ࡱ>  -/&'()*+,wq` LbjbjqPqP ;::f_8 ,L: 6$Dh9"6`.!fTq i%h!j 0:j0RRq"R rX|FwXXXjXXX:$$$ Data Strategy and Data Warehousing Context The term Data Warehousing is now commonly used in industry. It refers to a kind of heterogeneous information system one in which the focus is on gathering together data from different operational databases within an organisation and/or on the Web, and making it available for decision making purposes. This unit explains the concept of distributed database transaction processes and then looks at the problems and steps involved in building such a distributed database environment. Later in the unit, you will see the data warehouse approach compared to the traditional operational database, and examine some of the techniques that have been proposed for constructing data warehouses. As more and more databases provide online access through the Web, it is possible for an organisation to build a data warehouse which may be a huge collection of business intelligence and information gathered online. The techniques learned in this unit will be of help in developing such systems, which can give an organisation competitive advantage in an increasingly difficult business environment. Simply storing data in a data warehouse does not provide the full benefits for an organisation with a vast amount of data. To realise the true value of a data warehouse, the organisation needs to extract useful information and knowledge hidden within the warehouse. However, as the volume and complexity of data in a data warehouse grows, it becomes increasingly difficult (sometimes impossible) for business analysts to identify trends and relationships in the data using traditional query and reporting tools. Data warehousing takes from, and builds on the material we covered in the design of relational systems. Data warehouses usually contain large amounts of aggregated data, and so pose a number of additional problems regarding design, data quality and performance tuning. In this unit, we will cover new concepts required for the design of data warehouses, and consider how to develop a warehouse to support strategically or tactically oriented queries. The usefulness of the results of these queries however depends on the quality and reliability of the data, which is also discussed in this unit. Relation to other modules Units 2 to 5 provide the fundamental of this unit. Unit 2 and 3 have discussed relational model characteristics and the rules they follow. The unit 4 discusses the SQL which is a query language for relational database. The unit 5 explores the normalisation techniques. In this unit we will see how all the approaches are addressed differently while building a data warehouse. The next unit discusses data mining techniques which are based on the concepts and techniques of data warehousing discussed in this unit. The data mining approach offers one of the most effective ways to extract meaningful trends and patterns from huge amounts of data. We highlight the characteristics of major data mining operations and techniques, and discuss the relationship between data mining and data warehousing. Learning Outcomes At the end of this unit you should be able to: Explain transaction and update processes in distributed database environments and identify the data integration issues Identify the need of a data warehouse for large corporations Discuss the architecture and processes involved in developing and maintaining a data warehouse; Formulate and implement data quality rules and disciplines in industrial data management environments; Review data performance by analysing industrial capacity plan and performance model; Apply processes and practices that ensure data security and privacy Required Study Time You should plan to spend approximately 18 hours studying this unit. You may find it convenient to break up your study as follows: ActivityTimePreparation (Introduction and On-line Planning):0.5 hrsDisk-based Content:4.5 hrsApplication:5 hrsSet textbook Content:4 hrsThinking (On-line discussions, Review questions):2 hrsTutorial Work:1 hrsRelated Course Work:1 hrsTotal:18 HoursEquipment/Software Required A Web browser for browsing Web sites. Internet Explorer 5.0 is recommended. Word Processor/Text editor, i.e. Microsoft Word, Word Pad, Note Pad Learning Journal You will be expected to keep a learning journal throughout this module. It will help, if you keep a record of new/difficult concepts, unusual rules and lessons learnt from the activities. You can refer to your Learning Journal at any point Reading Materials Connolly, T. and Begg, C., 2002, Database Systems: A Practical Approach to Design, Implementation, and Management, Addison Wesley, Harlow, England Adelman, S., Moss, L and Abai, M., Data Strategy, Addison Wesley, 2005, ISBN: 0-321-24099-5 10.1 Distributed Database Fundamentals A distributed database system consists of several computers, the database itself being stored on these computers which communicate with one another usually via high-speed networks or telephone lines. It is not uncommon for these different computers to vary in both technical specification and function, depending upon their importance and position in the system as a whole. Note that the generally understood description of a distributed database system given here is rather different from the client/server systems . In client/server systems, the data is not itself distributed; it is stored on a server machine, and accessed remotely from client machines. In a distributed database system on the other hand, the data is itself distributed among a number of different computers. Decisions therefore need to be made about the way in which the data is to be distributed and also about how updates are to be propagated over multiple sites. The distribution of data, by an organisation, throughout its various sites and departments allows data to be stored where it was generated, or indeed is most used, while still being easily accessible from elsewhere. The general structure of a distributed system is shown below;  Figure 10.1 A distributed system In effect, each separate site in the example is really a database system site in its own right, each location having its own database, as well as its own DBMS and transaction management software. It is commonly assumed when discussion arises concerning distributed database systems, that the many databases involved are widely spread from each other in geographical terms. Importantly, it should be made clear that geographical distances will have little or no effect upon the overall operation of the distributed system, the same technical problems arise whether the databases are simply logically separated as they would if separated by a great distance. Motivation for Distributed Database Systems So why have distributed databases become so desirable? There are a number of reasons that promote the use of a distributed database system, these can include such things as: the sharing of data local autonomy data availability. Furthermore, it is likely that the organisation that has chosen to implement the system will itself be distributed. By this we mean that there are almost always several departments and divisions within the company structure. An illustrative example is useful here in clarifying the benefits that can be gained from the use of distributed database systems; Scenario Banking system Imagine a banking system that operates over a number of separate sites; for the sake of this example let us consider two offices, one in Manchester and another in Birmingham. Account data for Manchester accounts is stored in Manchester, while Birminghams account data is stored in Birmingham. We can now see that two major benefits are afforded by the use of this system, efficiency of processing is increased due to the data being stored where it is most frequently accessed, while an increase in the accessibility of account data is also gained. The use of distributed database systems is not without its drawbacks however. The main disadvantage being the added complexity that is involved in ensuring that proper co-ordination between the various sites is possible. This increase in complexity can take a variety of forms: Greater potential for bugs - With a number of databases operating concurrently; ensuring that algorithms for the operation of the system are correct becomes an area of great difficulty. There is the potential here for the existence of extremely subtle bugs. Implementation costs - Implementing a distributed database system, as opposed to a centralised system is considerably more difficult and as such incurs much greater development costs. Increased processing overhead - The additional computation required in order to achieve intersite co-ordination is a considerable overhead not present in centralised systems. In spite of the above drawbacks, the rational for developing and maintaining distributed database systems can be summarised into the following twelve objectives: Local autonomy No reliance on a central site Continuous operation Location independence Fragmentation independence Replication independence Distributed query processing Distributed transaction management Hardware independence Operating system independence Network independence DBMS independence These twelve objectives are not all independent of one another. They are also not necessarily exhaustive nor are they all equally significant. Probably the major issue to be handled in distributed database systems is the way in which updates are propagated throughout the system. Two key concepts play a major role in this process: Data fragmentation: the splitting up of parts of the overall database across different sites Data replication: the process of maintaining identical data across different sites Fragmentation independence A system can support data fragmentation if a given stored relation can be divided up into pieces or fragments for physical storage purposes. Fragmentation is desirable for performance reasons: data can be stored at the location where it is most frequently used, so that most operations are purely local and network traffic is reduced. A fragment can be any arbitrary sub-relation that is derivable from the original relation via restriction (horizontal fragmentation) and projection (vertical fragmentation) operations. Fragmentation independence (also known as fragmentation transparency), therefore, allows users to behave, at least from a logical standpoint, as if the data were not fragmented at all. This implies that users will be presented with a view of the data in which the fragments are logically combined together by suitable joins and unions. It is the responsibility of the system optimiser to determine which fragment needs to be physically accessed in order to satisfy any given user request. Replication independence A system supports data replication if a given stored relation - or, more generally, a given fragment - can be represented by many distinct copies or replicas, stored at many distinct sites. Replication is desirable for at least two reasons: First it can mean better performance (applications can operate on local copies instead of having to communicate with remote sites); second, it can also mean better availability (a given replicated object - fragment or whole relation - remains available for processing so long as at least one copy remains available, at least for retrieval purposes). Now, we may ask a question: What problems are associated with data replication and fragmentation? Both data replication and fragmentation have their related problems in implementation. However, distributed non-replicated data only has problems when the relations are fragmented. The problem of supporting operations, such as updating, on fragmented relations has certain points in common with the problem of supporting operations on join and union views. It follows too that updating a given tuple might cause that tuple to migrate from one fragment to another, if the updated tuple no longer satisfies the relation predicate for the fragment it previously belonged to. Replication also has its associated problems. The major disadvantage of replication is that when a given replicated object is updated, all copies of that object must be updated the update propagation problem. Therefore, in addition to transaction, system and media failures that can occur in a centralised DBMS, a distributed database system (DDBMS) must also deal with communication failures. Communications failures can result in a site holding a copy of the object being unavailable at the time of the update. Besides the issues discussed above, there are other problems associated with the distributed database transaction and update approaches: Database structure conflict: There is the possibility that to preserve local autonomy the local database structure may be changed. This may cause other databases or applications to interact with the local database improperly. Data semantic conflict: local databases may have their own representation of data and the semantic of the data at one site may differ from the others located at different sites. Data redundancy: each site has their own copies of data and that leads to data redundancy Update anomalies: update of data at one site may not be reflected in the databases located at different sites Data consistency problem: update of data at one site may not match with the database located at different sites Restricted query facilities: to execute a query on the database that are distributed over multiple sites in order to derive a meaningful information requires multiple database access, automated navigation to the target database, constructing a common view that can accommodate all data requirements. Hence, it involves huge overhead. Data relationship conflict: as in distributed environment databases are distributed in different locations, it may raise data relationship conflict due to heterogeneity of data structures and data semantics. A fragment of database at one location may have missing relationship in that local database and may be required to map to other databases located at different sites. AN EXAMPLE COULD BE USEFUL HERE Validation conflict: the validation techniques that are applied to one site may not be applicable for the same data elements located at different sites. For example, empno a primary key in employee table may not have the same data structure and data domain at each location. Moreover, if a data element has a number of dependant data elements at different sites, the validation process needs to ensure that all dependant data elements are validated before they contribute to the parent data element located at other site. This process involves huge overhead. Furthermore, it is not always possible to differentiate between communication failure and system failure in the transaction and update processes in distributed database environment and that increases complexities even more. Connolly, T. and Begg, C., 2002, Database Systems: A Practical Approach to Design, Implementation, and Management, Addison Wesley, Harlow, England. Chapter 22, Section 22.1, 22.4 and 22.5 Make notes in learning journal. Now carry out Activity 10.1 Exploring Replication in Informix Learning Outcome: Explain transaction and update processes in distributed database environment and identify the data integration issues Now do Review Question 10.1 Now do Review Question 10.2Keep notes in your learning journal of your learning process before you proceed to the next section. 10.2 Data Warehouse Fundamentals Rapid developments in information technology have resulted in the construction of many business application systems in numerous areas. Within these systems, databases often play an essential role. Data has become a critical resource in many organisations, and therefore, efficient access to the data, sharing the data, extracting information from the data, and making use of the information stored, have become an urgent need. As a result, there have been many efforts on firstly integrating the various data sources (e.g., databases) scattered across different sites to build a corporate data warehouse, and then extracting information from the warehouse in the form of patterns and trends. A data warehouse is very much like a database system, but there are distinctions between these two types of systems. A data warehouse brings together the essential data from the underlying heterogeneous databases, so that a user only needs to make queries to the warehouse instead of accessing individual databases. The co-operation of several processing modules to process a complex query is hidden from the user. Essentially, a data warehouse is built to provide decision support functions for an enterprise or an organisation. While the individual data sources may have the raw data, the data warehouse will have correlated data, summary reports, and aggregate functions applied to the raw data. Thus, the warehouse is able to provide useful information that cannot be obtained from individual databases. The differences between the data warehousing system and operational databases are discussed later in the unit. We will also see what a data warehouse looks like its architecture and other design issues will be studied. Important issues include the role of metadata as well as various access tools. Data warehouse development issues are discussed with an emphasis on data transformation and data cleansing. Star Schema, a popular data modelling approach, is introduced. A data warehouse is an environment, not a product. The motivation for building a data warehouse is that corporate data is often scattered in different databases and possibly in different formats. In order to obtain a complete piece of information, it is necessary to access these heterogeneous databases, obtain bits and pieces of partial information from each of them, and then put together the bits and pieces to produce an overall picture. Obviously, this approach (without a data warehouse) is cumbersome, inefficient, ineffective, error-prone, and usually involves huge efforts of system analysts. All these difficulties deter the effective use of complex corporate data, which usually represents a valuable resource of an organisation. In order to overcome these problems, it is considered necessary to have an environment that can bring together the essential data from the underlying heterogeneous databases. In addition, the environment should also provide facilities for users to carry out queries on all the data without worrying where it actually resides. Such an environment is called a data warehouse. All queries are issued to the data warehouse as if it is a single database, and the warehouse management system will handle the evaluation of the queries. Different techniques are used in data warehouses aimed at effective integration of operational databases into an environment that enables strategic use of data. These techniques include relational and multi-dimensional database management systems, client-server architecture, metadata modelling and repositories, graphical user interfaces, and much more. A data warehouse system has the following characteristics: It provides a centralised utility of corporate data or information assets. It is contained in a well-managed environment. It has consistent and repeatable processes defined for loading operational data. It is built on an open and scaleable architecture that will handle future expansion of data. It provides tools that allow its users to effectively process the data into information without a high degree of technical support. A data warehouse is conceptually similar to a traditional centralised warehouse of products within the manufacturing industry. For example, a manufacturing company may have a number of plants and a centralised warehouse. Different plants use different raw materials and manufacturing processes to manufacture goods. The finished products from the plants will then be transferred to and stored in the warehouse. Any queries and deliveries will only be made to and from the warehouse rather than the individual plants. Using the above analogy, we can say that a data warehouse is a centralised place to store data (i.e., the finished products) generated from different operational systems (i.e., plants). For a big corporation, for example, there are normally a number of different departments/divisions, each of which may have its own operational system (e.g., database). These operational systems generate data day in and day out, and the output from these individual systems can then be transferred to the data warehouse for further use. Such a transfer, however, is not just a simple process of moving data from one place to another. It is a process involving data transformation and possibly other operations as well. The purpose is to ensure that heterogeneous data will conform to the same specification and requirement of the data warehouse. Building data warehouses has become a rapidly expanding requirement for most information technology departments. The reason for growth in this area stems from many places: With regard to data, most companies now have access to more than 20 years of data on managing the operational aspects of their business. With regard to user tools, the technology of user computing has reached a point where corporations can now effectively allow the users to navigate corporation databases without causing a heavy burden to technical support. With regard to corporate management, executives are realising that the only way to sustain and gain an advantage in todays economy is to better leverage information. Operational Systems vs. Data Warehousing Systems Before we proceed to detailed discussions of data warehousing systems, it is beneficial to note some of the major differences between operational and data warehousing systems. Operational systems Operational systems are those that assist a company or an organisation in its day-to-day business to respond to events or transactions. As a result, operational system applications and their data are highly structured around the events they manage. These systems provide an immediate focus on business functions and typically run in an on-line transaction processing (OLTP) computing environment. The databases associated with these applications are required to support a large number of transactions on a daily basis. Typically, operational databases are required to work as fast as possible. Strategies for increasing performance include keeping these operational data stores small, focusing the database on a specific business area or application, and eliminating database overhead in areas such as indexes. Data warehousing systems Most companies today usually have relatively sophisticated operational systems, and are now focusing on putting together information contained within these systems to define what they have done right (and therefore should continue to do) as well as what they have done wrong (and should not be allowed to happen again). This data is being captured and stored in data warehouses. Operational system applications and their data are highly structured around the events they manage. Data warehouse systems are organised around the trends or patterns in those events. Operational systems manage events and transactions in a similar fashion to manual systems utilised by clerks within a business. These systems are developed to deal with individual transactions according to the established business rules. Data warehouse systems focus on business needs and requirements that are established by managers, who need to reflect on events and develop ideas for changing the business rules to make these events more effective. Operational systems and data warehouses provide separate data stores. A data warehouses data store is designed to support queries and applications for decision-making. The separation of a data warehouse and operational systems serves multiple purposes: It minimises the impact of reporting and complex query processing on operational systems It preserves operational data for reuse after that data has been purged from operational systems. It manages the data based on time, allowing user to look back and see how the company looked in the past versus the present. It provides a data store that can be modified to conform to the way the users view the data. It unifies the data within a common business definition, offering one version of reality. A data warehouse assists a company in analysing its business over time. Users of data warehouse systems can analyse data to spot trends, determine problems, and compare business techniques in a historical context. The processing that these systems support include complex queries, ad hoc reporting, and static reporting (such as the standard monthly reports that are distributed to managers). The data that is queried tends to be of historical significance and provides its users with a time-based context of business processes. Differences between operational and data warehousing systems While a company can better manage its primary business with operational systems through techniques that focus on cost reduction, data warehouse systems allow a company to identify opportunities for increasing revenues, and therefore, for growing the business. From a business point of view, this is the primary way to differentiate these two mission critical systems. However, there are many other key differences between these two types of systems. Size and content: The goals and objectives of a data warehouse differ greatly from an operational environment. While the goal of an operational database is to stay small, a data warehouse is expected to grow large to contain a good history of the business. The information required to assist us in better understanding our business can grow quite voluminous over time, and we do not want to lose this data. Performance: In an operational environment, speed is of the essence. However, in a data warehouse some requests meaning-of-life queries can take hours to fulfil. This may be acceptable in a data warehouse environment, because the true goal is to provide better information, or business intelligence. For these types of queries, users are typically given a personalised extract of the requested data so they can further analyse and query the information package provided by the data warehouse. Content focus: Operational systems tend to focus on small work areas, not the entire enterprise; a data warehouse, on the other hand, focuses on cross-functional subject areas. For example, a data warehouse could help a business understand who its top 20 at-risk customers are those who are about to drop their services and what type of promotions will assist in not losing these customers. To fulfil this query request, the data warehouse needs data from the customer service application, the sales application, the order