4Re$E\*oG8Rڐdї^GX2;_hv>c>t|*V7NK_빏{r_Hi{LL<;=!-5k/-;Qױ(]fs{i^H7=R+Š*>=旨i2ioJޣ/< iQQ4܎ޜ5dsVӗCƭ QLPjZo}Ɗ+ΕZIXiEw TI;׀֊(iTՑ}DyK _Ref217838987DdL  C (AFigure4RK۬1TRA<أO{FУK۬1TRA<JFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;Z" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?/.-MF/nf5^Ғ?o?ioj)?4弻s75; u?3@QҚj= NU?_ ;o-*R}7iE{\泩Fg#aֵȻac4 / Ŀ٠Ŀ٨:Ӳwu4k>fC|ǥLw_)xQ/AFKĿ٠\\jҟZVAus?fg>%Gړ/ڮOK}ynL +!*t-4f?¹}$zS6{9h71(,]Mt>&T̉qB}-iy]vƚSˁ5%ąbjk\]#`U6bix\uV6k(\/'ְ%N{w@m)[[4}Ŀ٨iEU {I4('n_5qF;Ѡ?/i~q?fHOJ43Ě柧gSigQI3jg-r~Jlx"mzfk-2ˑ¦@oq^Zr5{ԉ3O[6{>-ɐQnSD @\i{N \Ŀ٠Ŀ٨ii)K}#+.D0Vfk[SN0[bsR3[_"FpZj3n#j9)_lԊTm="cws4j?/j!IL ~r|}>s5 SH|k7w?/j Mo٠^\5y?̿٤] C M l73P,YᦵҍPSasay!Ҷ2(orb\9݂C ۇS%qu7#,mfO$Gk Tc^u}_$P~ŦL^#YXX7zlڗF#-sZ 8estԀA41tVk aoZmrc?ZMp:MF.je__SueoBcF;}jC%7׸'PIQd"c^ilKZXJ ߊȮ=!k9\1<L3Rݦ/@͍GɭP)?j@; rӰsP(P1Qܶw~ʤԵKVagv xe q] XhMmi/QB-'9G%e?<nZ@-"z"Iu`N8RwL| ;RgڔyKڎq@(4Lw綊#({TZo*}RE&sfw(0YYBҰb8i?:[(ՍXiQG1j7wD77*| ^ 7r)07[˞Tٴg.|ZZŽգjE#?oP7ѳm zS gdK!rM] 9&ib)~dU]F[YK)8գ\e?fep?ZOD13_JKՍ.'%=Avl-ӽnYۭpQԾV!F?JE?Q-W8xdJ}ъ:TS g 7lԦ1_RHս7Fm#nUF'rۍ5xt,$oLZʡ*:Rj11NbGJ;tcNhh9掔gLIh' QS&2ekE piJ݋=:ImlqS[L9\,Y[1 R{i5Kqkj,IW ƱJr8UM$򧰨F;dQ&Gn0> ] 6KQe~t/s:NQq̀; $-qxy\z v˯7شb!4{;Ɇ$6);Up} /q\տ|Kn-wyQ-ւqUqIJ{w;5Ǥ?pg=!k:r}D+K{VfWbN`iJ`.;" V/٤^^+nlvE' &dtLt ֹKTe[7H8R×4puF;aƺ|W etNG$>am5ɄPNt^44S/jCEԙQH ;8F)2=h+>nW=h5M-铱a]>Añ'Gkw=? kh%XR*v,٥'p> &uV8Nqdzh[5Ni4HN 搓@ GjnM4 \s\߈:6tr^0Wx.8^3I0hk\cl_tTpS\.2Ijɺ2J E$k&֤0Ql댓VRB*+o#N.guE)h6nb-^]^-J N"DcS FJhCz)29`)4O̒}7N¹.M5ُ1‹!$cﳷ]ȣ#gsHm=[A%zM:O'pOG4 Ff΀uP@ԋϏ5Ǖq DNA*ЉG EB.# lUdX(-t;7/ {OA*_9HiيۻRڠJG=ù7=_X.I\PHz Pj! )|8̆Q8| }@n}s 4h.crC"+_K衆%?)|4(8TG= MG@?*]QtvTy5>@C9&%X@\,V 4\,W1!TM+Nʕ ދF/ jk{Ͱҵ4iːIzڠV[K gؤv"cbD`Hi:Qp-IR1G>i9(9@pi0) \SRgڝ'SHE;C6KFp(1Ғz( {SGZRրK@>Ҍq@x4I=tM4:44=ژ FISŚ݌[1VqG4ӓ]կzC\WNG{+c޽j=!k); ]ecBջ΢V-J-=WH2 ( F ( )֗: c q(# u4gs@ǽ/hq4w{R.hϵ'&R}hLaGJ(J:Լ RxҏZ ҏSGNh4E-IڗJJ`'jLfi^1`-74J4QJi 0):u&RRq!@ z&}4o٧kKTwfxZ&nzM R{R.M)f (iQSլe1C:jGjqFr:b E!!FM4;k{Sq3&+YَV+>ǙDgVނ,˓cr>u5@l;Z*;80pμ^ եYMɹkBТҭ8yߗsJހU<7tCړ8ç4RsA.h% s^ԝ}ߍ%/CKӽ Q4g4.OziKO ZOƃGu@њ(Iz\QץSIҚ'4c@'9֜O7@ GZZC@=i0)O#ғPc0:P@%;=KZZ8i0HqK׭!Lip)? 2i9Rg&akחpڎ Xa#Ĭ\D Fi=tb;V/!iV۴0UQ\"A+Xa.5vY: `uZWK!0h9[ q?jʨD.YX-N$)W} w_jcɌg-tfYi[ XRi*;v^m*M;E_$t?ZvN5cQ sZr+uK6~yqY4WT, ,gp׵E+jJ }? >O7M 7yg.J0ޔ X0EyEg5d/j#OyzΠǦ>c)~4ړ#=h֐q4Y(ֹ-RHxu-F-:KHGҰrW5{,'֒ ݳ#뢌CƋQ=ub$~4G=Fy1P}hi37Y\\=D˄%9rsJ-ʊ=zSPĤWn罸3Hdsje\u+IrzMy䕳MPt<yavz $j7PyZO3 w,yO4 4DNƎ@UԮtBM7L--3}I5hp/FXôx 5ܛMnbHp;5I23,O} .V&6dryZuOi%]j)C2%=p{ntS Gx[K.l"SaTyY!XzW=BX6WkCovg#C-,78ҦdeRoSVFYmHc163\`E5E.i'+՛u$nmE>]v4RV?ߥ\]ݒHwsUgrSဌ#(Uk^Ej16`Oՠ|r(u9mFrW'+3QfNJ{! dYafnƜ-5avAUCyĪTct9R:{)#}nhýi4=HṞ掫.vne!yfMҙjxe;{B,Gc[sŦOK'`J@`}Ҳn s^A>R!mI"k%KyQg+:G-^:VŸ,@[W  y8[tB[K?c]ǢZw:%98__@cVtSԷ}՜ZdCzVԾdmnVO0cO^V3I3hYIr3]Uy-sҶMtnm~qu DU}Im7w>.-ks(QӊڳqK[&kVm+vf([Fs&ʃja [xp=eo$ J^Tgv#wڟ-; znA6OfB.n3IK/Mk2vSk<&3Xķ )*9Rv0?T~ut(f3N -k(#xжYӍ{UAk" zb#C#445'yM\-'Ǩ)d?hs5'1"ҏ‹{}#10T@I'F>ɤYf'\ ҹwsc޵O^K qUfިͳk{XS^andVި[ j[ҡu9# Ux>}c nvwٗ,$I:tylX(0W=g]7+"iqX~һBw S֭{UGUx{z4Xu3nBBCUvgY 5jFj& -}Y.2=+sVm"҂ l=2zhjSK; [[U5@rkDAwfzOmDR\[8[NCİP?tݝS2Ch-56#~:;UuLv&IjԬ];򻽅4+ eC]3Rl& <0FR@$zU7@-5umV-dC2MASæ~Vw|Q#f.m7쬦4~RpOO49 bI -zttɥQ1n}vhsucUz89ޟ}kc&%ĖA; Y{V% 3+XKHC_ܬk[<|bznZO3ƴq\pja^ I_3+pثw$Vfi_fvy8_Ld " QOW;6EӴaSF:HbW#>եY74.ڤIZUkwv#PyUM٫#,q֣BnLi^=4D ϭVt{Vmu6yTXvZoc)]3j{K+;-@aq:,":,rΨ\mmc{ 'd/o OzAn/ l`[>ک;dtTܖHv|FO d/Vkc`>ºt !o9Fta\i{cHdFt iE˗i}O9fcCg[mR)pK~-폨]Km%TԓNH̒\qI+9WTSn9n/PB3|{L+#w1'kiS鲾A@j@랳I=|RWQٖf//[HO-kR&v{QlU]T\x ֵc6v{TK-jXΫrz3kwr$@猚k"o$o[΋yn*#ZrVUY,dLө+CfiAJ]Q>v9wqk@d袓úmդ(kPgA۫ԀȢ*g`B-'kNnEYAJ ^,mՔWt+0į ~ޜys[W,42qTn S(pC 4^l,+KMĊWF)=wls4oSEMz3IM=3 cǥGSۑ!{Qސc!뷶X_\G"{oUANտD=*[ћ_h=r(ƒ(␐:t5{9[^E"Oֶ-bg# $bSq4Êp75Mp%/w?aC`m_3RZ4Y#u Fڍ{({f1s2dў(N<Ӈ9o̓!Y=OVu>|:Dh階0ޕpxX?= ը@Kxu)hk&o j7~asYZT,M'fqn5kMKٮ 9N fA-vPr)ӥZۯM*޴\(8#~K> 6w-o\ݞ7)koo#>}ϠM.[庖}.6>naa|w.CEb!<(TH=?y!k[>MQHXGz̝EO܉GfXP]^ZWr}0i`f|G9cX$d2SյkK!N:+ d`4>>xi%Em:%#|νe l%opGuUoWLӥo\ !v_x OllWie6o^~Mv:TԱh=0*~V=A[;F<]߃wR'~3ė +{^OkHP9ⳍ)ɤՎNgmAv3vVƏ`uIefٹx{=\ϝ46Ѡt=sU5엋[n ,Y#'GzriQ7bmh gioB;a5SXmcy9triwIYDD)M$q\H/Zym$ڌGz̿1k%-/f밚)qmknjOdhxHƩ{ Jܶ̐6y+.[+"wjEekFYuCHFDY]/k3mtֆEL'&Һd=JK{ܘm7\w59W!cbukC%luls} Nb:p2jKu#O}:;%o k6I6Ҳy+si'߆NAz񞙧ȷaYJV9yCo091$t0GoswI$l2/++3LmfHEԹuH)s߉ƑwVn$`t\vTp%\taw~'p=+/\֡K!\CwM$l<Ҋm[K5w8)nje bw:O4#3bojS׶)@oQ]ŷz*;Womʳ)z?:JVf&QMJ?Zv)w!\Ͻ!p(K]F9*=kKj:DJ&0k>v|y?i 3ځ^(8ꀎty8DR-yumbmre2DJI⫹ѭ3s.޸;;XzTǸa\gCjEA܄.[9>.^HZ"j]Xٱ޼_s>#C\?w8ە $CDj:ͳ1JLFNy4Jm\GM;OKV i+\O$!sYIC{.cA1ɩo?T r*)i.sс?Z^H*M{L !@FivBݖ\M GОhwz#`,#}KSxCl=3A$:|4 Y _\z殏42 r)?֠':ͼ#bNI>*s;4=^Fw[ͦ,10{R\Ou3f9=>Yе[[+0NG'Yj/jU~C.)irhV]KĒnVmψM;P7e!#a}ޞ YfJ:z V˪"ڃ)Ylu;]GHX5ky!zu&LCn+kSW᰿LI`!<&;QZaI5m&;ʸ2S=i{Nf3 OviBn-CqWLJG1I4WW:|vVmOoi.m635߸kT5 =VH7 9|FĒ-@\kRACV֙IdYE˕~f9q0P,M +j-2G dL v.{im||>\V,D'{y&IpUӏL'\GmT)Bpkwf-]73SiC#41+:?ٷ@So΍rFp^O:v\*&aƧY~*՛PX@Tu2_6Z&> C֩txwʷ, 3zu-7qivBv歅MES|ggKJE6\]emA?N+wMx.tN|{}j$_[[a^a=f<02D~VOZnFSp׷~ :u{s d5swo!.b <޸֯c,q7$~5mz- ͮtziQ^yRL_0mX-ckēj*@ {VF',@<+b7ܴ,A+)SwWRRecApab-~c(u ia$Q1AY+Q\ՓU%ս[1.If8sDeam}shB㯵Amj v |[F .C)g, 2*Qֺ,-B>_rD1T\:xPdKӤ$KTk )eS4(#(5v`)\Sx4'8'=!qpʳ#VuK|x[AJAsJ^ihwyֺhϮ+ ҼnΥ+ _]{{u1qӂ'2?7Gvؚ' |hgN煀!ަPo9,'',kb1*4Hj?4fA&Q ]:LRuSՅw"g{ .==Vo;h|,sKQzAC' 3=X#4vsM=sMb1ⴴE$O< nt>{c+mn6UPGI{|O3 ]k}N73SvqX7p&opnZ"xwN/D MI*v.\h=v[H+dZԼCm{DbZ29.ǩ!Jt?@_ c7'7~*ލhKcbCLm''\gYnoyw]pDҼ0E*z|ok.a vvDfVۼՈ4$jGjD+K±Yc:28e)/إY"žҾ'Lw/Cj F1^w.xsCPѦkx3>T*3ֲ~6$X\øm5/*Oym)d z{ֿ'ӟIex 2:N<;55~yk7%)+p?:+ܪfTdU#H͙b'XǓSӤ&72$װ';4[_7m/5)bJaPZGY"o;PPLv@ =9 TvAS=۵4m%ͪ `M6eԙ[EOr;<}Zrέ)buw wOj:Vְ]GrI)M8v3K8oN BuT|{O<-fH$8{g%RJ1U%Z*WW[Ik^￳2JnfxHު9SSliuH T7$Y>WcS3i< 1qֹ[^iԦ~R!؁8VV&QvFK9,Xv@=sMdt&Y0V s}i㌓֐JƍZ.vka"Dz=\_j>X.s]Acȓ5i5KTJ ҺZ2 ir᛫kKqn&35 X:Bysw0?J4o ʜCKx@8Pw"7*F`"”ӊjRLaabMzMk#=!qgS.?:Z?1=[?Al1i.H@ުl!X';b_ZöĜ?5FeڝUV/ݖ5 :"^ey1򢜒jts,,R4SJpbL ZvtYϵX.5@xrUZI4e#{Zɺ0aq*,ڱ,W'qޥor;F=1UEG.AOC?/޺#%hFBƧo`Rȭ10OA8CRpĈmy!qXſTtO/C{qBd&eF5Z{[K$<6ͭŔIrG%cǡ##TDe;bU?=3XŶg lPᎊK_ޮAym]>λ>1Uƥ0e[I6a{7P=TYrǦ͍#liiyH8Yf+̽ /F}y4,w&sVZ77_2 H<v)*6.7MJz-͵*6{{d'dx#(v=4 8dpqO׹X\2ivS}koX<6qv݀܏ sK #xtBմy#UF\{V1nۈʣ~0[R /MXo{\v]8WOQu;lᝧ|(?5)DmȹsMX9:W6 ?%:YwQ _H[f;V8m"M j:).qpwAS ҐaPXsRa_QXduSI\h/O;uC)<¿O\py'ӹ/ oK\J["]t3qDZ泵}" ^ʗ!aں7VCUoO3iDvmYno4?,d]JFU)j58}) JCULcޓ4kX_\?]ŷz*ΠJ<~x Ke:ρ`m߅jr|iw#ƔZFy~t Ja +/e8"gH`_9AizN/;jm9f`(D_G䢰ԕ= dRڤg'O-0]ZDva-ʸʊI~gIۯ)`IN: ^qB]wMo\rKnZɐ>)M}O6vUe'%׆N̈+^:wl12Y$H|NpnǦWvIP6_LǺ6v;`d6Gg$@WȎu)=,tcq?^?߽\25ϋe,O$R RaSvv<O&##JϰY~L5U6l;b.7Z7tc5^$sH5;KIAjmޡk {cӚtۤ+fwޠ (4g.vISVZ\]M"?bM [з*G+Th vl tG]}E96\j7}63Ts R;{qq7HH<]^M.+ioMѸ),v|Au7RڦHP Mh[QQSN$c]GJtx-k?[iQUI$fE!ԋ^󷪿PӴA z8?.9?`&ۍ, oN딑AtpkBa]L~O/lf'o`i7 fB S֛ǥ w-@Nq@ JS'?^,j(h}SJӦsm{Q|=>iQC-]sBWVqhAgm$(kNG)_DmtYldĈP2kyD;X׆|GEl^yAZ 5915}<>b$22޹o%I*XEX2G^R -&vy)YUV5oVj#o910 +UYƅUSU@ ?5AiHiAV,Ƚ+H$zw蜲"xꆛ/۸sW,[VRm}JM:jd:WkG'\ǑI<Ȟ4s %wG(7'Ue򜮙OI若7rf0V<`N٣K+b.Bap+JxOw}\wlIC^ WWaIıڮF9|Oo_cW- Q mDFH{eGxbtf8`%۾3RmI+޿^i[{[P#uzOclh3Zp+;Py`YXՕR;f_ B&W8qڢ_7g. ЅYGޥWPi"-Q_o#a9{{U..- Ad_(a)xHxt9Yݱ9ɫUcgf)|kq*_%מEqk9kivfl=!" cdFspyTvtpCK3IڐAG8qg{L\?.[Zi'liieI?|/&bfF)6/lAUHM5 cDeK܄Ns\5Д-:zX?SiiSxU'Xw1Gg)u#.r{V׽٧;\I,oi (յ jV1\Uy_Jg`MVZ1P#_ ʣ[y ڞ\}u pGIgYj) FĎSz#sQWє )iZ$wFa#g/ןzqKb;+U40uƅw30f {UCJj6/|CvCwr2IبQ{%jU%ߩȳFrѵVFB*> Ŕk}2|`wW[E3&_oޒۣI֌\hfIQfyֳȗJ涞I #x {zz%D714r6Ӗ]DN0oJa>oIij]i3Jpz؋@|Mw RLwtsҰV%lmHGJkrTQ}2֧/XHnmjt,JlIkZVk #+&Xu=sߊu@Kh!c"D~䞘"SBcZz|sqYXZ~jOoD) f,p3׊F=FjŮu{ǹWłֻnŝ {4tGcf1 vⳗ=4o[[qeykl3U VsŒr)ɸh'p7In=ku}"y0neX~j\9 #c1TާxTbp$nzӐ ַw E(赉&!=88ZL`1ځ`W_jC}3,y(~>;$edʶ|OCcf \nh*kc"%w^`{殛{:f,w ?K^7o T.-*%֜: kj_): q1y#k5[rvl*ѕ\סZ\hQ..) dւֻ_'+H*ΠJ?0?:85.y3V(Q4߷~)bI4^0} eoc8<~dR+/b|k3MAnN]wbBfZz_\R6HAI#C`q.kVIC4{5(εh32:H/ZrőGtkV0j2d߹5( N Ey&#_~Vo7Gy'*igfB:x$A@=)<7uې gKH;y3[=zyVL'W6(^ 0rIQ:usR[9MTxvP:4c<4l[`mR'OJTdgE$jdGjJ qI֤8~f\yӷ 'K?0yV.d pc"5F6- H$͵ьKlH{XFe uͼڗ?۲saޮ>O.Bzu5_W]PЧw Іxd<~n%rKd:x5.52<"퍛ϥfA{vDXDRz֔(JWƺjƇ|G:,rMcBw ܱ{:dWʥac#3\!MV5Vk*ED׆ JWFzKZuE(k\ "U.f"0@vMvW,1nR'4ߵ[6S9Rj68IN3VRxond f(}*f*ηu52I%$XeQ^Eisa<n{'ơwǯuI *]ȅYS7"4)9t\dWg8N^]\WS*Em~]˖_~")Ί)IwEr|u>eIkxJ\7mMK rN1vⲖ%֦HҢV^F=УkjfĮw;g83I>2YD*MEaGx[zе-9,P`I2;J iuۘ?'pԚě鸐֝AuE}R@y#w47kq'E.mlE)#yO Y;9myǽ)8Ҏ q`NG4=1 \4AZpZgk$:qWm.6Uߎ>G*~B$jL2wǭQၔܮQ;}s//c{Tֶ"([8`lQsRʍ+S=3" 3@Y#sK}5݄fWtp6, Z'U4~`RewaN*M@'|VXܴ+09RY6~";cΘ"קy?*ChXc)D:TBh#1̽b\e[HriTkLW-;G]Ť 5UK S?0jdT@8֋a8WwҢ[LcҺuKVCu8 =^ k3&#(%\yʮ{bYª{ 㠏䍞=It/Rpނz4u)tiڬa+1 lgV$YˎO&%Զi-JQGaSO PQe ${]nEZGu.ϔϯVg}$U¤r=_C:hDλnK %`iք)Tye%od$q7jAkWm S&zOCwLP(X\},cCƞ\(1y2Eh#rN]s[Ƙ]QNp}iFWePW6uVӬfI ;ʠgW%Jy`H'5XjUc)#i%G,bnݗ2ʩ}+h>]:/ܠ(yt{v`[Sqp:sEɔ8ٕ)!l9̩ܶ7/$lFq[h_ }ŭŝI&pPI8%Exbg}OItUytX[Cc=g'B-+os[YU*pA 1wz՚؋/;rs[%ڳngk]jД-ixFI=*wn9-1WUs^HYM,5R}-\mƙm2Q)[z\4ב†v+>8\Ub銕TƣN*aВkD!GҝZi;1@4):z14ښzS=!kawk5U:s7j zon"V$eG8rXXj =E&5jxut&??KMKdtrqvv~-#՟ŏ.AiV>U?Z}ȜE sAs(;|qUE6NItMJGU!8fwN.M֫܌%D99+ʁhwY9mD3Dۙl#Si$Lg)=Xl%fN5~%(4[=2*}E:T:g9I{ztiņ =1P-1'mj[sg+:eVUmb2 |7ǩ2PH1{coԢ_Qc9Aמu}|^fXeT mtQ&ƓA[%Kn~YM>y1Oup.I 7CEcjFYozuOAae'M4Yt;K[vGgϦj|MoVTm䪄f+Y6zdvWmqDNU*Y #XZ5yZ=Z;~,Vַ}ugsqZ-*#iux_1132q p{~Y'S3LF:u NC J8D`&kmH'#\Lkm]bR=V_dm6sKȶ=OZд/廃!]`zVqd@x湥9[д!ScTvbK<[gZ\^2H>f;SS,%wCjiTC䕷ge*QzDUd 8$m名\`W~5Z=6ܴs^+O"yyGe]=az**T[\Zrs~5$7"i%(Z|֣Ѵo`mȴgēsWMDkD2yPJn䬙)(;ߩ̡0+CAK?2#j$V?hi*1^u,/@q7"2s#~W$wrir4%avϕ: Mb,Y]KGo۽)ǧ5n ",f d esNI- ?ٷF%M.VE-ȦKcM^K82iQᑘ 55m > ɴl|ZI$՚(I;Ȏ}"8-Ŭ}dΡjc3Vw4Nyen*d5) UVc)N<_i%{d N TCJGi ۴?u>h "Poi[Q5y?MM:v ~Cxm1n-4G`W%n݇{f^"P^+;T3Tsѳ;I*;v4wԷJ Ǿ觪Yʾ(™j[. $V=:ոZG=PГUH UȔVSҠQҦ_ʩ7<׊A֗4LJM/SӉiqs]ݯzC\WxkH*bg[R;haj?uj ֩٣CӖ2A#RM8p"4_8[?*?pUG1@ǥ)G4 PqIК^pFh1S梑r84x]Z]LN0 z-;5b :V{ Km 2ui c" e+3uaoRm>kqab3ҹ{+c#p t0\YB;\Ǎ5SN:o>'()ԡi|&*++7ϭ&azudAZLJR;3Y`'M.1DxDM m&+ $)EmUn+%m-eXG#9@6D=EZQIa0Izf.>q֐r~sק!VuFM:!C ȫqޓgTdu(BFM5ܦF%b9>l|Pr¤ǯE7;YGluU_G$Sz֒mݜ0{= t+vWqN'B#cCs^={vepoJd$k[H`淧g:k9&Of4Hj̤5$S[,Cq~yLVψ'ـ<uG3kD9MV:oFO۰?͟j>q3d`w{\UYuk%h'!qjbyaxTbzG[u{hIey-E}jyf{rRe#g5$"rPB]`dTڄb.bAosՖ{:3MÙjZ 鱛찮 ʡsM$ٚnyhh^kmX<ڳWmZ_i.TZ鵳5.mP+]_t]5[˫QXgҫéȒ21"\>rwZBw`v^ҧsIaR5cz+H;Wb~1&Ew{J-+,V0; ~[X}z縷Z5.j4Yqs~IP 5Ei EJkԲ֤^4=Tzn)3 ץqzޘ>8Nh]zC\W=!k9un3PLNI3PԙazKl'.M׽.MpSk(e,.iAfTyR^jz֠1zsA VVGX4摸=M Gi-b3Z]Kmle|7:]u}Cg%O<` Z;Yڶ|zW?ymuV}帑O CALb*sZף?#d+9R{_K$>jQT:~gu*6m?R|;` yfެ>f~Q֬nscp澾e\A (!PssMT-ED:&JZ&аD( \*$LÊv"K5[F ޴LҀǚ}}?JʖmunH*qڥZ'QKqUwc9!йae=2)%̐,^1PX\o̀{ պԭ2G3d@hi:Nm(M68ꦠJmɓoOqS^N:,T]6M=W>y<߱6<糏QRjZJs3<%M{8!ɸo.D?+}GTo!QMqws_[[\9\cles$5BrNݵhA6h]Y^pJ1Ik4䔆 }hi.-E#dd=Lnru%N@^fbZ܈0Njj;BWS6͖+O6]! sҧհ#rU/~o^`5:ъL۟Y|}cJsHa+.ODWd4Hz5!lkKI!BOA޶J+(axI2zU~ͬ]'ϕyX^Y1mYcPw󣕂݌ag`)2;xXe)U:[ gceC1?CIIb(ZynFbpYp/d B{~\[ Q}{hc o5+ҬA ʬ夾XH%W4_ #<2B`PJm4dd8Vbއ>.R`ukd rk6[gdc FI7 ]Bd"YB0 W?*#-*CSwiupTODޮpsm<6F@O3+iv:l>b~5葮GНFތ^ );F* *6Fʓo( tC1@Iؠj?:\y.rhAoƔdqړzdoYw48Խ=M084m\RycQ)2:7/؝ SE^XSFXTs !oc\%~Z#=F6|oq+,#?OwAly(` #zT= q:Kxm㷩SKfr~EzՇ`NdEƃ RcޓqTXD$pXnzOwf$S\Σu*Ij5$Vn)3ͦ(dRY.㌏zޓEc\hnVn&"֍?Zc[M2eꙪf㒌? n>͓Sm;}igJƪl̒Vv97sAmHGO̙bt$9"b?AoNﳌc̿(d GƵ Hmi ]ƅp; L#_}sES/l{au-֧#@; ,eu(>֗K.(>@Jdҗ+}W/N|GJ,O?/I>^+S{`![Vi>?j'h3Ac#H3Q&,}hxYz4yҁ+/Zb/1Zbl Ԑ4֬e*xZ4y#;8B4۱<Z~P0 eRQ3*!0Z`i>´Dcӵ(ӏz)4jpi|4jbm2Imt9SSGNOInڗ)^խIt Mr$u5@cU1YVCaOVԢӴ'}Mlv^,|WOgr.qCc^E/~>פ\jvbG ȀQ~iY lk\CiM4Uz\>ie1?{S$Z&N{cڹKpѧ?6&[7$KB_VQinQuEdі?1Q8:9<  2)VK(Q$ kbOk4wQcp)-7Rf?#jk~ ۞Y"BڝU_mbMtOۋ}HH+'9VMǀY-0E|38JʷR6=$<נZǜ?yns-#Z+3(*s8 \y@NjmC?7_hrRZo~ =qLbRn=z-ik@տ5 FJ1~)SqN$5ә\\z֩l:f:,:L"FV1UtA1 Ӹ(?礃5ۥ 'Bu`3 ;5+e8O% |)Z9т;w1UK35^ݧF5B^*WAy~b'|lOB:qN(GE8:WwjcүҙQ`2Nxi[f1M1N9txG֩u:LkpjyJLNÿJA6yzQj4ǣXM!qe )s3::4`/$t4OΝԛ|mo׊\9W5?:r˞OchcZ᤮Nl?O39֓ s] 1\F9:He#_hAeqP6T+6éqڎ@9F7#gOT׊ڠir磳r9^jx["שO Z9h#(v>ܟ<8#cjf.sdUm39>RߍJOQÜ-c*Mh1UToaڥ<HV_WmO,l52xŢSջ Yc);oC0-b>i:@~b{nI :gL;Gqk^լJsǜ?gQ+Q?F6!;* \)wG1^%t9rxnnaeG^ǎs#7"fuz;_W׾K̒נV.j g~]MLE_x)sӊN:icc1Ib6;\grޫh$:x)Pc]\MccN!Gn3SԺyy5yKe&+Sӌ HJ+fE-H,dtöЯXly; b;xV(*(ڞl~TA֓ zƚA R3M+@ RבK) 9nOJiSGbrSP[FivoG=`G{cڀ*@K@FR`cѕq@ `) ܣ Na G{ё0B?vat;ˠL7qOA\ŽP_Fgdb? ǭ4 8hrIދǘ nŦ3 , Hr}OWo΁aAlR2/%G0S8R qIF8 wp(Vfy^џƘ䟕1""pan8cLV B[Xi9?z]>)]D6񧭌KcW4y~ B1T⁑GZcRiր# Kt1G4eWM00M>A &q֨Y&Myp?ҥ^I3ڛDuvQ LSå[s{R{!^>d;ҷV4(')Eh0h#!9ipzЀ)N#rs@,6F\;š|vΡY޷ }hM] ֓w99;}+-?ʼ5s_YLu c{?5\gKL݂܉B5TG'`:F)UQw7oʝ\sAvj_7hڕG⪉`?thgy ȥSu?tǭ)7pTQ`k4RqS3 X.[}1HHUlԿfh KYz42yhzF08!58.?:jF>iMlz 4 Fс˜/#IҦ#tQEjDnh ONU<>9teei VK.*n)#sGhXJQoq*QGA])W7ޘTQvEQbuc/L՟,% >oT+~ZpG)֌zfQzN#⁃7ohwi2 HғO@ۻҟ!Z`7!8FijnpM "@ fx4Œ€@4O9jBFNhO0ipO&r= /4Lcޗғ> g^hJ^ڌcр8E 0(҃CLbtMJR9fAރގ(pZN3ր9Pq@QJ:Pr{PesH}G(:~=q> 4qF=}(Ǡoz;q@vZhiH4AlSLd~Mqw#%RO޵sw]&nNXV摥ǧZ,jyf4iTZCdPXH |V\R4[/Jwi<zI9ړ$_s^(ϵ';^=xhx L{h4SQH8u8E'#4P{RցފoI (=xΐ})sIJFq@984u8NrGJ^@(=s ^(:qZ3@ K}i0hϠqڗMրrx'?JL;4+\xՄ%k߹tچNfcۡ]ռZEf>f=Njx\[H-_;U+ -M}E'ݮRynu$2zנbIW;tsXq*Á~(?*dϭ)#S6_o\Vr':vq>q]-B5_ƵCsN8Nv(zN!Mp1y$"ڻÓz /*֥1%1\#+Yۣi?c v `jzYI)?tqV@ɮgŗX;u?}R`36uu%ܜk mFpXfCڗ# @Kǭ0zxP}iS(I;FIir89hznHdGQI(G@ qg'Jx@<\SsdtgtG@ FxKP(,1I0/~i:3ԙ֎Z\Sϵ1Aނ@h8=zP(8&{QƎ ~)sM}h#&Hړ@ q){4RgqL !ŀBOnk{c[k+y8L1(}(z q}pIxh`4+N,6¨&9]BD*jVE٬`kQHGD_ֽ>T7RK'%q֚\mi?vwj2Pa[ȷ?Ǟ}DXcqR,q€O.Qȵ3o'Ng@m/, ½Wq }>Nazss.`e;}Ϋ^߷Z\s%rX3u8}Oi`D|}?>d2~EyӠcVqQIFl=fV}eg QE~Ӣ"OjC(#VC) (vz}v_QvOIS3/?Š(?KQE;Gl/?Gl}eQE`Yz_Yz}._GeQZ(z}z_E]OG_öGQE`/#XeԟX}WcGeR?e/?Š(~_z}  ?E]_GeԟYz_Qv z_X}w`)/?G/?Š)]OGl/?Glq_S;e=d{}._GeR9b{}.lOK}r_j(jc)=ZoS? ? (v1`o/#6C( ct ?fQE`P|1c(0W뙤Y/Yߩ3>-hiAmnn6OE-EM}[O?7?Š*iF7}s6i `sVj|.4GEb%h:jn^@O^c(l gVQQ$kF}R}DyK _Ref218951511}DyK _Ref217839001!DdL  C (AFigure5b! d5FS2 2{n d5FS2PNG  IHDR"8%UtEXtSoftwareMicrosoft Office5qPLTE3f3333f333ff3fffff3f3f̙3f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙333333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffffff3fffffff3fff̙ffff3fffff3f̙3333f33̙3ff3ffff̙f3f̙3f̙̙3f̙3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3fg'tRNS@f pHYs@@bCc[ cmPPJCmp0712Hs"IDATx^] :}~܏{oUBh|Bߵ}?M߼u ' Ox~ z>xl{_i#F<;?~_̯? Dbϟ` wzLJƯևEG&w#qȵ8ݵu7ߞ|q ?`k߄48孋8IDF?D`wCw 84NxWoрx_jC= /QPVЫ_'c+`bͲRcz!SRQx1Dz}&v7DsB \ D46G6晨~AVSt?W[计 uQpő 7al;xFDz*$>E={\SW+&]8#ǃTsf˫ۧS{ ƻ] C{%pS/LQQHk!na_ :Ձ| ޞM'|@g r{t.>k[MBYbtSw˶. R_LI 'u<ϤC͡/Ӆь@?Ks }{_u.Or%} Hn04i\K[b|(ߊz@$3,1)Ƶ߆ ZSmDsAA8 p-JktM9 8-6LCp˅ `};4R< {dwHkG' ʠ?:] 41 ޫi%ge/5rAZ-xF$~2|BBeQ2D^!pg'tAaAMzH)[G=Oß3C_(B֏v(ɰ28j>F!< AѤM1XSrD*%yL461'k] 򺈂c-]0qm]pIlznzɿCP3 |"|G@/cDLݺDG\FAT&5 50Z~8 E o:h<">GA .(c*!5W"tȺ51VdR6BI_ub3P (Qc^LL|S N,H1k2ob](<^@! U? Kw{]?],tQA!@<*3릇!([ |{#OqZL3+}@i$ȓԡq\ g,S ߰ fN0>8.0P`~p%Usª]\ЌE '+#r [E \x-i@o&QgIq /g3V"ڙ!Yx"kuͽ:Xe}%=@o`,JM|[ LoyϬ>_Б̹ .`%RU)ι 4 8g' ,'Icq-AjS%A]p7(̧4i]ux>\syzȂH?;NDŽGq_iuP 4g!հcF ќ 18@a`=\AA .0Qbʹh5X+Imɯ,P8D 9RʾW4tZpG62@1XjO@Q~}zՎ78G0EލXMX?$3J׽)w\֧gCnj YDl O ߫۹u!$255rq *U=@Ukhǯ} {ا.x*uՌ?A [Rɮ :a;_Uʔ7rd(ӘwlF%TډIMرN?!z{ӒKh XgZBkY?cxu3s;~AӤ dQAh!YiYp9`P3O V)!8uRΘso!*U} 譱Sg9urZ}z-b>sWĎx+wg+,3Aa09 Ve}|n %VM8gqց[Q:s fqÈOtV˨)f٥c4䘠r~TUio^1vstDֳg|];4WCl'Qo[aO-A|i_:>k͞3A4,zމ|gGB^uYs|~tUh\*$\wuVQ@5`RߙрotE.̙!te=ٔgVNKŸȳ'NKy_2YCd`LcucN׀\] J!Ϩ&Nъ3/ƥNsZ)åtȮ#Mb[i8\H:<5F8]르[ Lzo"Vyҗ#aՔ.ſ RFlmM$ZH KL$Sѡeg_ʆXyt<{umd@~AVvҲ'px*ؑkϜz8B;J6]sA+_d/HC_^<ȳ7w厏Nw2.`P{uN7eLբ1m }U< d'>h Bt]p LX [.!QXYtBXؠDQURbZw6uz>  :Z =(g͎jǻL~g9@A6~P]0kB <2#?u(KpAh ~|i'JMi]8K 㭒ĀT/_RJ\WqXb~~.`1`jYx(?vlL#"`C.c4!Q u>`"t;v*F;4p.1ň A' !R]."^)[l&@ޖ bn\ iu#a`` p4y/tAޞu@zeA," vo/ `U_; 8 uhWn<!-9+R˧#quV^<+6QҊ#JslNb3FD89lXDa |ƶ._cux ;:[t\(ա1B@qYv wB9wdq.i!#Vn`]U?CWS@mDJUMIDr`@+ēCZfI_cZD3.hՔF.<".`]@;Q hx&@,(aE.`=? ƈf\p{ɗ%]5R:qAQ|]`ky ijJ_(.(V'8t܊E!l\T2R .XDW \~D^uWѲ6\>EqubiF .mQ} qkJG 掭אfy\>{W_DguL>/ #WYϹ .)]ts btA |:EY tA!z).]potAXhєk\yAs# ~"ՐzJČJ5bDa fxEu͢5sAA.:x/9.ڹ}@p^sn1Ϲ/`o(H^+ذAWQj:Y;uUpz8v\S5ǕUQT⯭xLs2k&,7[y$61X{_lzGxDŽWI>Y v(?#h8K=Jwxr~OΑIF~~eA-Ft'*0 ԋR4D)9*+' O eWMpsfO̭gL/uP8 T ڴ$ڃbS@όR{!q1I:L<}Nph&L%M6}NcXƙl+1¾@տS՛ibq#|Ճ@S%ncV\2r?hghלfWw'[^(rI!}O$(-jH|Yp)޽妦nIpJ9ηĕGA_`\բRKCc,3ު}~ 0IMƜ![GT3/5M9(H*6gMH6OCTs ^~n^,ڸ@;Z׵gH?[w;v,_Pƽ]LX4ALFdJk:stZBcOvQ #O{NtWu6bTu\$N$& ƴ(ZHJV<|h&.0vuy7ɏ4a/L- 1{%Q !,Ec.:{,J2 x>_@Gl؀dwQ\i> ph"vݩ/, !MC+u@#=sjy6hp[Е|:#dwޒ cUAہ异l>Dӯ-Frᷰn@ M; `/uZ[4R jG~`VZ-oDe(G26Ѐ o`sQZA)H)rPVod}Ng "x#+S=bM`|u1w( {Y*VKQ%:Vfb3019SudE|W,B)pUf8h  .c)#k(Qn煂KmP ~Ͼvn…KmP ~Ͼvn…KmP ~Ͼvn…KmP ~Ͼvn…t5o@H/B`+6+IENDB`}DyK _Ref218409813QDdL  C (AFigure6RnPo;[kHJPR{FBPo;[kHJFIF}}C    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;y" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?uJ=NUfpwj&/vƤi| `7N5Ldz^nR Foo=HRŽu+M{.tvo% ƍg8p/CjS޷EޥA+V%fg?1fk]j}qLQ#=#R#;!n3˞?S?u@]o4ӭ(jcW?ƞ5mC\ƨo)"!oFw#:ʁ}~pUC&>"<~t2ԋ^Q si<1Kԋ]S5JxSB4t| 3NF5WOֆ.qs4qвN #3j Bқu/!26tƩ}O[iժqp-sOZ?UzF+ضwON7å%'2P7j .>|I~?3 nV%]Jq[h:ۏR<Eo[_n?)ۯQ,j3:F=1N?I\luScHCB7CR?nD?aMd}P2eԵ⽺4K/5LSNGby4?Bn?@# ftSmkq}q[j?]CBU=Lxހ-V1K5O=GH+5-@J7ij?ݿƨȦoqT.zjWcpQ[oBzԩ' N?uR4q`A¸kWBg۷P46.zҳMNY;QnI ^pO(ԤϱЖK*jn?@.޽ΥgWmfw?^ٶ~uVvʛzԛ9J-'I,2RxOZc>CTڜ8=.*߭(s 1WqNL4~?;`AQ!t~_$45zwO!'{t\|yPyq6xiVcqOڐ}P,wqR,E@U6:֕mj)D(&~,.:ʽI"S!49֐ olPR PF;Uy(hP{~4X.Q'R*;zTBxu cOFcSM^=1T-nԴ+y#(jǒM_wCJù VFgoVLn**oO҆*ijl# GcN?!{ʘN:Ҙn(.E(e6:S<\S )= .: b( ݍ 3.iS~T57(m{R~$i֝?Κa79*q%\P epqE?zȧA[<ҭ2?*o?t*~ulwW׮M c7<0هfԁx7#=CM283KEXKQl^hvj^V.F̻u@ ;TǔR n9QP!b?~45($gh@L:ʞ#8JѺi$TX`c|ZO*LFs4eriU,sKz30v d2^SgMܧ"5ޔH gSw4wIE 㡦AMQ=S|u2O{Q) >҆pMaҘbzWcwΌoD#L8=hadi+#'T70H$pz9;|麫+fbЀR4i|pƉ|JFYx ?Td*&'zUzaz T$cGLwt.3R4 ҰVh ~ַ;y)Xc\ttƎLt? -0Zfa@:/y'?֔@f4f{R3ҚBg#:/:BZ) 1s-HLe/@5Yfn~Zk^)^B!èNM捀ʯ)}Ot7R?TO[cRԹ<Ҥglq49/ڹ{ӒՊ,Tgʪ%)= ?@*vuVܑ."@m0I8\`~tw,5VH쿭 P>e*é֨rg$0CRWR*jæi+c4Tc=V֘glmѡtSDH?iL͊W/E ڦ$|SL9?{3inqLwsȩVPiF =Iɏխ(*iE48#Z8\Sr=Q+G0} MxvzU݊81!+5rxS_N~?vw X@ՆAE=GޙdU?GHmyY88"MEr=:|qs RƕrMnUg53;e4;޴|ƘăIn;Gn6 ?,ٿ%[ʚMݱ$fw=5_Q:V;F~X.D GzSt*ڷ )^E\oRsW߯8zVC@ˌ R}oOִSorZyTr"a'4pySZ-w e ~b KJ$ UVۂiE!,?8aW5 E,3?~8ց,L6߭-F4L/J;~yR4ɛ؏ΜUISq7N-}:{}=h.X]*qfBwuKpZ"צN #Hy2{~pz@ itsc/jl;`)E4ӟZ@wځ*,zƏ9CJT1XݎƑ 4:T i\V/)6E*.ʢiwMqqvƢY_ x3BUF[4=E)cU!տJL*4o"E+0? 9qC*U=4+X#E;&_g))J*;ʂ%URݪGTATČ +\v+E q2Hz\ñl@zRU횂XSޚ a&҉h_qR}LTwҜ;Qay/\?Y2ڝ.).TpiU+ Og)BսFhU Q>t=JB<գ`8r GAQ4`g\pq N:b~~K _Qmoc- " 0L!