ࡱ> < ? % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ;  bjbj <}}x00ssX  *""LLL(MMMbcWdTf!h!h!h!h!h!h!$5&(N!dEb^bdd!ssMM2U"___d4s8MMf!_df!__dMwWz}2(R!k"0"ZP%%)%)P%)dd_ddddd!!_ddd"dddd%)ddddddddd0 9: @CURRICULUM (Scheme of Studies and Examinations and Syllabus for 03rd-08th sem.) (C Scheme) for  SHAPE \* MERGEFORMAT  UNDERGRADUATE DEGREE (B. Tech.) COURSE IN COMPUTER SCIENCE & ENGINEERING [w.e.f. 2019-20]  FACULTY OF INFORMATION TECHNOLOGY AND COMPUTER SCIENCE DEENBANDHU CHHOTU RAM UNIVERSITY OF SCIENCE AND TECHONOLOGY (Established Under Haryana Legislature Act No. 29 of 2006) Murthal-131039, Sonipat (Haryana) HYPERLINK "http://www.dcrust.ac.in"www.dcrust.ac.in Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 2nd YEAR (SEMESTER III) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2019-20 Sl. No.Course CodeCourse TitleTeaching ScheduleMarks of Class workExamination MarksTotalCreditsDuration of ExamLTPTheoryPractical1CSE201CData Structures & Algorithms30025750100332CSE203CComputer Organization & Architecture30025750100333ECE203CDigital System Design30025750100334MATH307CMathematics-III (PDE&T)30025750100335MGT201CEngineering Economics30025750100336CSE205CIT Workshop10425075100337CSE281CData Structures & Algorithms Lab00425075100238ECE283CD S D lab00225075100139MC203C OR MC201CConstitution of India ( Gr-A)/ Environment Science ( Gr-B)3002575010003Total190102254502259002127 L = Lecture, T = Tutorial, P = Practical Note: Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations Environmental Studies (MC201C)/ Constitution of India (MC203C) are mandatory & qualifying courses. For DCRUST Murthal: GROUP A: BME, BT, CSE, ECE. GROUP B: CE, CHE, EE, ME. Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 2nd YEAR (SEMESTER IV) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2019-20 Sl. No. Course Code Course Title Teaching ScheduleMarks of Class workExamination MarksTotalCredits Duration of ExamLTPTheoryPracticalCSE202CWeb & Internet Technologies3002575010033CSE204C Operating Systems3002575010033CSE206CDesign & Analysis of Algorithms 3002575010033CSE208C Discrete Mathematics3002575010033MGT202COrganizational Behaviour 3002575010033CSE282CWeb & Internet Technologies Lab0042507510023CSE284C Operating Systems Lab0042507510023CSE286CDesign & Analysis of Algorithms Lab 0042507510023MC203C OR MC201CConstitution of India ( Gr-A) / Environment Science ( Gr-B)3002575010003Total180122254502259002127 NOTE: Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations Environmental Studies (MC201C)/ Constitution of India (MC203C) are mandatory & qualifying courses. For DCRUST Murthal: GROUP A: BME, BT, CSE, ECE. GROUP B: CE, CHE, EE, ME. Each students has to undergo Professional Training of at least 4 weeks from the industry, institute, research lab, training centre etc. during summer vacation and its evaluation shall be carried out in the V semester. Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 3rd YEAR (SEMESTER V) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2020-21 Sl. No. Course Code Course Title Teaching ScheduleMarks of Class workExamination MarksTotalCredits Duration of ExamLTPTheoryPracticalCSE301CObject Oriented Programming 3002575010033CSE303CDatabase Management Systems3002575010033CSE305CComputer Networks3002575010033CSE307CFormal Languages & Automata Theory 3002575010033CSE309CSoftware Engineering 3002575010033PEC-IProgram Elective-I 3002575010033CSE381CObject Oriented Programming Lab0042507510023CSE383CDatabase Management Systems Lab0042507510023CSE385CProfessional Training (Level-2) Seminar0025000502-Total1800102504501508502424 For B.Tech (Hons) degree the students will study the following subjects in addition to the subjects mentioned above. SEMESTER-VSl. No.Course CodeCourse TitleTeaching ScheduleMarks of Class workExamination MarksTotalCreditsDuration of ExamLTPTheoryPracticalB.Tech. (Hons.) in CSE with specialization in Blockchain (H1)CSEH301CNetwork Security and Cryptography3002575010033CSEH381CNetwork Security and Cryptography Lab0042507510023B.Tech. (Hons.) in CSE with specialization in Cyber Security (H2)CSEH301CNetwork Security and Cryptography3002575010033CSEH381CNetwork Security and Cryptography Lab0042507510023B.Tech. (Hons.) in CSE with specialization in Data Science (H3)CSEH303CIntroduction to Data Science3002575010033CSEH383CPython for Data Science Lab0042507510023Total(H1/H2/H3)30 450757520056 Program Elective-I Course CodeCourse TitleCourse CodeCourse TitleCSE321CComputer GraphicsCSEH301CNetwork security and Cryptography1,2CSE323CProgramming LanguagesCSEH303CIntroduction to Data Science 3CSE325CWireless Communication1Not to be opted by B.Tech (Hons) students opting specialization in Blockchain. 2Not to be opted by B.Tech(Hons) students opting specialization in Cyber Security 3Not to be opted by B.Tech(Hons) students opting specialization in Data Sciences NOTE: Assessment of Professional Training (Level-2)( CSE385C), undergone at the end of semester-IV, will be based on seminar, viva-voce, report and certificate of professional training obtained by the student from the industry / institute / research lab / training centre etc. Students will be permitted to opt for any one elective from the list of Program Elective-1. The minimum strength of the students should be 20 to run an elective course. The student pursuing B.Tech (Hons.) will choose any one out of three specializations (Blockchain (H1), Cyber security (H2) and Data Science (H3) in this semester. The specialization once chosen will remain same for next subsequent semesters. The students pursuing B.Tech (Hons.) can choose any subject from the list of Program Elective I except the one from the selected specialization (Blockchain (H1), Cyber security (H2) and Data Science (H3)).. Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations. Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 3rd YEAR (SEMESTER VI) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2020-21 Sl. No. Course Code Course Title Teaching ScheduleMarks of Class workExamination MarksTotalCredits Duration of ExamLTPTheoryPracticalCSE302CCompiler Design3002575010033PEC-IIProgram Elective-II3002575010033PEC-IIIProgram Elective-III3002575010033OEC-IOpen Elective-I3002575010033OEC-IIOpen Elective-II (Humanities)3002575010033CSE382CCompiler Design Lab0042507510023PEC-II LabProgram Elective-II Lab0042507510023Total15081753751507001921 For B.Tech (Hons) degree the students will study the following subjects in addition to the subjects mentioned above. SEMESTER-VISl. No.Course CodeCourse TitleTeaching ScheduleMarks of Class workExamination MarksTotalCreditsDuration of ExamLTPTheoryPracticalB.Tech. (Hons.) in CSE with specialization in Blockchain (H1)CSEH302CCryptocurrency with Ethereum3002575010033CSEH382CCryptocurrency with Ethereum Lab0042507510023CSEH304CFoundations of Blockchain Technology3002575010033B.Tech. (Hons.) in CSE with specialization in Cyber Security (H2)CSEH306CInformation Security and Data Hiding3002575010033CSEH386CInformation Security and Data Hiding Lab0042507510023CSEH308CMobile and Smart Forensics 3002575010033B.Tech. (Hons.) in CSE with specialization in Data Science (H3)CSEH310CData Analytics with Python3002575010033CSEH390CData Analytics with Python Lab0042507510023CSEH312CData Mining 3002575010033Total(H1/H2/H3)604751507530089 Program Elective-II Course CodeCourse Title Course CodeCourse TitleCSE324CMobile Applications DevelopmentCSE330CIoT Architecture & Protocols 4CSE326CDigital Image ProcessingCSEH306CInformation Security and Data Hiding2CSE328CAdvanced JavaCSEH310CData Analytics with Python3 Program Elective-II Lab Course CodeCourse Title Course CodeCourse TitleCSE384CMobile Applications Development LabCSE390CIoT Architecture & Protocols Lab CSE386CDigital Image Processing LabCSEH386CInformation Security and Data Hiding Lab2CSE388CAdvanced Java LabCSEH390CData Analytics with Python Lab3 Program Elective-III Course CodeCourse Title Course CodeCourse TitleCSE340CArtificial Intelligence and Expert SystemCSEH304CFoundations of Blockchain Technology1CSE342CAdvanced Computer NetworksCSEH312CData Mining3CSE344CSoftware Testing 1Not to be opted by B.Tech (Hons) students opting specialization in Blockchain. 2Not to be opted by B.Tech(Hons) students opting specialization in Cyber Security 3Not to be opted by B.Tech(Hons) students opting specialization in Data Sciences 4Not to be opted by B.Tech(Hons) students opting specialization in IoT NOTE: Students will be permitted to opt for any one elective each from the list of Program Elective-II and Program Elective-III. The minimum strength of the students should be 20 to run an elective course. The student pursuing B.Tech (Hons.) will choose subjects as per the specialization opted in the V semester. The students pursuing B.Tech (Hons.) can choose one subject each from the list of Program Elective II and Program Elective III except already opted as per the specialization (Blockchain (H1), Cyber security (H2) and Data Science (H3)). The students should choose different subjects. Each student has to undergo Professional Training (Level-3) of at least 4 weeks from the industry, institute, research lab, training centre etc. during summer vacation and its evaluation shall be carried out in the VII semester. Students will be permitted to opt for one elective each from the list of Open Elective-I and Open Elective-II that are run by other departments. The minimum strength of the students should be 20 to run an elective course. Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations. OPEN ELECTIVES Open Elective-IOpen Elective-IIS.NoCourse No.Course TitleS.NoCourse No.Course TitleHUM350CCommunication Skills for Professionals(Except BME & BTE)CSE305CComputer NetworksHUM352CSoft Skills And Interpersonal CommunicationCSE431CCyber SecurityMGT402CHuman Values, Ethics And IPRCHE457CIndustrial SafetyMGT404CHuman Resource ManagementCE406CDisaster ManagementHUM354CIntroduction To French LanguageECE327CConsumer ElectronicsHUM356CIntroduction To German Language Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 4th YEAR (SEMESTER VII) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2021-22 Sl. No. Course Code Course Title Teaching ScheduleMarks of Class workExamination MarksTotalCredits Duration of ExamLTPTheoryPracticalPEC-IVProgram Elective-IV3002575010033PEC-VProgram Elective-V3002575010033PEC-VIProgram Elective-VI3002575010033OEC-IIIOpen Elective-III3002575010033BSCBiology 3002575010033CSE481CProfessional Training Seminar (Level-3)00250005020CSE483CProject-I00850010015043Total150102253751507002118 For B.Tech (Hons) degree the students will study the following subjects in addition to the subjects mentioned above. SEMESTER-VIISl. No.Course CodeCourse TitleTeaching ScheduleMarks of Class workExamination MarksTotalCreditsDuration of ExamLTPTheoryPracticalB.Tech. (Hons.) in CSE with specialization in Blockchain (H1)CSEH401CBlockchain Technology and Applications3002575010033CSEH481CProject based on specialization0042507510023B.Tech. (Hons.) in CSE with specialization in Cyber Security (H2)CSEH403CCyber Forensics and Cyber Laws3002575010033CSEH481CProject based on specialization0042507510023B.Tech. (Hons.) in CSE with specialization in Data Science (H3)CSEH405CMathematical and Statistical Techniques3002575010033CSEH481CProject based on specialization0042507510023Total(H1/H2/H3)30450757520056 Program Electives Program Elective-IVProgram Elective-VProgram Elective-VICourse codeCourse titleCourse codeCourse titleCourse codeCourse title CSE401CCloud Architecture & Security4CSE421CDistributed ComputingCSE441CMultimedia TechnologyCSE403CMachine LearningCSE423CGreen ComputingCSE443CSoft ComputingCSE405CSoftware Design and Enterprise ComputingCSE425CSoftware AgentsCSE445CSoftware Measurements and MetricsCSE407CNatural Language Processing CSEH403CCyber Forensics and Cyber Laws2CSEH401CBlockchain Technology and Applications1 1Not to be opted by B.Tech (Hons) students opting specialization in Blockchain 2Not to be opted by B.Tech (Hons) students opting specialization in Cyber Security 4Not to be opted by B.Tech (Hons) students opting specialization in IoT NOTE: Students will be permitted to opt for any one elective each from the list of Program Elective-IV, V and VI. The minimum strength of the students should be 20 to run an elective course. The student pursuing B.Tech (Hons.) will choose subjects as per the specialization opted in the V semester. The students pursuing B.Tech (Hons.) can choose one subject each from the list of Program Elective IV, V and VI, except already opted as per the specialization (IoT (H1), Cyber security (H2) and Data Science (H3)). The students should choose different subjects. Students will be permitted to opt for one elective from the list of Open Elective-III that is floated by other department. The minimum strength of the students should be 20 to run an elective course. Assessment of Professional Training (Level-3) (CSE326C), undergone at the end of semester-VI, will be based on seminar, viva-voce, report and certificate of professional training obtained by the student from the industry/ institute/ research lab/ training centre etc. Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations. OPEN ELECTIVES Open Elective-IIIS.NoCourse No.Course TitleCSE340CArtificial Intelligence & Expert SystemsEE452CElectrical and Hybrid VehiclesMGT401CEntrepreneurshipME452CFundamentals of Sustainable ManufacturingCHE459CNano-Science and Nano-TechnologyEE454CSmart Grid Deenbandhu Chhotu Ram University of Science & Technology, Murthal (Sonepat) SCHEME OF STUDIES & EXAMINATIONS B.Tech. 4th YEAR (SEMESTER VIII) COMPUTER SCIENCE AND ENGINEERING Choice Based Credit System Scheme of Studies & Examinations w.e.f. 2021-22 Sl. No. Course Code Course Title Teaching ScheduleMarks of Class workExamination MarksTotalCredits Duration of ExamLTPTheoryPractical CSE402CAdvanced Computer Architecture (Gr. A)3002575010033 CSE404CSoftware Project Management (Gr. A)3002575010033CSE482CProject-II (Gr. A) Or0018500100150093CSE484C Professional Training (Level-4) (Gr. B) 0001000250350153GPCSEGeneral Fitness for the Profession0000010010000Total (Gr. A)6018100150200450159Total (Gr. B)0001000350450153 NOTE: Gr. A students will have to do project in the department under the supervision of faculty member along with two subjects at sr. no. 1 and 2. Gr. B students will have to undergo Professional Training (Level-4) of at least one semester from the industry, institute, research lab, training centre etc. Students who have CGPA of minimum 7.0 till VI sem. with no backlog will only be permitted to proceed for Professional Training. Each student will be allotted a supervisor from the deptt for both project as well as professional training. Internal evaluation of Project II and Professional Training (Level-4) will be carried out four times in a semester. General Fitness For The Profession(GPCSE) is a compulsory & qualifying course (Audit Pass) under which student will be evaluated for his performance in all types of activities like Academics, Cultural, Sports, NSS, organisation of camps, social activities etc., during his all 8 semesters, at the end of 8th semester.Regarding this course student will be motivated during the induction programme at the time of admission, so that he/she will be vigilant for motivation towards these activities.The evaluation of the student for his / her General Fitness for Profession shall be carried out by a team consisting of:- Dean FIT&CS Chairperson of the Department Senior Most faculty of the department Senior Most faculty of the University other than the department Students will be allowed to use non-programmable scientific calculator. However, sharing of calculators will not be permitted in the examinations. TOTAL CREDITS B.Tech. (CSE) = 159 (including first year) Semester12345678TotalCredit2018212124192115159 TOTAL CREDITS B.Tech. (Hons.) in CSE with specialization in selected areas = 177 (including first year) Semester12345678TotalCredit2018212129272615177 CSE 201C DATA STRUCTURES & ALGORITHMS B. Tech. Semester III (Computer Science and Engg.) w.e.f. 2019-2020 L T P Credits Class Work : 25 Marks 3 0 0 3 Examination : 75 Marks Total : 100 Marks Duration of Exam : 3 Hours  Course Objectives: To analyse algorithms in terms of time, space and computational complexities. To learn searching algorithms (Linear Search and Binary search) and implement them. To study Stacks, Queues, Linked lists, Graph search and traversal techniques. To study sorting algorithms i.e. Selection Sort, Bubble Sort, Insertion Sort, Quick Sort, Merge Sort and Heap sort and compare their performance. UNIT-I Introduction: Basic Terminologies: Elementary Data Organizations, Data Structure operations: insertion, deletion, traversal etc. Analysis of an Algorithm, Asymptotic Notations, Time-Space trade off. Searching: Linear Search and Binary Search Techniques and their complexity analysis. UNIT-II Stacks and Queues: ADT Stack and its operations: Algorithms and their complexity analysis, Applications of Stacks: Expression Conversion and evaluation corresponding algorithms and complexity analysis. ADT queue, Types of Queue: Simple Queue, Circular Queue, Priority Queue; Operations on each types of Queues: Algorithms and their analysis. UNIT-III Linked Lists: Singly linked lists: Representation in memory, Algorithms of several operations: Traversing, Searching, Insertion into, Deletion from linked list; Linked representation of Stack and Queue, Header nodes, Doubly linked list: operations on it and algorithmic analysis; Circular Linked Lists: all operations their algorithms and the complexity analysis. Trees: Basic Tree Terminologies, Different types of Trees: Binary Tree, Threaded Binary Tree, Binary Search Tree, AVL Tree; Tree operations on each of the trees and their algorithms with complexity analysis. Applications of Binary Trees. B Tree, B+ Tree: definitions, algorithms and analysis. UNIT-IV Sorting and Hashing: Objective and properties of different sorting algorithms: Selection Sort, Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap Sort; Performance and Comparison among all the methods, Hashing. Graph: Basic Terminologies and Representations, Graph search and traversal algorithms and complexity analysis. TEXT BOOKS : 1. Fundamentals of Data Structures, Illustrated Edition by Ellis Horowitz, Sartaj Sahni, Computer Science Press. Data Structures, Revised 1st Edition by Seymour Lipschutz , Scaums Outline Series McGraw Hill REFERENCE BOOKS : Algorithms, Data Structures, and Problem Solving with C++ , Illustrated Edition by Mark Allen Weiss, Addison-Wesley Publishing Company How to Solve it by Computer , 2nd Impression by R. G. Dromey, Pearson Education. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Upon successful completion of the course, students will demonstrate the ability to: Analyze the algorithm for a problem solution and determine the time and computation complexity and justify the correctness. Write the algorithm for Search problem (Linear Search and Binary Search) . Write an algorithm for Stack, Queue, Linked list, Graph search and traversal techniques and analyze the same to determine the time and computation complexity. Write an algorithm for Selection Sort, Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap sort and compare their performance in term of Space and time complexity. CSE 203C COMPUTER ORGANIZATION AND ARCHITECTURE B. Tech. Semester III (Common with ECE 3rd Sem ) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100 marksDuration of Examination:3 Hours Course Objectives: To study functional blocks of a computer and their working. To learn CPU organization along with Instruction Level Architecture, different addressing modes and pipelining. To learn about I/O devices and their working principles. The understand the current state of art in memory system design UNIT-I Functional blocks of a computer : CPU, Memory, input/output subsystems, control unit , Multilevel viewpoint of a machine: digital logic, micro architecture, ISA, operating systems, high level language , RTL Computer Buses ( basic design using multiplexers), Bus width, Bus clocking( synchronous , asynchronous), bus arbitration, Bus examples( ISA bus, PCI bus, Universal serial bus) . Data representation: signed number representation, fixed and floating point representations, character representation. Computer arithmetic: integer addition and subtraction, ripple carry adder, carry look-ahead adder, etc., multiplication shift-and add, Booth multiplier, carry save multiplier UNIT-II CPU Organization: Instruction set architecture of a CPU, interpretation of instructions, Instruction set based classification of processors (RISC, CISC, and their comparison), CPU Architecture types (accumulator, register, stack, memory/ register) Instruction cycle (Fetch-Decode-Execute) Addressing modes (register, immediate, direct, indirect, indexed); Operations in the instruction set; Arithmetic and Logical, Data Transfer, Control Flow; Instruction set formats (fixed, variable, hybrid) Pipelining (basic concepts, throughput and speedup, hazards ) UNIT-III Input /Output & Control Unit: Input Output Interface, Asynchronous data transfer (Strobe control, handshaking, serial transfer); Serial Vs parallel data transmission; Modes of data transfer, Programmed I/O, Interrupt driven, Direct Memory access ( DMA). Control Unit design:- Control unit design methods (hardwired & microprogrammed) Control Memory, Address Sequencing, Micro instructions. UNIT-IV Memory Organization: Memory device characteristics (access/ cycle time, cost per bit, volatility, storage density); Memory hierarchy; Main memory Design (Semiconductor RAM & ROM organization, memory expansion, Static & dynamic memory types, their comparison); Associative memory Design, Match logic, Locality of reference principle (Temporal & Spatial) Cache mapping (Direct, associative, set associative); Cache writing policies (Copy-Back, Write-through); Virtual Memory (Address space, memory space, Address mapping using pages, Page replacement) TEXT BOOKS: Computer System Architecture by M. Mano, Prentice-Hall. Structured Computer Organisation by A.S. Tanenbaum, 6th edition, Prentice-Hall of India, Eastern Economic Edition REFERENCE BOOKS: Computer Organization, 5th Edi, by Carl Hamacher, Zvonko Vranesic,2002, SafwatZaky. Computer Organization and Design, 2nd Ed., by David A. Patterson and John L. Hennessy, Morgan 1997, Kauffmann. Computer Architecture and Organization, 3rd Edi, by John P. Hayes, 1998, TMH Computer Organisation& Architecture: Designing for performance by W. Stallings, 4th edition, 1996, Prentice-Hall International edition. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course students will learn the following:- 1. How Computer Systems work & the basic principles 2. Instruction Level Architecture and Instruction Execution pipelining, parallelism and microprogramming 3. How I/O devices are accessed and its principles. 4. The memory organization along with cache and virtual memory concepts. CSE205C INFORMATION TECHNOLOGY WORKSHOP B. Tech. Semester III (Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks1043Examination:75 MarksTotal:100 marksDuration of Examination:3 Hours Course Objectives: To study MATLAB for programming purposes To learn and explore MATLAB programming constructs. To introduce Arrays for matrices representation and Graphics for fractals. To write and debug the code written in MATLAB UNIT-I Introduction: Data types and variables: Introduction to MATLAB, Data Types, Inter-conversion of Data types, MATLAB Variables, Keywords and Constant, Session Command. MATLAB Operators and Operations: Operators(Arithmetic, Relational, Logical, Bitwise), Set Operations, Operator Precedence, Mathematical Functions. UNIT-II MATLAB Programming : Script and Function, Decision Making, Loops, branches, Functions, Working on Script File (Creating, Saving and Executing), MATLAB I/O, Formatted I/O Method,. UNIT-III Arrays: Introduction to Matrices, Operations on Arrays/Matrices, Manipulations of Arrays/Matrices, Expansion of Matrix Size, Reduction of Matrices/Arrays order, Graphics: Introduction to plot, Basic 2-D Plots( Style options, Labels, Axis control, etc.), specialized 2-D Plots, drawing multiple plots. Using MATLAB for fractals and chaos and Conway game of life UNIT-IV File Handling: File Handling: Introduction to file handling, working on files, accessing of Text File, Saving/ Loading MATLAB Variables, reading data without opening file, reading and writing Excel. Debugging: Introduction to debugging, Break points, debugger, stepping, watching variable values, debugging commands. TEXT BOOKS: Delores M. Etter, David C. Kuncicky, Holly Moore, Introduction to MATLAB 7.0, Pearson, 2013. RudraPratap, Getting Started with MATLAB, OXFORD University Press, 2010. Agam Kumar Tyagi, MATLAB and Simulink for Engineers, University Press, 2012. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Upon successful completion of the course, students will be able to Use MATLAB for programming purposes Learn and explore MATLAB tools. Use this learning experience to develop small applications/games. To write and debug the code written in MATLAB MATH307C MATHEMATICS-III PARTIAL DIFFERENTAL EQUATIONS & TRANSFORMSB. Tech. Semester III (Computer Science and Engg.) (w.e.f. Session 2019-2020)LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Exam.:3 Hours UNIT-I First order partial differential equations, solutions of first order linear and non linear PDEs. Solution to homogenous and non-homogenous linear partial differential equations second and higher order by complimentary function and particular integral method. UNIT-II Flows, vibrations and diffusions, second-order linear equations and their- classification, Initial and boundary conditions (with an informal description of well-posed problems), D'Alembert's solution of the wave equation; Duhamel's principle for one dimensional wave equation. Separation of variables method to simple problems in Cartesian coordinates. The Laplacian in plane, cylindrical and spherical polar coordinates, solutions with Bessel functions and Legendre functions. One dimensional diffusion equation and its solution by separation of variables. Boundary-value problems: Solution of boundary-value problems for various linear PDEs in Various geometries. UNIT-III Polynomials, Orthogonal Polynomials-Lagrange's, Chebysev Polynomials; Trigonometric Polynomials, LaplaceTransform, Properties of Laplace Transform, Laplace transform of periodic function. Finding inverse Laplace transform by different. methods, convolution theorem. Evaluation of integrals by Laplace transform, solving ODEs 'and PDEs by Laplace Transform method. UNIT-IV Fourier transforms, Z-transform and Wavelet transforms: properties, methods, inverses and their applications. TEXT BOOKS : Erwin Kreyszig -Advanced Engineering Mathematics, 9th Edition, John' Wiley & Sons, 2006. S.S. Sastry, Engineering Mathematics, PHI, Vol. I & II. B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 35th Edition, 2000. Veerarajan T., Engineering Mathematics, Tata McGraw-Hill, New Delhi, 2008. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: The students will understand solutions of first and second order linear and non linear PDFs and their classifications. The students will understand to solve various naming equations using separation of variables method. The students will come across various Polynomials such as-Lagranges, Chebysev Polynomials, Trigonometric Polynomials. The students will be able to solve various engineering mathematical problems using various transforms such as Laplace Transform Fourier Transforms, Z-transform and Wavelet transforms. ECE203C DIGITAL SYSYTEM DESIGN B. Tech. Semester III ( Common with ECE and CSE ) w.e.f 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75MarksTotal Marks :100Duration of Exam.:3 Hours UNIT- I Logic Simplification: Review of Boolean Algebra and DeMorgans Theorem, SOP & POS forms, Canonical forms, Realization Using Gates. Karnaugh maps up to 6 variables, VEM technique, Binary codes, Code Conversion. Numericals. UNIT- II Combinational & Sequential Logic Design: Comparators, Multiplexers, Encoder, Decoder, Half and Full Adders, Subtractors, Parallel Adders, Adder with Look Ahead Carry, BCD Adder. Sequential Logic Design: Building blocks like S-R, JK and Master-Slave JK FF, Edge triggered FF, Ripple and Synchronous counters, Sequence Generator, Shift registers. UNIT III Finite state machines: Introduction, Design of synchronous FSM Driver & Multiplexed Display: Serial Binary Adder, Sequence detector, Parity Bit Generator, pulse train generator. Algorithmic State Machines charts: Introduction, Component of ASM chart, Introductory examples of ASM chart. UNIT IV Logic Families and PLDs: TTL NAND gate, Specifications, Noise margin, Propagation delay, fan-in, fan-out, Tristate TTL, ECL, CMOS families and their interfacing. Concept of Programmable logic devices like PAL, PLA, ROM, CPLD and FPGA. Logic implementation using Programmable Devices. TEXT/REFERENCE BOOKS: R.P. Jain, Modern digital Electronics, Tata McGraw Hill, 4th edition, 2009 A.Anand Kumar, Switching Theory & Logic Design, PHI. W.H. Gothmann, Digital Electronics- An introduction to theory and practice, PHI, 2nd edition, 2006. D.V. Hall, Digital Circuits and Systems, Tata McGraw Hill, 1989. Morris Mano, Digital Design: With an Introduction to the Verilog HDL, 5th Edition, Pearson Education, 2013. Morris Mano, Logic & Computer Fundamentals, 4th Edition, Pearson Education. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Upon successful completion of the course, students will demonstrate the ability to: Understand binary codes, binary arithmetic, minimization techniques and their relevance to digital logic design. Design & analyze modular combinational circuits with MUX/DEMUX, Decoder, Encoder and sequential logic circuits. Understand finite state machines and develop a digital logic to find out sustainable solution of a real life problem. Understand and implement various digital integrated circuits using different logic families and simple systems composed of PLDs. MGT201C ENGINEERING ECONOMICS B. Tech. Semester III (Common for all Branches Except BT& BME)LTPCreditsClass Work:25 Marks3003Examination:75MarksTotal Marks:100 Duration of Exam:3 Hours UNIT-I Concept of Economics- various definitions, nature of Economic problem, Micro and macro economics- their features and scope, production possibility curve, Relationship between Science, Engineering Technology and Economics. Utility: Concept and measurement of utility, Law of Diminishing Marginal Utility, Law of equi-marginal utility its importance and practical applications. UNIT-II Demand: Concept, Individual and Market demand schedule, Law of demand, shape of demand curve. Elasticity of demand: Concept, measurement of elasticity of demand, factors affecting elasticity of demand, practical application of elasticity of demand. Various concepts of cost: Fixed cost, variable cost, average cost, marginal cost, money cost, real cost, opportunity cost. UNIT III Production : Meaning of production and factors of production; Law of variable proportions, Law of Return to Scale, Internet and External economics and diseconomies of scale. Meaning of Market, Type of Marker perfect Competition, Monopoly, Oligopoly, Monopolistic competition (Main features of these markers). UNIT-IV Supply: Law of Supply, Role of Demand & Supply in Price Determination and effect of changes in demand and supply on price. Nature and characteristics of Indian economy, privatization meaning, merits and demerits. Globalisation meaning, merits and demerits. TEXT BOOKS: Ahuja H.LMicro Ecomomic Theory S. Chand Publication, New Delhi Dewett K.K Modern Ecomomic Theory S. Chand Publication, New Delhi Jain T.R, Grover M.L, Ohri V.K Khanna O.P,Economics for engineers V.K .Publication ,New Delhi Dr. R.K. Agarwal & Rashmi Agarwal, Principles and Applications of Economic, Pragati Prakashan. SUGGESTED BOOKS: 1. Jhingan 1. Jhingan M.LMicro Ecomomic Theory S.Chand Publication ,New Delhi 2. Chopra P.N Principle of Economics Kalyani Publishers, Delhi 3. Mishra S.K Modern Micro Economics Pragati Publication Mumbai. 44 4. Dwivedi D.N Micro Economics Pearson Education, New Delhi. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. COURSE OUTCOMES: Upon Successful Completion of this Course the students will:- Acquire the skills to apply the basics of economics and cost analysis to engineering and take economically sound decision. Acquaint students with the basic economic concepts and their operational significance. Be able to think systematically and objectively about cotemporary economic problems. Learn the ability to optimally utilize the limited resources of the organization. CSE 281C DATA STRUCTURES & ALGORITHMS LABB. Tech. Semester III (Computer Science and Engg) LTPCreditsClass Work:25 Marks0042Examination:75MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To implement an algorithm for a problem and analyze its time and computation complexity. To implement the algorithm for Search problem (Linear Search and Binary Search) . Solve the given problem of Stack , Queue ,Linked list, Graph search and traversal implement it and analyze the same to determine the time and computation complexity. To implement algorithms for Selection Sort, Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap sort and compare their performance in term of Space and time complexity. List of Programs: 1. Write a program to perform binary search in an array. 2. Write a program to perform binary search using recursion. 3. Write a program to perform linear search in 2D array. 4. Write a program to perform various operations on matrices. 5. Write a program to swap two nos. using calls by value and reference. 6. Write a program to implement bubble sort. 7. Write a program to implement insertion sort. 8. Write a program to implement selection sort. 9. Write a program of link list implementation of a stack. 10. Write a program of link list implementation of a queue. 11. Write a program of array implementation of a stack. 12. Write a program of array implementation of a queue. 13. Write a program to search an element in a link list. 14. Write a program to maintain a link list. 15. Write a program to implement BST The teacher concerned may give 10 more exercises based upon syllabus CSE201C Course Outcomes: Upon successful completion of the course, students will be able to: Implement the algorithm for a problem solution, determine the time and computation complexity and justify the correctness. Implement various searching algorithms (Linear Search and Binary Search) . Solve the given problem of Stack, Queue, Linked list, Graph search and traversal, implement and analyze the same to determine the time and computation complexity. Write and implement the algorithms for Selection Sort, Bubble Sort, Insertion Sort, Quick Sort, Merge Sort, Heap sort and compare their performance in term of Space and time complexity. ECE283C Digital System Design LabB. Tech. Semester III (Computer Science and Engg) LTPCreditsClass Work:25 Marks0021Examination:75MarksTotal:100MarksDuration of Examination:3 Hours LIST OF EXPERIMENTS: To study & design basic gates. To realize and minimize five & six variables using K-Map method. To verify the operation of Multiplexer & De-multiplexer. To perform Half adder and Full adder To perform Half substractor and Full substractor. To verify the truth table of S-R,J-K,T & D Type flip flop . To study FLIP- FLOP conversion. To design & verify the operation of 3 bit synchronous counter. To design & verify the operation of synchronous UP/DOWN decade counter using JK flip To design & verify operation of Asynchronous counter. To design and implement a circuit to detect a Count Sequence. Conversion of state diagram to the state table and implement it using logical circuit. Text/Reference Books: R.P. Jain, Modern digital Electronics, Tata McGraw Hill, 4th edition, 2009 A.Anand Kumar, Switching Theory & Logic Design, PHI. W.H. Gothmann, Digital Electronics- An introduction to theory and practice, PHI, 2nd edition, 2006. Note: Each laboratory class/section shall not be more than about 20 students. To allow fair opportunity of practical hands on experience to each student, each experiment may either done by each student individually or in group of not more than 3-4 students. Larger groups be strictly discouraged/ disallowed. Course Outcomes: At the end of the course, students will demonstrate the ability to: Implement the basic digital theory concepts practically and will be able to verify various results derived in theory. Design, analyze and troubleshoot broad range of combinational and sequential circuits for various practical problems using basic gates and flip flops I.Cs. Develop technical writing skills to communication effectively and present ones own work. Acquire teamwork skills for finding sustainable solution of a complex problem and working effectively in groups. CSE202C WEB & INTERNET TECHNOLOGIESB. Tech. Semester IV (Computer Science and Engg.)LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Exam.:3 Hours Course Objectives: To understand the role of HTML, CSS, XML, JavaScript and protocols in the workings of web and web applications. To design a responsive web site using HTML5 and CSS. To build Dynamic web site using server side PHP Programming and Database connectivity. To understand the various technologies to build dynamic content of website. UNIT-I Introduction to the Internet, The world wide web: The idea of hypertext and hyper media; How the web works-HTTP, HTML and URLs; How the browser works-MIME types, plugins and helper applications; The standards-HTML, XML, XHTML and the W3C. Hypertext markup language: The anatomy of an HTML document; Marking up for structure and style: basic page markup, absolute and relative links, ordered and unordered lists, embedding images and controlling appearance, table creation and use, frames, nesting and targeting. Descriptive markup: Meta tags for common tasks, semantic tags for aiding search, the doubling code and RDF. UNIT-II Separating style from structure with style sheets: Internal style specifications within HTML, External linked style specification using CSS, page and site design considerations. Client side programming: Introduction to the JavaScript syntax, the JavaScript object model, Event handling, Output in JavaScript, Forms handling, miscellaneous topics such as cookies, hidden fields, and images; Applications. UNIT-III Server side programming: Introduction to Server Side Technologies CGI/ASP/JSP., Programming languages for server Side Scripting, Configuring the server to support CGI, applications; Input/ output operations on the WWW, Forms processing, (using PERL/VBSCRIPT/JavaSCIPT) UNIT-IV Other dynamic content Technologies: introduction to ASP & JSP, Delivering multimedia over web pages, The VRML idea, The Java phenomenon-applets and servelets, issues and web development. Introduction to Microsoft .NET Technology and its comparison with the competing Technologies. TEXT BOOKS:- Beginning XHTML by Frank Boumpery, Cassandra Greer, Dave Raggett, Jenny Raggett, Sebastian Schnitzenbaumer& ted Wugofski, 2000, WROX press (Indian Shroff Publ. SPD) 1st edition Web Technologies By Achyut S Godbole, Atul Kahate, 2003, T.M.H Internet & World Wide Web How to program by P.J Deitel & H.M Deitel, Pearson REFERENCE BOOKS:- HTML &XHTML:The Definitive Guide by Chuck Musciano, Bill Kennedy, 2000, 4th Edi. XHTML Black Book by Steven Holzner, 2000 CGI Programming on the World Wide Web. OReilly Associates. Internet and Web Technologies Raj Kamal, 2002, T.M.H Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Upon completion of the course the students will be able to Understand, analyze and apply the role of languages like HTML, CSS, XML, JavaScript and protocols in the workings of web and web applications. Create a good, effective and dynamic website using HTML5 and CSS Build Dynamic web site using server side PHP Programming and Database connectivity. Understand the various technologies to build dynamic content of website. . CSE204C OPERATING SYSTEMS B. Tech. Semester I V (Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To understand the mechanisms of OS to handle processes and threads and their communication. To understand the process management mechanisms and scheduling algorithms. To understand the mechanisms involved in memory management in OS and virtual memory concepts. To understand the file management and deadlocks handling techniques in OS. UNIT-I Introduction: Introduction to Operating System Concepts (including Multitasking, multiprogramming, multi user, Multithreading etc)., Generations of operating systems Types of Operating Systems: Batch operating system, Time-sharing systems, Distributed OS, Network OS, Real Time OS; Various Operating system services, architecture, System programs and calls. Monolithic , microkernel operating systems, concept of virtual machine Unix System and Windows NT Overview: Unix system call for processes and file system management, Shell interpreter, Windows NT architecture overview, Windows NT file system. UNIT-II Process Management: Process definition, different states of a process , process state transitions, process control box( PCB), context switching Thread: Definition, Various states, Benefits of threads, Types of threads, Concept of multithreads, Process scheduling, Foundation and Scheduling objectives, Types of Schedulers, Scheduling criteria: CPU utilization, Throughput, Turnaround Time, Waiting Time, Response Time; Scheduling algorithms: Pre-emptive and Non pre-emptive, FCFS, SJF, RR; Multiprocessor scheduling: Real Time scheduling: RM and EDF. UNIT-III Memory Management: Logical & Physical Address Space, swapping, contiguous memory allocation, non-contiguous memory allocation, fixed and variable partitions internal and external fragmentation and compaction; Paging : principle of operation- page allocation page allocation- hardware support for paging, Protection and sharing disadvantages of paging , Segmentation techniques, segmentation with paging; Virtual Memory: basic concepts of VM, management - Demand Paging & Page-Replacement Algorithms; Demand Segmentation. UNIT-IV Process-Synchronization & Deadlocks: Critical Section Problems, semaphores; methods for handling deadlocks-deadlock prevention, avoidance & detection; deadlock recovery. I/O Systems: I/O Hardware, Application I/O Interface, Kernel, Transforming I/O requests, Performance Issues. File System: Different types of files and their access methods, directory structures, various allocation methods, disk scheduling and management and its associated algorithms, Introduction to distributed file system. TEXT BOOKS: 1. Operating System Concepts by Silberchatz et al, 5th edition, 1998, Addison-Wesley. 2. Modern Operating Systems by A. Tanenbaum, 1992, Prentice-Hall. 3. Operating Systems Internals and Design Principles by William Stallings,4thedition, 2001, Prentice-Hall REFERENCE BOOKS : 1. Operating System by Peterson, 1985, AW. 2. Operating System by Milankovic, 1990, TMH. 3. Operating System Incorporating With Unix& Windows By Colin Ritche, 1974, TMH. 4. Operating Systems by Mandrik& Donovan, TMH 5. Operating Systems Advanced Concepts By MukeshSinghal , N.G. Shivaratri, 2003, T.M.H Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course students will learn the following:- Understand the mechanisms of OS to handle processes and threads and their communication. Understand the process management mechanisms and scheduling algorithms. Understand the mechanisms involved in memory management in OS and virtual memory concepts. Understand the file management and deadlocks handling techniques. CSE206C DESIGN AND ANALYSIS OF ALGORITHMSB. Tech. Semester IV (Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To analyze worst-case running times of algorithms based on asymptotic analysis and justify the correctness of algorithms. To apply the algorithms and design techniques to solve problems. To explain the major graph algorithms and their analyses and to employ graphs to model engineering problems. To understand the concepts of tractable and intractable problems and the classes P, NP and NP-complete problems. UNIT-I Introduction: Characteristics of algorithm. Analysis of algorithm: Asymptotic analysis of complexity bounds best, average and worst-case behavior; Performance measurements of Algorithm, Time and space trade-offs, Analysis of recursive algorithms through recurrence relations: Substitution method, Recursion tree method and Masters theorem. UNIT-II Fundamental Algorithmic Strategies: Brute-Force, Greedy, Dynamic Programming, Branch- and-Bound and Backtracking methodologies for the design of algorithms; Illustrations of these techniques for Problem-Solving, Bin Packing, Knap Sack TSP. Heuristics-characteristics and their application domains. UNIT-III Graph and Tree Algorithms: Traversal algorithms: Depth First Search (DFS) and Breadth First Search (BFS); Shortest path algorithms, Transitive closure, Minimum Spanning Tree, Topological sorting, Network Flow Algorithm. UNIT-IV Tractable and Intractable Problems: Computability of Algorithms, Computability classes P, NP, NP-complete and NP-hard. Cooks theorem, Standard NP-complete problems and Reduction techniques. Advanced Topics: Approximation algorithms, Randomized algorithms, Class of problems beyond NP P SPACE TEXT BOOKS: Introduction to Algorithms, 4TH Edition, Thomas H Cormen, MIT Press/McGraw-Hill. Fundamentals of Algorithms E. Horowitz et al. REFERENCE BOOKS: Algorithm Design, 1ST Edition, Jon Kleinberg and vaTardos, Pearson. Algorithm Design: Foundations, Analysis, and Internet Examples, Second Edition, Michael T Goodrich and Roberto Tamassia, Wiley. Algorithms -- A Creative Approach, 3RD Edition, UdiManber, Addison-Wesley, Reading, MA. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course students will be able to:- Analyze worst-case running times of algorithms based on asymptotic analysis and justify the correctness of algorithms. Apply the algorithms and design techniques to solve problems; Explain the major graph algorithms and their analyses. Employ graphs to model engineering problems, Understand the concepts of tractable and intractable problems and the classes P, NP and NP-complete problems. CSE208C DISCRETE MATHEMATICSB. Tech. Semester IV(Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To Use set notation, terms related to sets, relations and functions and to construct induction proofs. To understand the concept of logical equivalence, truthtables, rules of inference and predicate logic. To classify the algebraic structures and evaluate Boolean functions and simplify expressions using the properties of Boolean algebra. To develop a given problem as graph networks and solve with techniques of graph theory and tree concepts. UNIT-I Sets, Relation and Function: Operations and Laws of Sets, Size of a Set, Finite and infinite Sets, Countable and uncountable Sets Cartesian Products, Disjunctive and Conjunctive Normal Form Binary Relation : representation of relations, Partial Ordering Relation, Equivalence Relation, Image of a Set, Function: Sum and Product of Functions, Bijective functions, Inverse and Composite Principles of Mathematical Induction: The Well-Ordering Principle, Recursive definition, The Division algorithm: Prime Numbers, The Greatest Common Divisor: Euclidean Algorithm, The Fundamental Theorem of Arithmetic. UNIT-II Basic counting techniques-inclusion and exclusion, pigeon-hole principle, permutation and combination. Introduction to recurrence relations and generating functions. Propositional Logic: Syntax, Semantics, Validity and Satisfiability, Basic Connectives and Truth Tables, Logical Equivalence: The Laws of Logic, Logical Implication, Rules of Inference, The use of Quantifiers. Proof Techniques: Some Terminology, Proof, Methods and Strategies, Forward Proof, Proof by Contradiction, Proof by Contraposition, Proof of Necessity and Sufficiency. UNIT-III Algebraic Structures and Morphism: Algebraic Structures with one Binary Operation, Semi Groups, Monoids, Groups, Free and Cyclic Monoids and Groups, Permutation Groups, Substructures, Normal Subgroups, Algebraic Structures with two Binary Operation, Rings, Integral Domain and Fields. Boolean algebra and Boolean Ring, Identities of Boolean Algebra, Duality, Representation of Boolean Function, UNIT-IV Graphs and Trees: Graphs and their properties, Degree, Connectivity, Path, Cycle, Sub Graph, Isomorphism, Eulerian and Hamiltonian Walks, Graph Colouring, Colouring maps and Planar Graphs, Colouring Vertices, Colouring Edges, List Colouring, Perfect Graph, definition properties and Example, rooted trees, trees and sorting, weighted trees and prefix codes, Bi-connected component and Articulation Points, Shortest distances. TEXT BOOKS: Kenneth H. Rosen, Discrete Mathematics and its Applications, Tata McGraw Hill Susanna S. Epp, Discrete Mathematics with Applications,4th edition, Wadsworth Publishing Co. Inc. C L Liu and D P Mohapatra, Elements of Discrete Mathematics A Computer Oriented Approach, 3rd Edition by, Tata McGraw Hill. REFERENCE BOOKS: J.P. Tremblay and R. Manohar, Discrete Mathematical Structure and Its Application to Computer Science , TMG Edition, TataMcgraw-Hill Norman L. Biggs, Discrete Mathematics, 2nd Edition, Oxford University Press. Schaums Outlines Series, Seymour Lipschutz, Marc Lipson, Discrete Mathematics, Tata McGraw - Hill Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course students will learn the following:- Use set notation, terms related to sets, relations and functions and to construct induction proofs. Understand the concept of logical equivalence, truthtables, rules of inference and predicate logic. Classify the algebraic structures and evaluate Boolean functions and simplify expressions using the properties of Boolean algebra. Develop a given problem as graph networks and solve with techniques of graph theory and tree concepts. MC201C ENVIRONMENTAL STUDIESB. Tech. Semester III/IV(Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3000Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours UNIT-I The Multidisciplinary Nature of Environmental Studies, .Introduction to Environment: Definition, Scope, and importance of environmental studies; need for public awareness. Environmental Pollution: Definition, Cause and effects of: Air pollution, Water pollution, Soil pollution, Marine pollution, Noise pollution, Role of an individual in prevention of pollution, Pollution case studies UNIT- II Natural Resources: Water resources: over-utilization, floods, drought, dams-benefits and problems; Mineral resources: Use and exploitation, environmental effects; Food resources: changes caused by modern agriculture, fertilizer-pesticide problems, water logging, Energy resources: Growing energy needs, renewable and non renewable energy sources; Land resources: Land as a resource, land degradation, man induced landslides, soil erosion and desertification. UNIT III Ecosystems and Biodiversity: Concept of an ecosystem, Structure and function, Energy flow, Ecological succession, ecological pyramids. Concept of Biodiversity, definition and types, Hot-spots of biodiversity; Threats to biodiversity, Endangered and endemic species of India, Conservation of biodiversity. UNIT IV Social Issues and Environment: Water conservation, rain water harvesting, Environmental ethics: Issues and possible solutions. Climate change, global warming, acid rain, ozone layer depletion, Public awareness. Population growth, variation among nations, Family Welfare Programme. Human Population and the Environment - Population growth, Population explosion, Women and Child Welfare. Field Work - Visit to a local area to document environmental assetsriver/forest/grassland/hill/ mountain. Visit to a local polluted siteUrban/Rural/Industrial/Agricultural. Study of common plants, insects, birds. Study of simple ecosystemspond, river, hill slopes, etc (Field work equal to 5 lecture hours) REFERNCE BOOKS: A Textbook of Environmental Studies byAsthana D.K.and HYPERLINK "https://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=Asthana+Meera&search-alias=stripbooks"Asthana Meera Fundamental Concepts in Environmental StudiesbyMishra D.D. Environmental Studies byS.C Sharma M.P Poonia Textbook of Environmental Studies for Undergraduate byHYPERLINK "https://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Erach+Bharucha&search-alias=stripbooks"Erach Bharucha Environmental Studies: Third Edition byR. Rajagopalan Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: On completion of the course, the students will be able to: Develop concepts of basic environmental factors. Understand the basic issues of ecosystem and its structural and functional aspects and vast biodiversity Outline aspects of environmental issues. Understand the knowledge of energy resources and their environmental implications MC203C CONSTITUTION OF INDIAB. Tech. Semester III/IV(Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3000Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To make students conscious citizens of India and well equip them to explain and understand the importance of constitution of the country Unit I Philosophy of Indian Constitution: Ideological Basis and Salient Features of Indian Constitution, Fundamental Rights & Duties of the Citizens, Directive Principles of State Policy Unit II Nature and Dynamics of Indian Federalism: Federalism: Theory and Practice in India, Federal Features of the Indian Constitution, Legislative, Administrative and Financial Relations between the Union and the States Unit III Union and State Legislature: Parliament: Composition, Functions and Working of the Parliamentary system, State Legislature: Composition and Functions of Vidhan Sabha/ Vidhan Parishad Unit IV Centre and State: Executive and Judiciary: President, Prime Minister and Council of Ministers, Governor, Chief Minister and Council of Ministers, Judiciary: Supreme Court; High Court Scheme of End Semester Examinations (Major Test): The duration of examinations will be three hours. Nine questions of 15 marks each will be set out of which the students will have to attempt five questions in all. First question of 15 marks will be compulsory. It will cover all the four units of the syllabus. The nature of the questions in each unit will depend upon the nature of content therein. The questions may have sub-parts with marks assigned against each. Question No 02 to 09 of 15 marks each will be set from the four units of the syllabus --- two from each unit. In addition to first compulsory question the students will have to attempt four more questions, selecting one from each unit. Recommended Readings: Austin G., The Indian Constitution: Corner Stone of a Nation, New Delhi: Oxford University Press, 1966 Basu D.D., An Introduction to the Constitution of India, New Delhi: Prentice Hall, 1994 Kothari R., Politics in India, New Delhi: Orient Language, 1970 Siwach J.R., Dynamics of Indian Government andPolitics, New Delhi: Sterling Publishers, 1985 Bhambhri C.P., The Indian State--FiftyYears, New Delhi: Shipra, 1997 Ghai U.R., IndianPoliticalSystem, Jalandhar: New Academic Publishing Company, 2010 Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Semester (C-Scheme) in 2019 and all trailing students, Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course students will be able to To understand basic features of the constitution and rights and duties of Indian citizens To understand the basic structure of Centre and State Government To get acquainted with the nature of parliamentary form of Government To have knowledge of the executive and judiciary powers in Indian democratic set-up MGT202C ORGANIZATIONAL BEHAVIOUR B. Tech. Semester IV(Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks3003Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours UNIT-I Introduction: Definition and concept of Organizational Behaviour, nature and scope of OB, elements of OB, contributing disciplines to OB, challenges for OB, evolution of OB. UNIT-II Individual processes: Attitudes, Values; Perception concept, process and applications; Personality - concept, determinants, theories and applications; Learning concept and theories of learning. UNIT-III Team processes: Motivation concept and theories of motivation; Group behaviour concept, types of group, group development, group dynamics; Teams - types, creating effective teams. UNIT-IV Organizational processes and Stress management: organizational structure elements of organizational structure; organizational change concept, resistance to change, managing resistance to change, Lewins three- step model of change; Stress sources, consequences and management. TEXT BOOKS: 1. Robbins Judge and Vohra, Organizational Behaviour, Pearson, New Delhi. 