management application, the credit application, and the quality system. Tools: Operational systems are typically structured, offering only a few ways to enter or access the data that they manage, and lack a large amount of tools accessibility for users. A data warehouse is the land of user tools. Various tools are available to support the types of data requests discussed earlier. These tools provide many features that transform and present the data from a data warehouse as business intelligence. These features offer a high flexibility over the standard reporting tools that are offered within an operational systems environment. Benefits of Data Warehousing Systems Driven by the need to gain competitive advantage in the marketplace, organisations are now seeking to convert their operational data into useful business intelligence in essence fulfilling user information requirements. The users questioning process is not as simple as one question and the resultant answer. Typically, the answer to one question leads to one or more additional questions. The data warehousing systems of today require support for dynamic iterative analysis delivering answers in a rapid fashion. Data warehouse systems often characterised by query processing can assist in the following areas: Consistent and quality data: For example, a hospital system had a severe data quality problem within its operational system that captured information about people serviced. The hospital needed to log all people who came through its door regardless of the data that was provided. This meant that someone, who checked in with a gun shot wound and told the staff his name was Bob Jones and who subsequently lost consciousness, would be logged into the system identified as Bob Jones. This posed a huge data quality problem, because Bob Jones could have been Robert Jones, Bobby Jones or James Robert Jones. There was no way of distinguishing who this person was. You may be saying to yourself, big deal! But if you look at what a hospital must do to assist a patient with the best care, this is a problem. What if Bob Jones were allergic to some medication required to treat the gun shot wound? From a business sense, who was going to pay for Bob Jones bills? From a moral sense, who should be contacted regarding Bob Jones ultimate outcome? All of these directives had driven this institution to a proper conclusion: They needed a data warehouse. This information base, which they called a clinical repository, would contain quality data on the people involved with the institution that is, a master people database. This data source could then assist the staff in analysing data as well as improving the data capture, or operational system, in improving the quality of data entry. Now when Bob Jones checks in, they are prompted with all of the patients called Bob Jones who have been treated. The person entering the data is presented with a list of valid Bob Jones and several questions that allow the staff to better match the person to someone who was previously treated by the hospital. Cost reduction: Monthly reports produced by an operational system could be expensive to store and distribute. In addition, typically very little content in the reports is universally useful. Because the data took so long to produce and distribute that it was out of synch with the users requirements. A data warehouse implementation can solve this problem. We can index the paper reports online and allow users to select the pages of importance to be loaded electronically to the users personal workstations. We could save a bundle of money just by eliminating the distribution of massive paper reports. More timely data access: As noted earlier, reporting systems have become so unwieldy that the data that they present is typically unusable after it is placed in users hands. What good is a monthly report if you do not get it until the end of the following month? How can you change what you are doing based on data that old? The reporting backlog has never dissipated within information system departments; typically it has grown. Granting users access to data on a more timely basis allows them to better perform their business tasks. It can also assist in reducing the reporting backlog, because users take more responsibility for the reporting process. Improved performance and productivity: Removing information systems professionals from the reporting loop and empowering users results in internal efficiency. Imagine that you had no operational systems and had to hunt down the person who recorded a transaction to better understand how to improve the business process or determine whether a promotion was successful. The truth is that all we have done is automate this nightmare with the current operational systems. Users have no central sources for information and must search all of the operational systems for the data that is required to answer their questions. A data warehouse assists in eliminating information backlogs, reporting backlogs, information system performance problems, and so on by improving the efficiency of the process, eliminating much of the information search missions. It should be noted that even with a data warehouse, companies still require two distinct kinds of reporting: those that provide notification of operational conditions needing response and those that provide general information, often summarised, about business operations. The notification style reports should still be derived from operational systems, because detecting and reporting these conditions is part of the process of responding to business events. The general information reports, indicating operational performance typically used in analysing the business, are managed by a data warehouse. Now carry out Activity 10.2 Data warehouse case study Learning Outcome: Identify the need for a data warehouse in large corporations  Now do Review Question 10.2Keep notes in your learning journal of your learning process before you proceed to the next section. 10.3 Data Warehouse Fundamentals Data warehouses provide a means to make information available for decision-making. An effective data warehousing strategy must deal with the complexities of modern enterprises. Data is generated everywhere, and controlled by different operational systems and data storage mechanisms. Users demand access to data anywhere and anytime, and data must be customised to their needs and requirements. The function of a data warehouse is to prepare the current transactions from operational systems into data with a historical context required by the users of the data warehouse. Overall Architecture The general data warehouse architecture is based on a relational database management system server that functions as the central repository for informational data. In the data warehouse architecture, operational data and processing is completely separate from data warehouse processing. This central information repository is surrounded by a number of key components designed to make the entire environment functional, manageable, and accessible by both the operational systems that source data into the warehouse and by end-user query and analysis tools. Figure 10.2 depicts such a general architecture. Typically, the source data for the warehouse is coming from the operational applications (or an operational data store ODS). As the data enters the data warehouse, it is transformed into an integrated structure and format. The transformation process may involve conversion, summarisation, filtering, and condensation of data. Because data within the data warehouse contains a large historical component (sometimes over 5 to 10 years), the data warehouse must be capable of holding and managing large volumes of data as well as different data structures for the same database over time. The Data Warehouse The central data warehouse database is a cornerstone of the data warehousing environment. This type of database is mostly implemented using a relational DBMS (RDBMS). However, a warehouse implementation based on traditional RDBMS technology is often constrained by the fact that traditional RDBMS implementations are optimised for transactional database processing. Certain data warehouse attributes, such as very large database size, ad hoc query processing, and the need for flexible user view creation including aggregates, multi-table joins, and drill-downs, have become drivers for different technological approaches to the data warehouse database. Data Transformation A significant potion of the data warehouse implementation effort is spent extracting data from operational systems and putting it in a format suitable for information applications that will run off the data warehouse. The data sourcing, cleanup, transformation, and migration tools perform all of the conversions, summarisation, key changes, structural changes, and condensations needed to transform disparate data into information that can be used by the decision support tool. It also maintains the metadata. The functionality of data transformation includes Removing unwanted data from operational databases. Converting to common data names and definitions. Calculating summaries and derived data. Establishing defaults for missing data. Accommodating source data definition changes.  Figure 10.2 A general data warehouse architecture The data sourcing, cleanup, extraction, transformation, and migration tools have to deal with some important issues as follows: Database heterogeneity: DBMSs can vary in data models, data access languages, data navigation operations, concurrency, integrity, recovery, etc. Data heterogeneity: This is the difference in the way data is defined and used in different models homonyms, synonyms, unit incompatibility, different attributes for the same entity, and different ways of modelling the same fact. Metadata A crucial area of data warehouse is metadata, which is a kind of data that describes the data warehouse itself. Within a data warehouse, metadata describes and locates data components, their origins (which may be either the operational systems or the data warehouse), and their movement through the data warehouse process. The data access, data stores, and processing information will have associated descriptions about the data and processing the inputs, calculations, and outputs documented in the metadata. This metadata should be captured within the data architecture and managed from the beginning of a data warehouse project. The metadata repository should contain information such as that listed below: Description of the data model. Description of the layouts used in the database design. Definition of the primary system managing the data items. A map of the data from the system of record to the other locations in the data warehouse, including the descriptions of transformations and aggregations. Specific database design definitions. Data element definitions, including rules for derivations and summaries. It is through metadata that a data warehouse becomes an effective tool for an overall enterprise. This repository of information will tell the story of the data: where it originated, how it has been transformed, where it went, and how often that is, its genealogy or artefacts. Technically, the metadata will also improve the maintainability and manageability of a warehouse by making impact analysis information and entity life histories available to the support staff. Equally important, metadata provides interactive access to users to help understand content and find data. Thus, there is a need to create a metadata interface for users. One important functional component of the metadata repository is the information directory. The content of the information directory is the metadata that helps users exploit the power of data warehousing. This directory helps integrate, maintain, and view the contents of the data warehousing system. From a technical requirements point of view, the information directory and the entire metadata repository should: be a gateway to the data warehouse environment, and therefore, should be accessible from any platform via transparent and seamless connections. support an easy distribution and replication of its content for high performance and availability. be searchable by business-oriented key words. act as a launch platform for end-user data access and analysis tools. support the sharing of information objects such as queries, reports, data collections, and subscriptions between users. support a variety of scheduling options for requests against the data warehouse, including on-demand, one-time, repetitive, event-driven, and conditional delivery (in conjunction with the information delivery system). support the distribution of query results to one or more destinations in any of the user-specified formats (in conjunction with the information delivery system). support and provide interfaces to other applications such as e-mail, spreadsheet, and schedules. support end-user monitoring of the status of the data warehouse environment. At a minimum, the information directory component should be accessible by any Web browser, and should run on all major platforms, including MS Windows, Windows NT, and UNIX. Also, the data structures of the metadata repository should be supported on all major relational database platforms. These requirements define a very sophisticated repository of metadata information. In reality, however, existing products often come up short when implementing these requirements. Access Tools The principle purpose of data warehousing is to provide information to business users for strategic decision-making. These users interact with the data warehouse using front-end tools. Although ad hoc requests, regular reports, and custom applications are the primary delivery vehicles for the analysis done in most data warehouses, many development efforts of data warehousing projects are focusing on exceptional reporting also known as alerts, which alert a user when a certain event has occurred. For example, if a data warehouse is designed to assess the risk of currency trading, an alert can be activated when a certain currency rate drops below a predefined threshold. When an alert is well synchronised with the key objectives of the business, it can provide warehouse users with a tremendous advantage. The front-end user tools can be divided into five major groups: Data query and reporting tools. Application development tools. Executive information systems (EIS) tools. On-line analytical processing (OLAP) tools. Data mining tools. Query and reporting tools This category can be further divided into two groups: reporting tools and managed query tools. Reporting tools can be divided into production reporting tools and desktop report writers. Production reporting tools will let companies generate regular operational reports or support high-volume batch jobs, such as calculating and printing paycheques. Report writers, on the other hand, are affordable desktop tools designed for end users. Managed query tools shield end users from the complexities of SQL and database structures by inserting a metalayer between users and the database. The metalayer is the software that provides subject-oriented views of a database and supports point-and-click creation of SQL. Some of these tools proceed to format the retrieved data into easy-to-read reports, while others concentrate on on-screen presentations. These tools are the preferred choice of the users of business applications such as segment identification, demographic analysis, territory management, and customer mailing lists. As the complexity of the questions grows, these tools may rapidly become inefficient. Application development tools Often, the analytical needs of the data warehouse user community exceed the built-in capabilities of query and reporting tools. Organisations will often rely on a true and proven approach of in-house application development using graphical data access environments designed primarily for client-server environments. Some of these application development platforms integrate well with popular OLAP tools, and can access all major database systems, including Oracle, Sybase, and Informix. Executive information systems (EIS) tools. The target users of EIS tools are senior management of a company. They are used to transform information and present that information to users in a meaningful and usable manner. These tools support advanced analytical techniques and free-form data exploration, allowing users to easily transform data into information. EIS tools tend to give their users a high-level summarisation of key performance measures to support decision-making. OLAP These tools are based on concepts of multidimensional database and allow a sophisticated user to analyse the data using elaborate, multidimensional, and complex views. Typical business applications for these tools include product performance and profitability, effectiveness of a sales program or a marketing campaign, sales forecasting, and capacity planning. These tools assume that the data is organised in a multidimensional model which is supported by a special multidimensional database or by a relational database designed to enable multidimensional properties. Data mining tools Data mining can be defined as the process of discovering meaningful new correlation, patterns, and trends by digging (mining) large amounts of data stored in warehouse, using artificial intelligence (AI) and/or statistical/mathematical techniques. The major attraction of data mining is its ability to build predictive rather than retrospective models. Using data mining to build predictive models for decision-making has several benefits. First, the model should be able to explain why a particular decision was made. Second, adjusting a model on the basis of feedback from future decisions will lead to experience accumulation and true organisational learning. Finally, a predictive model can be used to automate a decision step in a larger process. For example, using a model to instantly predict whether a customer will default on credit card payments will allow automatic adjustment of credit limits rather than depending on expensive staff making inconsistent decisions. Data mining will be discussed in more details later on in the unit. Data visualisation Data warehouses are causing a surge in popularity of data visualisation techniques for looking at data. Data visualisation is not a separate class of tools; rather, it is a method of presenting the output of all the previously mentioned tools in such a way that the entire problem and/or the solution (e.g., a result of a relational or multidimensional query, or the result of data mining) is clearly visible to domain experts and even casual observers. Data visualisation goes far beyond simple bar and pie charts. It is a collection of complex techniques that currently represent an area of intense research and development focusing on determining how to best display complex relationships and patterns on a two-dimensional (flat) computer monitor. Similar to medical imaging research, current data visualisation techniques experiment with various colours, shapes, 3-D imaging and sound, and virtual reality to help users to really see and feel the problem and its solutions. Data Marts The concept of data mart is causing a lot of excitement and attracts much attention in the data warehouse industry. Mostly, data marts are presented as an inexpensive alternative to a data warehouse that takes significantly less time and money to build. However, the term data mart means different things to different people. A rigorous definition of data mart is that it is a data store that is subsidiary to a data warehouse of integrated data. The data mart is directed at a partition of data (often called subject area) that is created for the use of a dedicated group of users. A data mart could be a set of denormalised, summarised, or aggregated data. Sometimes, such a set could be placed on the data warehouse database rather than a physically separate store of data. In most instances, however, a data mart is a physically separate store of data and is normally resident on a separate database server, often on the local area network serving a dedicated user group. Data marts can incorporate different techniques like OLAP or data mining. All these types of data marts are called dependent data marts because their data content is sourced from the data warehouse. No matter how many are deployed and what different enabling technologies are used, different users are all accessing the information views derived from the same single integrated version of the data (i.e., the underlying warehouse). Unfortunately, the misleading statements about the simplicity and low cost of data marts sometimes result in organisations or vendors incorrectly positioning them as an alternative to the data warehouse. This viewpoint defines independent data marts that in fact represent fragmented point solutions to a range of business problems. It is missing the integration that is at the heart of the data warehousing concept: data integration. Each independent data mart makes its own assumptions about how to consolidate data, and as a result data across several data marts may not be consistent. Moreover, the concept of an independent data mart is dangerous as soon as the first data mart is created, other organisations, groups, and subject area within the enterprise embark on the task of building their own data marts. As a result, you create an environment in which multiple operational systems feed multiple non-integrated data marts that are often overlapping in data content, job scheduling, connectivity, and management. In other words, you have transformed a complex many-to-one problem of building a data warehouse from operational data sources to a many-to-many sourcing and management nightmare. Another consideration against independent data marts is related to the potential scalability problem. To address data integration issues associated with data marts, a commonly recommended approach is as follows. For any two data marts in an enterprise, the common dimensions must conform to the equality and roll-up rule, which states that these dimensions are either the same or that one is a strict roll-up of another. Thus, in a retail store chain, if the purchase orders database is one data mart and the sales database is another data mart, the two data marts will form a coherent part of an overall enterprise data warehouse if their common dimensions (e.g., time and product) conform. The time dimension from both data marts might be at the individual day level, or conversely, one time dimension is at the day level but the other is at the week level. Because days roll up to weeks, the two time dimensions are conformed. The time dimensions would not be conformed if one time dimension were weeks and the other time dimension, a fiscal quarter. The resulting data marts could not usefully coexist in the same application. The key to a successful data mart strategy is the development of an overall scalable data warehouse architecture; and the key step in that architecture is identifying and implementing the common dimensions. Information Delivery System The information delivery system distributes warehouse-stored data and other information objects to other data warehouses and end-user products such as spreadsheets and local databases. Delivery of information may be based on time of day, or on a completion of an external event. The rational for the delivery system component is based on the fact that once the data warehouse is installed and operational, its users dont have to be aware of its location and maintenance. All they may need is the report or an analytical view of data, at a certain time of the day, or based on a particular, relevant event. And of course, such a delivery system may deliver warehouse-based information to end users via the Internet. A web-enabled information delivery system allows users dispersed across continents to perform sophisticated business-critical analysis, and to engage in collective decision-making that is based on timely and valid information.  Now do Review Question 10.3 Now do Review Question 10.4 Now do Review Question 10.5Keep notes in your learning journal of your learning process before you proceed to the next section. 10.4 Data Warehouse Development Process Data warehouse should include clear documentation of the following items: Requirements: What does the business want from the data warehouse? Architecture blueprint: How will you deliver what the business wants? Development approach: What is a clear definition of phased delivery cycles, including architectural review and refinement processes? The blueprint document essentially translates an enterprises mission, goals, and objectives for the data warehouse into a logical technology architecture composed of individual sub-architectures for the application, data and technology components of a data warehouse, as shown in Figure 10.3. An architecture blueprint is important, because it serves as a road map for all development work and as a guide for integrating the data warehouse with legacy systems. When the blueprint is understood by the development staff, decisions become much easier. The blueprint should be developed in a logical sense rather than in a physical sense. For the database components, for example, you will state things like the data store for the data warehouse will support an easy-to-use data manipulation language that is standard in the industry, such as SQL. This is a logical architecture-product requirement. When you implement the data warehouse, this could be Sybase SQL Server or Oracle. The logical definition allows your implementations to grow as technology evolves. If your business requirements do not change in the next three to five years, neither will your blueprint. Data Architecture As shown in Figure 10.2, a data warehouse is presented as a network of databases. The sub-components of the data architecture will include the enterprise data warehouse, metadata repository, data marts, and multidimensional data stores. These sub-components are documented separately, because the architecture should present a logical view of them. It is for the data warehouse implementation team to determine the proper way to physically implement the recommended architecture. This suggests that the implementation may well be on the same physical database rather than separate data stores as shown in Figure 10.2. Volumetrics A number of issues need to be considered in the logical design of data architecture of a data warehouse. Metadata, which has been discussed earlier, is the first issue, followed by the volume of data that will be processed and housed by a data warehouse. It is probably the biggest factor that determines the technology utilised by the data warehouse to manage and store the information. The volume of data affects the warehouse in two aspects: the overall size and ability to load. Too often, people design their warehouse load processes only for mass loading of the data from the operational systems to the warehouse system. This is inadequate. When defining your data architecture, you should devise a solution that allows mass loading as well as incremental loading. Mass loading is typically a high-risk area; the database management systems can only load data at a certain speed. Mass loading often forces downtime, but we want users to have access to a data warehouse with few interruptions as possible.  