~Zq&ca'3snl?ћBZ) 5{_K%:?ٿ̜Pjn5kOKh?lҩ8)l J) ~U&ޜ9q؟OғѓE} .1 L5ON ߲GQ\S~t]Ă=?Z_G7XMB#k4_֗싁KCRǡz}Am~U`ܠ)t;!BVهzK(2Ǟ@W6ͷMOO֬oAދ +}jFr:U*Eh~kyoҴUŸ=.e," QʂV\q81"_j,3ݎhRحl\tr7:.~<R\\5^NKw3ðҜW;R-V"hN;Ow4۞v&uU?ZbtgҝQSB"d\u)6E&0*M)QJIaL֚gR27ZmR1o_֛S0MOL4?ʔI=IciI$&Y:Ң94q|SLzzʓxM<ɞ4I)w:TVŜwx?Þu>pڴuT k2vЖK}gS%y39MDb8Sa] &j*$<}<ݦ4$J`CBcx?(}'9FΐMiXb u?<[' :@5~gԞp3~'ٸߥ ϸ@h2)h ?*GI*CRy kf>[6xOiDɚVC"00Q'֭G92d1 h:X.Q8覆WբZʄjR;5L{΁+9=*s3cR+(?:VeiY ޵`}(%qҋ_i|3/.Q`5S2LtV=Ҙb_J jzR`RN: =i;u GSӻ =*\jS(RbvL3TeڦކĢnqAT[yRlҕbQ049@2:qSJ>:v.y{Q%Sޣߝ>`hJ6UL?NqX=*,CFp&c'/Az EЉ?ɦ}qX+tqj#oVi\0q~TlsiJ&|e5Is-եKEQ$:Bja:Ժ6tr9_sUΪ I4!*>fy ;Œ 69ia,~sR_o^H +o?D|)3צۦ*FN=?J#J`M(8)4*r:TbOq?|SjQ2tRc ;(}hQȧ|}3?:z`T" #N=ҏU=djwȍ1Mp=ҋ_i͚ۛ1$;sT;QL ~Slr?JӼ=Z/`%s{ ßH'j.tsH&lTm;Qpd9҉1j1!)Z^9/OLty?EB΀)\v&Iirަ!?*~!4=OAu=ZF7SS/LJc_Ff`z7:f? RӊbΐV =|ȸBEjC.=*UTHʘSEzUȦj Jd@{SFGo֗`?GVdCꨙ2{g~hd'JTj"vH)8aqSLt4#C:sɦi w=t&)?IݫKo hH}>a)!n<8 !Tu*WPl|tn}5D?Ȥ\Óѿ'i1叭01ZC4=*,QF4NI"fas@U?X “P~|} 3򡰱xHV?:"6וU@iͻ*.,@_Q"_3֥q__֝R)U\,[P)Ljj?*w4\,[yh}*L6zӸ[SRy)?'J'h ivZ.'hLP[i<MZƵLڄ\1Jf~i QZo +VǯP:{]j#pƥآV[n=r#U['mpV}rz giYd:o!ɎQۀOØ~^c!(MRjV_LprM-B39O6?ɪ7wS>^a( =@٥#U.Z攲 Hxw0D{o+]ֵ.,khhcvh~o.С}jpW1mVlzf [9ܫzJƷ֭.|c$2E]:Ud#P'Iـ5o^wc[%6rֿ΁у)Tdv-&֣Y81*V}~v[~\R}ETc!fkv%Z98qRh~]KNnq Ѝ?1YiOg7qS`&9X̻`ISWPӘ 둑O)t5r0)z x`__7e?ݝ 4$["6r~Ȥ֬{JYh.o#LkMٰJUP5ͬ8-ՠir՗֡ GA?ҞU1~F<,StV ű'!'5W!F?Yѻl:([XJ,qw=?Zr2wQ\W|ٻ(N/Bb *# }*!v~9s?Tm9+WJ/ G 9'O+c/8߯O2urml1T0U Lw{qRd?USͯ`kK,adqn)Nwp)ScQ3zWvHI;nzVD\jZE.Pq%ʽzZ!y1Q=EX}žlq~6{Nܘ3>JmÂ@Ơ] ܰHJX{gwݯSoIĐHz획jַ֩<-ُCP}yyoӷYHeQ?)hbaj:n96i &fZpA;r-(3dPuo{́sfv?Zht^ ~eps"b 儶t{UxNp}k[ |n?lG? ^?}d (a5lH%h P)$П?X FZQ]B?MaRxDwyzG~#=,GTijcWq- o(EY`48(qʚQd KLH58 NuG:L'#PԭZ/269ʑЃ9.dyY,q޼^ve&C~"5dULT#*DR rʛ{ :1Tژr1;gWdӔ V|V]q#YYLqzjhfpiuM9J+>`Up(=T6~\Bz ՈNNyc֨$Yz8n@LRM}y>J`Ձ)sXhI6Rp?IMOٚeF~"C.qHJ† OFȫO 'M"yNdb[[Jc)zYQM?a^%O^eZk|۹G/MC{*Hّs p)87o7DwK\ 70_V#y-?)(;Z^|[%UEHw[{M:̞t@A v{JvۜZkNsu:%ܭY<-KK9/؟+Az;os_Q_\l5[i w'$~ Q*_Қːy)|#M2/=*PҜcsRJҮ OR$FuҐEP1O2 *a7qR9JxsѿJ_5sojs2Jν6҆fҋ|jA2E?_3',2͖5][wO'qpE{H'oU/-V@sK`v#e9bZZ ;\ms}tZ@7ϡO3Yߟoθy. 8tpGֆu*DLK1 OXqnmU6ל'zf};}@cȡ<Ə(ʉM'CW<Ѳ9+.WFW.}5H5˙M,1p}=kR%kkX#U0T/ͻrK}PL*ԡGf}ұѱ8&aO5EFK2:tm=²d `~U.>Ϋ鰕^}lri᯳3$uȯAT9`8,٬FZFA-+Gy5iIFM?CٲAܨu## l.Zݾb?Zzϼ2!Vo\*)GLZIdysFqηx~{#B鎵%$#b)n+U3~5bl }R[qM# 9BZ~ck"䓞Oֶex-n9b$yN u 6LeY'4qI&:?7OPۺe$y{/~:.z;u_wR6#E@7q-L)Iu8偪 {?skn 4@gqgsuԛh4J"6>ܐry+TyZQ (8ݎJMiZAm"N8#UZM0&։[r{X2jW ኏֡V ZFdS.D,Q* b\#FQOZ~?&,Rv~_SX22!朗Ӈa#n:*s:ҙ ϸrz)οj,M >oO}Mvmk[h yyUw @XŽ2OSWycH.b}=-hpb7~sZ_ (Bw/Y>Š' 5u(\D Py kQRu+MWV&~zT؜=RG">1TҐUȌ5`R~u.>ۜʧw$QRZN?8E&2?yiʈyܵɻHH;5%~Иm) r:5;1\`U\}SL;pt w򦘗ߥJC@}:v|k+Y普Wea&A#r+\-MsIGncS8{<2+覷, "_|4}ֈnَ#sEi!1}bNM {%}pd$Dbv =ݏQVeݝͅ$Fpȸ#! GB KcO ܿPZKmpz-uy/kU5$)j;@WZ͹ERױ9>^[l >r;VIi>312+4g)/+W{gqW10eANGҼN߼FG+g?u^%nh剘2#='SP} [{V' 0;qV稭蛐O)6(_b>dsG+ /L.:~R d]}A"|7z[1]oϭ/Gz®Zr18ݜi7!gĻN@;U5R ?g7S/ $,oCsU}C(fo /GX,kiH[H!cBj&YÞy'[(Rp};Ve߇!@q'ӁֹcץQI4Xit0ψ8TMSVU^Im7CU<x:{$` Ew:bkjQl'TdC|1YP6`ӂ8x#P!=X,>7Oϊ_ j 9ViĒaQ<2?ł; <|I<JۓQ>[n݂])^{mMѓ7*?kJ:|:kX^E#=G?ʭOGN`2!]mP\@)O7H #ĀP/Yqػ,%;ylJI=i f٤ƶMG8ŻWm8c|2KglK"H:N/$r~A:[9ϸPW%Ojvz _N֊F)"~tU|ruV8Q2?{Fw.MX 3U@F?=CgN,sMpp9v6ElR`?p'ր-j%qW%ql~/|~y!%R<_yngdM9n@_iiҖ vw8P\W_7$+q#}+!;.|}nm.q?u,- 9\8yRˑ 3aUQ.cv]g}j.Ö`szm #1=I5vAWm3YN4C6 f8BTWqv+ulo5-}>sV`! t>&У9PԐx5xm*E1&,YZ)Gz-rHFYVPr3Z}Wڭœyk#‚[93XWwLf'g ^)9i 5,l$fl3Z1CeHZmkD[]#Xũ g|-Ԛ1p,*]׋[ ^pP?sUvη :EK j^ -;U ڛ {w~X8UOep;v1yצ'?7M:w\,woYP WpO^ukP3~?ڱםZZwG:#󡵨1sy1iR9һE::uy;<#z+x{OG%yߚ}i&r*寘-w/~Zs.8v0@,黩@jF5TӊR`޴,$n4٠IsY[I %sϽ!  2+׏WI:j %q85EX1y␚ʊyV942ʰ`|=dtU!l?՛և YcVX7>nFM74u@sI`j\qM–@dSIހSKsA4 RdqE0 ўf@;94ޢǽ0 њJ)4(٣?Znhzvh34g%' =ՃK/Ξlf`sr:mL b{_|x6o} %Ó̳`#7ErLt*eD \S@1 %-%~4R@ MԔo4f) 4F7QS (pj$f2fU *qS-dqQ0AQGQLSuqi$tUo;q0ёQ@*9vKcV^}KD]/ƬW4nv@&@GKzPzsڂqސ◊fzɥ?#pt0OfM!olPILѺR智4J3M.i4ri @-Ii=s@'ޒ9444Sx'4sHK@ L)(Iu4)l YHUi jb!F!Nsr):ݩiP1h%Q E!0"QH@E4)ƓM+RRwL1SB) @5?'=dtSN?/yFحoݬ1'4.~JޛR@֛]PJ3@%I\23ME-7?B}O#3?4џz\њi>Mf4ޔѺL&i37uu!&ihLI8FR1`57i~*J hSRR0@.h%'Ҁ;Sh!ԙFi ZJ?:Jb4G18ϭq@4IZCAF}>w`ёG2:)9 ~?՗ixaBՕ1@ғLp7w&}GjQlP)iCFiKfh0Kh>ԛ;֌)"zR(4vFi3@ (IGJ@f`-r2{gތގg@.(4Z&44q駽Nh4O4LS@8SRZZ:QNE(L4QE);P04Ԇ hJI4J\@ IњC@%ZJo99dtR|#cBՕ9OckƬR4qHs7#n29FOZ3@ȣ4E;'֌h?>f@M?">;IIFs@ Fx4f44@ 3FG3E%P;SO=h<٤4ӯI$SI'I֔˟ƛy84֐ P~){wsFi?Z9FhGIFhњL@ IE&hLM/zLFiZ`~tLMz72:)>w`ёL[ŧ+o1'h`>J45XE}iE?Ί,ɽ@|֊Ɗ:'RKִQ`>J%}mE3_[QE&j֊,_Z+Z(%њҊ,y^i3_ZE*ִPY|ҌQ`>I|M}qEjL_]QEJ,yhxO/?2:+ݨ}DyK _Ref218410101}DyK _Ref217881871DdL  C (AFigure7RLgR3u2tuaֿH(Zi{F gR3u2tuaֿHJFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;&" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?m'/YX+#DTrG9g .?K{ڡXgoOqU?-6^Nkht[\tNz. 4Vuir aRts%fC,6r!g۞8,E5;X1Xwrt_tgG=>. UA`.'ۀzz4xGv>mR:\s1t˩t([VF W/R³4pTNZ4z|cg҄akOz|]'#?T\i$mn8v#n#rRSt(.@#4h+3g[=?v7> pfl9zi4>S B9\1IEY>>m7Soolc3Έ[prOIm@hiq3]@~a +4~¿?O/_XEIl˽wAGȟ߾PJi,9[͠!F³jfl[>.K?> ᾹxfX]^rͱIl9Ҩ5Ժ:\hͽ/;Uy=y44ͯq u[x{kRq"\oT85gpo#1yB\.rJ'܌S\6[\tf{^M_*G3#<]g{^3FiIt0\Qʻ3#:[\t? .?E9XģZ}G?u+ aĹ>|=o?>?urGs>|=o?>?urGs>|=o?>?urGs>|=o?>.EϹ@?ttQMo?>?ZCG${3'.kw]r.??2tJ9`}qѓ=n>G${=n>qTph`}%#m .?_% .?DlE9qJ[\ty+=o?aq裕vgg]B[\t(]/G]>9`}y =o?aqOE9q0<[JJ9`}q-o?>s=n> 3P:E9pqmn>Sih]qqiAv3?hq҈.Ph]_y];_y .4ir.by)=o?aqӼ0sJ s1B[\t=oaqӁ*f3[\te{^(ʃ,]d{^3KG*lkiw%0B( ?Zk=cqTo'm W'HsaM('svQXdpYss>{b$7˒OOIVdqޙhẂ&r3oʔxygƟ(\ML7i(tdpdWm-DC$r3p>:X2MpYH v r?Jnu4)aϼ!䁅ԹGrnWȋ}1@I7N8y| dɛ]IL6c xv>Y&{qRqy3'B7Vo+g39"IA_dg߬w:HŰ˸yw]ݾ՘lB-0lsjTq+d:^]bf.Ur=^6>:V{fkIDȉ+k]D+yp[#q$`Wyvso%mAEB4I.|ufa ηvMO̓2q4U4%R6}EckgkY;! hǫ*iv֚ I![w?JwWDo4eBIr%dSRn܆-;N.;8< ֡:&nӡ•Ӂr8\?!}W̅m~\Q:X*ѐr1Un4kUMdIBbbKRItVm( (A[G&/|K$ZYXMs<@0 :^}S*k;T}1&kf<IcE {e_'iٝkmH"l3@,Ԋ5}CI[%rjjy,euUbA*!6Kq{z ={AVTWZ6 3r+^iVZYl\Dj)k\AOjK NJ 973E-C~O^+m^$g7?J϶vkx* `"B8K°(HY؃0x]q$b6gh9<~:R(`X6T.@V9eicE5  \KARc[6}4de,Hzꪆ54Wٸ(b{x yQŨKo1Z;C@#ґ|O,QnD媰bCdW𮔖, zZ[[,Ky!'S]IxkhC w>y88 GlEag Ovr GEAP0⠴>YJnLtпQ\1KiYNBA*AF@T0jXcW.4U$.HUB9^[?8xYԵ4ϳ*V 6&DĘH鞵"R- ^tt'ir 6"`6p}ƍMJ3A; !e8ʓ _`K{hRcXpqHRPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@ E.(%RPQK1@5EfѢ"JI.nh?o%kOfcSlciY#NVt_ 6Zհ'2\wcHMQs`S?dX# .Wi,H#?ii[Eu)urrI'8?@qSb>;t}c>VCRV[tSs0x\[{3s 1v%utyEy?m]IJ 8,ypHo⛸ 8`]IrL59D&L8(8ty 땇Ɨ(PT6smckugŚoa}t59ʭm?7.9}:>?s*eN!q;N=ŗqKو}B9v]vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ"?>vѶ3pny?tw'}MdzĢUDL=N/X}]olͽsq cPYv̋A7F\ŵ ,&Bk7R"HgӐ:Ѭ8ZȞO񯙶/GFK>QЮ/٣$O Lk֖u )2|s͛bt~TſeQZyZpF8Rxd{;bu*5Sh"׌S3H؁&= 5 ]Bsڬ{G<#a+ 8{]v8.o& 83q I!†̱~yڼ葢'g) 7B:m99V͘ʯxPx=%vD@ןU|6']/`!B##qLY[b?IVSk5,086MH!#1ݤ xP9Q TC_IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋Q?*__IVSk捋T6?D#FA[ O_II3\-u7g1-mR;.cg1H x=G_A[ O_I4$$*"u^ԶID]x} JOl%?ƾ|RBL6$ߥTү,UMݛ ɠ JOl%?ƾ|M;HHoܼp69%4GcUU(Is_}'?GA[ OV-U%EӼ:5K_.b\gk?? Jx2r/NnN-t#d{A[ O_Iׄ`hEGc1_.s݋VSh+c)5zC BSzctd7I${A[ O_I׊l[S'aPxuh=_IVSkǛJ2n?]DOys~glTo}'?GA[ Oo'޾d֓.?6 -?}'?GA[ O5&=.%_:)F̛[i$`yʟҡt]hPi ([FO '֧3N.7_IVSkXK,;LN$|v3LE֟5LEǒI?P#}'?GA[ O4"}Vaw(wP0gu{(@:-)l>Ѣ&JfoT?h?o%kOfcS/[-s?J?kAF\ůEl(եeqzv =z͠r{V uYX8IP!_-=A]RBP܈؎(m3\`کq+LVsAiI$[u*L7n;cfGOOx^??&/=yDL3nߘgK=lY"ֆRa>Yulnn46{ hOM_6,RI& Bv<Kn'[YUS(0̪ʀx+ӊ[SI~#iYznMf4{Oݱlyo7{HZ흝V©0=j%?M!^L?^EFI]M}- L|Y n|U5}M5MJK`BA*ߤhT~ld'+w/F׵qgM:?3?&ؾΊrx~u8.CëB~$'>mѹ?:dn_΍ֱ6?دBRMʧD'Y-?:7/[Qe+߰wK_rx~tn_κg/G??&˭ާ?5~ɕ \$a_δ,KymĬ:ssP4Iu57O&e#N=-6ayR]jURu$*52:.sNzjl#?-Zt024{%ԳuƟ 2⭯Wlii?ݶO&kyTd/hHfI#;t4~V$|\~ƻ\#i =zcEѭluKvFFdXc ][#׵MŸMz5J5")8Kum&5MS#dUzjZUzʖZp.vMDKwu)#_O9Y^ޱ׺xT#U¿MKٓCM/ ? ?(<4?P4㕚|E}!??Aq?ɲdž__"ʝ|E{|~+msGj/qn5(Kt'f.S >_?p?}?z_U?XWQ([Ùʯ't9:ݏs_9\g$zBdi-kzmxQ0ȍc Ox~AY>Z']IyY??&YeuC3G5+]si=a9Qx4ѣ ;| y3b_QgԚo:D71R}4!͍0_UƔNf?T57„䛤8&SEO691?H]h^&R[ 1>.eFCG/ei(5C(yoEk=n&?=$f?H'?Ѩ =,,noǚ[v~OSVH运,|?*"銖]H&^L #LV#6%̲p>jiQژ~'#2nGY+$B'O~h,PIEGrI- %̨~K*vsILB0 GNZu= [~ g_ U]lywu暷5O99ǔϡ$=J,RA̟py?T S,>T)$_h72z|A[5 #O)8ߨF_dqSDS'?RSQeܫI 7WF۹)OGO?΍}GjWb.[Lfro6<*M6;"y 4I=YIg9?7˓o|ERG72GtTޠh'uʢ]VșϾHSz}QnԻ?ح,MɅAcRȽs֪q4ܸ_ʥR]?9O7O KK<ҵ./j'+=Zt*> }/W "{ET|+]}_C?DINEkt4h7_롌^[-rI?k@F\ůtE͚L+u\@)G Ҙ@\}+dZ]?-*?TcTȩ,ƥ$mIu")b`^cQ-a`Rf΅HjQ@_Qoӂk%[f'#?V#?UD0Azo ~7.9ͪ&}BF $˶Jɟ+lJ[ QSiف~AQ.&v!6 -?)[mZMMonLx>Gk-Ty| UXu'4Ǖ &d-  OK'*SǍ@[X\hú,{Tm<^n9֖HHɞ. 'Qn H= ja r YJQ!'w#NP/Xn?揄>,jR'>HGz~Iָ~\Uݿ i˱VȥMv'T~ =//? ҩy9FV#C= b*Qj >mTVo'4)TP-tv4[ԈuvTM9d>J/ѹ]߁E61fT߫~a-PɩNIA &L >aқm:`<xȣH?d2OzO|媯j47_/4Xش~LiLO7SٳZ:Q2\ƚ3kI[}I ˊUn]IUcSBJPc*?Er)J̪*5oſ“?x#so)_#Sv~5tv}C}Xm$g֭H0*&!OS]eo_΢hsZ@jR¥KflT?ԋ ?S$km'V`~\*/m߁k[k;5!_-s<y)>&M,wAs_Q7M:O>_;a}ӕX_ѪM$c +Sw?p>HI~V'c>R- s/"x߹ڞْJHSY-(P*y Y))rZh'E?' @6/P 5"yd~&*QIor]?џSKO )'y,fo QeEr'jnîMep>«sE'?6$n?k@9Gil:8ǯ?I^NG[|o|һ ^T7/|)lciSd| ʼn?Gµ7 v.UIp?j2xkO,d)n-|A1_A_G- ~?yd-QRP?VE}M$O3h_7[롄^$wk"N_]mu}dK:_|GC5G?1s繮k[HO%}1>l7qdW-[> T'o^>{1u%ymr#M\lAf}7޷t]VhHe(oJFЁA4H,2F :{g\1K6*"o2e4VɉDj' U|:/ SO'#APZqhYL!GFyZH&?G?Y[=#oR,zoVn-2.o61?5 c梊h~,OۧOTmsGmJ>zSMd䧡Wo?ŗ<>ڮ6}UKSV-F}E~1?L1'$9ϭSHv,,cNQ/UV{dV8ҳq}_dy{'Gݹ~R@jP?fQsǰݳM@ZpsS jwhz hn?/& ^ϟjQspG$g??MDY*UC?H{#@R6=T=ҧO A'>j+8 Gձi hsV #?Z_) x}Px´DVFTXPqғo+2leR,goS\dJš0NdT>a40Od#}zef?;+Vcre>JY Ki[(U~Di;Dƛq9 Q X̚lߋ43]Q\t_Jt? Ifcio2a%f16EUX&Bqmҁ튏Vj9.Ջ]F;IGu~͎-$ԟTv[>?Ҧ5n3 ^b'暰)<¿Rj]A9?YZ 'K[m??R۵}VcD܏Я ѿՓ/qObۀ>]F! Uwn%O^;4wdZI^7V"ҎkRy??Q4~7Z)oBYOSDNw4}q֦<~U{7c@ Ҹ=JW{j=֬NOSN83{ܴ7@UR 1Y? ZSjO?Lm?C֩PQ$v5ɪ6O.[W yi)OSJlXb*KdRvܦ 1S§!_b?4}<DH?WSkaOY}C% $?rm ;ΜtqmZc?vT$y/ZycL-OO3t`?QƋ s4 Sjps~?j1m֪ 34ɞOXԛb'Uo6jĖZTT[bŸ0\{T;пd?_թkddI$A v֭O * z"qK'yDྣ- ~?|iWk((|+]_C#&пo%2OԚ}M$V{/U5}dK:_|GtK4^2mewZ_|GK[E+: /n-KOWf{q\ =~{66[d.3Tt+@->dKGqh@P'r覧jOmQp%!J1PgXUDh!85$E6Or]O'֨0;ʔ!rİ#ԣOTL!8[VqI{~Ub y`#Y[ZQ쇛Io?J CSK0:OO267Ԛߙ_GrnDSZ3_ף3b}]Ұp𨤋ɨ'?@ir6T~ OnX?52\V$I#䕿Tc7iL֣mԯƒ|S»g~j,d28*ĚcK)} cѠړnP@~c}[4Vk t:HݧQjn>HOaGFCxG#:?k4û>]Q+v'r;tѹ\ϩɈ\Ò,pI(E/A?i'v a;bjIf1Gȧ$RBntN?*jdt]C 3hBi#kc.ժP9hF>Ʃ\M.٘i;[ f\5m$K )T?̹&3i=?1ŦӘxnӟ*i@[nc]Tʞ*ĸoFz]@~˜cF?"{#~u6}ƚ5o;欨i"=,f.gw]ʀ(ߕH%eߝJՉW {LãjIgܣ#^"(2EF'~ޓ%Mb'}F @I~E$W8g_ ~{64ƒib__>Z1_A_G/[Z(ȭue?o%E/W꼳7tP흷ScI[%MW3\~-ȕ,^[-a|Z+KYǨ̰>mKd;S&(N:1q޳ CWktnJhPqہҟۋ5t'-#b3q˫'r覦2P~9KiUK(z*62ztSWG_RFN? v`Isr?Z3G53 V+6-Ibo42܋}amn>~C6xb)yQ4$B*u_֭9[2Z58nY >F&CT?Wolm2QsE8Ji [B]I (oƛ͔D~ZL'K{[2_j]\JQy"aDDI֬)>Kqvz15&?iD~ +(A45y_('[9f?E3Γi&>٤2d[إiy?҇~s4ُ?hJ u\Ɏþ{t4|ʳ/ !Bp$JSHC:CNEHov-"Ut'!qF};ơy} ă \lc, PQ'VOķQpJcQ_zU!C~U45e?q{})(wCt-&5,c<ڳHT'kWó@uCly?ͩɾV%'}m ~?|kWk욽Ţ*J/W:?}Mdȫwӣ&JsT>{]olkD/#fk Z_|Gg-7gQFGaEdzWtyqug p9ER#֋ Fj?sbƻg~*,Z2=kom;ʋJ5o"ҡ=u7U=hH\$:u/)N]O{X?E:"ZNVEtqX7ԃFMU?/i<'^>CKs(=ZQd(r~_05enL9\|]uaLJ[V?TFzr(i PHtKA[?o&M.:g p?4-?Ÿ8'hYY/MZ:]GʔsT+C6cI=sSdGY͟m{kv_o"Z _>vOV-Aƍj?3`El:kVgE4@7d>MS YQ&E+-/i Td7׭eh]zji:J{i"':]Rb~m~%T$gfȋV ?DqlIW+шE'wRJ/rٴnd?MWIcVCS Б u ѶϨTkaƔ#ѬG0*ai8R<7U eJ8F{$RȱA+ UCU{ I>8Km*URK:4Z|r# GܗʥHSw.Wog)cWgUFlm'둏/i"]4/ q~*7-o/U$9+Sr8sMTXȴs*vjU,Z2=jŚia o/m)#֗A6i_=45 #֧DN%}j_"ߙFGR$k0ůcs}8l*Gq,bieE7Kfw_o"zёG-f[ڟg7KiX?X*GKGJi YS_#֌Zjѡh|:I[IR@!0j4`_"dz2=i:aʋc1*Z}b9?#֗gkMJkqM1HRfrK qߥLKe)[/=Wë́>^yv?N)<Zt0+~I}q@O,ŌuvkkSk !_!U00o^&4\Lh?0.FA}R}:aL#9c y ryݟ5V%8t$v ymP}7=8R'm\ ]\\929loΞW찞!hvF^c(؁1T!_sP_`_>ѪCvhZt`_}jO kODl='SG((пhK1N FS`%R-OjjP Yz?*wءkx@GHrS"Y[z?ԇOnz@} E"e kvRK9$ւ̍\~u'Ao,$l-ʅ_Oc1=Snu4@{ncۺsuF$2GGaR<jd*_|+IoJ^@ =EB|,4H䖑1$J0ʮAa8ڤY]O jO0[y=:CJkZHa@΍ ShFӨN{tl:o F֖g#0m˜]'Ο$k$te)N 1t06zk=K>J4{~ޢPSk3տ}`j w FϞ~)YK\ӨПK}տ}`j ץKW#~¹eq /UUUUH㴸aۨ?=,ɯvΨMˡ?::z@GjNkS~?T4R;G` w ?5o_;zwD|_/qci}F]9?WV(浒fhEPiu9Vtt HsU|?ҵqk"A G>'usȔyd=:<]'>ǧ_[{ rFQ'oVtF h`(%w.r'g9-`fۤP$7FHldgƩv΍R~_Wk?|mPEb_UI{ET>_n?tDW%VSGL t9}_ԉ^[-cZ+KYSw]o?lkD/#f;Ǩ [)P}+3A~>֦M>kooy~^>QԖ?6C ̋ce[h0R1z_ 3Km@?k?QX wrn5?9\F(]KiZ>mWQ{G-1@O=inubPQ? Kzџ|Q??s^tkQ2K-WB=./gb:C_u/S zjGSW=LPC~Q~O9\)1@?*h.E֡W=(hszj? rh* LPA~O9G4?shh4?l?QTt?l?QT}@GcbPF5 tԇSErR:XP?KTkQhF(羣tkQhqK[QuPKd ˽M39h)um }A?9N?羣+?RmYզn5IFO.h=]AuC91Q;֐3>~&@Z??9\)1@4?*hKo5!n+F(Ѯuk_qD}-.(f?Zj? rb:h*>٠֣+j? rh*K7z@mGڼ?P? Q^?Z] PeO9XE!uh.\q%?gM~cӾ#:Llֿd뚏XgL~gM~b鿶4 __3vhcL~gL~gCt:o?Zo?smiֿmiֿbPO_Zc_YcW1F(DI}Hq1d:G+Rb:|)~נucb p.n)s!j?sT\qn}@GSU%+2_2)l9_A趠 70hWKOb_UI{ET>_n1#N_S*+]_CcF2WD6}R&Sw]o?ld3+">?홭vQy]o?lJ4`~6*KR\n$ˤQ @I8ؚ翜YQUPyRs$iajB!2 p[ߥQ v󦘋wʱ̓Ieޙ; 뎵&$)~Lyʗ+ݶzuڳZhӫ}\L|ȿsgi>_CJb$"=i<4ϗR<ȿ }?/Wϖ}qʏKZ(ȭwtDW%ZS47!5O7ye'?kE^[-eTE5g3Ydm 堕ee8e jZi,%.29 a zzXq#/8dh,$;qo+yqJI,zص̭8#~id}?i h$ѐ$䗖#`$ N0qk@ GS}qB]Qcl%M̢|=R̹X1ܬwf6֪<4< N5sHHQ\c>T-XH?ZeEFi/q/_CIF |GD1n5  /ӨW.V7[I'_y_CCT}_0OAF֥ayQuOŜy| )9\ E=W4Dz9b؏A|(g/=>$ fÊ//h~5v4_LF ]S5J8_&_//JCZO ? yQ#QҏQ g[j>?h(yQ>r~F*?f7_E=jњ.\}4m_?#PvW?#tl\s0]Eǩ{N4QSMh'óLǸMC.!?GZv_ɤ(t=GP9#G#LǸp=Z9XyqrFˋ{x^;Nʋ{F?O;hQϡ %Ÿ>=j=֞KOO{}}jCl?<ο~G*?/ުI0/_#L$zP@ǜf5%&_ԓD2^{UpNjI㟐*V{/k_ȃ0(l$oX><*KڝZt*|t*dQEICVR5h7":?jo%tCi]jg#oFY?5/?~+1Oi F?6[ki^*T OŪu#h˘8ާݽs8ԷьtW{1o5qx<V} [h \!ƤU-x 8 ϩ?J\cv@>ԏ1Kq¤L9?LքqkYxOϹDoʏ"NSQ$i|Qi"_&N$M>gd} V ?=41z4LY}EFO4>ɓyG.?Qdѓ@2uȓMTY>}M;'/O)4c߭J,C?眿LR~_ڙauON8&3>>y'M7y?El5pȓy7qK<4~4 >KbjA[F }N??ҏF|?&1c81ոEnvKrf'a>[J TDLXֱ/B<4TM|8)ǨyX"o#Qs@'֕Xʛ??縤o_ٰ֜˟oQ 'ϵ7i.֟+|T5OIϡ[mCo'?Ci2}M'%v&69dQd9c%$M/PѓhL <Q ҍNO<'_T~C7i h|gE!D<MLVߕ3{zѼv`?ɗyG)TxɓR'HsEy26Ϩɓy>>'֖L!?OQP(#Iyrw*dDMQHyzTa 'jIr)>>z0'jI\7WdU]cZq ^HoXdZ'+~sKړ}> }/Wϖ}qʗZ)781N:H (|*_CCF2UVTF#2D6}Qk'⫄fOGk7{k-c|Z+KY5QrUՕW* A]-:@d 7̤tm5~nAg/K3C21 16t:->S;hnpL4#^XD>lC~#׎=$(cPRdScssK`{W6w6Nu̻az՝B\oO緐G̖R{n #jwe=Xy>bo8\968*h}5|W+ъ@_nxM.Vx.?:rϿ)>Qar,ѸwZi7/P#$Ǝ=*M:?3I'd 7ATП+}7'_RTېRg?gf2 9?3G?gb -&C?(?f 't=ϡV<ѽ?P>6>V"ڗpsi}7G%;HDy_wŞa]Uk1hޕ>{GjTn+oJ0}*!?5^1Zj;Ŀ! yC2Yh4;[\bx~tGj_y'r{?qF L'1Z)SO}j6<]?t?M(ɩ|O??]gI@W*})0} Xހq?mChoaY͹]y z֋!X뜿)ο#eX%*Xf0C׎?G <"-m09g$NG~t\]i|&RB,Z"op? s(>vx?ކU<MnȑG>H=ƪKEm2( G&11VR{ DƷ]MZO9 }j7hs#uW* ȯd}?>ΤImT֗`XXg'?{f~E?sjVAlRZk'#jj狖PG?rӟRS"VEn:pL Gǩ\L0ꔞI?WŽ2 H $X 379}+Sɲ)H1{VeijC֑i |d^ jeJ= UWg?Q2ǜy?ӱjW*J913-~*ɬw><9{SQ qFɗCQPwoj"$ui( !H2ݤTAa|_<> M=JU㙿 zrǣ H*@K/O.?/`jx2 '㦏.?~VT=M8GT#=7~T£qc:i\#[㦝{a}JPC#oo\r=p7/#c Be)k (ֿH۷/?ͫ+Ohy54vz%sZ('l[>V5{S?u}Tsrc~h<5" 2bTzgTlӏ?RqeB0U1A}i)O>[TJcEp}3Scu\[ͻA>ju+5RL%lJ-#&) S@fY˯Cqjwn{ ã7W]KuKgϡSh%}TV|Či~'kGbx=OOYHK}4Npq?tU)O,ݦo?ƧXqg.6\+ةPO֓7tzEtR`z~F kqJ U#FyTwO@ٚzi[Y9"%ny q訚YO]ߎ*3 5YGߝ SZ Ui˅fc+^8#5'f=ca4d?&"z"CipV?m$M{K9Q)GM_%Sp5|?6s?f ß-f #2 o<Ez;^\p?U-l_OX~6 {z)3pS,9ۤ  Fgd )VMw6W ,X{ҷa Ib{ʧY#T?d81Qc9?Fԕ'Bپu˦y#R*QRiu&]Js 퐁~[+vY_y紂:VZ{I?* # ^?7{? _ \ef?E;1TrE.vRh@*:gHGZiYʊRvSSH lq~s?UsܯI?҃V>?M=1mx?:RnJ`~߳u+ݗ/T/]KKfm^\Y i䓞1RWiyO͎1w,I"K":5i/K":5i/s6Z"V_[G=o?~-ȕ,OdiQEfhj;"{5Ÿ 3{[3~cZ%UVd= ֵQQMkP=mՇIe纚aVl(qsZp7L#+5SJ??е88|ixخ'j =)^]7ֲXkr8ӄ5ן37qM? h^w)vyDs]~ OF>jxZ?4aV"Rslm1~1>«G^EpVwѝQKGj![q&q1P?1aQ^sT-A({_f<ɳk%oIf9SF2ޒGv6Sķ6paNvKǢNX_ > /fnPj?hqЩ俄!vѺXrkzX;G5N?w4'@,,Ϧqg#}>w]ZCL9k5L~*m|;ҡҏ1x?vIe9x)j=#MBclo%ə0#?0y;ħs"$M{ (ʐ{w{ L&q?d=`'YXh֚ok_^tSɪo_ia'&q?IR+e^󨌖>?VHѡRwtHX?XVă%jFz@nW}3\1}Ϧe5ok"V癊yozg~Wpu&4%zXyVtFϓ,}¶࿎,nW?L[Ͷߚ)_8D_W7V&m>T'ɎcCP}}p=q&e'T1 Ocɹ kyR5.8qS?'+#Ln܏j"Y:ř<1YƔ~H\8Dj3Z7?kuP*?&G|+p>+G/D0ȼN OϽu7So TnsOY+A<ZQe#/n=d?IK'W]Jug3IOn<,m jO {ڊhPY#ߜg=?Z?yH't Z)P] AO֏z~R_H5 YyO֗+"[4G^G=?Z\CsS-sCZKO֎HmljE^?#?1{e~G${3igx kg=?ZOz~rǰ#MbcK &AՕO֓ha]zli5U?_ҏ09b NKfiog_?QG??QN~} g$ע:72pkH9.yۏRy?CK=']k]ޏo9Ak 9կcXDg1ܷPO(b^ViM'$Z}F{Mcs8l?+C[ k7Ɵ Z7M-!<4#w6VcQ7u܁]IiGJR]M?c_RG=?Z|O{X4ok?yO֋ ?c_RG=?Z,O4 ]GAKk4nޥl FHzA #a5x.5ӳƏ2Sd}٢uhpu+m 'AKk?̘?e~FG*}c_R<?1G*}Y4osM>gqG*}٥R? ]YO֗A'ݚ_.X5O֗A'?)u .z~h]O.&.3!:0Fp1Yiydio];#<ֳr/=?Z,}ɭEb__=[o\<Eb_AɓZ(ȭwHLz_j妭|Oc 1i ʴd cH=mIMFJԨ4{q>Pr0 sڭ\xf\I ci YBA9==%䶖>b0Kw|v㧵-:Ȕ3)YZ+WA$:Т.~mr.bASrr ,^KkkgEcɷvL*II\*66~^)/=:[,>O-q t4SkwG#"4դ8ʝ4[:|E QIEs:oe% V.ՙgbHV g^7 a{"/, &'?҃iV/۵U.x|9QYRܕ>]ߥd6d) ˷vNUk{$ vTqۜ}jrk1ve\%6}T u۸O*C[\}e8exb;b~xn'?_dQEICVUqh7K":':7}$<ϯFkS01D,;{eO*3?Ydi~Tg@T"g:pYsȭHy#h@- e_ 7fo [dkX8KevJ-ZWX^=Q0b:jW]iM@ڧfO=G搌Sy?Gڧf%TO}{}3yGgfI缟٣Sy?Q/ڮ?缟٣3y?QQ@/hL_TPj{}>?5(K缟٧s94`0sA?/i>?5ɤK缟٠\o/j5Fvڣ$,t|d#\{iNJDJ*E4f;ux1}/Fұ4ɭʓ{pkZjB!V3ث缟٣Sy?Qb5%TO缟٨K缟٣Sy?QQ@'hTO@fo8Ƞ >?4h|?Qm V`*W(DÄkZTV\&sPWe[F)e<7T~p弿ٮfuw}sYrn;_ub0RFTP5\j3s>O$-)rIWO=j{}Sy?Gڧf%TO'j0+ZA3Y,^EjrʬK/FPI]ifO=^ڔH,+: UM6GTK91Y'f4?4}'jWDgm:p2NΕUPPR]q>?4}'j='hTOTf$TO缟٨/ڧf\`_mesx-V'EjAg5kHRݢٝ4͉xF.. OFL31Kɸqj 淆8nb]8Up`}9 cњ+# 7O缟٨i1\fĿj{}>?5( ~?4}{} 7f X$q=!Oݦoffb?%B~>ao[Rxwt51Rh8dULO缟٨di{}>?5/n?缟٣Sy?QQ@'hTOTP'jIg/}*֌ZMޠt"0wI"c'ӧn/\y[X6Sc:(j߅Fu}_A_>Zt*dQEICZVFUVUFDz]y_ԌǝuѲ'Ŗ+0YwFX_J?j'4!<6<`󠉑[d[x<+\lݰ[n3l\^[|ei]; pN?Qnr=̉do &*3hvyKfYOyfr=Jx̢00@oΪ[qP}23Ilr֧ї3IjM.o5=&ؤݱIۘ OB[V".Nؗh$>tO \OB i,G:`5cOg< wF[5 EۅhOo'G7^ao|dq]UDf︙_gyGmS Ѹ9<>o)mS73@csq:,?9}_uģX~P} cΓJipe0y?8z<g9u븾X-Ɩh Ę0#^>/nyWQjpdv]Fc<\!5͍fkBnq>7O-*>)>޽_O"hWXɊ( @21NU%m)(yy!I ƴue8e*AFbAȎ1RzW-?mđ9}TWm\ O8|>bL3GSUuVvPc$G 0ekpq}y?JuҤ#qCӣ彸!59OD%ɚRqhQf/ϡm`hM?>çѓU:?Oܞ8Oglq/T{gf%99?&ХjV"Srw!mTgȸ_.Lo FyTচb]чu]Z]o4L$Fx8>?֡%Ԥץ.G9-\EW~TXҭQ BAVzLYؓO94ѓ^) I<JtbhFޣɹ}/*Xv\5%h"ݸHe=ߚ>e\xs[XNi(ƽҮf"oe$Lq?#U7oʺU ݎZ6`S=)eѿ/&}E/sTvG9ϳ<[~Uе . ߎ} 6N:焭 ѬkB[2xA`S'kKYî ?JFA?.gzؑh:,rrTqH{V*dbffg*g=ǬR#Tee9 ըɸ8?#&}5=jŃ 3O<>A(CwFउ=G^;cuNCުzgt>c|ٞ JD~U,W3JES&EAyN5@m`xa?ΰYY- UAm56[yK9Lur8MOoU3FM{ӄyRĊ3^tJnWX(V;vhXbɴnYfy],-Z6G\Wo<00םi:h^d" xmWIiɥDQ#{t: G:*ērI'&0~oIhgou'1'ڞ 2C){zPׯ:jqf;Y$C1뚈[LیD#Jd %fo qnA5jxٳCQrcyK+5hoJ?s[j%sQײȱi;*,}3k8$pF:[Ru$V!oV?0q7oB=k{Ҭ;gyG/oʙ qEiq$DŜI8u7V%-a7~v?ey)6SpG'v^ QXem43ߜv0删dy?jN9qݪ(1~b½YB> }?/Wϖ}qʼv=Ţ*J/W괟4h7":'7}$m/??y]olkD/#fOy[-a|Z+KY4(bWJfpOƯy+_EHK)>W=L<*MN] cVQI$ORNI2:m6-Z;.@K^7M?ARGCXW呥:|]:(QV[Š( (_4E?֐ ESrh(((e9m#\c:PS8FjEFN.iK!r{A)SI-m)){J^Ɔ\Z7((E-͑mV$ڡ#k1b O61 }EcZjF8;ILHo>}EKJPHK݅QTHQEQEST3$GϋQϹP)$5̙lYVSqf$czKRc2H 5wW6¥!:t~iڍ2pnVk_9JOQB<Ҥp$Vpxnv dWҝ/Up*HAB*+JNNe[QuJW{G}߲\!\9~gN2 ~?|iWk'wQh":'7}$2ȭwI#F_s+Ksy[-a|Z+KYwFX_J?k9!<~2Dх ZrnH8ݨ <աy'OJe'4y'Q@y'GLj:(O3?O棢$?O3:(O3qg53=)|#:^ƓC&O?_g~TM$?4y'Lti|tPg Qs>ݨ <8ҙEIg |tPg Q4j:(O3g |tPy٣~ enʄ?3:*#U)ɽ<iI|pD)^puU<NVp>CY,atOBQ\9:05|A1_A_G- ~?xdE%EkuZO4oDIVeZVFWD6F6Z"V_[G饢ԆGEI?֣t_oLDtT_j7E7Z4Qe[tq>cV:1싌2(O"a,Q띳Mƒ*\}wAQW%FeNZb__;OI-QRPVUFDf_i?iѿo%tGgt9}R3wFXJ?kpǥuѲůE{#HIk=>P~>^N2k;QEVϬ KYG1W]AtfiV,QN kpc #wFK WZ0GiK+FNs` <2ē$N5,ەmUgɻq]`^Ba/ п'[,?xY-,R'zG<,ܛ UpxI HN}㈁+9f7h}YSp;5xexqw''5b?ip-˛p^= '5Lާ/Iͫ_sE-a#,c?