Figure 10.3 Areas of an architecture blueprint Transformation A data architecture needs to provide a clear understanding of transformation requirements that must be supported, including logic and complexity. This is one area in which the architectural team will have difficulty finding commercially available software to manage or assist with the process. Transformation tools and standards are currently immature. Many tools were initially developed to assist companies in moving applications away from mainframes. Operational data stores are vast and varied. Many data stores are unsupported by these transformation tools. The tools support the popular database engines, but do nothing to advance your effort with little-known or unpopular databases. It is better to evaluate and select a transformational tool or agent that supports a good connectivity tool, such as Sybases Omni family of products or Information Builders EDA/SQL, rather than one that supports a native file access strategy. With an open connectivity product, your development teams can focus on multi-platform, multi-database transformations. Data cleansing In addition to finding tools to automate the transformation process, the developers should also evaluate the complexity behind data transformations. Most legacy data stores lack standards and have anomalies that can cause enormous difficulties. Again, tools are evolving to assist you in automating transformations, including complex issues such as buried data, lack of legacy standards, and non-centralised key data. Buried data Often, legacy systems use composite keys to uniquely define data. Although these fields appear as one in a database, they represent multiple pieces of information. Figure 10.4 illustrates buried data by showing a vehicle identification number that contains many pieces of information.  Figure 10.4 Data problem buried data Lack of legacy standards Items such as descriptions, names, labels, and keys have typically been managed on an application-by-application basis. In many legacy systems, such fields lack clear definition. For example, data in the name field sometimes is haphazardly formatted (Brent Thomas; Elizabeth A. Hammergreen; and Herny, Ashley). Moreover, application software providers may offer user-oriented fields, which can be used and defined as required by the customer. Noncentralised key data As companies have evolved through acquisition or growth, various systems took ownership of data that may not have been in their scope. This is especially true for companies that can be characterised as heavy users of packaged application software and those that have grown through acquisition. Notice how the non-centralised cust_no field varies from one database to another for a hypothetical company represented below: Table 10.1: Cust_no for the same company Cust_no CompanyLocation001 ABCXYZ LtdNorth01-XYZXYZ LtdEastABC001XYZ LtdSouth westThe ultimate goal of a transformation architecture is to allow the developers to create a repeatable transformation process. You should make sure to clearly define your needs for data synchronisation and data cleansing. Data architecture requirements As a summary of the data architecture design, this section lists the main requirements placed on a data warehouse. Subject-oriented data: Data that is contained within a data warehouse should be organised by subject. For example, if your data warehouse focuses on sales and marketing processes, you need to generate data about customers, prospects, orders, products, and so on. To completely define a subject area, you may need to draw upon data from multiple operational systems. To derive the data entities that clearly define the sales and marketing process of an enterprise, you might need to draw upon an order entry system, a sales force automation system, and various other applications. Time-based data: Data in a data warehouse should relate specifically to a time period, allowing users to capture data that is relevant to their analysis period. Consider an example in which a new customer was added to an order entry system with a primary contact of John Doe on 2/11/99. This customers data was changed on 4/11/99 to reflect a new primary contact of Jane Doe. In this scenario, the data warehouse would contain the two contact records shown is the following table Table 10.2: Example of time based data Cust_IDContact_IDLast_NameFirst_NameTime_Stamp199912060101DoeJohn2/11/99199912060101DoeJane4/11/99 Update processing: A data warehouse should contain data that represents closed operational items, such as fulfilled customer order. In this sense, the data warehouse will typically contain little or no update processing. Typically, incremental or mass loading processes are run to insert data into the data warehouse. Updating individual records that are already in the data warehouse will rarely occur. Transformed and scrubbed data: Data that are contained in a data warehouse should be transformed, scrubbed, and integrated into user-friendly subject areas. Aggregation: Data needs to be aggregated into and out of a data warehouse. Thus, computational requirements will be placed on the entire data warehousing process. Granularity: A data warehouse typically contains multiple levels of granularity. It is normal for the data warehouse to be summarised and contain less detail than the original operational data; however, some data warehouses require dual levels of granularity. For example, a sales manager may need to understand how sales representatives in his or her area perform a forecasting task. In this example, monthly summaries that contain the data associated with the sales representatives forecast and the actual orders received are sufficient; there is no requirement to see each individual line item of an order. However, a retailer may need to wade through individual sales transactions to look for correlation that may show people tend to buy soft drinks and snacks together. This need requires more details associated with each individual purchases. The data required to fulfil both of these requests may exist, and therefore, the data warehouse might be built to manage both summarised data to fulfil a very rapid query and the more detailed data required to fulfil a lengthy analysis process. Metadata management: Because a data warehouse pools information from a variety of sources and the data warehouse developers will perform data gathering on current data stores and new data stores, it is required that storage and management of metadata can be effectively done through the data warehouse process. Application Architecture An application architecture determines how users interact with a data warehouse. To determine the most appropriate application architecture for a company, the intended users and their skill levels should be assessed. Other factors that may affect the design of the architecture include technology currently available and budget constraints. In any case, however, the architecture must be defined logically rather than physically. The classification of users will help determine the proper tools to satisfy their reporting and analysis needs. A sampling of user category definitions are listed below. Power users: Technical users who require little or no support to develop complex reports and queries. This type of users tends to support other users and analyse data through the entire enterprise. Frequent users: Less technical users who primarily interface with the power users for support, but sometimes require the IT department to support them. These users tend to provide management reporting support up to the division level within an enterprise, a narrower scope than for power users. Casual users: These users touch the system and computers infrequently. They tend to require a higher degree of support, which normally includes building predetermined reports, graphs, and tables for their analysis purpose. Requirements of Tools Tools must be made available to users to access a data warehouse. These tools should be carefully selected so that they are efficient and compatible with other parts of the architecture and standards. Executive information systems (EIS): As mentioned earlier, these tools transform information and present that information to users in a meaningful and usable manner. They support advanced analytical techniques and free-form data exploration, allowing users to easily transform data into information. EIS tools tend to give their users a high-level summarisation of key performance measures to support decision-making. These tools fall into the big-button syndrome, in which an application development team builds a nice standard report with hooks to many other reports, then presents this information behind a big button. When user clicks the button, magic happens. Decision support systems (DSS): DSS tools are intended for more technical users, who require more flexibility and ad hoc analytical capabilities. DSS tools allow users to browse their data and transform it into information. They avoid the big button syndrome. Ad hoc query and reporting: The purpose of EIS and DSS applications is to allow business users to analyse, manipulate, and report on data using familiar, easy-to-use interfaces. These tools conform to presentation styles that business people understand and with which they are comfortable. Unfortunately, many of these tools have size restrictions that do not allow them to access large stores or to access data in a highly normalised structure, such as a relational database, in a rapid fashion; in other words, they can be slow. Thus, users need tools that allow for more traditional reporting against relational, or two-dimensional, data structures. These tools offer database access with limited coding and often allow users to create read-only applications. Ad hoc query and reporting tools are an important component within a data warehouse tool suite. Their greatest advantage is contained in the term ad hoc. This means that decision makers can access data in an easy and timely fashion. Production report writer: A production report writer allows the development staff to build and deploy reports that will be widely exploited by the user community in an efficient manner. These tools are often components within 4th generation languages (4GLs) and allow for complex computational logic and advanced formatting capabilities. It is best to find a vendor that provides an ad hoc query tool that can transform itself into a production report writer. Application development environments (ADE): ADEs are nothing new, and many people overlook the need for such tools within a data warehouse tool suite. However, you will need to develop some presentation system for your users. The development, though minimal, is still a requirement, and it is advised that data warehouse development projects standardise on an ADE. Example tools include Microsoft Visual Basic and Powersoft Powerbuilder. Many tools now support the concept of cross-platform development for environment such as Windows, Apple Macintosh, and OS/2 Presentation Manger. Every data warehouse project team should have a standard ADE in its arsenal. Other tools: Alhough the tools just described represent minimum requirements, you may find a need for several other speciality tools. These additional tools include OLAP, data mining and managed query environments. Technology Architecture It is in the technology architecture section of the blueprint that hardware, software, and network topology are specified to support the implementation of the data warehouse. This architecture is composed of three major components- clients, servers, and networks and the software to manage each of them. Clients: The client technology component comprises the devices that are utilised by users. These devices can include workstations, personal computers, personal digital assistants, and even beepers for support personnel. Each of these devices has a purpose in being served by a data warehouse. Conceptually, the client either contains software to access the data warehouse (this is the traditional client in the client-server model and is known as a fat client), or it contains very little software and accesses a server that contains most of the software required to access a data warehouse. The later approach is the evolving Internet client model known as a thin client and fat server. Servers: The server technology component includes the physical hardware platforms as well as the operating systems that manage the hardware. Other components, typically software, can also be grouped within this component, including database management software, application server software, gateway connectivity software, replication software, and configuration management software. Networks: The network component defines the transport technologies needed to support communication activities between clients and servers. This component includes requirements and decisions for wide area networks (WANs), local area networks (LANs), communication protocols, and other hardware associated with networks, such as bridges, routers, and gateways.  Now do Review Question 10.6  Now do Review Question 10.6 Keep notes in your learning journal of your learning process before you proceed to the next section. Star Schema Data warehouses can best be modelled using a technique known as star schema modelling. It defines data entities in a way that supports the decision-makers view of a business as well as data entities that reflect the important operational aspects of the business. A star schema contains three logical entities: dimension, measure, and category detail (or category for short). A star schema is optimised to queries, and therefore, provides a database design that is focused on rapid response to users of the system. Also, the design that is built from a star schema is not as complicated as traditional database designs. Hence, the model will be more understandable by users of the system. Also users will be able to better understand the navigation paths available to them through interpreting the star schema. This logical database designs name hails from a visual representation derived from the data model: it forms a star, as shown in Figure 10.5. The star schema defines the join paths for how users access the facts about their business. In Figure 10.5, for example, the centre of the star could represent product sales revenues that could have the following items: actual sales, budget, and sales forecast. The true power of a star schema design is to model a data structure that allows filtering, or reduction in result size, of the massive measure entities during user queries and searches. A star schema also provides a usable and understandable data structure, because the points of the star, or dimension entities, provide a mechanism by which a user can filter, aggregate, drill down, and slice and dice the measurement data in the centre of the star. A star schema, like the data warehouse it models, contains three types of logical entities: measure, dimension, and category detail. Each of these entities is discussed separately below. Measure entities Within a star schema, the centre of the star and often the focus of the users query activity is the measure entity. A measure entity is represented by a rectangle and is placed in the centre of a star schema diagram (not shown in Figure 10.4). A sample of raw measure data is shown in Table 10.3. The data contained in a measure entity is factual information from which users derive business intelligence. This data is therefore often given synonymous names to measure, such as key business measures, facts, metrics, performance measures, and indicators. The measurement data provides users with quantitative data about a business. This data is numerical information that the users desire to monitor, such as dollars, pounds, degrees, counts, and quantities. All of these categories allow users to look into the corporate knowledge base and understand the good, bad, and the ugly of the business process being measured. The data contained within measure entities grows large over time, and therefore, is typically of greatest concern to the technical support personnel, database administrators, and system administrators.  Figure 10.4 Star schema design Table 10.3 Measure entity data MonthBranchProductSales ForecastSales ActualVariance199901 199901 199901 . ABC XYZ PQRCOLA COLA COLA200000 150000 1250001900000 1550000 1050000-10000 50000 -20000 Dimension entities Dimension entities are graphically represented by diamond-shaped squares, and placed at the points of the star. Dimension entities are much smaller entities compared with measure entities. The dimensions and their associated data allow users of a data warehouse to browse measurement data with ease of use and familiarity. These entities assist users in minimising the rows of data within a measure entity and in aggregating key measurement data. In this sense, these entities filter data or force the server to aggregate data so that fewer rows are returned from the measure entities. With a star schema model, the dimension entities are represented as the points of the star, as demonstrated in Figure 10.4 by the time, location, age group, product and other dimensions. Figure 10.5 illustrates an example of dimension data and a hierarchy representing the contents of a dimension entity. Category detail entities Each cell in a dimension is a category and represents an isolated level within a dimension that might require more detailed information to fulfil a users requirement. These categories that require more detailed data are managed within category detail entities. These entities have textual information that supports the measurement data and provides more detailed or qualitative information to assist in the decision-making process. Figure 10.6 illustrates the need for a client category detail entity within the All Clients dimension. The stop sign symbol is usually used to graphically depict category entities, because users normally flow through the dimension entities to get the measure entity data, then stop their investigation with supporting category detail data. Translating Information into a Star Schema During the data gathering process, an information package can be constructed, based on which a star schema is formed. Figure 10.7 shows an information package diagram ready for translation into a star schema. As can be seen from the diagram, there are six dimensions and within each of which, there are different numbers of categories. For example, the All Locations dimension has five categories while All Genders has one. The number within each category denotes the number of instances the category may have. For example, the All Time Periods will cover 5 different years with 20 quarters and 60 months. Gender will include male, female, and unknown. To define the logical measure entity, take the lowest category, or cell, within each dimension (the shaded cells in Figure 10.7) along with each of the measures and take them as the measure entity. For example, the measure entity translated from Figure 10.7 would be Month, Store, Product, Age Group, Class, and Gender with the measures Forecast Sales, Budget Sales, Actual Sales, Forecast Variance (calculated), and Budget Variance (calculated). They could be given a name Sales Analysis and put in the centre of the star schema in a rectangle. Country KeyArea KeyRegion KeyDistrict KeyCountryAreaRegionDistrictUSAEASTCENNCUSAEasternCentralNorth-CentralUSAEASTCENSCUSAEasternCentralSouth-CentralUSAEASTNEUSAWESTSECANADAFRANCEGERMANY  Figure 10.5 Dimension entity data Each column of an information package in Figure 10.7 defines a dimension entity and is placed on the periphery of the star of a star schema, symbolising the points of the star (Figure 10.8). Following the placement of the dimension entities, you want to define the relationships that they have to the measure entity. Because dimension entities always require representation within the measure entity, there always is a relationship. The relationship is defined over the lowest-level detail category for the logical model; that is the last cell in each dimension. These relationships possess typically one-to-many cardinality; in other words, one dimension entity exists for many within the measures. For example, you may hope to make many product sales (Sales Analysis) to females (Gender) within the star model illustrated in Figure 10.8. In general, these relationships can be given an intuitive explanation such as: Measures based on the dimension. In Figure 10.8, for example, the relationship between Location (the dimension entity) and Sales Analysis (the measure entity) means Sales Analysis based on Location. The final step in forming a star schema is to define the category detail entity. Each individual cell in an information package diagram must be evaluated and researched to determine if it qualifies as a category detail entity. If the user has a requirement for additional information about a category, this formulates the requirement for a category detail entity. These detail entities become extensions of dimension entities as illustrated in Figure 10.9. We need to know more detailed information about data such as Store, Product, and customer categories (i.e., Age, Class, and Gender). These detail entities (Store Detail, Product Detail, and Customer Detail), having been added to the current star schema, now appear as shown in Figure 10.10.  Figure 10.6 Category detail entity data  Figure 10.7 Information package diagram ready for translation into star schema  Figure 10.8 Star schema relationships between dimension and measure entities  Figure 10.9 Category detail entity translation Figure 10.10. Extended star schema Connolly, T. and Begg, C., 2002, Database Systems: A Practical Approach to Design, Implementation, and Management, Addison Wesley, Harlow, England. Chapter 31 Chapter 32 Section 32.1 and 32.2 Make notes in learning journal. Now carry out Activity 10.3 Construct a star schema and identify the benefits that a company might get out of it Learning Outcome: Discuss the architecture and processes involved in data warehouse Now do Review Question 10.8 Data extraction and cleansing The construction of a data warehouse begins with careful considerations on architecture and data model issues, and with their sizing components. It is essential that a correct architecture is firmly in place supporting the activities of a data warehouse. Having solved the architecture issue and built the data model, the developers of the data warehouse can decide what data they want to access, in which form, and how it will flow through an organisation. This phase of a data warehouse project will actually fill the warehouse with goods (data). This is where data is extracted from its current environment and transformed into the user-friendly data model managed by the data warehouse. Remember, this is a phase that is all about quality. A data warehouse is only as good as the data that it manages. Extraction Specifications The data extraction part of a data warehouse is a traditional design process. There is an obvious data flow, with inputs being operational systems and output being the data warehouse. However, the key to the extraction process is how to cleanse the data and transform it into usable information that the user can access and make into business intelligence. Thus, techniques such as data flow diagrams may be beneficial to defining extraction specifications for the development. An important input to such a specification may be the useful reports that you collected during user interviews. In these kinds of reports, intended users often tell you what they want and what they do not, and then you can act accordingly. Loading Data Data needs to be processed for extraction and loading. An SQL select statement shown below is normally used in the process. select Target Column List from Source Table List where Join & Filter List group by or order by Sort & Aggregate List Multiple passes of data: Some complex extractions need to pull data from multiple systems and merge the resultant data while performing calculations and transformations for placement into a data warehouse. For example, the sales analysis example mentioned in the star schema modelling section might be such a process. We may obtain budget sales information from a budgetary system, which is different from the order entry system from which we get actual sales data, which in turn is different from the forecast management system from which we get forecast sales data. In this scenario, we would need to access three separate systems to fill one row within the Sales Analysis measure table. Staging area: Creating and defining a staging area can help the cleansing process. This is a simple concept that allows the developer to maximise up-time of a data warehouse while extracting and cleansing the data. A staging area, which is simply a temporary work area, can be used to manage transactions that will be further processed to develop data warehouse transactions. Checkpoint restart logic: The concept of checkpoint restart has been around for many years. It was originated in batch processing on mainframe computers. This type of logic states that if there is a long running process that fails prior to completion, then restart the process at the point of failure rather than from the beginning. Similar logic should be implemented in the extraction and cleansing process. Within the staging area, define the necessary structures to monitor the activities of transformation procedures. Each of these programming units has an input variable that determines where in the process it should begin. Thus, if a failure occurs within the 7th procedure of an extraction process that has 10 steps, assuming the right rollback logic is in place it would only require that the last 4 steps (7 through to 10) be conducted. Data loading: After data has been extracted, it is ready to be loaded into a data warehouse. In the data loading process, cleansed and transformed data that now complies with the warehouse standards is moved into the appropriate data warehouse entities. Data may be summarised and reformatted as part of this process, depending on the extraction and cleansing specifications and the performance requirements of the data warehouse. After the data has been loaded, data inventory information is updated within the metadata repository to reflect the activity that has just been completed.  