/89k8Y mcyɓ -: JzjA$Ifrؤ п'?Ɲoo ;G+ 3 #jxDVҸ1vrͭ6karr2<)g3dhR<*^0cq[W堰, M{j?q3[:nl|mq%46 DgHJk[?[hǿ_}pob3G6j/g)05 nH24+/!}_0&`Ka"`P]d:RYBrDm}N6O_H"cfӷ彤HՉ~Q~SS >X#̟·d,Q&pB)Xp돗UJ16$a׀(Ҝk5c[#'Zt,sDކv1RmeDRF֟$>hCiAgc/~=Ndǵ͵`" OVRXe&e8!5]&_&o4+X4Ico(Tڴ_m '?:=q]SxG XH7?¸q=T*OQզ1(`O/K_?g)~%߃ᚱ 'Tv}G636CI%ܿ`$8ϙ-*7v{Yb2!y`x}>AFH>#\&&y;.1^3b诔;ꦥ䰆},qԞ޺Xvm/dNEjKڍw[s z|*?LOMh2 yr3[!&_!-:^ >&#Cҟu/~=? 9\Qӕ*GmED,{v<@7\"/y[B}NRh߯MXaij$"n3x #SundXof@% :{UIoF**Q,֬,4QK (Ɍv3?I|7GXF[vܯ_ZC ěY6W/s)O _xYPP1UKQEQEQER %QEQEQEQEw-:/3ߗ5y+e2;Ȓۆp0Xdd@|Uw1m0=M(((J((((go̹E^ cKJ?Lii@EEz)/w(1ny4 ߴƗATW˜7{~ҏS_PQ^ cKJ?Lii@EEz)/w(1ny4 ߴƗATW˜7{~ҏS_PQ^ cKJ?Lii@F+aЃ?{O.|}w9gƗA˜7{~ҀD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGCAD?GOW= U _uG:VGC\/* lVwL?Q-f0x4r 1"&*gqxۆ[Z¤jG.))+L?QI\08ϡGQXZ$u2J&GPڛXmXDf y'Auֹկ4 ,Jd kRqGQއk/Rϋ)q9*inuszR$R#ܛ\(`sqZtl$&DiuیcJ`oud^H!ؼ>L?Q"d`9E峌{r}+OWlVRo̓=ki آʅVYW?^ԀsIXɾy@v~|&7T{H 7w9GsAn8Mr˱ὺbϒ35x[0ؘr,%qڵ+vÇ\sYJ2} dژ uڈJ wTFf "['-})n'1T9SwQnuG&7T{@nEnV73,FU23lnr{&4ЦMʙa)q'΁ VR m>u,Z,$ɫ[MnQ$KQnVK_N#lf@I{~4 5:(۔Xw hc&S?Z-%f#}a*\Um~Ѹ6q^s,#*(<"H|Nޠ`[i"@w\yɥӭvc뻫;W7~suGu=n 7RQ#9ѿ*ʏF#2֥>7Yqդ&Z֟j_SF[SYY}@eH.0YQs49آ( (vEv.7R}O}>ߧ>Mg˸7R}O}_SG+ 8⌌tG)>a@4}_ haqwQSG۬?uVu>a@4}_ haqwQ?_ haqwQ?_ haqwQ?? haqwQ?? hsVn|-]q/Jۛ`d?4)CN}var (4E$o9M.w4}_ hv@4Y#s׊>a@4}_ iمu.OX:Mnu,u'۬?uX:M+0#֩56ڮ_ huӳ $zլG۬?uX:M+0 cQ])SE\7Ru])..7R}_ hufu>ݧ:Mnu9X\]ԛu?_ hap 2;(~@4}O}9X\7R~@4}O}9X\]n~@4}O}9X\7Q{OSG)z3sSOnu7CN 4his+ Fh4OSK])..7R}_ hufu>a@4}_ h ԟmu_:MapFOX:Mnu,u'۴])ouSG+]ԟnuSN4u>ݧ:Mnu\..M}OuOSG+ Fo)CO}9X\v7S4)CN}9X\v7S4)CN 4r V\5i7_qMimkt"AsɪH#nZV1}R_ xSԚ94no&$Exùl!GI?S)D%m+t%m+tQZs2,$m+Tc} QE,%m+TH(m'tQG3 o.O7GWI?Qo.O7GWI?Qo.O7GWI?Qd} _.O7Es0#ħ] dx} E,%m+tc} QE,$}+Tcx} QE,$}+Tؾ$}+TQG3 '_'ğ\j(adؾ$}+T؞#}/TQEXQtҿ.O5OOGi_'9X?M>O7i?'.e} o.O7Es0e} o.O7Es0e} o.O7E]/\n϶r(v϶r?O袋fx} o.O7E]3\n϶r(,~&m'te} E;~&m'tex} Ea`/i?''Ŀ\n(aa?|K>O/i?'.dx} dx} QE,'?J?%m+TQG3 /_'ğ\j(ad$}+T$}+TQG3 '?J?!FK?Qvt_)ȷ.O5Rfx} QE+fx} f} Ea`?i?/7\n( oIپ&]'tQEXc.OJ1m'tQEXO϶r?|K>O袟3 OI?>%m'tQG3 OI?>%m'tQG3 OI?/WI?Q_.O7M/i_'9XC.Wƨ'_'9Y Oҿ.O5G/?J?Q?WƩ?_ƨX?WƩgOf ߶唌TdE8YDdL  C (AFigure8Rf+gT$F͞9ɝFf{Ff+gT$F͞9ɝJFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;K" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?N-RQfp%`xU s}si|IOkÔ3 cT7ҝ[PN5K'4O<=S/3_PUTri pb4ߑ?ƨsp\ppbu4VoS*c` .yw${ssi?7^09]Ö=ښmh:x#o{ԏ)s˸rGsSQt!յU>U.b9}ojj$U2)֎iwX-jj8KB?ƪF) j99cؼ?ٿƆ/KTšqu=(qrş=G?r?TG(pbꚉ'>7SQ#7qy6I<,{Fo SR<7N49cز5mDJ5M@vog8 4,{~8uoij9fN).ywH-)8jo23H8m;]տ<m[hԿ\JZ9qrDZgWP.!յ?ƪRI]Ò=Us?ƚu]G8к5U;a4sK#ػoj@d\+\Y:ÍBfpu7ɥWRpb5A}?/?Ʃ݁G;pjڎy4ں?5Ovz |Z:9к4jodqHtK]Ö=TO.)կ?Ʃvh+ޟ<,{ oi8.SRVg\Y]\JG]}Do}WR7!A4sKrDZpj.;SP7?Ʃ?Žiw,{u?!si?u1 mjGzM|]ԀJ5mG}oJp3Ghp]MjGoWQo|#4sKr.ŏ}HV.څo񪯷4j9p]!siVԿ!tQyG4*\ԏ.oԿ#uj 9\]m[S !JumL/.R-<` >Uز5}Ph]Sj|~A/\=n)յ28no= #99Wb?YiXԱ!+T=O)KrGscSosTxs>ʻX:h]i%wj78Rpk:<7ƃjo`qDZogTo%wjKMJ]ųJmꇦyjtag9cظ5SwƔk:?35@=i3U?gwh?'yjNiۉJ]gBWƑT ^xLZ|ϸrjbwƏTiRKEؾuTNmo\iKrDZtk:}RxgVBT9Uؼ5Xj^_[?8rhRqrWƽ“sIg呷݋kʈ8zN|+fںp49P$ЍT[u{яxB5XW/P;i4GzTܫ=84暥FI)M-qF)~ahk.rtSL RN2)ܞŒsJ ;R4P4/=)ڐRGN=ipsLz<4Fcޜ8nLZzL`(n 3dq@MRcҕbRéݓىfJĄhѹ+& SsAN )CJ_N*6l:Ӂ;~n\VO!$7No8@#RS|Ƙ F>J 8E#=(ViDTƀfpiOZzP!la1) Z@cRJx$rhy& ǽ8~11KF'-=猃F.w[=J3JL'i@H:@yR@îiM) ҆(mw$ϥ7 ބP 5 3Ms1Iրx>iNsX~9=)i銏=rh☉azdg(Mlm.9! H"qs@ 8>o3FM07"Ƙ͞ i^sMTL94>`p)Ŏ21L==79HNG4@i #ʆ' &#ȤݑJRg8`қȤ8',kE,M?6+nS__F5t_lWNKUwB5O9zƯyE95g|>Ӂi&N%iNAH{LB  (0L.4b p(O4Ybgi3K9@$qO'2s@'78LܪK f^N{}isR7bn)991K{KqnSH^d#U$3L?Z i8F3DAFʌӟS:54)p~m)Ҕ!zMրvwqNSNqҚ.F1M8<"<}N| @"O1LjBy}-Oi9M?+*F8SBx9Er 81sHG"$jaP!5~ NƯ.^lՅG6+^^{O'j<:?#U6+Ο(@{NґphCSS94!:uirN1֚r{1Ap?JN @`nME w2E;FisӑJ @^JJFQK$-/ċqŒ+oN뒱o*&GJg;sIs)߅ƀzcoJv(,y" ;x=^A$0~~53>FMČwIɨ^8I@q\hpq#=ph=zJG0`wZ1ڝ$qX_)4942sLg&#8H"P͇怱!)M`<'89":i@<ѿF 0-.9Qu4`(m9r98ZF`zQqMOGZcpi@@ޟǥFH@aA>ܑ(sRH)N8:g jB^|pzS34p8xdTDӁJAbLcMNy\C&G.Wisߚ]⋈Ps[ M3F@c槎 #7|Tel"V8M]=RKw)=wopjtǹ&;eIToSNҹ$&t5BO5hkܐ㨤;.H9W S74␶3HXғq`)[sWStvR\s^~һHV|ݎ\D[R7r: kvs^ZW4#5)\ƐߺQkC lcQ24-STx$}*=xc$掭])N pn9sJSa\S/3r3L:s0ܚ<ۚtx‱!c&Q 杓@X bFzP4wS_=7w~nB˴ G$ڜm JP$# 95"C#SI%%v5 'VWOq}MH]++EF4x9X[ataD joڷ']kmoqwI&yzUKCrM)XI]̒!55tK@IM'"1HB5N0N)^Ni JrsQE$s@X^)n! @3sH\zi41niQsCrx EG8< eq 6@hMrÎkCmv/L᫭̌<\i_JWVT"\Tph 0 (< xJ](=Gۚ63@ {sM)ϥKE!b Q{uU"ӷ3j`9q׬x(cV@OztS_v_Cjo| 5f|I3VuaG|IN=kΗB $90:3qjF 1IA&윚k9 E<\J2: h94gu9. 0`gF)'#hҀdipM7YW8T&+$=>wnOk˹n zTYWJQ<ϚNBp8h''$`փu@<ndR=xW)7]lC1W[I֦9x9;CJ(gh*{RMKt`8))pF 9җq@"N>y4zY23LMӁҝba#yqMl8+g[* gH+z0疦5y0CϥHH#5hF$EyNx+ۼ d8:MJ)#ӀkJ="VBJԚ4W!AP7V &[|`k`+1̀EČ_vfLζFi錅jGoEA2_N quvbiGByf:{;$kLTJzkoe?5Ï4ˬvq+@\(xgI|ۍzI-9EQy+.i>怽. W#=3K P9(NiSHc&8" F:Rq9nRGn&zJ0 }i8━P3^(;c`b90#+4g4.*3n~Rl𔙄t{έErM"0 gkM^;TfxL[ƙ٧M{Ö8t<r1xxפޢ nC±r1*K9ͽ~V5#VgdW$S-VIߚ:Ɓr٧c j@iǞ$.(v4\zҰǽ1 ۅ4zSpwdP`a$ )y搡0k<?ڼ z?Tm]X_z^Ʊzy?#TA[ruO2FgAB5% -EzAS*sLҁKpysQޜ \`u']@Vo|eCK+$$5[Ϸj +i߱^v(ޙMnx9R2H$cQw<:1*qG# #1;s;qKo5Z N!ZfI5)PHW9vN'#6? F!Q{SUsRb 1.6QNl`b)b(*N2,.A>n( =rHr*R4N A~?J%3?i-$ 4[hmܪs;`UKKvin81߉^9]6Prq[Qo0RQ^GhvӾDmyP&AIĮ#>)x9%p@>U#Q;D秈uSDS^(ԡ$y<bkɻXn^;QnXu iIDQj{}*(:ŻVR#mbȯW:C  rb2sVIjj2H8{X)&;~5:oS$cl^;/'5/ZcsU:NE]Ȧa%G[I$hz_"J^TG/H!+y x4Ix̚V@+emk,D<;AOVef4${W٤&JPMF')IyeƟ=݈gik8[y%C3SNj?B;}~3bYvrNJnrv8 uI!%FI1K]=ǎ21֗tBD;m'p"Osc<T5IД$oYjH&01œ*Tc1L9ŒRڧoNc9>p68`'a9kUcÆ~\a?,κh^}X.hMcץ8`+#A֔ֆv$ѻbBb@p1#ץ8`rh8MzwUW9^lW^zN!B5]p*ήO'j yC"nբl. ǩiqSLT:,sޯI+ n9k-- 75e[O^)hP3DG7*$g5-@A%]c/[8>S/lK0<<Gj\1.~s娰Kui )"Ƚ*ŐG[F]ȑJm.$&,*Kp`,UL3ɭ+]E$%=[k/$FeWP(RkCe, !/-$m2î*]U!7bO!QqWW8m"s=jM{ YK'm 45+-: xy5%&M쥔qWAiḭfmjͯ4.~qc´舔%~Žf7V+ҩAgPnD>*VGuVc~'}- d/dPF=rWt1(>moNS䁓oCyr|)?]dPD4PZj;KZ9[ZJ+<ȤOm4ȧ'C~l >ͪGuRk׵uM*cXO^A7{9V&̹/-cߊ'`vp9֝Ҫ.dU c.dzҝ<隮Ӝ52,H+s_R`Fp~lInmjPYS_ Ԓǧ&Rzb8]v.-qָr5]7 nǃ-sև4oތ+w:йH&G9P=:B!|4A:Rlo 9ON)`❴'GS@$i=ycJv`fSg>#Ư-+ԼDž,M?cWN~.+^f$ЍS$vzğL!SiujKG4`g0P>SLC~8g94NhrEI<ӆ1h8 sڨjןbӤ1SWO5=diCi՟$9ۆ}OFOAIS )9|tWɍ`p!#Қx,A< \'?0N* SC}1M498#V S]%c0#5.G>j'F>"㈜4Gs -ZC;u807>y|S\<)U:a6RܬkD>i$ٶizD?3XաNIjtQ9]dIsY0'|3_yi1rι%[Bylg^W;9H@ b+rrw?JH&%d3P}N=îZ =+KXu,wR(Ebu&Zix1B 88q\T.'-=ެ4?EwgkSߔֱ=.S"IVk$dlШD<7aU JU*屽ۈeaxjiȒTi$}=*YjG4IJDf`r$OMO:\,m]?lS&Fk3jm_Sմ'M>6xd-;C*4Zrѳ2CP>7SmIJq$",K(Po{ٕ%ܢGm-cnJ q9c6{bg'5H[pMtG*I++`kHe^288W{6*E5N r%R6x+9 2N8WվV[#`~i6z,{bt.hIŰX*1:kh%w#w'U1ȍCg>ZosY:!I8VȬ\n# $TtBu OgpHQXtsV(ެ/*N1\]Xܷ BL}*m3ɱ0bzUcH,^ZܮW{TdKӍnqaGS^~&luQOxۉk&WD^w^I ұ\;ڐ#n9$֊irݔ|-S!?¸ VQ}5b?Gn`W9ڂHRdҒF>yS422g*i=MJy]:YG^w xzʜWQ5V@QlP}@)`伛?t^1)|S ȕU&|mڋIĀQ jI2?ΥտŽu4w)n VrLs?e(:-P~q˫(AX)pKJsJ%x:[''#MkBXɇGT]se)HcqZ9lH/餮9cՖ$r~ޕmNeczwmE|a$A2yHeQcWo v=ōZMy883=v .VvBWɭ'&tz@ŗ:K)x"6ܾmI&RiV6PޘZJ-K- ! pSN"ݮC * g(%e@BF#ڬ6VPȷ1u@wTsE:SZrUzJG̜x5wPR5HD.XJ[kx5!]WLJ#g*RN "P9֐m-;F&į1)E}}rf}"Y[8L&&Ya@2:c\_){*8E\²ZK޲: GAh21[+/`q}$/cF.aޕ_Xot&4<.w53tC"K-O "8)bէKp rsV:+}2JKŔ@\zWXO7yB=T[7]6i5ydfNzWBڷ ~Ҫvbɽ!49n:wLIi0{u^@C$b*#?1Uթ%F|4rb3ڶ>$dc#n>5ڮ~u=6N;T9\Tݙ5ɫiRyX j9U" Ff~! DW Jw:M:ۗTlw445d¸ ۟3N[yQM>VKm|[jn7g09u5ӥFCJ;XQCbAz}E8jksU>ZHV#pjim73LNԹd^bGNy2Lp=_"1F[D7o4!v $Wd z${Җy<5g:JPi EOmo7@fdSu6yq5Oj`7"fTAc*gex+TQ`,u5>-nN1؀zֶE-U6*R멡Lxr^M݉= la[i7.?K273G弛ҩ;h}IT2+2wX_d$ Avry 0OXT|Vg*=5)a_\B,(9^汾wad;z-7L/O V{!kkNS?PH)q@icFl\yGmG`uzĎ$e8r8zVk6gsr}k M1ɦ9dXY?2V` #ڋh<㉾ eB.Id_``s;V{Rxv+5~r;Yyוk^t J#̇ @kNH' q^k n´Zch0X0P(̡y l!ZtJ g,p3)ͷ$F6 ?Zs 01fT "SL *AJUk9jrX%608\+|C#¸ܞWA2~hS\tuYIA)N+" 皏q)9`ۊ{qMU'pPp/JzUm^jWZȭg6/\WNX 7'j}9z?dЍTG^y>=H!zq8M!@''-) !G i/|P9R0,FhLm9"$vj0qɬ~%!8?qHSg/ݴI1<EX70\&_%mux |+0޽ǕXdb"8 aw 8"Wx9Ub0 vM9\''ka3S-@8?ZgCc:{ӹ F4M2'e%vkFMB$F>z1 tSuMfK1[.fwYI[cc㡬`0泄\YGBZ+F]n@$R[c_ov2\4wyÊ]N-CճO^6;cVfƵpuCy莊א)pI#Y\\G4?N~lpp*Ls,j+=i8>ĸ2΁eq,d4}b=2̯H2+QxŴ" $隩[XDW՛9NQ·:“]cd+4AbgӧUⴺVZ@ŁTV3NNi5c7wrKPb"LxYzk$dKl*3Һ-8}!.í*O Bv3Iic4f*Yvu7fKŹ*{ҳnmdp v=n[NR3 CZ|-M7svC=^H$  jP00N-VH<]evQ"3IoK㏱76j9Kb{ Y kjȹMunM"=2ⴌ{:sz?YN426mYdAJKE{st⤹ӴhsqS;˻osdX8r]״G37P;M;]O:d&3UQ8s7@ -##@Ty$7W r\y c]xaC~r}h+2hr i&"7>YHO]cli$I=Rƿ$AV2ZJj\֔1JT/S֤xcfp=sM=z=|yxsGORE9( 9*0@IbB=InA)vOLRb++L}Nc1Fkԋn]&aOқ]ȭս)G(4]-OV?yG֩j4p{k$Hq.,ed2FV;և|7eqaDܝѲCu*oW;-qVץ9fEd1ߜ ζrX0ޠ!ױB=OJRk] M&Km<*ʗi\Ҧ$nt($F}M7F{i3swwV#8?)b;WV;a8*i= ^L[#OAkV3m)qIeaqo$̱>$m?No5btI3d0 c]4ݣR8;пi.ѣ9N89+vO8-K2ܺ |FFsPbyT r@(iɼxPi3* jm2?uS)ccHn7qk6\_.qk t үT9kqiWJB28恸{iyqю84:  sQA99Lb6wzקCE{?D3^WV~.+^ ̟{Nxj'WO3s^t&zP4 @Ȥ%p>;׃@ q҂A)b6kj3e1(1v1kծҺJ¯~.%1ͳ5 *Biq^7%cJGPn݀%+@9G:Mm,ny f?iå(Hp=c;CW[`)in%ݑWL[Qg.hSi$ 9kP,i߆~=qg,'=`.gT/ga֔i @iM .vPgG5ic{T1u-ky iJg\:wڌG|-)aGNһ~dYJ{@bBMXk5uG J4֙M$_~۝J (>=ϋl"&[#R~&kYv鞵7gi/s\&ymگhקutMTJ[~+F$oj.}t̲g[p[x 4KT^4HELg0jG;{ RBΛi m/gF3],?Tr?zj4{! FGjV7Umt8I2,Vo[bFP78N:f/>dQ&`*& (ɸzKOq5dfs2R-& DwWJOo0‾yVRHo}b`ouK̽ 9@c:bkk< 2wU -/y7WJNV~ c\qN3RԲ5XHĂ +@Ҍۑ~tM" TK{:3&@hOhzT1e4Y_î&!#uK '#2j)l6x|t]]ZpcxrԤ+i ]fl8kVYNҿ6QeHsH.ŹHx+ Tv>sbY/Bf-y9u!ɕH (#KޮƱH :fyv<`*ұ&r+ }~R6 h zu;W9Q)hBiv3i@d3c!⓽YI'#(v { 5;> Tfm"#:ޣ ix@6O}ķknHSSFLrM2u3)ȫ:v~Xu5DcQc&&yi`lZ:Q㚚t0hl`K+VF1UZm.hC,pFqs=ZzV,,%ԯn lb1FƐxQl[m),.Ff9d`/&1-ܻR?i^q\&va}zzEk*-m^kh4og[&lpUurcjTYmxC̬= `x*Z•5&.snj8TG1@`gS-ԩ p þVeŒ M].$dFϠlevV7ۜ 1PsJ|G;r2GkH1&ȍN Ա$7-C,pjX~b1֛5,ݜs715!*1סcEY$Oʼt6V ޢi=Mdc*ɺ1>[˺0N" #0*APNqι+-,jߒp2EFM)>sN=JiE0zB4H 76@zڼt5^9Cj|oᵂW?'jN=;cC7?'oQϧ#yC=Oz63v3Ҥ6bh6г`uwԼg)h"T*{=!Rŷo95,\jޣ3%9s9,q&R-:^jEHq"S'z^) p'zZCAގpGLR₅QK֎TMic6qG( \]m:nwNAvF{qNZFn1l;}ͱ"OW&k;GZ蠆MlkSYʪZ#JxyKW1m|1 DطPoT֡]>kBgfOJYs-#:[ }=G`iR2-I,Ej VZ-7m. ӊ3Y㦸#3iG\ЖUl7=zSh.:(Is[ru ısScELgXT"v<ބ+"!!GPw(;"eګn XD88,m0?ٮGLw oj@khɤqy!` ,M2+-I?ZO*;2BdPxPq]$;;p{Bgv2(#s&8*CJܟKZ;Cq7g8c6qS[J(\dGqJR.9*%1HS~8ݎ3L$bu!Bi 54܂znZK-|m°TꑳyI8{5ue'C tmtչ{NTr ^\(mh"\>ǭ5fKK{D{ג‚Uw Rm\LmG\RR[% )/Z#ֲ[Z&X0;~>+OIif{t;R\GauHun*n5ɴ+m*[)wB*6f$m˰esr(֪݃_5Ɵ*mt܂ AVй$O}6zUѩ]MsPpfP|ddӴE) f ~`b4*yG[[VCϰg Q3@(qAʷUqJi6I NWQU6爫o YV)fKB[aOZbli7e8%1˩<ЂOv?*枋C9JyԛƖg#}qO&{?ZqnG9묃CY{+ˆk}ܵNt68K:YB]%Xd~u(wjTm%I J,r›rsv~tI/6t]M+.FDR؊]Ji 3zUFڥ2$*&ޘ!UFkN8Χ<֖1i汫ڔuzSzf֭ɮfzM."e#0߽I'LlH@>jORO YF+|"э]8osb~pcc?'j?l_zO 9yCD8|ZPJkg#IB9(쯽&ќڟz5?wLT}h"C;FI?ծ_6f'tKK]lEWN:nA=;\x*mFMFaݐ$yj(TpQV@1E o[ۃJH'.?vVG S6F_$\.G V5[6P?vgZ+szHfzw=@g $N$ZNXDp2|mEBiW$(`y< ޣK^Tb^8"AI<*GaknW'Sp+ئ$?t0}2n%dw`:sGG4ыiDm\ڋ$4X`Uthryb<ֻ́q> ^ r88kr" ctI ߧ6d^5Ν\k1ҹcVl$: 4*jݣeE`A8QY9eZV?:3?JN$2\ &%|ڋuo܃$ sGܢ&}*O7QrFBd{Nm7K$*߀Un~JEhI5ʛdPEp;nJ?f?@`*zq.[RMG=Bdh  %MW.!V2~Mz3EhȺIMwH9-m1N#V Iy;TOL 04j GSz\%F=_r SN4xA1I(gs,0pUcҲ "}2^Ir~Oӭs"6cUf/Qk %b`vM]ӛ4(mos+ Y n-=f #p>+kH֞odɈ6+] "P!qf}qHlud.m;ɭJ*gaBґ|1?|Tfݶ\wreFf ͚` c8ċNH8 }usI%WU*ZD|#⏖xֺp<םRSЧ5$L3J$m83Vf:2Ab1j c `~ NƯ*OW_)Oӆߡ͉k /'jcZ?#T ɯ6=(|(^9( ()8:-77\baj]cڋ73?+%e%sp+֋K-ȉȈַܸ3b9!&;k"=}*8dMZbkp%~p{WEˣç'1qknہxErsԊwBd)bdPsX0]`D9 yt춰vmmTMr 7\g4]Djev?QA;`} X L*ew8>̣:ҭ<1Εd(ttw(Z4<ӻӼi|i]Kޝ6:΁4ҝ忥'ǵ A<?ZO)L;wvJM|==bŤ,0;֟f犙hjjVVס05$f7(F85Xkr8-ϽeY]؂}*^R1+<{χs(?t?5;TbnlP9 iUo]Mm!*x 3 tkS{K*1xZmm.}:۫HJҺd5a@I'5;̸ֶHܜu+ ̈UAFssɨf<^h\dEZWI_`=$W*=;¬nr [̕"O_zl1 r͑"[Emm!{Fgm1CIc%2͘p9+_ɝq lWC(TLO}k9HQS'9^"z9ŸZڦ8cMF1ska$IZhn済@Q]sWGi]-ɎqI0 3.޳.샖?ҦkY`꧀ҝm]Ư aS{ĕ *ڋ{khhZ ?Z.#u2\7Jc7pi%.[5!}j7 c+"0GB€fizl-}7ZExA.3E}XHXX“=.gk:v\p%<*U0*Mّ(S`9ی|q/G(`B9~Mʟޤ%yAsGz9o)Ԑvpz41\rlԥ'jH5gX IupMyG@F= ' R2&sF?{Ag sV:g5KP'ns"0暹yx#g#B,rzs:Ԍ~Him&?:8Sq(iq`(>9K*,%4Q<8f+'Ì4hK=iwǭE23E份7wDedTh4X%>5rphGڋɷc3&,&n?F:ʣɷ7ަ&:(YTIº%IF&NjdQaܔ; z\MܲPdLu\=hs,~W8 iPy3JC2c?:<(Sɼ|ME@ZA*d`Xw]B<츑C SB>֓z֋q44]8f`z qK켚x ; UYJ1=Edo_ >hi C[=[11j_;dڪ iitӺHoJ scIu ZydsZzѐ{@^:F/*4H5)Tka] Oۿ=YY5ŪI⛓SN} V vPi9vOaUBnN*F'.s &H4dL%ST` QJ* A( &[qMcw}N* c#MGsRy9$ :PK =kicW ]}93' } \5a-SZh8@sJM܁Qh^'ei? xR670|ؾ>2F 'o8?#UW כ%3ыPO4:['F~1;Q`¤#玢i`A%NBp~Ux滰rhū%D/J::E~q^389M}g=x^hXۚhi0:бhG#1X0Mu9>'ڴ q\44t sd4}@3PyG3SO㯽 >s 3K9N%x[~$聞1\qڗ|:֓>vpzs\Ns֎f.SÝc4[ۚ#4zRS)P3@hSoLxlqxw>j9N[xx0}E8p=n+arp+T}Ûyp>gZU$^ùd},4E#g<4֎p7Ɨ`94xl0N~Ͱ;SSI?-ˎffߵ1y$扣<0r14#ݞ;tD~F;W7d)ѮJtь[ϧ̓zw=9K9N_h䎜uM#0a\'ڃ4tk$PqӊV֒"_ޘOBh,HΎarƒd @m-#P\W6 7u4s)頀58o 5N\烏jw>D?txBgrdvFȱ0"77Jfr>~ts)}U?m,qOOZ:7Ι+>1D8:9e@y)@AM' hz7G0YLGp[? 7fl%Ύ`5q  +q2G^n?G09g̼} >܉;GQt?ts eAeL>+4\UO\牟7_:9r,Đz֋8 U.:_Q̅fY>ٜu *2@ L?:on_̃vw𼟚-6o뚍u[._'4k,?]) 3^LޥIKhؿ$7J9r> )z/@>Kjp֯BeSDDD4FDgޮ~?n y( 2xKP<MKP̜ߌ$~8qEmH#xcQOLVFf{Ro߁{E+3#G8:|5vS!p\qEY߯XeVLo7'gA% 3P=aci8fψ;vP"U拠9,:M5П];Kss֟g9}Nz?t\dy 9ysF9i7]W$`!(oHsuYn)cҺ:үp0mp)nsOATU7PdCOؗ@30ϵ!]R5`mrhŚF$7ʗ JZH,H*95K=Gh\t5׊І[hڡS9jKm {VM;H%H4+g*8mnx {yzdN{שx;Ek?F?ZYta?ψ/Xܺ>9=ά?qzs8z -@yAdRߘ(\GXÀ\"{y?O]taݦsstWy((4\PK;4=h@(L uQȣQ@ zQ"[g5nM2 Ud24$GJ\JAƧ7Ryp;zyP> M%&:dj7cpMXN&h5&uos$BTEfC@jz:=>>koi,gq܌c &y֓ȥ'CJX(4sLC׭jPCqZCpI\g:j央,ѱFwz%o.fTU5;`u=8Xg`G@`=XVZ׷2G4nn=;]ZK4r@U*+ie߅ Novpl~52zf-}`n\V;81v=]5~"䟭9Wtn=4!x<ペ/ihpn 4WTqW4ue'Hgo}>.$XnDjȎ%95Gɲ9,OSl֤%)dp#ӚW[ہnAEv^/tw 3I FGH>ɷ?/JޟWmGag$1!D;6Z<34 zRF0h=Jޓ`Ѭ2x? WmZ]QK]X9Z`%hV[e@uGNdx<(cQGi uD`;5 6($UȹC+1 >=ܷıl'UaYɵ[mDLmWȏ'waEr+,TpiKs 4NG}8\uhhx!RR?A@ү'ӑU;[4@ۉwҪ\FUcymG > 6$G){_#o>MzYo iKTYN${]fCxfZH],*}}!dWIh0jhϰ 3٥Rض` ZXzxƂ}=jF=P@SM;rqM=)zS f \_}k[g}u&#z.2ktzƉuY^Fl]6 D$hVʚu &K9?+q+1Rx7VhAFa+>4ZR44fh|BKt:>O&C sn*jr53G"Fd|AGi5bI#B$@ d(cS):Q#D* kM.+[YR8S+.~?.05`eJ224ʞol)FLޡ⓷^qJM aA@7A^\t8'Q׮1IHO/J=:Pxf?^+uFTP!3 .0*қ"YAJF &+-۳E'ү+ڒMPMMIZY{f+k0h::܅$r@4rZ\ ZO8BB^;is32d NKiHݱ8_Ҧ<=[Gi~B~6'{8-4[7'4r!*AOZ ?_/s$ #8#dqRw@iyf+|9LVqqksgS11 jn'̶qL$=z5ƭiK~]B{hNt_o uWĐ]Kr `ZcnVR?8;5s WQ<3Ђ*Cܠ>Ǧ7ο ?ҹ[(|-=Q(J;N WN7Hڔoe3x=;#Y0Y~ kw6ZxAC+3ڲ3)7$.pP8Y}:V62u6Zsi^qҳ4h<` Je\jp{sȫgm?60 z<-g6[GIߟy#Si2qЍVvR8_;8# L? T )Myn*~QdArq)=~3%deF)jyzHO}{wILm J55ue0,XzgvZ<յ8,<^sq´I2NsSʮ՚E^1j>ܩM=Aǥ\_ƥ hW11'ʻVtrW 1 sqI]Ku!kRsr|U? k7f="6nN:{Qe.qǞӼ}AF?)ڱ4tc%Vi`s]~t º@Y/|.>^~i- 7}G4:cHtKmF)Nǵ mi].cׂ1 WUMo6VPCcywQr*2uȡYu8s].|kQ%L.?y zjrXݴvڮ˸ ǿ$n75?f>'XuvU.R1A+.93 >ۚ_nbӍۘ8Xv'޲|n Ua}Z`şE}NzTBtQHIӑp^\cn_ۨ- @ XCe1eހ,XIcjZH7c(ppFT~dxR;3[1e _lzr[jVZL66pGjOӍ$Bs=!n{jpz&sOZBf^Vݵz hbڂk{ EEsfgwa7S5`!) `9}q#GojV\mY- wFGs#MR; ^_L->e,M"=G 5"Vz:ilpTcik4wަ?&uy.tu< x+ʗ8>ٮ7ɦF?uOAJ ޣ JןsJڑS 8)I iS0VKy7ñ,[>lI)Ā@6S%2KǍ-"QMEޏLSڑK@>PdAOV!Hh ;ϸzu|=+𠕬k;#jKSYcSF=*fF> vi+# sץD@zW3(^# 67s>-y?$~cU1GZg{jA/P`ާ֜ڽ^AJJpUe2cލP5vo衿n1b{i@ᔮ~?ֹ^zh++MZ:XlOYEMh'VC[̍/:Cr>:O _82֭AׅsmRPgf]oЂ*БoVe `%Áɫ$8u57O2'H$F;؜uV4Б>a+_1<#㌴i5"I96m8?֍]awUk 𦬤 biWou Ds<{oR0FHdµ|AYX(V $z 6Rlhϻ5$.l SRF@Rڠ{}'fK5`rd#=gbГw9$nr.izW_Ñxkd .b-ǁ.-ieB_H|ǘ=(ǦkRɄ.p:|7eǬy4Ww EcQ{Q9>`bLX́3Nk#o}[l,r+>?^Mfr ׏"8ӭ s(x85rk!rnVP9I&'~ЏX$e#]ĝ<[dZN

Izr*"sM8A!==(* c8wm^[/ȫg6?9uMw`nd`gWuR?O߿?#T2y zi=9;t|8;T\J3+Af;}Vus Hd# 0 57ڎqkw 4$ ||F2z_K_y8ekz= #  a  C82 l|qf]xYޭ$Vfyw"rvw\'ֆu+iu^i^mvtb01kzRrh<Z=5bK+"e<(Ίj7*c+Sm[. Ȅtvo'j_|ӻY5Y#\ H c(:.Juߍ[IV;tکwl`zsa_xktkAj{oڥVrl#,_>Waczoͤ^i "+!NT8t\Y_Znް.v#s٤s1<~9#ծ[*U6#My1Za/sOJK֋chqHzӇ?Z@7x9&y8 b(KH,ҒH3ڀz?Jh840?^u) 34Z?POJLPxրԣӻ ތҗސf}3AZ`;Ⴣ1@8eAEs^siq'.BT";24'#Mŏ4 dFH4<9|RfҐ 84F;q@ Cҗ'@j1GJP2y4dd8BM[Hm{zU;p#>tX|ɲk=;?v2] j;hߥ >Q֥*̧ژڳ,}"CjN3^ Yt6s>rcS1gUX9ߏi^W;3? N{F k]; !3zxoҀ&X0 Ƽ'pH#޽=ϯy5+s#n'wa^-iGJN q&ցhȦ!=Gz\q֌RE Nԣ )zP1zcҔ sG (8)`F9ujQҔ R CR4gRLӁ3H !S$I3޺kirÖDK6cڹ&Jq &+I*?O-wQ (n-Ÿb>涼-qizܦ;`ћiYb왇 y8ıd 3``7eqojc 21>sN¹sG|族LQHeOibT\J]ޥBѬ[(u(>w5x7O$'SV//mLGn$Ս4 mgI!lt xY`^C4ʙo5b-Z{uc2GO¤51Ű㟺~|d>nŵXGc)==k~w03;QWCwEc]׈^S]ÒI#6Is#pynќ{Ua@) i'@R~vYy2Xj.iA=xBq&O<`f˅thvm`f=T Rj,ޞ 08l 96q4ޛHZ\ z C4<(@ǭ!9P=ҁ~pzPNiSA##ҀoN:p/GHOW@yӊRh'7'ha@/JfO;9Fh4t4is&9(;RR{0=GZ H1IޏL;ȧvs@4zRcp=h4KP 94 ;ފL:RyBAz֎MԴ` @Vۍey=%q5K2>#4Hґ#cd8edqԋnkE#9F4K09TV,'P7S|ȄަxD G)UAH*:bcl5A${G(nr8HzԖtSlwt_Y`~Y|soegro38:^j}( vwlY|GAJ&_z>io1%\󩦒4͹z7d|-~ʇ8W ɭ눁KVi K9r9jX&p2:PQ GS]OQ3<9=1Њq›Z8=0}8u!c3R(1K); =8i#<4}&9#HNj.xR@*Hnی9 ps%p1*{i9_"kdVk)>O m5ghWҔ:(<9S>+p§G1c^ yr3ý s^_-WImf¤Z`|WNg6'9-LoF]Ԕv2׿jp@>/P޿| FT=}qO=}iBݪK#UP{N)BW@1ѳ|gfݗ`NkF]%_ +KtIR<4?T-zvtmfT0rxՙ#湌%rV00Z!vy#F:H֚Jʧ#k᷹{k{dB`y*C2t ?{:zsG* O5ˈد;ȔcoktwI "qt Kg;MhwٞYeR4Vbn7nfT``A-`sҢ'z8ifYTۃ#ytLP|8Ri-P\y8ހN'/zwzQ 8~T(3v qzv(0HAۊx SIcNsNh{Qڐ9(4=&M^sv(v=( :ZStRQߥPf׊(9KMzP!x-7"POkiq}:k+tD&]wOcݢ_Y^YiP=ƚsdur0WjtK}mb>J,fIeR;{^ǡJ"U3ƳE{ic a?{lO(}K~ek7o4&)BxҹBkٵb^J796,lˀqܓ^wkeI+ajnM'zRg^Py,E CnTԖk{ZEy6W?D+?W$M- VGV|d1Ōl}IdY0 c<('8]v[?`aBdk:QV~C#[p9XZ;w⏥!=&3Gmmt#Q{[L&VPA |Uk9t]e-qx _wLIc['C"S.xI857guTX7١d,JNrI;hKhZdvVZ|kk1;6 `j>.as-ͻ1^Zs|?in|ȷ)e% @)O9Km.j,trqjWO$XZB=+,kxCY7ycXؕO 墼O!*m 9ҋ1#8!ٻMuZ,E~|Dӹ[:, tIYb%^TҎVǞ[6yc?wy&4, A;NQQuK:ǥqLo**V% kហd18;Kɱ 5s3Aّ88ő曷WOx*Bkpp.289F tWt[]%*W(cw |0f+m1Isndҧlk{\*#涬~Y3]G,ByJǢsO.p20!C05ڿ-j5ypkkuY02qtq8A/ڬjYZ1!˖E= U][=φ[iʷ˒sSQl.W3&3o =fE;XHQS)b!%1ݎ+t 1$ pE_A\Oҽ-ҹ1T a[* BYޞ*z2 9 r"qS|(zP;I!~\~4;hlq^A MWrGZ >67lOrڑ穝#UvOzT%u[ fwЍV ^|&wGD3i ytqqR\dΓi'8`PW9 0_J Evr9U% dXeXaN.1I]XHoʲ@P 8 Ib!8YMEz[3PEZԇJkZ69:v#iZk)OO$Z:nx|4@ >>xGحz3VN~cp?gep?홣!4dգcx?diEk;hBqeP2GufeyMM67#o++cڃڦ4?& Q7o+"iG<͟R߶ O*L=F 9Yisҝɒ6?“cotU:;Âwzғ_QFpښ$^._΋GzBW}P]?1EXp}0)zy:w F;|'M,<ӶJ{ƕYJZy*Ɠ*GOʝQfZs` b({Tn}aPzSrqT)LqHOlʓwց 84q>fz|s`} (9lY n=ihsJb=X:jDr?J4r,ͺI5<#zF"_}j1#40$ߥ'G)=h4'|5Gz(UQ«+n湒psKSYuMf[ܴK}D;x㩪 /y5=hzqYyȣ96u|Dehܽ,!#>4Ǘ:eXRq–lo 3ލå.fGOq^ oqQb.ÕzT>KvYc)>S #[ު[3ܢ#/LU=kVO9>Z,g֎frh<抐x1Nt6[ک ˨=1X~ey J6vV IFOQHYp1{Ƞm93OU":)U4"BҽŸ-Z`cm^q+<*sSӆ͈SS jV,3ǥ^ԐkB5[aOם?P߅ _@ ކbCa8I )x֘ pޑtn),3œߝFGUsHޘ$] c'WQ~U@Yx8ɕ<1Ƞ#c#%]q1ެ\ze SJ7 d{oK/ȢOzqQHԉ+n89#JG6LiC’:yˑ'Q9$nyɣ}Ò= 4 pӐD<+܌֭,{`Ӱ2p硧%\c'akTgxZ?ozuб LLI'=${ ]=@C#)aht?º !Rc'!vd]\9=8_$2\9Ic>R?8*]T$qj' 8>i>ۻZo"p  I[i*wcO{80P;/#Zw!mo5Gnæcx:.sТоVRr0ҤI7?QGppsQ~5 x' L03Zc)zc}sCi߳?ƺU|H8AQ+>k>_i?#?ƛm>񮔲dާ &n>݃yzA!G'G&k>sl=cR # ӀzKϸH!;QqaSEHH8(2B%M0niF[㰩(gލ S>PT`Ә'o@ݧ+|(s_L7}8#vm]8o|7vp1b dS?T8+n/")_9#S[1c ,/QE.Xiwkq}xZIQO=.)`[>m_K ͸(,{]{L#|\UDZ.O4 ӃdMs}/Erǰq:a9h> H_&)R} A$OuKVO՗\rA+MsM_>_&)Q:㞹eh>?_&(`}F~), s4QG*ϸCt Ot1|5R`}oi8:sc3\MQv:Ou}xϛq}/TؓŠ(Qas> ؒOqKMo 63-|s>+b:Mq}/Mo igrQӔ`Ms}/M '͹mŠ(`}Ǐho͌skQG,{^nymƒ4\QG*.g4 mGNapV_|s><#ܟr), q(ʻ ?{K7t_&)}x3Neh> X|\{4QG*ϸBs}/KV܏pE.U9p>  sKOGEEc9qpOu޿M(~1G}˟)r}ς493]gh>[u}EWa>ⷂEp/t..i(ʻ3++Mqϻ:4`5MS]Vy_41D'Epoi-9uits]4QIEv34K#{?_&xJk(ʻ3(6:cJפ_4QG*ϸZj&Ϯi?{v~MQʻ3;7]4cϺE.Uq4rf?%iM-3kE>U|ϸX=KFy_4QG*ϸg}4C41KE+qipe?