Now do Review Question 10.9  Now do Review Question 10.10  Use the online discussion facility and post your comments on the topic for discussion for your group to share in.  10.5 Data Quality Issues in Data Warehouse Data Preparation is the most resource-consuming step in the process, typically requiring up to 60% of the effort of the entire project. The step comprises three phases: Data selection: identification and extraction of data. Data pre-processing: data sampling and quality testing. Data transformation: data conversion into an analytical model. Data selection The goal of data selection is to identify the available data sources and extract the data that is needed for preliminary analysis in preparation for further mining. For example, if you want to find out who will respond to a direct marketing campaign, you need data (information) about customers who have previously responded to mailers. If you have their name and address, you should realise that this type of data is unique to a customer, and therefore, not the best data to be selected for mining. Information like city and area provides descriptive information, but demographic information is more valuable: items like a customers age, general income level, types of interests, and household type. Along with each of the selected variables, associated semantic information (metadata) is needed to understand what each of the variables means, The metadata must include not only solid business definitions of the data but also clear descriptions of data types, potential values, original source system, data formats, and other characteristics. There are two major types of variables: Categorical: The possible values are finite and differ in kind. For example, marital status (single, married, divorced, unknown), gender (male, female), customer credit rating (good, regular, poor). Quantitative: There is measurable difference between the possible values. There are two subtypes: continuous (values are real number) and discrete (values are integrates). Examples of continuous variables are income, average number of purchases, and revenue. Examples of discrete variables are number of employees and time of year (month, season, quarter). The variables selected are called active variables in the sense that they are actively used to distinguish segments, make predictions, or perform some other data mining operations. When selecting data, another important consideration is the expected period of validity of the data. That is, the extent to which ongoing changes in external circumstances may limit the effectiveness of the mining. For example, because a percentage of customers will change their jobs every year, any analysis where job type is a factor has to be re-examined periodically. At this stage the data analyst has already began to focus on the data mining algorithms that will best match the business application. This is an important aspect to keep in mind as the other phases of the data preparation step evolve, because it will guide the development of the analytical model and the fine-tuning of the data input. Data pre-processing The aim of data pre-processing is to ensure the quality of the selected data. Clean and well-understood data is a clear prerequisite for successful data mining, just as it is with other quantitative analysis. In addition, by getting better acquainted with the data at hand, you are more likely to know where to look for the real knowledge during the mining stage. Without a doubt, data pre-processing is the most problematic phase in the data preparation step, principally because most operational data is never meant to be for data mining purposes. Poor data quality and poor data integrity are major issues in almost all data warehousing projects. Normally, the data pre-processing phase begins with a general review of the structure of the data and some measuring of its quality. Such an approach usually involves a combination of statistical methods and data visualisation techniques. Representative sampling of the selected data is a useful technique as large data volumes would otherwise make the review process very time-consuming. For categorical variables, frequency distributions of the values are a useful way of better understanding the data content. Simple graphical tools such as histograms and pie charts can quickly plot the contribution made by each value for the categorical variable, and therefore, help to identify distribution skews and invalid or missing values. One thing must be noted is that the frequency distribution of any data should be considered based on a large enough representation sample. For example, if a set has 1 million males and 1 female, then it is not a valid study for females. When dealing with quantitative variables, the data analyst is interested in such measures as maxim and minima, mean, mode (most frequently occurring value), median (midpoint value), and several statistical measures of central tendency, that is the tendency for values to cluster around the mean. When combined, these measures offer a powerful way of determining the presence of invalid and skewed data. For example, maxim and minima quickly show up spurious data values, and the various statistical distribution parameters give useful clues about the level of noise in data. During data pre-processing, the most common issues are as below: Noisy data: With noisy data, one or more variables have values that are significantly out of line with what is expected for those variables. The observations in which these noisy values occur are called outliers. Outliers can indicate good news or bad good news in the sense that they represent precisely the opportunities that we are looking for; bad news in that they may well be no more than invalid data. Different kinds of outliers must be treated in different ways. One kind of outlier may be the result of a human error. For example, a persons age is recorded as 650, or an income is negative. Clearly, these values have to be either corrected (if a valid value or reasonable substitution can be found) or dropped from the analysis. Another kind of outlier is created when changes in operational systems have not yet been reflected in the data mining environment. For example, new product codes introduced in operational systems show up initially as outliers. Clearly in this case the only action required is to update the metadata. Skewed distribution often indicates outliers. For example, a histogram may show that most of the people in the target group have low incomes and only a few are high earners. It may be that these outliers are good, in that they represent genuine high earners in this homogenous group, or it may be that they result from poor data collection. For example, the group may consist mainly of retired people but, inadvertently, include a few working professionals. In summary, what you do with outliers depends on their nature. You have to distinguish the good outlier from the bad and react appropriately. Missing values: Missing values include values that are simply not present in the selected data, and/or those invalid values that we may have deleted during noise detection. Values may be missing because of human error; because the information was not available at the time of input; or because the data was selected across heterogeneous sources, thus creating mismatches. To deal with missing values, data analysts use different techniques, none of which is ideal. One technique is simply to eliminate the observations that have missing values. This is easily done, but it has the obvious drawback of losing valuable information. Although this data loss may be less of a problem in situations where data volumes are large, it certainly will affect results in mining smaller volumes or where fraud or quality control is the objective. In these circumstances, we may well be throwing away the very observations for which we are looking. Indeed, the fact that the value is missing may well be a clue to the source of the fraud or quality problem. If there are a large number of observations with missing values for the same variable, it may be an option to drop the variable from the analysis. This again has serious consequences because, unknown to the analyst, the variable may have been a key contributor to the solution. Incorrect data: this type of data involves data that are not validated against their domains. For example, data ranges, combination of alpha-numeric arrangements etc. Inaccurate data: this type of data problem involves data values that are not be validated in accordance to a business rule. It is also possible that the values that are dependent on a particular value are not consistent to the parent values. This type of data also may lead to inconsistent data. In inconsistent data problems the keys are not matched with the data that are located in different systems. Incomplete data: this type of data problem involves data that dont have definition of source or description of dependent data items. This problem arises when the top view of data is defined but does not consider the link data to be defined in detail, hence, a proper data validation is not in place. The decision to eliminate data is never an easy one, nor can the consequences be easily foreseen. Luckily, there are several ways around the problem of missing values. One approach is to replace the missing value with its most likely value. For quantitative variables, this most likely value could be the mean or mode. For categorical variables, this could be the mode or a newly created value for the variable, called UNKONWN, for example. A more sophisticated approach for both quantitative and categorical variables is to use a predictive model to predict the most likely value for a variable on the basis of the values of other variables in observation. Despite this stockpile of weapons to combat the problem of missing data, you must remember that all this averaging and predicting comes at a price. The more guessing you have to do, the further away from the real data the database becomes. Thus, in turn, it can quickly begin to affect the accuracy and validation of the mining results. Data transformation During data transformation, the pre-processed data is transformed to produce the analytical data model. The analytical data model is an informational data model, and it represents a consolidated, integrated, and time-dependent restructuring of the data selected and pre-processed from various operational and external sources. This is a crucial phase as the accuracy and validity of the final results depend vitally on how the data analyst decides to structure and present the input. For example, if a department store wants to analyse customer spending patterns, the analyst must decide whether the analysis is to be done at some overall level, at the department level, or at the level of individual purchased articles. Clearly, the shape of the analytical data model is critical to the types of problems that the subsequent data mining can solve. After the model is built, the data is typically further refined to suit the input format requirements of the particular data mining algorithm to be used. The fine-tuning typically involves data recording and data format conversion and can be quite time-consuming. The techniques used can range from simple data format conversion to complex statistical data reduction tools. Simple data conversions can perform calculations such as a customers age based on the variable of the date of birth in the operational database. It is quite common to derive new variables from original input data. For example, a data mining run to determine the suitability of existing customers for a new loan product might require to input the average account balance for the last 3-, 6-, and 12-month periods. Another popular type of transformation is data reduction. Although it is a general term that involves many different approaches, the basic objective is to reduce the total number of variables for processing by combining several existing variables into one new variable. For example, if a marketing department wants to gauge how attractive prospects can be for a new, premium level product, it can combine several variables that are correlated, such as income, level of education and home address, to derive a single variable that represents the attractiveness of the prospect. Reducing the number of input variables produces a smaller and more manageable set for further analysis. However, the approach has several drawbacks. It is not always easy to determine which variables can be combined, and combining variables may cause some loss of information. Clearly data remodelling and refining are not trivial tasks in many cases, which explains the amount of time and effort that is typically spent in the data transformation phase of the data preparation step. Another technique, called discretisation, involves converting quantitative variables into categorical variables by dividing the values of the input variables into buckets. For example, a continuous variable such as income could be discretised into a categorical variable such as income range. Incomes in the range of 0 to 15,000 could be assigned a value Low; those in the range of 15,001 to 30,000 could be assigned a value Medium and so on. Last, One-of-N is also a common transformation technique that is useful when the analyst needs to convert a categorical variable to a numeric representation; typically for input to a neural network. For example, a categorical variable, type of car, could be transformed into a quantitative variable with a length equal to the number of different possible values for the original variable and having an agreed coding system. Data quality practices Building a data warehouse involves ensuring data quality rules in four major areas. These are: Business entity rules Business attribute rules Data dependency rules Data validity rules The data quality issues in these respects are outlined below: Business entity rules: it involves identifying entities by its unique identifier the keys are known to all participating components the keys should follow relational data management entity and referential integrity rules rules for being a composite key should be known to all participating components degree of cardinality should be accepted by all the participating components the implementation of optionality needs to be agreed by the participating components Business attribute rules: supertype classes are constructed as such all data inheritance can be applied to the subtype data domain checking to ensure business data quality. The domain checking may involve ensuring the business default values, key formats etc. Data dependency rules: ensuring that an entity is established a relation with another entity existence of a foreign key means it has a parent table the value of one attribute relates to another attribute in order to reflect a business information existence of a value in an attribute may link with the other attribute values of another business entity Data validity rules: ensuring that all entities are complete and representing all the values that they need ensuring that all relationship conditions are in place ensuring that all the domains are valid ensuring that all the related attributes are present ensuring that all the business rules are checked ensuring that keys are validated ensuring that inheritances are correct Adelman, S., Moss, L and Abai, M., Data Strategy, Addison Wesley, 2005, ISBN: 0-321-24099-5 Chapter 3 Now carry out Activity 10.4 Identify the data quality issues Learning Outcome: Practice data quality rules and disciplines in industrial data management environment;  Now do Review Question 10.11  10.6 Data Performance in Data Warehouse Data performance in Data warehouse involves the following factors: response time for a transaction the number of transactions per second the number of concurrent users on a single data elements time taken to start a batch job processing time taken to extract and transform data in order to load in a data warehouse time taken to run backup-recovery utilities memory and disk utilisation A data warehouse that is developed for supporting decision making or for Online Transaction Processing should be based around the following factors: Industrial requirements and capacity Industrials requirements on system environment, design criteria and implementation budget Industrial procedures for monitoring Performance tuning The sections below provide an overview of these factors: Industrial requirements and capacity: Industrial requirements and capacity may look for the following information in order to increase the performance of the data warehouse: the number of transactions anticipated for a given period of time the level of complexities of the transactions the number of concurrent users queering on any particular or a set of tables the geographical location of the users the geographical location of data that will take part in data warehouse for extraction and loading the volume of data system configuration and environment that an industry can afford Industries benchmark for performance assessment how frequent the data need to be available the problems identified in previous system (if any) system availability requirements for recovery purpose size of the database size of the tables System environment and design criteria: This factor involves investigating hardware, software and system requirements in order to design an optimised data warehouse. This investigation includes: hardware architecture, topologies and geographical locations any specific application is required type of users, level of expertise and their authority to a specific or a set of functionalities of the system security and privacy issues requirements on response time and availability phase of implementation backup and recovery procedure and how frequent testing process and users involvement criteria partitioning requirements, data compression and data distribution issues agreed growth rate system support and maintenance requirements Monitoring: Monitoring and feedback is an essential part for any system to be implemented and run successfully. Even a fully optimised system requires a monitoring system in place. The most important task to carry out the monitoring process successfully, is defining a set of metrics. The metrics can measure: usage rate of a data warehouse time takes to execute a query the distribution of resources and their utilisation the level of flexibility and user friendliness of an interface when used for a query users assessment of the system implemented locating a set of data that are never used or a set of data that are used quite frequently cost and benefit analysis and to measure Return of Investment (ROI) Tuning: The following points highlight some of the major considerations involved in the tuning of a data warehouse. Use indexes on primary and foreign keys, and consider their use on other attributes that are frequently referenced in the WHERE clause of queries. Corollary to the above, indexes improve performance for queries that return fewer than approximately 20% of the rows in a table, otherwise it is faster to use a full table scan. For update transactions indexes can actually make things slower, because of the need to update the index structure. Unique indexes are faster than non-unique indexes. Several SQL constructs, such as use of the keywords like %string, distinct, group by, order by, max etc. lead a query not to use an index. The reason for this is that either the data to use the index is not available (as with like %string), or the operation implies a sort of the data, in which case all of the rows need to be accessed. Compressed indexes save space, but do not provide as substantial an improvement in response time. In general, joins are executed more efficiently than nested queries. This may provide scope for recasting an existing nested query in the form of a join. Use of short table aliases in queries can improve performance. Reduce disk contention: Occurs when several users try to access the same disk, at the same time. If contention is noticeable on a particular disk and queues are visible, then distribute the I/O, by moving heavily accessed files onto a less active disk. Distribute tables and indexes on different disks if resources are available. Allocate free space in data blocks (i.e. space in a block is used by INSERTS and also UPDATES which increase the size of a row). Allow for Block Chaining by using PCTFREE (Oracle specific, i.e. the percentage of blocks reserved for row expansion) parameter to control/limit chaining. Chaining can be examined using the ANALYZE command. (Chaining occurs when data in a block grows beyond the size that can be contained within the block, and so some of the data must be stored in a further block, to which the original block must have a pointer. We describe this dynamic expansion of data into additional blocks as chaining. Its overall effect is to reduce performance, as the system must follow the series of pointers to retrieve requested data). Seek to minimise dynamic expansion. For example, with Oracle, set up storage parameters in the CREATE table and CREATE tablespace statements so that Oracle will allocate enough space for the maximum size of the object. Hence space will not need to be extended later. Tune the database writer DBWR (Oracle specific process which writes out data from the buffer cache to the database files). System Global Area (SGA). This block of memory is used for storing data for use by Oracle processes. It is a shared portion of memory for all Oracle processes. Caches. Blocks of memory used for keeping copies of data that are also on disk, but they can be accessed much quicker here. Hence it makes sense to keep frequently accessed data in cache. The two main caches of concern are: Data Dictionary Cache: requires only a small amount of memory in comparison to the buffer cache, but can have a dramatic effect on performance. The actual size of this will depend on the different types of objects used by applications. Buffer Cache: It is where tables and indexes can be stored. The most frequently accessed tables and indexes should be stored here to minimise disk I/O as much as possible. Context Areas. A location in memory for parsing and processing SQL statements, one for each SQL statement. Data Blocks. Usually occurs when users attempt to update the same block. Rollback Segments. All transactions use the rollback segments, so if there is only a small number of segments, contention is quite likely. A guideline given by Oracle is to use one rollback segment per 5 active users. Redo Log Buffers. Any block modification will write data to this buffer. The 'redo space waits' statistic can be used to provide information on contention for this buffer. Adelman, S., Moss, L and Abai, M., Data Strategy, Addison Wesley, 2005, ISBN: 0-321-24099-5 Chapter 7 Now carry out Activity 10.5 Identify the performance issues for a data warehouse Learning Outcome: Practice data quality rules and disciplines in industrial data management environment;  Now do Review Question 10.12  10.7 Data Security Issues All systems have ASSETS and security is about protecting assets. The first thing then is to know your assets and their value. In this unit concentrate on database objects (tables, views, rows), access to them, and the overall system that manages them. Note that not all data is sensitive, not all requires great effort at protection. All assets are under threat. The second thing is to know what THREATs are putting your assets at risk. These include everything such as power failure and employee fraud. Note that threats are partly hypothetical, always changing and always imperfectly known. Security activity is directed at protecting the system from perceived threats. If a threat is potential, you must allow for it to become an actuality. When it becomes actual there is an IMPACT. Impact you can consider and plan for. But in the worst case there will be a LOSS. Security activity here is directed at minimising the loss and recovering the database to minimise the loss as well as further protecting from the same or similar threats.  Figure 10.11: Threat-Impact-Loss paradigm An outline development mechanism is: Document Assets. (what they are, what is their value). Identify Threats (what they are, how likely they are, what is the impact if they occur). Associate Threats with each Asset. Design appropriate mechanisms to protect each asset appropriate to its value and the cost of its protection, to detect a security breach against each asset, to minimise the losses incurred and to recover normal operation. Threats to the Database You will build your security skills from two directions. One is from the appreciation and awareness of changing threats and the other from the technical remedies to them. Unauthorised modification: Changing data values for reasons of sabotage, crime or ignorance which may be enabled by inadequate security mechanisms, sharing of passwords or password guessing, for example. Unauthorised disclosure: when information that should not have been disclosed has been disclosed. A wide general issue of crucial importance which can be accidental or deliberate. Loss of availability: Sometimes called denial of service. Anytime when the database is not available incurs a loss (otherwise life is better without the system!). So any threat that gives rise to time off-line, even to check whether something has occurred. Commercial Sensitivity: Most financial losses through fraud arise from employees. Access controls provide both protection against criminal acts and evidence of attempts (successful or otherwise) to carry out acts detrimental to the organisation - whether fraud, extraction of sensitive data or loss of availability. Personal Privacy and Data protection: Internationally personal data is normally subject to legislative controls. Personal data is data about an identifiable individual. Often the individual has to be alive but the method of identification is not prescribed. So a post-code for a home may in some cases identify an individual if only one person is living at an address with the post-code. Such data needs careful handling and control. Every country that has implemented data protection has followed these guides but as usual the 'devil is in the detail'. If you can be sure your database system complies with these you have done well. (And are you happy with storing personal images?) The information to be contained in personal data shall be obtained and personal data shall be processed fairly and lawfully. Personal data shall be held only for one or more specified and lawful purposes. Personal data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. Personal data held for any purpose or purposes shall be adequate relevant and not excessive in relation to that purpose or those purposes. Personal data shall be accurate and, where necessary, kept up-to-date. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or purposes. An individual shall be entitled - at reasonable intervals and without undue delay or expense - to be informed by any data user whether he holds personal data of which the individual is the subject: and to access any such data held by a data user; and where appropriate, to have such data corrected or erased. Appropriate security measures shall be taken against unauthorised access to, or alteration, disclosure or destruction of, personal data and against loss or destruction of personal data. The issues are too extensive to be discussed here but the implications should be noted. Personal data needs to be identified as such. Controls must exist on the use of that data (which may restrict ad-hoc queries), audit trails of all access and disclosure of the information need to be retained as evidence. Computer misuse: There is also generally legislation on the misuse of computers. Misuse includes the violation of access controls and attempts to cause damage by changing the database state or by introducing worms and viruses to interfere with proper operation These offences are often extraditable. So an unauthorised access in Hong Kong using computers in France to access databases in Germany which refer to databases in America could lead to extradition to France or Germany or the USA. Typical offences are: Simple unauthorised access merely accessing data to which you are not entitled. The law is not concerned with the systems control per se. Unauthorised access (with intent to commit an offence) so you dont actually need to have succeeded just to have intended to do something to the database. Unauthorised modification no-one can even attempt access without making some changes but the purpose is to penalise outcomes. Clearly systems must record all accesses, attempted accesses whether remote or local. Failure to do so may be seen as negligence, conspiracy or condoning on the part of system managers and designers. Offences of introducing viruses are often covered in misuse legislation but are not included here. Yet. Viruses that attack DBMSs are of course possible. Audit Requirements: These are operational constraints built round the need to know who did what, who tried to do what, and where and when everything happened. They involve the detection of events (including CONNECT, GRANT transactions) providing evidence for detection, assurance as well as evidence for either defence or prosecution. There are issues related to computer generated evidence not covered here. In considerations of logical access to the database it is easy to lose sight of the fact that all system access imposes risks. If there is access to operating system utilities it becomes possible to access the disk storage directly and copy or damage the whole database or its components. A full consideration has to take all such access into account. Most analysts would be looking to minimise communications (direct, network and telecommunications) and isolate the system from unnecessary threats. It is also likely that encryption would be used both on the data and the schema. Encryption is the process of converting text and data into a form that can only be read by the recipient of that data or text who has to know how to convert it back to a clear message. You will find it easier to consider security and auditing as issues separate from the main database functions, however they are implemented. Visualise the security server and audit servers as separate functional modules. Principles of Database Security To structure thoughts on security you need a model of security. These come in various forms that depend on roles, degree of detail and purpose. The major categories are areas of interest (threats, impact and loss) as well as the actions involved in dealing with them. Security risks are to be seen in terms of the loss of assets. These assets include: Hardware Software Data Data Quality Credibility Availability Business Benefit Here we are primarily concerned with threats to the data and data quality but, of course, a threat to one asset has consequential impact on other assets. What is always important is that you are very clear on just what asset needs protection. So as a summary: ProblemToolTechniqueReliability (operational security)Recover from corruption, loss and damageBack-up, logging, checkpoints.Access SecurityControl Access Passwords, dialogues.Integrity (schema security)Ensure internal consistencyValidation rules, constraints.Table 10.4 summary of threats Finally you need to accept that security can never be perfect. There always remains an element of risk so arrangements must be made to deal with the worst eventuality - which means steps to minimise impact and recover effectively from loss or damage to assets. The two guiding principles are: appropriate security - you do not want to spend more on security than the asset is worth and you do not want security measures to interfere unnecessarily in the proper functioning of the system. Security Models A security model establishes the external criteria for the examination of security issues in general and to provide the context for database considerations including implementation and operation. Specific DBMSs have their own security models which are highly important in systems design and operation. You will realize that the security model explains the features available in the DBMS which need to be used to develop and operate the actual security system. They embody concepts, implement policies and provide servers for such functions. Any faults in the security model will translate either into insecure operation or clumsy systems. Access Control The purpose of access control must always be clear. Access control is expensive in terms of analysis, design and operational costs. It is applied to known situations, to known standards to achieve known purposes. Do not apply controls without all the above knowledge. Control always has to be appropriate to the situation. The main issues are introduced below: Authentication & Authorisation We are all familiar as users with the log-in requirement of most systems. Access to IT resources generally requires a log-in process that is trusted to be secure. This topic is about access to database management systems, and is an overview of the process from the DBA perspective. Most of what follows is directly about relational client-server systems. Other system models differ to a greater or lesser extent though the underlying principles remain true. The client has to establish the identity of the server and the server has to establish identity of client. This is done often by means of shared secrets (either a password/user-id combination, or shared biographic and/or biometric data). It can also be achieved by a system of higher authority which has previously established authentication. In client-server systems where data (not necessarily the database) is distributed, the authentication may be acceptable from a peer system. Note that authentication may be transmissible from system to system. The result, as far as the DBMS is concerned is an authorisation-identifier. Authentication does not give any privileges for particular tasks. It only establishes that the DBMS trusts that the user is who he/she claimed to be and that the user trusts that the DBMS is also the intended system. Authorisation relates to the permissions granted to an authorised user to carry out particular transactions, and hence to change the state of the database (write-item transactions) and/or to receive data from the database (read-item transactions). The result of authorisation, which needs to be on a transactional basis is a vector: Authorisation (item, auth-id, operation). A vector is a sequence of data values at a known location in the system. How this is put into effect is down to the DBMS functionality. At a logical level, the system structure needs an authorisation server which needs to co-operate with an auditing server. There is an issue of server to server security and a problem with amplification as the authorisation is transmitted from system to system. Amplification here means that the security issues become larger as a larger number of DBMS servers are involved in the transaction. Audit requirements are frequently implemented poorly. To be safe you need to log all accesses and log all authorisation details with transaction identifiers. There is a need to audit regularly and maintain an audit trail, often for a long period. Access Philosophies and Management Discretionary control is where specific privileges are assigned on the basis of specific assets which authorised users are allowed to use in a particular way. The security DBMS has to construct an access matrix including objects like relations, records, views, and operations for each user - each entry separating create, read, insert, and update privileges. This matrix becomes very intricate as authorisations will vary from object to object. The matrix can also become very large hence its implementation frequently requires the kinds of physical implementation associated with sparse matrices and it may not be possible to store the matrix in the computers main memory. At its simplest, the matrix can be viewed as a two dimensional table. Database UserDatabase ObjectAccess RightsPay-clerk1Pay-table-view1Read, UpdatePay-clerk2Pay-tableRead, InsertPay-auditorPay-tableReadTable 10.5: Access matrix When you read a little more on this subject you will find several other rights that also need to be recorded, notably the owners rights and the grant right. Mandatory control is authorisation by level or role. A typical mandatory scheme is the four level government classification of open, secret, most secret and top secret. The related concept is to apply security controls not to individuals but to roles - so the pay clerk has privileges because of the job role and not because of personal factors. The database implication is that each data item is assigned a classification for read, create, update, delete (or a subset of these) with a similar classification attached to each authorised user. An algorithm will allow access to objects on the basis of less than or equal to the assigned level of clearance - so a user with clearance level 3 to read items will also have access to items of level 0,1 and 2. In principle a much simpler scheme. The Bell-LaPadula model defines a mandatory scheme which is widely quoted: A subject (whether user, account, or program) is forbidden to read an object (relation, tuple, or view) unless the security classification of the subject is greater or equal to that of the object. A subject is forbidden to write an object unless the security classification of the subject is less than or equal to that of the object. Note that a high level of clearance to read implies a low level of clearance to write - otherwise information flows from high to low levels. This is, in highly secure systems, not permitted. Mandatory security schemes are relatively easy to understand and, therefore, relatively easy to manage and audit. Discretionary security is difficult to control and therefore mistakes and oversights are easy to make and difficult to detect. You can translate this difficulty into costs. There are perhaps two other key principles in security. One is disclosure which is often only on a need to know basis. This fits in better with discretionary security than mandatory as it implies neither any prior existing level nor the need for specific assignment. The other principle is to divide responsibilities. The DBA responsible for security management is him/herself a security risk. Management approaches that involve one person or a group of people that have connections in their work represent a similar risk. This emphasises the importance of security auditing and the importance of related procedure design. Database Security Issues This section reviews some of the issues that arise in determining the security specification and implementation of a database system. Access to Key Fields Suppose you have a user role with access rights to table A and to table C but not to table B. The problem is that the foreign key in C includes columns from B. The following questions arise: Do you have access to the foreign key in C? If you do, you know at least that a tuple exists in B and you know some information about B that is restricted from you. Can you update the foreign key columns? If so it must cascade generating an update to B for which no privileges have been given.  EMBED MSDraw.Drawing.8  Figure 10.12: Data access cascade These problems do not directly arise where the database is implemented by internal pointers - you need, as a user, have no knowledge of the relationships between the data you are accessing, They arise because relationships are data values. Often knowing the foreign key will not be sensitive in itself. If it is, then the definition of a view may solve the problem. Access to Surrogate Information It is not difficult to conceive of cases where the view of the data provided to a user role extends to the external world. An example should make the problem clear. In a retail environment there are frequent problems with pilferage. To deal with these, private detectives work under-cover. They are to all intents and purposes employees of the business and assigned to normal business activities as other members of staff. They get pay checks or slips at the same time as everyone else, they appear in management information (such as the salary analysis) in the same manner. They have a job title and participate in the system as someone they are not. The store manager is unaware of the situation, as is everybody else except the corporate security manager. When the store manager accesses the database the detective should look like a normal employee What leave is due to ...?. The security staff have different queries Do we have someone in .... You can probably envisage all kinds of complications. The detective should receive a pay slip with everyone else but should not be paid (or perhaps paid something different from the normal pay for the job). You may want to handle these situations on separate databases. As a solution it may be appropriate but the larger the problem the more scope there is for confusion. One suggested solution is the polyinstantiation of tuples - one individual is represented by more than one tuple. The data retrieved will depend on the security classification of the user. Tuples will have the same apparent primary key but different actual primary keys and all applications will need to be carefully integrated with the security system. Problems with Data Extraction Where data access is visualised directly, the problem can be seen clearly enough. It is to ensure that authenticated users can only access data items which they are authorised to use for the purpose required. When the focus shifts from the data to the implications that can be drawn from that data more problems arise. Again an example should make things clear. You want to know the pay of the chief executive. You have access rights to the table except for the MONTHLY-PAY field in this tuple. So you issue an SQL query SUM (MONTHLY-PAY) across the whole table. You then create a view SELECT MONTHLY-PAY ... and issue a SUM on this view. Should you get the same answer in both cases? If not, you can achieve your objective by subtracting the two sums. If you listed the monthly pay for all what would you expect to see - all the tuples except the one restricted? Would you expect to be notified by asterisks that data was missing which you were not allowed to see? Another example. You are trying to trace an individual but have limited information. You feed your limited information into the statistical database (e.g. male, age over 40, white, red car, lives in North London) and retrieve the tuples for all that meet these categories As you get more information the number of tuples reduces until only one is left. It is possible to deduce information from a statistical database if you have a little information about the structure, even if no conventional personal identifiers are available (i.e. no date of birth, social security number or name). Some solutions to this problem are to prevent access to small numbers of tuples and/or to produce inaccurate data (not very inaccurate but sufficiently inaccurate to prevent inferences being drawn). Adelman, S., Moss, L and Abai, M., Data Strategy, Addison Wesley, 2005, ISBN: 0-321-24099-5 Chapter 8 Now carry out Activity 10.6 Identify the security and privacy issues in an industry Learning Outcome: Apply the processes and practices that ensure data security and privacy;  Now do Review Question 10.13  Now do Review Question 10.14 Keep notes in your learning journal of your learning process before you proceed to the next section. Activity 10.1 Exploring Replication in Informix Visit the Informix site containing a selection of white papers describing a range of Informix products. This is to be found at HYPERLINK "http://www.informix.com/informix/whitepapers/"www.informix.com/informix/whitepapers/ From the site, follow the link for the paper entitled: Enterprise replication, a high performance solution for distributing and sharing information Note that you will need to have installed the free adobe acrobat reader in order to read the paper, available from adobe.com From the paper determine whether Informix addresses the issues listed in the table below. Put a Tick (") or Cross (X) in the second column: IssuesDoes Informix address the issue?Validation conflictData semantic conflictRelationship conflictData structure conflictUpdate anomaliesFeedback on Activity 10.1 Exploring Replication in Informix The paper begins by presenting an overview of basic Informix database technology, followed by some key replication concepts and considerations. The paper then examines the replication solution provided by Informix. Activity 10.2 Data warehouse case study The following web site HYPERLINK "http://www.dwo.bull.com/ve/papers.htm"http://www.dwo.bull.com/ve/papers.htm is the bulls scalable data warehouse site. It tells you a successful data warehousing story in the medical service area. Read it and use your own words to summarise how the business has benefited from the data warehousing technology. Feedback on Activity 10.2 Data warehouse case study Internet based searching and reading will form a major part of the learning activities in this unit. Case studies are helpful in clarifying the new concepts studied, and can also help you appreciate the new technology. Activity 10.3 Construct a start schema and identify the benefits that a company might get out of it An information package of a promotional analysis is shown below. To evaluate the effectiveness of various promotions, brand managers are interested in analysing data for the products represented, the promotional offers, and the locations where the promotions ran. Construct a star schema based on the information package diagram, and list a set of questions that a brand manager or other analysts can look for to evaluate their promotional activity. All Time PeriodsAll ProductsAll LocationsAll PromotionsYearsCategoryRegionTypeQuartersSub-CategoryDistrictSub-typeMonthsBrandStoreNamePackage SizeMeasures/Facts: Units, Revenue, Cost, Margin (calculated) Feedback on Activity 10.3 Construct a start schema and identify the benefits that a company might get out of it  SHAPE \* MERGEFORMAT  The star schema model can be used to analyse the effectiveness of the` promotion answering questions such as those listed below: Was a promotion profitable? What was the cost of developing the brand name over time? Was the promotion more successful in some locations than others? Based on historical data, how long does it take to build a brand name? Is the time to achieve name recognition decreasing or increasing? Does the product appear to have a seasonal trend; if so, do promotions assist in altering such trends? Activity 10.4 - Identify data quality issues A company XYZ has discovered a problem in its data warehouse data accidentally. They have gone through a very brief data analysis and tried to find out the root causes of these problems. They have identified the problems and decided to prevent the problems in future. List the data quality problems that the company may encounter when they have gone through the data warehouse data. As the company has decided that they will prevent the problems in future, fill in the table below to show what quality rules they need to apply for each problem that you have mentioned. Problems IdentifiedRules should be in place Feedback on Activity 10.4 - Identifying data quality issues The problems the company may encounter are: missing values null values incomplete data invalid data inheritance problems attribute relationship problems domain range problems etc. You can apply Business entity rules, business attribute rules, validation rules and dependency rules to ensure data quality in future. Activity 10.5 - Identify performance issues for a data warehouse Imagine you are a database administrator working within a large multi-national organisation. The Information Systems department is responsible for the in-house development and purchase of software used throughout the organisation. As part of your role, you require information about the planned introduction of a data warehouse that will be used in executing users queries. You are required to develop a form which must be completed by the users 6 weeks after the application is implemented. Using a convenient word processing package, develop a form to capture the data that you think may be required in order to determine the performance of the data warehouse and its applications. You intend to use this data for future enhancement. Feedback on Activity 10.5 - Identify performance issues for a data warehouse It is important that the form captures the details of both the extra processing and data capacity required of database systems in the organisation. Among the items that should be captured by such a form are the following: Which database systems will be used in the production environment Detailed descriptions of any new tables to be created, including lists of attributes, with their formats and lengths, primary and foreign keys, and details of indexes to be used Details of query and update transactions, including average and peak numbers of records accessed, average and peak transaction frequency Number of users of the system, including for each type of user what activities they will perform Details of any interfaces of the system, to other systems, to the web, to pcs Details of any requirements for fragmentation and/or replication if necessary Forecasts of data and transaction volumes anticipated in a years time, including the peak and average estimates required above Details of the impact on any existing tables, i.e. new columns or indexes to be added or changed, additional transactions, additional users Time taken to execute a query A set of tables that the users have used in last 6 weeks You may add some more. Activity 10.6 Identify security and privacy issues for an industry Following the activity 10.5, imagine that your organisation has the following stakeholders: customer employee supplier partners Government bodies Now determine the security and privacy issue for these stakeholders and fill in the table below accordingly: StakeholdersSecurity issuesPrivacy issuesCustomerEmployeeSupplierPartnersGovernment bodies Feedback on Activity 10.6 DTD conformation check The security and privacy issues for the stakeholders are as below: Unauthorised access to customers personal data Unauthorised update and delete operation on customers data inserting data without authentication viewing Govt. sensitive data change of important and critical data access to summary data You may extend it further. Review Questions Review Question 10 FORMTEXT . SEQ Review_Question \* ARABIC 1 Distinguish between the terms fragmentation and replication in a distributed database environment. Review Question 10 FORMTEXT .2 Analyse the differences between data warehousing and operational systems, and discuss the importance of the separation of the two systems Review Question 10 FORMTEXT .3 Discuss the functionality of data transformation in a data warehouse system. Review Question 10 FORMTEXT .4 What is metadata? How is it used in a data warehouse system? Review Question 10 FORMTEXT .5 What is a data mart? What are the drawbacks of using independent data marts? Review Question 10 FORMTEXT .6 List the factors that can influence the data warehouse development process? Review Question 10 FORMTEXT .7 An organisation has implemented a data warehouse in order to support its business decision making process. What are the basic tools the company requires to support its decision making process? Review Question 10 FORMTEXT .8 What are the three types of entities in a star schema and how are they used to model a data warehouse? Review Question 10 FORMTEXT .9 How can a staging area help the cleansing process in developing a data warehousing system? Review Question 10 FORMTEXT .10 Why is Checkpoint Restart Logic useful? How can it be implemented for the data extraction and cleansing process? Review Question 10 FORMTEXT .11 Noisy data and missing values are two major problems that an organisation may encounter during data pre-processing stage in order to build a data warehouse. What are the possible actions you may take to overcome these problems? Review Question 10 FORMTEXT .12 Make a list of the range of different types of activities that a DBA needs to plan for in order to optimise a data warehouse. Review Question 10 FORMTEXT .13 What are the threats in the following situation? Explain the nature of the threats. A senior manager is recorded as being in his office late one night. Subsequently at the time he was in his office the audit trail records several unsuccessful attempts to access database objects using a password of a member of clerical staff to objects to which the manager had no rights of access. Review Question 10 FORMTEXT .14 Distinguish discretionary from mandatory security. Answers to Review Questions Answer to Review Question 10 FORMTEXT . SEQ Answer_to_Review_Question \* ARABIC 1 Fragmentation refers to the splitting up of relations in order that they may be stored in a distributed manner across a number of machines within the distributed system. The fact that the data itself is distributed distinguishes this type of system, known as a