% o!zns]dMR]?Y? ?Er|ot?k ow}Er| guhϝu}/EWa>ǂt.q7}39EMQʻ3i|_&x#M]4QG*ϸVe> 9Was> T`OtΟce%8'OҒIgU}DyK _Ref2178826047Dd!L   C (A Figure9R5qr7J~VVs2{Fk5qr7J~VVJFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;~=" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?f5?kGmvꪳ>7 '\?Qux Ü^|cU)'/ˡ~U~[b]R\tn&8Hw{8ջ+x*,DwrTP4&RN5'R1)KLz2̕qqTꐵ v3?o&|瓟Zκ$ke*GF9Z>0_|#WMǘcֽJKMl+.o#n>&"`y2 GSOLkyu&wuQ 2C!qS|#(vO=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#'GQ??"?*2>O=<ϒDU|#(Tͣ_#S^"CcT'Liwḅ_#^"v,lSI?'GWQGiaGGDʠ7hoAoץQGiyeh|mQg}WEXIXBA=tWs\W1cA=•X(!Bo";䫞(OV߉YR0o {tf>2bۮxe އׅll.l-VSyhs,`'?*X #ZZ OmPa0'+4߻1]M~}Ͻ]u1|zy[&oHtVo!3"F0>TqmUq}d8v }AOEA/ >e?H >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} '}Ao? >e?G(z*Q/ _} M1 o 6U+1 o!jŧ"t}3V/tk*Wۗ|#C1B|Q_CJx_?͘xc3(;/i[4VI?|'mϡ1Ew{h¨I8U; 3:eȫ1Dȭr-CBqoqϥc-ޗ \kz8ǵ rua>=_=ZfQ,1_j!{LD |)[KmǙ{fkfwpxgTx'dۍFAC1BOoj?+jЭ;@;/iG!{LD oB-ڏ ڧC1BOoj?+jЭ;@;/iG!{LD oB-ڏ ڧC1BOoj?+jЭ;@;/iG!{LD <3Dy}U?B-; н"xc3)ڏ ڧoj?+j g'Qw?^??›Э;GB-; н"xc3)ڏ ڧoj?+j g'Qw?^??›Э;GB-; н"xc3)ڏ ڧߊl6ΨYR]q/Y;/iG!{LD oB-ڏ ڧC1BOoj?+jЭ;@;/iG!{LD oB-ڏ ڧC1BOoj?+jЭ;@;/iG!{LD oB-ڏ ڧC1BOoj?+j+3 m0ۍ$s/ ?xc3(;/iMV?{Q[Tvw?^??C1BGmS[?Oohxc3(;/iMV?{Q[Tvw?^??C1BGmS[?Oohxc3(;/iMV?{Q[Tvw?^??C1BVowoi'uEw'3*B-; н"xc3)ڏ ڧoj?+j g'Qw?^??›Э;GB-; н"xc3)ڏ ڧoj?+j g'Qw?^??›Э;GB-; н"xc3)ڏ ڧωo--E vnpd?!{LD ? g'TPxRh/2H kOV?O н"7{Q[TvGmS[w!{LD ? g'SOohV?O н"7{Q[TvGmS[w!{LD ? g'SOohV?O н"7{Q[Tv*7b<3}bo@9qw?^??C1BGmS[?Oohxc3(;/iMV?{Q[Tvw?^??C1BGmS[?Oohxc3(;/iMV?{Q[Tvw?^??C1BGmS[?Oohxc3(;/iU+}{İAEw*0Ia]q~?OCOeG~J+O(]a (:FGPEU45tkVbT-7\nyx\v:=Zt3O}]H4wn__'h*tOcF (.wjNѿPQ@Q@Q@Q@Q@v:k?iðYKO5nPEPEPEPEPX^+m7–0Vax= Z@QEQEQEQEQEeRu oQEQEQEQEQEybWoPEPEPEPEPY#gU)ZU?u_@46 [ArhW(((iͦu}olYo&RFd_%i+0 (q+vq(v((((( OȾJ#:۠((((( O .7PX]o?n ( #')+/2xBH|#i O(]q~ 9+? /aEVIc<}t8p2x5&/Y-ƓyM=9\@滺NʊQd+8$p?!@<e?B|En<3w83W|3sU Ҵ׈YCԕ0HMti=V6u"Ӭ@;qݺ ȝׄ?i1#Kf Ox_ d4}_c'(^*F?jW4knWO3GڼU@/2ۢ1>i1#Kf2ăź]/M2k]o3.0|{ZWO3Ia#^jܠ Ox_ d4}_c'(^*F?jW4knWO3GڼU@/2ۢ1>i1#Kf Ox_ d5[5izj[~һJ_{iт#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1#Kfx_ d5TjuaW8U^ ?jW4k÷>$kN6u) qڙG#<}+[DlF /5bm'{lC:~4F.NWڼU@/2>i1UԵ>[8,d4 x_ d4}_c')#KfG_`~nUy"ѓ![SȮƚl~8&@Y`2=Wn Wx_ d4_Fo-BD2h c iG:n?e\#KfռEgLΔEL$9c}asXA$\+̭'Ҷ.h.UsWO3GڼU@/2βԼ"HYSR=z`[ךY+}0ČLՔa.Y-nn5$_jW4hWO3ZMFYH\e hiIRI3 + 1kO4hWO3R-;ڕ̉l1k7×w᝭ߜ:iČwN=zWDp/ko⾶.?c'ω!.f]̷HHPr__&ymy0}mXNn xG1SmkqR[`ٌquj5u䩦[N40NSM Go*}_c'Hۣ?T+[ɼE+DS+&2i1#KfxdE@J!nXt$Q8D@Y4Y#Kfx_ d4 ]j+^0#9[U)ʜ&Гz}r yoѬ ecxTq!b$0:^*F?cxeO+~o6$(b}_c'^*F?m\jW4k;k; /M󿳢>v`ƻJGd}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@on|H!zj'ڭKc>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1+hSwQ*d{VbxSAw?҇(+G)ФҸ_ J§!jŧ?2%v'F_Ҍ?0_?ͅQ["3*)f`I' ezks"}UbP X 63ݸ9\W1J.,>[c\qH:t馞+w hP]x: ȝׄ?j?y>_"ݷgy*[IiZk,~J$yG&:+^*F?jW4hnWO3GڼU@/2ۢ>i1#Kf6Ox_ d4}_c' +^*F?jW4h,?t[Y\xV+SmkMe~à[jW4hnWO3GڼU@/2ۢ>i1#Kf6Ox_ d4}_c' +^*F?jW4hnWo-`}_c'o;KP Jخl0{QXjW4ix9#!^BB)Ԝ dy<V'ڼU@/2>i15 }#K8_5GC. 9o4[Н+8# 5j~C_nu *Zm0AOQj/s= +{o%l-#Tl-wI"&0Z+ٌ${W ^V;ȗ=t=^w}m4)4~s65ᾚ H,(""ApB8{KE}?Oo2۝3ǽ^ipEIlq]r3z=hi6׽wVD345]]xn+UG] t;Ůj ' (dBJPm-|[D!_h(Ӵ..HYD >G#ҪJnZvՈa MtxĬK4m ڷxϫ_hAw.e2*F1To|-; gx\rEri`}xYѴYjwm,9NI?͹zd^i.RٗǏ,ovF 6Hrg.=n 5a.-Cйt$ PPdZ3z$ߗMRƟ~`l%’=k>-m!%,;HvyGuD>m$pd{I4%u56(K]-t2eMFI^#K .l;ۿɧ%-_ ]5ׇl}_Ebz<Y+=$`a8$u+>+0N 2C9<Wjt\hz ;fG߻$~nֱpQ'WM=tG슖RtOy6E")8Sfb.vG2pN@9k~i1{AXc{rλdO)fnkTIǵݗAkKwS%@͸=q@=jua6zs^ՅoZTJKDnv`c'^#KfW5'=E9ns"-eX8@C.xvKy_Yn0)II?2qcֹx^bF엮4d0v 1/R}ڽ H[iV Di5',G!j<vg/#޻ty[@ݱuBv[[ıK V4QHةӀ:Q=?Χ+v1/+pSi+ZXh?^D!DPD|V91Ds(^g;KkKO0 2qX^C,sOs yUJ).sJ +7+%^:(Q;e@͒rzp `i^+Zo #YZj,'-mdH#C6X$$ NXkiqH˱nݗms҄)[ 9W_K_mH|;Mu4KdU1%8{+%/(Ya3)W cAWO3\kîZ'HtDK ['89Ҕ*?ykfw_p8YwZiu3K J'FRLzWn,^2K?n]d|k cxo[ދw%cf(9d, hBݪ}VV66`lxDU$);}+=a}]ֺ>ڻ*y 8&K<_:b@QԜ4L&[;kyV.p_>q*v;[o Oҳto~ۮ5W#p0s،,+B5e;6hÙcң{+O Ό,HeN=0Wŷ~KXtpm+\*p<Ơο彶dZzIPaTٝarX~_{O;3X\F%@@>UOQ֡^.}.ho2%dYg=+Ujr]i J]A+7S\QJZuaG#ѲVnsO-c,s:20]/&47Έ{ >|x\)N$[4ΊWO3GڼU@/2f#Kfx_ d4Eb}_c'^*F?mXjW4hWO3@tV'ڼU@/2>i1}Du\on|H!zj'ڭKc>i1#Kfx_ d4Eb}_c'^*F?]o?n|emS:"Jo6V  | ޠ(_ J+G)Ф*?Z?<#/?rWi\_eG~J( %QE5]JV *icZyP4v<8HRǠZvaLI qh^&+ q9:.Bun;Z/o@W3cNV10G`U\F7xC ע(((((GMg-?չXv:k?i((((+ RF ݬ/ǶaK_(boK63lgqmj9hctݑ"2[>2mXW+l x?s˽;  cYd99pp'|?"Mh= +,aelN*W}v[yחj)Qڹ#5uwZF mF+D)gBb|q%DY$zb+*c'g[/b:Z;DGvcs.==O\oXJ 9#NடɴS;zju$ rI[7i)&!PQJݢbk V<c ~-G 1[ıAED\TQP`PHFF -QEVoYo֕fEW KE]z?l?UJ1~Q^ckan}BHRMaJ^{[X\[LͽdǠljʅEԴ\+((/҈n<_"_((((((Ÿ =m'?sa(z۠(_ J+G)Ф*?Z?<#/?rWi\_eG~J( %QEEs<6\: H]ݺ*kеKpڼ٢ei"A.t$uDd`U9 Eym? 'T<|`@n{( Ҵ׈YCԕ0HMuS%8y+7_'h(?x_ d4}_c'(^*F?jW4knWO3GڼU@/2ۢ1>i1#Kf Ox_ d4}_c'( nWKLz ˌ+Aֶ>i1Xץ(^*F?jW4knWO3GڼU@/2ۢ1>i1#Kf듻o{@tBY7m|RGCOFUQy?jW4k>ޞdӴ$zly]'ڷu]NM 4.y/!+δ-j7HQ4/G?_.I bXԋQ"e+hҼy=T^jVZ,s > {9mr 3_j|Jan)" p4aqۯ^Nm1h+Am_Ju Zh-IkskhQrS\}Z#)I=uZ]n/k(miVn s'g<1V8JbO3%9E#>zKYRt;/ʯs^*F?jW4kn(WO3GڼU@/2ۢ1>i1#Kf Ox_ d5۟ 5'Kӛ:_8mLӞ>AJڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1jw>$>(zp}Q|73qWO3Ln[#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1#Kfk>&>ԄVIw2߹ l9 yC5VoYofuqلtžBm'PpH;yUk^*F?_ c^"P'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2o5O_k}JHO6$b{XQs`l'K∢HƑ/?ci:j5jWfݸ2 |vV8)$︬3-ǧ=h\2}rv;s+xY:5л8u];9һ`ID̑XH@k@Iy3%hwn"!Hَ8S8SK_;_%wck^*F?jW4jޟ[jẄH3 hW(JF'ڼU@/2>i1 b}_c'^*F?m@on|H!zj'ڭKc>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1+hSwQ*d{VbxSAw?҇(+G)ФҸ_ J§!jŧ?2%v'F_Ҍ?0_?͜nkMw}5-㵿XL*`.IF9־5wx9EW×NONe"9cK [q$dU#}2sjxN&K{4]Ɛvd2w ntA8zfg,/$Yax[z0?\''rtCS VWIy"(bSȉw v H䱊ጧz+#*F#{RKD!s1^[O#B-eOi1#Kfx_ d4:k?i,|H<[)ަ2aux_ d4Eb}_c'^*F?mXjW4hWO3@ +қG8DH@1QY:ǂc1Ǫc7Ubprj\j vgtͺVMFGRA`tZi1ף:)B2ۻO^kWY?L uPIgn>u&mwcgk48!UF(#p?C^*F?jW4k,N6#۲VR6 RF wڼU@/2-ωO5ԭvy`g\e#Kfx_ d4Eb}_c'^*F?mXjW4hWO3@tV'ڼU@/2>i1#Kfx_ d4X>[V_)jW4k÷>$kN6u) qڙG#<}(>i1#Kf6Ox_ d4}_c' +^*F?jW4hnWO3GڼU@/2ۢ>i1#Kfyb|H|Q Gog'5#Kf6Ox_ d4}_c' +^*F?jW4hnWO3GڼU@/2ۢ>i1#Kf67,7jڼU@/2񚡯\{RZjm%~䁰  [Ar.I i1#Kf6Ox_ d4}_c' +^*F?jW4hnWO3GڼU@/2۬(~\_6JwڼU@/2ƎğK|Oݾd9$m5Vܥϟ8|VڼU@/2ۢ>i1#Kf6Ox_ d4}_c' +^*F?jW4hnWO3GڼU@/2ۢ>i1#Kf .7PX> 2)%7{ryGoPEP\_?dO}%v#FORV?sU-? 9+/?2%vaal'aq= :r pA(4֚SEE:"S³|%"v^=*y,bc)ފ&ʫԾ;F@QEQEQEQEQEaץ+GMg-?չ@Q@Q@Q@Q@ax= Z[)knEQEQEQEQEVAJެ +/EPEPEPEPEP#wEެ_F@Q@Q@Q@Q@fEW iVoYo?l?UʧE\((((q+vq(v((((( OȾJ#:۠((((( O .7PX]o?n ( #')+/2xBH|#i O(]q~ 9+? /aEVHS$u^H( Nk,"x123W3sQm$Aic=+`lQJp3VoNѿPjW4hWO3[tP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tPesAXM7>W=l}_c'YKO5nP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2-ωO5ԭvy`g]ax= Z@WO3GڼU@/2ۢ1>i1#Kf Ox_ d4}_c'(^*F?jW4knWO3GڼU@/2ۢ1>i1/n|H$[V_(jW4hWO3[tP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tPC/A-E Okk^*F?3WoP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2񚡯\{RZjm%~䁰 UY#gU)@]׉ƓfI y A#hUx_ d5G-{G@jW4hWO3[tP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@jW4k;k; /M󿳢>v`ƻJGd}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1#Kfx_ d5Eb}_c'^*F?m@on|H!zj'ڭKc>i1#Kfx_ d5Eb}_c'^*F?m@jW4hWO3[tP'ڼU@/2>i1+hSwQ*d{VbxSAw?҇(+G)ФҸ_ J§!jŧ?2%v'F_Ҍ?0_?ͅQ["jzRhO*E yڠKQ`?[͘ϵbxkUӵ O1Y_I%瘋O"%1 i.=G i.=G i.=@tV'[V_)dO4?_x i.=@tV' i.=@u?u_@5[)ƗC^0eմ֌ZKWOpHrN({G-{G\֗ksٔմ䁴wj i.=G i.=G i.=G i.=GՍj>#ե῵yEEkk$D]I n;r( Lk,"x123W3mFjjDl(`@0 FOuS%8y+7_'h(?x_ QOcKsۢ1> i.=G i.=G i.=[tP' i.=[tP' i.=[tPxxCiC- G+k)Ɨ_F@dO4?)ƗշEb}?\zx_ VOcKs> i.=[tP' i.=G i.=GmX:4k?\zȾJ#'1dO4?()Ɨ}?\z Ox_ QOcKsۢ1> i.=GV88!ZR̊N0GaU̻XZdO4? +)Ɨ}?\z6Ox_ QOcKsۢ> i.=G i.=@tV'[V_)dO4?6G4xgiRsb^ZhCNVHVz<hփP yV왼_Eb}?\zx_ POcKs> i.=@tV'ߜ9nO*]:\Dd4$]&h3*҂3'1dO4? +)Ɨ}?\z6Ox_ QOcKsۢ> i.=G i.=@tV'ΰ? TR͸Ɗg׬ ƽ%PΛ'9䓞^Zs4ĎKE~eiAsҀ:+ӵ-gUt"(bFOF'1mXdO4?)ƗEb}?\zx_ POcKs> i.=@_?ksZMNZrM9uq-}TS4wUZo'*ˤM+`7Fƀ:+_T$uf9[@Xc9\.=O5K[e7tՕYQf(zq.'#{]Eb}?\zx_ POcKs> i.=@tV'q_IieLFr!p܀5`-Q@Q@Q@fjQgvϧIYe7 %֝XK]ivnoX- %:zb#²xpkA>r]ݿһ@AFќgր(((*fvyɝ3A exYl-.JCk{Ӆ]߻?C][-4V{4XZhQ[8nݴ'Xsӌ|MįVeeA(QEQEQEQEQEpjt*8-7ͨ-¨k*_ Np: Ovjm#/0~,qӦ+ڠ>'$  o RH[OEQEQEQEV/.%5$420]Q=IB ր9[khqeise'F#>:&-3,p}>`@վgJ'Q<\'mn;WMH/@Җ ( ( ( <7鷾$㵿不c1eFuT(P lt,YZoVIٽ}'8:F״I NȀ_1wj9dA9@ Y [qRQEQEQEQEr~'tڕdUBPzsS^+{Fd8Cܮ>2єF9* C ր8 KmSf xg}q[~ap neX{V9[0@"00(kG)ФҸ_ J§!jŧ?2%v'F_Ҍ?0_?ͅQ[!EPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEP\ne4ۉ,%FE 9ayo/"8> <9h`[`g"'fp|`Vdԭ4K^,_K[G|U,{ s]Z[GjmR =F:sT|5^H$ѬfuPV!Gr: І1)vpsԞMDXQ*¨S(((((((((((((((((((((((/2xBJ#')+ ć9)eT]]A[q[CyVb X@3mW7hď! 2*Kk {y$P? XoѨ <F>oѨ <F>oѨ <F>oѨ <F>oѨ <F>oѨ <F>oѨ$(c'P/Z{=J1k40}1dCpNp#1V% 973"!=O[k,./"+52AT+][dc1dkޅ1sZ|\Iky%l^ч/|?h@0W|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tP|G7tPy'])'$ܯ?)+duosğsU-?W<9#/?7Oo 뤥C_/Š(ΐ(((r(B{%mq,p6#8$*ŝxYsqEfȐmZe{k{Xb3sMom ) H0QG'=T˺U, 36rUKOzqWvM%W?׼U-0(W},p Oj<]ȻPGh6{8$ȧm(p'G+XAbPB"GEyQ C kqTE RCVpđKmE$O@QEQEQEQEQEQEQEy֟B7ұZ~ L袊C ( k+@y#@}eMi~*cN_G«@?}eMi~*cN_G«@?}eMi~*cN_G«@?}eMR'$ O|@asy*y _.I;2TdH?QϨAl ,71jۍ $kY>vAjӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߦ EXӵ7Qk/oP;_Yvߖ EiVFF85xBG!X??)+?Z~*xsF_o]%s~ğՕu-F;;B-37X8-J0_?͛tV?Z[fo 6OntV5Ư+هkk9ͺ~4b FCg8ȯ)̗ lg`b99#n^=5 &IA ]$nUphj̻t;۩-_)o^> ҌcP{O4̛~zΝԣU|+} IjAa:sjK xCS[ShuI`-x^–O;md zz7hѿ\ W0+OC秣&==5{ |>Y^{(4x̷2J#f8>G|Ţ秣==5EkOG zz?k.מ|<-\ ==4yZ_˥72[]|̕u>zz?h\=wqs隄6l!9?;dvjZ0O5݅ݔpe-0R}ϱ拁yOG yϊ/,AcPEQ`֜:i"h.clshLHᬹ& +Vgo&DLiugs2L1YRA%_i]ѕR3REq6CYfc&2ʃ3v.a{T|nȸ<}hZ+/WUkYl{ ыHGQ@_cgzWVۑk՗,#PH85N5 x{$U5k㲞pD6Xx֠WK5hf%I9܀{4~G{2RQyMrc;Vr0{z[ =7 EVx_ =¬@/(x_4Po7 >/*[ =7 EVx_N: 2,#qX2O ]Iڥt|T5 K]Z=CN巅̥# a>^MSRӞ[{F{iU5,UGn!Ōěm$>uVLwҡgfy1xCi2:>,0l+)-w#'ZGTnKk;>b IqY 6ۃ@`o}_U}rMЮ/!5Lʧ#jiG^izfIce)؂ǃh_Q~Umu;-Y^YnoL=VVx_ =¬@/(x_4Po7 >/*[ =7 EVx_ =¬5jWE/(x__[w}]HX#9x1Zʚ`誈; ~G{f[ {xaQs;SZKt9D lPya =sc~G{Uӵ'{+KxWIb@RAڲA4:kzNDN:P{`o?n^Lt=.뛔-ʅ)/ FM]/)WbNQXiWs-bfuՄ!-ԓ` x_ =³n5H-#Z+K>bԎbK|ImfZ]A+ȑ6ulk =7 Ͷ֮W\ƶU-Pw[n>#[ԵckgH3#ڀ4/(x_4Po7 >/*[ =7 EVx_ =¬@/(x_5Xif{C%2eTwO~G{gwisBڋ]Z*ADі8Sdd׽Eis Os4)Teu8j_Q~Y^g ѐ2rgla7 d` -h7 >/*9dVnyy実a-w2L4\dd:*jxBiݥWjsi1_/;X0#=2U_sğsU-?W<9#/?7+mjZv2y8^[V_ݢ`CW֫xsF_o]%*0 |6s~{/违Uut;X6QE!Q@Q@Q@Q,e;YVK)s>z:x!eLaW?oỷCeosla[x'yP6A0z騠;魯7v~C z{N\JHЧhâܤvpOdik[>P<zjW?d[{xDPX1,HڪǢϨ,,XA,gX]Hр ~k9jDm4#8kilnU(0x%7&s /;ߦ?l{B Ɵa2Ir֯>'F+啓 NGWh *r뵐`u^=s#A gX']^iҤ-'8ZQ@Q@Q@Q@Q@Q@Q@z{o+CG<0C=*V xa% T1ݫrKom6N!kil* ^6:O%LdfBp6ޢ35.MCòme'?PP?o-%J<z:٢0OԎn#{8ӞEQEQEQEQE[Q}:GTH#1\fY=Ɲ,hHtdm$· !܏yyl,oAYo$X4 pfD` ]mtky[wS$r18<ơ. ]$ػq(gw: ,P#Z0C3[k]^Vn-,.axv>=j-Sk cr$$_4a[*奆w=(cb\: ٢|߳ u#+5eHuX/l4#n@,ZY0FbxZhz_Y>MsZ݉RB c9#Yդ֍klFK2ٓ!mW_fFhs~2yw?Usz_|Ea$Z?fmkW# )f$bcPKO˿?n5k8_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?6p}(o_3_f>_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?6p}(o_3_f>_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?6p}(o_3_f>_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?6p}(o_3_f>_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?6p}(o_3_f>_tb@X]a+?ұ~ z?n_ ?>8>`V7/Y~g_t}av3gҌJA/?~ z?n.0lQXؿ?=e7G/Y~g[͜J0}+3A/>?qWFcb@ؿ?=e7Gg}n?4z֠ t?1T~ v?n_ ?>z~z6qNcz/|K_+II_ujZIzلNr)ԍ֬,v?}DyK _Ref217839029IDdN   C *A Figure10 R1IM [~>>\6 I{FIM [~>>\6JFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?j( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( )* omaG-HKhf ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (HwTQԱW?Jc?>rڏumc\BB7 6+՜ M;y_y呝v95E]eDJcXp9frĞI5Wy:zvgO̿C]֝Zj me~tJ*{[Yh^h^7me%WX2zL((((((((((((((((((((((((((ypOPjF[=~]g4-.?,YO+5y$3\\@~!ĄǦüN\~I]S y^\Hv55t} ,z<ַ3Zh\AyVƞ""Ԧ`XkG&/}giu^`6>?c/k U A)m.:n}/7<kO]7K%q J)m5;M=?鴣w\NjIdcҬmvjQILs?y%;j}yפ>?jwI:PE.2=z2R2jz?KqUUdp[nqڦ>'7z8͠rb7T=h[:mqj y uZŠ;bOBN9'c,4zU,W1уⲦ+ǟ(8}~j4D@r8OAnLg1dƳ!7w?:Ki42KJ*28azPk'Uh -[}`Y"-O^+ ScVoa[Wn\.n4S|Fv'MJ.#LȷnL*Y[Xč<2$9!𷈦;cn>"N5HDi'%yMx$dDxS)#ޝ{bؾهT2a LY1 CVŒ3rWV[y\WYTqė\`e v'$`\_:Fx+]YP2Qz ~JLH2Q ߕbE'u^H8*x4b֓.`X!bB#kf,THm*bJZUb Ո琉hΟO ._UuGo7~dnC^+8tudmH \KIGcԜR݀S$QM:zK5CT"'N7ڭzm9JV >M] .ݣPh7G9m&K~i蹏AuwCSj]y3]JO@ܵĚ|]8 SY0[WU+E n 7G%I-_Ӏ: BYf |ڃ1) Ȕ@|"y ZK"(il.xW_')VS-^I"H9@G`t\R10;T* f.$ϥc:PE0һfbIޚzvǥOñOdStĺ q={%G?S\,% uj6jֲ] 20|ϱPr܃%ٗT)՚3GwDj#pByP8i$NIrh!(4V^D4iG~8sj:-dN]ʞlVd@%\$о=@@tK䴈F4 >lh}篛(v.p7uMXzPI$ S#GxzWCN')(AEPEPEPEPEPEPEPEWNVQkվ&]L=:%_)W1.#}]\)a am^Vsp9͚ғlv:=W-XZ{$Ս'DuvYLcJ"}Mhj^y+]kU^GRViwr%d{׋?֢u*k~#|C?3B"aY\jNRpڦkWhn|;{).>bv' sZwHKqR܌$jVɈ'!a5u{#@3I%HqL :˷]e`7ROJÒS)ҡ,XIFdFͰ .1?RjN8mڨf#Ƣ''&4u4N)LfRXda_/w&k7%,A%d8QՋk{^:١6W^ z*S'H^3[~EI}bp2|҉U?]4(M,a-3w (kyj"?.?3޸Hc~*ħ"4 SvK1IA%h2\\J@ +Q X̗ 2 nn9.&sH$c4%' # ǧDۤo(+>1"nJPnO)OfIHuf8kt];tv׳׍2d/sy%vRp+x J=\_App\eζw4zz;I>@n$${UGI]iZ|0q2Co$pV5ZdF=I˨_k=cԵ15V=)Գ厬 vҼ)kNu1zumQGlU֣vwr$FՈZ:QڠoS:YUZLp:TCv=*# 9NlM4 %-%/j()@Pbހ>tILs@2$rҪ2r8t;J#hDF.Ҏ#@@zT]ѨzG;Q~}9VO.H{" "{~-J۬>`b4-eXhLW癥\F?^L6ez?oS6raB}Xp2{ջ{)1mx"(-|SRњLsBi:}b!!q'_tp4K`OfM9OвFV &;)QGlcݫWM5"K6{&%frg/ߪcl~64ZZ/O?"* UP:0(!egKG>ºP@t KEQEQE64QVv sE,x_ =V+|ڄtUH|OwōKe| ?Z}{⮽ -ظ8N}H gyI1$94u &ii1 W/kڍa!~7.hcx˦dž===gs&JSGbUi_׼i|'t^$޸)kXSPZ)i);*p?^@h=9hjXcrz PPcbS#dy(HCruUdր*byQECINts@ (QEP-h#4v:lFsR QMp⁕&aW)cpҷi+6.,4 5[dd~ #w+xл.y []Ym6 6b/.s]n |}Ats8`z5͔k|I涙a e-6Ҏ{ ]x{fOk"" TP; ANIq{ &Y{G'ޜJU)<*"O&#,ⲭ] VV>R<.] zgjs^w;IWŎ6[H:t$F* "}&ҨCOx~Ӽ7uP[Am4F*JZ`%-PEPEPEPEPEP^E2$`渟7|+KXD4 {}sڽQ^!p!IcR4TG ?n[̀3, z~MGB$YוCtRI*ʧEKIlRm[? 7&,{W-c%k};Į}c_ٮ,8"(+IEYIx4R$̧@h5_uu+r)ihMTTlʜJr +Fy,$(9AKvN.tTI:pjPGPAl2)2 1GƉц}**)@ڴ"$Hҥ>uzjۤh.L˹t d1=ӭ'KվՋPdEY<˒>J,+&33rWwhv2CF;'lz&^I;rz7l#]шЏMXf `z>ZM!\S/ UJLrzM4ב#M8P;ɟvqJJeS);e-ryV-GU<R(4)'%PK71<}(]Bw3Rk ̯$qh3"}-p>f;c*IBdtm7Gi#IJ碨ɭ/W8P"3ϖ,º 2M˵S'j9m3ˉu)_ ꍳ2YJKA(#>⺟ZO\rk;kyᑹn}z~uirm,ZJy0nud)+gľ5md<0ñƱLBbSph+NmJ2ym_U,Vu̇AЏ€ Rf >Q@bkp܎*Z(FqQ2/OU7#&}( YY@IP@IkY4gnSNV27LOnw? <@yO_€*'']>̮?NXW's!<OӲޝVinJ?S]ƙ[f4iq:_uTB>M'Mwgl`B Q?3TRVS$UIf"5=OSM! xD^' 8 'ͥ|Tp$[ɭ2:6[tc2r0Ve[5Dµeؙ]@1ݞkt:v,o8^6= 7TN]4PAOb{}+(EHal j=n6$8W+̯1eeb ~QY4W}Io2rG<xbQ˞N.5a9f1MY{[hɎn Q[ݚGշ޵DyYqְM.ʹ\? lO,Q Fv(F T۷hW#+ _ n%auL]zvi<eX5=Ǟ# :ՊN69t–$(((((((((Jy?١B U{L̀d#jZK#6Rk=V$` sd\b0QRM޿u{X >Q 0k<%uY۔,hМ1k3-7{|o?{hjڠLu]6 gGӤ Gu Mue\~'S ]~74F%VCP]B,..ZH ,p̮> ZlYDzz|WvdaSa^;XͧKk:6*A\Zo[ u!bo>Tu#3aǐ}+!qDO4%-&h)(b3@ JTHENJt5LqKހ/Px"OM+H;Ϋ5zTSIč$Q,@ӑY8F8TA NA/k\8tpSS[jRl;w;5vvV .[(zOAIj˕ 6?j,t%0]!r.=*e[仛Tʭڿ'U(bqb'^bCqձ۽Ksiw)JHWSБj4[fǧݒ[hNw9ڣ5`ײ(ջټͽdT3O@*\Q&Uj cQ']wMurB Lv5a˫85xCMāH=뒮"tlSto iam-eaoǵmExءpm*H}ҨQyc.z VDIpi>޻RG'P~ӮTT^կGR{ t5]˞5𝞱c'<<ga4XvĂ ?G4&{5IQ)>Va\_b^ BL%5-%P!h(-%Kmm=$7ݎ5,- <¤jXºF,uY|O-ckn oP c-)tr0'3=>+ ķb1g$â5-{:4a_wH~WD}TJNJ8'5V#AP`ScMBY"V=k!KQ Z0>aj>_sX߱|d##Ed{zjZF \ >7`{L>d~zd~]:VE-s8 =8thv9$]d*Lt/`s\6o(2l( ?Pj= [ қ}+/Lw56-^a5ET[G*SUmns2$ zSklhgk"iNV[?_jFPղϑ=FP> ]V(T"S470_&Fcr]Ͼj[)Eu#"E$Aa_&$e̒WiIf?Zش/#0@O,ܳWEb(/!q\1i6rzE䩷Gt FI|dWxX>uؽkҢ@n)ծkxCsӼ1Ѯ3Mk}]Hb]Tp)kSVa:Җ"VFES((((((((((((8?X^ƭ.d>ǧp~"ҡxƳ`"{׹ w3 xY[,t~l,w_Eg(ܤYn?5>~C()$g=G:=?dId5ƥ:& ]N>ϻJ;2^ qČ_hЗ9$p+oIKٜݐ6ӽ[4[+)m5=FXc&*nh\X8n3#Ej |-qZHLǑsmt}V|jp}{D.t>d?+=E=c2ZJb Z*kK;Bm丙ĥd55[q35Mtzn75AӬȒvcik/a=5t{I~S("vojb4B$=_bk 鋤Y$\OgMe.&$7S35sP(Uaq@ʚm`H;-Iԗ-Ӵzdjpp!XW豳g?Ufɋ@}빰X{11$r6PHJiC8w(709ZYⷌ,w4 Y^֒ه kiv.0t: YU{MQ֊?x<|9>wֺ|YuaXNOlY >0|R/䖈{ZiqYrM!,yoJ׵4mM&$r=Uin54fyU{uDXg{&my25wKbl``VBy7TRYwr0zq8&D^.ZFZh;fwrx<9&)y4~i1=}}R#wiل|O0>ՅLD!is_HMMug,FUZYOWnIWKh(S&}1ַt|{=ԭ^VƷ -?Arhz޶R 0殤HOXJZ! E:Z#daRRTEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPVvT#WQ0*LPiqL4}f{#vȑG3X׺oig z]Q &G-57/Sv %{sc840t4G _ʠg[sB5CHdK:01.}qȮF 6vw!}}MvѬyHڦ<9_F7ΰ/k?Q]7ǖڍ(! z2Z|FK[UG&Q)aAK$?.K.fڠ$[>[K)b -{]-k-"\޼_+\qh2 Σ}ke#ӓ@ӁXď2YQ+yV_'4SjXGBt iHR*[ Xf_8F>.F \mA4[[sXa3OZy 3ME>?"5N~-m!~Ig} Ɩb9x_p)z]WQͨ]&a`8f^KRa]q5г֯Rod)'Bu:w>]߇V4 -|Uȧ)kyqnUNR1me4;1 y8㰨C9.,thm`b|W?y\]9y'xyn2Ʒq&p?ݮ&gLV.-MI$ۢ'pR_jQ3q7 U!U [!8ֵF6%kcV%NJ2⳸[8WoBzVz-ilC]Ƞo+GzՁ T)ކDڽQ鿺T+OMǽR5a^ߺ`'sŠ[{'\|khCsXӴKD2yhݷhqWgg3FT"nJݴ%T}HWU0>N ;b=.8ڀ{ִ#ԵKg]"G(95%FQw))hQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE \T 2FByH"K7R_h6sڪ[%R^s$&2W:$34w+#ı9#ɻlZ.;Y&YWo&խkfضyAXa\ľvvjħEr:Z%xbȤlm^MDܗR96y^IM-7B)|-_Y_.c yC6BfhXhE# lpMh J3wy6ȅ8T6>Fb"kKޮp{Xw2,8I1M<6{Ǿ16p}jjwրf-'NH;s5cv(=B8WzԗHBFbn[ {qǛ>~z[w>AV麟̍NOizǡYj> WRLo[ȉ~(Z=<-֛֕ W2Ly)՛>wmpaB9#9ޡRE;Y-8s Io Il%?Z+TNG.Zp &%[3J^EҎmev#VK2V]ر>OHVL/,B$92{\ޝ/fbAkcO4\9{;o;a\&isqm]ڦ&3cڙ`(H";tv-X2rɮO9˕- U祐cFx [6\iMEixn^qR\0M͙ʶl+Ѕ8V0mŠ)kAQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ A޼R5-z~9^\0u%uO&Jj+3ɮH7S?hv彽롍4a:Ӟ5I$WĈޞVf C#~WIq ^q 3'?w^qZ]2GA? C]"UBj`usk94ma&S u'Y֭aTtQ;^Ad'O5ԵP$~n]'(o[ӴP `F9l /߈nie|&C>J'^$eVjG2[4R!GCcx{Sn"t yQ^˪xJTxT0,[ J9fݶ/1].Zi#|Uytxd z{VPX"c7tUP !@taM{& Z(DPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPQKEyt tۿI4#2%WLfn-于R?Q^",XT<]mh r}oBί؄w<=kٷaS3Yj{լXCH`8iԡBxָMėdX'1'.G;z H2+tD=VN=۴_\lBNMkAo**+WZpA pkld{S838z6=F=z#):`WO< 2_kY[-$ N \tsyzQTM`ڗ548T4!Pӄᣖ<ۥpznyNRX!W^J!4z2>d7@J^z*裊8$hQLEJE!-ҊZ(((((((((((((((((((((((((((((())h.mDxsn@]@JTʅe8>b7U$e*hZ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( JZ(SSRfF((((((((((((((((((((((((((((((((((((((((((((((((((((((((((}DyK _Ref218412801}DyK _Ref218419624}DyK _Ref218315886}DyK _Ref218925874}DyK _Ref218927358HlDdN   C *A Figure11 RkY&MN<4C4k>{FzkY&MN<4C4JFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?:Zqwhs UY3Tu C&Կ֠hnk?Zjh ۚo!Ə_T)Gh\Vho!ƨ搚Vi?u~?,4 /nk__T1KSA[sWo!ƨdd___T;14kJD+ O?x`v9i=Ӡ̍YXs{+#y$o( ;x3ERO+9n `_ wF GPJ3ԝOғz3@ JRx`:4)gN)oJQȤ摱(~̓ިX<}*TVr0_/j9:?_ ɫ撒4wIGC@ IҀZA>QI4Z)94LK?Zd'Sa*f,5VoǥsKt> e݊;ۚnrisB9f>gSQ@'V~Zž}vUcrjӛ~iq7"A#GNՓE!µA-OҨѓ^(4̞ցҘ)8} ҔLIi4wHhi!ZQҙR({t=9曟Z1!#R,}8Iz,U:q)<&s? +9nuuܿZu/C5Dj4b٠:RdPP9iր ъ~)C)~J .qc1QOMKCtep*B9Rvj|sV,c#PZc/cz㟘֏Zxc&g8gRQv!ԝ(3IE0mM`w\cҶ.CFcQ7%yܷ pAɪ)]cQz5mqVT9jC4⛚3@t)3Fhi) K@ )z JQLRZvi(IހJ3I9<98Oz1IK?Œ ;QjN=) 4q.1];HqE(GҀIz^MZ>MdHWWm+BoEu+\7jM=.ihHOSm8Z_j@00(kB%I֎ڗ=Gj`!&F:ъ)sϵ&8( @4 :t4gBi^ތ~tރGZ?J LSJ`!RiHFjӿTRxO#ED{F-KgֆԿ_ ~y-)RiKړ4#8g֊cSMQa 8N&}҃׽QAzЦpoM:v>tVqڬU+{#NsT[9-'֗0 q'JxI@/cIL=>Q1Ovy$V2GL4W'.AǶ{K]M~ks8hC 큍MT& ʃ-36ie&׈Ɏ5uKH$Abe} u+ѐgGLV9vwJKLqK֓@=8KBQEQ@ qJ0E EJi4 CցKێ(CG~A9i(ig'('jPy!>\ILRr) RgwkӿF<%NJ? zS3Yiݺ3KgZLQހWSUT~4ٽq@fhȦ8ztJ=*ӥʹ&?V'֩>z{: 8NϽG Ўa۩O4uSZvhF>|sV쁎{V-3EGdkE^D㰪#2(Zf?JLO:UW"t0[)@P QG~h4 vxiN 9).