distributed database system, from a Client/Server system, in which only the processing is distributed. Relations may be fragmented horizontally and/or horizontally. Replication refers to the process of maintaining a number of distinct copies of data distributed across a network up to date. Updates made at one of the sites containing data are propagated or replicated to other sites. A range of strategies are available to the designer to choose how updates will be propagated across the network. Factors that will influence this choice include: How up to date it is necessary for the data to be in order for users at different sites to perform there tasks effectively The peak and average volumes of update transactions The amount of data updated by each transaction The available network bandwidth. Answer to Review Question 10 FORMTEXT .2 While a company can better manage its primary business with operational systems through techniques that focus on cost reduction, data warehouse systems allow a company to identify opportunities for increasing revenues, and therefore, for growing the business. From a business point of view, this is the primary way to differentiate these two mission critical systems. However, there are many other key differences between these two types of systems. Size and content: The goals and objectives of a data warehouse differ greatly from an operational environment. While the goal of an operational database is to stay small, a data warehouse is expected to grow large to contain a good history of the business. The information required to assist us in better understanding our business can grow quite voluminous over time, and we do not want to lose this data. Performance: In an operational environment, speed is of the essence. However, in a data warehouse some requests meaning-of-life queries can take hours to fulfil. This may be acceptable in a data warehouse environment, because the true goal is to provide better information, or business intelligence. For these types of queries, users are typically given a personalised extract of the requested data so they can further analyse and query the information package provided by the data warehouse. Content focus: Operational systems tend to focus on small work areas, not the entire enterprise; a data warehouse, on the other hand, focuses on cross-functional subject areas. For example, a data warehouse could help a business understand who its top 20 at-risk customers are those who are about to drop their services and what type of promotions will assist in not losing these customers. To fulfil this query request, the data warehouse needs data from the customer service application, the sales application, the order management application, the credit application, and the quality system. Tools: Operational systems are typically structured, offering only a few ways to enter or access the data that they manage, and lack a large amount of tools accessibility for users. A data warehouse is the land of user tools. Various tools are available to support the types of data requests discussed earlier. These tools provide many features that transform and present the data from a data warehouse as business intelligence. These features offer a high flexibility over the standard reporting tools that are offered within an operational systems environment. Operational systems and data warehouses provide separate data stores. A data warehouses data store is designed to support queries and applications for decision-making. The separation of a data warehouse and operational systems serves multiple purposes: It minimises the impact of reporting and complex query processing on operational systems It preserves operational data for reuse after that data has been purged from operational systems. It manages the data based on time, allowing user to look back and see how the company looked in the past versus the present. It provides a data store that can be modified to conform to the way the users view the data. It unifies the data within a common business definition, offering one version of reality. A data warehouse assists a company in analysing its business over time. Users of data warehouse systems can analyse data to spot trends, determine problems, and compare business techniques in a historical context. The processing that these systems support include complex queries, ad hoc reporting, and static reporting (such as the standard monthly reports that are distributed to managers). The data that is queried tends to be of historical significance and provides its users with a time-based context of business processes. Answer to Review Question 10 FORMTEXT .3 A significant portion of the data warehouse implementation effort is spent extracting data from operational systems and putting it in a format suitable for information applications that will run off the data warehouse. The data sourcing, cleanup, transformation, and migration tools perform all of the conversions, summarisation, key changes, structural changes, and condensations needed to transform disparate data into information that can be used by the decision support tool. It also maintains the metadata. The functionality of data transformation includes Removing unwanted data from operational databases. Converting to common data names and definitions. Calculating summaries and derived data. Establishing defaults for missing data. Accommodating source data definition changes. Answer to Review Question 10 FORMTEXT .4 Metadata is a kind of data that describes the data warehouse itself. Within a data warehouse, metadata describes and locates data components, their origins (which may be either the operational systems or the data warehouse), and their movement through the data warehouse process. The data access, data stores, and processing information will have associated descriptions about the data and processing the inputs, calculations, and outputs documented in the metadata. This metadata should be captured within the data architecture and managed from the beginning of a data warehouse project. The metadata repository should contain information such as that listed below: Description of the data model. Description of the layouts used in the database design. Definition of the primary system managing the data items. A map of the data from the system of record to the other locations in the data warehouse, including the descriptions of transformations and aggregations. Specific database design definitions. Data element definitions, including rules for derivations and summaries. It is through metadata that a data warehouse becomes an effective tool for an overall enterprise. This repository of information will tell the story of the data: where it originated, how it has been transformed, where it went, and how often that is, its genealogy or artefacts. Technically, the metadata will also improve the maintainability and manageability of a warehouse by making impact analysis information and entity life histories available to the support staff. Equally important, metadata provides interactive access to users to help understand content and find data. Thus, there is a need to create a metadata interface for users. Answer to Review Question 10 FORMTEXT .5 A rigorous definition of data mart is that it is a data store that is subsidiary to a data warehouse of integrated data. The data mart is directed at a partition of data (often called subject area) that is created for the use of a dedicated group of users. A data mart could be a set of de-normalised, summarised, or aggregated data. Sometimes, such a set could be placed on the data warehouse database rather than a physically separate store of data. In most instances, however, a data mart is a physically separate store of data and is normally resident on a separate database server, often on the local area network serving a dedicated user group. Unfortunately, the misleading statements about the simplicity and low cost of data marts sometimes result in organisations or vendors incorrectly positioning them as an alternative to the data warehouse. This viewpoint defines independent data marts that in fact represent fragmented point solutions to a range of business problems. It is missing the integration that is at the heart of the data warehousing concept: data integration. Each independent data mart makes its own assumptions about how to consolidate data, and as a result data across several data marts may not be consistent. Moreover, the concept of an independent data mart is dangerous as soon as the first data mart is created, other organisations, groups, and subject area within the enterprise embark on the task of building their own data marts. As a result, you create an environment in which multiple operational systems feed multiple non-integrated data marts that are often overlapping in data content, job scheduling, connectivity, and management. In other words, you have transformed a complex many-to-one problem of building a data warehouse from operational data sources to a many-to-many sourcing and management nightmare. Another consideration against independent data marts is related to the potential scalability problem. Answer to Review Question 10 FORMTEXT .6 The factors are: data volume data architecture requirements: Subject specific Timebased frequency of update requirement frequency of transformation requirement drill-down and roll-up requirements Answer to Review Question 10 FORMTEXT .7 The fundamental tools that required to assist in business decision making process are: Executive information systems (EIS): As mentioned earlier, these tools transform information and present that information to users in a meaningful and usable manner. They support advanced analytical techniques and free-form data exploration, allowing users to easily transform data into information. EIS tools tend to give their users a high-level summarisation of key performance measures to support decision-making. These tools fall into the big-button syndrome, in which an application development team builds a nice standard report with hooks to many other reports, then presents this information behind a big button. When user clicks the button, magic happens. Decision support systems (DSS): DSS tools are intended for more technical users, who require more flexibility and ad hoc analytical capabilities. DSS tools allow users to browse their data and transform it into information. They avoid the big button syndrome. Ad hoc query and reporting: The purpose of EIS and DSS applications is to allow business users to analyse, manipulate, and report on data using familiar, easy-to-use interfaces. These tools conform to presentation styles that business people understand and with which they are comfortable. Unfortunately, many of these tools have size restrictions that do not allow them to access large stores or to access data in a highly normalised structure, such as a relational database, in a rapid fashion; in other words, they can be slow. Thus, users need tools that allow for more traditional reporting against relational, or two-dimensional, data structures. These tools offer database access with limited coding and often allow users to create read-only applications. Ad hoc query and reporting tools are an important component within a data warehouse tool suite. Their greatest advantage is contained in the term ad hoc. This means that decision makers can access data in an easy and timely fashion. Answer to Review Question 10 FORMTEXT .8 A star schema consists of three types of logical entities: measure, dimension, and category detail. Within a star schema, the centre of the star and often the focus of the users query activity is the measure entity. The data contained in a measure entity is factual information from which users derive business intelligence. This data is therefore often given synonymous names to measure, such as key business measures, facts, metrics, performance measures, and indicators. Dimension entities are much smaller entities compared with measure entities. The dimensions and their associated data allow users of a data warehouse to browse measurement data with ease of use and familiarity. These entities assist users in minimising the rows of data within a measure entity and in aggregating key measurement data. In this sense, these entities filter data or force the server to aggregate data so that fewer rows are returned from the measure entities. Each element in a dimension is a category and represents an isolated level within a dimension that might require more detailed information to fulfil a users requirement. These categories that require more detailed data are managed within category detail entities. These entities have textual information that supports the measurement data and provides more detailed or qualitative information to assist in the decision-making process. Answer to Review Question 10 FORMTEXT .9 Creating and defining a staging area can help the cleansing process. This is a simple concept that allows the developer to maximise up-time (minimise the down-time) of a data warehouse while extracting and cleansing the data. A staging area, which is simply a temporary work area, can be used to manage transactions that will be further processed to develop data warehouse transactions. Answer to Review Question 10 FORMTEXT .10 The checkpoint restart logic states that if there is a long running process that fails prior to completion, then restart the process at the point of failure rather than from the beginning. If used properly, it can help improve efficiency of a complex process while maintaining consistency and integrity. Similar logic should be implemented in the extraction and cleansing process. Within the staging area, define the necessary structures to monitor the activities of transformation procedures. Each of these programming units has an input variable that determines where in the process it should begin. Thus, if a failure occurs within the 7th procedure of an extraction process that has 10 steps, assuming the right rollback logic is in place it would only require that the last 4 steps (7 through to 10) be conducted. Answer to Review Question 10 FORMTEXT .11 It is possible that we will eliminate these values. However, the decision to eliminate data is never an easy one, nor can the consequences be easily foreseen. Luckily, there are several ways around the problem of missing values. One approach is to replace the missing value with its most likely value. For quantitative variables, this most likely value could be the mean or mode. For categorical variables, this could be the mode or a newly created value for the variable, called UNKONWN, for example. A more sophisticated approach for both quantitative and categorical variables is to use a predictive model to predict the most likely value for a variable on the basis of the values of other variables in observation. In addition to these, we may apply quality rules. Answer to Review Question 10 FORMTEXT .12 the number of transactions anticipated for a given period of time the level of complexities of the transactions the number of concurrent users querying on any particular or a set of tables the geographical location of the users the geographical location of data that will take part in data warehouse for extraction and loading the volume of data system configuration and environment that an industry can afford Industries benchmark for performance assessment how frequent the data need to be available the problems identified in previous system (if any) system availability requirements for recovery purpose size of the database size of the tables hardware architecture, topologies and geographical locations any specific application is required type of users, level of expertise and their authority to a specific or a set of functionalities of the system security and privacy issues requirements on response time and availability phase of implementation backup and recovery procedure and how frequent testing process and users involvement criteria partitioning requirements, data compression and data distribution issues agreed growth rate system support and maintenance requirements usage rate of a data warehouse time takes to execute a query the distribution of resources and their utilisation the level of flexibility and user friendliness of an interface when used for a query users assessment of the system implemented locating a set of data that are never used or a set of data that are used quite frequently cost and benefit analysis and to measure Return of Investment (ROI) Answer to Review Question 10 FORMTEXT .13 Assume the Audit mechanism is trusted. If this is compromised you have a real and larger problem. In fact, the audit trail recorded all activity in great detail. The case could provide threats in each of the three areas. Notice that you have no proven connection between the manager and the attempts to violate the system. Accessing or attempting to access data to which you have no privileges is a criminal (and extraditable) offence in most parts of the world under the heading of computer misuse. The data being accessed could be commercially sensitive which may or may not be legally significant but could be critical to the business. The data could be personal (about an identifiable person, usually living). It could be both a client list with outstanding debts for example. In the actual case the password used was the password of the managers daughter (also an employee). He was immediately dismissed (losing not only his job but also his pension), a decision which was supported by the tribunal on appeal. Answer to Review Question 10 FORMTEXT .14 Discretionary control is where specific privileges are assigned on the basis of specific assets which authorised users are allowed to use in a particular way. The security DBMS has to construct an access matrix including objects like relations, records, views, and operations for each user - each entry separating create, read, insert, and update privileges. This matrix becomes very intricate as authorisations will vary from object to object. The matrix can also become very large hence its implementation frequently requires the kinds of physical implementation associated with sparse matrices and it may not be possible to store the matrix in the computers main memory. Mandatory control is authorisation by level or role. A typical mandatory scheme is the four level government classification of open, secret, most secret and top secret. The related concept is to apply security controls not to individuals but to roles - so the pay clerk has privileges because of the job role and not because of personal factors. The database implication is that each data item is assigned a classification for read, create, update, delete (or a subset of these) with a similar classification attached to each authorised user. An algorithm will allow access to objects on the basis of less than or equal to the assigned level of clearance - so a user with clearance level 3 to read items will also have access to items of level 0,1 and 2. In principle a much simpler scheme. Group Discussion Use the WebCT(Oasis) discussion facility to post your comments on the following topic. In this unit, we have covered the most important aspects of data warehousing. Data warehouse systems are so powerful they improve data quality, allow timely access, support for organisational change, improve productivity, and reduce expense. Why do we still need operational systems? Contribution to Discussion You are expected to do a bit of online searching to find out the benefits of data warehousing in large industries. However, you discussion may point out: trend analysis facilities handle large number of users query future market forecast decision support etc. You need to argue why we still need operational system. It may includes: to store daily operation preserve local autonomy immediate query requirements etc. Learning Journal Record your learning experience all through. Highlight core concepts that you have identified in this unit. Keep notes on difficulties, experiences and challenges and the approaches that you have identified as solution to the problems. End of Unit Self Assessment Before proceeding to the next unit you should work through the End of Unit Self-Assessment on WebCT. When you have completed the questions you will be able to obtain sample answers for future reference. Your performance with these questions will not affect your grade for the module, but may be monitored so that your tutor can be alerted if you are having difficulty. Please contact your tutor if you feel you have not done as well as you expected.  Dont forget to complete the End of Unit Self-Assessment  Extra Content and Activities There is no extra content in this unit.     Promotion Analysis "#+p 2 6 D U V ~   . mnTb/UVn?@AIgi鸭 hzhwhDh3){hYB*OJQJphfh\dB*OJQJphfh3){h~OJQJhYh hHch hvThdr hdrhdrh^Fh.A,hdr hdrhwh~hWZh@/CJ,aJ,hVCJ,aJ,3#+ m nAW]q $$Ifa$gdN & F3gdnu gdYgd^F gd^FgdYgd@/ooK%)FTUWpP\]q;<XYlm"HI !ͻͪͪͪͪͪͪͪͻԣԔhYh![C hN!h![Ch5Lh_dd h5Lh5L h"|h=96CJOJQJ^JaJ#h"|h=965CJOJQJ^JaJ h"|h=96h~h8 hzhD hzhNhDh'H hzhz hzh#73;<PXUOkd[$$Ifl0hY44 la $$Ifa$gdNOkd$$Ifl0hY44 laXYflmUOkd$$Ifl0hY44 la $$Ifa$gdNOkd$$Ifl0hY44 laUOkd$$Ifl0hY44 la $$Ifa$gdNOkdl$$Ifl0hY44 laUOkd}$$Ifl0hY44 la $$Ifa$gdNOkd"$$Ifl0hY44 la"q\ $a$gd*j gdKV&gd~ & Fgd![CgdY gd![C & F2gdnugd~Okd$$Ifl0hY44 la[\FP"rX"$$$$'(A(((*)>)))*4+5+\,,,,,,,,,-----.൭ЩЩh![C h%h7h{vh%h75h7h![Ch![C5+j3he";he";5UmHnHsH tH u hKV&5hCEhp$hdbh~hKV&hP1hP1PJhDI hDIhDIhYh~9X""2#F#U#h#$$''(*))*5+D+b+w+++++,,5,J,\, & F1gdnu & Fgd7 gd7gd7 gdKV&\,,-.\.w./n22G34<55~79 ::;;j<<(>?ABB $IfgdN & F0gdnugd% gd7..5.?.\.j.k.w.//000012O2m2n2z2{223$3334+4?4E444;5<555"6*6}7~70828P8999999: : : :3:7:::u;z;;;;;; >>>﹵ﹱh/RhVhE\hVh@hB~$ h756hnh756h% h76 h75h![Ch[ hnh7h{vh7h%h75B>>(>C>G>b>>>>>?S?r???X@@@@AAA.BN(j@he";he";UmHnHsH tH uh*j h3){h~h h~ h)h~ hXAh~(jy7he";he";UmHnHsH tH uhTh%h7hHMh+)6hE\h;ghhVh/RhV3BfCCCCCCCzD $If[$\$gd $IfgdN $IfgdNOkdf@$$Ifl0 X44 la $Ifgd![CCCCD D*D,DyDzD{D|D}DDDDDDDDDDDDDDDD˼˼{wb[[[Wh![C hXAh![C(jPhe";he";UmHnHsH tH uhKpx hXAhs hXAhW!hXA hXAhKpx(jHhe";he";UmHnHsH tH uh~h'h~CJOJQJaJhbLZhbLZCJOJQJaJhE\CJOJQJaJhbLZh~CJOJQJaJ$hXAh~0J>*B*OJQJph hXAh0TzD{D}DDDDDOF $IfgdPWOkdP$$Ifl0 X44 la $Ifgd $IfgdNOkdH$$Ifl0 X44 laDDD"E#E$EFEGOJJE gddbgd*Okd`$$Ifl0 X44 la $Ifgd@k $IfgdNOkdX$$Ifl0 X44 laDDD"E#E%E'E(E)E*E/E0E9EEEFEII J JLL MQQS*h@khzp>* hzphzphXA hzp6hzphE\h% hdbhB9h*hU"h h;T\ h;T\h;T\ hXAh;T\(jXhe";he";UmHnHsH tH u4GIKLOQQUSSS T[TT*B*OJQJph hXAhM hXAh~q hXAh8 h~-Lh8(jahe";he";UmHnHsH tH uhE\ hzp6hzp!9:<YZ7Okdp$$Ifl08 44 la $Ifgd $Ifgd Okdh$$Ifl08 44 la $$If[$\$a$gdW $IfgdWTWXZ[\‰ÉĉƉljȉɉVlqʕ˕`awG&yqyqymhLh!h!5h!h5 h;eh;e(jfyhe";he";UmHnHsH tH u h!hh/hh=k h6hhmphLhU"h hxCJ h;T\hx h~-Lhx(jDqhe";he";UmHnHsH tH uhx hXAhdb hXAhs*Z\‰É"$9ʕ{ gd!gd! gdgdU" gdU"gdL gd8Okdy$$Ifl08 44 la $Ifgd)n $Ifgd ʕ˕/Waژ̛>؜G ̟l & F*gdnu & F+gdnugd! $a$gd*j$a$gd*j & F,gdnu gd!&lu!ƪoëҫ׫*/EBCͳҳ R\iv3F2;-g{_`aijpxy{|}haI hLh{ hLhL hLhaI hxThaI(jhe";he";UmHnHsH tH u h5hhL h>*hh>* hhh=k h6 hhh<_ӢK%Ǥ(uLYƪ0\oGBC & F)gdnu gdgd! gd! & F*gdnuͳҳ 3F #_a~ $Ifgd $Ifgdgd gd~OOkdѸ$$Ifl08 44 la $Ifgd $IfgdPWOkdͰ$$Ifl08 44 la&'(*+,-OPxycdٯ{{ٍwwojee hE 6 hE >*hXphE >*h=hXp h)n hE hE hE hE hi>hsFh*jhaI h;T\haI hxThaI(j+he";he";UmHnHsH tH u(j'he";he";UmHnHsH tH uhL hLhL hxThL(j#he";he";UmHnHsH tH u'&'PMHC gdE gdi>Qkd$$Ifl08 44 la $Ifgd)n $IfgdOkd$$Ifl08 44 la#:M)6$a$gd*j gdq' gdb $a$gd*j gd= gdXpgdE  gdE  & F(gdnu()56 45͒͒͸~ h:5h:hXp5 hXphE hXphXp5(jhe";he";UmHnHsH tH uhXp hE >*hXphE >* hE 5hXphb5hXphE 5 hq'5hq'hq'5+jQhe";he";5UmHnHsH tH uhq'hE 16 gkde$$IflF7R 9 t0    44 la $Ifgd>] gdXp  ulll $Ifgd>]kd $$IflF7R 9 t0    44 la%-8ulll $Ifgd>]kd$$IflF7R 9 t0    44 la895ulgbZZUL $Ifgd>] gd: & F'gdnu gdq' gdXp ddgd*jkdT$$IflF7R 9 t0    44 lai->@        $qj hxThq'(j he";he";UmHnHsH tH uh hq'h=k hq'h&" hq'he9 hq'h hq'hq' hxTh(j{he";he";UmHnHsH tH uhhq' hE 6 hE H* hE >*h:hE >* h:h*j h:hE hE hXp5('(3D; E$Ifgd>]kd$$Iflr77 Hp( t044 la $Ifgd>]36:?GHSVDkd$$Iflr77 Hp( t044 la $Ifgd>]VZ_ghiD;x^xgdE kd$$Iflr77 Hp( t044 la $Ifgd>]i=-sw['     & F%gdnu gd:gd: & F&gdnu & F&ddgd*j9Qkd1$$Ifl08 44 la $IfgdPW $IfgdPWQkd) $$Ifl08 44 la $Ifgd+)6 $Ifgd:U,-./:;{r{}[^1 "+1@x|ÿúúúúúööúúúúîöåá{s{sh h 5h h>]5hB*hB*5+jhe";he";5UmHnHsH tH uh h  h>]>*h;h>]>*h8 h>]6hh>]h*jhPJmH nHsH tHh h;T\h hxTh(jhe";he";UmHnHsH tH u-,-.;x, gd]2gd>] & F *$@&gdi|?QkdW$$Ifl08 44 la $Ifgdu $Ifgd:U8>EM\ir $Ifgd]2 gd; gd]2 $a$gd*j  !8 2 @ """""""""""" ##{#|###N%O%m%%%%&&&&D'E''(4(Y(d((($)*)))Q*R*^*****+v+w++ٿٷ٫٧٣ h>]CJh8h"<hshuh;5huh>]5hB*hM0 h>]6 h>]>*h;h>]>*h>] h;5h;h;5h hB*5 h>]5h h>]5>rsz?66666 $Ifgd]2kd-$$Iflֈ7dp  - I044 la $Ifgd]2 {#|##%?::::: gd]2kd.$$Iflֈ7dp  - I044 la%&&S)w+++++++++ $Ifgd]2 gdu gd]2 +++++++>55555 $Ifgd]2kd/$$Iflִ fB"up#nVST"    44 la++++',(,9,:,K,L,Z,[,i,j,y,z,,,,,,,,,,^-_-////F0N0j0k022333333444 4򪥝z+jfhe";he";5UmHnHsH tH u hs5hkhC5hkh>]5 hhG5+jiOhe";he";5UmHnHsH tH uh'5 hat6hHh'hat5h'h>]5(j7he";he";UmHnHsH tH uhat h>]CJh>].+++++++5kdq0$$Iflִ fB"up#nVST"    44 la $Ifgd]2+,, ,,,', $Ifgd]2',(,,,1,4,5,6,>55555 $Ifgd]2kd^1$$Iflִ fB"up#nVST"    44 la6,7,8,9,:,>,C,5kdu2$$Iflִ fB"up#nVST"    44 la $Ifgd]2C,F,G,H,I,J,K, $Ifgd]2K,L,S,T,U,V,W,>55555 $Ifgd]2kd3$$Iflִ fB"up#nVST"    44 laW,X,Y,Z,[,b,c,5kd4$$Iflִ fB"up#nVST"    44 la $Ifgd]2c,d,e,f,g,h,i, $Ifgd]2i,j,r,s,t,u,v,>55555 $Ifgd]2kd5$$Iflִ fB"up#nVST"    44 lav,w,x,y,z,,5- [$\$gdatkd6$$Iflִ fB"up#nVST"    44 la $Ifgd]2,,,,1334!4p4r44444455555555 $Ifgdu $Ifgd gd]2 gdat $a$gd*j $[$\$a$gd*j [$\$gdat 4!4)4*4p4q4r4z4{44444444444445555Ƽƈskck[F(j2he";he";UmHnHsH tH uhyh"05hyhy5hyh>]5(jhe";he";UmHnHsH tH uh!h"05h!hy{5h!h>]5 h"0h>](jhe";he";UmHnHsH tH u h"05 h'55 h>]5 hhGh>](jhe";he";UmHnHsH tH uhshs5hsh>]5h"0hB*5555555555555566666_6e6r6s66666666666666ü}yd``YY hxThhxT(jDhe";he";UmHnHsH tH uhh\E~h\E~CJOJQJaJh'hCJOJQJaJ$hxTh0J>*B*OJQJph hxThD hxTh hxTh(j;he";he";UmHnHsH tH uh*j h3){h` h)h6Yh6Yh` h)h` hxTh`"556s6666@OkdC$$Ifl08 44 la $$If[$\$a$gd:U $Ifgd:U $Ifgd:UOkdn;$$Ifl08 44 la66667/:I:;=$======>@@ gd\}gd\} gdxTOkdK$$Ifl08 44 la $Ifgd*j66666666/:H:I:=#=$=b=h==========>>2>4>@@@@AAFBGB_BaBpBBDDEEEEGGGGGGGHHHHh` hxThqD hxTh`(j Lhe";he";UmHnHsH tH u h\}H*h\}h\}5 h\}5 h\}6 h\}>*h\}h\}>*hyh\}h*jhxTh9@FBGBEEGGGHHHH%H&H $IfgdNO $IfgdNOOkdS$$Ifl08 44 la $Ifgd $Ifgd gd\} HHHHHH"H$H%H'H(HfHgHHHHHHHHHHHHdIeItI"J1JqN}N8OEOVV\]]]ııĭ{{{wskh ih>*h ihg$hh>* hhh4(h h3hh8hC=hzh9mh*jhKO$hxThKO0J>*B*OJQJph hxThKO(j\he";he";UmHnHsH tH uhxT hxThxT(jThe";he";UmHnHsH tH u&&H'H)HHHHHtIMHHC gdgdzQkdd$$Ifl08 44 la $IfgdxT $Ifgd1Okd[$$Ifl08 44 latIII"J1JLqN8OPSQRT/TUV?XZ\]^aabucFehFijgd gd & F$gdnu]]]aauccchhFiViWidiiiziiiiiiiiiimjjjjkkkkl l} ~ ~h~i~bcFfgHﺾҺҺҮ뙒 h'Ehn*(j ehe";he";UmHnHsH tH uhtsh(:khhbnh%3hS@7h=%h 3>*h=%h4(h 3h[) h i>*hh>*hxThh ih ih i>*9j lnopRsfvyzJ|} ~i~~~~~Q-zπ & F"gdnu gdbn & F#gdnugd%3gd gdFӁ0gʂ3Hփ3d  $Ifgdu $IfgdtD gdxT & Fgdnu & Fgdnu gd & F!gdnu 458XYkÅąŅƅDžׅRkgc_[WShx}htshfamhC=hDthCj(jvhe";he";UmHnHsH tH uh'hn*CJOJQJaJhchcCJOJQJaJhchn*CJOJQJaJ$hCjhn*0J>*B*OJQJph hCjh3 hCjhXxT hCjhn* h'Ehn*(jRnhe";he";UmHnHsH tH uh9mhn* hn*hn*YÅą $$If[$\$a$gdtD $If[$\$gdc $IfgdtD $IfgdtDOkdm$$Ifl08 44 laąŅDžSOJE gdgdfamOkdC~$$Ifl08 44 la $IfgdtD $IfgdtDOkd?v$$Ifl08 44 laRSwx݆(2M߈?!abPx-89 + ]kny hg#h-hg#h-hCjhv?