=O΀Ӻ`@(=(rhϽ!riP:sFyJ:~4yIP߭ )~h?)HMYaxGF8aW~K T3T)3LSmMϽ-/z;RfL'<4P ( ZwQH);ZJQ~{:oƎ&Z0t`11޹Set.#_?AQtޖއ1Ҙo HP: ϙyzs7csYҙFۥQmd a\|ZiL\P~ hH}!dP9^~IfO4ɣj\ڐE/_€ؚN>cP֕H␀87hFy"ޓVi#E9n]4VSh/OC5kG?27k;>;"4~^(tу׊Cz?\4O4ӥ (AZ1ǭ(K(jcޚ )ۋqh &N'^iGqKրyS֓'1K2hiUy=3H9{Q9=(: Mufސz8ޒ$ S=F})9K9Iɢ)`iSIt?*7h3 ?_9}jP^S{{F wQ>\+QW;99T6ep9Jqbs\*^uE,@^.brjJ/RG|`d5!Jm6LphXJu9 畠5 c&K_dMԊUu1*!~jI3tEjPx&)< ;Йiz1PICJ”4ABsFGM=yFqEvriqi1P3L❻4qQڜ8&0=ڐ^A!80ؤ8aH:u.2:bj\k)3\`m4 C@$fl;F7hxL?#Ee=Gi[?5vI$fEeTGa޶bt,#t1}wSu 1Q8C#Dwq3E֬_BwerdE Te$Lxkt/FW/QRoinr=;Cۄiv>-"m 8TpF_JƩ>w2ZJʃ*Kvd`PM>ddrmVHjpyJ'c >lrv#T4|s\[hhJvVеR{ ח oC*5?ҧq 8s2kM<:)iSQ盽Ba":J2=9񎏦%dg}J/HiY=sR3@洳cFOc@'T-\'jwB3U.i\X:2qauSCi(UXbWM9iCWbmao#TʶY]Ɣ9#i6wNM )a7Sytѧ5wh!$[F=\%JJ(sN`AIhr>1Ҕrh"PǑ)cRI׵sHG4 |[a'7hgHҸO/0 1Țd^5$sX>{,PޒT^34]BV_W:K<=f%=j$%VjZ- M+]^oKP[˔b*^?+yVi2k6PKPӊV)Tu68g-An֊|{ްg\CBB\͝XjqLtƝ,jpUbk]F3bd˒@dM“[ UIbrv9-,s۩+ȮbGgac ~]V`r]kUմI WX-s,H5DgOSz[;B7qڹ uGi&?,=Ej҃.OZ@)gn[f”N:Њz.AϵuW~:i|:lcۼ:M!R0Wy׉e)b@4EIj_{ö\4&Xn6t=s>ԧLzmP@x>{B6l{؞O-[S 3mntƄ4yu `jnDJWVL)#]2'+k}h_`d$EY *Bpv Ti{}qj :#_"T(X⺈4[EKȰHM:LOqs1KG*Kr*=V/2Nլp Tx­^EqʄcRN@=p6wzǞԘ߅(<"GJA )|҆2CuAJϷߊcZ׈;cnVu*rJ]\F0oaTgIEL5 =Vfk"$Ib&ߨyToMv:v]JCDQi*p?LIjsFdG?P٭Mh#ԺMLa@^@!X JjlsƲv;`vV*XjVaޖK'51W kJj1TǹL+:1p}[HjIkZ[Fh4 eić)Q=iˌcigJZ!i{Q8~Opo)|Fʦ#/MR -̃57ml29VVY.  IЃ.ېݶr M4?Vhܢg&GH d^'-'Fujn(uxIPK}5#,jMս׉\(aFMќ̑U9J2SsJOZ E_ q19lBQa\x9Q[Ɣ5|jȆ_5DLQO[(.a|E$] L׺Te6jӄox;]CK lIw?0_[<#"3d[veI89U~n麷gRlÄoZҚHʓ=kN 6?mM 1It띈$&tԢ:0 FZK3)QOsK$_[b{MN[똶 ^ʝ0'gmH_A6>qm/V~ ADHjVIab`}_$ቭu+ֳ.lּ3+>0{=3]J~z֞!k0z1wGWƯ$RMH㚦Gi7w46VR 1OS5&=Mnx;F7hw.3=4V3h>"p?fwZ:=S\\{qB4+ hA@=xP~aژ0  88@t rF&$ښī=uվ@8yꭀ)kM?N=rPk+vSZS@ ѲpV[ B,$y/+-.vZjmĖ}&T? θ7V &kv+tuݾf>cڼSq_Ik>& B{}KTK _^2 }#*6ah('@4[@.9L=VSTR%[d,>SQ|l7gd 71[Y.sd֜:Uƞ;+)ڍM$NB~lqjmG]H?>zrQIC5#&lG4C*n;`pFYʏl$m?\vD‰mCm{e]6y8U,gjHkkhʰpaX }H;qҽHzɨ"5-Ҽ1 [ 6VS4SnQG;f?e֓{o\[l+Ѵ >Xt;b(3&ZmkFH\%Jk%8^Ǹ1lvk]3E3Y" \V7#<%cӵsًz8xH-m {-2zuRMFfOyru[GhM7WX,.nuuJ~u\L/G|u$G5̩887K.t99R7cnpjxwoݫV9:jKs\3cG̳+ ϱ!a>\LufBzP"Ӌ#[af pv|حWk%ƍm(H?ʎ{ku:ȵ+)GsUomj:a[ԇc#ަ:lI M< ]=/F'CY'3]MfGshX`܃\ơofv @V|q̇9+ٽWfZY3ВjHs8YXKu-MNp5iOFgUŦ* kvi7Ek1TcfO+E\uVѤWKSsRc]}ͽ^vg2u;8浗ƳeCVV4ћݗ|8S.b zR]MX͵)YY8SpsSj7[Yݫ~dϙJuQz.6,FOlPG?3Q(<@})0:Nh$8ғ# Qp2hQ&#c8ih4_aMD-Q_ ~ٜV<@xTAdNAJŒ[{9j6bphN R {ԑ0F:∔ImރқpG:Ⰰ?ԛZE$:/sPA)ǭ& n>M0b?.z ]WG^hwk-++:۵sd;uv~+%搂rD)ؼ`u-Bad+&%l[nW ڱ,4I-nvnN2==ZI̐OwYr;dhG4)^OcJeL>g?QeeTd3`HJʐI aѻӕ"v"<艎d;u{ATpޟi ;YSU%1sW7R@tYb35dp}I.dWE$o`fe }kD}q3RM/Vd2jyHn[/x݋|kċdxY]#R?:}-u (DjaGgN>'ˁ+pagF@?lb~dYDcsT<>nol˫/R.1(hZ s/ΣBJK0Ju! S..W$gҜ,g]tT 4P8ng:+x<1:ŕǢȣAa2/n_X3h| `xq Nv1-uq` qR5s-NsJ3}݊vzVTd2#ɢC5$ciDV&Y-jTZ >aHl>g#5x6qnhĥ$cLQ nծpJ4yyEţ)ЭiiPN8=caȭiAAV~kC5YeF܂Mu8sJd "]9a{99lf/[03 ui n>4#S‚v9H3^|5z|Lx|a ̃S/O!taTλocv}G5t۝GM[w ~L~"E&v=HӥNQnN8ۋ~"-rOcpݳ]m݁B 4+=tсZщ1 j=N=)Qc\OcX:^\GtD qV& jrfl#ސޥv:RdҒqMu88 jӵ.x&1ځ pE4N)s1Cg s v?F{EO50?lC5 V8.泃g9T4`ԻE\kIjg޻(Sy!|{VjVv89xm= x8ŹvCgz{s]LJoWɖC>\HsJ0a҃\JMe|O-㙕-:Ნa{nIÿGy핳Ib^cdA6gRoA+)&u/KxKA6 g5oY.VP4!+: Ş]SL8=["X2rLPrqQ_CfBWJgvw-Y$h|->^3h4̧(+&-Akuy"fTZr\Lβ$f2 F lI 8Rw@pwAǶaAKYJpQBG<<2ʌ>;0[c,1о튕n*xCKBʁɊ yll1Ym_UiTI$W'dOx2tX?Ҹ-nK$4i&W%C"erz],u]yHFGNۄk .^7@~Sp=V_$hr9?>G2b;b» Ys " {g9?ZƬGEKDr>%7%PG}f'b^o-KF:,Fau蜨gwjlf]N3) `Tj9V8 WOĩi=9==+*Uc)`UZ> nU<nV9>(o5;1F(2FҸK_ I}}ݮhmCX[vcI3}k-eTLl{8c"u5} 3oqL%$,k ]0F0{+JN cHOXR0Pi*4gF׺]ۭ4r$ ={K aX:ǜO߈ؑ]-0AWSUa+#jRw3ܪ( }DU䕌6w$sR|IҚLkr:rnTG`ƮΓmY!h<=a MNߡъtrرnE&){8X3SZ(InWlDҳ/o> 9cTއ3JstKOuD ++aڲn]N'25jF} 2UI N2pѩ = ;asQ>_UvP>b$2G4+\e'ҫw=K' >kOC R/,:a@ͻ'#i:]Տ0ʟ@k=`ȱ=U/6ԛpGY*m5ogv֟$hr؊S!:8AiMAq1ݳy&LO #*ٯt.YTJ.1SI9u*z2p@T;bjz}ŵϘIO{ ˏ:ـ5TVgl񓒳ZٲcsusQ$(\>B[kPɴd)&cZ~Rrm3Z#h̃{s DTZߡ<0Iӵ#ʲqHv۞{R M'O})7L.(o`_IGt: - T7?3T6smW}C5@.*!~pX;2j0E86T`更:"NGjޚ6]?{B<`PqHy=qP(cf ]v_[  ,6q\ڍz.5 YѸSP{CƂͥ1o]Wk}H6K+`PVNp'rijBMB-AsܜLSS96Fkb3thW+5๖=c y'9K™}$z·cZsv"cH|w'~+[qIbWox*kuD>e<1b^B5x]%c d/f͠qqڤc~>UyTgӊP2 sڕ`01ȩea.qsUWw I,ZU:PE+<=jIpɫ$jks;v9G_YU,nu)J77<=Cm"<p2I=54Phɍ[vN;Y]$O[zg mo&4:%es.w+iR3&vab;|2OAZ 6ݶǒIF,e&!Pʃڶ&w,oqSjW7 mktMxp H({ni^ah'V܍#(QuP۫k7V*fܓQL|wy|#ui7fĖE-J;j8 >Y3]_-ln\Rr3fr秵ra:B hM ѝҕ7O"#;1a,"9ȕ%8IԋvTxz ȳ%mluAW5_HR'mh*Ӥo 57mj]l-"3QȸNGR-{ymQV7RbUıIssXVvIJm+N i[W.ቝ f<4-\:fCodH0kjQOSՖ:.jzmS8Y,/b8h]O7@P,=Ŵ9xha!ף3JN(*@e^ ʽI\m6e][<l?xT_L2s59ӄA8* wy?X'k:,4}xI}a=ed1(oP{zmcXdYcp@2vVB<+[،$4s$g9JH@dUIZ l`7zWWoVOx55{1rVZVչfS]棦ī'~cR}nk/|3M2;uW$%k|?w,v``? M.kpMºH--bݩ>6~i[[TI?ºae~e@*M#d8[ymͥqyuuTHݦgJP}{0۴j쇩 u/]޵tpx Ɖ|4w .J}8sc[Q7-eUXcg5TbOS{6K[{4R68㊻LaDڌA_LW^[)Аn+h꺔;_WfLܫ[3[[BhΒݼ('9wm;WѮg$aHgZ& ^LyuXџOIlFardP? rNY_sҭqz:zp9E=k3P=N:Ƶ(kwo1fjpх83l]FdbG5fZp$`b?ULMry񕷗 )~^R '>Au<_i w &̑Fگw .i^z 6L3ޥ }ok xcq[/ Z^$QWbEsKLcWUiqgslΠy.;'d{҅/cks.Mbi?].n;kU+3U1un)]Q:#][U5)=/x U@a_$V?,eCj.}K/H6Ԋ|{~:h.cwqvW10@(G7>^Qq\cgٻѢ'ec"B,;bנ޹P+^+0=EAX|ǧzfyU$rwif+ڕxPISOk4'iq@^ &gx4Rx3:X[h- }S&P@#1}Uwه>k9fF<0B!JwҢܟwhM0riHȦ )$iN)恉ZGNauuT$s_xʖR?2f|k:F ζwڥg`w@T͢ݬt/E+8R-V)Xr:Wiխvg'n\iv:t[8YI ))^+GPZnæH_r?9<Wlq<ޯiΗ[ ;¬yZ+sSZR'[0|zהD{'nOS]7uCT$v/\+ndQ#Fn<@TȥFH⳴/Wa˫.AN3\}QNjQV]JXy#)ުZ)ٌ(Zh|gTXNAJne,A1^H󢣬A[9+(\fIdOX/"7zM-C>o9NCPIPJk 6v ՒnqgWc%e]lmmVKZ?:1=kPңo"+2'tuHDMUmKÑH^ ҅k m.y7\E*|$;A(U]zrZTsQKi?Bߍyn .j͏#ƭ֜]fkRK+H "B1[,n>:jVa%}^ '$^Okl3-Q:_?*dn*~q8gawX]#$ˆvk}31|k[ԣǗv[X?J]vD=TL.`{IouSLfq5NПoZ'>f+k`2k14>v:w"*H#5w)j|Q9zFg8QѴ3 *LKhw5>+owOio#\.[ҸzwmohݏbA*V`MU xt؁ C FIDtGD6%V$}-OzpNKS JUj{%]\yaR+Ѭjrʣ K' ;TUņͺ\9zRQ-{6 p3CkNZA\ =CL6 QM*uei#8<Оkw[.IEBi5[i`Jp+}2ٟxkkk;>4*[]\e]QϷ͖2)yFU/Z#dy!V'_KXaO3ivY? }>mlLˡ,AR/,V#xU\)ɨJ~Yj&d4 G*u?PVLa8|Y]ݝM$}Ml%"Wk.#ڴ<=sM2ƃ{s[ wA''Or&0}vRBUT!*: > rx+(T+|k'Nz;C^儴8<rzy|!}6|݃ -m$}c?G%UbVg}N5bcPS^`OLh$#X?ʏ*b:я } f_@nWݐ>NN.-.z\iAm"*cեf4q砪|`aIo7LS+NVɷu銂ўME'+ Aq]Ji0>licp:sPA ibG=mx+ZgwG YTܴwizUPxՑ;~@;7C\>p]QэX܏&7=HԿg5˾ _['=4_좮"+/ S5šS)MJ6W%ØR/ەVd;k]BYubIFH=ƚp1s]˻;P@J.-{>)xWM}64XMrVNX¬]W ')տohX9dk?myd*0R+bCUV 8:מbW%. &HpJ{\+3N1]uy-0\ Riq~.%PNInwƌ=~;Ҭm_NA8y" I}jM>mbH92ckU:ouRi#+^m z߆bkWruR=0ڕ2>ؓn dž!@I,/ɮZ .OvZ2kᗵ/ ew>b}aтjb8&F^]H#ZI = qv5uq4Q-%Lw< {x|^v)(7FЮn8;hw<.+ vZpfy=c&S>t($EP5D hЫOGG$k8_18{»k{6GB@\VfhlY#{?ĭ4^*eST|GgN/"S0FvJû;u  'zo^Weu)n7-2=G/#Sv []Jxf2M 6B$I0ş4QIak^5b$f}~O-.ۭ*t,c9~5o *M,޾ak u%ΟtٔOtX5 b )3lorcxsODdarmJ+ +B)uZp"REWcM|ҠWOX£su sKcESm/ 빣3* V#^ <|'h <4:-r0✁w)?:NE#rj~9Hd9QYW94dSKA",4?vy?( 6I9=X֟Ǵ*@c}R 8u;RjTOBvi/pM<;3-ԗI9g^5vc5BO\g(m|5yW?XoyE]؀cqᇆq?E44C}mhrQR}DyK _Ref218238086}DyK _Ref218494701}DyK _Ref218495128}DyK _Ref218494427}DyK _Ref218495651}DyK _Ref218496636}DyK _Ref218497108}DyK _Ref218497687}DyK _Ref218931949}DyK _Ref218498126}DyK _Ref218498294}DyK _Ref218498539}DyK _Ref217808571}DyK _Ref218237584}DyK _Ref218237612}DyK _Ref218257364}DyK _Ref218931949}DyK _Ref218271139}DyK _Ref218315886}DyK _Ref218315917IDdN   C *A Figure12 RAI`ѡ A'!I {FI`ѡ A'!JFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC; Z }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz?nͭ^7{ooV=_J0r0s*Az vg BfJ^K e:_*߷/MvCԤ ] :szw>!/Mє8^cx:%|&UϽsxݸ6X|bCj-U ڶ&ݫY\jueH}~v߽סjzޭ7H4vt6R5&\`UTxn5MWSXV $o% 4Tq\OkV8ԢX8 3Nz ئ۟m[٭t Pؑ%d[X,Zff]Lp$ _Oy#MĿjIH 3qkqZ{=<]?jo;85}[Qmʿhdv7L`*iGubIp?xz^ ww7SʓOgr`%1+=ٺ5_]Goj_[Lp]k#~$u%n."B,,Px-zn-v/|SQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQ_Yx3D}-koJF5cfEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEW^ AmZX^bW1(vEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯e#a+ՍEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQA8((QEQEQEQEQEQEQEQEQEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEZJ+/ȏ6E|?5 \Ƭj(((('U-RQ3((((((((((((Z(’+/ȏ6E|?5 \Ƭj((((J: pn vQEQEQEQEQEQEQEQEQEQEQEQEMPhgmZ3^jƢ((2qEQR+F C 9E|-l8zꄈHW<4p=qJcm*87oL9c.^OLw9zt(((((((((((+/ȏ6E|?5 \Ƭj(((((R)Ns+F+ybc:%;xz}{FI٣U;X櫺eqRJD+`}j)WHf8sN |G8zaVV9=(Ix2@h{R`piJ94QE((((QEQEQEQEQE?Go־f?cV5QEQEQEQERR x7*qja^HcHNqL?,vnۘ:q;FUIȑ$I%K#ip;Nx'՞H[;q ÷p)΂G-e7󞙥EIaq L< >@;N8o ^i\A'=i 0i1Ew((((((((#? k_3xG{W1(((((j!D'%:0 5F/yO%xɨQ7 VEmZj{4Qdܜc؅e ]鎞OpE?(1Շs>2=sjY"R$e#*z1ߌv RzRp1 i$Ve~A>ԻeFۂݓϥ6E yFJ'pzz@3#<FP rzc. S0'Pct>ͤF@R0ivROZL(QKqIG((((gmZ3^jƢ((((P:԰Qb46K E@,))2>wK,&|ނvH pm䜑* E0$N{jgx'ZEBG$v=;Aa7 8nr:!,Qmou ,av!Oj6^SZFo`q'#,l׏օ1Jg?K Pʊ|l*GG Ғ6X&=ɑ7zS`ąPlQe3ךxDO݈.\~Xr_ޖJK|` B>cQ[/dPP돕91U#.M  oN@E,==iv7mPdN3TGkq{qR^Ic`;RezU` n)RٌmX{~>T) *SێF878ݸ8'Pr 'Bg{ԷC*vx'i[axV6}*iDCz3'G)9. ǡ棎iQdRdzSv3jtL3Jx$3SVx^HʌL*ۺzVӝ"xPRl)Ͻ%QEb(((gmZ3^jƢ(((((J%-R=)HPT\nH$9[^@#,W wv"΍mN:"{!rȘhzNztj cs$|s'}2q5gw>ԺțbDmPUԟWĞV~b͒ʬ y>˙QLĶp1ܟPJm@ /S`dy3@H#jisܟR՚5rNGb:-mmaI`B>W68'$ǥLr9_5VIf@rE(((((#? k_3xG{W1(((((U8=jdHZ5MO$5W gz[e qM"ބHjo6'!x"lS"qngϑr_қhWz- G!&鞙j凋/4pܪqB9VݭtafB|IV?{:gֲ%ԬHL lO,1׊/=JJ,,Gk6z㚽hV)!⻝ݞp W]IHeh72*EXNz-"ܫ s#Tg^6Ox⭾ڤw˝d\uf;Т7(aגSKu5-hH [?皬җp'hMs8$ QEQEQEQEQE?Go־f?cV5QEQEQEQEQE1ce7y{0}bH 6TӧZ1M$aӂ})$vQ<֬ũOy, s)0 Oki3m{ 4kGFzdΉSE~93Hr-|jq~dK1gSRGh2gyc*:ƀ7Mϗ"̭c돯Ү5w7 ,9 ߶^֩^Zɦ"#;v8x6xo i^I,X{F=`n!FUy&%"QtP>8^מ*ƍѫi3\j?f4"$Gl,y p?)u1NͬNa2|ć;1>/6MP ?ʶycW,㎿g"4l(4TM*F]G[0閩.啑~R15NKTH`UA}=0G0T4̍:H^8‘A?W#QEQEQEQEQEW^ AmZK{8mR9X J;@߼v5i.:] k4x^F3Ўy'~r B:g=GD7wo,ܒ@@=3zVHc’9n1z4pa̞dÖێMBK5$7csU7I&ђK6c#\,=hiKFFwp:R,rNMQEQEQEQEQEW^ AmZQ'u&8yaerN$`u=5ZX?|׷?$xW8bxcמ"Ђ儭azc*xeb\|GEy>6lTabHӁ׏°%yc1qʂzg8M%!e^_zZhHt]vTJccHT  ? `3;|A9袊(((((#? k_3xG{W1((((((Rg+'9N)l?JSj"19hw":(I\g'?1u,Jiүiw62KI,{ gWte UL͖=R{ټ-(h>`[c>xL5(hhO,0Op=8+K\٧]m/`8=w>3:+,abIT1:Ќ<&-I!msЎrqQxrwP{['UP>PO\;Vu6YiY)hզRF|F8}lۛ$YĒ I8TEĒ\uqgv.xDpFy8< 8S]^` ,h|.v[GhYY0[p KֶBBI, yY < `#oZ]B|p1ǥ!! )Qqңf,Ğ((((((gmZ3^jƢ((((((<]? #1gb{hhʠ#qt❔4bg :wEo,Mnϵ6 #nmKuᴵ#- `jǜ >Ph>̅i7q׎?*d%̂s\"ĞGs5Z͌? QO?Fx O5iqU@FM˒{5yi$6H F=Z7:퍄]4q4N|r}L4M>hnSk6sԻY9$}_O*.59 1 _d99UUcv b2G2(EQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQARxgjS)8LC}p7yZY)riQ;d:dzs[2pJ"e!|NI;b $HUrrA|UEiiՅq+ʳ K;Kk[]X@ cj-jpLK]9,>mH&S#"nۀJ1qL'I2by>  .$l0PV=qZUhfH%[8+v8ԹUT?^^@"Ā.\Pʓfl@NfA*:T$ (((((((gmZ3^jƢ(((((((g^;<)\rN8jJ:Գe.]@P͓>*Ԗ0? Ymkڤ5ӵ(oD0Ϧ9#MFmWSkXSݹǟ˥j6nV)[IЂz*rAsj C̕þԌ>ݧ)*(ҝbvX_{tDmȏpA<~}*PO: [$޼d(A@rŻ{bS#$!lW+(`^RRgZJ((((((+/ȏ6E|?5 \Ƭj((((((())TnF1Ԝ⦶WSD{-~5eGKc8jօ.z6 ssǧZW ^eI<'5.ga8 ;zrfiIqs{(Y >Ҿ=)OJ2Kg߯S\HI Aҳrr3q|{Sd*+M Pys&H sZ(((((((#? k_3xG{W1(((((((0%ԀP \p9 AqZڝ4$c.Z]"X#(iޡr@W3odN=*֟MZ+գdq'$PT9=ϥQѮQA qQgco 1=8QH$H~@1ᙙQG1bIh<"2~:{P 0 ln8J3NԤҒ((((((#? k_3xG{W1(((((((n''zҩ@#t,B9QԤn^3ޭhj>cxG= 䁵[det{``{qL/&F6z;D`~*/}rV"FW|s>'XyR}M@T8ʞ8*6Xu }h(G q=hiT #ޢ$gQEQEQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQ)@ J|\3RJt",|#cS;B#wJ%ޤ j+\16rF8a|@9 L͞ #qPglFz3JmQEQEQQEQEQEQEQE}e赯g#ƽa+ՍEQEQEQEQEQEQEQ)Atpp8drv'Τ YewsSsyw *%M6eWV~z$}%2c.8sj 8Ѕ Ϳ8xAEχ$gדޙ$:E;W2 )LFm$Jl ?<p=7vpzN*#N'`Y\dGSx̤3NEԪcX<smiQEQEQEQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQEQEQEQEEMBs`pnP#vRFT}O5iU\*Zusq"H 8%QEQEQEQEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQEQ@yE,c.9jitŃsRwpp^?JP,uk @[88QEQEQEQAEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQEQES= 7mc>*O<(zf((((((((+/ȏ6E|?5 \Ƭj(((((((((A'? 3TQEQEQEQEQEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQEQEqT(QEQEQEQEQEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQEQEQE((1h((((((">`G+}{W1o82qK3Hi1z@3APF(]IEQEPh#((nsI:EQEsHF .3Iފ( \q@3JFi((((((">`>*a5H4nwKrcghb9y}k4DwVn^;$񍁻3[?G~^+XGxn#M,g;~-?z^rm+Ij%,3H=O*| ZUcv,.)h̸O 1VU(xJc_Ko 3N2K^Z狀.5"Hv,ڍ͵\|x:)m-u=?MEra&j-4WSR @ #JԴ۽"[ N$%N3Z me෴4{E0F\*XuClu&C,lSw\+W:-}qڵfiF1+36>4-tԍ-"lKe@je\[@IG"ʏ![u?,%6uo  G&JlpAd*YTʹh.Ǚ%7fqm0wgR\O&+O#!Է?*wsȨ<8&> ©UԵP'H.YaLN_ #5 l:g(_ t#BGX!z<|:o(_ CW_Pt/ ]GX&N?2Ck?1~>O~(T֜/ x>?|0H'Q 3CNƸ%Fi(Gq*9xng}SYY,OROI ۣ>2Sjb tqC…5/!|+A _E _j/7G(_ CW?BW ¿_nPt…5/!|+A _E _j/7G(_ CW?BW ¿_nPt…5/!|+A _E _j/7G(_ CW=2-+JӠgh H#g UPc `]DdN   C *A Figure13 R\'gI=޿;=V\{F\'gI=޿;=VJFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC; Z }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz?&WWѧai BT}D(P0=SF+׼m.woLDMf@Pqsּ?˫tUwm_ 폌5-խ7R] =N_fє28^a%|&UϽsxx6X|bCjJ-T ڶNJύ"Nsiasi9,76E޷_4>&ٜ\Ȑq9PI &>Oo/?7ڶsyzW%0;Y.%k}PW6Nk5ojXxQ6w' QF~N8㊽MKR׬[,Ɵd < IQWټ[K[)i g߽8 O{WU^z!.$Uqڸ/8.Э\ cRhn#YdPpOA{֦K+W ˻+qpnNKx++/ 'sBE(x&LR9$[\ m{E!d6n8LxOHȖ 4HB[;ACNA} ]e!Vc$.9<'=3MӠRa|C? o/ 1Oz}yq{S2KKi5Y$ޤpһOxeod D XRq&a[pEs7cҮ_M[Yu=f55nF`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q(((((((('I(瞔R H'dF3E JT&csEQEQEQEQEW^ AmZ0gpq~ `9$My$ˑX #>#~b{P @>V r0?S(((((gmZ3^jƢ((((((((*ONqR%@8|*B!x=qQ*EXh<3ǧN Pҟ;B# (-&z}ag08X0ZPj@ݻ,uB@/'ʝ%*fHw$t*M uhWn>c21&HKr:c4bf>Vo5NIT]YN sR)Wh{ѵeUW;>3NHV >A (DÃ{~5 ߀"fPsx4QEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQEQEQEQE*lp:t ;1\NG_I@R[ÙNFNsX%Q d Fm&"O.M:ӣQ`#=n~gO :vښ-) E(bwZs8RF$ǐ19%VeE.䃟p=i커! N>QӰrEoR }sEyEuw\`u=+{dR㎙= 1IcT,Ba[DN( Y[:k3ӤfYZ5i =HA`7x׿%q(((((((LzNp=HOȡw gڦHAdoG'"EHP8rzX4@|͍Fu$"#Rd€-遌d-79<}(p 1o+"bz{p)l(w, A&%*gQq|D6_{z{UwehLyN@?^j67]1ӎZUPぞZEQEQEQEQE?Go־f?cV5QEQEQEQEQEQEQ@4quJYOB]v=)ü1j4?ή@-YaHo+1?WY@1 ~̳A# uf GN#I)^4E B0F)$`c {#K +qOCk4ʢb(;9Z#*Ϋn̛Z%o?xq}*@ֲ&-푐y kqe CR2t8@Ky[}*02L2i5$䤮JN4zS}|R\yܑX$}*SzD ̍# :8GN<*L$$}>ؚ[Y-H6ӹI2ژ9ZRXt.:[:!;UX  tv5^fY !݌ۀ'J]&Lp :`7x׿%q((((((\qN#q>zKY%2*8[XhH8CmnHVu#RdɏWlȤv۴Qެy MjYx6Ə%=G8SstRi٥8U 9׎M9.dj7XO}cަ(. D3S&T ˓1U崕a63p)Rp~V9qzt澦#Mpye>F3^ޕ}M5%dPUOdGb[<^H9Q'$i(((((">`7x׿%q((((((Nɥ\ x3S9vC?ZY %8f2S8"C^!|ώ1ysZciyT92@O\m:֕]ct#=*WVV\0.y\x88օt+vͰxA|sۀ3Yv+qeu'ifٴ&AH8㚰$"L2MycUH#^Y"#LԆMFlFG=}`}:XPtdMUv)ܝ=(k&G ̿0_mK8E[+G92c6۠5 Z}p7&Q,SpO-m08jD0A*oUg 'Ӗ(ԋm Bj.F霎S̷jFKa~,cnH՜R*ɘpJ p"홙~`I{)tFXH38_\uoxjG ((((+/ȏ6E|?5 \Ƭj((((()BN 9FӐRLPʻ^ڥ|O|02Tz54qϘC,ssҮ ׀b1C! QU:\d3/X A9Cзx.mɖ[s'%XH",@x ˜|21jX Qy B]pzdX.b[0ŝ He=㧦j,ipo(|N@ q隂j   fbI]^1R^Xљd~Arqۇ^5 ٭ARDCy(ܳas2Pr=NQEQEQEQEW^ AmZn=2],A @r3Tzń .V< pBv>Z[K{Ts,bOo=Gq5Ʌ.f3MnK.@Fzb_S)C26fm/4r Np̠|ztUY I`P)! ,A`5M&vQ\zQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQE <ǽ.pH2z~:~H2ɎA\TG*ǽ] d#{qR bS @e,<=*8B7c-=`9܊5',Q(f*6ӌǨth1 Ӣ[;I?x%~p2BH=k;+WQ@#r9=3Co$^li"?s+j2Y*:FGc Sطܑ1(<0bq Q[$S6FsЀpTenR@i7!IS$dk@eWX2f DN -ӽͼ@۲rs W{#X~0̌y\s8-mO!!a3.wG@ >Vi&' HښN@((((+/ȏ6E|?5 \Ƭj(((()0OT A ޿ΧHyF@KpGu>8- .3;{eZEp8[9=U #P܍&`Fqw8Qہ= ItZZuby$/ wc11Z:eVғhY[i@>,GwhL 'SsUo"aʑ$k&P8C=EgtM7S3mcYb%DΤs3q5oLg6ڥb:գ\sϷQ=q[$6nx:"jݸS%"F I6x 99_I}-!G]0[.y;yUˉdhBLaYzgHn`U9lr%p~۹r,cmhʙᲬXpH s>o ;o@^#c8rr drjwQ]C#0x@61>\c'VT,f$sQ2"Jd'U؉ [񨌬xKnճtQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQSF%#dIq.j',,UsbɒvX@Y31+4¶Ծ#Y?3f_K iQ< ߁Zz3/wqqh+.O wq֤(] -$F2 87tޭIs$fP8n6dA`JO/|i«R;uN=eIsqf)q('5$I͓lN&2p ٌ=i 4 Yn庀","4aa!DrFO#>٪[Y8P"!9UFJG2x ;0$e { /c+}&.WbH8Xgu87_2LA\8ȫeﳉ?5h!"O3IU/2(`ż4#Q1Vd wpb[O2]1*s^IekD,aLB@L@ rpz֔tΎ?(\eO`qy5l\;vn9IB-$9$O @  ]ELc,K 9+0@r{ӒM"\O2F æ: ( Q I#D>elBg$jP$R;Q|؎uKq$q,:>3}AGlg9Pǧȡ&-cE [{Ke,0,8^1pj%y/&F<lWj`)ոϥ>a E-lNNPzӯ6Ͻ8£"mʠqL1_D3!\'-JYC(-;OL`}YŧF<`F)^]* C" AP}=*u&+67a9v1ߠmd_^1UN'lUYػ|~# $#Nw9U`qcX?ϽC+nmv>ңb O^sBnjIEQEQEQEQEQEQ_Yx3D}-koJF5cQEQEQEQEQV9n'!2=#$dִ!‘2ɽ^y=õ唟6W)F 6]@j匋5܂e`֥Q w|V䴞(QqcI%{H^+.H$ܛK = 8kJ X\-(wdqv7B:[_'!P1tHc{{qo;'P# 89UfK?=Q,VII22y䎣K)h$̐Dd(@#?2XБM,o*\doiD ^y<6uQW!YA O8R3'S[=6jn<<>KvӨS `K!q'ӣivox]FC By^go5"^=ET;7]3;qT-&-io G*8O c!9dTaO|ޜfIqo'x۸paXr>)0o`B~uG@WF 2O^Ҫ%ԒZ&0vǒ=>A+hJj}irLqad'NJ6bۋ֚6$sZa99((((((#? k_3xG{W1((((דj# I8fUSe#LjDnȥ7TAҧ&&H1 X 0pW.dbX8c}z |Es!1Dd`Wc,g,vB1#,בxF3K+,v %κCyQ-7OyVCNLp$,5cA8)v٭krI̅I'Ic83/GrAҬd;:^\ZmM{xl@Gڣ|̤`v8 4E^Es4q@g6p#[h?xijȤxLu H7ݷ^8>^f(n$oES>1Zk^,S]B{:UfU63~Bh- I/΂0@DA==sP"< !.1n{>:),~{s)ےy^njƈU ۜ$8{Y &ʞzSrrr(((((((gmZ3^jƢ((((u늱.7cڭgr_8X2w?Z'Qrw*q<]NY.e7*;+aHbK WYP<'$}-uuk0˟$uA3Pϙ|+|$0q$: IшhWpFC_Z.l"ټw T s뜏UQՌ^Dqqvѷ>-74.Q)(=;uj `2pK FiO#:O+3vw S%s)|N#+ t=nEђ@Ps׶ҫG>@+xyVb-,)3;Ld;6e1E}9Nא$2ۺ".1ߑFMC aCW~~^y )r DF}3=1R=bO/t2J_~ZF26^֩m*0[-9Ϡ=f.by 6 rRj7q #5cnGZJ 'QEQEQEQEQEQEQE?Go־f?cV5QEQEQEQE2F;8a  `O~a1XpOަ X#(>I$psxKsq!tq6l-RxMD%HBgv13=.E:Iqy3CɝFHs|Fݧ>2UI?2W+l8ꇨ&CePP}3rDX6H ú9Q wB36F?B] 3nݑhI՟r G8{SJr\})̃d*[:}sHd݆$vdsZI smQEQEQEQEQEQEQEQEW^ AmZn$\! OJ 3&6cHO0s=E+o,H3J[c,T0CH296xa9#.·'j`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`7x׿%q((((((((((((((((((">`+!]Lw7mK%11 p=ϭsZfmJ~su2d17aqW/kek٥{7Ħly[ájӾ%mw5ҴUdVI&T>!.iW5ذHg UY1o#ĺX[*[x<NrqI UO}=Iq=Y!Z%<8{5LtM.{9#qII;lnJmvQXA4FsړZe{DeD 6[N=tMimk[K"Σ{fxB/5]_R ŃACu+G 2RX' =axG@^[;6F~!Ե1||C| êjZ*gs ߪo?7O<3KYߜ~]'65-eէB|l5-eXt+<`R-ޱ"@\F( TCGJKYxtśQtᨃ=ipvC…5?<.: !…5/!( e!Q&J~`Rp$y+ ԡDx!$k|u*|#)Yh1?wG? ϪkR#wy%I#ᘛtzg:$[tO?^G(q75rO6 ¿_nPu*&յ\c0?]7WF!^Y䯟?/.Q~ښr@ņNI4Nz4_n|8Cj >>4#Tց#">_o$*_Uا+>?4 Nn#4jou-] VZa1K*Fϗҫ…5#sjgۈӦ7 mGXf'$t۷SFF'L _j/7G(_ CW?BWҷ j:Sb;`:`;b=e>g;a>f>cKlAeEgQqFjOsMpBjAkAlWvFi@j@h^|RvJ~GtIxKzL}HvCoEqL|M~NDpFrIwPUOO[NNNNdaifxwr}jdop{~lrax}o􃚶ӕגԄɖހƇ˛ĚكџۉӔ׎ՕԮϹרסȨˬߴӺ֪ߨȭ$ztRNS@f pHYs@@bCc[ cmPPJCmp0712HsaIDATx^EDaL|b< D:40!LD4 *B>ϴ{gvvgzgnwWuogvo!H-0O4O@2B^~r}hnI6~#B)'Z +"H9 ZǤ[G$Y~>G yѤ&_Z)@%BKDE H |7IVAhhD !)<-,PIH4O@fHH鯭1qm뺲bme3KȎ v@n+ZDE9!ŗFE:f]2\B^@8v\xuΕ*#M9!h@68:! ۏ\v!@t)Nh i5Ő`:g/FNs@ ΢DQV|oQ&WQ=P5]P!𦐟K^Fy&7'ҋoJ}P.SH*3b!ds$[O?^ Dx~Q.¿x=ކ"k ]IЪ@8]%JjT&5^Cj:m! '/Ub^&qJo@>G*j*y)X孑guī@5^ tY_YwB.DVCӫ(qF ቭ'N(IЫh&yk>ʈA.Bؠ!JM*HqOʷͅ)>7I"+9 B !eW?l"Pe]: bPI@ApTk"\B侌Lq i(ȫ%BhJ[Ԥ4Jo@I(?ίx9*L:-XSP57[iڎjKHGیŦ38EȂt7!Al&!r/%ՅAB%I|\)6j|{C֡~$+&gv'ɧmޯ?$J?]i/ sDxp7viIgCD@*Q602FwB·tWy)xW*eMw6;=KwE+Pe.#di3GXt\Ȼ"2pJ8cswԩRVpʶW9.t[ƻ"oJYt[3ZwԭR6,uJs :-] Tc,<3] <+]*w!ŀt6|wE+Pe qxWĻUnPHH[;tF[U* iVHxjHH݂wE+]p۪DHH[Gz"!HM wb% L4\FʉRv_2zl4P|ȯUgo!>+'Fnurşŷc._!GC{{V݉aEz|WR~f ˭ʍLD|1n% s(-([u]/IzAnmroMeo=_>y7`qAZVp[IED||[Ӻܪ$qƷ!@/$d*I=I^%ķ" y&IVkQkǪ`ŷ"B߅[E ߱WAo=&D>ׅ/$Vۻ^'QƷ" ou;Օ*j-!\B_H|Rr0߭%ķ"DW$Dc6Rd'Rh"d>}-~o^.oB֥g @ ֜>+ !0Z9߄rU(S&) )Q ! f]ŵquH0˄BP8$dipa:8>񡭇!c\v6fbv)uCg#"Cv8eg^lBĖP3k/F1Se I !|``.4\!kX2"= I2)9&HOcHaeiv&?SKv~FcGq(#W>&Rn$_e %eD)YelPB!$vff<~qGZ&pUcIQfo?Ohg0̝HH(<55vGܗ bNdg^㊫\圫6kHJx*Y,`VN=Kd:Ps* خl\i%ayC9}L%! +72{WFKyB/a[+suf@eF-&g0ԭyn(|J 2w!l^z?cH͛8I/qӧ4 (2 pSBDU=ڴB6$dg|._T҈m~ L=Se;̈́TA߫7jlnmT+cȖEZT5.?#DMbzm"!~ypfDZ|cf7|cjC66 Y]2]/|/s}ZP8+ՀF@/eᤕOxԚC;0Pͦ{_ed⭡B\sGbo<5e֜>CՇsB|˯MJOb*S5yu6@'wɄCbomvSC +}yuDP/*׊YU/j#DDyo0{eKK|C[~gh$vZ56eYZR8L-±U!jXއ"?P S+1 ķμmP/ByNH:1앋[lho"P xN1frtj^hC|6 =2xݚRM20Th-'ķ|vWd8M= ^؏2wm@HHp[RYAc/"žm]>mvLo5)8VmT=}g+jRpiba'ķ|ˎ!4=7+W d$/?/Uw$Y_ =|a$H!oJ/rkZBB|1 S"B}wV)'>=||2IB8l׵1rc@M-fʮP28435'aGHziY\:Ŭۆ U/Ώ!fMGmVڊP2:ز/J]v +BBN'Ȧ@HUÞ!$TL-sO!KK}痷 $T%{Omgx- U#dI+ƝgW $T}V{C#4mʹn,H'r1p g{4ckODBv].TO?(ñmqt Jmqkn? i@Cmd"w~!:9=HH$qiQe86 cڲeҝ!&=e, 1䕎Lz #Z?vIENDB`}DyK _Ref218951511}DyK _Ref217832464}DyK _Ref217832481}DyK _Ref217832584}DyK _Ref217895112{@DdN  C *AFigure15R?ʓi>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;y" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?d{\\J4ohlP7{^܏jPY2oH2ղ*L\] VOss?~~2Ei$U&ujE{A |NU1^?D~:_FA%\=Qx0OK&j%鞴u,w7oŨ_nNW]\ U]io k.'7$YjfkqI3Ҡk*n2) B: jx#-tEdJ҇Rb ?7Ѳo񫘤#.'`۟HZn?K7 zujsLTZLF/0 ?ٿƦ?ӔaqO)u?ƣ^q{qj1Qp1PWPٿƬ[|oOo%;ߵ:2"Poy??ƧU\eFKq}sjj*05 'oU7j.,m1?ƮFNv~ՔxjҌ WC?=GjƵ(;?#yjMq_5uU>˵֓B']JfoXDqwkN8Iz ^/!ƺ=)$#ӸJ}eUKn51kV *i,)Ƈ}w:?ƺ䰋Ҕҝ^M{j^"L\.OaU;%O,pɨ:rZ^!e\.O4tr*ZJkK3^? ?ƪ\po5akпG. ~g֭#d:;_\wz?ƻ )fS Ys 2ֵK_+Bј,3w &ŷqJb(@v2)tR͎LZP*1Hɚx)m76s@B۳KLSXdS 3,C`5'X bakF5NERYlfIf[Z18"@!KEW7*bZGR݁*Sj((#"H;PRZ('4%дPb4Z`@)qN\R@ i6 }mNSF(C9(m.)PqHT1@W9( VVi%jϐTWE-$Xif_yOQ1E6KtO?Θ(E-%--QH)h(( ( ZJ(((((())i((()h( ( ( (4q@ Ef ("3Fh4f J3Fh&h)&iE8i4wFg(яc3ۏ(@-Q@-%Z)3K)i3Fhi(ȣ4QI3@ E&ERnnXRRnEun`EGX3FMdS(?4nRE]n`uhhF664sFhF43FivF&i3O((њvF@ %? eJL .(Q.))CO%3M554p-h1E?Hg(/{[iEV7qu;h(Cw7vFHlmnhɧmE;̚3O=(=(dњ~p2i`QpKEG5%\hjJ(6}\l4lEnz6uv6u\PbZJ((()i3Fhh"Z)7 7 (FZ)@Iu%7u E7u E7u!j,u4;3b@%|u>>e|:fiRf E&is@fȣ"L2(hF@ E7ppQM/Fuo>fM5x_RʹE<ƞޕ/DSF:4II 6zS"K$K*ʛwi rj'@wCF'p*[$5htC\ɷ獇\b8CMjCL{:#`D 0yU`$ȣphɢ¹&IS9ԛ>m4XoIѴѠ mg MnFFqq)vw@7&&zR\KOҕfM'5&-45%\h)( )( iEfM( Fu\l(=i撋oG\^?s?QN?Q@[*o{Op2g{GUІ4n4җh3&~FJ34d)p=(њQp4sR.\Ԙ 5%{MMIE=fFOjQLׯPaKui-\I !${Vۙ Nz?ufgi [ݏ'ԭ]j8t o`.|> l2&z.3#򮒰x=cTʣ^Mp q rgq ttf3;qS+_6H5ww+E}XW X--6+] 9\nO|W#jWhˀ3WO 붊3*6qOsk0޽'Y9gH%W]NA^~ m,OFVG(LlNAzoi77S ]#hɩ6J0(IF(EFRQE[M KHhfjZJ.-hɶ3?QO?QH.X}_.c&cMg֮Zoo,Ҳ Gy.Zee&]h<6QQO0Ӷ MQơ?y=,ԔU0@ڭw潲,j>fN}$FpJ@澇=ˍݽ,):*R.4ܴ łK&4hџސ9f<qZrEuh{eRrc@TK9nY .ve1D@3L,$>iO$tjܐ>[1=V5v0^;Z-{+\NytV[[˦fF1J29{ 1GG&>1ϷZmBJ3M)ΓAmD HjȆC]luvY`ֲOyżgv'څ%(|BD%\ŕΟ}-扶t~5 L.x$;mΑ;mv6 |3{Ҽz5-;PCX>O|vaPd3Y''},)sCץ2Lсs]m&"Yj,~S}*+{bY#` aEPEPEPIERPIKIL.(Ip1ECq2GR\ԿQii(E)i3E-PIE-%PEPE%RQ@ I)]*@%!tI%#>T8$_MQdo ;ôj.%YڭAb68Tmht^K{>W?.}t`p7P61˴<`ҽVJӼ5/a3yjȹb\WTAHQV| N߄KJ+vpkGd`9w"ZxB>mt݌+5v%3"J\qHx23ĻdP@Zygvyc[^n{Sn#x=jkC2ʀRZȊVZP%]ïzB%=8sڀ: E-fxZvtWF|Sqᩕ 4~h?¦;=f궉qk*0E\27hArz3Poj75r|ёP|Ə(\pxvދ )qIT~Y&,dHeY5(3RC֏(Qj]dx(hg)1\̿SHTQnZnFJ;4S7_Z,sQI毭`K*==h֎V+Z*#:O\`?ң(]dݱ0MP=jWr`jH#8'A_zz|Uҝa zsGAkwPTb)A W<Y?Ƭ#mH&Xk3s+V3>LTmOQ03REg/;hϵk# UV{f.Y#BJ<7t߆"vʼQ\ëb3/|1hX̻  ʐzUCt~Io"l2q:ng}6fLy8`Wz&ʍ+cV3\@1bx4/),G=R;Ҏ*MH*NO'ޢT `LO>1j,TjTNf'i El*}hIִm|%*Hf|6K`OmEh#`p<&zfpFp=i[Z@I-󃖪fl>_a+5O_ҽOO]U1V>jy|7{I DO =Glun.-dWr;#xt;MC` @{h-rzM#(dtL72iyFm"a |^iZǻ3Q}R>(4S!(ERRP#>G}(rx>Tv>}GZsl@"~bzRc_l4$ԴY^yxt_ơd(?29dI$iN1WaKE3k1DwE 3+ iֺDS4R0* l7j̈d6NWCb83B+9~*Z$f!X7P*p$C9kGsH}i%2Q\Rd*FRJDuɢ0[VqMd$73#VF)k[G7zR'`ߕQrFLnu>&m؇wʜoT]}럭YԯM cֹKy'hOMidqq=(*AizR8'h֌QNX @;b_i|g$1 eO&227hYcMY%V< d2ļ}XQqzY_H-2Hda p>- stMC ##_G J43SOmHSTPHlfvс8.8klva D88>k-&iWh2?>O r[mx`^\^FhEEּkR꺜$fU\~}N/MDiW$Oˁ,g5Xq&LJčU _@[[;~ӣ%sc1pU/h"o5%T aPeVؿA׮jRQTIE-%PE)3KIҀ/i1E&m\P7?/*>}GL@-Rh4QIZ(&nhI4h)њf7P/{pNFpY}W %g|zǸ^̚$:CFPK<'[4%n{hYFsZu"4$}+gW]Zht{́ʃ$ۭcjM5C# R ==k{ -\B/˕suTUBT{a@T J*^ڀy;w=jb'ާ9n0C$%l^YG 7w'ҷnn!sQ[B4,(#͐~CSOeN R^38_Tq`.z(QNXؐHpwjC)21cCYUK& yEUXܝ'Ƚ0Zk瞘@h<ϵR`%9,j uʁY][Lm3rI)9%gRb^i³>w^g{ C4g 1C"0IFpA4=Vz燾Ÿi[%\u5' zx$0y]P8YA)kጼʬ!M3u=@>`?g8csq}M_YdGPd_CiB4x^*dZn1gR9ۨ"cS4XA^xcTp(iQFY{`_ٵޫD_1Դ D-׍֞XHé.^2(!I !U|=1jc.?hԆ*mZxP(CQ{ Ct=)|j3 z-4?lQQu5+%4=Yj0(]ŝ۟qG*]?(n :tsFuh٢֐(QHg0%L@}M7⣕EVl^~l|EjNsQ솎Ipkodr047bOM簥3B+7F2b+Кy\f\+7.rZmYF:{lJ\H\ڷ]cls&!fʠ p6^ G;s^+uۮ(A:t[!-=}k1uQ{WA.,l;iKh$Ot(k7wO)ҷ5YmA2ƹ󞧭@%wc֔m4p?Z_@sy*t;o>Tk(brN>~>0=APK)'Kma=.Sl߭u/fԤ;[)nX rHg"LH[c])c۝M, <8qڸ'< P#>Xzd_Mme5alnO 98Q񦏡Dضj ~^-Rͽ ᕺ5hꚬwLfLFX(~fd~%5jRn)̑Dj_zX`H]Wc>jU9jE@9kAW'S*s8QNRzS^Ҝ*2܊PO $!R[Z\^>c-ں'р޷G CveLWZ\7,ƴ- @FL _qS7V uTI*u|:\RQLAFiqH8\Qg){.q."{ҺFu+NvO)O:QhǬ[({F?J-9'x<9QXYz_X;SҏGV)(adB-vO9Y4H?tQU5ZFm{WQ171M0+9זwlHWwlh&8d8'v]샶k$: \T(ԓƚ}|%mKusjPV[fl p~V:=,lv^g)zڝŲa M;;%5o*7,b?Gc~ L9N#HbŏsxJp!8΀yӥ .}zR"< 3[:F^,^fZ^"ʃ㚓 XE8U;NϽ(GJAG@ N*3ϰ!\vc|ں- 9]Eu"fAՀj'QbO=fKU`ONQQxn!$e>Q m~M]yѿG 4R њ@-4Eq'LM.h6aASQ4 j*fԌ4E9ɠa'(hB3545M4qF(Px;xLrMB^r#bF8g>g}u{iZ0A<5B \2'ViẃY| pQFnqP9fmēM zJ9OŽ(o$֔\Ifw],2^NҞqpV0);+•`*=?t5"nk4[d Kw ƖI}Eg޹4)<'G,{cGOΚf8޿Q΄g?N?p!-5 USn^CΣl9EFڥp?AN,T:F?*=rp 5U´%]E+ð3d U oƯ̸* >SurzC?E]#ic.e,Ln/I? WM O,QxݾiXO$_hrx܎åuas"^(k;1X| mP4aWcSj*HDۖCJc/VnЭz^ΡI{Vfs֎R\i>\ёIHh~I(sI\h-I@1g=*F9jC"U3QCiSVsMRBP_ISÞ *3N(dnȣ= t!4ӌSRWWhNs@A;RSGgQ4(uوN{uʸ-[G8P.dYHvJSOB}as"bơ#}gh]-}͏JE.Bu`ƀu']e^}:Fl)+0Y~FZiZ\}9qe^Pig$lפKSRc[igG-9az"xP06/5#cm?lolGՀc.h >S.!#S45ΫZޝSH9J?e?zN[ v贋ex3O0}BֳN)kN}J!e#9!w2~'0yuS:Ls#_PrT;9i ȕeQcj6exW ;a@Z#ZQk. \<6 ~"І"r=ji)Rm8 9gu䋕asG7Wܞi@#s9_s7:M3ԉϥj0瓊a94_34ݜu8|>k?:e^AȌFIc,tu<|WKH)U@iX֬)*\W*"1aN Ҟ8sS6;uQv11K^Ԡ@HI1KJnygp)F)8O(NL@<q.֛Fy<J=;S$'4i&yݚ ]DcR\v:mAO(pQaN47 W5'>I.znN!m RBhTԄ Ri2s(I 44i=:Rd4vqHZM4R޴Ԅ7<-M&%!uzX.yN4=ksSs^E08ouݿ%(}DyK _Ref217894927DdN  C *AFigure16RLAHݦ QkPoj({F AHݦ QkPojJFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; " }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?xNfoe\oR5ۅG_?iBjW#sҴ3Gc)iu˦ մ?S^j# 0Mnq*缞-]y͟\i.zURLb:cG!X/Lzc+ԼoHp Lkc,[lKle;u 1/^Vf[s^X}Ķ0qMښ}u9b sYΫ3ƽ{$u݅GHy⟳䛷϶)[yz~uJ4sְwqFh}fXèGnU)|IY# ؎MQ\Z>- >$Tԕny/r|Nh~V> cϼoW;yޭ GjRm+mljվ]j1U&/B>7F춵rG_N`,Ӽ@ RUtڙ sDџ3_U)1PWf4ꓑ>s;VmgOAin\eyxY ڌ[s^IG8UZPc9 FYH=E5/EEΫ98~QSeGdjӞq+4n,cJ|[97A^:\,iMDP̓aOJ^" pV^\+gY 1*V"Y'$+~ASv/]z7̅e8)xZ"]bt#s/ɸteFB;㩤XPEُ;A7_Lm*꓅ >\Txō K3+ecjƸ_-LUoee$pG8y=b>-+onA0LR5{~ϯjό |0^@x# Xy2@l' Y M_W/cnm5@eZ̤}*seuP9F Z &S-! WngM6ɠbkcmkC5ُB4tues$+sS@KXk`,jye{D. vVEUо$c &s2pO>Y#rҵ5+@OZƞZ/K J؇ W۵o  (>2!*Y13-4:Օ6wj7Zݷ Jֺ^⹕i$5EoyX\l=y(AV++]^ao`NXuOtBnn/RGGwr#PĄHLn!۶i&q'":sObQ#&'z(v6O hIiҍгJ[}r)zcF1$W)Y0_gfV;>R=HT\BFzzMAշ|\}=)Fv\ 8_jiq -OsRά! Q7+K>X>Z.}h@F+Jd-^9ܭV\ Dʴp|v`2Hʃ8N܌1g*ߜզ36B.j91j=4F1G+y4NRo8isW+/v}5 b5v;eURsSOz($SR뀘ZBz拤iL-q airsȫ,perj 1i]ۤ0 ;vϭEVfw"0.bzDF}j;od5 $|oyZ󔀪"CSZ\B4 B .5)5r2wj;vY /ضa Yi>c{ޥv{yBRq~2H [cdrAdu?J0Xh݃zBR[q vU%=*7RamgBxu9( 3&$G, ²*KZc)Tn,Â)A<߸Bc,{5Wʉ]UYK瓞~K3[410Bx5=vO W 4<qSm.(!p0ҞJڳnNq Iۉj>`P$PryT `}'gp8Iɽ)tN#' 2rzH[IZ&ڳdVUY#<cٽ~WWK{x@q A՘.w*8X%8eGN:S–4Q䷽-mqrH9Rrr9[$Crqӥ< ,뽛0\zW.mTx\my6d BO+W.ekӽϘFO#rFNA$~{\^þdS+ڸq麳ĒYqc҆m7F$$w1V8"dH*x. aK1hQճ}k 2պM EYi_ִ/#XKuxjHL,s c*MX36J 9"Fg>O&fkh;dFBs4^±MNx`*neU|[FbuO${UЊqb1ڒ&fH)ǰcR1ObXS02zSJQ>$:Rq;M{'|Jo @G/Z]^b:[Hy!A ?~!v61AǨ.!MHBw5$y\=s#\@zםs@]cpzYbid]**#cA\o@lCH#3*ZX85SLӊpSefN4TڳZVi?z lAUNO8ˇ$rj IB퐻r޴49$bd{9`+-2KJkC@$.s_lV|u^F ynРp oE}0\nIZevlEo89au>ۜV;VI$;OJTܥ+K@t{xީm2ZS!:zZpDoݘ+&N?|0).#@1+4#pG;{>]w}EMvԊc63x!7ʉ'hK QYI'' Ⱦm/qsE!h%끊}{mxmil"pdn{U ,@ǽ<3XL`n%YvN\wPy60JNd4 YH<`U>J.#Y`-g}8XpnMNN{S~h-t9fr]{-ՀS٠;eUqMWWFx_Stq$2=>^67 a^:=E:W{20c8?^$hs2bI[< - <:lb"6a# PsZ[iM5muUywX%Cz1ĒmR9O`lmrFPs2K3oA| ajV,HRBX0rKld;@ wЭ{l2#5#q^CúDzF#O_s~7 =Ziy";%!@z Z+"WΑ;`gvN ]L,2ƈv{'D/ɹOWxC2xwi1Ž<93a7كZF,l] X=X,򃪖j(#֑WHNWcDҭ>vT\Hȍ{T'vk#>=<дjnՙwTI"Gz.|ydDqџuog/ "hI(N+3Ƥ[~gN;UG\Z9 z(waڐ۽ÞWA_3U$u5$BN2DVnYkZP\O:^)|ps]*; %5aEhANWHXrRJlظ;V5T`VNb#kc5*y\fO#j +)H]EkGqYVvZ U#ҳ0j GQS5-h5ؼ [=.JM@mEk]Z?ir 6<3-6KH=EcF9YdDڅj"Ϩ5X(B¹g9_VtB/ZdUڧjڴ+^|+15>^h3uwQ]ӵSB<_j|<[|lۻg7o'/YpJ0Jpq́ ,0kDGBi,S+6 Ks2O5ة#9HrJcQ*le)-q}= A(r{~4<267:9$L.wz1/ øXfGTb:J [sK3Er[`r3\Sfp N> + BcTyncުN +~V Յv|O̓LSܛVutlNk l|L+( 5]e'p#֮#_ #TVW:$x$K$:׋m`,漺i..1fkgS:*|c͹PFrSVz+#8=qַ,#hgScƾ;\m򫳗h@9@xc[u JAz wܩz?o ԂN+~)_TVL{WY88ڈTL"7YWeqҢV )S^Mr9 /5ּ++@j+"ި.޼8OxCMF/\9 9myMm $dַ[ 0۴u֩Y]G9*ŷZk~~YYo4tLn=+&޲w2FI2)S]|HGzVwVoRicitnzVn4Ƨm.(CJIμSKLco.gJwXMϓ]>s 7L 庈MngmFFk5"ANIЙ`1Ұu&eD8%d2b,u#dޱBzɆeKi*"_^09#M9r-y&ɭ[k"8+v,k;hw]I>jMA&*:.˭<*%zT esV*øcR*#['#}[H?ҽȥy3we=&g$+"o}JpW>+$6䃁ҫIL*<1Ug4g¶Hth= VgVDcQ̙Ip2>_S劗*[NdcJ&WY #dRrѱڡx"KiSxYc Zn%VX*XN*7RH^ccGĞiRF1TG4pI,bb=pOBV2&DeF9Zm>Q{ 0z*5Snv6Ӟ5-E2;p:}I=~όOOHcGֹef He "p$9Joli  Ek6g"S~7wSBIUjwm.%|n(~'[ܦ@ۇsp|K±GzM}\3rKa=aLsU{yE:n@2}Uu#M2c⛭^-m,© 1zʼn]\[l+9=ZOv˙$~޼zؕ!Pp3E$㟊`΁N$cAW]b mfw=*E_FA{ʻ VxzVo*ltϽ(x捤nb]J$`dO&q,0]-+?]%H0Zʫ0*6fEQbvFt噀v B "9.03b9RY Rqؒ5E<80S c;G2jTAMvA=kJz&{%g4*q䜖>ޕXQ9S9#aPePϻb%$ {:so =N^| ;F%Щ0M B^q` > ^#$Q&5$*kM[x^~qG*;-JQ$}pihא8Kq UI*+>y(٫ֹ[=a.6njz13u9uS>9ܱzͺC&,j+JFW[k]lzWM &+o]?)0-`ՕQ:ՙ]Z"GqVPo+Fhn%i$Up$Zx$RKHPj$2OsMWO{2~'jc %3\֠eÑIKHm5eP;űd'kY}8[j_ %P OәP^qZKjGjsQc-g]rx{hY`nZp3&T+sÝo1rsͼۿo\t>6!8R+8gx؂qHӮ]ο,6T Bm1q"Ҍl*Ƌ̏O*6~#.D_6p@?K} EWDCҴ/ ۖqqY!|3=:~Z"``ۤMOf_/qbN~VYn#. ,2Kpiʭ4ROOJ~T΂X=0~DQF ϭ癛'+{TMB|HU,(g?1Piays)R/!7 SDEaLYBv0Q@ Z'%Pb73EnFH 6"$!ܱT'*;-|ŀqkldAGiJJ#ڟb+B Ss@y`]|rHKD1lAשG)eO,/WXPϷig\,bIP$ d}7殍/Pk'*I$LGֶA!nAofRdMXITDr݋r+RB?5J!DY`[wt;S{B8ۦhsHb\'8*ذHD.S ;')85.蚬`x [۹uk>//1+>{#PWw_Nx1?w3J cGT NG8wyQ/޲nXΆFYa01v4ΑI|{G7 }y<i57}G]+HA\G6פx~ejG H;^jY~1]gPj[&XԂɧ&/ _ɨMlFpYZ4+o ZzPnwK#9>xœk'E[{E)^&|֑H{?vU㶍Z< nݷ{Vi`Ug?J;w:h~74rqWj^tH-+v!d8Vo1av.N>NBTIX́9ɦ'SQb؅#y;ot:1G7Opx{<Bf{/q(&ہ[v%,N+C=Q=gEo,T sYԴU9:kKP Z̎W:3֬i1 v /3eˣ=8cSsڹm;7zmVpIMŀv*-u%Zk8eꂲ|? FV&3Xʕ* 7vh=լDA.-d*˜5)I Vyߝ*`M;n=k{PJN'mNyԜ^K`BјEh=3S,`/&*e@kwKѕNJ~fe plsD0oe5 8yA{UXKr#T쫦(+ _CQ e!`baKYjkZ%A*|sw FP9{繍VF,aBaN$LY ؎5^x#1N7r04O "%pT )w+(fSOgX2ҧ4gfS#w.4r`ds# nbs4RG𬛃RDnB0#WF˴֬9k&G%l_^jeP0:;b #)b[Xu?&5bhB#rWsVNY6AWA ޮ͸G6aʗsc8APb&?tf/{B}HHD ٿœXUPI$,`j〹T}"c ѷʙ!8aޙ"INUS>Q@@̕ x< KvMFCe%r`6-![f'1elgqݚad0iЕi`'a"BDcSWbGKi絙̊U{{QKE ISN"u(G9Eۏ6> s<¥RDV{9[{S3F~TuIMEդP|^m. vTdݯۼ$ǚO'΢aYfpqK#5#0VW-08a45$"d漚p"Hq" >Ry$veC;2aމԤ%ۻ8?_(vU>C('{[鮬 ۈ Kȯ"+t4t@K OQϥE(_%fgSrG/c0(IҪ|.]WdOrG[vBkWmb/p@'ְ)2T9GZ XB+,p)'mƚl[Aqm,r Uakfsk"M$jv+&MC  ^dL*'ҩyք |25 dcʃG8 sjQI!9G,d5ZDr|3yH;M"oGP'޷G"tc?Z0DtsYB.1JJ0N&n$^̦b7р~ 34a*9|v CZB$ul*0ʋ9 p穩)t]c<cR̩AC3sqJEigDH1gh9j-HV8yvy,dp=;DBHAi8'q_Jwuc2#\~tSi@bqS6C%2>f:(,(K9 GoC鈃%&WF$m?H񔙣ʻr5TjoG e/) phw%D ͙g /W_~41d#xּL{Bb(i!IJ4m̄ctcxkC|ܨx,ҮxX6x&"y~Q=kBD>@FU$טj:BK.wv܄sX?56MI[T*d7r_ ?*}>qmyHT u=#ĞqGjv䎊8&[}B | Z[=bŚkmS"zxc[Ѕq,.x+@ͭ\<8V8sOδE$Wmo Q~=r2e~ECFUԝi_gT!}0? ՏYG ˻Vg<ۅWn6{u ^f.~n`⛾&\Bg͒7|ȭQ$hQ OҪ+3.m'σ1QԫتRGf>H >==M( ZBNGbb'l ^Ύ62Vܬ|W|չ?ƷSnX#٬I6h?ʴW&VRW8hѸv@jp@ i`qT"%4WBy ^m$ b_ D!ˆ'5[bs*Dz+u*$&tҼW777Q߽Zĥʰ֞ȦvEtmYKV8 񊨷oƄi,mkEtԩ{)G[ȥ{h XrBr}*岩UCkׇxVIjÙ])];#LX}*HbRHPNp~U^DPsY-ZpÀf[ƷlѶk >جT^v.PkԒf +ob\u8WmX+Jdu_VEa!S< jeNʿ#f׈dV\^!.ƽ9u4.e Oids5ڼ C\r"x̚#M5’Xr'nƋUr5v?kgj"FXePyj\lE95GEjOh۲0 ~4|Qy #)RV4fI: I%܎kVadn3LH$rEXk 4`zw* ) mw $p2>&O&HUYUN}EBKwiy-憅"HdB^MB;ؘm9\Hg\T̋= 1|Ӥ;H]֚Zĸ.Į#dOsS,+nB1T<\>ϔoZm-Kb`:WO}55|9q^L7Y0I LZ̘3n#'%tFַ.TD ~5!K!n{f q`s~ehÔ+;Szy $hId<3gڜgFԏ$nx?M\CD7I53L0<30\cZA'Zޛs$Qۖeq]曮]\q37Lzw".՗w̥qcEѴ@-{pI կR:g(4vzӴ)`FcqJfY-sm|1kг!`9mMVI`uc1$lz=h1G$+ӞE.WfET>9fز*p=jieؘr9DW8U1;y/榘nڀG';9 hPlEe^D(o RRc-)s^{DxLi37ƚ6~5idoj[*p=>QX篵sƚo1`&,sUrzSy%6jYBO4\@U-;u2gjm"S$^ˈPt0Q 8Z䳸XӖ"L**YOQS4*G7.Ւ4/+C2}uF?*.eا5ъM2S0gaRk)](a3YdrQp:-;*և1!v 2HwP+dsܚӞ^|ȼYq,Mּ\`w2;|)DuNZ…vOcXOi,c%Js[s5 @ǖ'ֹ{˛ca]_I&|r ;KWFimy-\$tdgzz -f1"|O{Fc i# @ Ub(Y#=)& e`9^=>C[ɚl8W6HRc˻.4oZmnR6چ(C}dVe$wAW!rAMnR7nEVR./?_z HC !u,?pڣܼX]KId 5 E\e!I%]W 7CvڌۗM퍑>}^-4}>#K@'{|et'Ҧc#NY`;na$e`'<4FS/y~@$-1I/0Gқww",X;2EWR_pg4dP~_T `VLr VooZg??7^p\g$׻}|Vȓ|n!fEdnx5}좱B~Ltt`ҸX뚙! <-Tf4ml$$\GP*Swmid^Gu,EI&4_Oy* M8c˦!$VK;eAVk8&QIMw&e[YKxn5'= LP# K[`*Ӥ=+)SV91Pc-LU NqyUi n*HB8W|SeFHG8.d9ؔ{TZ]VWpBԳCe KWEXFk2,-U$hewZq XR0ySh+Y%m: nkxwMkv֪LJ-z<+NG3ak1(\W3xԳā<@P zLJ7<^P8'+;R)ZY ĬgFdSYZY1ԯw`:s;\mcNk# Pgp M 񩑖D:; HIB}+ W ܹݹIVڤv2M+6kedMW%3 s;K'`Ĝ;bK,H<z S$.FKpw)&X ƬĎUaBtS_֫q9\xCM0<3wAG'rAaӅyv =>.mʇhB%"͸Ӂd0ꯜ:Yr㑖ɋTfaڞDt~bX/#-j\MoHb@pז!BȦ$^)r) M%{3Zo%brIkʵC(exTqI:f(ccV_PsZ);XH6Rcw#bИedd}4DZoHBZ@m|bFI1Ү\,0?.f3u  idsi]]{"U 8z`Ơb(QE2oܽq[5ڵՃ+&GsgYؒƦ8bOHfh q婩CYybֽsԙs] uS$;PAO 9X6h0.<Ң RP\ɩAkVRsaʶ4/H뛲aS mjS]Zӏr(} !]MZSIV=JKzeyZu2^16{;V}ҹBr0H1ִ|"4R( F9GĶimv3Ovh"ݎVʘ8^nH22{טjRa)^.yќy\kH39;C{˧%rzG43#nQsʟCU?7\ڸЩ{#nFqkP[[f0^F%9 q\č+dX;2xCYʳ3m9{3JA8b@X۵3tUMB;+q#tqToE.dV ?Y]48O yM'}ZydNj$ZZ/s5kMY̸so.95$fb/\$kOSCXbdONfPJWK^i' `\zDU:TM+ db9F;$S(ÆJe̺mqf _S\/nVFQ\^/Y򮌋zU2|K]BTʐF+AK!X$q!QL$aV|z2b&MBhW՟sst+nc}1tC005Hy0A[F͙֌%13$wSL#E~OֳAFcP{j!85 Uq4?9=:w,D%DdYM+;l˨9&w G#BEV *>Y<ڊclP= m1|{еCaƱGSw `;ai.!y5uddI-Dt?>fToTUlbI qg̙UrP->?"VGCx}*Gs*oϧJ(XF#[ʮFo4m$`6z ̾pWj"d9JɸlTP+z ?o }5'h*Aiu{d| :+/-R`ۇZو.fd'.sap) qLsHqfvеg ts5mdWƲ9jkfWӕCUVR޸Gx~T.ߐx{W}9YKTv^D6"%$4PqKZm\*AmhVVr!iRF5ڣS袬bW9o WA++|WF!rWڂbe2DNASTnj D`a:/F,+ңDatW+X7f.ъ4)5 W{TeܔFK #:Jqy=g,`\\R^gk)6e7L?4y-nvX jU[َ;Uq~б] 54Kk6ƽBo;Y,޾ٮ[:uɔqt5j%nJ9l"bEr!y)?/̱MqDHx+E3ŶR]Ps^u[.o3%Ccck;6i5jW#g,v4dlq=ޙdc#@\==W*ztd~_KR\qQ4۱N&Ft {W?,/li EuwJ6W?5ǸFLW,fϦ%YMaZLB=fMKYGV{d(cVsʎB%=PfmO:$;ݴڨ}0皞L{FwIVzԧ[yns={\dm 0rڥӉISxv'?ڂəSY 'u97FI5vQw6t,9d'*ww`w=arȸەW%HO'QHc-{h&Et.kw(}jZh ]ǀ01g<ի0_3Urk/?O`*Myu;ץܶ L&}++ _^eD\j&@Q]烴U'uiWo qJ5zK~@A8#h#u)5hq^k$e&*z\mG+WAx]>UġXLjZYfsج5(/2E\G8L:`hjVѝ%PYά}3/O%X,dκ-d{'̶c)VK6&8.F!Vv<ɧu!W,OAcr܉J885#(Q+HMjS޻:%Ҹ}>jڻ+ {Q)'".ˠ`R24 HⷕM{Ym?sZk6 բIU + ^v(ʽbⰮnZbA5wR2;泔qTb0V JCѮ`ӡ1)!=3l"gYi@@pCSUu˴-laǿi鶲$~ivz}(-!kfXlߍT.[W8y 8ϜnewG/(݈ks5ۛ'Mk_G3To% dV)#]^yfU%GAޯhĺxV'޺mi4m b;Wfm!΋[ѭ㷗r 7)_9>"xu]?_{g5iAʇ.aSYOȇ@ݨ#NMv0RNKnSª鶑X"E7̊V}ѹ>UZm{t-IqQ\M!;[ldFI j2GSQӣi^PB~f' !j{bJc؉by!W$ n ߙ 8:Ri]> o-e; oimU E9ǥZŲ}9Wmcۚ3lc"&8v |Krcu[EGV'b'pf&w1Y՛N6i |L U*ib⵺8=nKǖI qW<1iu}sr׸+sGylLjnь僵mr:H#;xqF/&kdfI`;Og0nu#9]"qt[Hc>t{k?<ʭX!R[jDa;rT.HZ:XqZθ#cv,@5Z@L+J.~E eo{V@Wi2䞇iEX;?$#dHI3m=RJ$Ԉ*nN8/,>e!Е#~Cqv`qPIi5c ^=M7f]՚fz̒ܣK&ۄ<ιF.<pFr B[L+0x9;`_JQ- BEE:ś1=1M6yBn6p=;j*.w=g#*ಜ{5$ʀGXڲ7 hz]FP ǜBm&\? z[.[jHEH}j-#ouxYvmn#;x~$Ʋ9IhA,QWֻ+Y0+I9Ր2&>sm5$6\$zV$E!+-3ޥ,Ms8;n<ҟ R~cߵb =fЪ%_C%ޣq,?oIwVU??W`&xGv5vՉٛU㡭rtRfjbXHg4ӱ*ZʪvΖWJKVcmp_+R83^N+̔|k|"4v٘}tU~%[=^WrBNr+<}Lvr\xҫHr~ʧ"H#LVEfé֩Iy1c3^{+<-)⵺W0WK6\(_"j[xi=uS;5m* B%Y^uk9ֱ^ܽS8᷹22q uu)9nEv>0{{d.+h|6EcxrzFM7>}j[S@|լQ'lh]sl#k>Ciu-AU-o|Iqz!BF0ū bT F~rGq0k)KSh]tEa򴼳 =dG5g&=zsq|p=ixM3SKF+ʨNsplejC6qI38E|H8ڨ\VT-ph(gKmpR  Zf8VO7^kmlo߀ްM5&e:uyӾ |LwjEafӥv\ w{͢bW4gonf#Tp=(OR{Xn>a+! ,Nrj;y!7ܜsT܆I'HR "gIRqM9JE[[hRQa=kYfA85wV}1[JD.#{cUFCY, v!?!jo"utBŹi>P;hs늱E!sHF=B\ck6r{jnZL1rp0{f}daV=2R<.@Gh[a]ЌSȩp@ ;*ˎHj_5s{EOIx׽ZQ5rlQ!qH!i[Cu<j]:{W&D8JC;mR^{,q\գsh!澃3$B }gI7VWYҟdKV?7vs-?w\J6SeQ,F!K5"ZNV=x4Gw|-.̳`jz3iYdWq#5>kPrq]%j'%*s;2z/و/8P& NKP-<6;w>st<}kPJWv*[tht8@F'<'FAg$ƭvm8Fу+ 4teo5Lj.M8.I'YҤ.zc#V9qz0\[RrcGojeÚ2rC}jk4xk-#`\sV9-LKO[cppx=4>+Arz|U//@6FojIMtR9BGoΩI3mlhONgv:ºS9Z` n(A2ޕG*b }jM _frr7;tVqڥ .=OYA@d*H8fRIL-IZCOeLd+6~S*@K}ڞo%1DV?= S VvYSíbb?(㹮>|3YIJޕ `k)Jos'JMFranz,!deGU#0SZN2ٓ1~}` ҆w7z2'$~4v%vm1=s"le[YZ2djp>qW> psMjˍ;3oP'ӁO6*x5bŐĚo@* qq{EܐJyrp╖h0U -cF2{seMZܡI+#1!x=*%AQ͠ወޙe&;Џ½Zs":TdW ]REjr1W__UwGɌ'j߅V2i _.%?jiJ#]UxɫZ'\O*k jqe.||ڔjVxՅg#+7wQGb-V{)(MFŀO5$, -*:'A UkJVv5UI!PTV cg9bU{6V$A^kzH'$ `Cr a*i,n l|mj )giҴgHD0d &0SkaN0Er2N@5,0.@/j4Zi.Gޜɦdn<N!>b Fv*ǿ7#0D0Mҝ$qDP|҇fhsSm "gBpZݜH:ݙ,f"'S['zhRq^3cDR~廓> քW2F{bt%CZQ n$o|tt1r3TVuȮqޭDRW*kef,0aՄʅLgҳ2|:S9@F*G]MC S.J=m t1o#VN3Ȩ18sϭ2UePCnJ_jݻW rZ[dSG)[6vɤEiQPEIzD+:]2 ~REv$f+ +'ErvMoV.tȥ˓G11**y Jԃx~uVZrk)z995.1&iҟSbpOz_Qq2 #> Vqǯ4˹QU/@ JhI^K˓SeY>@VχIh؏b+ߞ3H E;S.ln-% W+51]^ma嶁TbIe+0ە4sH]3v&[IgRs]~.;g_dq3qVJ{ niF:TovcZ7lFzՃ#l$mӒ+d:K OTg瓚|ރ#5jK{`UTQC ҷIoihXE I-H sڹC 1RE!Zt%IɕcWYBvgVaAJnV?Ju;?Yk4`Ա!W{~7]vGZZXo?J]C>"5fUm8yniYrj(q?Q3;NkNYXvDݗ݄pЁ\IJ2IaI.:"-r$g?NrOZ˜\U]/@: ioG3]rp?[y̨W1[T=>kli1.g)+KNrv {۶´jT! ٵպV=tʗ?W4݋i+AkVB,Җ8=~(MK sTlaAO@WԸT dpTr9i\1=1wZ,vtoH~eoZ5}&Kf"a [֣.+4׬"B7 sk"IsʮHcu+. HJu=kI9@qWZ-jsx{Ҭo1)^v֟smeUfVڍ!$.=(ՉiwhG<`0zDRp{݂[|QԖ5C.Pv=ô!@+'J).rLJA{tB/sʪ7qo9ʎ*t-jݪ)7=$>A^k|φI>|I2HFo;pa+릷JS#zQ45U/uJ$ulB]NЃ^]qK)⥴:|FdO]N3ַxWp )d 5#%- Ohl<^2Z暈fB:/m^1y~G."?ZvIHRyX_q;A.@JJڝnsQ ֪z!Ol*msjtKb$ަ@K:98Q;=̄7H@ S#ӥCWbSA,+(]dNج mzSH" OAcmn}S 9Ϧ*{9)wIu`r E쁣_^P/$a- {~-sJJ1?/Ozԭ $2xjhS,g@ C I44bP(UMf Y\`SK: :'e +Q-)PjΟnZ2ͽVYjg97`YlqZ;g" #37Vj¬.9k jdV՛HXUKmb!) jRvV՝O퐈 >}+/Πֱo1RWZ#UkɌ,sζ崸Y%&3Qg9k[#KXK+;}I'8H#l59%n}Ev|jqV]y}hzjki{#TrӚgُ7&\6Y~fc ] V1^A,;pT09ڝmq 0GRh9fլe+a~UGVEV,LJH޺6}酐>#dJR@eB5?o+Lc\C!ܟLI 2iJc{՛Xx{KcN=\c ?*sd$*0;ա"t@?0'5n.TYү'9ZHދ 7(8Օn]Nڞ<{ZfGYNZo|/z:30W xb2:_ֱd;t:&[5;7EE+8mIŝC*8q*"23m{ҼgpB}sP ޯh]󤙎i{L0,V4F4%f;/XOAVw1L1 wi M4A꼇h1Q6Osl RN1I'*x hc$M ;Ӄ`KAq(O qKMc1Bs$TrHݨjغ:r)>jXBiYdq] _JlWl@1\QSM]X4|ɲGj0;:;+ X:sִOMb;rO& ^)𫐏9Dq.XcvBAc It y5[DfPZ1DdK-Ȫ0sJNoCHgEiZ_mk/Py33=ϛ)>ՙ$C[B6VBM6F0ʩzv. _]9! 3솕-^hЫ6s^xJ2zUD?aL )T'U!)Drׇ+导',@*9-c`6)G(j A Ⱥ23̭&I@V G<&LD>Wֶνh8.iDDʢ/[m%w 1U䐐jCP&Q3rrsMT}hhӓS\FsUHlYYwJsXH*H5w!?7UOZ }ku K{AOT "Aޫ5'$Y;1PhdSC* d|krU `Q M,y&9Ȫ0֣3 uqDg9zTye O#*m}-D3GwɊ$"d yS3)Тΰ_?KcMUiZN~B]rЕy46 XZapn4}202jʹajP1p=V)ęji;|,0I-vqQ卣zwlѲ9GE:֩Jۊp_z+*<Q- +pOP֪ *qBqm<,M+*D-S,J f95it!!y7vҚA94JFEb44tOo<,cn:湨5;ҷP nڙҪWK͸F \F8Cs$'*MD̵v;DYw\=mrHLn9\=b&EyI)~d ]ԭ]Y؈>gQZY}͜ ]3W;؀ۓ։WdN{T~Z3dd]6VRzWKtršvȞ֓+;A#v+0l򵑑:4jI+`k;zd3z:՛|4 Hj;bc8zZc}@KIӺ5-Ą6 ;;犺d3㠪9J>fYZՊH'j' XHQ9 ycM m JpK.HJNJ5mNVi,9ՙ"f]V4GcV48rܦb=' UMǥkYi(S\0Cw=+nLxqiAp3A^jĖǕhPGQؑ#1'O-3r )g9[& θzkbdRIֳ'@A;i#&<|˂ {?o ^Xv8>?T/}o Zs̼s"u~yQX?j#5k=.?UTp-IB5PJ1ҏ4*\KA*)nNx8SO WcvsTJHXA^jgW\SzV XhIQg]n3F})n֥h ~3 ̛N "WU&9QZ[Kge<) 5\zʱ.4q 83^iM] (HMe?2[J[2XyLbbҌ )@(gqy?Q磸x[* \te$^'zncdp`=k6̓܊H##%uF:fZ,;{ڛ#6:P!ňi SHF.G5!oJc7]lqjCMZF$)oSsFh ;XApcMϿZBqNIzӃ qJLr*MRV>vAYVwP+R6pHп 5~L d8\s?RR:xոȫ+2$2t92)FFsfsJ"sW"QR龆h9FЫSRUiH9QYwPHP+t.Lyq\ƅ=*q>r֑8%dUx⻋08P3XW~2|#]=0&ir=*R"RčÀMHr'SQM=8NE20jqrFk#3)ԺiO"6$u/KOzn}PswzCjJv•+1em*/0<{đҚGnHlQ3G֢҇8"E->m~M+>r8VkM ܸ,k"3u⢞°7zҵdI^KW~fJO<SH z k:ƥy \\ 2qU?M?})Q@ {wMG) j( 1]KP>HtZ(QxKx]KQ Z)Y QcX]KQ Z)Y¤?]KQ Z(I?u-H~L j(CO_Կ<#<.%?cԟ|!<.)!)g)œSQ wwME?Nx?})9OS{ j_S{ j(S{ j(" j>x^?Ri :#n>xxWt ?\w9n?Q øǓqڊ)*p`uqڜ>w0"xDOԫ!z$E1RɿKIEK{tH|g/4QB{؟h_i:#u_h${ ?z 5N_^; (?._ԟQZ[A)Ͻ5')w`>ԟ>QLB~" jp= j(` _Z QJM~x@˽4y{ j(d1wσ(OS~{ j(b^'=)<38IE0?}DyK _Ref217838650}DyK _Ref217839502}DyK _Ref218237554}DyK _Ref218237468DdN  C *AFigure17R  Z̸&4U{F؜  Z̸&4JFIFC    #%$""!