>*hv?hjFhV'h-hCjhg>*hCjh->*hgh/?hCjh&>*h&hCjh>*hhCJOJQJhChCj hCh} hChCh}h4(hx}h-Ss҆Kw(M̈߈?lj 7!b & Fgdnu gdCj8 & Fh^h`gd & F gdnu gd} & FgdC=b(=PxQv/Gv-9c֐+ & Fgdnu & Fgdnu gdu gdCj & Fgdnu+Wn'Z4)E%)rL $IfgdtD & Fgdnu gdCj & Fgdnu34)V_`abcd#$%&/067CĽęęęăt_[[hz(j!he";he";UmHnHsH tH uh'h'sCJOJQJaJhch'sCJOJQJaJ hzhpy hzh}(jއhe";he";UmHnHsH tH uh9mh's hn*h's hzh's(j~he";he";UmHnHsH tH uhI2 hI2hI2 h\%Hh\%H hhI2 hh V`bce#$ $$If[$\$a$gdtD $Ifgd's $IfgdtDOkd$$Ifl08 44 la $Ifgdu$%'EFGHcOJEgd]gdOkdϗ$$Ifl08 44 la $IfgdtD $IfgdtDOkdˏ$$Ifl08 44 laCDEGHILMbcuvwxȧY7ܭIJ"#$XgCYdvw[ߺ߯|u h/DhtD htD5hShtD>* hShShSh4( h;fh;fh;fh;fhtD>*htD hLh]hzhLhK5(j%he";h9mUmHnHsH tH uh8hC=h]h9m h56h's hzh's hzhY].cuwxȧX{Yq gd;fgd;f & Fgdnu gdL $a$gd9mGgd]2$ &#$$d%d&d'd/NOPQa$gd9m gd]ܭVo2.h"#XCYʺd & Fgdnu gdS & Fgdnu gd;f[ent $Ifgd;f & Fgdnu gd;fgd/D  ]kl/KK4STǼǬ(jƥhe";he";UmHnHsH tH uh_htD>*h_htD5h_hp5jhpUjEN hpUVhpjhpUh3 htD>*hphtD>*hz hphtDhphz5 htD5htD22vmmm $Ifgd;fkd$$IflF    Z 0    44 la23CSivmmm $Ifgd;fkd$$IflF    Z 0    44 laijvmmm $Ifgd;fkd+$$IflF    Z 0    44 lae  ]vqlldd_lllgdp & Fgdnu gd;f gdzkdϞ$$IflF    Z 0    44 la ]lT $Ifgd;f gd;fvmmm $Ifgd;fkds$$IflF bY  0    44 lavmmm $Ifgd;fkd$$IflF bY  0    44 la).vmmm $Ifgd;fkd$$IflF bY  0    44 la./KBKYxvqllllddlll & Fgdnu gd;f gdzkd_$$IflF bY  0    44 la \+4TGrgdp gd;fCNOPR $Ifgd9mOkd$$Ifl08 44 la $Ifgd\ $Ifgd1 gd;f CNOPQlm}$%&()*39:FGHJ~~wb[~[~[~[~ h3h3(jRhe";he";UmHnHsH tH u h3hSmh3(jNhe";he";UmHnHsH tH uh'hr4CJOJQJaJhhCJOJQJaJhhr4CJOJQJaJ h3hxSj h3hx(j he";he";UmHnHsH tH u hn*h9mhr4 hn*hr4 h3hr4"&'(*OF $IfgdNOOkd$$Ifl08 44 la $Ifgd1 $Ifgd1Okd$$Ifl08 44 la*HIJL=Okd"$$Ifl08 44 la $IfgdQ $Ifgd:UOkd$$Ifl08 44 la $IfgdNO $IfgdNOJKLfg\]htvJVÿÿwpipipi h>1h>1 h>1hQ>he";hsJ5CJaJhe";hQ>5CJaJhuhsJh3hQ>hQ>hQ>0JhZjhZU hQ>hQ>hGmh,dh|h9mhPJmH nHsH tHh h;T\h h3h(jVhe";he";UmHnHsH tH u)]bzkdx$$Ifl09  t0644 la $Ifgd| gd3gd| & F *$@&gdi|? FHJxz{zkd$$Ifl09  t0644 la $Ifgd]Kqz|{{ $Ifgd]Kqzkd$$Ifl09  t0644 la{{ $Ifgd]Kqzkd$$Ifl09  t0644 la{{ $Ifgd]Kqzkd$$Ifl09  t0644 laADzuupkfaagd+-q gdHgd  gd[gd gd3gdGzkd $$Ifl09  t0644 la  @A#%*CD[\lÿöҲڣڈhw/h9YhAhhc hw hh ]hh+-q h<hHhHh h.szh.sz0JhZjhZU h.szh.szh.szhh9m hh;NhGh;Nh/h|hiX h>1hQ>4 "+2Ukd$$Ifl\S ")Q044 la $Ifgd gd 278ANW`ZkdJ$$Ifl\S ")Q044 la $Ifgd`ahntycZZZZ $Ifgdkd$$Ifl\S ")Q044 layz{cZZZZ $Ifgdkd$$Ifl\S ")Q044 lacZ $Ifgdkdx$$Ifl\S ")Q044 la9V0qab}}gdY & Fgdnu gdt(gdt(gdfkd2$$Ifl4S)044 laf4 9:QRSTUV`abkmoqr  "$()HIJÿÐÈh6XhFhzhvaP hhhOihe";hc5he";hOi5hhOihNOh}ShV3NhYh9 ht(ht(h0' hw ht(ht(jhZUjhZhZUhZjhZUh4yxkd@$$Ifl09  t0644 la $Ifgdnu gdY ~~ $Ifgdnuxkd$$Ifl09  t0644 la~~ $Ifgdnuxkd>$$Ifl09  t0644 la~~ $Ifgdnuxkd$$Ifl09  t0644 la~~ $Ifgdnuxkd<$$Ifl09  t0644 la   ~~ $Ifgdnuxkd$$Ifl09  t0644 la   IJv}}uuuuuuu} & Fgdnu gdgdvaPxkd:$$Ifl09  t0644 la       S  Q\zn gdNOgdN} gdQ & Fgdnugd gdKgdF gd$u            [\mn>?ƾt huhQFCJOJQJ^JaJ h.hQF hQFhQFhe";hQF5hQFCJOJQJ^JaJ hQFhQFCJOJQJ^JaJhuhQFh?hN} h77]h77]h77] h77]hKhKh}Shhh9hrmhsJhFh6X-nw/> $Ifgdnu8 & Fh^h`gdQF gdNO & FgdNO >?HIJtkkk $Ifgdnukd$$IflF     t06    44 laJKTUVtkkk $IfgdnukdN$$IflF     t06    44 laVW`abtkkk $Ifgdnukd$$IflF     t06    44 labclmntkkk $Ifgdnukdx$$IflF     t06    44 lanotkkk $Ifgdnukd $$IflF     t06    44 la,htd__ZRRRR & Fgdnu gdNOgd#8 & Fh^h`gdQFkd$$IflF     t06    44 la ')*4567VWXY[rAHQST^ٹٵٱ٪٦٢٦ٞٚٞݒhj=h@$lh)hm sh h hdbhdbhQhXgm h6h6hmHnHuhZjhZUh6h5 rhiXh9hh. h.h.h;hh}Sh#9[rAc@#gd3; gd ~gdb gde9 gdoh gdj=gd@/ gdm s gdQgd5 rgdiXgd;h gdNO & Fgdnu^_`abc/12<=?@ ##$( 'ļĸĴĸh_hP:hXxTh&w}h:,hhQ5Ih<ihMdhh,ihD*h3;h(` h ~h ~h ~hbh(=he9 hohhj=hh)hiXjhZU:#(Df;<=Y[ gd:,gd:,gdiX gdYX gdYX  gd.Agd8 gd% gdQgd&w} gd : gdgd<i gdgd3; gd,i'(ejDTVWabf<=uv    !""++..///009233ïêååá࡚ hhFhF h:,6 h:,5 h6h:,h:,mHnHuhZh:,h9hYX h.A5h.Ah8hvjhZUh%h&w}h[h_hP:h]<[T    !"_$R&(*+3,,-o--//092l222 & Fgdnu gdFgdF & Fgdnugd:, & Fgdnu gd:,2233H356>6x67877Z9::2:< ?AABB"BBB & F gdnu gdDtgdDt & Fgdnugd:, gd:, & Fgdnu38393C3D357:":#:-:.:::==AABBBBB"B#BBBBBBBLCMCEJJJJ7K>K@KIKOK^KPPPPQPQ|QQ8R9RCRDRTTUUUUXXXX._/_9_:_XcYcccdcicvc ff$i&ih9 hDtH* hDt5 h ~hDt h5-hDt hDt6hDt h[h:,jhZUh:,OBBSB]B}BBBBBMCEFJJJ`KLNkPlPPRRIR|U}UUX gd:,gdDt gdDt & F gdnu & F gdnuXXXYIYYY Z3ZtZZZ[:[O[b[[[2\N\}\\\\<]O]{]] & F gdnugdDt gdDt]]]C^o^^__?__3aObPb;c*B*phh0J] hDthiX(j7he";he";UmHnHsH tH uhiXOJQJh3){hiXOJQJh'bh_OJQJh?OJQJhzOJQJhPZ hPZhiXh9 h(hDth( h(h(hiXCJOJQJh3){hiXCJOJQJhiX"jjjjdk~kkkkl0lHljlkl|limjmmRnnIoKoo $Ifgd0J] $IfgdiX gdQgdiX & F gdnu gd? & F gdnu gdiXgdPZoooooooooooooooooo-gd\h, gdAzgdY"Okdi$$Ifl08 44 la 5$Ifgd@$loooooooooooooooooooo  !"*+9:IJKL׾ hE\CJUhZhE\h h,YHhE\CJOJQJ^JaJhSjhSUjh hS<UhAzhDth(7#h|r:"oooo  !"*+9:IJKL gdAzgdt(Time period Location Promotion Product Store Details Product Detail 901hP:pf!2. A!"#$% Y$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aY$$If!vh5Y5#vY#v:V l5Y5aF4DdP   nA?image002Picture 2image002b`38SKcv y<3wn438SKcv yPNG  IHDRgPLTE       ) " 1&"$'+028 %$#5###('%-,&*** 802/)64,<<.33333:877=;3:::BY]`//T :A==B>>K66\==V""q**r))y11k<p}DD4CB#J!lBVbAu:R4o8̐A *QgYfyYfYgW d*8Y06S"XN&@U"j, )PP7fgnʩ+ܸ.n9nDτH NK&㣉T4KG87\(f)s x9Wa7[O h0 0\"Q -qt&(ܒ)HaQTo]0Tj×Pݑl8Pz C!:p2 3gSpΉT"AXJXW͇TxM(O?~U:h2*1ɫd:ơDȊ*V]_0BkHJb B7qaf@Ҫ ߷\??a9HRxH@)P"*‚zPΑOPb$=)Nk aROfIAU"VU"ԪD/nqCwܲ7ǥ(4!  T$ T[d*$ww#c9Ă0L"ƘD3ata{KnS#w?GDROX[i.]K^b%>n۳oۦ{n8t?GfB¼j"(FČěa8f8,2s6rSbǞ7ܘ)qKlu1(@ Ep6zR9oܽձͿ{ z?i΋B%hH,mҥJ}8pȧrN\'svh\moHX(@,Tb$S!bP" Q0ܒ)vsbͣ7*lIM̂/+8 !p."CRS XzM (bTrq|c0&^,{MXPCrK% ~QN̘38LIb%h^8LRDEV*Ipe?0;`@6ejj:>~ ^:df` s.$>\"* 0 h.2E>hFdFd%&D6f׳f "'K !|^P73<|F Rw\iY` )TGD 0-.D86gQ!+.BlwJ Rд) |@-K@<7 莅\E( GDe4+q}ńȲ1ȵ+R QX8+ة7B@qC5v8 =@?0wx !IX<H C {u! F ڀg%r/(4 Jj[J`ʺD 5il.LH:ID#) > SF++PdDLfxoن1(0։5Ξ4cN@S}uG5c|NWx\ub ע&0 )'RlZ3=q Rf\wv3f?Zt+Qѽ2T{~W t%͊c ŠHORRbom4H˩ O;CwtIsϊM ~ n F 88Ps<,\.sCDbfnalJ|]j7aB%җ>-$U>٬ +E 13,) `uˤ?~DLUfםK+j`X|ĀAh ay[^AghCO[-"AHɥڋ%-nbܲk{8#m ayC4뷁ն)M0!g6m` Ię085&oN0($ %F_Bgp6t>š;wk?MCXSpa砩tk !4ՃaM;z!)ڿssTJ{6uٞ}䓎#a8 R%sk߫ٷwR<1X=OyFw&àK*dY~;ovBam~Gכte_ rw9LvE.O0)ՔpԳf|}3@A#_ʾu}+}/E6]RItgj{?~f38VwOVmO4Sp90o]]q$[]bdlx >ޅH\}b'<ER+.)^[0]G,ۂ`BW>2ۃK3 {PC Ǧ"cƇV5rv~z!5x;ݑ/;U=v0}(yީJ(ž:U 9\utu0}a,_~vl.no2#.NNDUȅ^ת×H-#+PW~kq׃_t|b>w=s3o:{Δ1;]:ˎ^Њ_1c>Tmob|MLp]|oEO:Է'oxjrǘxHұŒWWwm0=T0IgDؓ'NW0_ x9Z?r@.{jŕ%MLʅxs$oyL\l-*ڕk#Vx쪐wuov ;{+._+ 1A" T^CK_~OU];~^EkJNX'Sg@Y*9ZfjDQhEDhx;/\d_6vu˪@w~+7>-h/8`QvGq_THp<-|bɲ{ցm놩]f/8`1H ˟{*E1Gt@8-~zUA'¡ÇrŢE\{^{z Q2kk t{XerG&Ɍ$WyO} 0zZiIcЅXCLccmYucca lClᠩA"7^6"Nq!~/;?q:$l ibؾ9@RS0gg"˿ fԻg^;"ri̢c q ]щ/eׂzl˖k0aϽE `ȼWp" 0ӌMa5ZSm;op.*6jz;'J{~ǮʂK{~fZy܀׎Bi*8_0"v⟙ף ~iD ;^HC0Fϔ"\Wl{wBi*ҵߚf^E=w C}0TVka[+$`+ }WpՊ%0bRQJkp)`5[?2A{QFahl2WekcoD!?1q%*'ShbuG/池W` `[ߌ(~k2ˮ~xҜMzkɟA뎎-;{O܊疽 #kҞDiNҿ/|pz.395؆8Č]Yu 0 f lz rfFc.F]PNE!> FG;nw_؂푄V{ל5)cWWJt<!+b.Jph$MQl4nyJQ_q9Lr:.e'v3şZ#οZv8rI˜FKx 7<4#7+Vy\hum4)4_mYel9|xZ~ՒB"[is#f7'ӿ0\1P61h|\qج*8ҕ@-ϕ-iqao Xݼ=.Rֵ^a:r\m6?[7tN3{l4W.φtuԓ,"0X/5r$VRhk'ͺT+[o<|szDmY{& g_[זgIV(nG&Ke>LDZ/}KFCe(޺Jo3V-vBa2 r0 ߄lZ8X!ڀkֽ_gS;]66LS`ii% Z;7<B_s2yeT3Y8+V!r=%.":pn\Vd`/ kD!fvf3lݎu6nG:5𕆚,af5,i+aFgy6 $L ' Yb ca$T;|fħkaG&nͮ{˜6]*J xRR^ܹgiRCӶrݮdWKԼY$[਴dpUM iy\}ZŠX]274 kH؀ɥtۺ0/n)a6V)hqM-Y0g2Uth 3zzNNքUtl lUjjF$pZwۨg|2Qaej +;cm5`E><Vv!hTwbٰ]'LfULzv݀:gҶT|QIf8r?AX Xe@-*N E<Pxy`[y%VEOm-'a*~{EdHYD<F+ ZNjq#π(6RFxEۨ"Tf;8Ok0 fxWDzm- ay{H8?5ڼ%:CX>)CXEٯ,bm޿CX h;5Xfz~Y%IIɲ*[hNڟ,@ ̱伄s{yH=abof5ŨJUQ% -.,@ .^eNw)$ 'ҹYXH i * )rJy$[\=H Vy.P)Nle `B:IXCS 75ޅ$C5KQXJSq^SY|7+,d Ċ.:EGR_0]=أIX64ޕ*8Bx~JĂ0帤,%Sr&RpXhix0+cDt4£n$L5DKa!t:d ,Xd(B廉T1^rZx=A t-j )S87d]n!:O V\6 *qJX$@, K)*DY/ab+hagA *QVyNYU،&{/ Y% %NHA~!D :M)jA7CfH K(,,3,֫ ن2a,s@)f,`F *Q5TF(Dr37Tn\J 7EugƒJ$K%D*#iyO39QuAtsyU6]AbIX):L S %^Y\*@Gh2-M0!P@AXDU5q@~(b|RӆvLb8Nf)w8DC* @,%,+DJaK&'ޟzBwxw*sEt..~.y #k/QeEIAUbW%tCU"l7? >a"9'FאJ%n2B7~!Uvɿo~dtKès&aבB))RRч0D'Uґ#H{R^<& aROfIAU"VU"ԪD/nqCwܲ7ǥX _Ka=L`Apj JEB@|:q==Faw3(@,<$iM4s IW޹F>5rgYqd@ e%*%fJ^b=mݱC^qd,@,$̫&raDLH90o"c?k#7%v1qȍv_O96k4DRO@.P&D<K9ԛrgׇoѫя`Ns^$F *GCppݴmoq0̅F`Gmm߳c%FTNs^W  ze61Cg31D!_%_qh{oپgmqQz΁Ȕ*@װJԛP_#}O?rJ$\ 8+]!9% aPX3 ._0ڝwJt[ߋ*"=Dt+TbPíT؉e2p!p."CRS XzM (bTrq|c0&^ eG *SR!X"C/W Qho7wL #  #A<\*H}DT"7D%AaA6I\d,ʋ|ьȌ2$gi08Y"}D7ZWJ*殐+M}DI rXۭ/Hc#y&Ro()vĐ+5 9/3LPX(U`|DXHBjWާ_L, \N,%Ոzs*8Tc300p x0^qMeC[ d |  -PqUUGUᄠD @ suy®a7 |vUkjt|mmdRGw=nc%-P q^ꍗy."p^׼ 0%Pd;xU%e)jFPU^TUN fUE4tH-a9Q,-@jCVD^7  |4C>_$[༰4@j S|PCύǵe2zFS5X^|(&T]i^|i:ޤg& e0a5E+j21DN4*6i&6/&%gF )Gf3.;u6nG: u#alͺۑa6CfHX0!`v$CYw;!fج f3lݎu6nG: u#alͺk)a)p"p/.V<6;YuwzP q{ғڮss|M~zP븩cda ah. +PU_M b9/vJ3CSٰ:eX6fBj3"JKX³a}⩿Cyr:NGkZf4xئw dVa4PLTE:[[QF㧔PtNbT+ٛK,eopNɾjCŒڅm=ԕjʖߡΈĚ탋,wv>Ё[k gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDbϞ"@tRNS{DbKGDH cmPPJCmp0712Hs$IDATHKIH'GG䉊U~1Q{Q:nr3FUpZ$$h>p@J$ǖ`_S%IJ{M`_Q)jeY+_E= &ڙleYcթuI+56 lfR!Y5Ф jԜ \Q"Ԇ{X&Xܜ$Mkh2bu*=@ؖM&#| {tP])p^f#_A[OssgR\qb;^M3' $ku>Wquu U</J\!S#㹁dY== !.ԩ~TxICϖWFRMW &ZTޛ֫!{-Y5{qGs-1]Su*uџVC+eSF^9^)/%=i&ؘ:K")-4MAnTJe&ZA|ö~X'j[DIUkxzV*JUd2O6P#XsbU=_wV /ʞ2!}CjېmM(IPS(Unۇ XU[G @jt?ȃT?-Ї?폐> aǯ'^+Y08z&.`TwU)kH)gIENDB`T$$If!vh5X5#vX#v:V l5X5Dd~  ZA?revPicture 5revbCn-`@1InCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh5X5#vX#v:V l5X5Dd~  ZA?revPicture 6revbCn-`@3QnCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh5X5#vX#v:V l5X5Dd  bA ? alertPicture 7alertb6 '+WUU55Yn6 '+WUU5PNG  IHDRU-ZPLTEp6ЌH_Rz ٘Ƨ]zyӻƝ}ڰҩ7XͲ 5‡H笠 }p ȿ8dƜ:﷢L.Z(?x+c8&wx+cE |N |$DpA|X|d|:0Q|m|;;8HFA|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@H;D|p|g|\WC;w$ @n@ðڀ;;|[ZFbfE8 4|||| |wDDb]bzHbDbsDbp`@tRNS{DbKGDH cmPPJCmp0712HsIDATXG o@`A%Z[E!Cfv^v47M4O^ggD)?YM2eMVM{!5nh'*T(3e6m/ҼR+SxFTPʃ M^0wkQЪS K>5ipY2E'ږpBT@E]y2XDexbyQ^0B8/qّ5)XSq6v&>bn` U|L!&PIQVqG7"o ]ʓh{ֻ6\w04,ZeMWĭqP5cAc hF5݉Oo痩+531(Hv#J=V@2bbpkHE&iKPR],؏-6[&p/ EdEtcթuI+56 lfR!Y5Ф jԜ \Q"Ԇ{X&Xܜ$Mkh2bu*=@ؖM&#| {tP])p^f#_A[OssgR\qb;^M3' $ku>Wquu U</J\!S#㹁dY== !.ԩ~TxICϖWFRMW &ZTޛ֫!{-Y5{qGs-1]Su*uџVC+eSF^9^)/%=i&ؘ:K")-4MAnTJe&ZA|ö~X'j[DIUkxzV*JUd2O6P#XsbU=_wV /ʞ2!}CjېmM(IPS(Unۇ XU[G @jt?ȃT?-Ї?폐> aǯ'^+Y08z&.`TwU)kH)gIENDB`T$$If!vh55#v#v:V l55Dd~   ZA?revPicture 9revbCn-`@inCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd   dA ? alertPicture 10alertb6 '+WUU5qn6 '+WUU5PNG  IHDRU-ZPLTEp6ЌH_Rz ٘Ƨ]zyӻƝ}ڰҩ7XͲ 5‡H笠 }p ȿ8dƜ:﷢L.Z(?x+c8&wx+cE |N |$DpA|X|d|:0Q|m|;;8HFA|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@H;D|p|g|\WC;w$ @n@ðڀ;;|[ZFbfE8 4|||| |wDDb]bzHbDbsDbp`@tRNS{DbKGDH cmPPJCmp0712HsIDATXG o@`A%Z[E!Cfv^v47M4O^ggD)?YM2eMVM{!5nh'*T(3e6m/ҼR+SxFTPʃ M^0wkQЪS K>5ipY2E'ږpBT@E]y2XDexbyQ^0B8/qّ5)XSq6v&>bn` U|L!&PIQVqG7"o ]ʓh{ֻ6\w04,ZeMWĭqP5cAc hF5݉Oo痩+531(Hv#J=V@2bbpkHE&iKPR],؏-6[&p/ EdEt>>-6@2=H9=@;=@>Sh@"@#H&X+H>8`. h/ 3x5HC?@@@BBBDDDFFFBEHHHHJJJLLLNNNIMPJMPXPJPPPRRRTTTWWWRUXXXX^^^@P`Z]`[^`H`xMbxLf`YThb^```cccfffcfhhhhkkklllnnnlnpppprrrtttvvvsvxxspzwxxx{{{|||TnWt\z_adinswLJ9<@CFIPVY\`cf׆ߋ珿ptRNSN bKGDH cmPPJCmp0712Hs*[IDATx^흍;I]LJ ܝ,c,>,z#=QT|GXDbKÕK_cMvfgvv6w?n # NV ` Q`/N 9ua[Ξ{6O!r<`R 52뼖Ʋ"<5J`?gi圌e{=f)hHMfDM7)0{]O\?53z-<-?_}n}Ӛ%|>G!&>mY~(8؎&nG2;1Xtw0?? `V,zW?w}K3kzm Xߎ3?Ȑ{@ O' ;xV'Yu8d[׻?nL? `b(ӏ<./ط3X`fM^GZ=x!`N:ǽ'5bg"|,L΂?GE"~"V;Y>EF(ma7X?6|^OG wt#;s`=XptN|7"w$Wܻ`;hdX->鼀]ς?'Ǔ{ne 5v,2,iU-Ƴp7WdvXC]x=:I`Qj 6y>+qXp/A vt<C$+XCzxԃXMDZ_43XC@.;`)`Na>>yyOxS~`ڡw2bp2)ՉA,LN| bd `u+eK'S-_,X:Xh1 `DW NV'Z Xt2:b2)ՉA,Lm;DW^|%/s1ٿgZ8X>KUNQ\üe)Z:~ _Y2W|>Kմ]`Nfg+L(C2&PW~Qi<aKS]UQ9l9ݔO`GTA[N7SXsMTVyDtS>UQ9l9ݔO`GTA[N7SXsMTVyDtS>UQ9l9TM5󢣻Ϧz]{yr,R9"'LjlXz_g^/bqyl~ |Z[6.Yj3ع5-Xj=XkJ7xg5Vެ((%*D;V`"+JIbXŀrRR|b@D`E)X>V1 1m;KQW`g͞{o(zj8r3^+ Aey Hv{HqdM;('sQiB27lX43j@sʋ-@_m^yznKn(Ym׉Ě2@2N URl J)H)AĖS:%-]y bKKW>!D,Dl[Z !b!bKҕOXםy),9"dˌ?A^]喐=.Ј:DfGu%Xv.) DB9×F#( `Q`=#t!G4CG7~zG؏"K\G?,7 {}CAK^w:X̨r[;D/g?:H# BR-hذE]|= b6|9#btE?ڈ Q‘jly>S{_!T <)uFR-~BS,e^`x=hevҨ$ئMFK{NQIMy2;`iTlSl;\cbɎl5xl[6Xi Ns@SL`XXhkIxƓ:m.HuVdBd&mM=ݩ\A"x 0x$<#L;ުx{NFnfJwe>#-{Wi?iw+6 ֿxq:$} OFF+/ʏ` c,jAJy`Kɦ~">RRϨl'3*`/JA"NPk5U{^t)~MW^`Ϸ d *g[`ۄ{V [f[V7Y Dl`;)lŰ9VYOg'Mi(S;n T# vǰ- Vx#B3iSRCh{xM@z &&]V6v'&, kX&&:kX+&&,kĄ`혘%ցeb6LLX֞ Z41aX&&l;[18Kj̓]ElۊEeDkɎ "ֺ K"־ ;^0:<\Fwl!bsb|NL։ Z;1a8X{'&kĄ`m0{b`vOL c>1a*X'& {w8񌉢yab"m1~,TbP7(bg-~iaD9۵E,LL#7%babb!  fޔK^#"&&T&`ab"odX0,LLYh01?;Xe&& D˗gjV BbK;,.6I&&dR`}&&dR-rvPW_ [9hKT1!CH2Xli%b>:_+)CH2Xl-$BĮVK[N8jlVdRmڰ?C+4 Ja_bPV#+dД~] t`! ,[ 礙 +99!\;1}ҪCAQ^Aq[ٳ2}K`qsioop\#t9  [O6m>#% ,[h1rbz>0}F#:[O^I`gm2$_8HoFɛI,XlI`f6y;O0,h3TlU4ؓLPC։0`3X26$o-\c0]L0 ?"oNn3]g{Љt:?AQ',"ۊ5#[BbkB,eV$ [3Tt2d)Ŷ"IV,eؚA!$K,IbF$#كI%++$abkb[(3fLss{m=؅,&Yʕ,l=¾yq?Tz(ZAg`rL7FkAu< , eYpAk;fIAO`b+_9^pͅŅ t,`h7X,Bɬ:1zZ䢦MMɲz![g½Na|:G#{/T;怢5܉lCטۘ(ޅ6D!-kڿUersJkp >^]xy'g}ugًZ`gq7j|#r5M&<;+{,gb[&~xҸaml}U) +c=X`T&Nߣ FzNIP[g+b)Ŷ 4,>&{Fq|:> ۰zNIP'x%`i=m;`1slU麃̤ RY`evϒ/h7 p}ث{`*cl+0fhwxǽ/_'wƦwci`[ '*N~Aꇕ`w7[{XxE 鴺v߈5Zv6pI'( \lVq\t]uV/.s/ I_ѐE`{[K~N7h{I35Jt,7'Й?`E:bjRsŔBf`u#F/J731J,PX݈Q;Q[xbs'7ܵpH=Ydnu:Hby-,х+2 gMyHkl]%t4G8j`sOӵ-4ϣN2"z,䪲Y){y-=33tN1A`Ϯ xͯ+65uaIy}転^cdL'ڞD tv}:fs+MW:ZdfU+KXŚ!> Nu%U{pwݍKMqQ+Y)Fd_ ~skX=V A/U",k\7>7dZo-]G'p[mA5ͭȫG[]cjr,]3O>!-qvZ{N\oU#ZKW;K8/p|ՂrS̄XQaiWEKA.E pP6 rE:TP& rE:TP& rE:TP& rE:TP& rE:TP& rE:TP& rE:TP& rE:TP& rEV_ntˢ)A5hN'f|ZڔKZK9vVlU.9 WdָZ)jgeb 1Ll1ٮ5|A}֟oWo=oeրnWDA4Das{ b8v;Ţ nvC٠t+h8\$ [!wyu螋aPI.ց*^6Z{N+"*S]w6Zؔ^]#^?(@(m8{W-T.T0[#6Qc]i"8]}/=΃7ܶж璵l {Nz s益)pZ0,z  q pZ0,z  q pZ0,z  q pZ0,z  q pZ0,z  q pZ0,z  q pZ)}/"2G~S}7RT$k7 M_\񱇿Ly2Y5SWU,Uf~#ßW5"dzX|u9Mo.p~5z|l /2Vη{'C5"?Wo~r7?o`*vs $x{4X?XMW:|;&/Ĝ`'1?%'_t`' ُ7kp6^NI#W2]a3Ͽ&Jbm ?ZzWG{^XobVz:aR?=3w>'[,;&Mzo!2N~M2-cʜ%bX@c+&O,\X}X1y `ÊS$>VVLX&1b2ɥ1ՇI.}"rs R(`r][^[:.-Z+U:\F-D,TWAr[RX^˕Zni"@J`yN/WjQ+U:\F-D,TWAr[RX^˕Zni"@J`yN/WjQ`b6E=U>rKr¨k=+,ũn` ʁěOZs]V[ܩVq책Ж up͹Fv>–k^yy 9bZ;k &޹ş9/f;kt#;ij∼<6܍@C/u` NքJF='JO mR^v<`c0 UvjZn ;|Ц.u`pgc{xͭ=`fkzAl 2^yqs6n:ip  gOP`q.=iٟῺN mb'HY%^+6 +,N~aacԛ 5X1^+#laaJ ֢uMqXJ<טf` %1C*&-gb 6$Rȥ0@IRӗGR#"BG l^\`kcd,noL01Džf {pOX`I NרuNx&@cq8'fLl^b Ha*=ݪ0l!)F`xEAa.rNس ` K9q\XZjrݝTo~BF]+|sDp8g2v|[58v63qFld\}!`<1: [Xh[(F\6 0ת Jy:~J 6/,F-l$pUMU iK z26a0ҴiPf˯ٵ3|Fp"{wmv!uޑ%|XpkdThϘyZuFς[.ɶ+τpυ1MEN \x@[9."X i `#ɮXi@AJԙr Q@p'*-)J`K z2:?@$x4T;IENDB`Dd   \A?revPicture 12rev bCn-`@cnCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd   \A?revPicture 13rev bCn-`@gnCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd  \A?revPicture 14rev bCn-`@knCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd  dA ? alertPicture 15alert b6 '+WUU5on6 '+WUU5PNG  IHDRU-ZPLTEp6ЌH_Rz ٘Ƨ]zyӻƝ}ڰҩ7XͲ 5‡H笠 }p ȿ8dƜ:﷢L.Z(?x+c8&wx+cE |N |$DpA|X|d|:0Q|m|;;8HFA|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@H;D|p|g|\WC;w$ @n@ðڀ;;|[ZFbfE8 4|||| |wDDb]bzHbDbsDbp`@tRNS{DbKGDH cmPPJCmp0712HsIDATXG o@`A%Z[E!Cfv^v47M4O^ggD)?YM2eMVM{!5nh'*T(3e6m/ҼR+SxFTPʃ M^0wkQЪS K>5ipY2E'ږpBT@E]y2XDexbyQ^0B8/qّ5)XSq6v&>bn` U|L!&PIQVqG7"o ]ʓh{ֻ6\w04,ZeMWĭqP5cAc hF5݉Oo痩+531(Hv#J=V@2bbpkHE&iKPR],؏-6[&p/ EdEt˴@A¿6$9V[FV˴ IbqAg{S _ڶ0`L2ܛ-p~2$0u RK{^3PQ nMfP$g'/3PuH7JnK#_֞d#fđo{*j~ҙ.vzhuTB7`i _Z_Z~%y*Χn+5|7b؅Gիw@atho9,y~w/~nDpOBI/YfX2l-L9| 1ת'5pnҴƤH!ݵLL"gcL\ŭqWQo_߼hq"[ãkw9޺v*m4I(SW(r˯ FݾYkJ$Z,g~]!*ZVh[ZXu|s[+r;LZv,X|5'dӵko-:o%4ݵ6eיTj2x":'K>yv@ϷXiޞ lH k~dM]\@{|-WYXǭz;鰰{}9~x*1Qke:WvO%j5dW`}VS[k<-`}ųk-Xk=ZYnW`vK+t_%Q 㹵qE 8E3$mXóo*J۬1c}sjqQykK%X|LRss-CLc}-ų"bҎ!@͊YJ׸Ќb߀ɞm-*ǐ,~.3M9CKf"B~m o< Em)E9˰/jN8FSf|Ad詏FKg- sڨ"3Ae덕`ƀ9󂍭v cp] =LMzq&1scˍu6"H6kΧ\~x~4fL6/ƌ5ڝ8 uɂ[ryz}5gdbmX\\?fr7[8 ͊5.rn>yۄĚX멿Sø,E(? a )*'u kJKVB #U!i0e˷R~͖M ()g#%i xxYQX/+OK*xhۡXwu4?*KZ|q ֈN]245Qe~..&=ۇd)\v;ɮR~w\.֯`'S9B#-Nj{^2 lSfCbM?4u)E-zz4ս,'Rx[RtgldqXȻk~̰Ps5<;y٘2.p2g=uTѦ(Dg/X;@הK)}wޗ޵k[!=8۾ nX(z&__7MSzv`cMm#)t Fl-X}=(/8 "Z23GׅY@b Q72*#41<sUQ/ RYRi?_ě %(=엖yK;`BZ{gi"V>jyK [WzjkJ=tM>m`GR-ۊ/[  E+_P-A f[ ?ucnxf&܈812r6C45Y=Ͷ'郆8 Oݙ>ƺ#u߹f,ߒ*k71Lb{>{x*#pFbpw`}$}ߪԽ^|^;[WQ"_2ؖs5 uoM<'Oa,?p0w~=։.{pbHQOoq[ n?nCuvz#f>RO)۷ؿ|q ~5&2ĝ-\8tq@{|qR EzM߿8:wO+#kb>V"<|TaF̺ ^ë/gډQh7/.7 +Ȼadu!(hF:NQ5}!MW=$3wzV/#zRKhIgbiuDOEy\aғEhK܍.eFG̿l4a`;T=~?ϣENxc]b]+U^X_Xa;CfȜFS47fUр`h/c笠Ӹ{")Q* ~4\σl9A;Z+@J=,k߳~Rx&pH,*^7_1A8 r,߷aǬ:_']Hb!iN!`%"v.-bpeb&,FVbp#w}U&Պ\d 3K.)rVC !&1mxugxo}mO%wXHR[OXKT[$/?,f=IU PgSz+'?Q]eH0p&Jp1Уk6b{p`#Ё g#Y6pk&|$ VyƎ9\G06`$ܒべ")[rF7w[Ir.:lΦ%ݲvlVXF+vlVܜ^p+L6/`YL If&: ] z].0}#7kl\ nRIn67fp&u$Y1c0Y$:gz3ۣU07It#GGטa&!]fHfc&5DrusS"lB)SKRŨk$gfN!d*ek3- |3NN=LfF|-n˞,j&Hjᗉ[ `brURKb~Uok ~E\l`:6@'SfbG/4%H&1sve1mH"{ʑKyWK渁6a( 7DZgn…#(U=< \գ sxŚCA)]OZ &8W_l.чf#:׋&ygGh•N.#jW IJb WMV>^/(2hZPG<X$?Ws ӝsH#;]g["Ga}u7lI0sm ։&2|xP`Fl]]-}d ~;|Cu^}֯s>'^fJ~h qنmZOn&-dCPwVN%Ggi]X'=d<%:OW#*ed:TWhDN}$/LBs߅yށs]P ~lݷxd_gWA7cu;&ӏt}zw W-G9Cy9]F&x#pXh4ɷtqFsy4#Q"vq$'=ȨjhZ$S 2L_Y4y᱀=!Ӳ)8-Ş+NcZ>ڲ$KPtu'UpMNgc_Ol`2lZM!W}Y" +; /VΗp3M|!LvmUkّrs*RKۙ̚ԴTy Ք\4S ,&/5RAW WIfGU5ȕF ͱGĝ<8 a4chD8KȀ 5Ar}.ZvCN{gx' ='R:`i3BATϭ {oSB`LL{ _YN/n=uRi^~J{k ta}`I#3D.j $dsHRd=I5M5 D,ɾMgX=zpRq@2iP3qШŅEOK{/ד[7Ƞ=6Dq;ϙ&7tqRcF) 0cp!0{@[f >Dܵ2/|lKowZFF"A(,֙~Ƅ"Z||W0!N;rd SxesāzOB*;:(U{BR=Wig rG!#25 Y[He+WF]eE=;oR0[D[:'RVF"}ԕߘ\akK]W}V]yn 9,|OvKXP{j0303ifdS'q\q@b c"3>g)Z4_CMV1I v3!tgWgD!0F?p)ʛʅj23Pb|S`!dڊ 8trMg0-eA``ĥwL8$drCa%GCK-7[krk4iA*2{,O,>46x{ JDxSMVUysN~3 _iۻj$kMnjrcb#ir,XGz5An%֑ w@kMX'dz;5j+3FA>"4AHA>"4AH@#Lc;W蓛oJjdžjUn\i,AW WaKdU6U=2:x:K츮DbT??D8a35 jEԅQgQƹ'!(:/LUC8Vga?ۑ's+yAOd"L  3*IENDB`$$If!vh5595#v#v9#v:V l t05595a$$If!vh5595#v#v9#v:V l t05595a$$If!vh5595#v#v9#v:V l t05595a$$If!vh5595#v#v9#v:V l t05595a$$If!vh55555(#v#v#v#v#v(:V l t055555(a$$If!vh55555(#v#v#v#v#v(:V l t055555(a$$If!vh55555(#v#v#v#v#v(:V l t055555(aDd  \A?revPicture 18revbCn-`@nCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`X$$If!vh55#v#v:V l55Dd  \A?revPicture 19revbCn-`@ nCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`X$$If!vh55#v#v:V l55Dd  dA ? alertPicture 20alertb6 '+WUU5n6 '+WUU5PNG  IHDRU-ZPLTEp6ЌH_Rz ٘Ƨ]zyӻƝ}ڰҩ7XͲ 5‡H笠 }p ȿ8dƜ:﷢L.Z(?x+c8&wx+cE |N |$DpA|X|d|:0Q|m|;;8HFA|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@H;D|p|g|\WC;w$ @n@ðڀ;;|[ZFbfE8 4|||| |wDDb]bzHbDbsDbp`@tRNS{DbKGDH cmPPJCmp0712HsIDATXG o@`A%Z[E!Cfv^v47M4O^ggD)?YM2eMVM{!5nh'*T(3e6m/ҼR+SxFTPʃ M^0wkQЪS K>5ipY2E'ږpBT@E]y2XDexbyQ^0B8/qّ5)XSq6v&>bn` U|L!&PIQVqG7"o ]ʓh{ֻ6\w04,ZeMWĭqP5cAc hF5݉Oo痩+531(Hv#J=V@2bbpkHE&iKPR],؏-6[&p/ EdEtJ<O&/in.J\7;$ /v Y%fk'~bY $P{)3O2lNsQ#^WAN7+|=M/n)95n)[q?ߔwhlcRv{~jq%% n 8QZJDW#ڕs?-`f سDlR;P%dIWdج[#;*Y(Y%"W5dQPf,^լE@իU(zUJEUjVɢU*YTY%"W5dQPf,5{zrzOkJHׄeoWϿ}5dAdAd?}vp(Yd/;T'k+Y% Q`+[ﴃ@"%н%kȾu% Uk5FY% j ֹ T7fdzUZ Lҥe&%Ⱦt%,ՇDnÃ#5$@ɂ#\QW$ke=QJ$lw@*Yda{C4H6uWفM=Tų4&Y%;}JGhz6wind'%ٻ-^}Jr7xϣ4dH.dɨ >-kQnFk 8%EۉJ*ق^7%d1^빋 _8fiE!@ "%jݧ4Qp;ptXj,CY VH3l.*0Nw߫ S{llYhі4k8X*;QrA/ !USنf90MeVll |buyu3 Gߝ| F **`kv"-Jb%̠!US[u;O$ $&ۃ~(٥͎fmdo{֕_YA픫zdP8Mݵ(qxo] y @Y8(Y8\`jb^|TY/̥vHyΟ&AOʼnBv HGX!YA>ws'k;k-ɶ|Х`n> Y0f$acJQ9YGM.ml pN %v{lG'v(YdalG=788+l&ۓlWvyO \__ Gޯ`8E/N^[]d~GoLN.|2 sqRXn-Wnsd/G '2+vxբ+K6`e;• $czeVEg0[:f1&Mllq!ȕ}2&s+.edXA`4P-@dKXQ`>Ukɦ CHmu7|:^ٲ\A Zdl+ s]etN vg?[$ Bvu=["[YT d;rE.^d۪];Ik,+]^t$6Cp+IU=Oܟ %a Q!>۟ =ƠWT-g+g#dr˓uڟұ(v|9hpidG ls;HH@ ;U ,7N/7vR,hf#dG*xqb˥-O}r=-FvBByO)j"Ib ۱BܟΘjurqF,7';-WQ=5shp+X[͢MKXe-賄 MO,E`zs&;fPWsmK/y_#)z'XwX27d- Y輬%?e/dN,>²lڝWpi~^dn Mv>2d!;v#X!c:ٝ`hߖ8Eֱud'E/7XXOvnrn0v$;v;XQ #,YjFdGV,)EdhO+N6=N6lY"]'i^+=])،,tPŭp'Fdihھ< !}iOZpa7*C7x ZmkYZٰ8"Y*m6!R/_Vrp'$[֬_~9LYJ*fN=a|oǶ clWmd+>K*{k-ʵ2K"uuŶ4ۋsmlWъ5?'6v f7myA :~KNhdJ ll[=ͶU+V7lOMlO}-C؊Vf`lu` dN-+fviKZ6jv, I47h^J4], ,QU?zK4]"KK%[C+'{ZA] ۧY-Y"J2^Yc I,hd'%ӛ&r©ÑvH0*pNyA H-.#Bc, G}U>W% pskg K%}ٖK)>PzDH{˶8"Ylj,Cuc8!pΫ6h҂Vnf,6ۧ+,%; Yc N`$6_I)ؔh6 ֲ9bܑ&ib~.ls,"6KYH$a%˒QlEk\[+Y:"[;HwK344Xlr˂Vjd%L$*.66{6r7eCG *Bl!fD%KFw CiDfcAFCS [daMi6)3a a0L*Pd+`\K+6`bQdxHqApRx۟OV6j6,ʬMV27gH M,XIZKh۝.edc!8`ǐqdwqMV2ӣaݯiÃ]"F`w 6S#5PoVKW.܀h̑/XҢ`Ozd-DjJv %,A-?,@uU 8?gٞC8Yj% y+=x _EU(zUJEUjv;ksǾR[6U](=~,sAbîo}oTȚN[Q;wsMJB/@YA#`b5 Ւ5PC:{ u[P$qX$Eoq~g~AEd칹1ϣ4k;Ji͚n%+qdmR3Ɇ\wC͋$lg1Z;:qglaFkұ([iwR >:vVu*u#Vض( GxݰE =K{}+BgY1h{hΉdz+Wcӊ G7AGpaϟ.6:޽Yy/sU,Ӿ+YXϪfL8^w,w\ַ VD8JEY*YTY,7 IENDB`$$If!vh5-5 5I555#v-#v #vI#v#v#v:V l05-5 5I555a$$If!vh5-5 5I555#v-#v #vI#v#v#v:V l05-5 5I555a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / / / a?$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / / / / / / a?$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / / / / / / a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / a$$If!vh555n55V55S5#v#v#vn#v#vV#v#vS#v:V lT"555n55V55S5/ / aDd  pA ?image007Picture 22image007b÷)[CȐn$u,8nm÷)[CȐn$PNG  IHDRD\aPLTE (((000888@@@HHHMMMPPPXXX```hhhpppxxx|||hv)tRNSR bKGDH cmPPJCmp0712HsIDATx^ [SV@)P9/el[#Y]\둲mk[Y]\'/eȎuB`S9A\'6 ejȚuZ`R)I\68eȚuN`cREOvB\6.e\dwjϕ[>Y&ὺp1}y1؃5rcl%\.Z7GɧS1pSrIvp|0ɵi)["$;?O r$D N\_f S kKZpq.v5BD"]]8ek\,dmI`3l}M\: lLpfM٪p& ^9e+EɺOjwA.+ER] lAp!([.e ny ES&*A[:eQ nQ=W굳5n:RVV'df\G~F}/CTwk(8SWW**Ld+e* WElEL%^᪨0K]`UU8sd=;w9+t!  _qup.}볧Yie9 0{YW7 (;"Cӎ-#svѭ~ ,q٨fY138*4QA %YN4,!+1x| Dߒ3~PA֊,hu܆W)EVtɫK,!'PVOv!NEa@V)DVZP?œ6LV΍H^D~}I&RXa` Kh:U -8a"dS>w*]>v?X\ʂ>d@AIp ){̴*@KW!/Y> 9U_Êٸîٝ Y3\wBXoKz<njDfQDei2cV7EnV.'Vs ]ȿbtE5B%d54|P4t@FŔD6I["@vN`Ѥ-&kX$iKd}GY?n!mٯ-bǪ\YG<]~ر׶DM&iKd~85+D M\%.d.,eʦ-#ml.umKd&؅ҖΒM#-!L`H[";I6O[";A6O["k&A` -5#eӖȎؒiKduY`Yln-Dv[*m,t!-DVƹI["+\T` -eA~xi~Ybn(K="LYD6:H HDEdC"LYD6:H HDEdC"LYD6:H HDEdCȲ`<,Yg1n^J{5}(u_kR=ݲa^ͻw$;$g6I9',3pA,>:VUFP²jA"lR;\S>uwq`A P'ɀҁ k,PYncu6*<?)nxȭ-,y5ph0Zj,cyTaŪV*&V3 kɖtI{]+YB2u@LG1%kh"+d`pz9$J*cu:Ch8F:We8ʨ;ڃډ\˨E,LruzBX9{]Y ,0 ">8Z$88Ȧ), cE"Cz+lh ">8Z$88Ȧ), cE"Cz+lhފu}}L`7[7)tڡ֡\n{"bKgڕCW;"㝞vwנ s /aKX]ٯ#(0u>+@-i#vMd_/sؒ6RhCvwr<&AB֚ؒ6NhWAvV^*mЮE^.ㄶyvyE'6X}c'yś|Em9g]m^X%.hrv/yŚQBd+ڤ+֤+֤Ȇ+ҤږF+֤v+ҤV+Ҥ6&WI! zp{i6\h'y|ɇ'Τ ɾ]nb6D%mVM4h<.z^_ v!J`l'47$mI6 fW`lNyEB[1iC*Y^_ӆ mUdo\>xe X0WZȶ V#Ъ_D,E<3O1aȫpUAuc&l2A=pت::J>Yd Mƍlq[~lٞЅh똥b_Es1tѢT&#އOef_lJy^Nd>eEȪn'6<"7U6EFqVۘ[h1oӪoTI5n ъ23.EVQJ-]>YZ }ȢͻCq=9#hzMq5,-+B`)?Y醏vWx؁%3.EɎ"Jo6%DvMd0Yq|.*Q{fJg~EU_@V^ȶ:,m5UAξ?Œ(輪H*"ޡ1xOۻoQ`j\ۖ˩Xـ)4mdm\;Hn#µsv-ʜuJr;#zp%h6Jr;Yp%5EE6+ɭ-"\In hѐJr;bl/gh8ق\;_OWdravl)E.kr[2\W+.ur[\W)E.ur[, dp]f&6+Yt\$~Lwr7?6Dޣhy/څHva=muY"jZrȶV%FU(glh/Y"jZrȶV%FU,9a 8̰Zܙ;S:(>Q6z>NY;cP:,zW7  GǓVkcDҚա:u0w|6aݹlR) b4. uN~'v0> OȲ٩쟪8Y1? D+rl@y# 1KhQb0m@â=6 `HdUJk(tc0mR|-DD"9f4( !8LMA "GRZjHjt',\2dHS&MYz[n5[N кTs,v0bۈlfM'DJ@̾1w!pש^un̝(&LZKj§ D] f݉'+h|*VcRp ꟸ{ a)ZMmÝ ɊUq}~ DAΪY~>/aR}ɲMWdw'phh+uOiDΊGBR,u'0|+6&:#%e`'e; ^B[s="*}"Kd[@~QV#Ъ_?ĨNJIENDB`Dd-  pA ?image008Picture 23image008biSү{r֡~GOn|iSү{r֡~GPNG  IHDROjPLTE (((000888@@@FFFHHHMMMPPPXXX[[[```hhhpppxxx|||V0tRNSbxbKGDH cmPPJCmp0712HsIDATx^ [{VǏWP\]q]Pw6m̤ t]&!;3>IKvWR@\ąi4{eN'M3Wrk:9@%mi^$%q1==O\ h__쐈 1cǜo7/6 8V Cvov%rP 6z q([^l"q*m:7UkJQWSREQopsyPûx+S%_@ʲUaPD/HyoŰǵ3Qs1m ^gYr.l;+/Ί!qH3ŇTwׇT~*L$qi|3ȏU^/N9U> ~G1OVE~/sfs .~2#-|ϲyEDb>.6?,.u%+R!g, ܣa`c84ebą`TR%b_rmUn"H׉ [^k:I\\# B Brw Jق CBQ/Bsa(.Tڸq.440#../V0=BP_5O6rH, @ gS/pJTXU(so #.p.xoA\mDQX/!? ___CP/(/ 3-,lC\\t:29o$PI"!Re@"YR\Y&RUW6]X]\7 uBGNk6 xpUJKE_QРhYY2B=/ָҧ?s9$t:1QfEDg4,WFu},+#i4kQ ;-.^UZSw`*1<VI%D ral>_2ܬcq"껸Hi)P)0~Lʗ TE} m_bv Eo '42Ĝ'D}'!(+xcR # _k.YD} rلy8B\"Uoc_cbL;t }1<*E/vQߕ_<ߵʠ~n xFQɥY'.=riKo\->qKO\zpv9yS640{~0-Ct7~i/rLĥ Dԇr1k/BGsql\dR"']\\C-Ljz6.|175sgSu"VJ3N}laJpѼ5cĥQ/,ٟ6}XKUebŨ۹=bf0X#<#ī旧03yNoaJ%/bEp ?#E}O.X[cʣi޻l.xQԹh[` e {FD3⢤U~zGH/~K} <| qyӒWeU}Yrqh pn"H5o4%! o^\|EvQb~6?ΓQĥ(ĢWHdr?J)|/Lt\*jO\*V#@|XIx+_{/D}?.ƦgЫhz6]QF;d&bťIe(yǥ9lG~ɹA(c~;~=B^Y(,RwPjyh|w,1 l_![ܩp>oWE8_\}Վa~0.tc+ 7Oh/c Vf[@.aD`'%O\ /s}Ypp> x%O\q *껸WJ𝣝hی SOAHP~o:M.EvdK'QA\ӔkjR6+-w8A.E}(I7m54dG^WI3zk_M& 3:GՓC$lׅ//Wk''%⢂61lql'єNĪdjjᯞ*K x}|D}uilXIᣪ%Rd98MwqM>.E}K52KlF ۊ{WE;ql> rrz)*\%1\*Eƕ%\5K 5Tvt.QdQ%/b~K|Qq/Qa}),RN H_!;E\/ M_(sNE >hVb /"; )sl5 r$Qʅ]"){k{s,p.x(+Mwq ɵ_MEKs9ϣ..c.#<AjA=08UL_vϟp'ђE\-t7਒&\1-`><ռ}E'.u>qImg6y>O m_*>KZ"D}%l7yj)_ q R~EL۩tB\ Q?9. &15RyiO H ahpIqQT|3ʦS?1.q1v'ElNt__/T{ղC5O_vscE\ǚw/.a_N}ҞOu>qp2QcP\ۉ),0pq'AhOE4N&ZL/\WUڪ~vm/z,ߟKy@pUO !a(ߴgQcܝ=O_\O57-iɩq6P;q.#O}#_[AE@DNM}j ٩^)$Q=2/[䗽RUO?k0~;I .ev|?~'=.k_m8y1vQ?83rUp;|BR57"9\8E.>,x4.'ppC<l-{wh-ap_ WK{o~6eYv պ(a}w1Q<e_ƒ^5fF8?c m e?*Co#}kޅ/qc3L.}iE$}ie\vww\4 .Rzh\W;YO:],Bt;n'/7X ',)\f'YR]8/'f^_>).ZrYM?>6u%Y4fIڧ>yE_& Ѹi+AX\#;3m9]t0Q(w"6~ݜRKGE_>go;=synO14]b2d/ɎϥQz{3E3>Oh{E`0 JL4 |wƅ>3iᆏ{i|&H4n?uh R/s7% 磛*~͉J$*;^ՖW+`Ѩܔ_,F9GdR4 v<+^Ymv|"w̛q9uH\R B\L\KHW~0]aIENDB`&Dd b  pA ?image010Picture 24image010b%i \z9q;VO%=gn%i \z9q;VOPNG  IHDR1~DWPLTE MMMPPPhhh|||@tRNS"bKGDH cmPPJCmp0712Hs!IDATx^ܨ̀nwi4m3 `}z@ҋ`{O{V Qmm{=8bdLX}srmyڒijznlYS>1^Lz؃[>|hQ*d9c 5FzoL 1V~M3U{@2bz/'+VUŃl#v ڀ%$b.ibjY"ЃQ'cCɊUU #yQjz?|Y\%āXm-HV?_91_/cUD.b~;:;8o˷ϯ?˻kdWbUxĭo?Wb1Ӓ!WS!&g8p: >HQmw/thŪ o,b%fZ9ļ.CLM`MF&ߊ/VZ k4,b%fZ) SLnSӍ1,AcSZ7K>u_UK31fvTu>ysx[>~X<7*5}C̼SY 4Cd61U91ϕ^\_agH?|m3WJNqfiU6o| 1!n*o L1ō@.v`eny/ SxnFL^{ÑFjѦY[pa[5=F"E"mko[ԭ?K1U@+zt3xMy 1D<Ϣxĸdcښ.#{ۃnMa 4}bƎ1|@̟v‹iTDj,?_^}{qK=M 尃,!o.g~?*-eݾ%7l#;խŲQrE#pkG/wi ծQiY^on9[ a:U]zw<\>98ٟ}$&lAyFb_G\xU WlvdRbYwNfQ^_^oX|&1ǞB@K]1ƯR^E_kw2AStC4lΧ̖KAHzGLo"PCXW/vZ"o.E̛ۤOkWѭ3*Aio31s 7bv3t=/e|nrC#- #-/IK>6cjfu^4"P`bn_P?}4uc`35901ϯn{y $UBG5|EZԉ `X:عrὫf}%<^ʶN gxNMiW}M°"Uag0w21 mjx.ZVK Qh EԤVI }x8> YxeC-2`q{IĐۚRo' bbIqb;mpd"2RG!+O2'3 ] "SǗV8=E?6>trzIC]>*GD\xb٫M~~8Q) ^EBw$&!qY 3`,ەG(_ZtHNJʂW 07'ڰbV=lb1Q)1kbJ) ^ 1<&8D >I$/85oJ A#)ShLΜg&3D  JA$NNMLUĤŶ̈|'8@e<8b %dsD!'a}2%kH_FARa1 kfJa0K Fk74U#ߟL:TTi咟֊*?LFӈTb@4דŘ]1 F +JaŘ9hmyUð+\ #XŘ9ZI#X%ߒt).n!e%;pdK'1̖gs<>z\זx{'J o̒Ոm;4|Tʯwney藘ښͥyMHxUcjŘ͍zJy[b Ӥ7Jaꄁ2 83rt_r]7̓%ؙ* D+|w~qŌ5_.AljLŌ'c#k%01z hmy Td|dc1b.H5*:?<#tXX*/|ݚ@'ɳOpP8! g23+#o+DL.Cxqqs1acf؉1f81yxo3(;*1a))Td3qNg;Gq%GUxtWdT#N6 #f5^LV>vF Zt}+/𹧖qĸBgmV+:D$6Fp'+*yLH81豕Ôm0 , H:0RK^b!WUhyR!FڨK-a5'J#egK>gT#6K $C׸mcxv<3 5бyM-`!8x?Be2NxaCA*>QcNY7}q6*y t|tv- ~(eה v҄=3唓g%c8fڔly9J%_ _A`4b4d\|'҈F%^2X6*yER%1F̘f힫-bX?+]݉$t3i{X[#ñRJ09Վ ,p+S]QguK.|ߏc혠-b Nj2$yJm[2ebښ#AK}bL1<~<1vdA=ب4"~c`өc d,27$S!&ڃcq w6`2E fq2bxbio6N18>niN2ocLF1@Lx+iIJc L}L/k}9|-1ώEn1$꘬|3F/aJ'-ėpN[CcTB*(XGش_$3h|ð"1sVcc;\\BGyF}aڈ11cJ1F8FcČYJĄjȲf+31"/Đ p Jkݍрi1:1ƈb ^dg1GC/ Held3jk[U>jyi'>1ONL|ks^cF (0+bW;hd!cx80J1F RĈy|b`oT7LnC ݄JmydB֖vkdHp0OtKHiaC-S慆5dڊ@t 1 8kAx|xּ<F8'}@vs[b(O+1~yԈ%1a2bGcN2Y]/FmcX$-p:$[.,biK,bFok⏤Ä'8;/|u"#f\!p|1b,`1f̒6*1F̘1{Y1b1 1cc1c0be1ƈ1b,`ČbcČY#ƈ3f/1F3f#f^c#fF̘,1F̘1{Y1b1 1cc1c 1|gb]>T;gG1bA3Skf%%ԌT3c7-`XQjA,ȼ#r Ę1FLinS|§Uwm1~^"W[vS.'BFo㉉g+;Ҷ[ǐ5Nf&Eg<>1 S7:VH [w%,<~ 'ڿj܆sbBY#nĸPb]!bs/bB qƃC0b|mP.5_!D<,%x6Dc Eaƈ11R1 VB#.!icش1!{g!r 1b׌Ř'>dkLdبZ!1l$:-&(!c1c(1F]愿uz17 qo39GS1"1 8ec܋3 |lP_~62bnD P9(bLg12J',7K]t8hZ='z\ L|aL8ޝ\CPso]!son̷oͽ'OLx0bxv:.?=N141F̘1{,rr 51F̘1{YQ&npGwz[ y$u`ڑZ[^j\\G`|;,RzψKcČƼvyyK8>a1FX[kvPcÎESbLhd149|3NJ%b c1.?wA&1,R[1Tq#ƈC<7$h;myw%]ڈ}DɈyxbI{3 t-?{pIֆC-P߾=~jiǥ&JZ 6ΟA(hU={ĐoÍs"xyo1W"Ƙ,q;3>&x(-֜#O ƟQIȰⓍ*Ռ#]yJ&>>ݪ +8*`$ -!IMb=b#Q2!1֘- :8|&XC#xOu 14WkfH02߳yyv=RǙH0Slԁr8iN=D%1̄?'pM0bN5̈y'#Ts?Ɍ'pM0bN5̈y'#Ts?Ɍ'pM0bN5̈y'#Ts?Ɍ'pM0bN5̈y'#Ts?Ɍ'pM0bN5̈y'#Ts?Ɍ'pM0bN5̈y'ڄn8[֗Jjϙ9%{5*:Au SXh8U͛Y6&8ds]*+nᵦ攠 ѲML=mbj32̾gXk5mc)bzk#@Q>(KKϢ*aP|w%bX@PjĆ^UlUÆץ$#eT'XN-fĠ3'>*"m9u(%>Kw`Vp(W_]Zr۲MRqfi]mO؛23oET`aQ^ςb}i~?4z'8oT3U?yL5N.~/ΣgqrLO~q=Sߨf~j\F5S_GT76T;jVؘ>THW#RgKǂgHᘠS[IV!BbY"ч5dop@>R؁" 1b56 ‡z߉>p`FHD88FNbpҦcC ΅N#pFF;.AP}X x("T:B3[9C0UD/&1R^"2H]zɓ^U)mQ☨"Q⇖JbRŨ䠚8ʈF<ٮ*@ncM5eپvaۂz˺?"`K%T*ΥĚeF4n+p@ݮҤ;t6p:%P7E4"{BPTWֻm Dx[jjK:jYS4<1>,U-TڈFjpȱ"'#c=%D֜\ ]F*sm>JQ"Y$ tUBTmeC+ƈpң hTvZP(Bzs0Te'#,`!q:F̛?;Q8ā5֦hֿq:?> og?yp: լ(+)`D{dk{b(7 R:'ugI_訖%>Y_/iOP{|}oLlhoZ'7Æ)#Ã[烪+BU8 vBJ|ږ*g6]hP:#3ǟL*.D4ݙꅴrbUt.HqfGL?y]%zcawHpEL܊/v=NTh}P5S>&]-f]65USs=Fwׯ/U5R2c+M58=!Ժ|Gq^u*We4#URbdjB\@cITG8GMuf:<ؾAU8ȀƖݐmu&;8^:CCl@cMpV;M:X)t9A4T~!ܻK:X*V;6گv7X\TR Gh4(s*7 ƆBZG:fk-[P#0QON]8j J8rԆ*_ùPE4Iש8y|0THo-#}{}~'u;_o}QڟzQD*1jk4qبօK\ᗟCuD*]Q ҃=U'F>w?ER9*4ުE)pS?g iX맲wzZvB.TOQuDT'] 5:K(iTPǣZnV'u *+JU)G\wRTk=P'cY`2 )?TA-U*J(X7f} ۝]o]a??TJM0M!(wGUp I]tk*BK==w\VuR+,f* Q5RE"OJX*=Nj{ NFuRUiqe]' l?Tі],aP`N<!-pv0CSE+8*\VaRG-H*;i@6QkYbX9ipa77_R GǯxF˵]'@] oC z1 ,HN"^Th'eD;TuPk-uࢦY\t vyMRv jVkO5jxKuTiNMA%dvʭTUYWoEm;Vk̖jP# e%%Dy):9[mR2?]vy-56<ZX} C6K)YgʎjP㣊¯WU?`Pnٯ?!ۊjP#3>~R}M-Zq%HPHՌE}/FZ M Zj P:* FՔSMjT>pR)#S\)k=F&-SG/>ѱR5/8 I5ZYIK#(QŊ򟱕єǻC x"+ Ո%7%e5_q%Tq_iK_ #BPrr.L5n9t#^. *I5q@5r1%FU TE~t51f!6N 0Iʖ}_D]wo͂pf3꒽]5kliaWCF?UMV RӍR*-6J۽"TQjju;@rTن-XlR#`o B]aPeTJɶx 9j]M%kk"W",O5r/Z!iZ`j%igDēVjc{?1 mVp4z8!Oh;4CdT1*TگR*c*.™,!m}%u=>T*\+QR.Ǝc*23amIlAnY[AOO2^s3U%tA jJ YWG߃7Ќ6U/~sd]}&,P2G?Lxc- w9iQſrCޒފw~%We?