&+7/&)4)!"0A149;>>>%.DIC;C  ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;Z" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?P\u HdUQ3b0ibB?ƹ]uZ#"qQ ~T)tw׼fe?VS?O K եo ZΟ*V8-URڥ/ޤÂ+l3Pz Xk]{P}psM[kEEOjʀ(p:Q%$^~tà|~Ka+\mwPG\ KSkf/cfIX渽 !=+BU\SAx\6|J|.wN{qd:[kԡnz4MQDjhFZ jz2.x6@~uXku[ u4UE9徆5~?k{4[ճƩ{5L0Q!}soWVh]sVnzS8֕B"/.}~Ckzx!Ʃic^b|q^C0Ž5Ko5Dzѳo$݁t뚹]Z%Ɣk/!Ƴ v5sz\|K;]AD:/$`8c1TL(_c3i?/?OH_ |ug#nflar3 xV;t Pcտ6_*KN?cտ:_*LPO4 s_T_l &Uۊ4 ?տ6O*KOGlUdt=Mm/MT?U5Hd]!O=I5i񸽹}h{szA46<_XttbZ7 suos6>(7nOn ɘϪc sҤ旮hQ7&8g|٠iiq֝7c.eF=%BX󚍛M; K'*am TTvLqYҹY tƢ"ik._P65;xqin\ =I$P;v=uAqt=q;|E(xi5<b;dbjc|M[eVA6'I5~RPOzKV,1<t KOCT&= 6ҳkcu̇Uu_)@.߿N5!6کw&s S\oƻpe o]d&X4ron]Կ.O!ԇI5E$T 3pٲ/dGܟ[Qkrx>aEoGQ&Hů!ƚA{T娻*|"S{n&hřBXvk%=x} e^"s Dx6Iu˙Je4\v2zV~lq[K5)pKcHuV;&8'V31y"җ'GnujF+Q4V:c/?:bJv9O K5qmt*vEE5̃b_tnhʕރϚlPStJ4;-|\vC1p0)0z{W|U}Fķ.*\d+]oV?nJwpøj97 5-[ry8S4,pf$tT4MYI*zP~3X jdCRactK*- N s[]hk}:.UG+@f an?*J(d)F?pfKۚ,O\jt؇[)~uTkRf(I؊:(qJ(P~($A݀Ӥ#"iS|+u_GPuޔйs=*9r2 g"֔mrb~^U uM)W3$.Wg*uGPȽtT4 pZy(~}=+ hB:MP;6Q˝9qKnfs) ghW:i/6Q;VX ɠR2jxty5 J` P}h)S=xTa )ր"b2)2y)@ Wd IS¸E!P>ԭce +<9Cb[w I?+eqQ|eR*X4f|ĝJ X = м}N4+>F Ax?wImǯ kSNclF{]ޗK>p{h8/O7w~G〣nxx -&dܹx+öl*A˹7Ԧյ)nu{(L䢴4grhxGaRVM}MM Q7+DO< TlN+Y#5׎զ񎵔Bz3֧9銭9Ԣ3JH5{S_Aix]z/R߼Vu?.F&HUfЕiwX:ƺ&a 1R5v]_gl4Hc`Z2J Zu;9s#p HCoV!U8Te;)GZ4NaXlkpYS7 ](/i架Y)Cwlzx?ӨlN[xT H{(Vӷ݌ƠK[OӊpL m)OԁY~!v!XwwlڹmeQfF݀#֥Ϫ]dK)UV CH2rqӎ*@3Zw8Ǩw< ,r=(>PrFZ->j:|7J?($z⸹nK*uĚgcf| H?J浤Qz kqzHܓ\ɾP|&6C1{H_oy>6۔G|=[\lRuoo*yJ+l+\嶖KydeªHs]I`UL8lr+;]̤1x85*zDZYZCϡ@#:Bqԁ?Zhӏ#;S94&ɩ18E3s Ps[U~0çU0ִX@>n~#:R(˖\d6ˬK])OT`{)>-VƋj+ct*l^s2/iCGd*z7psN zp(`d^VoΚ}m5IIE]2)RHWڣC; uI$F9OHCLJSMg.WZ]㧚ۚl?xHuy+z֣(<8q\1 WQ+?\ctޝdw5hlYqڴPUAqY2*?Ҭ7JsN!&#JH-{c} EtS9t8GBwXtYleDlGSjSvn9?17W/ف)1t8 s[\ұG\Ek0kd& A\<ӹ"y⎠8u>)ϱ (I"x意63wt>ƺ/[L 7swͷ3ҘA*Â4wSXy\Y^03crt1)Œg@F=Q`ew1oĒ \9`f= a~T Ú&s=@Hd)O84  ɦ# q`U kOSOgmnR?JcGZ2\f9]1cu+pjXH`q֞= {҂FA* s)GP؏ /ʂRde0k4)>:X>?ֱǿ1> l NqhcjW_%>Ye=9ϩ4N{lx֝kk V "p>8- x 1Q<+74тV4F32W3fݨzU U;Q[Ŗ8Nrjpyt"2+}@?+i~}EtS9UԮ=.$Pu*Q$MKT\>yVQCSComn@ˉU[#$dTyR 3fw+称IN Ӝ.8ny'R> n] U^~=1j E0?VՔ.P*xOQGɧڂ:vnld,#h2rTݝTh&0Z }(Xu,.OCTd>z/^i+o֝3/M~g{m[jШ E5cjı+>޴Eg\QMJSҾ c^"t״O/*`'ßhk`W,.<JHοR9-n@ ?aY=5ED8θN%SӜ5ʀG=i<dt ZGQ'tR|ߑ_&? ?Ӷ*56؏)DwEv╚i dxjЉAqF]*X?#[Z RDmǸp@52LV )TuNQ?0ǸБ^2;E6[(k/ҥ/gLFO"8ges,cþ/Oew<#OuQ]{n/HoQ-Bn[ =B? oF%xtU%ҤnXdh?^y~+{ۃעy FBofU[*kiizTmebXgY$;TSFrT{Ii.=vUmhģ8(DžX4=]GU@<gk:tm1v۵KM 63;")P)N `4+JzxչbJpzա22jk!G\T眊oaP7j>Y2ƹg<ք/1$E4&S_Fh_89WѺ?,?WDzjy7ԤkVCp$$xV#JO[ɞHf!qm$'Z!_W`?xMͿ7 yA<`V4H)\|@8A=)c>SH,GZa :&/#NcEEWT1gOL9bISGJQSҎ;4y~j\/HT+ 5J9/-j";k9fҮڥ^{u|,G2qz*fo8#[(Fڙ6ə8847@fR1ϰsmw?uO[r[y:t?5Կ4t)REi?/j)Aw9hN1RI&zhQё24~91`k;$)8RzV7JG@jՄ XI\樲|loj-HeGn>f*yKsWmEwafƭ\+e&Ur~#?;Cu'*kN=P3+CgHw:{Hݳ@1\jy"}k5}6b^:;dUK?f#]P2ePr+ry9i$Ҭ4x 5pSs+FO5|?ƯK)|q]Pv Jr[1:$g-s)\^x]ϟloz54PU AU/!XjV Oa<_$Z:5-:(!C&Gvv'w~J%d =Yo:Bl;5{9ִ,F]ahp0Oz./"#Փu~c~7ΌOlZ)&M#xuvÐkK:naóC^OlP]Cy U>M& حYl>\>xQ^u~I6,e+&$q+"!'`>ָ7Tm؜=^f~֚%P$ +u dHEJ83mO ~d=tZUY9yƒ}\^Nz~f%m1HJM==e_)[?H=eZ⣷@zj޸qο֨xŶ?<6*^N o~u #ұ듏Á欬vRqqktLs>ՕqnђKi8Dw'Fkw.9bMoOcPj槶m?9?QX :efXո.*E`fBauLך?wz>Lo ^Y&1Yrù5N@څv̧5JYbv<5'( f5bsciOW7,??W'iJ1+ 'q=~+HJW<45R7IzW3cV?խɈ3{جG[޸QM&^'6IٱhzhS8,1 ՒXH 4፵q`Jm'8;FX G9?zUa'F;SH.w@}E :8`(zӔi Zh=ir2E0NQ҇8t8+VQ]dw0΄*:-:Q9',XCҦ.&s&n=j9ጃDH"WM ]Nz1d01+ 1Mj6ONOv:~)!uVwۄoΟBу.ۈ l둏V cӾi\Oq/Zo@0iF3+qIOV?oHi ݇z$ӭ5YvU-<$@ϯqV-|sDgjz7''=>VFcC _qDmC0C)0)rzt[[}!fE*)<~+hլcȃi mP&n|AN l4KcNAؾ,0\o17̡Gqۓ^8jH:zzQ)ړYUԱO,.9 7b}h^$m^HeF8zcH#yIgcc+h39"$ah#Qav a,,FMyVIOQ49-ssf$A}U/QR䋳:=HYۘn0ڸy5oDzjdgI 0 Eb)D,Sըmo̤r+cwŻ#9BLF8V1PQ)Xj'|EV__nj?9_Y +,?ސK׭~foF}#w) ']M"_W}HW gS[DVn; \qվܪpqaG>WDcdsN\̪sVŵ 6dqT97HKEڮ8TEp)"I2_j[(C` ZVEzj6g>o8rZ\nM]/??WNWҺ7??SD7s0٪|ER d4GT?j6FGC86T46yū*Y 76c?]C~ɜe t~Q0zFс@tr1S~[WTOZCd r*U<3K??) {Sw`h'8+^*jRFBEܞ|Eң}54;] >`iɖ,~$xL S涛QU؎Qǡ'JسF H^-OU%r,:" յe|>GQ"Ӛzlu*%>D+4*jdsɬdS)^?'mdk_kohz++sf$$b*Vƈ#,sF85̻e둊="ڍMdd vFӺ1(`2$:ЌӘ)wd>`xِQQgL!5GqI*% ٝԮ9$ҲtO8@y" qҨFGJqoQ8 R`:ov`p>9_bOƯ'[昮/G!]kWK+᫷_J@|k7keZ#>Ulīz]Bcf>53ޜG0*Ȱ )h'iz~T)3;M㩠 #Z jksyʼV熵kzƴNO%Z_C5sϵs4L2o?NPgW)?J14GC}v@g>f :÷Pm?Pt-TF1P!ʸJC t$9ijÿJ:PhWfFv?rF|U*ѱ?oi<҃`9f"r90Z|ZwoWC~DV*m>n? yfbҫq %#i lgAp`;1\>љקSG{c=i[B8UoBX'#(!12FNɩSU(VW?'v֋ uM5nUvО7|Ucas/ ēې rA 1v3#P`Ok )}|Pq&27daЃWau>q/`.s?#8\ݶ%jAZ]dE:GF85<豸&[m S@&09SJH9#Pp9"1ϵ/E(UTu/gUqLdV#(Ql=0ku t`~[H39 4cG>g/V *IA] ]!8Ú=J'Oνd ڼe H# Ux5VF_DoznPQx$ǩ+[ԇ[35v9i7Cɵ.=c |$g"=kZ,R`ҹgp1͚3''0 b<jdBOpjûewzt#WAc5q2/]I%76wØ-[В[umί\`\j2=;ReW#?l #$T2Uq?uOC\#c)``΢Eָa3[]7c݄3\UT6Бڨu_#3ԉf_ʭIjFQUeLc54 L8V[2jƂacM {)OC6Ӭ1OfB Rs=gn.A.2#30%E'#2UQO+ cdC/hZLO51=e86.}U|C2+tFkR^lyW 40?udwo&q딮 P\PkF\m y*".fy}(km?v?f#+p[5#^dK wQ)ӁS8+>J٬թ~q5ָu' s^ۏ'XvƽS(|fìRc+95kPEBnQ}y⡁la[~bF1M'<q@Pː0:r cqiioj_0ӭu:ET̑k.|'O=tȦQ&xMHXt Ƣӳ)4ԀSǚyy umF\Br+J͐.aSï|(e~TS ,`_p`瑏J *bOJGj0GJ \%+NZn՛Es#LOqHiYJF =AQRI*KcV˘[Z͢h9LxuAZ., ].- !\ {I opӖyTq!#ި2\'gL,R,{knc G!$sJUxS֥*@# x1]Fn\pJtV5W{~dA`9+)id~ֶ #bGt3\) 7GxF ӹuxҨi_0aqht%Odv̀z՛ 㱠cgNȔZ+ b[LSŲ מLa ͺbU~O]u(>񎣧g}הP?R̊9@2#0C?ִ"О=+xDEV mQtfZ5)-(|qҷDslis,siyJ"mI1Vn }*=J$\D'=EKQCM^|qU6r#=vhXc0ڤګxrrOOZI6)I> q&Sr(#¿+mied#,~O]x0z4dfS]Isg%g|7Ik^Me,G5ou9ힵet7~4Mp` 9Z:&v)>&f!_ƻ[p% #H;+հ17k(`s\GBdֲyWQl$Ž9ܠז%2Io8@qsIRV c2so*eBѡ #Ұ4̈K;0=C]jrc{%cGI2EKªwo899oI?8GE7S#ZB8qxRD#wsdbWʼnxő{t>Lf;Ris MG$;) u>\J=&mDlbc +;pOT8Oך4VT9aj6i3&xveo  95jn.Xer{*p3a{~OEq4R1ʏ~VuCktvM4vD| (?py&kZƹ}}βNQqۊ|ZzYD4ymW=I-mfIrB7}Ji1cFj^7Yq{RxB>էIюݛ[`m!pn>.~{o0lcc%wbgYiv~Uka-‡?CОڧҬȓ7T&M$9? e,V[yDp5 =i7qxuEG~d#ޟLdRR.P0B,S]цk[ 2 V{y>~8ԧ.)8V?nsYHɂ\{꺷<5aG@ q ;9j+۫I6VRsU&sq0Y&A"3]Zy;ă9R1^eq}73rLܢM\v\lil+;n1С]ִfSsn*^ >ueK3n.GGO%%#=0DrG ЙМ58l k>aGkZ@!ɨaKݙWG=tk o;NcMacʃ,SWm0vh\pqXTCx"Z=[S$Vh3+fkʊOlzZСtgFӃ`Ο;%3uS/&P0 +U7qQڒMB7=Jkio$G#jSJCa ZF!ùJ+'ey%`8@+B-F2oV-g>V8a+ޜdHq[Kzjs>qj- #Q2zи'^OPšez1<2@I[!Qkq`q9Ci?QW4g qhOSOYPgގv.Dw)ZHy%I݌㗍\cH'tsVKKȉ>qB@ʼ=BdvMݏSQ)|`<]mJH>cVl#=|7i7iwtgh%z}ېc#?e̍N"G- A<QעXۮCo$pn'.и:Fn<|\8_cKQʁjNw0;8A |}5p ׊ruݻ>ci~0'`M>P )=OSL=E9S|qȦSZ\ JFI4s$sIQXw^!1GVMֻ,pMADGrjk"΅cUnvY[ԚC/^8mtV $X9Q[Ѭڂ y7xUQBYc$(xaTg'kV2)Yp$N$oQROuqr13v8]jI+aS!9Ms%|CҲIO 1>z֍sӬdI^'w,˒k쥮nl`(4[IJFC뚩ijὛV(KG8b!0ܰ:⳯ G'Oy&1ʹEu6Z\ZC\3~ԝ }{tyH$]Dь*;|($UHml0@#ۦdsmo45\ ZLp?:HI3cWcӥRu2 %ϭLr̖Py:;?*,dٻ“EA\sF6֞pGJY<k"qkV26hw6 XG]%QRIYzeBuWũj2?jƶ43'${fP6cPJxX54hA< Kfܲ7cFj8p)X lq4ѳTM>&q|r\u5<]ܙ]@0n[QPǍ[QڷcKo{b=vDnJ}*&֋  _N;S "Q )E{VtE㢚ZU_L9?횞9 щ@pJ@޵b[ RoP[R3"Y{4 HYw[11هM3<'I=pjI!x,|aN=O 858QƤU@2>CO-|+\0X*ǿj˖Kg8cҚ5s,1ˏIG:=65Rv$zޛKQPo3G;uMUӢs->-jyGg`ƺQm7;0GV oV iO.]+ÖܼyaAt[Gzc|Rn.%y m$ |AJC02=tZNwm b0e!5ښF~$@3Tvz2X:]N, x/s^ek(2n\~]*`t8ɫ$l")$kTFa0y1ɮ[>'Q%[nV/c܊dM '2ICzIZQO4*&<>qHVn-M4zԌ֮T enF}qKٶ?hnl{SLjYOΠk @o$>tʒ_d_$~jkYKF1zr[M)#jM\,P)4q^(P3Rp8ӹ6)7mn݈zwX0g+8"nE}*:g4nAjDž*Or}Wױ,RyB͝T yK| åB-\)$rGun6háExNtmQ<swanf?]XuEXg^3P.;+[=P=2Б1£y[jfެ;E!a~OLBvFdv 9rSO 28u2alcRKfL9ckrX[Z<"}1Z )%7RIœT{[9ҮҠyUN23Yytd~9O)uwN𴲘Yq{Gn%y\{ZF,z*R{ EҼ+M:\) 4.˘+G4U$ϩ=\+4t'0A=G*o:H˭Rf᧑gs4.666yh7|;0cn䊟FOq<|:+]!EH/v;2-:to߬HsvmPnQp*0`}'yZ*mܗz.@NdOj1'-XNŢI~Y%"StډA]rz EҼDnEx_ lmjE} 6C *G f8' YݞMpʤUV_\^*1}Oz}+,t[Y.:t`mz1ܻYB1H0[V>-$_9u-?0 ,_QθAS 5c>xR]Z3徕,Bv4U@1YdͲ폣6:Uj* VRV4qV]ۋ_j̸jO׭9%g`t˓O4;pM`oB2%I88ջڭ:=X F* b-"U?'E(K lWָ/gVMJtsa50HU Ny!`=҂7){v4pf=j@N>nF9M#&3+Z a=kgZ\E5dckhf͟ mjBH 2u^9PׄPI4rp+1Ns}E.B;S݃++&RvgkXZE-"\ҳ՗!=, 'OYD}p: t7>k4ر6Hۮ ߂Ud1eVt$c5"!NU WǏOQll(=]$vzj6 dZM wn/䞘5-L8h7 ,ս?KƓqMMĊ0`T`ڙTYrl"9cIajc-] ԞշlM\c_54fX^E'yZ.il+r='HW|En[$gj̮ZF#U7x*ep ZJSynVرe9>3x?@Iwyl!kXWzuQDB3u%yA7FSϥvsKw9F7Mr=Ԣ'Ab>Vyea@Wؑx8wOzol ]Edd>޸=I]8+Q,r{SrkS鼙UJs}OxaE ۘCp=락%k\$çmenpaU&`Fs5sv g({9|?,ccשך#a9?ʽ=XNxw46.;ן LGLǖȏ ̇8R@b1+k7h<92?t6pڵZp mܣמkŖv^900O)8AAJ7GS/";[mGgă.0Wi.. c+H{WIδ`vTqs\ofx9'|>9UBrMejZLdG!N29kݣJ4hT)3e'F>Yf,G(KAKe nVAn9:Ua_B/ nӌC}9$haRXCb2F *':|+|p[=r}ꚶs\{ 7.-̇޵iUH̘I~V+h%P>Q>n Un[EJlE.1C m$o P,̛,4}X^ Krn._s*x{!jHvMUJR(HXj S餅J@#dhx"E)yf^u,"rrM?El吋Fqb@UQcg(9Ƿ֡)F*05cj_ ɚ#yJz\LTxd?ZM;S@L$*X$?Ihd?!Z1ZPF:Yo ]4IležIivWuAck7UBjR钫jQs"mZx^$Rc`Rvzեb.Oh@{>fՋ.8Wvʸ=yIɎF_]g3` MY -m#aISчJ  !7sNoQU&1v+5w]ؖ E9oqAk0&nzNRg9CѴG&#Ú~֐:XA?.﷎gn"i(x;6P+i! :+H(2^hqe L̎P̹?¿R74j#8$v ֢M+ o l0׸kS0k.viʈe;y95]c!jϗ'!!dpxRϥ `qޛ5tw|1=/]K12?x(Ho)e5x{C4 ?:)A E#8Q}cr2;]q[((fyRH W.>s&m 2aA[!+bI޼UtmAt$m1nV5jΊt쮵b< +%<]: 9_-ڠagOfⴣIp0|kJM(ͽ QwH,'No;p(#vN;fÐ{*OsMVn_Qo_f6Bi3ϥXmj[UqE\Q25NVg$:m7JGfCµNmk1Ո&kh4ֽGnĘ%ϠTO?c80~)OqӧmMbI 6:+¶ 9[`}8$g jM4z ^L;_Pq fiM՛T䦹$/j9##U@8-+e۞Ao7$^z>wWJiG'99iԖC/>zsd=?ZJsZvZp(&ʩ'B_A[YZ5|s}=MtMqAgrg\ ?@+}-V8knr$ph==|ˑ ޼KXf%q]NGn8P):'7=UR+h$:Tfϭr>>ӵmt멶vX8. TrnՈm2_> q'=MOYv)DJG`KC8AQ2ԤScp-t` JiSJ$xƸ/r|&;w/"<@%R+ rllq*FG~ex<͘,8|}}74 In;(4UE*.f'bвyPs6Dp:RL#ǵOr-yܤ~v^xRg[aLJGErIv7AYi}jnǖzl*kSX*mcUQJ9XDA֗bFEnT+3TaϚ=2ƠE3\";18zŧvj`ϥz+۞8Ю]y/$Y zE'[%g8Ǹ6eHfoeڿj@DA)nŒk-SB4Jq uoizY1E㏜+c$z sI!zN/N]w~cvE;WMrڗy=2"oWW>dy2\T(AR 2 7:yR? >"y#cեbF0*#@XAo*|nĚ߆L>`U/jcASer"Ybj_# N=n^ɴ(nXԋ3Ap2`PcEOQ+)4WXH u4r)uk)S} ڗ!uZh2vSS} O.Ьۘ1 {j)u1QYdT[{WHv(+s+u4u6pqt7#9^}-G<ƅQ4Hq'j+X Zբ.4lzQQ'p+i''5rAZ҆#EWa>*0~GDju1䴈4C=N8֫K!I0OV4ַFX:2[3U_9ty+ &T郎{W^m9F[ `2/~;ER,Z#n?9O5ѽGqʶ0$#f!# ^"5qMmYxP=;y4Np>QGSұ *`JzjwK*,2нLMGSM2|JK"dT3kvszM*Rq)s٣ae6qT).%PN*7B%+Jycca.9njQ:8эǙf]i{zY^a*jԙ#q_ n3ҵ4-$_Hחcem4K%:3!WO^VS/A[^/݈08.M"S+jg'׶gja[P 3*5۩{%.y b/ޣ6@ ۾jq M7{b ЋMMX k[[UËC0,y3NjkT%-cf֭ l0+FIo>lBn)7Xqx췛6oz{Am4"d~b>cɲGh"MӿZ7Q R1o,ǖFZ'7  #1s[z4A@~i$h2ѭB7'-l\VҦX P>Cb;$BqN 1NQEL4PS.HTQ*ؖ3PqMTTml>SZ;X]r8oZٳS`Tbݑ:^ >e@q j< "1_`k7J;bC8N=E_heGN[)&:4q=LsF )F!Cի7Uzr)<`-bO3f35urd.Ê$")#WWN)c<k'51V?2gލ(l$:H'7sZ[<"5<+-R,^vr\WR!8͓ ]R_w"]iZ&eaE^۷pdAZpkQ:x9㿭r>81兦b&|9j'EHvڭa9nu5^ K;U#޽N쬶GVPy~0Vի3nўH6A=hs$K1$j*\6N rk:i>D#t>wƔi0ܵeI ť?x ε-CON#WxE'F5:ssrWbI ?ʳ[_ediidrKMyO43:y#Jei5Ģ/(f MfWD/J-!0ne#<* C^]ky񮾲i HN8h'J* .9;O 6 $yy0.koSX+ k(mbTÓVUpiʝԂ>ztl ҤPOQOTE^zR'"ǒ*D:F8 !V8U\ TV\SBsJ?J@)=7{Rǽf:X!a>*`/AJfM0籪S#ؑH5)=HtGRЊTkr>riUp2+R].3 OcȪi4_ytԈqhlwBX8Qj0Kġ=g2c5(&5&pyR1NϯְYoݹӵ]TexZ4zT㰪\C7) 'ӽ_'UTi64nRԵ=*2eN8^+\/xg\񽮞Z \\L8$rk׼aym湦kE Ӿn593c>I1ޔFjk{&ҏK, ivv`#ެM\.uvFm6 ˹y-5 n`vmh<2O IRh5=CEeH\t֧#aMy^ WNG 8kW.5+s!t2R/%OSıZD |ڮU -qi%ѧeG25"SmY#p*g ٬` p1AX7Q "e@g=jjq-1wCxm\1刽 $epmǦiϫ],( oX„ݝv6i!X.I?+|s 5ۓgjp83k$G^f/ƴSOs71•~ \zU.Pb%xބTeW9]y?وl7W궺4;UvmnU@ٍs%mx 晌p}+.< cɡ; yLtRpi4+qڔy3YOlf`qQQ` cjv;'@̏z>=dy$c@y]Ӯ9ŵIԞ»^O5 j$||D֩Eg>]>s0;Pp~=֓xõI,g'yj 3VVV*+C;<#*bpְoG,SlӮAT5-UȦ8 ?egy"m,~ k07#u]:յb)dl )]OQSG,%BToo/hތ#~"e4kpbYTּ#n?8ݥ,=kgBЯu딶![TDIlFuE#oa}{?<)goܸ~T埇0(i[lr+Z+G_-IBREJsz*B/4 O&[T7b1ԏTf&⬵I˗ԥ$GRu5G$Y6ib6khʹU]&?GUQ&G~.-h(l8ȍXv#O\n?cVRsj-3Ikh7 cߵ"'tV-a~BRQW*1-ZYEkn'QԎc (@TsJFkΛX"˕[e` #*$?)tE%r[Hg׽PM[=j!ĥ3->Z3\|#\zUǝ*㏩Y:Ļca ֺLf=0EiiicB?VxćQ&2Us$}[5ERj6=xvfںSҐ)/|_ameS򏩯.sNԮ-.URG]_jn샅Z)[(ޯ` w7I ԅGJ4'}a{U @)ciw bGjMب&p$-HGzI+~@䜚O0){ғp#QɥҕËqJ:`4ᏩT[.z2LU<7PgN>NPo4e,FU|ƔHhف`D4sGi4 \ȿә"DB*d35L0QZ*pqPIj`yJI=hB&GIq])Բ#[꼯Z0Z!3Z9?u5xFRnn3kgdq{(8duEޤ]wk $d0?DbRm-moXD"}~ n4\16YmV W>#;6l<*kS%aБTN1,r e9+ NV q#oNY zR2W#5%l1 d)Ef$>vTB X;vy~[=+n5Y,Wݖ׆.ւ$a56gXK4,ǫSRmfDrժNX(F)jFQE$/_ZRI8P (mSQ2OL;ӵ-G~`ýf۱Irz1MY3GH֞Kt*]_SV27F+_ŪO\uƬH$u;dKE$btdBc-mcb ҴbˋrWgLb3խ1՝*P3PIa^M!lp3KT֘G9G^Yamrqcv)8CNi[2'{s5ČY;y$"w5d,SJ[㹩ZDq%SD»V)$>^CUf1^4 zb%/tO4y=RЩD'5=*k)cN}Պ]am=m"m:/Z b \+7w ;E p:S 搓MEʰirZ=}hLL>ҍt;S:Mp5gҀ(Rs֍y#4j-Ċ3J%3i7D[0%/HXE14n;!~x ÚyP-oQ̻̑eP"J\bhkw)gq+E*Croz֜yq;5S77wO4Y&N(4#+mdT( 2 [k<]jm`G8õtCWs v2SIy e#c>t-o$1皿N3x?֭U "_6ݑQI-NF 7z53`cmkΚ!,DŽD\^5im1RϢ䓒MYԫw3ӊ[X$yZ]+GzgU AP7q©]ɱ˪/<)2{{ H 8aUF",h*m%`QEs \((By0~_aޝ0x&<-;i ԊG`QX vi}) f=ix95DV_XճtSD t?Ѫe|[]Gj7?ѫVʤiN:ܹm y3jÊuK+dAX%eqN)XSZPS@#}paFh\D`xȰHT`Jot@ڹڋ$6Q"6y<Uȓᙶ LR/~aᴶyfBW{ E]ZS{+ubpjHݘG֫ J1NKq~ecwvuji,,֬5˶5۞<ƩĢ$}ud k}Ҫ!k˳zXUf%ri>SwqEc5p= wIH~dnNzhR1ڔsEQN0&)\ SwS Rs$vhɦ3.h4E1ϥ4ڡ/B )j=K{T~(j)~i ;0%4obv b%Kҡߊn)>IvKSҋBmd9J.Lp*5qdIz㊞+ɭtN˞*E.ӡh {la%u|Hd#+4LT#kѢO;YGH,9(Q0+~)kh Hޢ>M06@ۉnBa[})i3mXgҊ)iQESIrp)Gن0b܊I )@;cqN J=W4X.4-<-8 }iqM"n4qO[\]u67Ozd=.O@ds_s={TDznj X\@'T~ OƬDw<,hf:I1NF;z֕m!Y\;>F/.w`:*ǵzV(CP טm,2hEc=kk֗'.)}A4qў8pԝ,i11JNO?~8wL'?niN/SKi!lq=電SIIҋhȦLN)83H[HiP!HOx⒨CLi `8MM$MϽ1ޚ_պS MIqQR .[_?q95ܓY?ʸSJs;H@rܚ2NL4`w <|6B6\װW|3E-X!^>oi=݇_-aEPM''IR@?V^g1Dx&@ ؤ=ihfjBKƔޞ*< PB%:@4'i4 |q4jQ@njNMt-Hz25\ES.:^KwW ѳJdMOSQzMv=w¡$ѐ(6ֹ#_ǨQE%AAI)9cP Vub݅`#7s}Or#IGs{UW(-w.? jȰ@HM8SEI3@i4I4 4&i`@zqZc2q~؄sxG{{2F Ih޹(kv޹(FEVAv' 7 ?_ߺ(]?tS }z+N^fer[Э [¸Ǚi_ OsME-_iG ih~ x]zKjdIhD ^9'?W>~_h!aE:=A(7\q (٢bzKfTYC(?B\c(!݉Vi_޸QEAv'!:N~KVQdaV!Nz?Š)Y؟?޸(HEY zGEYC-I?Š( C EY؟_]¿uQE]+_'+_Qd+{(yzC։?“·?Š) OW Í E$OV ?[h_߻(]'MH6{0ģ+?ׅ_&*S^ i s/@9peh:=vTٙ<ʶ B3E_5HLm}?ˏZdLL!?h6{%/|>V袠 >ҋ(:(~t}?:(!>~tc[@70袁}[E=m#U nҊ*2EDdN  C *Afigure18bD`B w\selD2{ndD`B w\sePNG  IHDR"atEXtSoftwareMicrosoft Office5qPLTE3f3333f333ff3fffff3f3f̙3f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙333333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffffff3fffffff3fff̙ffff3fffff3f̙3333f33̙3ff3ffff̙f3f̙3f̙̙3f̙3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3fg'tRNS@f pHYs@@bCc[ cmPPJCmp0712Hs@IDATx^}K#Gؙ$seE`OŢQ2!MX(`ۜO]!#mNҩt"Tus=^dPb"ppfO>i&dн~qKv(Wh^1u}%I7nO[{ZoAS4o-no.?6W޷r6̮常 o_x͋iuOՙlx6r^ùˤ_>~2?]_ n:"n糟w^|1H|yxyv6er{L'l_q_m| no^f};:Cnr {\7K||rreF7l7l)Mh)\Х{sEk|Ywon\fqb]gg)+⧳Yjn?x:MIo}xuWGuwywݽ0 tLq\wӠ?wt</L~]F3<@ޯHZgi}FlUz{7pOWQ: L@i雋k{zrz7{Jo}? P}y"- g˴8OiwRPK7xst|ֽI3L7HH2MϮt(fPL#ř`ˋY>>%'׵Gʓ /gKk5/tW3$qo4Ho$p ŧ4F.1d2@}ۗ>18CѸ\ ȾiܽGC Dlk+ )iq@|7Ĵ8CǻO߀lw_\Oj~E> \!)۸{ix5ro֠t:֗i0@< noA8ix e(s+(y~ޝLU:=gp x(=@bwADٽPҸ_&U ə`bF N ry{y~ R:M_ "ԩU *[y}G t:h FLަ@@Ri:%՗-bJ=HmJ|ܼzVqMLZzpKT ~2uTGIkrYWcpjZ F4P* /b 8A_7FC&/P )ĻKHb(hshwICu&/9K^Q7KjWDg/}(\5Bx"&$ m8!U / E˻?_IXHAcfs=1L \-q y0MMٛBjh @ګO./?|1޽9#/vArqG-g%[]]^\ Nx?LX\?;oH|(fg}G]{3&J(wq=_1KjW_HF7/?N}sOT+~ unb(kД7hvOo>zTߞRr&m-߾ZoKjHi&Apu??}>/w|.B-[zvMa 9b_q;oCwT.(ֿi{݇Yv; a/W7x*jKjeNB0ʺe{(} qBwpC9ՐɶN@5$kQĽmsq~ׯ݊.w۫Փ=8 m+2ޯ#2~+p9^7?'srݝ%ˣ=!WӺWW=[ýo\ k|yuFB AwTHM QPxoेAuJ@`Ҙ_z.Sooϯwo)W7dn9:ϫ(1YwF $q蟊&h%*WW2Jy^ d@Mq トH;l‹ɕzA*q3V~tכi+g9/_켎|?:/w\\ji\GeAcsStt& oף?(bGUW~-pi~(갚C[߾+UpB;)?'m\VzR.yx|-R rv37jMʠՓmG}/ʁ\ŷ&y׺`srM,mej^r5+paWūnڿXxucc3hU}7KV]oQGSN6W}/axu^~em|} }"9-{x||(7 ^ao.#h W굊ƿx򵕣7ޗʾ G}3v@VεrȽey-q}9caEv^FVm~߲(YdX? P*CзJϹ~/Oe&UCYY<:"'Ylq5Ě_-S{ood)~R3[QHN/ث cWk~\uu̞`U5DeQlžj }g' ۖ/_ TҿorO^([k7Yˌ0_z3""a6{25s7vyݡإ ӵp;:A zF L (·ZNY۳߬nBE}eW2W }{U}$"ϫs}vbЛgo4sj4vXCwvVZkn;<4}z\N N{:-=\ХnM/=73NEHahJGtDDDC釡Tkb8 %}/PpmC%Pb+Ґ!Ӆa5S1"L^54m!R+xpi.d5В =Ɋ`\[oKݷ?.d/X /쥒o[8ZzCT NQ"G]s)rh 9a[[V"1H0:̹a'\V\DX$q21/jlr\/imj䝠Zp>JRƆt,|"f˼دxj %2%ָ$1@A (bhiFqS)*@5q=jY\hsb#z/(d ʮVڢ/q6fSi ;|"Cb%MHw~2^!J]wjp)Sn!pA&>Rw~W2CQ1DH#e%*c;tK͞t%FyKCzhQ,2Yug^咆kb1r5T3Ϥ}vC7ÙFjp"b_BYJ{,=G/GE=[mjmýx=6i Cٰ]ά5bS=U+pk`Ys9P/Q4(X֛ٹ㫋1Lam)T;nq RHڽ_i:~]UZ̓-USe[~l_7bRoyco˯QL7Nj5]R_I~0|~89f,vlY{uQcQYR•VE  rB8Tzڪ-۞WW;ޚœ_TSچ喵L~|XPͭv;eK&ܮ-W;Y0dpc7K=aՎ4=oVؗhkޓK{}n_vgۏ200fG۫լ{6j S^6M>>7pi^ ˖ϏѿoQ@)1FxnOj?+Wh#Vz~gjT^@<\\ÛwO]5Fm,_,>cV./g-Fta|5lqo?yݓ7Y!ONEs: NN>Q͕¿ mkèAPB4˹}=NY>|ɣl^_;VLGa.!{ODWs'g`:@bӓ̫Y~Ң!R\ܳqlOo{6nOVS,}JE;_+>aK82wo:1rsq8yBZ{kN.iC:FS@Wo,'8+PD{Z D}Da$菫}~#O7|UxT 3^mt'('POָxAP2o:%|Zţ'Bj+B'xm}UUT N'ͼ6:Oٲ㳔ű?~:>WI].M Uz=?OA,9;340T֍w6cR Te7hN;?Vx0(gg*ѣ_u ½_hFzټ\E h|Wa3W!kv) Q2:3>V]I1?Vo1Ƶʀhu*evJ\~J̇A?s{?$/W;jXm\c[7'3گPOQQmjw2x_EyYEaƔ<_5MV~ >I$/b΅ yI9W@ӛ*)sR 1 vwo5JCuGNj=K9?b:L  n O`PPFzܺC "].sx-jZ;iW{_/md^LVu&ZKĉO,:öVEOկ7HCNBWGU&^RG:>^,؊=Vk䯅|>(imH^l]OcCv<KW , i|G!W@Z: ~?omW=T9~Wx+43u/Z1:n4mƔTP/ec2~sTyG_KOA45%j9]<>W_srJT{v\ϒ^(J6j-q5!Y'y ~,WWYsF>&T]ո\;w\ > )aHad61Z>F'k^CMZ!aKt,Q*#1_cQoQr:`CW>洔( f9ǜR>BȔ\:fϼdg?8$ƑW^ͦ%l ^<$x0&%ӨU.?e33?3Z_ɸS, ;6X ? xQ[ErҾ%|.~wg\gtbob!k潕ZFlߦ~i\l.m&귉 {P9^W*`jDAг(@(3GmAPEơ즒]Njٺr~9B6~,5RF]#yQlb+eo.OUel:oB y[d*!aOM*Ƨb٢ǥfihGù0"Uۑnj l1NlN= >lmLҚڱX`t1ةDY4E~5u8|ČEa :AX SQJs̘iA(ejO$ zH맢.TIR=S"jʨMȱeX;2/jӂ ߳q^;]u^P=E6ăDtXx1fbAzQ:ګC+3 X42us7,F#Ka=!#oxۈXƘ˿p7Y7nR7ԁ\.<úg7 N`Sdg6?a8+ENuM]:KoBR%>N:HQlhPW?óu6J!P3dED1:-p飔B8neㅸ`m^0EFc01j%2 <,Z9rZ^3īPɡ߁o xvpBj"nl6VafHnh8[QMl8&Yo,T+P l;5}Ky⯸)Uo\K1H5۫3v/m a (4mmlBŸuS,q+j!jGXc"Z?ڛ=hd3Y5B#ڽ2;o֖|1jj$H.`4UT-hYkUq/Ѹ߱87.ÕCU]yV2BEZ y+b_IxM~uϷj]î^?HaXkT6ρVc$W`r$hտ<>jӣN?KB GQiki6g\r0-&R5MqRoMLY0^,nM oizGv|r.RU$isvR>Uɕtswv,d۷c'tc9Ni[̱V װ^37 ,*Ч6aE9RA["211U'\@lL&3ˉS Mx 1n~^. r:Q;,qrB] P/!hq v,QK,Q`];2jO]&EFn܀֛jϲdά'9AdϲE锨ҷRQQt ,{iɒ<`{ ,O\mLc d٢-#i=iޟk"4qP2QX 4WQ[JxZ݋#wА[p1@M05C\#R7(mx Lúr̖fsj$$ݬF0KʼnH L: -YDb5Rj) RAʺJub&^ڵʞW+WgXsswpIk0o~}@k~_9οAo83DjD˖-QAgƦ$po#0NY VG޸!\il Sro>m.zj>9Bù(yvP `+9 Dā# H^ #NzWZ\J/놫-ӥM@Hd~_l||h^׷И43jA \̆\ǽڎLw{ڷ2F[`vp`"2dR[p2)q*dk˧ih˧ؿKոB\w &{[j\ldv$WYBX춒ɷ5pl][juexvMiU}6'lխ^֚[xiy-2Tj; b3zWR{ڎ,)Ӄ&e;53V#߅_ljZdg٪cӈHlmEL;)X~4Nњe[i²%onmjOܹēؑU, = Wm8w[, Vl+(o됲]ӨnZ/EŌlաT۴P_}Y}hډxDϱA2<=jG*p6-cJ'|q1WK=(M꾣ӎ> 26I.^}dl'ZI.V> 26-nKG~dl'ZI.V> 26-nKG᧕MD+W7ɥGA&Mr(rQɟh&t~ja5 ^$~18IvO{ynǗo٩߷,d(cP1qy =FP_w'fj w4ꐼ^/l?iO~%i;SّTGw\wgkKqyűZq|yN*Wwg!/zz9s )խHsu{UGZE6Ձ4ztfjoq}9PaF=돋O٫iwޮ<Jz+fM{XЩf^WGAzg== ܹvsU7|NAxyqpc:gnA~lQh&*xu:Uv{\]3ng7^´l t~oY礶|fѻ?=ԏ ɧm#T[7l7& 28NggpptSӁuo33~F"b!g[ k!,C}7O:0\[s:>5d?(I כpCyQ-o W?Ix:8 R N8Zwq<x1&wqXQme+NsN=J03v/-H#Ld11+'xWs k?d,X$ ǠiEUdȹG|2G$󢇨Gxur5x'I:E3PA4;K<˳2 *Ai. _ p4 sb^Y^Mԥ(G n(x9{>(ĩĢ (B)ɊjaAa;¨jBu~vƃ8Lިkww/nV]Yp'Y_vوe|qcq#ܗkA "xƺ($=ZL̅AW 񔄣9&V^ P¹8Bgm;` # %.6iݓU|7gwj"<+jf#Py,xyMɊj!XˠRߋ!P7*@5<R<` X'w\[!'_-eWՒYĨvC,h1e.@-~8\Bon7jė_% ="?BAmXyu\ T>A }?^)NW>??g,Cus>M~~xJ/.SLegP=KՅ)Ǣ ! X.`*ޏµ2`C p#9[*CA^C=A?z~u5/˳w]LaGA!-qe|Hr*,SI HfSq^߂W/N|qWCk/{%lY7Ճrm/!*Q˥ǫ8unڗ{>\|oǪh<.L^~>V*kCw/k Uz2сg@\$: k_arŸA}x煗YKc"ZP͚WPX6I^Ϧ":>hx5wzzv|񌟶vk-uG׃w6\\=)ލҹPHt`kǒ4&\Vh~m<W&s@l%[hFr@x.uAzय_aŃY]w#yO_.ė߶8oY0usҖKɕô n{krPxa";95va$ ґr57ȄWTW㗢#.rՄzt^1MHmɥW`|GRB'h#P_z G1h+}ӻW 9Ai'4{ jdPT'.'fM'> { I/vD 0{&+j҄}^j~Pco<`?ktښ>> 1!(/5Rm9P+WWz ‘le6 gW: bDfs[ʌ^&9:AeS2nU&}ngO?–W& ^r g^n}@\>"WFFf%!¶M˼#E&˂JEv{w9t-Kr;NH@-m:گ?_kˁ^W4~orGG[^}0sBZz|@ѷפr^"oyAci=fE#F%q˫${JP+W)c0ږW QVKd->H#Q\\=8[^}dCZzzQ@ j҃KNX+W?ppty^=Iv&[&O>N9gpgp=pb+{{pB޷/@[֝u=xj+무-C4&H>3 3Yv}_1PpfJ.?D۬ 6s*Y?ss3?DݹZWؖ+ʎbe}]?׍VnNC.=5_yu\j1Y:yCz(Vz.sȚ2xt;%本ḵrQ`eY;5W̬Xwv(L/?~[ky bH; Y' 챡}_6|C+G+XCɳAZ.N26*eyr$lsN P'+ w] uro'^: mtPe Px+ 4ei/"Wue@.F̥Hq7h)''߯@j[D]Fѿpi9ǃA|57\mϫUδeZEJg^5x˃8BsB;%D2҆blσ؏( zd&NYۤm߽=;o&O~,906}psž-}_W^LK]Mko4?v]{GB"k4IENDB`}DyK _Ref217838877}DyK _Ref2178399652Dd'N  C *Afigure19bl10I|x(>SxH1^9{n@10I|x(>SxPNG  IHDRi" :tEXtSoftwareMicrosoft Office5qPLTE3f3333f333ff3fffff3f3f̙3f3333f3333333333f3333333f3f33ff3f3f3f3333f3333333f3̙333333f333ff3ffffff3f33f3ff3f3f3ffff3fffffffffff3fffffff3fff̙ffff3fffff3f̙3333f33̙3ff3ffff̙f3f̙3f̙̙3f̙3f3333f333ff3fffff̙̙3̙f̙̙̙3f̙3f3f3333f333ff3fffff3f3f̙3fg'tRNS@f pHYs@@bCc[ cmPPJCmp0712Hs-IDATx^]K8 iSqI r3qN3i6qIHME7q=w@Re*3#$|xxp8㺖|ۈ`lG*L|=Z{ވC sohȿofmʹoҴvjI~sgϷ,-?nnCnd妦U'`>',~Firdn·mZҰ*-M>NP4oOk^=l67g۴v}`Zm;Oai[~nY4kӶ_ČB1NƇ[<#۴4EQMŸl!;~Пq7n1C(Ow{u4$S&XZ-|s=i)LZNcZYIgK2Y71.G#KC}dzT8/1~ILrTpYw~Յ0€cٙsL~ff.i㣲v1Tg,mƴC_Fci, Ǥp)L[Me';}4?È>wɯiB?x:FC czkdv=b*\XA{5]$0mJ Os=鬖^*yiڊiKHFXrxZYbC>ZFDz6͒4B*+gPSu3lc|k]\Mk.nỿ7SLM\Ool3f*o69^K{4MXU3 +ZV#uDiYG4G%hQ>إcXПbdk&y[,I^iz`XםtnivMGIֱ=`/yј)͖6fp=^4L%y'zjꪺR=n[c A`/+ӷy}t@O;|%n.MS>gu5v^÷WyH[50m!3x.U/+f== ?M6Gy#~:MYiuј6ي7e18^kݙ qxZ΂?58 =A}푎S?ejkL#$y SuG"O7V}aWL\NWixu2K3BOՏ\K೴4߈.pV(ed{MBi gӠ>BsgApԇ ˑ0hn+`(?r|{4uIb@('~׺O6.'*TO .vPm 5?hasۭb$*wafL6+};<:jW7}3Ly=VT:oxKX;^jUȑq{`><+'O#xZ#Hڣu l>ˢuth L7 ߻z&̽^g(aOΩJC`sҎ`}{{;Ӭ,PCKWeI,nX 7vhq$a8'f~&(7$kArFz1L+1- t4+3Wa!Ogn,rnWj`=,\.&@l?@ (.J(Gu4畁IVݳmj]ǝ%ۻgKG.[b\C BcLC1Ƕ^@!x&NqӸFgxj^Om 9t.1/t|VM׹",V0 ,]{(ʹ' 6A%[r\,-/vMYE OgC>WTW)ij+BVUƇY؜FR,qB/M|zJHZ4!?<*|#Ů0cdki 0SТ4t^Y>ȐwY͔nxULC({m?'Ch7c +TMiG?0-30"ܞ;ᷨjXl^{L9$?䕁S.u<ǗY3,pYQ~_I>@;o/iuq\HfҢ*_1O:xf|B:$01-=j|_+X`XBL~@BFC 1 / _p-G;Q~MH>!Lq^ 0sФTN0~Jso0U^;8O9%B G6hGKgTP l9``n l?S`a.jl܁>OR*j-8FӀ}.OðU<4Gߍ`i)X4+Ü: 4R@+$^ (:B3m 4{<Ɂ3 o}"w$RoMAʨ)8= xV |2`}Y;LlDȞ5S/ CFu[gHϴCES?6ZZxFz-*{dZ_;ipb{~ȿ)fEDU(aL_'l+?h.tNyq0T1U1MU.[Q^@u1A R]P?5MRA#S@C8N^G3E| }z@&s&x*7ǐ8PϳΐsԅYů4P% D(8#ȟ$rki. p &^jQ+(_182 U!ϫLɈT7*v/tEL1CL]lyh31У1=+i(4(BF|c4qy)IV١S xA{CzUeiC{C"Ttj1PWPXվ%~ ~rq|QGfB>ߊsSc+4=sx |9NSpPOomffMU#1MAI VNa ,~> kP@i8M4WPL`EsJPi߭Dx\1ݽ"Y_@"HK`"Xno㊆&R4Qf)"E'~2Q&Y#C$ $ PVA+ӮGWMLQ:3$z(]bclٳ_Zf>3oD;C={EBzY=B]6-hz xZ1f[̬te N."zaؕp0m>.04]A׎`7J42R|>$5+q$vޙ}Oz'tG-;G 44. "cVߡ`EON&,SNaRyZ8Zw)DNQZ 2,Cx3T(u<H;8(,Q̬-e8iq#pơ1tKCL3t kӊgYB >Æv,Kc$tIMuh0  s,D~5.33"Uq>mYz&ѓ_aIb=L_l/ʻ/_ݟaY;͆H׾+<2'N6E@fN_:ǔsPf{Ж,1u\ }q2oZ@/`BRIv>Kd{皀a𫌈&Unő!sVa_wLW8QLKG :`Y|h:=Nj#95G$OSjdž~(u(3F0)p$UB4T:oBO#Põ478ETX&D%)5 5Jxo#ԩ774?"0<2ZeG'CL]I(d4],W&C2{ RQY >/izxDXwhLPdi`kajP>3b3Q,9A4pI'Z1\m}=p,2b\||euͳE3m}!Fό7.rU׈#v1Ń?wۨcSC`&hÃpx?v[c}?zR7t-gJfVEZ 缯K ^%pД<×SW*öy0}Td ,=ę 7PO9ǝFnL us#P-AD%*E,Ȑ9YM.V$B̃(hii<<)= g}nW6VהiDRCu~n3;gQt5XYqO;y`zsI Zbv`q_gi_H O0yL;KWʄQDhh)NW,'-R OyJ7}7bhZ|r /_Y j-5n>cZ+0=7^3t5{!b?Tљo&(wVXgS+=;Fp5 u43N5k+j/#ްj)`i$iutCL霪,{@ßtqiCciDh;=&馅9@?`&jMI(-WȢwh^5o6V|oke·X<=fN*y~o-0 \! U!M<=הּL=u Or~@@4+*yM>b*O'zOk=-7>ޢ̿#(ٝhpazx04ߨ=޼@ޗfSHG6FFtĉ"0>i&dj(F^~Q(Jfe=䔥n=8{f9 'ӫÛcxl^;ĵk>=~#II\˨4#{.@Gg97_6SvV=5I1 1*P0 y3Lo7Ot-+i-x"T';ڻ0;vbF7`uq~nZ_w~ujsaeY]0aK4~}I^< =}-+39r&Ɣ}+k[g_D~xBTA<#@}i։-ՏO;':"kwpU.V1<ݵ4#<'9"(\N{ 24gmt= !iKϮ#%]Ĵ/2&ұOd}'YcT6>4fӓyLӴ2ǗÈ`R j䰬jIAOsGX4VX?z 2},<}ͨ.wX+ qa4>hX-7bi 6andap YO i;8·+IO}C/axO{P+qO< dy.<4a_y۞Ǽp{OPI!þLkE$y<-IyjyDOw~AU1<- U[ӟ_ vVKc[FnYǖ/OP̬QܜvHIGA"ӟ1͍!t3fR-ذۿ6[bi :bc= T״qvn]KxkmU{<.P<54yKP8M'%1~1ƱG}޳Gp`삢ݱkmv7ר#14w }L#>>ڵfz65-y}<iM~'31ifmxm-e|i9<}\Oj=~=?ڮLsMmT>]د'ysEijk_Ӑ2zZxJw\vt%1y>n>.}Ǚ ~f@4V =jO?8ӽbBz\} c#.olGDot;7s|7hkiWlF<8[^=.gx.썊O:sLO[ÚR~o? 0Xib:xIrVo0jh5,=&oU{L #x/~{}k2L.;[-^y_fFLЋ-}!mkX:֗}[f첲55~gü,3ϕJ0=Ԉi5y-=暝+4i%jbkg'`ﷴv ޟAì÷4U4ٽR)l4c w͌Bw=R3}%=BVD P{-]ZsC>Ә6'_jx4R>{Uܥ~jŧ2#*͢+]`&rnqU+N0K̗,-"'%84 ,-n]tvsl,M 0he>{Pb2⯟u;=;z[&Af{af^C2HT"I0>3]ڗ`&< Heading 1+$$ & F&d@&P!56CJ0KH OJQJ\^JaJ `@`  Heading 2$ & F@& 56CJ OJQJ\]^JaJZ@Z +M Heading 3$ & F<@&56CJ\^JaJRR +M Heading 4$ & F<@& 56\aJZZ +M Heading 5 & F<@&6CJOJQJ\]aJNN +M Heading 6 & F<@&5CJ\aJ88 +M Heading 7  & F@&8!8 +M Heading 8  & F@&8 18 +M Heading 9 & F@&DA`D Default Paragraph FontRi@R  Table Normal4 l4a (k (0No List 0@0 ~Header h]hN @N 'Footer !(m$6CJOJQJZYZ  Document Map-D M CJOJQJ^JaJr#r  Table Grid7:V0 <xD2D =/7 Table Font (( CJOJQJ@)@A@ k Page Number56CJOJQJF"@F 7 Caption$a$5CJOJQJ\aJ6U@a6 8Sg0 Hyperlink >*B*phFVqF 8SgFollowedHyperlink >*B* ph:1: *h No Number 3  & F:A: *h No Number 4  & F>@> pTOC 156;OJQJ\aJB@B BzKpTOC 2^ :CJaJD@D pTOC 3^6CJ]aJ>> pTOC 4^CJaJ>> pTOC 5^CJaJ>> pTOC 6^CJaJ>> pTOC 7 ^CJaJ>> pTOC 8!^CJaJ>> pTOC 9"^CJaJrOr $UNo TOC Heading&#$0&dP^056CJ0OJQJaJ$nAn #UNo TOC Heading Char Char&56CJ0OJQJ_HaJ$mH sH tH BORB F*Bullets Level 1 % & FBOQbB ^0Bullets Level 2 & & FBB + No Number 1' & F0`0B!B + No Number 2( & F0`0:Q: *h No Number 5 ) & F:a: *h No Number 6 * & FZ>@Z 'bTitle+$<@&a$!5;CJ0KHOJQJ\^JaJ NON %Title Page Text ,<< OJQJ^J>Q> sl Numbered List - & F`` Numbered List Level 2. & F 88^8B'B Comment ReferenceCJaJ<<  Comment Text0CJaJ@j@ Comment Subject15\H"H  Balloon Text2CJOJQJ^JaJ<+2< ! Endnote Text3CJaJ>*A> !Endnote ReferenceH*<Q< I*0Placeholder TextB*jrcj h}Table Classic 1:V60  j#j#j#jj 69B*`Jph6]5\56\]^^ 8UColorful Grid - Accent 1176B*]phjj 7UColorful Grid - Accent 1 Char6B*CJ]aJph|| ps Colorful List - Accent 119d^m$CJOJPJQJaJn1n 7Q.H3ntext,:$ & F p(^`56CJPJ\^JaJZAZ 7Q.H4ntext;$ ` x(^ 56PJ\aJF"F pKH2text<@d1$^@aJBOB o@Normal + Black= B*phVV Heading 1 Char!56CJ0KH OJQJ\^JaJ 4 4 P Bibliography?.X@. d@Emphasis6]PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK]  T PPPPPPP P P P P PP PP PP  x$T;  N XJ4Z*dm-gWp ?BDFIMRX\_acehikpruwxz{|}Cw-*,-/Of0346Vf=Y\]_2568Xt(DGHJj , O k n o q  , / 0 2 R ` |    , / 0 2 R {  " = Y \ ] _   + . / 1 Q k  <?@Bbu&BEFHh"Kgjkm ),-/OpHdghj !#Cg 1MPQSs>a} 3ORSUu5a}(DGHJj;d69:<\p)EHIKk   /Milmo#&')I_{~2568Xp2568Xt , H K L N n !!! !)!H!d!g!h!j!!!!!!!!"""%"&"("H"Z"v"y"z"|"""""""#.#J#M#N#P#p#######$$"$#$%$E$S$o$r$s$u$I(a(j(S)j)l)YYYWuouxuuuu}~~ ˃e~ˆĈ09E\^Iaj-6BY[n Οӟ Ǹ߸3NR"QlpJei(CGa|* E I (((-.H.M.888;9S9]9i999999m===IJJ'J>JAJ^dyd}d.eFePeZeveye8hShWhhhiiiikkkklllq0q:qrssvuuu4vOvTv5xLxOxxxxyyy҆Ňȇ  TUU X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%X%̕              %      0df!UW~! U!tU!UUUt  ,"$$)aB4N9֮P@  @0(  B S  ?H0(  T _Toc170106485 _Toc218052790 _Toc218051819 _Toc218951909 _Toc218052791 _Toc218051820 _Toc218951910 _Ref218655960 _Toc218052792 _Toc218051821 _Toc218951911 _Toc198360439 _Toc201113713 _Toc218052793 _Toc218051822 _Toc218951912 _Toc218951913 _Ref218237952 _Ref218498294 _Ref218237584 _Ref218237612 _Ref218496636 _Ref218237554 _Ref218495128 _Ref218498126 _Ref218927358 _Ref218237468 _Ref218498539 _Ref218494701 _Ref218497108 _Ref218419624 _Ref218494427 _Ref218495651 _Ref218950012 _Ref218412801 _Ref218497687 _Toc218951914 _Toc218951915 _Toc218951916 _Toc218951917 _Ref218931949 _Toc218951918 _Toc218951919 _Toc218951920 _Toc218951921 _Ref218951414 _Toc218951922 _Toc218052795 _Toc218051824 _Toc218951923 _Ref218951511 _Toc218951924 _Ref217832194 _Toc218052797 _Toc218051826 _Toc218951925 _Ref217838987 _Toc218052798 _Toc218051827 _Ref218925874 _Toc218951926 _Ref217839001 _Toc218052799 _Toc218051828 _Toc218951927 _Toc218052800 _Toc218051829 _Toc218951928 _Toc218052801 _Toc218051830 _Toc218951929 _Ref218409813 _Toc218951930 _Ref218410101 _Ref217881871 _Ref217882604 _Ref217832571 _Ref217832584 _Toc218052803 _Toc218051832 _Toc218951931 _Toc218951932 _Toc218419822_Serial_EEPROM_Programmers_ _Toc218653041 _Toc218653042 _Toc218653043_Cryptographic_Accelerators_ _Toc218052806 _Toc218051835 _Toc218951933 _Ref217839029 _Toc218052807 _Toc218051836_Ciphertext_Payload_Statistica _Toc218951934_RF_Spectrum_Visualization__RF_Signal_Generators__Contracted_Labwork_ _Toc218052808 _Toc218051837 _Toc218951935 _Toc218951936 _Toc218951937 _Toc218052815 _Toc218051844 _Toc218951938 _Toc218052816 _Toc218051845 _Ref218238086 _Toc218951939 _Ref217838877 _Ref217838888 _Toc218052817 _Toc218051846 _Toc218951940 _Ref217832464 _Ref217832481 _Toc218052818 _Toc218051847 _Toc218951941 _Toc218951942 _Toc218951943 _Toc218951944 _Toc218951945 _Toc218951946 _Toc218951947 _Toc218951948 _Toc218052819 _Toc218051848 _Toc218951949 _Toc218052820 _Toc218051849 _Toc218951950 _Toc218052821 _Toc218051850 _Toc218951951 _Toc218951952 _Toc218052824 _Toc218051853 _Ref218257364 _Toc218951953 _Toc218052825 _Toc218051854 _Toc218951954 _Toc218951955 _Toc218052832 _Toc218051861 _Toc218052830 _Toc218051859 _Toc218951956 _Toc218951957 _Toc218951958 _Toc218951959 _Toc218052826 _Toc218051855 _Toc218951960 _Toc218052827 _Toc218051856 _Ref218271139 _Toc218951961 _Toc218052828 _Toc218051857 _Toc218951962 _Toc218052829 _Toc218051858 _Toc218951963 _Toc218052831 _Toc218051860 _Toc218951964 _Toc218951965 _Toc218052834 _Toc218051863 _Toc218951966 _Toc218052835 _Toc218051864 _Ref218315886 _Ref218315917 _Toc218951967 _Toc218052837 _Toc218051866 _Toc218951968 _Ref217894265 _Toc218052838 _Toc218051867 _Toc218951969 _Toc218052839 _Toc218051868 _Toc218951970 _Toc218052840 _Toc218051869 _Toc218951971 _Toc218951972 _Toc218052842 _Toc218051871 _Toc218951973 _Toc218052843 _Toc218051872 _Toc218951974 _Toc218052844 _Toc218051873 _Toc218951975 _Toc218052845 _Toc218051874 _Toc218951976 _Toc218052846 _Toc218051875 _Toc218951977 _Ref217895112 _Ref217894927 _Toc218052847 _Toc218051876 _Toc218951978 _Ref217838650 _Ref217839502 _Toc218052848 _Toc218051877 _Toc218951979 _Toc218052849 _Toc218051878 _Toc218951980 _Toc218052850 _Toc218051879 _Toc218951981 _Toc218052851 _Toc218051880 _Toc218951982 _Toc218052852 _Toc218051881 _Toc218951983 _Toc218052853 _Toc218051882 _Toc218951984 _Ref217839965_Firmware_Code_Analysis_ _Toc218052854 _Toc218051883 _Toc218951985_Fault_Tracing_and_Enumeration _Toc218052855 _Toc218051884 _Toc218951986_Firmware_Runtime_Tracing_ _Toc218052856 _Toc218051885 _Toc218951987 _Toc218951988 _Toc218951989Exploit_Development _Toc218052857 _Toc218051886 _Toc218951990 _Ref217808571 _Toc218052858 _Toc218051887 _Toc218951991 _Toc218052859 _Toc218051888 _Toc218951992 _Toc218052860 _Toc218051889 _Toc218951993 _Toc218052861 _Toc218051890 _Toc218951994 _Toc218052862 _Toc218051891 _Toc218951995 _Toc218052863 _Toc218051892 _Toc218951996v$x$x$x$$$$L)111<<<<<IIIRJJKKKKILMNNN+P+P+PQ2RRSTVV;Y\\di\l}uuwwwxx...ăSSS>;-----^---------1111G eeee?????:::rkskkk,dddm `A###Y&Y&Y&(((-h0h0h000b99:=?=?=? JaJaJaJtLtLtLSSSWZZZ\\\^^^bbb~c~c~cilmmm.xxxxxzzz|||k~k~k~e9%%%%WWWWqqqzzzU  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^\_`abdecfghijklmnopqrstuvwxyz{|}~     x$$$$$$$m)222<<===IIQJJKKHLL-MMNNO*PP>>ňYYY_\JJJJJs------GGG1QQWWzzzzKKKKK#9OOO)rr{!!! G((33v v  }}}IIQ2#2#2#r&r&r&(((-00099::%:O?O?O?BJoJoJoJLLLSSSXZZZ\\\(^(^(^,b,b,bcccil,m,m,mPxxxxxzzz|||r~r~r~ɇ   |P%888cccc͢͢͢U- ,O lO O ,O l O O O O ,O O l+w ,+w *w .w l*w +w *w +w %w :v :v 4;v t;v ;v ;v 4v t>v >v! >v" 4?v# t?v$ ?v% ?v& 4@v' t@v( @v) @v6FHHHMMDNNNNNYSYSSS9V9VЀЀёoI}d 5 y  %G^{`|U      !"#$%&'()*+,9FHHHMMMNWNWNaSaSSSEVEV׀׀ԑrL!g#8 |  %G^{c|U  !"#$%&'()*+,8&*urn:schemas-microsoft-com:office:smarttagsCity=**urn:schemas-microsoft-com:office:smarttags PlaceName=,*urn:schemas-microsoft-com:office:smarttags PlaceTypeB)*urn:schemas-microsoft-com:office:smarttagscountry-region9'*urn:schemas-microsoft-com:office:smarttagsState9-*urn:schemas-microsoft-com:office:smarttagsplace  2-,-*)-'&-'-&-&-)-----------------------------?B!uuwwxxz{}~ABUL)n)FKMKLLYSxSSSSSSTT:T;T}TqUU9VSV}uu"ăƈLjik_g>`;] $%-jkR\b9999 JCJiillvv.xQxxx"y$yʇuuwwxxz{}~ABU33333333333333333333333333333333333333333xF--f4f=]6t(H O o  0 `  0 { = ]  / k @u&FKk -pHh!g1Qa3Sa(Hd:p)I Mm'_6p6t, L !H!h!!!"&"Z"z""".#N###$#$S$s$x$$%%&'I(k(J)K)S)m)128`9<=====U>a>>>=?M???@ @{@@@@AABBCCCCD DDD6E;EEE6F:FFF.G9GGGGGkHqHHHIQIII?JJJKMXMMMNNNN2RSTVhVVV;YWYYYY2Z\\deHgsgij\lllrrWuyu{u|u}uuuuwwxx}~~~!?ƒÃă˃e~ňSZ:<=E_Ik79:B\K^tOq ,-HnXԟ GX e{?LǸ3S#:PrkQqs*Jj(Hk|w" ,Ha4a_*d* J m   3U`~AR.k!!O""#3#Y&s&((((---.N.h0088;9^9`9a9i999999:&:m===?P?]@@IJJJ J'JBJpJtLLlNVOSSWXYYY)ZZZ\\^)^b-b~cc^d~d.eQeZeze8hXhhi}i~iiikkkllllm-mq;qrsvuu4vUv,x-x5xPxxxxxxxy yzz||k~s~ ҆ɇe}9Q%:Wdq΢zǩguuwwxxz{}~ڮۮ3_cq˯̯;?ABUxI(k(J)K)YYWuyu{u|u}~~~ƒÃe~:<=Ik79:(,nԟ Ǹ3SQqJj(Ha* J ((-.N.88;9^9`9a999m==IJJJ^d~d.eQe8hXhhi}i~ikkkllq;qrsvuu4vUv,x-xxxy y҆uuwwxxz{}~ڮۮ3_q˯̯;ABU"cV8f|wZR:ȓT\ZTZ JȠ^! RhJ4X'?in`eTkf$Ԥfv\D$(b@b'$&1Y(P 4^m`<"6Xs:yl4%B=ͲV+=|_qrDܒtzuD;CQ&9/eY h-.TJ`r"rg&xgЭm;v VsTEsR= Bft e!u=} >A~ ^^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hHhP^`POJQJo(hHh^`OJQJo(hH 0^`0o(hH.. ``^``o(hH... ^`o(hH .... ^`o(hH ..... ^`o(hH Appendix   `^``o(hH. 00^0`o(hH..h^`OJ QJ ^Jo(hHoh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ ^Jo(hHoh@ ^@ `OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHhP^P`OJ QJ ^Jo(hHoh ^ `OJ QJ o(hH^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hH^`OJQJo(hH^`OJ QJ ^Jo(hHop^p`OJ QJ o(hH@ ^@ `OJQJo(hH^`OJ QJ ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJ QJ ^Jo(hHoP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hHhP^`POJQJo(hHh^`OJQJo(hH 0^`0o(hH.. ``^``o(hH... ^`o(hH .... ^`o(hH ..... ^`o(hH Appendix   `^``o(hH. 00^0`o(hH..h^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hH^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hH^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h^`OJQJo(hH^`OJ QJ ^Jo(hHop^p`OJ QJ o(hH@ ^@ `OJQJo(hH^`OJ QJ ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJ QJ ^Jo(hHoP^P`OJ QJ o(hHh ^`o(hH.h ^`o(hH.hpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh^`OJQJo(hH^`OJ QJ ^Jo(hHop^p`OJ QJ o(hH@ ^@ `OJQJo(hH^`OJ QJ ^Jo(hHo^`OJ QJ o(hH^`OJQJo(hH^`OJ QJ ^Jo(hHoP^P`OJ QJ o(hHh h^h`o(hH[]h 8^8`hH.h L^`LhH.h  ^ `hH.h  ^ `hH.h xL^x`LhH.h H^H`hH.h ^`hH.h L^`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohPP^P`OJ QJ o(hHh ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH. P^`Po(hH @@^@`o(hH. 0^`0o(hH.. ^`o(hH...   ^ `o(hH .... ^`o(hH ..... ^`o(hH Appendix   `^``o(hH. ``^``o(hH..^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hH^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h^`OJQJo(hHh^`OJ QJ ^Jo(hHohp^p`OJ QJ o(hHh@ ^@ `OJQJo(hHh^`OJ QJ ^Jo(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^Jo(hHohP^P`OJ QJ o(hH"TEs@b'9/eYb <"64"rgQ\D$^! :8wZTZ 4\RVsB=f$A~Bftc=}V+=e1Y(!uzuD'?is:mrDTJ`xg$$                                                                                                            z-Nq.z                         X                                            VvxX       Rpn                                                               y`;PQ.| fE"..,CJ#Q.G0P03BHp5Lo9>n4;iE;,CJKzOPBGU|k3UfE";X;<Z>Z03[Y]y`Uc>n4;`2hph*XizWx:g>k`n| ? 0 f2 A o Cojuap\"Sir62?lA1=; b "P"#i#c$GZ$d$lQ&U\&e'T'*s%+7@.0s0-3534Q5n 5S5c;DF<p"=uP=c>??;q?@nA\C-aECFI%+J7J[N~QS_SNDTS#UwX.XZ4Zl[n[n \\\^eghwiq5q!rtxv*wTMxCy{}WV}%~{2ev %Dfjo?OJO.aR+ vD^SmqFgm,i"E>:vy VHBk m twK>n~ v<^R?6%c+M'[=LA~aPdOJ?uw@tttt(JKT@R@Unknown Joshua Wright G* Times New Roman5Symbol3. * Arial7.{ @CalibriACMR8CambriaCCMR12Cambria5. *aTahomaI  Arial BoldArial3* Times?= * Courier New;WingdingsA BCambria Math"1h *ۤf?@6n: ?@6n: !p4d 2qXR 04r2! xx_C:\Documents and Settings\bobby.ENERNEX\Application Data\Microsoft\Templates\EnerNex Report.dot3Advanced Metering Infrastructure Attack MethodologyAMI Audit Security AnalysisMatthew CarpenterDarren Highfill"                           ! Oh+'0 < T`    4Advanced Metering Infrastructure Attack MethodologyMatthew CarpenterAMI Audit Security AnalysisEnerNex Report.dotDarren Highfill3Microsoft Office Word@[@ᚳ@wS@YW:?@6n՜.+,D՜.+,` hp|    4Advanced Metering Infrastructure Attack Methodology Title(0ow _PID_HLINKSVersionDate completedA6{_Toc2189519966{_Toc2189519956 {_Toc2189519946{_Toc2189519936{_Toc2189519926{_Toc2189519916{_Toc2189519906{_Toc2189519896{_Toc2189519886{_Toc2189519876{_Toc2189519866{_Toc2189519856{_Toc2189519846{_Toc2189519836{_Toc2189519826{_Toc2189519816{_Toc2189519806{_Toc2189519796{_Toc2189519786{_Toc2189519776{_Toc2189519766{_Toc2189519756{_Toc2189519746{_Toc2189519736{_Toc2189519726{_Toc2189519716y{_Toc2189519706s{_Toc2189519696m{_Toc2189519686g{_Toc2189519676a{_Toc2189519666[{_Toc2189519656U{_Toc2189519646O{_Toc2189519636I{_Toc2189519626C{_Toc2189519616={_Toc21895196067{_Toc21895195961{_Toc2189519586+{_Toc2189519576%{_Toc2189519566{_Toc2189519556{_Toc2189519546{_Toc2189519536 {_Toc2189519526{_Toc2189519516{_Toc2189519506{_Toc2189519496{_Toc2189519486{_Toc2189519476{_Toc2189519466{_Toc2189519456{_Toc2189519446{_Toc2189519436{_Toc2189519426{_Toc2189519416{_Toc2189519406{_Toc2189519396{_Toc2189519386{_Toc2189519376{_Toc2189519366{_Toc2189519356{_Toc2189519346{_Toc2189519336{_Toc2189519326{_Toc2189519316{_Toc2189519306{_Toc2189519296}{_Toc2189519286w{_Toc2189519276q{_Toc2189519266k{_Toc2189519256e{_Toc2189519246_{_Toc2189519236Y{_Toc2189519226S{_Toc2189519216M{_Toc2189519206G{_Toc2189519196A{_Toc2189519186;{_Toc21895191765{_Toc2189519166/{_Toc2189519156){_Toc2189519146#{_Toc2189519136{_Toc2189519126{_Toc2189519116{_Toc2189519106 {_Toc2189519091.0Jan. 5, 2009  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012356789:;=>?@ABCDEFGHIJY\^]_`abcdeRoot Entry F[@Data o1TableWordDocumentsSummaryInformation(4DocumentSummaryInformation8<CompObjyMsoDataStoreF  !"#$%&'()*+,-./012345678:;<>?@BCD  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision. DocumentLibraryFormDocumentLibraryFormDocumentLibraryForm