/u=mSL`Z"M]A 0'Yb{[.tj7D% A,3I{Q:Mr䨾|<(_0ԓORbeQ<秹`ME RG2Wo?yw)Y)E/ߣsm>꣏s j>Ptk)ZA*W`>{ Njԓkjӹm B?|Pc:&"Dwl?'q_>9MiI*o7ҐOPT-TX_jg%{''ŧ:7jOT}ޫL)bMǎjJKUt&R\W)UTâJ_:1S{A=)~HOU(/ߦj_T5Kt] G* Ld0\]W$$eȅTBUUUbE"U=%8QɈK{G\A%T8(=]-45:AumD]Ca}Xiס/TRϊ uTW&ݺHTUBUW,,{ۇ3nmwJjKq(ś'W!稩JjKq8\\?Au3BUњJ#})(o |S%PϥJJqDJ[GWRUC5j(aV"&2u_B-U _U#CPC*kIkTAJ`a.7ӦDRePaU3jK3XF4qRTр6ka,W]-}OGDIU)u& UOL##rVfUW'oB{j8~VJn؃.SGGZjx]訶PUU&RWo?UoJN7+J] >"2" |qpv%<T**N?txLGDE=Q, V^Tg1#bڅ꠪ʩ\/%6jrP%&T9 3֫xPI?4^&򓺄nGDC*͋O@UVIVO# U=T}N6M$\e,#:|BױH$UUH)Nwl~l#"q\yNFE%Ժ*j+ 8QPzR"G[폈:qh*FQ ̦sթ@=D*r bߖC#.n + dRF*tExdk`RWy0}reT̕/Ya~5PY>bd`oVUE%R,ָReё#lm-q폰3ujdPpC9cRUXAMu1bw)kyG-zM]8ȨNP.Y5A3;l>b<3ʿЩSrW\9H*qEȫߡhTNc+A:@+`x&-p8@uTTz~u)k;D+w ASV|D=Uux׈Ov*V8 EEOOդT= sS1, ik n$Vq݅ 9 U~֗p9 ɤa[3n>¨ZUڗv,ZbTvFtG\wYP?m23h jFtи¦ ST2.RA]!QO hB8Ѵj1?!vU5$SRju +GknCvMn-"f]FV8V ӺB9c1Q=<_ڎȫRʺF ШN ab[<}U!ϋ?)Y } TlKqZuc۶|<^'4U9P TF5ؗ`L]T/w j;Qng{Z}{(E!PbO̪84JFۡf3X5 0S`mtTzQTҷS)NKaSE;j,!<}1u-ũ3R 0=TmÀT݀ca+Nr$;Z@tuP}͐LVGEM,(P8 y5V;r8 UXu4TZp4#R k4L?@)Bi똈N(a<9Mpˌǫg;"PjmL ^!N 68JqvP,CoTt*U}Hcm'K}kR~,l{.'U"3I$( /HDKR; WH2wWEAX1na5|Si׾;0 c1t&AJq><17ivzI7U<JQG6mv҆;-gT3 v}Ι75j~TACZ+FaU3b-C=`}ZzXJcuP7:`)x[Pan̽tϲ6fv|pRjzZF,'83>tӃ'׻|QULg{8jTI2zoɃnA!'q h{S%㿶98ä=B& rc̊e>h):cЄZ-Wsog: Yk4Aںƒ:Lv/B&0UWx`緞`8Z q\C R;T)NTpg >huw~GjQŹ;ͅn>%߸EpN 6SXz$_œjvp~ Wn[@mfش]CzۣB#5,U+Y;KFZ}}>HOREYFn$QEZ߬pvT9`:C+U6Ng#i%Y:{mA gEU}֯S5)7+UmpJ~)Qڼp>TAߗ⪥Zfe fj~VnL gB*ryPwy~tRNSq6bKGDH cmPPJCmp0712Hs0IDATx^ 8sa vefhj[k떭#BvȧʔRuH>ˇN^Y=pպt):m8z\P}jX\XwCG]>RoIT~Ϙ5E~tbJEljy3G/}} VIJ54wLʞ>X wGn(u uN PW؛o71b/prѾ\MVISo] ŠO}t$pm(;OEV8YBCAG9BoCV3Xi+X{Ǥ LKgiJ]."i(oj]8 ?vU+X=XT> ?{xw#r~O ܏[J]."IZf>a} 1nduu_+XKڳ Ը5ٟ7tg\Dlq8sMGN0ƈ>G+X;I{n? :uvy/-aZJ]."IZ( QF/m :ʡTQ[lGƱ"b+BX+F/uSBa!80f b*]U5;fUs.vc C o*:5L+y=/kiĬ0%qzv$ f󼉪:ݥZ/{cS8zED}?y-s.2k:  \^·&w+Jկ6%qlU'UВ7J.#V>؀Mw&ՃY bҴRl /tE^5m0|\^#Y̬q% LjӦUsvVrI>/HT4SJ$#$ \ #l&I"g' t5Y+(b&K7L;rG9KՎQF\^G@!V*m(׆HmZ:ba]LK7ȈRlg7N:J=/h^u#M3ⴰL"g3hy5K_[F1vc W?1(V"(YÝ$}Ip?s4FnaGd?\'/D"(fm/͕^R-b7iaWbr1/cA`,fiu ZV>f "E')>3;1uc^"^8wiE|٘ɉq4mi,Tr19L??ܿUc"t)ɖC bʦב`Nj>{V*X bF/k;Vˬ1,%ڎ21ALz@P1cA\mИLŌ>)y=cn) pBJ&fY;Jp\fsG/0]S]ͬ,Ya:~AF:kg}?~3ffw33n )Y1ޕ l 1|-U-݅pz*2ׄܬQ̷d%ZfTpnCPW9\7O(4RзVi#` bAͯ NOEf&-YyW$v9FK a(2jF@̬NoA8 f9. `67+bjuVoZ5,XF1aQk%B䌞lbfuΞp~ B+JqNOE0pt'im<\=f(Eœ ~ܝ2_X퉮NOEf&͊ c?VgomjcKm#fA 1{y|Giv! OQsVaS 7W7ng]βߣFٛѓ )=s+ٺIL3IAHd*td@acby^&#AWw ڧ;J j%|СEXj3Om;0Ǡ`L ,־1il?g˗<md"[6Pn_81r_J<s}җL柵Y0̅% f~?$KEeZyE:& Lֈ͘C` 1¨ N \3Xrʼn`s7-!R:ӈ)Gg ˓r(?k`5#m|O9K#/{]N@zL;JDTy 5Ag.fZ(X gLJ"bmKRLt* Fd.բqN/}<8rn,iܗ0gGrI;~$ mœ"dch,NfMSstCЪ6g+(f#d\ V'(E\mϴ k%܌lD7VH#uI8}Am Sܐ`Ę1AZWL$ J^5ڽcL5IW߼T75;}c'Q*ۇT1\LpR,Z6SEA6bw,XdY@ꅄD1\цtΓ|XBF[8f뿧>:PZD1q _&C3fm('8w;ƒ&&J_y:IG \Q(. `Ldk2XS\puE)jS(bЉ)I+kbWH $MYb &;M枍\xA+c1 Va2f&kcQ6 zI%lALNG1ALnr+0 c1p_b?N"%i28)DxO8I8IxO{beBC!1AL4/&Q pF쑄jx;y_}r($RSa +1.炣[mJl.;O<+Q9X- 1{{ZV~#4G[ 1סw,Jm]}wݪߣF0ه;u[LtRmU@DYA1׎ 7^QʇY]/=~H$ 'Lt+@:ʧρvawoaﵷ]_]SA@s#cG`R2혴2юW" 6QqNCXJBd .ONBcA,mS6&3\&>D"'b/6a% bM)$/wU`sc,AVUsa6b3H`bTnׄLA { 8-ĺw:n)(fx\bp_}C˺MnfƘG1I뺯>WyxKդIP~u ZI:t>: diK@GZo !I*h,ޅ6BK5Mׂ }EP򇹹W@1kvbqtŔ9ftTňb‰G1sJ b5u"Ċeq}YEtۃ${6fsjD4b`Qb2T>2 fs-uu"'@ao"k@ND#%-ňшj˖bDAluEu"1(l,F6XQF3t٧h*6E>&OZm'R25 L%u"ĢeQXԉh:͵+JQbu"1(d!FNl@ (JZƉO9ĭfU+Nl@ (JZ~߉ֹؑbU{0ѠI9lĜedu~h>LbĀĜeQň~lՀp!g)FĶT؀P#13/73)7J9&D_Kq-90P#'t08 [P-F\b,n3 T>N!%#[42NlA &JL[FWwQEx&v~sbQrqҦ+@źA؆D8(F\b5E\ǹ( 6 ıeЪSڊ j|XLU'z玲^ok;(qdUŽRbl`R׀#,F\!bC2?zXn S !1Ђ@` :}:JA YA:;7M,F(VlΕOZqt .#n~ǀ?I(F|nwe6wbjv1XC>ν(V{s#QbXQ|GU윮 @"F# bG>|]|sHXrbnc_ӽNATĈN u';+JaE(b';+%QĈI Չ׽bkkX,MLZ e/<9S(SA#rZ ߪ(@ߏ[Œrb@X *]IxˆE6inl1މuD`vS(->b:uQ&F<(f7JQe1(>vOm sqD쓝3E1QC\QN("F#*bVm;HjG EE.d muQE P'b(FĒ[p %JX%Z*bbIJ~ Fbq?PeA*FP[L#&QimjT~NeTsO pxpj~WCJ"V'>HYR1O1U/5j\EcXS{'B^5QP*1i#bbD Q'\<O15j/ XWI 3H;XuIm1:"J|#F.9TD,"QN,>SJ%̀eҘeu˼Э#RJ%́ػPP(# bI!z6s1ky +7Y8Хa5>N$kyKļ(q#, b(dcX(zHJcVԉwg<1e5(־D=oA%*1b21VcEyzޏgX=JSze- bptMҘsD%FX{~XHՉϟ&!;#, bpD侟ġ( ɛ}sFwFX{؎X"f!#J;#,Cc5cZ(ͩo,7T, bPt]"1ay3Ĵ( 0=GE$y3{fgDecցSw(ɺoefSmQ̛Q'DvgD"nS5= X"1y$ )QS#21VcbBmpޤ:1%J;#-Cc5 T!}bmw"QΛT'&DngDeAlɎmҘ)ubBvF[0jl5QE LH+y_OX1~!,c5P}YZ(GMD3">"Em Jcb&ԉQcZWVcbtò,"Q;U'EΈ(5X10q^s tN"SuXĈ2+1+EOF[r-o(= Q~\މ:rtR3"r|e5( ASn"uH>gy;R&HD_[qiFZ.{XcŝoӐ%!pپRwӴŰw"Qʴ'RQl|jwuԧ))T.M0ŐHhLp{T1fTal@ӽf(C[.ioF1n@^?~[ a'Whbl; bpƍ37D 4b,m0Alqaa;Bl|'& ؀4m̿1vْ$1c[#loP7*Q3I{a{C,]Iɘ93&'#lW/}Xc_Av6+ű-#5{;2nᎲr1wnX6 Ď0(a1CJ vTm0A츈uOW9mQ..0Kszc|K4=K3q =%f&ljep\L>@L#>y,bjI[ &eƄ0&@ v¸1a].Ƅ06fG Jغ18akbLc$lf01!yƄ0VfE K:x 1cB7a!Fر 㲪mVGI@ ! jXWLLjjƄ&V2-/Z)\5BQNb+4b=cŗ7y۲$74C%wlh7q3"6jbfg K;1h&]6iå6x( vp) 76bgwpKbqCC.o D AlK0bgwbF¥?C9R.p)ĶAK!.P'}s!q;כM8N \u aЖLkcL 9·X cBᶓpF a^92&mC)gE ǘ!nE1 cBٶtf a[Sֹ2&aZmSigG Ƙ)jP1cBѶx aۂW%+76zĺ-qneRXˋL!IENDB`FDdV"l  HA?Picture 27bFyN&Wa }^$ oR꼙ܹq[(N&[Dl#R^$1SI Tզ7r[(N=+T 2 P2t))C#3YdrBWɚy3~ 8,śSMy#? \=7T1wFa_6di7]@6pRi!Eb( śS9"Pyp烊(k1IKR7MU(ۼm8ћ QѢ7C]vr \ %|L P.{Ehq2y'A!+dHWvŲtiS[V7t@0{i"qbX"L67d7^6ބQE!BnJ)z]P<e˖cǎqXX g6Y,]5pݕM(eR_0h0, GiʩS+vm95{ '[E@im};v`,ZO<(gWLq[4p_n{@M,z  dˤ1t .lݺuYY.6nӗ˯Xر ;l8Yo.L1`` .fTWܬ8p#qۊPYBzs`c lff˗-ÆAX9;vZh뫋-6j|7QA,C`ѲnjϖW,5˴7Z&7T,F7QIYFҖt Jo(zRQgnݺ\vrEoS>DQ$rQSyÆ 'DaQ㢷Q`W##`MN8UEDWOdf'M7D0&k׮eΊ HC;ɉt78~8]QI>,{=^ٗs^|魂D~ΐZRyz[ <h<|g,hϴ` H$:g q(￟x%at:>ӓ'O=7;y㸥.e@ ,϶Hl&+2<6nȊ7Ϟ=#8w T^MV=!?`7<8 boHNz[tMh[W)oVǏ7AԀ޽{yÌ7a[6G^$L/;wCxw߫WַY!6:ݚ^Z~2z uyě(۷oSW'ڌQ:C 6a ev/3ckMO-jlzśEI9X+ :6mڄߞ+)#b61Ķؚ#jhv۝m,o`y:;^Ϝ9b&No~(&y8}eAkc!M[OK[KY@mUfO>8-ѱN5 8uJX:ۺZ+n1-n[Yl%4 ɯ7՚ sMl TxζnsR+FfzkZlݑAۈ/b*?9&q"j8ۺjFF6 $@x}z ujYW Eo?74@!;ٖ%4#GN<+J[m(K/@;X n~a1*G\M^X@Ή6Kp,Xl"\qq B۸RB`lS l8wnD,6h`@),o'W\ ׋DoXD6KHf5X2ڒ/Uox eӬPޛ$V-!`{5:ZًOmzA<آVZPkB@G2g[wdq'$B Ams}c͋fM|Jcf 43mi0'sW\ m sX!Ѕ@gm՚.ΖW,5̭P2g!ӛJ怳AM m:ۖ_D]qY$ K%[$ըY!0u&lVv殸 mܦɩ?4~! ζHlή.ƚWԌ@(g[}˄Bq|o>QR{[ζS0gW\@vYl+C"~A@֜ {?gmk,E̙3ݻsҒ 1'N=:=\A,z (7xc_/_޼yD۰Mr|ÇV#iG=|ȱmt'zM#Gd@nCtۿ]8i,;hɚdSzV'DoN0`駟r EpmO>xFA eI6 Yና-[q@ފPd89M݈B6@m<]qr5EoeK Xmyl5+[4h抓ĻY[ZB $r[89BNmބ@fmllG/5!P劓.[c"P nKm*P߲f@Qmi\qr5UJ D"P(%p:J(`q?AˆG ԤIuI 98Y:Yճ2T;v*#gdMAٳgC ӧPM68r۶m^2dX 7r իWĉ4(nx=TիWhWe>,`6u>{Q6.?MExb_'OF`t~ Ʈ|>QV n3ˆẕ󔛙w̻wJr,$ܨϞ=֬*v#|7as6Jmsf>0z>)^T<-: "ɕnbܫ};haٕ~X"-nn3Ç`[k] 61Lb2/]Y.mE`6 {:[|m|F"S\t[ v9\*LbI.]tڵ؇!ؾ}"MXM_xt,E;Y$ZgÆ E\Ch瑚5Œ,E8e-Eh9i~ _]/p{Ftp6dzn*eH N&;Ҧ.Odk+NζIݶ6M[AI!5\Ĺm+NζݹN$u,^r޽{UV(V*ijtN_Gǒ#5Aə>7n2E%KHay0mLPI!ܹͮ$l 3)Ԍ`8rO2P;D`>6}ypJao4s2ݭ2 33%,K4k_ad4!ЎkvAȢ1ޑ9`ӦMC1xuU21ٲ2;!-mzm': _mfݾp< mz;9sSHܹs{Wwܾ}YSxrApvҐ _uk cdӮk%;^jҔwYrӔ 7Һٿ]<1te٫e& \ش]{ evMViG14+,lg|`DL۷ϴQ;wdѻ ?oTQ Vk>So2|x=x>U>3pTǵài~DwY\4 _͡6@'{ $:W;#/^fv̀4mS}sQUe{4ޒGULԊ@`[sBbx!8&҆XRN|:LeURPzkE;/ͤ3xc~T$cy ӧO!ׯ?> VXo)4ѷ !Pz]3-m Ƚ! ܹsmַC`Cl$Bx&6(sξɵ^Z-&o$J Jo4wp'g%Cij#h,`y ʇoGe5%:Ds}Q䳞i~QT_&hIjB<4CBfI˰Q]E-B~pSR- _ ı}m۶B@T ^ 1m&cA0]/ I+D@F/ !rRkyRMzњse4[Ғ\3K[P`a 60 2%ZYf<(D[Z,Z6x#VBZDoU[qhe30􁑁Uy! @@eBTZY_`d7Uf[lվX{NSN1H7jV2%5P)e>C21iaSS@K ˟ۘ=V*0;_#^,6; 80YB"0VÕmC+ԝ/tZ9ÕmvJeZogI6a:Jq# )ڸq#bT}[_ F}#VcL@!Jn WYMZYG`{>2oDKB/K-+۬®\vرFaU˾F!I_FsH a 6s/F<ϟHW |#zds^.Fivљ\$ϳgXэf/\|~! #r/miu#Do0.MT~8 ţ2;6}]ůcz@C۫b[n2\.Ԕ(Wz&mv&Pf)dz ĉ ag7YgwnA QnfUef yɎ,lEFZdaaX["eY#O!2B +[b8ىr8=kxyYM Oy5oYn]_զWz隑nJm:<]b|xb1\Ivĸ;! f;|H3knj+nl\}dtgϞx"Kiv,[!aFRQMs02ubB\[#C̙3ϟ'n|(ܜ0w!Gl^FY{dΚlA[Ոچ LĐeMDz`e| ݻw\ &B@:$Oܺu bt-Ҟ.MrQM0CΩpbB88YjE?R$ r`AF52BٳgEƚ BY_}}m۶9T/rB@6&) ڡCla̗\7D#lI6{P`'9+5ՠBǀD#n6lX +V!':I聀4U iXxt-0{xEǕt M!' 䤍iB`$Wjl:+通IQBv M#<7bX4';POĕt^·~@F͌mܧkAݪ)ceRj+zFȥV~%~Ü.'v.'~ֈF Jq%&䄸V h'zNy HYo#3XjcI !ЅM#0f7ndcWN+FUiyH"ͱڕ {"q%ZkV]N* GVB ܷo;Fxqk} 9!CNZFm`$İ2;FV< ƕthӄf+ֻV(B760Qx̑&UĎCBφ|pxUWE@ϩf#>|.\(H:x\I6p։}El囁7oެ3G*(8"K-%eU}`dz2t*d)D*[JKk"Q\Uȉ#P*[lnRBMVrG!' U;<@D FvUq%~ΝDm޼Y!'pDo1 F.5p,@Qc 8ۏ-ln߾]Nb" zӴxF.霃3hE47~A`⁑@q%BNF GR-8" zsb \]e,ȥiBN:E#uխ%S`Wₒ{!'l|R,)zRگ+ǒBN=J˝?|_GT>DotF L˽p3xK۶m[~=xLJ/E~rJ%A@V*H',ܫ{fIV%,st[G2/I'[vLwھ>qQbd95ܳgz1;j(֫Y.YoeHHQ\zյ!'qΈ)yu2(FKF" z+0r8+{ ͐^Q位UO>̥ Q*p2 8g WŕBҽrrahQ ^:Bɢۻw{ |}FWAxSŕWS!'pիWW W^VʺV`dpunQulrr ,96b}ǎ!Ec;bT:Дr0,V1 3oͻ%FjW^Tw]hP V[H B;LH٥G--XhӐ|**VU޽+GjSLy$E&*i |keeKJG^xqI^i<7ֱ[^gY "3ЄC׊;]H'Cd=P`R駟V mpƘGv0 y"<#Ӷ>5ti)DHBpӧz A$bΒe0a}UJBEEԼ#$=Cd1S=Pd A(A9TՁB:fxR/:">g*gk6@X0PbӆL{x= 9q/ orp˪9L L;>w\pJ9X}l])gj޲R s 6?NJ~bu'rp˨VV?~=*a/bE?FĀUK|HӝwJX|?Q3۸%+%1{\C:˒Q$sw@MٷicW~ -ǯJ|o_؝i3o/A 'pai@L0S ׮]DZJ49غ㙢qGn0,HKm5|`M) 58,1zТ]m"9pեk-Nxqn9evq 0\lϜ9C,^ʧ} 7n?2OI! >/I;ٳoT16ZpWa}5芣ʕ+cJ\f&eBXo0%bhϽhYT69 D}KZ~Dq]3oߣϴYFcbPl9ߒ0%e >SDke>"MWs^i^o-W0I鳇SĀq?ĝg< Mb:aabh峦!A霁!ƫ+z–va#uidǩ%c!k$ ڎ)G[\l ڬ6tBRd{K}H;ttfrQj4SN_,6/rbjbmTwG: IQXM0a#/W@Vn{+ Rdc^AE@.K;1~&0d+g K;Rݑ$@?7MH'<7DGN^3 deKV)@XlR-=ǝs OpA{H֯*ރfHT3kr2j9ijtiw'zؔԾ0s׽hBɽMPV(HTM'Xspߑ$&G ^`m&^rOwxBSXWWW{ aR lZeƓ8Ł"F9RvˢhH%6c׫MXBeUe֒O_k˛TXٻl+C&.g![MD0-NWtn4l' bfzg<7|v\yƭĀsݻx]s@&Ǐ!JAL{/,J :ϙeI]>BՕ0vX4O:ǔ.#o*iCt)'Ӂ|oTjGPU =`IoK-m1[[qXoQ <1ec1?,Cy +ky7v܄\M'(4\WrX:Gx;=RAqz]eJKC6a@ cq/wYoNici$ հ_Yo(26bq] IhmxFcJ 9gnI`M͊j'KJH-Ww3I/^=*JQi@tkb͚5r+` H.TՄB UF@!R@leFش48OV֟Ek"@@դm괁phЈ_d=Sl /3B&!&f?M+1f-EP-x "(mH. W`_/6 . J(OgJVȢ42 2~(7 -84bTU/GWK*z_#TzWMe ,R'RdzKu)m k-tMW+m@SE{*i^6P2T(A",D@F@iKPRT`tDo S6b2K(A",G@ɖPdU1pEkVJԘrN9m@͙1CYo=dq LRo Z! z+NeqpϣWEI[?&^Zi=a=vO[AMWWqUX8m,Ǚ۷|?sL,43kW)D T@}iϟ?߰aKs-EV}EW PDq `Q֭[-p$66m`۶m= Xӻw9rcZdK)V_%|*ݙ={pnåKǎúU˱0>")QS*V**'6nȣٳg^ >~ 5rW^8`@5ĆS0`0 Y8c)qa"Q?lJv%*QdX6^du>np/^ N1_ !8RS nilwb; pD%˼/^P;*Y= - B!`Xv3gۯnk#҄}79,jdP~6fādNuٳ'9@m޼`SѣN0 癋ܶf,3Y|!;V[BLd&.فbC1۬&Zfֆ/Z=k׮dVG6@Uۍ7XҚOj|Kw6)\\7[6_`nڴ|b@$ R$of޽{ &\e38~1Św{oFZ ׹4 ??կg5v%,xlٲnNb*ՌyŎFfKBĉk׮ԅP !PէӚGZe@p.7k̲FmVkkִ&# z (h^,'1@a S5a\3&]lj,4PLTE:[[QF㧔PtNbT+ٛK,eopNɾjCŒڅm=ԕjʖߡΈĚ탋,wv>Ё[k gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDbϞ"@tRNS{DbKGDH cmPPJCmp0712Hs$IDATHKIH'GG䉊U~1Q{Q:nr3FUpZ$$h>p@J$ǖ`_S%IJ{M`_Q)jeY+_E= &ڙleYlGfӹC d |07D مe2rn?qlAfG5mf29h7D;}S7tz^oև0?;cWzCSAH}!w^C[j&@HqSE}ڮ[:`E~: & q& rvW;e^6dXm3+-Pu^lmAo\/iܤWܲ94>̂jV8àZ,|.a2Md}Kk1|ZtsaHVY@*U&DV7,f2¡rɢ]J@!*/LSDZdT75w TVJ>ިj~͕/he5.Rhٗ~9mu:u:-9O/%˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd  \A?revPicture 31revbCn-`@OLnCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd   \A?revPicture 32revbCn-`@STnCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd ! lA?discussPicture 33discussbpQ)һ0W\npQ)һ0PNG  IHDRU2gPLTEژr7쳉qǩϹ)VObSed2Ѧh̃G譐M{ޟtъzՒA@'2Ś|0~ZQzne#ݴ﷝hǾlWˌa]#оyoBza;8gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDb(`@tRNS{DbKGDH cmPPJCmp0712HsIDATXGsJqK(*h+PL`KP_]MҖLCF7p *?!O@SfNt~9#/kc\_:QQ=<ض/0K/P 1(JkY,Hjr-EXK]1kJX*sa+ykUb`[}CuZܶPTYm/$pWq'k mX&9x͟ӹ>NTUk9VNXY6i74 #K3R(c (j/5+FqTebX)W M@ڵR*nWGrsXA}F ^^F/-dfT߶???o%7PeQ1?N)o1IU۰Q%c٣ZpRد:K\dE/:d-Spta@h7+)ޫ,YjE'.2E /r/`/c@F*#:IENDB`X$$If!vh55#v#v:V l55Dd " `A ? readPicture 34read b9w5 Ԏ(Qen9w5 Ԏ(PNG  IHDRU+>4PLTE:[[QF㧔PtNbT+ٛK,eopNɾjCŒڅm=ԕjʖߡΈĚ탋,wv>Ё[k gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDbϞ"@tRNS{DbKGDH cmPPJCmp0712Hs$IDATHKIH'GG䉊U~1Q{Q:nr3FUpZ$$h>p@J$ǖ`_S%IJ{M`_Q)jeY+_E= &ڙleYlGfӹC d |07D مe2rn?qlAfG5mf29h7D;}S7tz^oև0?;cWzCSAH}!w^C[j&@HqSE}ڮ[:`E~: & q& rvW;e^6dXm3+-Pu^lmAo\/iܤWܲ94>̂jV8àZ,|.a2Md}Kk1|ZtsaHVY@*U&DV7,f2¡rɢ]J@!*/LSDZdT75w TVJ>ިj~͕/he5.Rhٗ~9mu:u:-9O/%˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd % `A ? readPicture 37read#b9w5 Ԏ(~n9w5 Ԏ(PNG  IHDRU+>4PLTE:[[QF㧔PtNbT+ٛK,eopNɾjCŒڅm=ԕjʖߡΈĚ탋,wv>Ё[k gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDbϞ"@tRNS{DbKGDH cmPPJCmp0712Hs$IDATHKIH'GG䉊U~1Q{Q:nr3FUpZ$$h>p@J$ǖ`_S%IJ{M`_Q)jeY+_E= &ڙleYlGfӹC d |07D مe2rn?qlAfG5mf29h7D;}S7tz^oև0?;cWzCSAH}!w^C[j&@HqSE}ڮ[:`E~: & q& rvW;e^6dXm3+-Pu^lmAo\/iܤWܲ94>̂jV8àZ,|.a2Md}Kk1|ZtsaHVY@*U&DV7,f2¡rɢ]J@!*/LSDZdT75w TVJ>ިj~͕/he5.Rhٗ~9mu:u:-9O/%˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Ddtl ( HA?Picture 40&2u2Qm%4]i`!u2Qm%4] d~^FDJ@0xVkQvشjhK RJRTKiAeiH44! x*R!=(z'MYgۍ$&nȾ7|2P6C t]E/ȵgE3+K޴S k$:9v\׏7@"8VI'b#;pV :L9{v܆e8{ȴ(!TTA fV1NEݛ}o$JD^+ ƴz"?va *L~YWU #Yv!eQ+[a'``Y.6bo{/Da/d %Oa\Ƹ. a1x}4G1jLlfZ Ɓ8  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%@.1e2?3456789:;<=>cABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abfghijslmnopqrdtuvxyz{|}~Root Entry F j%h0!Data WordDocument;ObjectPoolBi%h j%h_1319978368  FBi%hBi%hOle Text  Bi%hBi%hCompObjV  !"#$%&'()*,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVXYZ[\]^_`abcdefghijlpqrstuvxyz{|}~ Quill96 Story Group Class9qCHNKINK   TEXTTEXTFDPPFDPPFDPCFDPCSGP SGP SGDFSGDFINK INK BTEPPLC BTECPLC FONTFONT6PSTRSPLC $CONTENTS  Temp002860PRINT+ Escher W A B C primary key Ka primary key includes Ka primary key includes Ka & Kb  &,.0H`bd|# (}# (}   &0Zd    ii<NT,Times New RomanArialH e k  --9 ----X ---- --&O7RZ--%P8PX--&&OR--%PP--&&GORZ--%PPHX--&&OOZZ--%PPXX--&&GR--%PH--&&OZ--%PX--&--1q0---   Arial ob~wk~wWw o -. 2 (IA   Arial b~wk~wWw -. --a`@---  -. 2 xIB -.--i8---  -. 2 BC -. -----  -.2  primary key      Arialo b~wk~wWwo -. 2 .Ka   -.  -.  -.2 h primary key     -.2 | includes e  -. 2 |Ka   -.  -.  -.2 primary key     -.2 includes  -.  -.2 Ka & Kbs    -. BF @v ^(  6   L0 6   L 0 6   LO0 ANB  S D>> NB  S D>>ONB @ S Dk>> NB  S D>>  NB @ S Dk|>ONB   S D>| ON   3 X  f   s *[? ? 0 N   3 x" A N   3 8v3   FMicrosoft Draw 97 Drawing Escher DocMSDraw.Drawing.89q, edOh+'0CompObjknObjInfo mSettingsn,Embedded Objects"Bi%hBi%h>yσ}w.2_eŷSom$t~|w3ʼ밼!x]t`;U\O=TdCa4ݟt_<|UGV ݆4zw7?n7 ߖ[|_9Q:O>E`*e$,OJ,KAeyRpXȭnm;:dT0:A|~fhOO=>7bes|98?Ќù$NsBҳ53UnޮWVc""Vѩul+,_ǿUxVA7uI\/l,qҋۨb?ݭi*V7o,ܿX|!~BMi^*}|ϔ/J~>`긝7LKO`DE|USYF;5Rl~"Dd * `A ? readPicture 42read(b9w5 Ԏ( n9w5 Ԏ(PNG  IHDRU+>4PLTE:[[QF㧔PtNbT+ٛK,eopNɾjCŒڅm=ԕjʖߡΈĚ탋,wv>Ё[k gif)|,y@3|,y@@H@|)|)|Y,|@I7)|,|@|,|I|@I|,y  wmHeLweL  H nH.XW˳B@eL$B,ymH.XmA,yWbnn 8bmp;|||| |WDDb]bbDbsDbϞ"@tRNS{DbKGDH cmPPJCmp0712Hs$IDATHKIH'GG䉊U~1Q{Q:nr3FUpZ$$h>p@J$ǖ`_S%IJ{M`_Q)jeY+_E= &ڙleYlGfӹC d |07D مe2rn?qlAfG5mf29h7D;}S7tz^oև0?;cWzCSAH}!w^C[j&@HqSE}ڮ[:`E~: & q& rvW;e^6dXm3+-Pu^lmAo\/iܤWܲ94>̂jV8àZ,|.a2Md}Kk1|ZtsaHVY@*U&DV7,f2¡rɢ]J@!*/LSDZdT75w TVJ>ިj~͕/he5.Rhٗ~9mu:u:-9O/%˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd - \A?revPicture 45rev+bCn-`@nCn-`@PNG  IHDRU2gPLTEٙC5pI.פv㧴}2-¹e++ʁ뱸qY!!11Ƙы"$PA봐mE"'#5(U#%+.0]Iƨ}ag''? ޟՓ& 33(?e8&weE |N |$DpA|X|d|:0Q|m|;;8Hf'GN|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@L;DOF|p|g|\WC;w$ Ld;d;QY [Zf'brev.gif 4|||| |wDDb]bHbDbsDb @tRNS{DbKGDH cmPPJCmp0712HsIDATXGk0Uk5L Q)i_KE6mru/V`Q~4*Vv؟!Y%zw}m^uYժRM:B˜zz2]r}U;֝m|Vu%Hjux]{V$AkW҂hY6ڱZZ$cA ބ]qJpb1T,or W{6Ͷ(Rl0sFR ۚϕ^dؚ<cBe/MLJ,M*X7fjw%fk4#qJgx\ )6˃cHVնnPtnԕHqi{ <=|+SWBQ*~o.z'T0gs..Ǘf3a.*4 tzq:-azTXF*Bzomn"ӕ@y LXW ,J u&~{kG4mCx[M҆Azm&S3!yGAIENDB`T$$If!vh55#v#v:V l55Dd . dA ? alertPicture 46alert,b6 '+WUU5n6 '+WUU5PNG  IHDRU-ZPLTEp6ЌH_Rz ٘Ƨ]zyӻƝ}ڰҩ7XͲ 5‡H笠 }p ȿ8dƜ:﷢L.Z(?x+c8&wx+cE |N |$DpA|X|d|:0Q|m|;;8HFA|p|m|b|||p|X8;(|x|p||;;tt|p|m|[|g|w@H;D|p|g|\WC;w$ @n@ðڀ;;|[ZFbfE8 4|||| |wDDb]bzHbDbsDbp`@tRNS{DbKGDH cmPPJCmp0712HsIDATXG o@`A%Z[E!Cfv^v47M4O^ggD)?YM2eMVM{!5nh'*T(3e6m/ҼR+SxFTPʃ M^0wkQЪS K>5ipY2E'ږpBT@E]y2XDexbyQ^0B8/qّ5)XSq6v&>bn` U|L!&PIQVqG7"o ]ʓh{ֻ6\w04,ZeMWĭqP5cAc hF5݉Oo痩+531(Hv#J=V@2bbpkHE&iKPR],؏-6[&p/ EdEt. %3Fkp VE&v}^.=n\e+N iy;kc*qZ0Ei˝T:[tmK+S='ryFt76w+QYY'o^br>=5 XJp{R/΂mSIhYB n4XrS8<n ը6 .!,gavM.ocM*;Y =L41=\f4y`?Ez?C?ovq&X,-{H 8cޫV9@о`?:B,X]UA4t/wX5u{j,?;m! Ggvl_ `fbrYAM+qvY>q3iVz^J?ec hdOZ lF`üٲg~b Z$+ ޯDU $[Jň貉o`$ 0,6n m*Ua &^B7Z˾zn^JU^-Wd6hze7&βlqD<ۆZ Ւp1d25y!$AUpҞS5+_vrR9W鵫v[&ZGϩIENDB`T$$If!vh55#v#v:V l55 Dd^ 0 C ,A?imageBook"@@/bWtw$@3n+tw$@PNG  IHDR+!wtEXtSoftwareMicrosoft Office5q`PLTEffؽ tRNS@f pHYs@@bCc[ cmPPJCmp0712HsIDAT8OI0ElKq@,Je]C{aD00s/Ժla@_g}CCZ@`V?j/ёO [ՠs :~ՂQ$d)kx,c 0ZP 4zTYئ+%TTM0:Q[ԗr_l=<Rr|Нbj,.[釾{HiJ~K:Y&\ Ko^| ~xKi˧>1NG { IENDB`1Tablek2SummaryInformation(oDocumentSummaryInformation8wCompObjq generaltext1CJOJQJ^JaJo(4@4 \h,Header -9r 4 @4 \h,Footer .9r .)@. \h, Page NumberFF 6My title0a$B* CJ,PJaJph`` isah,space after heading1$a$5CJPJaJL"@L iCaption2$B* CJOJPJQJaJph^O1^ i olsuh4 Char/5CJOJPJQJ^J_HaJmH nHsH tHFBF iXto do 4x6B*CJPJaJphXORX |Verdana,10 pt,No underline5OJQJhObhFmy Title6$a$55CJ$OJPJQJ\^J_HaJ$mHnHsH tH uLL\dTOC 27h ^:CJPJaJmHnHufOf \dlb,listbulleted,list bulleted8 F CJPJaJdOd 5L olsuh2 Char5B* CJ OJPJQJ^J_HaJ mH nHph ssH tH@O@ Xb1$57>*B*OJQJS*\^Jph&O& Xm1 B*ph(O( Xpi1 B*ph&O& Xt1 B* ph$O$ Xtx15\e@ XHTML Preformatted:?2( Px 4 #\'*.25@9*$$CJOJPJQJ^JaJmH sH tH>P@> u Body Text 2@ 5PJaJBb@B  HTML CodeCJOJPJQJ^JaJ&O!& d1 B*phLO2L w blue NormalC1$B*CJPJaJphDZ@BD 7 Plain TextD1$CJPJaJtH F@RF zp Footnote TextECJPJaJtH DC@bD >]Body Text Indent Fx^2B@r2  Body TextGx>Q@> K Body Text 3HxCJaJ2 2 tDIndex 1 I^`F!F tD Index HeadingJCJPJaJtH .O. NOgemK CJOJQJ!+6?N^Ag!+6?N^aAg#+mn  A W ]q3;<PXYflm"q\X2FUh' *!!"5#D#b#w#####$$5$J$\$$%&\&w&'n**G+,<--~/1 2233j44(679::f;;;;;;;z<{<}<<<<<<<LD@D 3NormalCJ_HaJmH nHsH tH^@^ (7# Heading 1$ F <@&5CJ KH OJQJ\^JaJ d@d (7# Heading 2$ & F <@& 56CJOJQJ\]^JaJ^@^ (7# Heading 3$ & F <@&5CJOJQJ\^JaJR@R X Heading 4$ & F <@&5CJ\aJT@T X Heading 5 & F <@&56CJ\]aJN@N X Heading 6 & F <@&5CJ\aJ@@@ X Heading 7 & F <@&DA@D Default Paragraph FontRi@R 0 Table Normal4 l4a (k( 0No List FU@F Z Hyperlink>*B* OJQJ^Jo(ph sZV@Z (WFollowedHyperlink >*B*CJOJQJ^JaJphNON y$olsuh1dd[$\$5CJ0OJQJ^JaJ0TO"T 9Zolsuh2dd[$\$B* CJ OJQJ^JaJ ph sVO2V @/olsuh3dd[$\$5B* OJQJ\^JaJ ph sJOBJ 3u{Xolsuh4dd[$\$5OJQJ^JaJFORF Zolsuh5dd[$\$CJOJQJaJ\Ob\ ~L whitetabledd[$\$B*CJOJQJ^JaJphlOql ~Lwhitetable Char5B*CJOJPJQJ^J_HaJmH nHphsH tHpOp Zc2tablerowcolumnheadingdd[$\$5B*OJ QJ \ph\O\ Zatactivitytextdd[$\$B*OJQJ^JphtOt o;atactivitytext Char5B*CJOJPJQJ^J_HaJmH nHphsH tHfOf Zatactivitytexttabledd[$\$B*OJQJ^JphjOj %Zatiactivityindentdd[$\$B*CJOJQJ^JaJphTOT Z cttabletextdd[$\$CJOJQJ^JaJbOb Z cstablesourcedd[$\$B*CJOJQJ^JaJphrOr Za1activityheading1dd[$\$#6B* CJOJQJ]^JaJph`O` )^F generaltext [$\$(CJOJQJ^J_HaJmH nHsH tHjj ~ Table Grid7:V!0!.O". $CLtable "<<FO1F Zsection15CJOJQJ\^JaJo(B^@BB Z Normal (Web)$dd[$\$zOQz [iatiactivityindent Char5B*CJOJPJQJ^J_HaJmH nHphsH tH.X@a. kEmphasis6]*W@q* ZStrong5\LL ~ Balloon Text(CJOJ PJQJ ^J aJ`O` ^Fgeneraltext Char(CJOJQJ^J_HaJmH nHsH tHDOD  cttabletext1CJOJ QJ aJo(ROR u"a4activityheading4+dd[$\$_HHOH "=#=$=F=?ACDGIIUKKK L[LLؔG ̗l_ӚK%ǜ(uLYƢ0\oGBCͫҫ 3F #_a~&'P#:M)6  %-895'(36:?GHSVZ_ghi=-sw['         , - . ;  x,8>EM\irsz{|S!w#####################$$ $$$'$($,$1$4$5$6$7$8$9$:$>$C$F$G$H$I$J$K$L$S$T$U$V$W$X$Y$Z$[$b$c$d$e$f$g$h$i$j$r$s$t$u$v$w$x$y$z$$$$$)++,!,p,r,,,,,,---------.s.......//2I235$555555688F:G:==???@@@@%@&@'@)@@@@@tAAA"B1BDqF8GHSIJL/LMN?PRTUVYYZu[F]`Fab dfghRkfnqrJtu vivvvvvwwQwww-xzxxxFyyy0zgzz3{H{{{{3|d||||| }}}}}Y}}}}}}}}~S~s~~~~Kw(M̀߀?ǁ 7!b(=PxQv/Gv-9cֈ+Wn'Z4)E%)rLV`bce#$%'EFGHcuwxȟX{YqܥVo2.h"#XCYʲdظٸڸ[entƻǻ23CSij¼e˾۾  ]lT)./KBKYx\+4TGrCNOPR&'(*HIJL]fmAD "+278ANW`ahntyz{9V0qab     IJvSQ\znw/>?HIJKTUVW`abclmno, h        [   r    A c    @ #(Df;<=Y[T_R!"3##$o$$&&'9)l))))**H*,->-x-.8..Z011213 68899"9B9S9]9}99999M:<=AAA`BCEkGlGGIIII|L}LLOOOPIPPP Q3QtQQQR:RORbRRR2SNS}SSSSg?gBg080 0 0 0 0 00 000 03 03 03 03 03 03 00 00 0 0 0 0 00 0 00 0 00 0 00 0 00 0 00 0 00 0 002 02 00 00 0 00 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 01 01 01 01 01 01 01 01 01 01 0 1 0 1 0 0 0 0 00 0 00 0 0 0 0 0 0 00 00 00 00 00 00 00 00 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0/ 0/ 0/ 0/ 0/ 0 0 0 0. 0. 0. 0000 0 0 0 0 0 0 0- 0- 0- 0- 0- 0 00 0 0 0 0 00 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 00 0 00 0 00 00 0 0, 0, 0, 0, 0, 00 0 0 0 00 0+ 0+ 0+ 0+ 0+ 0+ 0 0 0 0* 0* 0* 0* 0* 0* 0* 0* 0* 0 0 00 0 0) 0) 0) 0) 0) 0 0 0 0 0 0 0 0 0 00 00 00 0 00 0 0 0 0 0 0 00 00 0 0 0 0 0 0 0 0 0 0 0 0 0( 0( 0( 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 000000 0 0 00 0 0 00 0 0 0 0 0 0' 0' 0 00 0 0 0 0 0 E0 0 0 0 0 00 0 0 0 0 00& 0& 0& 0& 0& 00 0% 0% 0% 0 0 0 0 0 0 0 0 00 0 0 0 0 00 0 0 0 0 0 0 0 0  00-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0- 0- 0- 0-  0- 0-  0-  0-  0-  0-  0- 0-  0- $ 0- $ 0- $ 0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0- 0-  0- # 0- # 0- # 0- # 0-  0-  0- " 0- " 0- " 0- " 0- " 0- " 0-  0- ! 0- ! 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0- 0- 0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 80-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0 -  0 -  0 -  0 -  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0 -  0 -  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0 -  0 -  0 -  0 -  0 -  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0- 0-  0-  0-  0- 0- G0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0 -  0 -  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0- 0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0-  0-  0-  0-  0-  0-  0-  0- 0-  0-  0-  0- 0-  0-  0-  0-  0-   00 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 000 00 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0000 000 0 0 0 0 0 0 0 0 0 0 0  00000 0 0 0 0 0 0 080 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 08000 0 0 0 0 0 0 0 0000 00 00 00 00 00 00 00 00 00 0 00 00 00 0 00 0 0000 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 0 00 0 0 0 0 0 0 0 0 0 00 0 0 0 00 0 0 0 0"9 0"9 0 0 0 00 0 0 0 0 00 0 0 0 0 00 0 00 0 00 0 00 0 0 0 0 0 0 0 0 0 0  0  0  0  0  0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0 0 0 0 0 00 0 0 0000 0 0 0000 0 0 0 0 0 0 0 0 000 000 0 0 00 050 0 000 0 0@0I00@0I00@0I00@0I00@-0@0I00 000000000000000`aaaaBgK00TI00I00K00K00K00H  .>CDVrT&+ 456H]RCJ^'3&ioL8;ADEGJMORVY^dgmyz}X\,BzDDG^aZʕ~683Vir%+++',6,C,K,W,c,i,v,,56@&HtIjąSb+$c2i].*z2`y n>JVbn#[2BBX]jooL9<=>?@BCFHIKLNPQSTUWXZ[\]_`abcefhijklnopqrstuvwx{|~K:f[9QT) 4 6 V X       S ^   1 < #Vau&'8*C*"1-18999AAGG8ICILLOO.V9VXZcZAg:XX_F FFFFFFFFFFFFFF FFFFFFFFFFFFF0,2$s3%L# AA@f (    () # @@ "6?n  C >" ; P  hB  3 "(  PB   " 8 PB B  "0  PB   " 8 PB   "`4hB  3 " " hB  3 " H  hB  3 " A PB   "" @&Th  3 "$T)D PB B  "0 h  3 "$ 0 B S  ?H0(  RAg t" _Toc515863761 _Toc86032287 _Toc86032288 _Toc476736089 _Toc476736090 _Toc476736091 _Toc85967650 _Toc85967651 _Toc85967653 _Toc85967654 _Toc85967655 _Toc85967656 _Toc85967657 _Toc85967658 _Toc85967659 _Toc85967662 OLE_LINK2 _Toc85967663 _Toc85967664 _Toc85967667 _Toc85967668 _Toc85967669 _Toc85967670 _Toc85957318 _Toc85957319 _Toc85957320 _Toc85957321 _Toc85957322 _Toc85957323 _Toc85957324 _Toc85957325 _Toc85957326 _Toc85957327_PictureBulletsX\&n*,;Ul$ڐL:./25Yظ˾]4fBg  !v&*;-mUl8X"K/H2#5pھkSfBg/)_a )_@k )_#)_i )_|2i )_\ k )_,i )_Ek )_)_)_d5k )_ )_Tc )_|#k )_h )_\)_$Ri )_)_tmj )_ )_ai )_k )_,6k )_i )_j )_\Kk )_%j )_k )_ c )_!k )_2k )_$j )_j )_db )_6a )_(j )_Jk )_ )c )_Tk )_c )_b )_D7k )_"i )_$j )_<\j )_ c )_^i LLTqU;U;];?_######$$($($:$:$L$L$[$[$j$j$---ܯ%/>>Bg      !"#$%&'()*+,-.R[[{  [;d;d;Ff######$$+$+$=$=$R$R$a$a$q$q$---į+6AA  Bg   !"#$%&'()*+,-.8/*urn:schemas-microsoft-com:office:smarttagsCityB-*urn:schemas-microsoft-com:office:smarttagscountry-region9.*urn:schemas-microsoft-com:office:smarttagsplace8!*urn:schemas-microsoft-com:office:smarttagsdate | 11199924DayMonthYear/.-//.////./.-!!-.-.-.-.-.-.-.-.-./.-------../.\cuy:"C"..../$/e8j8::y~ڥLW]bNU&SW*-.-rrrs}sxxxx||||FK EKHN gmS9\9?`D`ddffffffffffffffffBgUYQQ^aeaeeFzQz}{{ln_aӚښKR%,ǜΜ(/N^VZ,-5555555555F7G{S~SrXX@`H```aaaaccnnXrfrxxFyJyɄ΄ߘ39\bڟޟL .3]b÷ehݾIN5: 06bf05 Y%%:#:IIJXX`#`?`E`bb ccHcQcffffffffffffffffBg33333333333333333333333333333333333333333333333333333333333333333333333333333333333333333]q3"2h5#D#b#\$\&w&n**6(699}<<<<<Z"$ؔ\a9i-    8w#$+,----.../55?@@'@u vivvwwxxyy3{H{d|| }}}}}}S~s~w(M!b(PQv/G9Jc)%Vc(cȟٟWCY-dڸ[KCM (+Jfmvnh    .8.99 Q3QtQQ:RbRRR2SNS}SSlZvF-Ha[166[ 2F(B&c3$es25#  9,Z~En/A7LUGB1ZBv^ Db>?Hb"@cWI\%HL8ZxYTM$,"]Z 5b]ڮDB J^RhAoEaL%aF>1c8epqho"l.h)rwHqwrtxj 9.ypdV7c}Y}ʃw:^`^`^`^`^`^`^`^`^` ^`CJOJQJ ^`CJOJQJ ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJ QJ o(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ( H T ` lx Unit14 - Seminar Question 14.3 kirsteen1NormalPanayiotis Chrysandreas3Microsoft Office Word@9+@Ep@>Fg@g%h[ ՜.+,D՜.+,` hp  Middlesex University[:e Unit14 - Seminar Question 14.3 Title0t| _PID_HLINKS Base Target_NewReviewCycleA X &http://www.dwo.bull.com/ve/papers.htmI.http://www.informix.com/informix/whitepapers/_self  FMicrosoft Office Word Document MSWordDocWord.Document.89q      !"#$%&'()*+,-./01234567 ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o(hh^h`CJOJ QJ o(q ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( pp^p`OJQJo(@ @ ^@ `OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( PP^P`OJQJo(  ^ `OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJ QJ o(   ^ `OJQJo(   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^` Article . ^` Section .P^`P()`p`^``p()P^`P)P^`P)^`)P^`P.0p0^0`p. 88^8`OJ QJ o( ^`OJQJo(   ^ `OJ QJ o(   ^ `OJQJo(xx^x`OJQJ^Jo(o HH^H`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o(^`.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. ^`OJQJo(  ^ `OJQJ^Jo(o   ^ `OJ QJ o( xx^x`OJQJo(HH^H`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJQJ^Jo(o ^`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o PP^P`OJ QJ o( 88^8`OJQJo(^`OJQJ^Jo(o   ^ `OJ QJ o(   ^ `OJQJo(xx^x`OJQJ^Jo(o HH^H`OJ QJ o( ^`OJQJo(^`OJQJ^Jo(o ^`OJ QJ o(3Nw1c 9%BF!Llqhs25+#-(P UGBf $,*r,"])%_?tx<x&w J^oEar%HLYTcWITvF-2ZBqwq ^b][ 2a[1)rwc}&c3b.7n/A?H`< DY}x(%al9.y5OutlineWW8Num1WW8Num25                                                                                                                                                                                                                                                                                                                                                                                                                                       LMrt73 Wh VUVyr A @ @ @v/?Mg5?V>]F %3art"..I=ksx__ ikqw/0LNPU`v#JL  YX ^ ?t  00 )n  + & e9 : ; E  f* !> > I j !c X' &GPqs([v&*52xPu 82X"|/Lgku|^Pk4n4<;]`kbn< hD*fgdrj8oh'5KNE5L;o>~|1":,b :KCjcyf -T' 39Yq1Xbv  N!!G!!!'!5!uB!O!r!"%J"U"Y"k"s""#(7#M#R#g#;$wQ$g$p$y$B~$ %J%&\?&ON&KV&'0''2'V'_'(t(}(?()))[)])*WC*F*b*l*q**,,.A,\h,=v,z,5- )-+-w1-j.w/@/"0#000I0M0S01.1E1P1f!2:2X=2J2WM2]2`s2y}23g*3A3D32R4$5%5`5n5+)6=96S@7b7h79(!9z>9B9:/4:P:|r:3;e";V+;,J;o; <+<n>aD>Q>k>`Q?a?t?v?i|?1 @#@A(A#QA~A?BFlB#C>C![CvCD$;DtDa Es#E5EHBECEBhEFFjFF-FQF^[F^FwyF GA GG7GYGhGsH\%H'H(+H,YHdHwH"Ib)IQ5IaILiIzIE,J2J+KS-KKhL~-Lm5L=7LAL$CL~LMHM=MNN7&NV3N;Nc>N5iNNO9DOKOLOeP )P/Pp:P\PvaP0QMQ_QR/R.SvT*T0T3Ti=TXxTU$U/UPUUUMV(W$-W>WPWRW`WXD6X6X7XMBXKXu{XY6Y8OY vYZZ+Z?ZAZbLZhPZPZWZB^ZkZ#xZ[,[q-[4[J[;T\X\ g\] ]77]0J]^ ^u^^%U^_j_Ft_(`hG`Y`a]VaP~adbbA#b>bObtYb[bzb cFcTcfdc9ncldd,dKdMd_dd,em`ehe;fz1f2fgRghh&h/hAhVhfhkhbi<i[ipi*jn4jxSj6ujk(:kakl;!l@$lxKliXlrmGmPmSmSmfamXgmn7nWnenOln oq oBopSpjpmp {pq~q&q+-q>q]KqObqr5 rRrQrZrdrm s's8sMstss4t=t7@trtnttu5*uAFunuQ}uvv,vEvgv{vwxKpx1|xyw-yTy^yjay zAz.sz{3){;{|-*|.|<|z|"}N}\}&w}x} ~~\E~]~/?HcZY]$rC*F` '/=1DI" o5,QpSP' 78 x$:ULbdf <L #_3#?D`{2>15X8ITW r q'Ol\\dezFLVWh%.AOKlSBV6mv}zZ^b@kR>2K_bgBBF%@FI4(6sFMPlRB*bu"7?XY9Z;g\%jwMccbMw#$Q[fHCGOPuyrxL![&"7y,x)YpenupyC6/@nw5E^eizcbknatAx  }7nqY~l36?PfV;h6:N;qDghXpx $08Q\i>LmzvP)Zo+c=H mss 9T(hf }Yf_}7<\RsE\zp>=O=Kw,Y8;>cPkd 8W_j&]3"7Fa}_^0+8}S~L[ ^GsJr^8U< EE0W9mn0fF #X(xTZ}CZ./HJa_!;RiX};=M:^}9DJE^s)UuF*iX'/r4FW_",BCkV?5oeW!&4pE]vhrt1IHgZggkVZI2z7 :;eEM\irs$!w#####################$$ $$$'$($,$1$4$5$6$7$8$9$:$>$C$F$G$H$I$J$K$L$S$T$U$V$W$X$Y$Z$[$b$c$d$e$f$g$h$i$j$r$s$t$u$v$w$x$y$z$$,-----......5G:==???@@@&@'@)@@@tA1B3{||}}}}}}}}bce$%'FGƻǻ23CSij¼)./OPR'(*IJLfm "+278ANW`ahntyz{    I/>?HIJKTUVW`abclmnojdIfKfffffBgE0!W?#03m3E0E03K^JE089pqrsPROJECT.NEWMACROS.EDIT_VERSIONPROJECT.NEWMACROS.INSERT_EXTRAPROJECT.NEWMACROS.INSERT_THINKPROJECT.NEWMACROS.PRINT_VERSION PROJECT.NEWMACROS.INSERT_CONTENT!PROJECT.NEWMACROS.INSERT_ACTIVITY@ff ff4fAg`@``@`H@Unknown Gz Times New Roman5Symbol3& z Arial7&  Verdana;= |i0BatangChe?& Arial Black?5 z Courier New;SimSun[SOoAmerican TypewriterTimes New RomanA& Arial Narrow5& zaTahoma;Wingdings"1 hFf^tF%[ :[[ :[I4eeГ2QHP?^y23Unit14 - Seminar Question 14.3 kirsteen1Panayiotis Chrysandreas5                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4