2. Khanka S S, Organizational Behavior, S.Chand& Company Pvt. Ltd., New Delhi. REFERENCE BOOKS : 1. Greenberg Jerald, Behavior in Organizations, PHI, New Delhi. 2. Parikh and Gupta, OrganisationalBehaviour, Mc Graw Hill, New Delhi. 3. PareekUdai, Understanding Organizational Behaviour, Oxford University Press, New Delhi. 4. Aswathappa K., OrganisationalBehaviour, Himalaya Publishing House, New Delhi. 5. Luthans, F. Organizational Behavior, McGraw Hill Education. Note: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For student admitted in B. Tech. 1st Year (C-Scheme) in 2019 and all trailing students. Examinations and evaluation of students shall be conducted as per guidelines AICTE Examinations Reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: On completion of this course, the students will be able to Demonstrate the applicability of the concept of organizational behavior to understand the behavior of people in the organization. Demonstrate the applicability of analyzing the complexities associated with management of individual behavior in the organization. Analyze the complexities associated with management of the group behavior in the organization. Demonstrate how the organizational behavior can integrate in understanding the motivation behind behavior of people in the organization. CSE282C WEB & ITERNET TECHNOLOGIES LAB B. Tech. Semester III (Computer Science and Engg. )LTPCreditsClass Work:25 Marks0042Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To develop web pages using mark up languages like HTML, DHTML and style sheets for making it more presentable to the user. To develop dynamic web pages using client side programming and server side programming. To develop interactive web applications using ASP.NET Framework. To develop PHP programs for interactive web pages List of practicals A Simple HTML home page provide links to move to other pages like hobbies, educational info, personal info etc. A HTML program to illustrate the use of frame and frameset tags of HTML. A HTML Program which use a HTML controls to create a student information form to collect students information like name, address, phone, email, sex, birth date, hobbies etc. Download A HTML Program which demonstrates loops like for loop, do while, while in java script. A HTML Program which demonstrates the use of functions in java script. A HTML Program which demonstrates various events like onclick, ondbclick, onfocus, onblur, onchange, onmouseover, onmouseover, window event, onload, onunload event. A HTML Program to create various functions and sub routines to validate the data entered by user in form. Create a program to illustrate the concept of associative array in PHP. Create PHP program to implement the concept of Session management. Create a PHP program to display student information in webpage. Students data is stored in My SQL database. Create a PHP program to insert student information from HTML form. Students data is stored in My SQL database. Note: More exercises based on CSE202C may be given by the teacher Course Outcomes: After successful completion of the course, the students will be able to: Develop web pages using mark up languages like HTML, DHTML and style sheets for making it more presentable to the user. Develop dynamic web pages using client side programming and server side programming. Develop interactive web applications using ASP.NET Framework. Develop PHP programs for interactive web pages. CSE 284-C OPERATING SYSTEMS LAB B. Tech. Semester IV (Computer Science and Engg)LTPCreditsClass Work:25 Marks41Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To understand the concepts of operating system, features, advantage and disadvantage of different OS. To demonstrate the Process scheduling algorithms in OS. To understand the Windows and Linux administration. To work in shell environment. List of Practicals: Study of WINDOWS 2000 Operating System. Administration of WINDOWS 2000 (including DNS,LDAP, Directory Services). Study of LINUX Operating System (Linux kernel, shell, basic commands pipe & filter commands). Administration of LINUX Operating System. Writing of Shell Scripts (Shell programming). AWK programming. Course Outcomes: On successful completion of the course, the students will be able to: Understand the concepts of operating system, features, advantage and disadvantage of different OS. Demonstrate the Process scheduling algorithms in OS. Understand the concepts of Windows and Linux administration. Work in shell environment. CSE 286-C DESIGN AND ANALYSIS OF ALGORITHMS LABB. Tech. Semester IV (Computer Science and Engg.) w.e.f. 2019-2020LTPCreditsClass Work:25 Marks__42Examination:75 MarksTotal:100MarksDuration of Examination:3 Hours Course Objectives: To develop and code program for the algorithms and analyze it to determine its computational complexity. To identify and analyze worst-case running times of algorithms. To model given engineering problem using graph and trees and write the corresponding algorithm to solve the problems. To strengthen the ability to identify and apply the suitable algorithm for the given real world problem. List of Programs: Sort a given set of elements using the Quick sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the lIst to be sorted and plot a graph of the time taken versus n. The elements can be read from a file or can be generated using the random number generator. Implement a parallelized Merge Sort algorithm to sort a given set of elements and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n. The elements can be read from a file or can be generated using the random number generator. a. Obtain the Topological ordering of vertices in a given digraph. b. Compute the transitive closure of a given directed graph using Warshall's algorithm. Implement 0/1 Knapsack problem using Dynamic Programming. From a given vertex in a weighted connected graph, find shortest paths to other vertices using Dijikstra s algorithm. Find Minimum Cost Spanning Tree of a given undirected graph using Kristal s algorithm. a. Print all the nodes reachable from a given starting node in a digraph using BFS method. b. Check whether a given graph is connected or not using DFS method. Find a subset of a given set S = {sl,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1, 2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution. Implement any scheme to find the optimal solution for the Traveling Salesperson problem and then solve the same problem instance using any approximation algorithm and determine the error in the approximation. Find Minimum Cost Spanning Tree of a given undirected graph using Prim s algorithm. Implement All-Pairs Shortest Paths Problem using Floyd's algorithm. Parallelize this algorithm, implement it using Open and determine the speed-up achieved. Implement N Queen's problem using Back Tracking. Note: More exercises based on CSE 206-C may be given by the teacher Course Outcomes: Upon successful completion of the course students will learn:- Develop and code program for the algorithms and analyze it to determine its computational complexity. Identify and analyze worst-case running times of algorithms. Model given engineering problem using graph and trees and write the corresponding algorithm to solve the problems. Identify and apply the suitable algorithm for the given real world problem. CSE 301C OBJECT ORIENTED PROGRAMMINGB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To familiarize students with basic concepts of object oriented programming To familiarize students with operator overloading, inheritance, virtual functions and friend functions. To familiarize students with advanced concepts of object oriented programming like templates and exception handling UNIT- I Basic Concepts Of Object Oriented Programming:- Procedural Vs. Object oriented Programming, C++ Standard Library, Preprocessor Directives, illustrative Simple C++ Programs. Header Files and Namespaces, library files. Object Oriented Concepts: Introduction to Objects and Classes, Data Abstraction, Encapsulation (Information Hiding), Access Modifiers: Controlling access to a class, method, or variable (public, protected, private), Polymorphism, Inheritance, and Reusability Classes: - Introduction, Structure Vs. Class, Class Scope and Accessing Class Members, Initializing Class Objects: Constructors. UNIT- II Destructors, Friend Functions And Operator Overloading:- Destructors, Static Class Members, Const(Constant) Object And Const Member Functions, Object as Member of Classes, Friend Function and Friend Classes, Using This Pointer, Dynamic Memory Allocation with New and Delete, Container Classes and Iterators, Function overloading Operator Overloading: - Introduction, Fundamentals of Operator Overloading, Restrictions on Operators Overloading, Operator Functions as Class Members vs. as Friend Functions, Overloading Binary Operators (+,-,*, /,=),Overloading Unary Operators(-,++,--,) UNIT- III Inheritance And Virtual Functions:- Introduction, Types of Inheritance, Base Classes And Derived Classes, Virtual Base class, Casting Base Class Pointers to Derived- Class Pointers, Using Member Functions, Overriding Base - Class Members in a Derived Class, Public, Protected and Private Inheritance, Using Constructors and Destructors in derived Classes, Composition Vs. Inheritance, Overloading Vs. Overriding. Run Time Polymorphism, Introduction to Virtual Functions, Pure Virtual Functions, Abstract Base Classes and Concrete Classes, Dynamic Binding, Virtual Destructors, Dynamic Binding. UNIT-IV Files, Templates And Exception Handling: - Files and I/O Streams and various operation on files. Stream Input/output Classes and Objects, Stream Output, Stream Input, Unformatted I/O (with read and write), Stream Manipulators, Stream Format States, Stream Error States. Templates & Exception Handling: - Function Templates, Overloading Template Functions, Class Template, Class Templates and Non-Type Parameters, Templates and Inheritance, Templates and Friends. Basics of C++ Exception Handling: - Try Throwing, Catch, and Throwing an Exception; - Catching an Exception, Re-throwing an Exception, Processing Unexpected Exceptions, Constructors, Destructors and Exception Handling. TEXT / REFERENCE BOOKS: Object Oriented Programming in Turbo C++ by Robert Lafore ,1994, The WAITE Group Press. Programming with C++ By D Ravichandran, 2003, T.M.H 3. Object oriented Programming with C++ by E Balagurusamy, 2001, Tata McGraw-Hill. C++ How to Program by H M Deitel and P J Deitel, 1998, Prentice Hall Computing Concepts with C++ Essentials by Horstmann, 2003, John Wiley, The Complete Reference in C++ By Herbert Schildt, 2002, TMH. C++ Programming Fundamentals by Chuck Easttom, Firewall Media. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, students will be able: To understand the difference between object oriented programming and procedural programming. To understand the basic concepts of object oriented programming To understand and implement C++ features such as Operator overloading, inheritance, virtual functions and friend functions. To understand and apply the concepts of templates and exception handling CSE303C DATABASE MANAGEMENT SYSTEMSB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the different issues involved in the design and implementation of a database system. To study the physical and logical database designs, database modeling, relational, hierarchical, and network models To understand and use data manipulation language to query, update, and manage a Database To develop an understanding of essential DBMS concepts such as: database security, integrity, concurrency, distributed database, and intelligent database, Client/Server (Database Server), Data Warehousing. UNIT- I Database system architecture: - Data Abstraction, Data Independence, Data Definition Language (DDL), Data Manipulation Language (DML). Data models: - Entity-relationship model, network model, relational and object oriented data models, integrity constraints, data manipulation operations. UNIT-II Relational query languages:- Relational algebra, Tuple and domain relational calculus, SQL3, DDL and DML constructs, Open source and Commercial DBMS - MYSQL, ORACLE, DB2, SQL server. Relational database design: - Domain and data dependency, Armstrong's axiom, Normal forms, Dependency preservation, Lossless design. Query processing and optimization: - Evaluation of relational algebra expressions, Query equivalence, Join strategies, Query optimization algorithms. UNIT- III Concurrency control, ACID property, Serializability of scheduling, Locking and timestamp based schedulers, Multi-version and optimistic Concurrency Control schemes, Database recovery. UNIT- IV Authentication, Authorization and access control, DAC, MAC and RBAC models, Intrusion detection, SQL injection. Advanced topics: Object oriented and object relational databases, Logical databases, Web databases, Distributed databases, Data warehousing and data mining. TEXT/REFERENCES BOOKS: Database System Concepts, 6th Edition by Abraham Silberschatz, Henry F. Korth, S. Sudarshan, McGraw-Hill. Principles of Database and Knowledge Base Systems, Vol 1 by J. D. Ullman, Computer Science Press. Fundamentals of Database Systems, 5th Edition by R. Elmasri and S. Navathe, Pearson Education Foundations of Databases, Reprint by Serge Abiteboul, Richard Hull, Victor Vianu, Addison-Wesley Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes After successful completion of the course, students will be able to: Understand basic concepts of database system and data models for relevant problems. Understand the basic elements of a relational database management system. Design entity relationship model and convert entity relationship diagrams into rdbms and formulate SQL queries on the data. Apply normalization for the development of application software. CSE305C COMPUTER NETWORKSB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the concepts, vocabulary and techniques currently used in the area of computer networks. To understand the concepts of the OSI model and the TCP/IP model. To be familiar with wireless networking concepts To be familiar with contemporary issues in networking technologies. UNIT- I OSI Reference Model and Network Architecture: Introduction to Computer Networks, Example Networks ARPANET, Internet, Private Networks, and Network Topologies: Bus, Star, Ring, Hybrid, Tree, Complete, Irregular Topology; Types of Networks: Local Area Networks, Metropolitan Area Networks, Wide Area Networks; layering architecture of networks, OSI model, Functions of each layer, Services and Protocols of each layer. UNIT-II TCP/IP: Introduction, History of TCP/IP, Layers of TCP/IP, Protocols, Internet Protocol, Transmission Control Protocol , User Datagram Protocol, IP Addressing, IP address classes, Subnet Addressing, Internet Control Protocols, ARP, RARP, ICMP, Application Layer, Domain Name System, Email SMTP, POP,IMAP; FTP, NNTP, HTTP, Overview of IP version 6. UNIT-III Local Area Networks: Introduction to LANs, Features of LANs, Components of LANs, Usage of LANs, LAN Standards, IEEE 802 standards, Channel Access Methods, Aloha, CSMA, CSMA/CD, Token Passing, Ethernet, Layer 2 & 3 switching, Fast Ethernet and Gigabit Ethernet, Token Ring, LAN interconnecting devices: Hubs, Switches, Bridges, Routers, Gateways. UNIT-IV Wide Area Networks: Introduction of WANs, Routing, Congestion Control, WAN Technologies, Distributed Queue Dual Bus (DQDB), Synchronous Digital Hierarchy (SDH)/ Synchronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), Frame Relay, Wireless Links Introduction to Network Management: Management, Class of Service, Quality Firewalls, VLANs, Proxy Servers. Remote Monitoring Techniques: Polling, Traps, Performance of Service, Security management, Digital signatures, SSL Text Book/ Reference Books: Computer Networks (3rd edition), Tanenbaum Andrew S., International edition, 1996. Data Communications, Computer Networks and Open Systems (4th edition), Halsall Fred, 2000, Addison Wesley, Low Price Edition. Business Data Communications, Fitzgerald Jerry, Computer Networks A System Approach, Larry L. Peterson & Bruce S. Davie, 2nd Edition. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, students will be able to: Understand the organization of computer networks, factors influencing computer network development and the reasons for having variety of different types of networks. Apply knowledge of different techniques of error detection and correction to detect and solve error bit during data transmission. Design a network routing for IP networks. Demonstrate proper placement of different layers of ISO model and illuminate its function and determine proper usage of the IP address, subnet mask and default gateway in a routed network.  CSE307C FORMAL LANGUAGES & AUTOMATA THEORYB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basic properties of formal languages and formal grammars To understand the basic properties of deterministic and nondeterministic finite automata To understand the basic properties of Turing machines and computing with Turing machines To understand the concepts of tractability and decidability, the concepts of NP-completeness and NP-hard problems UNIT- I Basic Computational Constructs : Finite State Systems, Basic Definitions Non-Deterministic finite automata (NDFA), Deterministic finite automata (DFA), Equivalence of DFA and NDFA Finite automata with E-moves, Regular Expressions, Equivalence of finite automata and Regular Expressions, Regular expression conversion and vice versa. Conversion of NFA to DFA by Ardens Method Concept of basic Machine, Properties and limitations of FSM, Moore and Mealy Machines, Equivalence of Moore and Mealy machines. UNIT-II Regular Sets& Grammars : The Pumping Lemma for Regular Sets, Applications of the pumping lemma, Closure properties of regular sets, Myhill-Nerode Theorem and minimization of finite Automata, Minimization Algorithm. Definition, Context free and Context sensitive grammar, Ambiguity regular grammar, Reduced forms, Removal of useless Symbols and unit production, Chomsky Normal Form (CNF), Griebach Normal Form (GNF). UNIT-III Pushdown Automata &Turing Machines: Introduction to Pushdown Machines, Applications of Pushdown Machines Deterministic and Non-Deterministic Turing Machines, Design of T.M, Halting problem of T.M., Posts Correspondence Problem. UNIT-IV Chomsky Hierarchies &Computability: Chomsky hierarchies of grammars, unrestricted grammars, Context sensitive languages, Relation between languages of classes Primitive Recursive Functions. TEXT BOOK/ REFERENCE BOOKS: Introduction to automata theory, language & computations- Hopcroaft & O.D.Ullman, R Mothwani, Addison Wesley Publishers. Theory of Computer Sc.(Automata, Languages and computation):K.L.P.Mishra& N.Chandrasekaran, 2000, PHI. Introduction to formal Languages & Automata-Peter Linz, 2001, NarosaPubl. Fundamentals of the Theory of Computation- Principles and Practice by RamondGreenlaw and H. James Hoover, 1998, Harcourt India Pvt. Ltd.. Elements of theory of Computation by H.R. Lewis & C.H. Papaditriou, 1998, PHI. Introduction to languages and the Theory of Computation by John C. Martin 2012, T.M.H. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, students will be able to: Master regular languages and finite automata. Master Context free languages, push down automata, and Turing recognizable languages. Understand the theoretical foundations of computer science. Analytically and intuitively solve problems in related areas of theory in computer science. CSE309C SOFTWARE ENGINEERING B. Tech. Semester V (Computer Science and Engg.) L T P Credits Class Work : 25 Marks 3 0 -- 3 Examination : 75 Marks Total : 100 Marks Duration of Examination : 3 Hours Course Objectives: To enable students to apply a systematic application of scientific knowledge in creating and building cost effective software solutions to business and other types of problems. To make students understand different phases to make a software & study them in detail. To make students understand different testing techniques for different projects, making the students understand to develop quality software, its maintenance & software reliability. To make students aware about the design models & its principles (data design, component design, interface design & architectural design). UNIT- I Introduction:- Evolving role of software, Software Characteristics, Software crisis, Software myths, Software process, Software development Models: Waterfall Model, Prototype Model, Spiral, Model, RAD Model, Iterative Model, Incremental Model, Aspect-oriented Model, Agile Methodology: Pair and mob programming, high performance teams with core protocols, test driven development, behaviour driven development, continuous delivery, clean code, refactoring, extreme programming, Scrum. UNIT- II Requirements, Analysis & Specification:- Software Requirements engineering, Requirement Engineering Process, Requirement Engineering Tasks, Types of requirements, SRS. System Modeling:- Data Modeling, Functional modeling and information flow: Data flow diagrams, Behavioral Modeling, The mechanics of structured analysis: Creating entity/ relationship diagram, data flow model, control flow model, the data dictionary. UNIT- III System Design:- Design principles, the design process; Design concepts: Abstraction, refinement, modularity, software architecture, control hierarchy, structural partitioning, data structure, software procedure, information hiding; Effective modular design: Functional independence, Cohesion, Coupling; Design Heuristics for effective modularity, Data Design, Architecture Design, Interface Design. Software Testing And Maintenance:- Testing terminology: error, bug/defect/fault, failure, Verification and validation, Test case design, Static testing, Dynamic testing, Black box testing, Boundary value analysis, White box testing, basis path testing, Unit testing, Integration testing, Acceptance Testing, debugging, debugging process debugging approaches. Software maintenance categories, Models. UNIT- IV Software Quality Models And Standards:- Quality concepts, Software Quality Assurance, SQA activities, Formal approaches to SQA; Statistical software quality assurance; CMM, The ISO 9126 Standard, Configuration Management, Software reengineering, reverse engineering, restructuring, forward engineering, Software Project Management:- Project management concepts, Planning the software project, Software Estimations, empirical estimation COCOMO, staffing, team structures, staffing, risk analysis and management.. TEXT/REFERENCES BOOK: Software Engineering A Practitioners Approach, Roger S. Pressman, 1996, MGH. Fundamentals of software Engineering, Rajib Mall, PHI Software Engineering by Ian sommerville, Pearson Edu., 5th edition, 1999,AW, Software Engineering David Gustafson, 2002, T.M.H Software Engineering Fundamentals Oxford University, Ali Behforooz and Frederick J. Hudson1995, JW&S An Integrated Approach to Software Engineering by Pankaj jalote, 1991, Narosa. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, students will be able to: Understand basic concepts of software engineering, implement Software life cycle models and have knowledge of different estimation models. Understand requirement and modeling concepts in software development. Understand the different design principles of a software project and prepare soft testing strategies. Understand and incorporate the Software Quality standards and build a robust software  CSE381C OBJECT ORIENTED PROGRAMMING LABB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours_______________________________________________________________________________________ Course Objectives: To apply the basic knowledge of Object and classes. To implement features of Object oriented programming like inheritance, polymorphism, operator overloading To apply the concepts of exception handling and templates. List of hands-on experiments related to the course contents of CSE301C. Raising a number n to a power p is the same as multiplying n by itself p times. Write a function called power ( ) that takes a double value for n and an int value for p, and returns the result as double value Use a default argument of 2 for p. so that if this argument is omitted, the number will be squared. Write a main ( ) function that gets values from the user to test this function. Create the equivalent of a four function calculator. The program should request the user to enter a number, an operator, and another number. It should then carry out the specified arithmetical operation: adding. subtracting, multiplying, or dividing the two numbers. (It should use a switch statement to select the operation). Finally it should display the result. When it finishes the calculation, the program should ask if the user wants to do another calculation. The response can be 'Y' or 'N'. Some sample interaction with the program might look like this. Enter first number. Operator, second number: 10/3 Answer = 3.333333 Do another (YI N)? Y Enter first number. Operator, second number 12 + 100 Answer = 11 Do another (Y I N)? N Write a program to overload constructors. Create two classes DM and DB which store the value of distances. DM stores distances in metres and centimeters and DB in feet and inches. Write a program that can read values for the class objects and add one object of DM with another object of DB. Use a friend function to carry out the addition operation. The object that stores the results maybe DM object or DB object. depending on the units in which the results are required. The display should be in the format of feet and inches or metres and centimetres depending on object on display. Write a Program to overload +,-,*,/,+= on a class of complex numbers. Write a Program to overload +,== on a class of strings. Create a class rational which represents a numerical value by NUMERATOR & DENOMINATOR . Write a Program to overload +,- for class of rational . Make a class Employee with a name and salary. Make a class Manager inherit from Employee. Add an instance variable, named department, of type string. Supply a method to toString that prints the manager's name, department and salary. Make a class Executive inherit from Manager Supply a method to String that prints the string Executive followed by the information stored in the Manager superclass object. Supply a test program that tests these classes and methods. Imagine a tollbooth with a class called toll Booth. The two data items of a type unsigned int to hold the total number of cars, and a type double to hold the total amount of money collected. A constructor initializes both these to 0. A member function called payingCar ( ) increments the car total and adds 0.50 to the cash total. Another function, called nopayCar ( ). increments the car. Write a program to create a class template to implement stack operations. Write a program to demonstrate exception handling. Course Outcomes: After successful completion of the course, students will be able to: Develop program using the concepts of object oriented programming like class, objects, constructors and destructors. Develop programs using C++ features such as Operator overloading and Develop programs to illustrate virtual functions and friend functions. Develop programs to apply the concepts of templates and exception handling CSE383C DATABASE MANAGEMENT SYSTEM LAB B. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To have good knowledge of query formation using SQL. To have knowledge of Storage and access techniques of Data from Database. To be familiar with different functions used for data processing in DBMS List of Experiments 1. To study Data Definition language 1.1. Create, alter, drop, truncate 1.2. To implement Constraints. 1.2.1. (a). Primary key, (b).Foreign Key, (c). Check, (d). Unique, (e). Null, (f). Not null , (g) . Default, (h). Enable Constraints, (i). Disable Constraints (j). Drop Constraints 2. To implementation on DML, TCL and DRL 2.1. (a).Insert, (b).Select, (c).Update, (d).Delete, (e).commit, (f).rollback,(g).save point, (h). Like'%', (i).Relational Operator (j) Logical operators 3. To implement Nested Queries & Join Queries 3.1. (a). To implementation of Nested Queries 3.2. (b). (a) Inner join, (b).Left join, (c).Right join (d).Full join(e) Natural Join (f) Theta Join (g) Cross Join 4. To implement Views 4.1. (a). View, (b).joint view, (c).force view, (d). View with check option 5. To implement Index 5.1 (a) Normal Index (b) Unique Index (c) Bitmap Index (d) Composite (e) B-Tree (f) Clustered (g) Non- Clustered 6. To study various Date handling functions and their usage. 7. To Study String Handling Functions with Usage. Case study of oracle 11g with emphasis on RECOVERY Techniques, Concurrency and Transaction Management. Course Outcomes: After successful completion of the course, students will be able: To form queries using SQL. To store and access data from database. To use different data processing functions. CSE385C PROFESSIONAL TRAINING(Level-2) SeminarB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:50 Marks--2 2Total:50 Marks Course Objectives: Acquire knowledge of the industry in which the internship is done. Apply knowledge and skills learned in the classroom in a work setting. To decide the future application areas of Computer Science and Engineering. At the end of 4th semester each student would undergo four weeks Professional Training in an Industry/ institute/ Professional / Organization/ Research Laboratory etc. with the prior approval. The student has to submit a typed report in the department along with a certificate from the organization. The typed report should be in a prescribed format. The report will be evaluated in the 5th Semester by a Committee consisting of three teachers from different specialization to be constituted by the Chairperson of the department. The basis of evaluation will primarily be the knowledge and exposure of the student towards different processes and the functioning of the organization. The student will interact with the committee through presentation to demonstrate his/her learning. Teachers associated with evaluation work will be assigned 2 periods per week load. Course Outcomes: After completing the course the students will have: An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability An ability to work in a multidisciplinary team An ability to identify, formulate, and solve engineering problems An understanding of professional and ethical responsibility. Program Elective I CSE321C COMPUTER GRAPHICSB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks303 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To list the basics concepts used in computer graphics. To implement various algorithms to scan, convert the basic geometrical primitives, transformations, area filling, clipping. To describe the importance of viewing and projections. To design an application with the principles of virtual reality and understand a typical image processing. Unit-I Introduction to Computer Graphics: What is Computer Graphics, Computer Graphics Applications, Computer Graphics Hardware and software, Two dimensional Graphics Primitives: Points and Lines, Line drawing algorithms: DDA, Bresenhams; Circle drawing algorithms: Using polar coordinates, Bresenhams circle drawing, mid point circle drawing algorithm; Filled area algorithms: Scanline: Polygon filling algorithm, boundary filled algorithm. Unit-II Two/Three Dimensional Viewing: The 2-D viewing pipeline, windows, viewports, window to view port mapping; Clipping: point, clipping line (algorithms):- 4 bit code algorithm, Sutherland-cohen algorithm, parametric line clipping algorithm (Cyrus Beck). Polygon clipping algorithm: Sutherland-Hodgeman polygon clipping algorithm. Two dimensional transformations: transformations, translation, scaling, rotation, reflection, composite transformation. Three dimensional transformations: Three dimensional graphics concept, Matrix representation of 3-D Transformations, Composition of 3-D transformation. Unit-III Viewing in 3D: Projections, types of projections, the mathematics of planner geometric projections, coordinate systems. Hidden surface removal: Introduction to hidden surface removal .Z- buffer algorithm , scanline algorithm, area sub-division algorithm. Unit-IV Representing Curves and Surfaces: Parametric representation of curves: Bezier curves, B-Spline curves. Parametric representation of surfaces; Interpolation method. Illumination, shading, image manipulation: Illumination models, shading models for polygons, shadows, transparency. What is an image? Filtering, image processing, geometric transformation of images. TEXT/REFERENCE BOOKS: 1. Computer Graphics Principles and Practices second edition by James D. Foley, Andeies van Dam, Stevan K. Feiner and Johb F. Hughes, 2000, Addision Wesley. 2. Computer Graphics by Donald Hearn and M.Pauline Baker, 2nd Edition, 1999, PHI. 3. Procedural Elements for Computer Graphics David F. Rogers, 2001, T.M.H Second Edition 4. Fundamentals of 3Dimensional Computer Graphics by Alan Watt, 1999, Addision Wesley. 5. Computer Graphics: Secrets and Solutions by Corrign John, BPB 6. Graphics, GUI, Games & Multimedia Projects in C by Pilania & Mahendra, Standard Publ. 7. Computer Graphics Secrets and solutions by Corrign John, 1994, BPV 8. Introduction to Computer Graphics By N. Krishanmurthy T.M.H 2002 Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Understand the basics concepts used in computer graphics. Implement various algorithms to scan, convert the basic geometrical primitives, transformations, area filling, clipping. Understand the importance of viewing and projections. Design an application with the principles of virtual reality and understand a typical image processing. CSE323C PROGRAMMING LANGUAGESB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks303 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the issues involved in programming language design and implementation. To have an in-depth understanding of functional, logic, and object-oriented programming paradigms. Understand design/implementation issues involved with variable allocation and binding, control flow, types, subroutines, parameter passing. To develop an understanding of the compilation and storage process. Unit-I Introduction: Syntactic and semantic rules of a Programming language, Characteristics of a good programming language, Programming language translators compiler & interpreters , Virtual Computers & Binding times; Introduction to procedural, non-procedural ,structured, functional and object oriented programming language, Comparison of C & C++ programming languages. Unit-II Elementary & Structured Data Types : Elementary data types data objects, variable & constants, data types, Specification & implementation of elementary data types, Declarations ,type checking & type conversions , Assignment & initialization, Numeric data types, enumerations, Booleans & characters Structured data types& data Objects , specification & implementation of structured data types, Declaration & type checking of data structure ,vector & arrays, records Character strings, variable size data structures , Union, pointer & programmer defined data objects, sets, files. UnitIII Sequence Control& Data Control:Implicit & explicit sequence control ,sequence control within expressions, sequence control within statement, Subprogram sequence control: simple call return ,recursive subprograms, Exception & exception handlers, co routines, sequence control . Data Control:-Names & referencing environment, static & dynamic scope, block structure, Local data & local referencing environment, Shared data (dynamic & static scope) ; Parameters& parameter transmission schemes. Unit-IV Storage Management& other features: Major run time elements requiring storage, programmer and system controlled storage management & phases, Static storage management, Stack based storage management, Heap storage management, variable & fixed size elements. Evolution of data type concept, abstraction, encapsulation & information hiding, Subprograms, type definitions, abstract data types TEXT/REFERENCE BOOKS: 1. Programming languages Design & implementation by T.W. .Pratt, 1996, Prentice Hall Pub. 2. Programming Languages Principles and Paradigms by Allen Tucker & Robert Noonan, 2002, TMH. 3. Fundamentals of Programming languages by Ellis Horowitz, 1984, Galgotia publications (Springer Verlag), 4. Programming languages concepts by C. Ghezzi, 1989, Wiley Publications. 5. Programming Languages Principles and Pradigms, Allen Tucker, Robert Noonan 2002, T.M.H. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Understand the concepts involved in programming language design and implementation. Understand the functional, logic, and object-oriented programming paradigms. Understand design/implementation issues involved with variable allocation and binding, control flow, types, subroutines, parameter passing. Understand the compilation and storage process. CSE325C WIRELESS COMMUNICATIONB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To know about the evolution of wireless communication systems and various generations of cellular systems. To understand the basic design principles of cellular systems. To understand the advanced multiple access techniques. To understand the diverse reception techniques and applications of cellular networks. UNIT 1: INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS: Evolution of mobile radio communications, examples of wireless comm. systems, paging systems, Cordless telephone systems, comparison of various wireless systems. MODERN WIRELESS COMMUNICATION SYSTEMS: Second generation cellular networks, third generation wireless networks, wireless in local loop, wireless local area networks, Blue tooth and Personal Area networks. UNIT 2: INTRODUCTION TO CELLULAR MOBILE SYSTEMS: Spectrum Allocation, basic Cellular Systems, performance Criteria, Operation of cellular systems, analog cellular systems, digital Cellular Systems. CELLULAR SYSTEM DESIGN FUNDAMENTALS: Frequency Reuse, channel assignment strategies, handoff Strategies, Interference and system capacity, tracking and trade off service, improving coverage and capacity. UNIT 3: MULTIPLE ACCESS TECHNIQUES FOR WIRELESS COMMUNICATION: Introduction to Multiple Access, FDMA, TDMA, Spread Spectrum multiple Access, space division multiple access, packet ratio, capacity of a cellular systems. UNIT 4: WIRELESS NETWORKING: Difference between wireless and fixed telephone networks, development of wireless networks, fixed network transmission hierarchy, traffic routing in wireless networks, wireless data services, common channel signaling, ISDN (Integrated Services digital Networks), advanced intelligent network. INTELLIGENT CELL CONCEPT AND APPLICATION: Intelligent cell concept, applications of intelligent micro-cell Systems, in-Building Communication, CDMA cellular Radio Networks. TEXT/REFERENCE BOOKS: 1. Wireless Communications: Theodore S. Rappaport; Pearsons. 2. Mobile Cellular Telecommunication: W.C.Y.Lee; McGraw Hill 3. Mobile Communications: Jochen Schiller; Pearson Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes After completing the course the student will be able to Understand the evolution of wireless communication systems and various generations of cellular systems. Understand the basic design principles of cellular systems. Understand the advanced multiple access techniques. Understand the diverse reception techniques and applications of cellular networks. CSEH301C NETWORK SECURITY AND CRYPTOGRAPHYB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand cryptography theories; algorithms & systems. To understand the symmetric and asymmetric key algorithms. To understand necessary approaches & techniques to build protection mechanisms in order to secure Computer Networks. Acquire fundamental knowledge on the concepts of different security layers. UNIT- I Introduction: Plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography. UNIT- II Symmetric Key Algorithms:- Introduction, algorithms types and modes, DES, AES. Asymmetric Key Algorithms: Introduction, history of asymmetric key cryptography, RSA symmetric and asymmetric key cryptography together, Digital signature. UNIT- III Internet Security Protocols: Basic concepts, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Hyper Text Transfer protocol (SHTTP), Time Stamping Protocol (TSP), Secure Electronic Transaction (SET), S SL versus SET, Electronic Money, Email Security. UNIT- IV User Authentication And Kerberos:- Introduction, Authentication basics, Passwords, authentication tokens, certificate based authentication, biometric based authentication, Kerberos, key distribution center( KDC), Security handshake pitfalls, single Sign on(SSO) approach. TEXT/ REFERENCE BOOKS: Cryptography and Network Security, 2nd Edition by Atul Kahate, TMH Network Management Principles & Practices by Subramanian, Mani (AWL) SNMP, Stalling, Willian (AWL) SNMP: A Guide to Network Management (MGH) Telecom Network Management by H.H. Wang (MGH) Network Management by U. Dlack (MGH) Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to Compare various cryptographic techniques. Work with symmetric & asymmetric key algorithms. Design secure applications. Inject secure coding in the developed applications. CSEH303C INTRODUCTION TO DATA SCIENCEB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basic concepts of Data science and data pre-processing To analyze data using Statistics and Probability techniques To understand the basic concepts of clustering and classification techniques To understand of the key techniques and theory used in visualization, including data models, graphical perception and techniques for visual encoding and interaction. UNIT- I Introduction:- Benefits and uses of data science and big data , Facets of data , Sources of data, Data collection and APIs, Exploring and fixing data, Data storage and management , data science process, Data pre-processing: Data Cleaning, Data Integration, Data Reduction, Data Transformation and Data Discretization , Data science toolkit. UNIT- II Data analysis:- Introduction, Terminology and concepts, Introduction to statistics, Central tendencies and distributions, Variance, Distribution properties and arithmetic, Samples/CLT Probability: Random experiments, trial, sample space, events. Approaches to probability - classical, empirical, subjective and axiomatic. Theorems on probabilities of events. Addition rules of probability. Conditional probability, independence of events and multiplication rule of probability. UNIT- III Classification:- Basic Concepts, Decision Tree Induction, Bayes Classification Methods, Rule-Based Classification, Model Evaluation and Selection, Techniques to Improve Classification Accuracy, Support Vector Machines, Lazy Learners (or Learning from Your Neighbors) Cluster Analysis:- Basic Concept and Methods Cluster Analysis, Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid-Based Methods, Evaluation of Clustering, Clustering High-Dimensional Data, Clustering Graph and Network Data. UNIT- IV Data visualization:- Introduction, Types of data visualization, Data for visualization: Data types, Data encodings, Retinal variables, Mapping variables to encodings, Visual encodings. TEXT/ REFERENCE BOOKS: Davy Cielen Arno D. B. Meysman Mohamed Ali Introducing data Science, Rachel Schutt and Cathy ONeil, Doing Data Science Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Introduction to DataMining, Person Education, 2007. K.P. Soman, Shyam Diwakar and V. Ajay,Insight into Data mining Theory and Practice, Easter Economy Edition, Prentice Hall of India, 2016. Gupta, Introduction to Data Mining with Case Studies, Easter Economy Edition, Prentice Hall of India, 2006. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to Perform the pre-processing of data and apply mining techniques on it. Analyze data using data using Statistics and Probability techniques Perform clustering and classification techniques Present analyzed data using visualization tools CSEH381C NETWORK SECURITY AND CRYPTOGRAPHY LABB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks --4 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To provide deeper understanding into cryptography, its application to network security, threats/vulnerabilities to networks and countermeasures. To explain various approaches to Encryption techniques, strengths of Traffic Confidentiality, Message Authentication Codes. To familiarize symmetric and asymmetric cryptography Design secure applications Lab Exercises to be given by the concerned faculty based on the subject CSEH301C Network Security and Cryptography COURSE OUTCOMES: At the end of this course students will be able to: 1. Identify basic security attacks and services 2. Use symmetric and asymmetric key algorithms for cryptography 3. Make use of Authentication functions. 4. Design secure applications CSEH383C PYTHON FOR DATA SCIENCE LABB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks --4 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: Implementation of basic constructs of Python programminglanguage. Familiarize with the strings and inbuilt functions. Retrieval operations on data using lists, dictionaries, tuples andsets. Learning the usage of regular expressions and built-in functions to navigate the filesystem. To implement Object-oriented Programming concepts inPython. The students should do the following: Application of various control flow constructs To learn application of various string handling functions. Introduction Regular expression with operations Implantation of List and various operations on it . Implementation of Array & its operations using Numpy package. Implementation of Dictionary with operations. Implementation of User Defined functions in Python Implementation of Exception Handling concepts Implementation of File handling operations Implementation of object oriented features: Class & Instances Introduction to Series in Python Pandas library Introduction to Dataframes with basic operations. Text / Reference Books Gowrishankar S, Veena A,Introduction to Python Programming,1st Edition,CRCPress, Taylor&Francis, 2018.ISBN-13:978-0815394372 Chun, J Wesley, Core Python Programming, Second Edition, Pearson, 2007 Reprint 2010. Jake VanderPlas,Python Data Science Handbook: Essential Tools for Working with Data,1st Edition, O'Reilly Media, 2016.ISBN-13:978-1491912058 Wesley J Chun,Core Python Applications Programming,3rd Edition, Pearson Education India, 2015.ISBN-13:978-9332555365 Miguel Grinberg,Flask Web Development: Developing Web Applications with Python,2nd Edition, O'Reilly Media, 2018.ISBN-13:978-1491991732 Course Outcomes: At the end of this course students will be able to: Implement constructs, strings and inbuilt functions in Python. Retrieve data using lists, dictionaries, tuples andsets. Navigate file system using regular expression and built in functions. Use Object-oriented Programming concepts inPython CSE302C COMPILER DESIGNB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: Apply the knowledge of lex tool & yacc tool to develop a scanner & parser. Design and conduct experiments for Intermediate Code Generation in compiler. Develop program to solve complex problems in compiler Learn the new code optimization techniques to improve the performance of a program in terms of speed and space. UNIT-I Introduction: Compilers and translators need of translators, structure of compiler: its different phases, Compiler construction tools. Lexical Analysis: Role of lexical analyzer; Design of lexical analyzer; Regular expressions ;Specification and recognition of tokens; Input buffering; Finite automata; Conversion from regular expression to finite automata, and vice versa; Minimizing the number of states of DFA, Implementation of lexical analyzer. UNIT-II Syntactic Techniques & Parsing: Context free Grammars; Derivations & parse trees; Capabilities of CFGs; Role of parsers, Shift- Reduce Parsing ; Operator precedence parsing; top down parsing; predictive parsing, LR parsers; LR(0) items SLR, LALR and Canonical LR parser. UNIT-III Syntax Directed Translation , Symbol Table & Error Handling : Syntax directed definition, construction of syntax trees, syntax directed translation scheme, implementation of syntax directed translation, Intermediate Code ;Parse trees & Syntax trees; Three address code, quadruples and triples; Translation of Boolean Expressions. Symbol tables, its contents and data structure for symbol tables; trees, arrays, linked lists, hash tables ; Operations on symbol table; Errors( lexical phase error, syntactic phase error, semantic error). UNIT-IV Code Optimization & Code Generation: Sources of code optimization; Loop optimization ( Denominators, Reducible flow graphs, depth first search, loop invariant computation, Induction variable elimination ) ; Directed acyclic representation of basic blocks Code generation, forms of objects code, machine dependent code, register allocation for temporary and user defined variables; Problems in code generation; Peephole optimization. TEXT / REFERENCE BOOKS: Compilers Principle, Techniques & Tools - Alfread V. AHO, Ravi Sethi& J.D. Ullman; - 1998Addison Wesley. Theory and practice of compiler writing, Tremblay & Sorenson, 1985, Mc. Graw Hill. System Software by Dhamdhare, 1986, MGH. Principles of Compiler Design, Alfred V Aho , Jeffery D. Ullman , Narosa Publication Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Students will get the concepts of Compilers and the actual roles of the lexical analyzer Students will get the concepts of different Parsing techniques and Construction of syntax trees Students will get the concepts of Type checking and Run time environments Students will get the concepts of Intermediate code generation, Code optimization and Code generations. CSE324C MOBILE APPLICATIONS DEVELOPMENTB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basics of mobile computing devices and applications types. To understand the mobile communication mechanisms. To understand the communication mechanisms via Web To understand the designing mechanisms of mobile applications for different platforms. UNIT-I Introduction to Mobile Application Development: Definition of mobile computing, various types of mobile computing devices (mobile computers, smart phones and dedicated devices). Web based applications, Native applications and Compare and contrast web-based mobile applications against native applications, history of mobile platforms (PDAs, Notebooks, Smartphones. Internet protocols for mobile applications i.e. WAP), evolution of browsers and Internet languages such as HTML and JavaScript. UNIT-II Infrastructure: Describe mobile and cell phone technologies (CDMA, GSM, 3G, 4G), Compare and contrast 3G and 4G, Internet terms: IP address, subnet mask, gateway, DNS, static vs Dynamic IP, transport including HTTP, routing, secure connections, proxies and reverse proxies. Need for storage, local Storage, storage on Web. UNIT-III HTML/CSS/DOM and Scripting: Basic HTML: validation, rendering and web browser, Cascading Style Sheets (CSS) and how to use them, document object model (DOM): document, objects, model, DOM tree and DOMs utilization in web design, basic JavaScript code and constructs of the JavaScript language. UNIT-IV Designing mobile user interfaces and Mobile Platforms: Design mobile interfaces, usability, ways to test user interfaces, various types of user interfaces for mobile apps: Interactive voice response (IVR), SMS/MMS, Mobile web, Native applications, Hybrids, mobile application development design considerations: Text entry, screen size, user interface and user context. Mobile Platforms: URIs for mobile apps, Compare and contrast native mobile platforms such as tightly controlled (IPhone), open (Android), and licensed (Windows Mobile), web as a mobile application platform. Text Book: Lauren Darcey and Shane Conder, Android Wireless Application Development, Pearson Education, 2nd ed. (2011) Reference Books: 1. Reto Meier, Professional Android 2 Application Development, Wiley India Pvt Ltd (2011) 2. Mark L Murphy, Beginning Android, Wiley India Pvt Ltd(2009) 3. Sayed Y Hashimi and Satya Komatineni, Pro Android, Wiley India Pvt Ltd(2009) 4. Brian Fling, Mobile Design and Development: Practical concepts and techniques for creating mobile sites and web Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Have an understanding of mobile computing devices and applications types for designing the simple mobile applications. Have an ability to identify the need of mobile communication mechanisms. Have an understanding of communication mechanisms via Web Have the knowledge for designing mechanisms of mobile applications for different platforms. CSE326C DIGITAL IMAGE PROCESSINGB. Tech. Semester V (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn and understand the fundamentals of digital image processing. To learn and understand various image Transforms. To learn and understand Image Enhancement Techniques. To learn image restoration Techniques and methods, image compression and Segmentation used in digital image processing. UNIT- I Digital Image Fundamental: - Elements of visual perception, image sensing and acquisition, image sampling and quantization, basic relationships between pixels neighborhood, adjacency, connectivity, distance measures. UNIT- II Image Enhancements, Filtering And Restoration:- Enhancement in spatial domain; pixel grey level transformation, image negatives, logarithmic transformation; bit-plane slicing, histogram processing; enhancement in frequency domain; image smoothing (low pass filter), image sharpening (high pass filter), selective filtering (band pass and band reject filters); noise models for images, signal-to-noise ratio, image restoration in the presence of noise using spatial filtering, periodic noise reduction by frequency domain filtering; estimating the degradation function, inverse filtering. UNIT- III Color Image Processing & Image Segmentation:- Color fundamentals, color models, RGB, CMY and CMYK color models, HSI model; pseudocolor image processing, basics of full color processing, color transformations, smoothing and sharpening; noise in color images, grey level to color transformation; Image Segmentation: fundamentals, edge-based segmentation; image thresholding, intensity thresholding; basic global thresholding, multi-variable thresholding. UNIT- IV Image Compression:- Redundancyinter-pixel and psycho-visual; Loss less compression predictive, entropy; Lossy compression- predictive and transform coding; Discrete Cosine Transform; Still image compression standards JPEG and JPEG-2000. TEXT AND REFERENCE BOOKS: R.C. Gonzalez and R.E. Woods, Digital Image Processing, Second Edition, Pearson Education 3rd edition 2008. Anil Kumar Jain, Fundamentals of Digital Image Processing, Prentice Hall of India.2nd edition 2004. Murat Tekalp , Digital Video Processing" Prentice Hall, 2nd edition 2015. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, students will demonstrate the ability to: Represent various types of images and analyze them. Process these images for the enhancement of certain properties or for optimized use of the resources. Work with colored images and perform image segmentation. Develop algorithms for image compression and coding. CSE328C ADVANCED JAVAB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To study the fundamental concepts of programming in Java including the designing of interactive applications. To learn the concepts of connecting with databases. To gain the insights of servlet concept. To understand the fundamental concepts of JSP. UNIT-I Introduction: Concepts of Classes and Objects, Constructors, Inheritance, Function Overloading, Polymorphism, Packages and Interfaces, exception handling, file streams and their manipulation. AWT & Applet Programming Design of User Interfaces: Swing, Japplet, Icons and Labels, Text Fields, Buttons, Jbutton Class, Check Box, Radio Buttons, The Container, Panel, Windows, and Frame Classes, Combo Box, Tabbed Panes, Scroll Panes, Trees, Tables, Custom Rendering of Jlist Cells. UNIT-II JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, working with statements, Creating and Executing SQL statements, working with Result Set Object & Result Set Meta Data. Java Beans: Java Bean, Installing, Starting Bean Development Kit, Use of JAR files and the use of Java Beans API. UNIT-III Servlets: Introduction to Servlets, Life cycle of Servlets, Creating, Compiling and running servlet, Reading the servlet Parameters, Reading Initialization parameter, Packages- javax.servletPackage, Handling HTTP Request and Response (GET / POST Request), Cookies and Session Tracking. UNIT-IV JSP: JSP Architecture, JSP Access Mode, JSP Syntax Basic (Directions, Declarations, Expression, Scriplets and Comments, JSP Implicit Object, Object Scope, Synchronization Issue, Session Management. Text/Reference Books: 1. Gary Cornell and Horstmann Cay S., Core Java, Vol I and Vol II, Sun Microsystems Press. 2. Herbert Schildt, Java: The Complete Reference, McGraw-Hill. 3. Philip Hanna, JSP: The Complete Reference, McGraw-Hill. 4. Deital and Deital, Java How to Program, Prentice Hall (2007). Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Have an ability to apply the core Java concepts for designing applications. Have an ability to use the Java concepts for accessing a database. Have an ability to understand the utility of server side technologies. Have basic understanding and knowledge of JSP. CSE330C IoT ARCHITECTURE & PROTOCOLS B. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basics of IoT. To learn IoT Architecture and enabling technologies To know about IoT protocols at different layers To know about the application areas of IoT UNIT- I Introduction to IoT:- Introduction to IoT, Market Trends, Opportunities in IoT, Characteristics of IoT, Physical design of IoT, Logical design of IoT: Functional blocks of IoT, Difference between IoT and M2M, Software defined Network(SDN) for IoT, Network Function Virtualization(NFV) for IoT, Data Handling and Analytics, Challenges in IoT(Design, Development, Security). An IoT Security Framework,SDN and NFV over IoT Deployment , IoT entities---Sensors,actuators,gateway,cloud,Mobile/web apps. UNIT- II IOT Architecture And enabling technologies- IoT Architecture:- IoT-An Architectural Overview Building an architecture, Main design principles and needed capabilities, An IoT architecture outline, standards considerations, IoT communication Architecture, IoT Communication models & APIs, Reference Model- IoT reference Model, IoT Reference Architecture- Introduction, Functional View, Information View, Deployment and Operational View, SOA based Architecture, API-based Architecture, OPENIoT Architecture for IoT/Cloud Convergence.. IOT Enabling Technologies:- Introduction to Big Data Analytic, Embedded Systems, Cloud Computing-Cloud Service Management and IOT - Connecting IOT to cloud Cloud Storage for Iot ,Wireless Sensor Networks- Industrial sensors, Integrated IoT Sensors, Sensors' Swarm UNIT- III IoT protocols:-Wireless communication protocols: Wifi, IPV4/IPV6, 6LOWPAN, ZigBee(IEEE802.15.4), Bluetooth, Bluetooth Low Energy(BLE) Application layer protocols: MQTT/MQTTS, CoAP, REST/HTTP,XMPP,SCADA Authentication Protocols; IEEE 802.15.4., comparison of the different IoT protocols, advantages and disadvantages (limitations) of these IoT protocols. UNIT- IV Applications of IoT And Research Perspective:- IoT Strategic Research and Innovation Directions , Domain specific applications of IoT, Home automation, Surveillance applications, Industrial IoT,IoT in Energy, IoT in Healthcare, Internet of Robotic Things, Green IoT, home, infrastructures, buildings, security, Industries, Home appliances,Internet of Nano Things,IoT application in Drones, Internet of Vehicles(IoV),Internet of Everything(IoE) TEXT/REFERENCES: Vijay Madisetti, Arshdeep Bahga, Internet of Things: A Hands-OnApproach Waltenegus Dargie,Christian Poellabauer, "Fundamentals of Wireless Sensor Networks: Theory andPractice" Cuno Pfister, Getting Started with the Internet of Things, O Reilly Media, 2011, ISBN: 978-1-4493- 9357-1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,  IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, CISCO Press, 2017 Hersent, Olivier, David Boswarthick, and Omar Elloumi. The internet of things: Key applications and protocols. John Wiley & Sons, 2011. Buyya, Rajkumar, and Amir Vahid Dastjerdi, eds. Internet of Things: Principles and paradigms. Elsevier, 2016. Dr. Guillaume Girardin , Antoine Bonnabel, Dr. Eric Mounier, 'Technologies & Sensors for the Internet of Things Businesses & Market Trends 2014 - 2024',Yole Dveloppement Copyrights ,2014 Editors OvidiuVermesan Peter Friess,'Internet of Things From Research and Innovation to Market 4. 4.Deployment', River Publishers, 2014 Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: On successful completion of the course, the student will: Comprehend the essentials of IoT Understand IoT Architecture & enabling technologies Understand various IoT protocols Understand IoT applications in different domain and be able to analyze their performance. CSEH306C INFORMATION SECURITY AND DATA HIDINGB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75 MarksTotal:100 MarksDuration of Examination:3 HoursCourse Objectives: To learn about data hiding applications and their techniques. To learn about hacking. To learn security based protocols, attacks and intrusions. To work with advance data hiding techniques. UNIT- I Introduction: - The need for security, security approach, principles of security, types of attack, denial of service, IP spoofing, Phishing. Digital signature, Firewall. UNIT- II Hacking:- Basics, Email hacking, computer hacking, types of hacking, practice against hacking, Access Authorization, Compression, LZW Compression and Decompression Method. UNIT- III Data hiding:- Terms related to data hiding, Differences between cryptography, stenography & watermarking, history of stenography. Applications of data hiding. UNIT- IV Advance data hiding techniques :- Transform domain, difference between special domains and transform domain, wavelets, advantages of wavelet, and wavelet based techniques for data hidings. TEXT REFERENCE BOOKS: Cryptography and Network Security by Atul Khat e, Mc Graw Hill Publisher E-mail Hacking by Ankit Fadia, Vikash Publishers Data communication and Networking , Behrouz A. Forouzan . Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Explain information security. Give an overview of access control of relational databases. State the basic concept in information systems security, including security technology and principles, software security and trusted systems and IT security management. Learn advance data hiding techniques. CSEH310C DATA ANALYTICS WITH PYTHONB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours  Course Objectives: To get the students familiar about the Concepts of Descriptive Statics through tests. To study the concepts of Inferential Statistics and ANOVA. To study in detail the techniques and history of Data Visualization. To study the basic and concepts of Big Data Analytics, Data Mining and Clustering. UNIT-I Descriptive Statistics:- Statistical Analysis of Data, Descriptive Statistics, Frequency Distributions, Histograms, Histograms, Shapes of Distributions, Measures of Central Tendency Computing the Mean, Measuring Variability, Measures of Relationship, Reliability Indices, Standard Scores (Z-scores),Inferential Statistics, Populations and Samples, Sampling Techniques. UNIT-II Inferential Statistics:- Hypothesis testing, chi square test and T-test, Statistical decisions, Statistical decision process, Testing for mean differences, statistical versus practical significance, Effect of sample size, Regression (single). UNIT-III Data Visualization:- Data Visualization: Meaning and significance, Traits of Meaningfull Data, Brief History of Information Visualization, Power of visual perception, Making abstract data Visible, Building Blocks of information Visualization, Analytical Techniques. UNIT-IV Big Data, Data Mining & Clustering:- Big Data, In-memory processing, limitations of In-memory processing, Data mining process along-with techniques, Tools and platforms for data mining, Clustering and its techniques (K-means, Agglomerative, Hierarchical clustering, and DBSCAN). TEXT/ REFERENCES BOOKS: Prem S. Mann, Introductory Statics, Wiley. Anil Maheshwari, Data Analytics, Mcgraw Hill. Hastie, Trevor et al. The elements of statistical learning. Vol. 2. No. 1. New York: springer, 2009. Montgomery, Douglas C., and George C. Runger, Applied statistics and probability for engineers John Wiley & Sons,2010. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007. Pang-Ning Tan et al, Introduction to Data Mining, Pearson. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completion of the course: Students will be able to understand the Statistical analysis methods. Students will be able to understand the Inferential Statistics and ANOVA. Students will be able to understand the details of Data Visualization. Students will be able to understand the concepts of Big Data Analytics, Data Mining and Clustering. CSE340C ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basic concepts of AI and problem solving To analyze and formalize the problem as a state space, graph, design heuristics and select amongst different search techniques to solve them To represent knowledge and draw inferences To explore learning techniques and existing expert systems UNIT- I Introduction: The AI problems; what is an AI technique; Characteristics of AI applications Problem Solving, Search and Control Strategies General Problem solving; Production systems; Control strategies: forward and backward chaining Exhaustive searches: Depth first Breadth first search. UNIT- II Heuristic Search Techniques: Hill climbing; Branch and Bound technique; Best first search and A* algorithm; AND/OR Graphs; Problem reduction and AO* algorithm; Constraint Satisfaction problems Game Playing Minmax search procedure; Alpha-Beta cutoffs; Additional Refinements UNIT- III Knowledge Representation & Reasoning:- Propositional logic, First order predicate logic, Inference in FOPL, Skolemnisation; Resolution Principle and Unification; Forward & Backward chaining, Inference Mechanisms Horns Clauses; Semantic Networks; Frame Systems and Value Inheritance; Conceptual Dependency UNIT- IV Learning Techniques: - Supervised and unsupervised learning, Decision trees, Statistical learning models, Reinforcement learning. Expert Systems: Introduction to Expert Systems, Architecture of Expert Systems; Expert System Shells; Knowledge Acquisition; Case Studies: MYCIN, Learning, Rote Learning; Learning by Induction; Explanation based learning. TEXT/REFERENCES BOOKS: Elaine Rich and Kevin Knight: Artificial Intelligence- Tata McGraw Hill. Dan W.Patterson, Introduction to Artificial Intelligence and Expert Systems- Prentice Hall of India. Nils J.Nilsson: Principles of Artificial Intelligence- Narosa Publishing house. Artificial Intelligence : A Modern Approach, Stuart Rusell, Peter Norvig, Pearson Education Artificial Intelligence, Winston, Patrick, Henry, Pearson Education Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completion of course, students would be able to: Analyze and formalize problem and solve them using AI techniques Use Heuristic search techniques for game playing and other problems Represent diverse knowledge using AI and analyze Understand and design an expert system CSE342C ADVANCED COMPUTER NETWORKSB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To educate concepts, vocabulary and techniques currently used in the area of computer networks. To master the terminology and concepts of socket programming. To be familiar with wireless networking concepts To be familiar with contemporary security issues in networking technologies. UNIT-I Binding Protocol Address: Address Resolution Protocol & RARP, ARP & RARP, packet format, Encapsulation. Internet protocol: Introduction, Ipv4 header, Ipv4Datagrams, Encapsulation, Fragmentation and Reassembly, IP routing, Subnet addressing, Subnet mask, Supernetting-special case of IP addresses IPv6-Motivation, frame format and addressing, comparison of IPv4 and IPv6. UNIT-II Socket Programming: Creating sockets, Posix data type, Socket addresses, Assigning address to a socket, Java socket programming, Thread programming, Berkeley Sockets: Overview, socket address structures, byte manipulation & address conversion functions, elementary socket system calls socket, connect, bind, listen, accept, fork, exec, close, TCP ports (ephemeral, reserved), Berkeley Sockets: I/O asynchronous & multiplexing models, select & poll functions, signal & fcntl functions, socket implementation (client & server programs), UNIX domain protocols. UNIT-III GSM Overview, GSM Network signaling, GSM Mobility Management, GSM Short Message Service, Mobile Number portability General Packet Radio Service: Functional Groups, Architecture, GPRS Network nodes and Interfaces, Introductory ideas about WAP. UNIT-IV Network Security Practice: Authentication Applications- Kerberos, X.509 Authentication Service; Electronic Mail Security-Pretty Good Privacy, S/MIME; IP Security- IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations; Web Security- Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Secure Electronic Transaction. TEXT/REFERENCE BOOKS 1. Jawin, Networks Protocols Handbook, Jawin Technologies Inc., 2005. 2. Bruce Potter and Bob Fleck, 802.11 Security, OReilly Publications, 2002. 3. Ralph Oppliger SSL and TSL: Theory and Practice, Arttech House, 2009. 4. Forouzen, Data Communication and Networking, TMH 5. Behrouz A.Forouzan, TCP/IP Protocol Suite 6. William Stalling, Network Security Essentials, 2nd Edition. PHI New Delhi Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Have an understanding of the concepts, vocabulary and techniques currently used in the area of computer networks. Have an ability of terminologies and concepts of socket programming. Have knowledge of wireless networking concepts. Have the understanding of contemporary security issues in networking technologies. CSE344C SOFTWARE TESTINGB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To study fundamental concepts in software testing, including software testing objectives, process, criteria, strategies, and methods. To learn how to planning a test project, design test cases and data, conduct testing operations, manage software problems and defects, generate a testing report. To expose the advanced software testing topics, such as object-oriented software testing methods, and component-based software testing issues, challenges, and solutions. To gain the techniques and skills on how to use modern software testing tools to support software testing projects. UNIT- I Introduction:- What is software testing and why it is so hard?, Error, Fault, Failure, Incident, Test Cases, Testing Process, Limitations of Testing, No absolute proof of correctness, Overview of Graph Theory. Functional Testing:- Boundary Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause Effect Graphing Technique. UNIT- II Structural Testing:- Path testing, DD-Paths, Cyclomatic Complexity, Graph Metrics, Data Flow Testing, Mutation testing. Testing Activities:- Unit Testing, Levels of Testing, Integration Testing, System Testing, Debugging, DomainTesting. UNIT- III Reducing the number of test cases:- Prioritization guidelines, Priority category, Scheme, Risk Analysis, Regression Testing, and Slice based testing. Object Oriented Testing:- Issues in Object Oriented Testing, Class Testing, GUI Testing, Object Oriented Integration and System Testing. UNIT- IV Testing Tools: Static Testing Tools, Dynamic Testing Tools, and Characteristics of Modern Tools and Implementation with example. Advanced topics in software testing: web based testing, Client server testing, Automated test cases generation, Regular expression and FSM based testing. TEXT/ REFERENCE BOOKS: William Perry, Effective Methods for Software Testing , John Wiley & Sons, New York, 1995. Cem Kaner, Jack Falk, Nguyen Quoc, Testing Computer Software , Second Edition, Van Nostrand Reinhold, New York, 1993. Boris Beizer, Software Testing Techniques , Second Volume, Second Edition, Van Nostrand Reinhold, New York, 1990. Louise Tamres, Software Testing , Pearson Education Asia, 2002 Roger S. Pressman, Software Engineering A Practitioners Approach , Fifth Edition, McGraw-Hill International Edition, New Delhi, 2001. Boris Beizer, Black-Box Testing Techniques for Functional Testing of Software and Systems , John Wiley & Sons Inc., New York, 1995. K.K. Aggarwal & Yogesh Singh, Software Engineering , New Age International Publishers, New Delhi, 2003. Marc Roper, Software Testing , McGraw-Hill Book Co., London, 1994. Gordon Schulmeyer, Zero Defect Software , McGraw-Hill, New York, 1990. Watts Humphrey, Managing the Software Process , Addison Wesley Pub. Co. Inc., Massachusetts, 1989. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Have an ability to apply software testing knowledge and engineering methods and design and conduct a software test process for a software testing project. Have an ability to identify the needs of software test automation, and define and develop a test tool to support test automation. Have an ability to use various communication methods and skills to communicate with their teammates to conduct their practice-oriented software testing projects. Have basic understanding and knowledge of contemporary issues in software testing, such as component-based software testing problems CSEH304C FOUNDATIONS OF BLOCKCHAIN TECHNOLOGYB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To introduce basic concepts of Blockchain. To understand abstract models for Blockchain technology To learn about usage of Blockchain technology in financial services. To visualize the scope of blockchain & its role in futuristic development. Introduction to Blockchain:- Overview of blockchain, need for blockchain, history of centralized services, trusted third party, Distributed consensus in open environments, Distributed Vs Decentralized Network, 51 % attack theory, Public blockchains, Private blockchains, Blockchain Architecture and working, Mining, Limitations of blockchain, Applications of blockchain UNIT- II Models for blockchain:- GARAY model, RLA Model, Proof of Work (PoW), HashcashPoW, PoW Attacks and the monopoly problem, Proof of Stake(PoS), hybrid models(PoW+PoS), Proof of Burn and Proof of Elapsed Time. UNIT- III Permissioned Blockchain:- Permissioned model and use cases, Design issues for Permissioned blockchains, State machine replication, Consensus models for permissioned blockchain, Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over Asynchronous systems. UNIT- IV Blockchain in Financial Service:- Digital Currency, Cross border payments, Steller and Ripple protocols, Project Ubin, Know Your Customer (KYC), Privacy Consents, Mortgage over Blockchain, Blockchain enabled Trade, We Trade Trade Finance Network, Supply Chain Financing, Insurance. Blockchain Security: Security properties, Security considerations for Blockchain, Intel SGX, Identities and Policies, Membership and Access Control, Blockchain Crypto Service Providers, Privacy in a Blockchain System, Privacy through Fabric Channels, Smart Contract Confidentiality. TEXT/REFERENCES BOOKS: Blockchain: Blueprint for a New Economy, by Melanie Swan. Blockchain: The blockchain for beginners guide to blockchain technology and leveraging blockchain programming, by Josh Thompsons Blockchain Basics by Daniel Drescher, Apress Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, students will develop understanding for: Recognizing goals of Blockchain. Smart Contracts, transactions in Blockchain and Permissioned Blockchain. Analyzing usage of Blockchain in finance. Security issues in Blockchain. CSEH302C CRYPTOCURRENCY WITH ETHEREUMB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 HoursCourse Objectives: To introduce the concepts of cryptocurrency. To understand working of Bitcoin and Ethereum To study the security issues and safeguards related to bitcoin trading To study governing cryptocurrency regulations and its impact on economy. UNIT- I Cryptocurrency:- History, Distributed Ledger Technology (DLT), cryptocurrency in blockchain, Cryptographic basics for cryptocurrency: overview of Hashing, signature schemes, encryption schemes and elliptic curve cryptography UNIT- II Bitcoin:- Creation of coins, Wallet, Genesis Block, Merkel Tree, Bitcoin Scripts, Bitcoin P2P Network, hardness of mining, Transaction in Bitcoin Network, transaction verifiability, anonymity, forks, payments and double spending, Consensus in a Bitcoin network, mathematical analysis of properties of Bitcoin, Bitcoin protocols Bitcoin Mining strategy and rewards, life of a Bitcoin Miner, Mining Difficulty, Mining Pool. UNIT- III Ethereum:- Ethereum Virtual Machine ( EVM), Wallets for Ethereum, Ethereum Programming Language: Solidity, Smart Contracts, The turing completeness of smart contract languages, attacks on smart contracts, Ethereum Construction, DAO, GHOST, Vulnerability, Attacks, Sidechain: another type of blockchain, Namecoin UNIT- IV Cryptocurrency Regulation:- Stakeholders, Roots of Bitcoin, Bitcoin scripting vs Ethereum smart contracts, Legal Aspects - Cryptocurrency Exchange, Black Market and Global Economy, Global Acceptability perspective TEXT/REFERENCES BOOKS/ARTICLES Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction by Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder, Princeton University Press (July 19, 2016). Mastering Bitcoin: Unlocking Digital Cryptocurrencies by Antonopoulos Bitcoin: A Peer-to-Peer Electronic Cash System by Satoshi Nakamoto ETHEREUM: A Secure Decentralized Transaction Ledger by Gavin Wood, Yellow paper.2014. A survey of attacks on Ethereum smart contracts by Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, students will develop understanding for: Cryptocurrency : Bitcoin and Ethereum Building efficient blockchain models to carry out tasks with the practical approach. Evaluating the use and risks involved with cryptocurrency Smart contracts and their implications. CSEH308C MOBILE AND SMART PHONE FORENSICSB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand mobile device forensics. To learn different types of digital evidence. To gain knowledge of different system like and roid and ios. To understand mobile file system & data structures. UNIT- I Mobile Forensic:- Cell phone and mobile device forensics, Understanding Mobile device forensics, Understanding acquisition procedure ,Cell phone Crimes, SIM Architecture, Data Storage, Data Extraction, Files Stored on SIM, Mobile Operating System. UNIT- II Digital Evidence:- Mobile Device Forensics, Types of Evidence on Mobile Devices, Handling Mobile Devices as Sources of Evidence, Forensic Preservation of Mobile Devices, Forensic Examination and Analysis of Mobile Devices, Forensic Acquisition and Examination of SIM Cards, Investigative Reconstruction Using Mobile Devices Future Trends. UNIT- III Andriod and IOS Systems:- Architecture, Differentiation, Technological Composition, Introduction to Andriod Platform, Introduction to IOS Platform. UNIT- IV Mobile File Systems and Data Structures:- Introduction, What and How of Data, Types of Memory, File Systems, Rootfs, devpts, sysfs, cgroup, yaffs2, Procedure for handling an Andriod Devices, Logical Techniques VS Digital Techniques, Introduction to Mobile Malware. TEXT/REFERENCES BOOKS: Guide to Computer Forensics and Investigations By Bill Nelson, Amelia Phillips, Christopher Stuart. Digital Evidence on Mobile Devices. Digital Evidence and Computer Crime, Third Edition Eoghan Casey. Published by Elsevier Inc. All rights reserved. Andriod Forensic, Investigation, and Security by Andrew Hogg, Publisher Synergy Security in Mobile Communication by Professor Noureddine Boudriga. Mobile Malware Attacks and Defense By Ken Dunham. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, students will develop understanding for: Mobile device forensics. Different type of mobile file system & digital forensic. Technological composition of android & ios systems. Mobile file system & data structures. CSEH312C DATA MININGB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn data mining and Data preprocessing concepts. To know about the association rules in data mining. To perform various Classification and clustering algorithms. To understand the strengths and limitations of various data mining models. UNIT - I Introduction to Data Mining:- Introduction, What is Data Mining, Definition, KDD, Challenges, Data Mining Tasks, Data Preprocessing, Data Cleaning, Missing data, Dimensionality Reduction, Feature Subset Selection, Discretization and Binaryzation, Data Transformation; Measures of Similarity and Dissimilarity- Basics. UNIT - II Association Rules:- Problem Definition, Frequent Item Set Generation, Frequent Itemsets, Closed Itemsets, and Association Rules. Apriori Algorithm: Finding Frequent Itemsets by Confined Candidate Generation, Generating Association Rules from Frequent Itemsets , Improving the Efficiency of Apriori, A Pattern-Growth Approach for Mining Frequent Itemsets ,Mining Frequent Itemsets Using Vertical Data Format, Mining Closed and Max Patterns. UNIT - III Classification:- Problem Definition, General Approaches to solving a classification problem , Evaluation of Classifiers , Classification techniques, Decision Trees-Decision tree Construction ,Naive-Bayes Classifier, Bayesian Belief Networks; K- Nearest neighbor classification-Algorithm and Characteristics. Clustering:- Problem Definition, Clustering Overview, Evaluation of Clustering Algorithms, Partitioning Clustering-K-Means Algorithm, PAM Algorithm, Hierarchical Clustering - Agglomerative Methods and divisive methods, Strengths and Weakness; Outlier Detection. UNIT - IV Web and Text Mining:- Introduction, web mining, web content mining, web structure mining, Text mining unstructured text, episode rule discovery for texts, hierarchy of categories, text clustering. TEXT/ REFERENCE BOOKS: Data Mining- Concepts and Techniques- Jiawei Han, Micheline Kamber, Morgan Kaufmann Publishers, Elsevier, 2 Edition,2006. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, PearsonEducation. Data mining Techniques and Applications, Hongbo Du Cengage IndiaPublishing Data Mining Techniques, Arun K Pujari, 3rd Edition, UniversitiesPress Data Mining Principles & Applications T.V Sveresh Kumar, B. Esware Reddy,Jagadish S Kalimani,Elsevier. Data Mining, Vikaram Pudi, P Radha Krishna, Oxford UniversityPress Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the student will be able to: Perform the preprocessing of data and apply mining techniques onit. Identify the association rule applied on datasets. Perform Classification and clustering algorithms Classify web pages, extract knowledge from the Web. Open Elective-I (Common for All Branches except Bio Technology and Bio-Medical Engg for all Semesters) HUM 350 C Communication Skills for ProfessionalsB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To hone verbal and written communication To acquaint students with multiple forms and formats of various technical and business reports To develop competence for report writing with a focus on its techniques To develop English Language Proficiency UNIT I (Contact hours 8) Mechanics of Report Writing: Objectives of Report Writing; Types of Reports on the basis of forms and content. Introduction to Formats of Reports; Structure of Reports: Front Matter, Main Body, Back Matter UNIT II (Contact hours 10) Writing Business and Technical Report: Preliminary Strategies for Report Writing: Data Collection, Report Planning, Use of Illustrations, Point Formation, Preparing Notes/Drafts Using Appropriate Formats: Memo Format, Letter Format, Manuscript Format, Printed Forms UNIT III (Contact hours 10) Oral Communication and Soft Skills: Group Discussions; Interviews for jobs: preparation and facing them Professional Presentations: Power Point Presentation, Oral Presentation, Role of Kinesics (Body Language) in Communication, General Etiquettes in Office areas, corporate lunch and dinner Handling, Telephone calls UNIT IV (Contact hours 8) Resumes and Job application: Writing of Resume--Chronological Resume and Functional Resume, Request for Reference/Recommendation, Writing Application Letters for Job; Writing Covering letter Recommended READING Sharma,Sangeeta, and Binod Mishra. Communication Skills for Engineers and Scientists. PHI,2009. Tyagi,Kavita, and Padma Mishra. Advanced Technical Communication. PHI, 2011. Rizvi, M. Ashraf. Effective Technical Communication. McGraw Hill Education, 2014. Kumar, Sanjay, and PushpLata. Communication Skills. OUP, 2011. Raman, Meenakshi and SangeetaSharma.Communication Skills. OUP,2011. *Bhatnagar, Nitin, and MamtaBhatnagar. Communicative English for Engineers and Professionals. Pearson Education, 2013. (The soft copy of the book is available in the university library) Mitra,Barun K. Personality Development and Soft Skills. OUP,2011. Kaul, Asha. Business Communication. PHI, 2nd Edition. Namee, Patrick Mc. Success in Interviews: How to Succeed in any Job Interview, Ist Edition. Argenti, Paul. Corporate Communication.6th Edition. McGraw Hill Education, 2012. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Learning Outcomes: At the end of the course, students will be able to: Get acquainted with multiple forms and formats of various technical and business reports Develop competence for report writing with a focus on its complex writing techniques and procedures. Develop their speaking skills with professional proficiency. Equip themselves for Letter Writing Skills. Open Elective-I (Common for All Branches) HUM 352 C Soft Skills and Interpersonal CommunicationB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objective: To train students to learn Soft Skills and engage in a successful and fruitful Interpersonal Communication . UNIT I (Contact hrs 08) Soft Skills: Introduction to Soft Skills & their classification, Importance of Soft Skills: Writing Resume/CV, Engaging in Group discussion, Appearing for Job interviews UNIT II (Contact hrs 10) Interpersonal Skills, Behaviour, Relationships and Communication: Development and Role of Effective Interpersonal Skills, Development of Effective Speaking and Listening Skills UNIT III (Contact hrs 10) Non-Verbal Elements in Interpersonal Communication: Role of Body Language, Paralinguistic Features, Proxemics/Space Distance and Haptics in Interpersonal Communication UNIT IV (Contact hrs 08) Personality Development for Personal and Professional Growth: Desirable Personality, Personality Types, Analysis of Personality Development (Freudian and Swami Vivekanandas Concept), Grooming Personality for Personal and Professional Life RECOMMENDED READING: Mitra, Barun K. Personality Development and Soft Skills. Delhi: OUP, 2nd Edition, 2016. Butterfield, Jeff.Soft Skills for Everyone. Cengage Learning, 2017. Raman, Meenakshi and Sangeeta Sharma. Communication Skills. OUP, 2011. Ramesh, Gopalaswamy and Mahadevan Ramesh. The ACE of Soft Skills, Pearson India,2010. Ribbons, Geoff and Richard Thompson.Body Language.Hodder& Stoughton, 2007. Sharma, Sangeeta and Binod Mishra.Communication Skills for Engineers and Scientists. PHI, 2017. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Learning Outcomes: At the end of the course, students will be able to: Know now how soft skills complement hard skills for career growth Enhance communicative competence for professional enhancement Learn desirable body language and other non-verbal elements in interpersonal communication Groom personality for handling effectively various situations of personal and professional life Open Elective-I (Common for All Branches for all Semesters) HUM 354 C Introduction to French LanguageB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To enable students to understand the elementary communication structures of French language To enable students to know and learn elementary vocabulary and grammar of French language To enable students to engage in simple dialogues in French language UNIT I (Contact hours 10) VOCABULAIRE: Les Salutations, Les jours de la semaine, Les moins de lanne, Les couleurs, Les professions, Les nombrescardinaux, Les lieux de la ville, Les nationalites, Personnesetobjetscaractristiques dun pays, Civilisation: France,de la socitfrancaise, les monuments, les ftes UNIT II (Contact hours 10) GRAMMAIRE: Conjugation des verbeetre, avoir, aller; Conjugation des verbe er, -ir, -re Masculin/feminine,Singulier/ pluriel, Accord des nomset des adjectives, Articles indfinisetdfines, Ngation simple, Interrogation, Futurproche, On= Nous, Articles partitifsetcontractes, La date etlheure UNIT III ( Contact hours 8) ECRITURE (comprehension des crits, Production crite), Presentez- vous, Mon meuillierami, Ma famille, Carteset messages dinvitation, dacceptationou de refus, Ecrives des scenes UNIT IV (Contact hours 8) COMPREHENSION (couter, production orale): Se presenter ungroupe, Parlez/ coutezdevotreville, Parlez/coutezdesesactivits de loisirs, Parlez /coutez de vosgots, Demander/ donnerun explication, Identifier unepersonneouun objet, Demander/dire cequona fait RECOMMENDED READING Echo A1 Methode de Francais, CLE International (Distributed in India by W. R. Goyal Publishers & Distributors, Delhi) Connexions, niveau 1, Yves Loiseau and R_gineM_rieux(Goyal Publishers) Alter Ego-1, Hachette (Distributed in India by W. R. Goyal Publishers & Distributors, Delhi) Forum- Methode de Francais 1, Hachette (Distributed in India by W. R. Goyal Publishers & Distributors, Delhi) 450 Exercises de Grammaire, CLE International (Distributed in India by W. R. Goyal Publishers & Distributors, Delhi) Audio- Video study material Supplementary handouts Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Learning Outcomes: At the end of the course, students will be able to: Familiarize with the basics of French language Understand and express vocabulary and grammar through writing Demonstrate understanding through simple dialogues in French Open Elective-I (Common for All Branches for all Semesters) HUM 356 C Introduction to German LanguageB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To enable students to understand the elementary communication structures of German language To enable students to know and learn elementary vocabulary and grammar To enable students to engage in simple dialogues in German UNIT I (Contact hours 10) Introduction to German alphabets, Numbers 0- 100 (basic algebraic expressions), Vocabulary of days and months, Adverbs of time, Ordinal numbers in German, Phonetics and pronunciation UNIT II (Contact hours 10) Introduction to the simple possessive pronouns, Sentence: statement, question, (question for completion and decision) command, Coordination of clauses, Placing of the verb in the sentence: first, second and last place, Word order in main clause, Details of time, manner and place (casual) UNIT III (Contact hours 8) Verb: infinitive, imperative, indicative Prsens, Perfekt, Prteritum of auxiliary and modal verbs, modal verbs (meaning, indicative Prsens&Prteritum, mchten), Verbs with prefixes separable and inseparable, Nouns: Gender, plural, Nominative, Accusative, Dative Articles: Definite and Indefinite, Adjectives: predicative use UNIT IV (Contact hours 8) Day-to-day conversation in German: Introducing oneself and other, greeting and taking leave, Meeting people, Time and date, months and weekdays, Inquire and name the country of origin, languages, Introduce family members and friends Recommended READING Tangram AktuellNiveau A1, Max HeuberVertag, Ismaning, 2005 ( Published and distributed in India by German Book Depot, Delhi) Netzwerk A1, KlettVerlag, Muenchen, 2013 (Published and distributed in India by German Book Centre, Delhi, 2015). Sprachkurs Deutsch I &2. Diesterweg (Moritz) Verlag, Frankfurt am Main, 1989, (Published and distributed in India by Goyal Saab Publishers & Distributors, New Delhi) Schuelerduden Grammatik, BibliographischesInstitutand F.ABrockhaus, 2000. ThemenAktuell 1, Kursbuch, Max HeuberVerlag, Ismaning, Deutschland, 2003 (Published and distributed in India by German Book Centre, Delhi,2010). Audio-video Study Material Supplementary Handouts Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Learning Outcomes: At the end of the course, students will be able to: Familiarize with the basics of German language Understand and express vocabulary and grammar through writing Demonstrate understanding through simple dialogues in German Open Elective-I mgt402C HUMAN VALUES, ETHICS AND IPRB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To help the students appreciate the essential complementarities between 'VALUES' and 'SKILLS' to ensure sustained happiness and prosperity which are the core aspirations of all human beings. To highlight plausible implications of such a Holistic understanding in terms of ethical human conduct, trustful and mutually satisfying human behaviour and mutually enriching interaction with Nature. Unit-I Human Values: Understanding the need, basic guidelines, Self Exploration - its content and process; Natural Acceptance and Experiential Validation, Continuous Happiness and Prosperity- Human Aspirations, Right understanding, Relationship and Physical Facilities, Understanding Happiness and Prosperity correctly. Unit-II Different kinds of value: Understanding human being as a co-existence of the sentient I and the material Body Understanding the needs of Self (I) and Body - Sukh and Suvidha. Understanding the harmony of I with the Body: Sanyam and Swasthya; correct appraisal of Physical needs, meaning of Prosperity in detail, Programs to ensure Sanyam and Swasthya. Unit-III Modern approach to the study of values: Understanding Harmony in the Family and Society- Harmony in Human-Human Relationship Understanding harmony in the Family, Understanding values in human-human relationship; meaning of Nyaya and program for its fulfillment to ensure Ubhay-tripti; Trust (Vishwas) and Respect (Samman). Unit-IV Professional Ethics & IPR: Values in Work-life, Professional Ethics and Ethos, Code of conduct, Whistle Blowing, Corporate Social Responsibility.IPR: meaning, nature, scope and relevance of IPR. Kinds of IPR: Copyright, Patents, Trademark, Geographical Indication, Industrial design, Plant Variety. Benefits, Emerging dimensions and Rational for protection of IPR. Suggested Readings: R. R. Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values and Professional Ethics, Excel Books, New Delhi A.N. Tripathy, 2003, Human Values, New Age International Publishers. E G Seebauer& Robert L.Berry, 2000, Fundamentals of Ethics for Scientists & Engineers, Oxford University Press. M Govindrajan, S Natrajan& V. S Senthil Kumar, Engineering Ethics ( including Human Values), Eastern Economy Edition, Prentice Hall of India Ltd. S. B. Gogate, Human Values & Professional Ethics, Vikas Publishing House Pvt. Ltd., Noida. Reference Books A Nagraj, 1998 JeevanVidyaekParichay, Divya Path Sansthan, Amarkantak. P. L. Dhar, R. R. Gaur, 1990, Science and Humanism, Commonwealth Publishers. Prof. A.R.Aryasri, DharanikotaSuyodhana, Professional Ethics and Moral, Maruthi Publications. A. Alavudeen, R.Kalil Rahman and M. Jayakumaran, Professional Ethics and Human Values, University Science Press. Prof.D.R.Kiran, 2013, Professional Ethics and Human Values, Tata McGraw-Hill Jayshree Suresh and B. S. Raghavan, Human Values And Professional Ethics, S.Chand Publications Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course: Students will be able to understand the significance of value inputs in a classroom and start applying them in their life and profession Understand and can distinguish between values and skills, happiness and accumulation of physical facilities, the Self and the Body, Intention and Competence of an individual, etc. Understand the role of a human being in ensuring harmony in society and nature. Students will be aware of the significance of Intellectual Property as a very important driver of growth and development in todays world and to be able to statutorily acquire and use different types of intellectual property in their professional life. Open Elective-I mgt404C Human Resource ManagementB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To help the students develop an understanding of the management of human resources and develop abilities and skills required to manage them. Unit-I Introduction nature and scope of human resource management, HRM objectives and functions, HRM policies, HRM in globally competitive environment; strategic human resource management. Unit-II Acquiring human resources Man power planning, Job evaluation, job analysis and job design. Recruitment: Sources, Methods, constraints & challenges, selection: objectives and process, placement and induction. Unit-III Developing human resources: Training: types, methods, training vs. development and evaluation of a training programme and training need assessment, career planning and development. Unit-IV Performance appraisal: methods, process and challenges of performance appraisal, performance appraisal vs. potential appraisal, Compensation: wages & salaries administration and factors influencing compensation levels. Suggested Readings: Jyothi, Human Resource Management, Oxford University Press Bohlander George and Scott Snell, Management Human Resources, Cengage, Mumbai Bhattacharyya, Dipak Kumar, Human Resource Management, Excel Books, NewDelhi Cascio Wayne F., Managing Human Resources, TMH, New Delhi DeCenzo, David A, and Stephan P. Robbins, Fundamentals of Human Resource Management, Wiley India, New Delhi Denisi, Angelo S, and Ricky W Griffin, Human Resource Management, Biztantra, New Delhi Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course: To have an understanding of the basic concepts, functions and processes of human resource management To be aware of the role, functions and functioning of human resource department of the organizations. To Design and formulate various HRM processes such as Recruitment, Selection, Training, Development, Performance appraisals and Reward Systems, Compensation Plans and Ethical Behavior. Develop ways in which human resources management might diagnose a business strategy and then facilitate the internal change necessary to accomplish the strategy. CSE431C CYBER SECURITYB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand cyber crime and its laws. To work with tools and methods used in cyber crime. To understand the life cycle of digital forensics. To learn and understand web threats, challenges and protection policies. UNIT- I Introduction To Cybercrime:- Cybercrime and Information Security, Classifications of Cybercrimes, The need for Cyber laws, The Indian IT Act Challenges to Indian Law and Cybercrime Scenario in India, Weakness in Information Technology Act and it consequences, Digital Signatures and the Indian IT Act, Cybercrime and Punishment; Technology, Students and Cyber law; Survival tactics for the Netizens, Cyber-offenses: Cybers talking, Cyber cafe and Cyber crimes, Botnets, Attack Vector, Cloud Computing; UNIT- II Tools And Methods Used In Cybercrime:- Proxy Servers and Anonymizers, Phishing and identity theft, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horses and Backdoors, Stenography, DoS and DDoS Attacks, SQL Injection, Buffer Overflow; Cybercrime: Mobile and Wireless Devices: Trends in Mobility, Attacks on Wireless Networks, Credit Card Frauds in Mobile and Wireless Computing Era, Security Challenges, Registry Settings for Mobile Devices, Authentication Service Security Attacks on Mobile/Cell Phones UNIT- III Understanding Computer Forensics:- The Need for Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Computer Forensics and Stenography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer Forensics, Forensics Auditing, Anti forensics. UNIT- IV Cyber security Organizational Implications:- Cost of Cybercrimes and IPR Issues, Web Threats for Organizations, Security and Privacy Implications from Cloud Computing, Social Media Marketing, Social Computing and the Associated Challenges for Organizations, Protecting People's Privacy in the Organization, Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy, Incident Handling, Forensics Best Practices, Media and Asset Protection, Importance of Endpoint Security in Organizations. TEXT/ REFERENCE BOOKS: 1. Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina Godbole, Sunit Belapur, Wiley India Publications, April, 2011. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Able to demonstrate cyber crime its laws and related terms. Work with SQL injection, DOS attacks etc. Explain computer forensic, Network forensic cyber forensic. Understand safe computing guidelines, usage policies and incident handling. Open Elective-II CHE457C : INDUSTRIAL SAFTEYB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: The purpose of this course is To teach the students the concept of industrial safety and provide useful practical knowledge for workplace safety. To identify, evaluate control the hazards to prevent or mitigate harm or damage to people, property and the environment. To understand about fire and explosion, preventive methods, relief and its sizing methods To analyze industrial hazards and its risk assessment UNIT-I Introduction: Concept of loss prevention, origin of process hazards, types of process hazards, acceptable risks, accident and loss statics, nature of accident process, concepts of inherent safety in plants or Factories, dose Vs response curve, toxicants entry route, thresh limit values, safety regulations. UNIT-II Hazards: Fire, Chemical (industrial and laboratory scale), electrical, mechanical, biohazards (natural and anthropogenic), toxic materials, their types and preventive measures, Liquid and vapor phase hazardous methods, storage and handling, containment, precautions, Personal safety precautions. UNIT-III Risk management principles, risk analysis techniques, risk control, hazards operability studies, hazard analysis, Fault tree analysis, Consequences analysis, human error analysis, accidental error analysis, economics of risk management, check list, reliability theory, event tree, HAZOP, safety reviews, what if analysis. UNIT-IV Safety audit, procedure for safety auditing, audit report, safety report, safety training, emergency planning and disaster management, introduction to security risk factors tables. TEXT BOOKS: Chemical Hazards and safety, 2nd Edition, DawandeDenet& Co. , 2012 Loss preventions in process industries, Lees Butterworth-Heinemann, 1980. Industrial safety Handbook, William and Handley, McGraw Hill. REFERENCE BOOKS: Safety and Hazard management in Chemical Industries, Vyas, Atlantic 2013. Industrial safety, health environment & Security, Basudev Panda, Laxmi publication ISBN- 97893-81159-43-9 Industrial Safety and Health Management, 4th Edition, C. Ray Asfahl, Prentice Hall International Series, 1984 Industrial Accident Prevention : A Safety Management Approach, Herbert William Heinrich NOTES: Part A: Till academic session 2020-2021:In Semester Examinations, the paper setter will set two questions from each unit (total 8 questions in all), covering the entire syllabus. Students will be required to attempt only five questions, selecting at least one question from each unit. Part B: From Academic Session 2021-2022 onwards: For the semester examination, nine questions are to be set by the examiner. Question no. 1, containing 6-7 short answer type questions, will be compulsory & based on the entire syllabus. Rests of the eight questions are to be set by setting two questions from each of the four units of the syllabus. The candidates will be required to attempt five questions in all, selecting one from each unit. All questions will carry equal marks. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B.Tech. 1st Year (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. Course Outcomes: Students will be able to: Analyze the effect of release of toxic substances. Understand theindustriallaws, regulations and source models. Understand the methods of hazard identification and preventive measures and develop safety programs to prevent the damage or loss. Conduct safety audits and improve safety practices. Open Elective-II CE406C : DISASTER MANAGEMENTB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Unit-I Introduction to Disaster Management:Disaster, Emergency, Hazard, Mitigation, Disaster Prevention, Preparedness and Rehabilitation, Risk and Vulnerability, Classification of Disaster, Natural and Man-made Disasters, International day and Decade of Disaster Reduction. Risk and Vulnerability to disaster mitigation and management options:Warning and Forecasting. Unit-II Hydro-meteorological based disasters I:Disaster Management Act 2005, Role of NDMA, NDRF, NIDM, Tropical Cyclones, Floods, droughts, mechanism, causes, role of Indian Metrological Department, Central Water Commission, structure and their impacts, classifications, vulnerability, Early Warning System, Forecasting, Flood Warning System, Drought Indicators, recurrence and declaration, Structural and Non-structural Measures. Hydro-meteorological based disasters II:Desertification Zones, causes and impacts of desertification, Characteristics, Vulnerability to India and Steps taken to combat desertification, Forest Fires; Causes of Forest Fires; Impact of Forest Fires, Prevention. Unit-III Geological based disasters: Earthquake, Reasons, Compression, Shear, Rayleigh and Love Waves; Magnitude and Intensity Scales, Direct and Indirect Impact of Earthquake; Seismic Zones in India, Factors, Indian Standards Guidelines for RCC and Masonry Structures, Prevention and Preparedness for Earthquake, Tsunamis, Landslides and avalanches: Definition, causes and structure; past lesson learnt and measures taken; their Characteristic features, Impact and prevention, Atlas (BMTRPC); structural and non-structural measures. Unit-IV Manmade Disasters I:Chemical Industrial hazards; causes and factors, pre- and post-disaster measures; control; Indian Standard Guidelines and Compliance; Traffic accidents; classification and impact,Fire hazards; Classification as per Indian Standards; Fire risk assessment; Escape routes; fire-fighting equipment; classification of buildings, fire zones, occupancy loads;capacity and arrangements of exits, Use of remote sensing and GISin disaster mitigation and management. Text Books: 1.Thomas D. Schneid., Disaster Management and Preparedness, CRC Publication, USA, 2001 2.Patrick Leon Abbott, Natural Disasters, Amazon Publications, 2002 3.Ben Wisner., At Risk: Natural Hazards, People vulnerability and Disaster, Amazon Publications, 2001 4.Oosterom, Petervan, Zlatanova, Siyka, Fendel, Elfriede M., Geo-information for Disaster Management, Springer Publications, 2005 5.Savindra Singh and Jeetendra Singh, Disaster Management, Pravalika Publications, Allahabad 6.NidhiGaubaDhawan and AmbrinaSardar Khan, Disaster Management and Preparedness, CBS Publishers & Distribution Reference Books: Selected Resources Published by the National Disaster Management Institute of Home Affairs, Govt. of India, New Delhi. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, the student will be able to: Knowledge of the significance of disaster management, Analyze the occurrences, reasons and mechanism of various types of disaster Understand the preventive measures as Civil Engineer with latest codal provisions Apply the latest technology in mitigation of disasters Open Elective-II ECE327C Consumer ElectronicsB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks300 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Unit I (12 Lectures) Monochrome TV (Introduction): Elements of a TV System, Picture transmission, Sound transmission, Picture reception, Sound reception, Synchronization, Receiver control, Image continuity, Scanning Process, Aspect Ratio, Flicker, Composite Video Signal, Picture Elements, Kell factor, Vertical Resolution, Horizontal Resolution, Video bandwidth, Interlacing, 625 Line System, Bandwidths for TV Transmission, Vertical and horizontal synch detail, Vestigial Side Band transmission(Advantages and Disadvantages) Monochrome TV (Picture and Camera Tubes): Monochrome picture tube, beam reflection, Beam focusing, Screen Phosphor, Faceplate, Picture tube characteristics, picture tube circuit controls, Monochrome Camera Tubes: Basic principle, Image Orthicon, Vidicon, Plumbicon Unit II (12 Lectures) Colour TV Essentials: Compatibility , Colour perception, Three Colour theory, Luminance, Hue and Saturation, Dispersion and Recombination of light, Primary and secondary colours, luminance signal, Chrominance Signal, Colour picture tube, colour TV Camera, Colour TV display Tubes, colour Signal Transmission, Bandwidth for colour signal transmission, Colour TV controls. Cable TV, Block Diagram and principle of working of cable TV. Plasma and LCD: Introduction, liquidcrystals, types of LCDs,TN, STN, TFT, Power requirements, LCD working, Principle of operation of TN display, Construction of TN display, Behaviour of TN liquid crystals, Viewing angle, colour balance, colour TN display, limitatons, advantages, disadvantages, applications. Unit III (10 Lectures) LED and DMD :Introduction to LED Television , comparison with LCD and Plasma TVs, schematic of DMD, introduction to Digital Micro Mirror device, Diagram of DMD, principle of working, emerging applications of DMD. Microwave Ovens and Air Conditioners: Microwaves, Transit Time, Magnetron, Waveguides, Microwave Oven, Microwave Cooking. Air conditioning, Components of air conditioning systems, all water Air conditioning systems, all air conditioning Systems, Split air conditioner. Unit IV (11 Lectures) Microphones: Introduction, characteristics of microphones, types of microphone: carbon, movingcoil, wireless, crystal, introduction to tape recorder. Loudspeaker: Introduction to ideal and basic loudspeaker, loudspeaker construction types of loudspeaker: Dynamic and permanent magnet, woofers, tweeters, brief introduction to baffles, equalisers. Text Books : Consumer Electronics by S. P. Bali, Pearson Education. Complete Satellite and Cable T.V by R.R Gulati, New Age International Publishers Reference Books: 1. Monochrome and ColourTelevision by R. R. Gulati, New Age International Publishers Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course outcomes: At the end of the course, students will demonstrate the ability to: Identify and explain basic working of electronics products like TV, Microphone, loudspeaker, AC, Microwave ovens. Learn various components of composite video signal and differentiate between line, brightness, saturation and to design the lower power consumption device, the primary challenge is how to minimize overall cost. Acquire ability to design different display screen so that effect of radiations on eyes will be reduced. Understand the general importance of product safety to consumers & producers will reduce the various adverse impacts of these devices on common man. CSE382C COMPILER DESIGN LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To acquire knowledge in different phases and passes of Compiler. To use the Compiler tools like LEX, YACC, etc. To design different types of compiler tools to meet the requirements of the realistic constraints of compilers. To use Top-down and Bottom-up parsers. Construction of LL, SLR, CLR and LALR parse table. List of Practicass: Practice of LEX/YACC of compiler writing. Write a program to check whether a string belong to the grammar or not. Write a program to generate a parse tree. Write a program to find leading terminals. Write a program to find trailing terminals. Write a program to compute FIRST of non-terminal. Write a program to compute FOLLOW of non-terminal. Write a program to check whether a grammar is left Recursion and remove left Recursion. Write a program to remove left factoring. Write a program to check whether a grammar is operator precedent. To show all the operations of a stack. To show various operations i.e. red, write and modify in a text file. Course Outcomes: After completing the course the students will be able to: 1. Understand the concepts of Compilers Understand the concepts of The actual roles of the lexical analyzer Understand the concepts of different Parsing techniques and Construction of syntax trees Understand the concepts of Type checking CSE384C MOBILE APPLICATIONS DEVELOPMENT LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To describe and compare different mobile application models/architectures and patterns. To apply mobile application models/architectures and patterns to the development of a mobile software application. To describe the components and architecture of a mobile development framework (Googles Android Studio). To apply a mobile development framework to the development of a mobile application. List of Practicals: Getting Started with Android Development. Activities and Views: Android Manifest.xml, Activity Class, Basic View Components: Layouts and Buttons. Navigation with Data: Working with Intent, Sharing Data Between Activities, Application Class. Android Resources: String Resources, Loading Strings in XML, Loading Strings in Code, The Resource Values Folder. Drawables - Image Basics, Drawable Folders and Qualifiers, Dimensions, Image Padding, The ImageButton Widget. Lists: Implementing an Android List, ListView, ListActivity, Empty Lists, ListAdapter, Sorting the Adapter, Overriding ArrayAdapter, List Interaction. Dialogs, New and Old: AlertDialog, Custom Dialog, Support Library, Fragments, DialogFragment Menus: Options Menu, Modifying an Options Menu, Context Menu. Saving Data with Shared Preferences: Shared Preferences, Getting Started with SharedPreferences, PreferenceActivity. Saving Data with a Database: Setting Up SQLite, Creating a Helper, using the Helper, Cursor and CursorAdapater. Threading with AsyncTasks: Threading in Android, AsyncTask, Tracking Progress. Styles and Themes: Introduction to Styling: Defining Styles, Defining Themes, Style Inheritance, Direct Theme References. Course Outcomes: After completing the course the student will be able to: Understand the concepts of mobile application models/architectures and patterns. Apply mobile application models/architectures and patterns to the development of a mobile software application. Understand the components and architecture of a mobile development framework (Googles Android Studio). Apply a mobile development framework to the development of a mobile application. CSE386C DIGITAL IMAGE PROCESSING LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To review the fundamental concepts of adigital image processingsystem. To analyzethe imagesin the frequency domain using various transforms. To evaluate the techniques forimageenhancement andimagerestoration. To categorize various compression techniques. The students will be required to carry out 10 or 12 Lab exercises covering the theory course CSE326C: Digital Image Processing as assigned by concerned faculty. Course Outcomes: After completing the course the student will be able to: Review the fundamental concepts of adigital image processingsystem. Analyzethe imagesin the frequency domain using various transforms. Evaluate the techniques forimageenhancement andimagerestoration. Categorize various compression techniques. CSE388C ADVANCED JAVA LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To use graphics, Animations and Multithreading for designing Simulation and Game based applications. To design and develop GUI applications using Abstract Windowing Toolkit (AWT), Swing and Event Handling. To design and develop Web applications To design Enterprise based applications by encapsulating an applications business logic. The students will be required to carry out 10 or 12 experiments covering the theory course CSE328C: Advanced Java as assigned by the concerned faculty. Course Outcomes: After completing the course the student will be able to: Use graphics, Animations and Multithreading for designing Simulation and Game based applications. Design and develop GUI applications using Abstract Windowing Toolkit (AWT), Swing and Event Handling. Design and develop Web applications. To design Enterprise based applications by encapsulating an applications business logic. CSE390C IoT ARCHITECTURE & PROTOCOLS LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: Students should be able to work with Python Raspberry Pie Arduino List of Practicals 1. To study and configure raspberry pie and arduino 2. Write a Program for data types in python. 3. Write a Program for arithmetic operation in Python. 4. Write a Program for looping statement in Python 5. Write program for Blink LED using arduino/raspberry pie. 6. Write Program for RGB LED using Arduino/ raspberry pie. 7. Study the Temperature sensor and write a program for monitoring temperature using Arduino/ raspberry pie. 8. Write a Program to upload temperature and humidity data on cloud Course outcomes: On successful completion of the course, the student will be able to Write programs in Phython Work with Raspberry Pie Work with Arduino Device small projects using all hardware and software CSEH382C CRYPTOCURRENCY WITH ETHEREUM LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:50 Marks----4 2Examination:50MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand working of Ethereum platform. To study the security issues and safeguards related to trading. To create smartcontracts using Remix. To create a blockchain application. Learn the basics of Ethereum platform with Ethereum Studio, a web-based IDE to create and test smart contracts and build a frontend. The student should do the following using the learned concepts: Naive Blockchain construction Implement Memory Hard algorithm - Hashcash implementation Implement Direct Acyclic Graph Play with Go-ethereum Smart Contract Construction using Remix - an Ethereum IDE and tools for the web. Remix is an open source tool written in JavaScript with support for writing of Solidity contracts, testing, debugging and deploying of smart contracts. Develop Toy application using Blockchain Implement Mining puzzles Course Outcomes: After completing the course the student will be able to: Understand Ethereum platform. Implement the security issues and safeguards related to trading. Create smartcontracts using Remix. Develop a blockchain application. CSEH386C INFORMATION SECURITY AND DATA HIDING LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the concept of information hiding. To provide an insight to steganography techniques. To learn Watermarking techniques To understand the attacks on data hiding and how integrity of data is maintained. The students will be required to carry out 10 or 12 experiments covering the theory course CSEH306C Information Security and Data Hiding as assigned by the concerned faculty. Course Outcomes: After completing the course the student will be able to: Learn the concept of information hiding. Understand the steganography techniques. Learn Watermarking techniques Understand the attacks on data hiding and how integrity of data is maintained. CSEH390C DATA ANALYTICS WITH PYTHON LABB. Tech. Semester VI (Computer Science and Engg.)LTPCreditsClass Work:25 Marks004 2Examination:75 MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the basic process of data science. To learn Python notebooks. To have an applied understanding of how to manipulate and analyze uncurated datasets, basic statistical analysis and machine learning methods. To have an understanding on how to effectively visualize results. The students will be required to carry out 10 or 12 experiments covering the theory course CSE310C: Data Analytics with Python as assigned by the concerned faculty. Course Outcomes: After completing the course the student will be able to: Find a dataset, formulate a research question, use the tools and techniques of this course to explore the answer to that question. Learn Python notebooks. Understand the manipulation and analysis of uncurated datasets, basic statistical analysis and machine learning methods. Understand to effectively visualize results. CSE401C CLOUD ARCHITECTURE & SECURITYB. Tech. Semester VIII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks 3-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basics of Cloud Computing and its delivery models. To study the concepts, processes, and best practices needed to successfully secure information within Cloud Infrastructures. To get through the risk and compliance responsibilities along-with challenges for each Cloud service delivery models. To know of intuition of data intensive computing and its solutions. UNIT- I Cloud Computing Architecture:- Cloud introduction and overview, Requirements for Cloud Computing, Introduction of Cloud computing architecture, On Demand Computing, Novel applications of cloud computing, Pricing models of Cloud Computing and associated risks, Virtualization at the infrastructure level, Security in Cloud computing environments, CPU Virtualization, Hypervisor and its types, Storage Virtualization, The SPI Framework for Cloud Computing, The Traditional Software Model, The Cloud Services Delivery Models, Cloud Deployment Models, Key Drivers to Adopting the Cloud services, The Impact of Cloud Computing on Users, Barriers to Cloud Computing Adoption in the Enterprise, Cloud Computing v/s Grid Computing. UNIT-II Security Issues In Cloud Computing:- Infrastructure Security: The Network Level, The Host Level, The Application Level, Data Security and Storage, Aspects of Data Security, Data Security Mitigation, Provider Data and Its Security, Identity and Access Management, Trust Boundaries and IAM, IAM Challenges, Relevant IAM Standards and Protocols for Cloud Services, IAM Practices in the Cloud, Cloud Authorization Management. UNIT-III Security Management In The Cloud:- Security Management Standards in the Cloud, Availability Management: SaaS, PaaS, IaaS. Privacy Issues, Data Life Cycle, Key Privacy Concerns in the Cloud, Privacy protection mechanisms in the Cloud Computing, Governance, Risk, and Compliance (GRC) in relation to Cloud Computing, Legal and Regulatory Implications, International Laws and Regulations, Cloud Security Alliance, Auditing the Cloud for Compliance. UNIT-IV Data Intensive Computing:- Map-Reduce Programming Models, Characterizing Data-Intensive Computations, Technologies for Data-Intensive Computing, Programming Platforms, Example Application, HDFS, HIVE, Introduction to Google App Engine, Fog Computing and its Architecture. TEXT/ REFERENCES BOOK: Rajkumar Buyya, James Broberg, and Andrzej M. Goscinski, Cloud Computing Principles and Paradigms, Wiley & Sons pub. Michael J. Kavis, Architecting the Cloud: Design Decisions for Cloud Computing Service Models, Wiley. Gautam Shroff, Enterprise Cloud Computing Technology Architecture Applications, Cambridge University Press. R. Buyya, C. Vecchiola and S. Thamarai Selvi, Mastering Cloud Computing, McGraw Hill. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completion of course, students would be able to: Get well verse with the basic terminologies of Cloud Computing. Identify security aspects of each Cloud model. Develop a risk and compliance management strategy for moving to the Cloud. Indentify the intuition of data intensive computing mechanisms. CSE403C MACHINE LEARNINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the concept of how to learn patterns and data without being explicitly programmed. To design and analyses various clustering and machine learning algorithms with a modern outlook focusing on recent advances. Explore modeling and estimation paradigms of machine learning. To explore the use cases of learning technique. UNIT-I Basic methods:- Distance-based methods, Nearest-Neighbours, Decision Trees, Naive Bayes Linear models: Linear Regression, Logistic Regression, Generalized Linear Models, Support Vector Machines, Nonlinearity and Kernel Methods , Beyond Binary Classification: Multi-class/Structured Outputs, Ranking. UNIT- II Clustering:- K-means/Kernel K-means Dimensionality Reduction: PCA and kernel PCA Matrix Factorization and Matrix Completion, Generative Models (mixture models and latent factor models) Evaluating Machine Learning algorithms and Model Selection, Introduction to Statistical Learning Theory, Ensemble Methods (Boosting, Bagging, Random Forests) UNIT- III Sparse Modeling and Estimation, Modeling Sequence/Time-Series Data, Deep Learning and Feature Representation Learning. UNIT- IV Scalable Machine Learning (Online Learning and Inference, Recent trends classification methods. and Distributed Learning), Introduction to Bayesian in various learning techniques of machine learning TEXT/REFERENCES BOOKS: Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012 Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical Learning, Springer 2009 (freely available online) Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007 Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get verse with the concept of learning patterns. Learn clustering and machine learning algorithms. Understand modeling and estimation paradigms of machine learning. Use learning technique for practical applications. CSE405C SOFTWARE DESIGN AND ENTERPRISE COMPUTINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To fix software flaws and bugs in various software. To make students aware of various issues like weak random number generation, information leakage, poor usability, and weak or no encryption on data traffic. To learn techniques for successfully implementing and supporting network services on an enterprise scale and heterogeneous systems environment. To learn methodologies and tools to design and develop secure software containing minimum vulnerabilities. UNIT-I Secure Software Design: Identify software vulnerabilities and perform software security analysis, Master security programming practices, Master fundamental software security design concepts. UNIT-II Enterprise Application Development: Describe the nature and scope of enterprise software applications, Design distributed N-tier software application, Research technologies available for the presentation, business and data tiers of an enterprise software application, Design and build a database using an enterprise database system, Develop components at the different tiers in an enterprise system, design and develop a multi-tier solution to a problem using technologies used in enterprise system, present software solution. UNIT-III Enterprise Systems Administration: Design, implement and maintain a directory-based server infrastructure in a heterogeneous systems environment, monitor server resource utilization for system reliability and availability, Install and administer network services (DNS/DHCP/Terminal Services/ clustering/ Web /Email). UNIT-IV Software containing minimum vulnerabilities and flaws, perform security testing and quality assurance. Managing software quality in an organization, software configuration management, software measurement and metrics. TEXT/REFERENCE BOOKS: Theodor Richardson, Charles N Thies, Secure Software Design, Jones & Bartlett. Kenneth R. van Wyk, Mark G. Graff, Dan S. Peter, Diana L. Burley, Enterprise Software Security, Addison Wesley. Nina S. Godbole, Software Quality Assurance: Principles and Practices, Narosa Publication. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Differentiate between various software vulnerabilities Understand the Software process vulnerabilities for an organization. Monitor resources consumption in a software. Inter relate security and software development process. CSE407C NATURAL LANGUAGE PROCESSINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To know the basic terminologies of natural language processing. To understand the formalization mechanisms of grammars. To explore the mechanisms for drawing inferences from the given logic. To identify and apply the learning mechanisms to the NLP applications. UNIT-1 Components of natural language processing: Linguistic Essentials: lexicography, parts of speech and morphology, syntax, semantics, pragmatics: word level representation of natural languages prosody & natural languages. UNIT-II Grammar formalisms and treebanks: chomsky hierarchy, Left-Associative grammars, ambiguous grammars, resolution of ambiguities, Efficient parsing for context-free grammars (CFGs), Statistical parsing and probabilistic CFGs (PCFGs), Lexicalized PCFGs. Computation linguistics: recognition and parsing of natural language structures: ATN & RTN, General techniques of parsing: CKY, Earley & Tomitas algorithm. UNIT-III Semantics-knowledge representation semantic networks logic and inference pragmatics, graph models and optimization, prolog for natural language semantic. UNIT-IV Application of NLP: intelligent work processors: Machine translation and learning, user interfaces, Man-Machine interfaces, natural language querying, tutoring and authoring systems, speech recognition, commercial use of NLP, Natural Language Generation. TEXT/REFERENCE BOOKS: Natural Language Understanding James Allen ,Benjamin-1995, cummings Pub. Comp. Ltd., Reference Books. "Speech And Language Processing: An Introduction to Natural Language Processing " Dan Jurafsky, James H. Martin, Prentice Hall, 2009. "Foundations of Statistical Natural Language Processing" Christopher D. Manning, Hinrich Schtze, MIT press 1999. Radford, Andrew et. al., Linguistics, An Introduction, Cambridge University Press, 1999. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get verse with the basic terminologies of natural language processing. Know the various types of formalization mechanisms of grammars. Apply the inference mechanisms for drawing conclusions. Use learning mechanism for solving NLP problems. CSE421C DISTRIBUTED COMPUTINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the basic terminologies of distributed computing systems. To learn about the distributed operating system and its implications. To explore the mechanisms of high performance computing. To study the working mechanisms of contemporary distributed systems. UNIT-I Fundamentals of Distributed Computing: Architectural models for distributed and mobile computing systems. Basic concepts in distributed computing such as clocks, message ordering, consistent global states, and consensus. Basic Algorithms in Message: Passing Systems, Leader Election in Rings, and Mutual Exclusion in Shared Memory, Fault-Tolerant Consensus, Causality and Time. Message Passing: PVM and MPI. UNIT-II Distributed Operating Systems and network operating systems, Distributed File systems. Client/server model for computing, common layer application protocols (RPC, RMI, streams), distributed processes, network naming, distributed synchronization and distributed object-based systems. Simulation: A Formal Model for Simulations, Broadcast and Multicast, Distributed Shared Memory, Fault-Tolerant Simulations of Read/Write Objects Simulating Synchrony, Improving the Fault Tolerance of Algorithms, Fault-Tolerant Clock Synchronization. UNIT-III Advanced Topics: Randomization, Wait-Free Simulations of Arbitrary Objects, and Problems Solvable in Asynchronous Systems, Solving Consensus in Eventually Stable Systems, High Performance Computing-HPF, Distributed and mobile multimedia systems. Adaptability in Mobile Computing, Grid Computing and applications. UNIT-IV Distributed Environments: Current systems and developments (DCE, CORBA, JAVA). Case study- Distributed information searching on the network- Mobile Agent Approach. TEXT/REFERENCE BOOKS Hagit Attiya, Jennifer Welch, Distributed Computing: Fundamentals, Simulations, and Advanced Topics, 2nd Edition, March 2004. R. B. Patel, Mobile Computing-A Practical Approach, 1st edition, Khanna Publishing House Delhi Mullendar S. Distributed Systems, 2nd Ed. Addison, Wesley 1994. Tannenbaum, A. Distributed Operating Systems, Prentice Hall 1995. Helal, Abdelsalam A. et al. Anytime, Anywhere Computing: Mobile Computing Concepts and Technology, Kluwer Academic Publishers 1999. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems: Concepts and Design Third Edition Addison-Wesley, Pearson Education, 2001. Cay S Horstmann and Gary Cornell, Java 2 Vol I and II-Sun Micro Systems-2001 Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get verse with the basic terminologies of distributed computing systems. Know the distributed operating system and its implications. Understand the mechanisms of high performance computing. Get familiar with working mechanisms of contemporary distributed systems. CSE423C GREEN COMPUTINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: Give an account of the concepts pertaining to Green computing Give an account of standards and certifications related to sustainable computing products Relate Green computing to sustainable development Discuss how the choice of hardware and software can facilitate a more sustainable operation UNIT-I Definition of the term, Origins, Fundamentals, Regulations and industry initiatives- Government, Industry. approaches to green computing- Middleware Support, Compiler Optimization, Product longevity. UNIT-II Algorithmic efficiency, High performance computing, Sustainable computing, Resource allocation, Virtualization, Server Consolidation. UNIT-III Terminal servers, Power management, Operating system support, Power supply, Storage, Video card, Display, Tools for monitoring. UNIT-IV Green mobile, optimizing for minimizing battery consumption, Web, Temporal and Spatial Data Mining Materials recycling, Telecommuting, metrics for green computing. Text Book: Green Computing and Green IT Best Practices on Regulations and Industry Initiatives, Virtualization, Power Management, Materials Recycling and Telecommuting by Jason Harris, Emereo Publishing. TEXT/REFERENCE BOOKS: Green Data Center: The steps for the journey by A. Galea, M. Schafer, M. Ebbers, IBM Press. The Greening of IT: How companies can make a difference for the environment by John Lamb, IBM Press Green Computing: Large-Scale Energy Efficiency by Wu-chun Feng, Virginia Polytechnic Institute and State University, Blacksburg, USA (Eds.), CRC Press Green Computing with Emerging Memory: Low-Power Computation for Social Innovation by Kawahara, Takayuki; Mizuno, Hiroyuki (Eds.), Springer Press Sustainable ICTs and Management Systems for Green Computing by Wen-Chen Hu (University of North Dakota, USA) and Naima Kaabouch (University of North Dakota, USA), IGI Global Press Green IT for Sustainable Business Practice: A Foundation Guide by Mark O'Neill, British informatics Society Limited. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get verse with the concepts pertaining to Green computing Get an understanding of standards and certifications related to sustainable computing products Relate Green computing to sustainable development Understand the hardware and software choices for facilitating in sustainable operations. CSE425C SOFTWARE AGENTSB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: List the defining characteristics of an intelligent agent and how an agent differs from an object. Understanding Agent architectures at Micro and Macro level. Understanding how multi agents interact using pure and mixed strategy, Nash equlibria; zero-sum and other interactions; how cooperation occurs in the Prisoner's dilemma. Understanding allocation of scarce resources through auction types; combinatorial auctions and winner determination. UNIT- I Agents Introduction:- Agents Definition:- Autonomy vs. Agency, Agent vs Object - Mobile Agents - Agent Programming Paradigms - Frameworks - Agent Reasoning-Mobile Agent Context-Description-Components-Features-Life Cycle. UNIT- II Agent Communication, Collaboration, and Mobility:- Agent Communication Languages-Interaction between agents- Reactive Agents- Cognitive Agents Rational Agents-Interaction protocols - Agent coordination - Agent negotiation - Agent Cooperation - Agent Organization. UNIT- III Mobile Agents Models and Framework:- Standardization and Evolution, Generating Useable Metrics-Evaluating Semantic Alignment -Evaluating System Agility- Evaluating Loose Coupling- Survey of Mobile Agent System: JADE, SPRINGS, Voyager, Jini, Aglets, Choosing a Mobile Agent Framework. UNIT- IV Agent Security Issues: Threats in Mobile Agents Security Mobile Agent Threat Models- Protecting Agents against Malicious Hosts - Untrusted Agent -Black Box Security - Authentication for agents - Security issues for aglets. TEXT/ REFERENCES BOOKS: Bigus & Bigus, " Constructing Intelligent agents with Java ", Wiley, 1997. Bradshaw, " Software Agents ", MIT Press, 2000. Russel & Norvig, " Artificial Intelligence: a modern approach ", Prentice Hall, 1994. Danny Lange & Mitsuru Oshima, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley, 1998, Richard Murch, Tony Johnson, " Intelligent Software Agents ", Prentice Hall, 2000. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the students will be able to: Understand resource allocation via Bargaining Understand FIPA, Abstract Architecture, Reference Model, Agent Communication Standards Understand integration of agents applications with agents support technologies like Web Services Architecture, Java Enterprise Architecture Use any Agent Development Environment to develop the project. CSEH403C CYBER FORENSICS AND CYBER LAWSB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the overview of cybercrime. To learn the issues of cybercrime. To learn the various methods to investigate cybercrime and learn about digital forensics. To understand the laws and acts behind. UNIT I Introduction: Overview of Cyber Crime, Nature and Scope of Cyber Crime, Types of Cyber Crime, Social Engineering, Categories of Cyber Crime, Property Cyber Crime. Unauthorized Access to Computers, Computer Intrusions, White collar Crimes, Viruses and Malicious Code, Internet Hacking and Cracking, Virus Attacks, Pornography, Software Piracy, Intellectual Property, Mail Bombs, Exploitation ,Stalking and Obscenity in Internet, Digital laws and legislation, Law Enforcement Roles and Responses. UNIT-II Introduction to Digital Forensics: Forensic Software and Hardware, Analysis and Advanced Tools, Forensic Technology and Practices, Forensic Ballistics and Photography, Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics, Linux System Forensics, Network Forensics. UNIT III Introduction to Cyber Crime Investigation Investigation Tools, eDiscovery, Digital Evidence Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, Email Recovery, Hands on Case Studies, Encryption and Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences, Password Cracking. UNIT IV Cyber Laws and Ethics: Digital Evidence Controls - Evidence Handling Procedures - Basics of Indian Evidence ACT IPC and CrPC - Electronic Communication Privacy ACT - Legal Policies. Digital, Indian IT Act TEXT/REFERENCE BOOKS: Bernadette H Schell, Clemens Martin, Cybercrime, ABC , CLIO Inc, California, 2004. Understanding Forensics in IT , NIIT Ltd, 2005. Nelson Phillips and Enfinger Steuart, Computer Forensics and Investigations, Cengage Learning, New Delhi, 2009. Kevin Mandia, Chris Prosise, Matt Pepe, Incident Response and Computer Forensics, Tata McGraw -Hill, New Delhi, 2006. Robert M Slade, Software Forensics, Tata McGraw - Hill, New Delhi, 2005. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: Students should be able: 1. To have various ideas about cybercrime. 2. To have knowledge of the various issues of cybercrime. 3. To investigate and find the cybercrime. 4. To have clear idea of the various laws and acts. CSE441C MULTIMEDIA TECHNOLOGYB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives To understand the characteristics of different multimedia systems. To identify the encoding and quantization mechanisms for images. To explore the audio and video processing mechanisms. To know the practical applications of multimedia systems. UNIT-I Basics of Multimedia Technology: Computers, communication and entertainment; multimedia an introduction; framework for multimedia systems; multimedia devices; CD- Audio, CD-ROM, CD-I, presentation devices and the user interface; multimedia presentation and authoring; professional development tools; LANs and multimedia; internet, World Wide Web & multimedia distribution network-ATM & ADSL; multimedia servers & databases; vector graphics; 3D graphics programs; animation techniques; shading; anti aliasing; morphing; video on demand. UNIT-II Image Compression & Standards: Making still images; editing and capturing images; scanning images; computer color models; color palettes; vector drawing; 3D drawing and rendering; JPEG-objectives and architecture; JPEG-DCT encoding and quantization, JPEG statistical coding, JPEG predictive lossless coding; JPEG performance; overview of other image file formats as GIF, TIFF, BMP, PNG etc. UNIT-III Audio & Video: Digital representation of sound; time domain sampled representation; method of encoding the analog signals; subband coding; fourier method; transmission of digital sound; digital audio signal processing; stereophonic & quadraphonic signal processing; editing sampled sound; MPEG Audio; audio compression & decompression; brief survey of speech recognition and generation; audio synthesis; musical instrument digital interface; digital video and image compression; MPEG motion video compression standard; DVI technology; time base media representation and delivery. UNIT-IV Virtual Reality: Applications of multimedia, intelligent multimedia system, desktop virtual reality, VR operating system, virtual environment displays and orientation making; visually coupled system requirements; intelligent VR software systems. Applications of environment in various fields. TEXT /REFERENCE BOOKS: 1. An introduction, Villamil & Molina, Multimedia Mc Milan, 1997 2. multimedia: Sound & Video, Lozano, 1997, PHI, (Que) 3. Multimedia: Production, planning and delivery, Villamil & Molina,Que, 1997 4. Multimedia on the PC, Sinclair,BPB 5. Multimedia: Making it work, Tay Vaughan, fifth edition, 1994, TMH. 6. Multimedia in Action by James E Shuman, 1997, Wadsworth Publ., 7. Multimedia in Practice by Jeff coate Judith, 1995,PHI. 8. Multimedia Systems by Koegel, AWL 9. Multimedia Making it Work by Vaughar, etl. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get familiar with the characteristics of different multimedia systems. Learn the encoding and quantization mechanisms for images. Understand the audio and video processing mechanisms. Learn the practical applications of multimedia systems. CSE443C SOFT COMPUTINGB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To introduce soft computing concepts and techniques and foster their abilities in designing appropriate technique for a given scenario. To implement soft computing based solutions for real-world problems. To give students knowledge of non-traditional technologies and fundamentals of artificial neural networks, fuzzy sets, fuzzy logic, genetic algorithms. To provide students a hand-on experience on MATLAB to implement various strategies. UNIT-I Introduction to soft computing:- Evolution of Computing: Soft Computing Constituents, From Conventional AI to Computational Intelligence: Machine Learning Basics. UNIT-II Fuzzy Logic:- Fuzzy Sets, Operations on Fuzzy Sets, Fuzzy Relations, Membership Functisons: Fuzzy Rules and Fuzzy Reasoning, Fuzzy Inference Systems, Fuzzy Expert Systems, Fuzzy Decision Making. UNIT-III Neural Networks:- Machine Learning Using Neural Network, Adaptive Networks, Feed forward Networks, Supervised Learning Neural Networks, Radial Basis Function Networks: Reinforcement Learning, Unsupervised Learning Neural Networks, Adaptive Resonance architectures, Advances in Neural networks. UNIT-IV Genetic Algorithms & Matlab:- Introduction to Genetic Algorithms (GA), Applications of GA in Machine Learning: Machine Learning Approach to Knowledge Acquisition. Study of neural network toolbox and fuzzy logic toolbox, Simple implementation of Artificial Neural Network and Fuzzy Logic TEXT AND REFERENCE BOOKS: George J. Klir and Bo Yuan, Fuzzy Sets and Fuzzy Logic: Theory and Applications,PHI Satish Kumar, Neural Networks: A classroom approach Tata McGrawHill. Haykin S., Neural Networks-A Comprehensive Foundations,PHI Anderson J.A., An Introduction to Neural Networks,PHI M.Ganesh, Introduction to Fuzzy sets and Fuzzy Logic PHI. N P Padhy and S P Simon, Soft Computing with MATLAB Programming, Oxford University Press. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completion of course, students would be able to: Identify and describe soft computing techniques and their roles in building intelligent Machines. Apply fuzzy logic and reasoning to handle uncertainty and solve various engineering problems. Apply genetic algorithms to combinatorial optimization problems. Evaluate and compare solutions by various soft computing approaches for a given problem. CSE445C SOFTWARE MEASUREMENTS & METRICSB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand the characteristics of the different performance measurement techniques of software systems. To identify the metrics and attributes for measuring the performance of software systems. To explore the implications of reliability mechanisms. To provide the knowledge of component based systems and dynamic metrics. UNIT-I Basics of measurement:- Measurement in everyday life, measurement in software engineering, scope of software metrics, representational theory of measurement, measurement and models, measurement scales, meaningfulness in measurement, goal-based framework for software measurement, classifying software measures, determining what to measure, software measurement validation, empirical investigation, types of investigation, planning and conducting investigations. UNIT-II Software: - Metrics data collection and analysis: What is good data, how to define the data, how to collect the data, how to store and extract data, analyzing software-measurement data, frequency distributions, various statistical techniques. Measuring internal product attributes: Measuring size, aspects of software size, length, functionality and complexity, measuring structure, types of structural measures, control-flow structure, and modularity and information flow attributes, data structures. UNIT-III Measuring external product attributes: Modeling software quality, measuring aspects of software quality, software reliability, basics of software reliability, software reliability problem, parametric reliability growth models, predictive accuracy, recalibration of software reliability growth predictions, importance of operational environment, wider aspects of software reliability. Resource measurement: Measuring productivity, teams, tools, and methods. UNIT-IV Metrics for object-oriented systems: The intent of object-oriented metrics, distinguishing characteristics of object-oriented metrics, various object-oriented metric suites LK suite, CK suite and MOOD metrics. Dynamic Metrics: Runtime Software Metrics, Extent of Class Usage, Dynamic Coupling, Dynamic Cohesion, and Data Structure Metrics. Metrics for component-based systems: The intent of component-based metrics, distinguishing characteristics of component-based metrics, various component-based metrics. TEXT/REFERENCE BOOKS: Software Metrics: A rigorous and Practical Approach by Norman E. Fenton and Shari Lawrence Pfleeger, International Thomson Computer Press (1997) 2nd ed. Applied Software Measurement by Capers Jones, McGraw Hill (2008). Object-Oriented Software Metrics by Mark Lorenz, Jeff Kidd, Prentice Hall (1994). Practical Software Metrics For Project Management And Process Improvement byRobert B Grady, Hewlett Packard Professional Books (2004) 1st ed. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Get familiar with the performance measurement techniques of software systems. Understand the metrics and attributes for measuring the performance of software systems. Know the implications of reliability mechanisms. Learn the component based systems and importance of dynamic metrics. CSEH401C BLOCKCHAIN TECHNOLOGY AND APPLICATIONSB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To get acquainted with distributed computing, To create distributed and replicated ledger of events. To study the security and privacy concerns. To know about applications of blockchain. UNIT- I Distributed System concepts: Need of distributed record keeping, Modeling faults and adversaries, Byzantine Generals problem, distributed consensus and atomic broadcast, Byzantine Models of fault-tolerance , Consensus algorithms and their scalability problems, reason for Blockchain based cryptocurrency, Technologies Borrowed in Blockchain hash pointers, consensus, byzantine fault-tolerant distributed computing, digital cash etc. UNIT- II Hyperledger: Hyperledger-Fabric fundamentals: Nodes, channels, components in a blockchain solution, Hyperledger transaction flow, participants identities & access control, Hyperledger Fabric blockchain creation, the plug and play platform and mechanisms in permissioned blockchain, Exploring Hyperledger frameworks UNIT -III Privacy &Security issues: Zero Knowledge proofs and protocols in Blockchain - Succinct non interactive argument for Knowledge ( SNARK) - pairing on Elliptic curves - Zcash , Pseudo-anonymity vs. anonymity, Zcash and Zk-SNARKS for anonymity preservation, attacks on Blockchains such as Sybil attacks, selfish mining, attacks - advent of algorand, and Sharding based consensus algorithms, Authenticated Agreement. UNIT IV Applications:Corda, Uses of Blockchain in E-Governance and other contract enforcement mechanisms, Land Registration, cyber security, integrity of information, supply chain, Medical Information Systems, Decentralized Internet of Things, Domain Name Service and prospects of Blockchain TEXT/REFERENCES BOOKS Blockchain Technology: Cryptocurrency and Applications by S. Shukla, M. Dhawan, S. Sharma and S. Venkatesan, Oxford University Press, 2019. Blockchain: The Blockchain for Beginnings, Guide to Blockchain Technology and Blockchain Programming by Josh Thompson, Create Space Independent Publishing Platform, 2017. A Step by Step guide to Enterprise Blockchain with Hyperledger Fabric: Develop De-centralized applications with Hyperledger Fabric byMustafa Husain , Sandeep Kumar, ebook The Science of the Blockchain by Wattenhofer ebook Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: At the end of the course, students will develop understanding for: Hyperledger and transaction flow. Authenticated agreement Privacy and security issues pertaining to blockchain Blockchain in IoT and supply chain. CSEH405C MATHEMATICAL AND STATISTICAL TECHNIQUESB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To understand mathematical foundation of Data science and Statistical Modelling To analyze data using Statistics and Probability techniques To understand the basic concepts sampling, distributions and hypothesis testing techniques 4. To understand of the key techniques and theory used in visualization, including data models, graphical perception and functions used for analysis of various data distributions. Unit I Statistics: Definition and scope, concepts of statistical population and sample, Data: quantitative and qualitative, Scales of measurement: nominal, ordinal, interval and ratio, Frequency distribution, Measures of Central Tendency: Mean, Median, Mode, Measures of Dispersion: range, mean deviation, standard deviation, coefficient of variation, Ginis Coefficient, Lorenz Curve. Moments, skewness and kurtosis, Quantiles, Box Plot. Outlier Detection, Quantile-Quantile Plot. Unit-II Inferential statistics: The Central Limit Theorem, distributions of the sample mean and the sample variance for a normal population, Sampling distributions (Chi-Square, t, F, z). Test of Hypothesis- Testing for Attributes Mean of Normal Population One-tailed and two-tailed tests, F-test and Chi-Square test - - Analysis of variance ANOVA One way and two way classifications. Unit-III Probability: Introduction, random experiments, sample space, events and algebra of events. Definitions of Probabilityclassical, statistical, and axiomatic. Conditional Probability, laws of addition and multiplication, independent events, theorem of total probability, Bayes theorem and its applications. Unit-IV Random variables: Random variables: discrete random variables, probabilitymass function(p.m.f) and Cumulative Distribution Function (c.d.f), statement of properties of p.m.f, illustrations and properties of random variables, Two dimensional random variables: discrete type, joint, marginal and conditional p.m.f and c.d.f., statement of properties of c.d.f, independence of variables, trinomial distribution. Textbooks/Reference books: Sheldon Ross, Introduction to Probability and Statistics for Engineers, 5/e (2014), Elsevier Morris H. DeGroot and Mark J. Schervish, Probability and Statistics (4/e)(2012), AddisonWesley. Blitzstein and Hwang, Intoduction to Probability (2015), CRC Press. William Feller, An Intoroduction to Probability, (3/e) (2008), Volume 1, Wiley. Freedman, Pisani, Purves, Statistics (4/e)(2014), W. W. Norton & Company. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcome: After completing the course the student will be able to Perform simple statistics methods for data analysis Perform statistical analysis of data using Inferential statistics and test hypothesis Perform probability models and evaluate event probabilities, conditional probability and Bayes theorem Find relations between random variables CSE481C PROFESSIONAL TRAINING SEMINAR (LEVEL-3)B. Tech. Semester VII (Computer Science and Engg.)LTPCredits--22Examination:50 MarksTotal:50 Marks Course Objectives: Acquire knowledge of the industry in which the internship is done. Apply knowledge and skills learned in the classroom in a work setting. To decide the future application areas of Computer Science and Engineering. At the end of 6th semester each student would undergo four weeks Professional Training in an Industry/ institute/ Professional / Organization/ Research Laboratory etc. with the prior approval. The student has to submit a typed report in the department along with a certificate from the organization. The typed report should be in a prescribed format. The report will be evaluated in the 7th Semester by a Committee consisting of three teachers from different specialization to be constituted by the Chairperson of the department. The basis of evaluation will primarily be the knowledge and exposure of the student towards different processes and the functioning of the organization. The student will interact with the committee through presentation to demonstrate his/her learning. Teachers associated with evaluation work will be assigned 2 periods per week load. Course Outcomes: After completing the course the students will have: An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability An ability to work in a multidisciplinary team An ability to identify, formulate, and solve engineering problems An understanding of professional and ethical responsibility. CSE483C PROJECT-IB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:50 Marks--8 4Examination:100MarksTotal:150 Marks Course Objectives: To align students skill and interests with a realistic problem or project To understand the significance of problem and its scope. Students will make decisions within a framework Project involving design/ fabrication/ testing/ computer simulation/ case studies etc. will be evaluated through a panel of examiners consisting of the following: Chairman of Department Chairperson Project coordinator Member Secretary Respective project supervisor Member The student will be required to submit two copies of his/her project report to the department for record (one copy each for the department and participating teacher). Project coordinator will be assigned the project load of maximum of 2 hrs. per week including his own guiding load of one hr. However, the guiding teacher will be assigned maximum of one period of teaching load irrespective of number of students/groups under him/her. The format of the cover page and the organization of the body of the report for all the B.Tech. will be finalized and circulated by the Dean, Faculty of Engineering and Technology. Course Outcomes: After completing the course the students will be able to: Develop the professional quality of employing technical knowledge obtained in the field of Engineering & Technology. Design and make analysis augmented with creativity, innovation and ingenuity. Develop an understanding on how to work in actual industry environment. Utilise the technical resources and write the technical report. CSEH481C PROJECT BASED ON SPECIALIZATIONB. Tech. Semester VII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks--4 2Examination:75 MarksTotal:100 Marks Course Objectives: To align student s skill and interests with a realistic problem or project To understand the significance of problem and its scope. Students will make decisions within a framework Project involving design/ fabrication/ testing/ computer simulation/ case studies etc. will be evaluated through a panel of examiners consisting of the following: Chairperson of Department Chairman Project coordinator Member Secretary Respective project supervisor Member The student will be required to submit two copies of his/her project report to the department for record (one copy each for the department and participating teacher). Project coordinator will be assigned the project load of maximum of 2 hrs. per week including his own guiding load of one hr. However, the guiding teacher will be assigned maximum of one period of teaching load irrespective of number of students/groups under him/her. The format of the cover page and the organization of the body of the report for all the B.Tech. will be finalized and circulated by the Dean, Faculty of Engineering and Technology. Course Outcomes: After completing the course the students will be able to: Develop the professional quality of employing technical knowledge obtained in the field of Engineering & Technology. Design and make analysis augmented with creativity, innovation and ingenuity. Develop an understanding on how to work in actual industry environment. Utilise the technical resources and write the technical report. EEH452C ELECTRICAL AND HYBRID VEHICLES (OPEN ELECTIVE-III)LTPCreditsClass Work:25 Marks3-- 3Examination:75 MarksTotal:100 Marks Course Outcomes: At the end of this course, students will demonstrate the ability to: 1. Understand the basic concept and history of EV and HEV. 2. Understand the models to describe hybrid vehicles and their performance. 3. Understand the different possible ways of energy storage. 4. Understand the different strategies related to energy management systems. UNIT I Introduction: History of hybrid and electric vehicles, social and environmental importance of hybrid and electric vehicles, impact of modern electric vehicles on energy supplies. Electric Vehicle Composition and Configurations, Basic concept of hybrid Electric vehicle, HEV configuration types series, parallel, series-parallel and complex hybrid, Power flow control. UNIT II Electric Propulsion: major requirements of EV motor drive, characteristics and control of DC motor, Induction motor, Switched Reluctance motor and Permanent Magnet motor, power converters devices/topology, control hardware, software and strategy vehicle, power source characterization, transmission characteristics. UNIT III Energy Storage: Introduction to energy storage requirements in Hybrid and Electric Vehicles, Energy sources, Battery based energy storage and its analysis, Fuel fell based energy storage and its analysis, super capacitor based energy storage and its analysis, Flywheel based energy storage and its analysis. UNIT IV Energy Management Strategies: Introduction to energy management strategies used in hybrid and electric vehicles, classification of different energy management strategies, comparison of different energy management strategies, implementation issues of energy management strategies. Plug-in electric vehicles, Vehicle to grid (V2G) and Grid to vehicle (G2V) fundamentals Text / References: 1. C. Mi, M. A. Masrur and D. W. Gao, Hybrid Electric Vehicles: Principles and Applications with Practical Perspectives, John Wiley & Sons, 2011. 2. S. Onori, L. Serrao and G. Rizzoni, Hybrid Electric Vehicles: Energy Management Strategies, Springer, 2015. 3. M. Ehsani, Y. Gao, S. E. Gay and A. Emadi, Modern Electric, Hybrid Electric, and Fuel Cell Vehicles: Fundamentals, Theory, and Design, CRC Press, 2004. 4. T. Denton, Electric and Hybrid Vehicles, Routledge, 2016. NOTE: 1. In Semester Examinations, the paper setter will set two questions from each unit (total 8 questions in all), covering the entire syllabus. Students will be required to attempt only five questions, selecting at least one question from each unit. 2. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. 3. For students admitted in B.Tech. 1st Year (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. MGT401C ENTREPRENEURSHIP (OPEN ELECTIVE-III) L T P External Marks: 753 0 0 Internal Marks: 25 Total Marks : 100 Duration of Examination: 3 Hours Course Objective: The main objective of the course is to expose the students to the growth of entrepreneurship in developing countries and acquaint with the establishment and running of a new enterprise Unit-I Entrepreneurship: Concept and Definitions of Entrepreneur & Entrepreneurship; Classification and Types of Entrepreneurs; Traits/Qualities of an Entrepreneurs; Entrepreneurships Challenges; Factor affecting Entrepreneurial Growth Economic &Non-Economic Factors; Entrepreneur Vs. Intrapreneur .EDP Programmes. Unit-II Innovation Technology Management: Entrepreneurial Opportunity Search and Identification; recognition of a good business opportunity; Conducting Feasibility Studies. Business Plan: Purpose of Business Plan; Contents of Business Plan; Presenting of Business Plan; Why Business plan Fails. Unit III Indian Models in Entrepreneurship: Social Entrepreneur: Introduction; Characteristics, Need, Types and Motivations of Social Entrepreneur. Women Entrepreneurship: Role & Importance, Profile of Women Entrepreneur, Problems of Women Entrepreneurs, Women Entrepreneurship Development in India. Unit-IV Developments of Entrepreneur: Micro, Small and Medium Enterprises: Concept & definitions; Role & Importance; MSMED Act 2006, Current Scheme of MSME- Technology Up-gradation Scheme , Marketing Assistance Scheme ,Certification Scheme, Credit- rating scheme , Problems facing MSME. Financing the venture: Introduction, features and process of Venture Capital, Funding from Banks. Recommended Books Roy Rajeev, Entrepreneurship 2/e, Oxford University Press. Charantimath, Poornima, Entrepreneurship Development and Small Business Enterprises, Pearson Education, New Delhi. Suggested Readings Roy Rajeev, Entrepreneurship 2/e, Oxford University Press. Charantimath, Poornima, Entrepreneurship Development and Small Business Enterprises, Pearson Education, New Delhi. Norman M. Scarborough, Essentials of Entrepreneurship & Small Business Management, PHI, New Delhi. Vasant Desai, Entrepreneurial Development and Management, Himalaya Publishing House, New Delhi. Kumar Arya, Entrepreneurship: creating and leading an entrepreneurial organization, Seventh Impression, Pearson Education. Holt, Entrepreneurship: New Venture Creation, Prentice Hall, New Delhi. Hisrich, Robert D., Michael Peters and Dean Shephered, Entrepreneurship, Tata McGraw Hill, New Delhi. Bridge, S et al., Understanding Enterprise: Entrepreneurship and Small Business, Palgrave Publication. Donald F. Kuratko, Entrepreneurship: Theory, Process, and Practice, South Western College Publications. Note: In Semester Examinations, the paper setter will set two questions from each unit (total 8 questions in all), covering the entire syllabus. Students will be required to attempt only five questions, selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B.Tech. 1stYear (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. Course Outcomes: At the end of the course: Students will be able to understand the concept of entrepreneurship, traits required to become an entrepreneur. Students will be able to design and formulate the basic principles of business plans, they can choose and present their business plan Students will know about the different types of entrepreneur Students will be aware of the role of MSME in the development of Small Scale industries. ME452C FUNDAMENTALS OF SUSTAINABLE MANUFACTURING(OPEN ELECTIVE-III)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Outcomes: At the end of this course, students will be able to Summarize sustainability issues and driversof sustainability. Understand various standards for Environmental Impact Assessment. Apply various tools and technique to access manufacturing sustainability. Comprehend sustainability advantages associated with various manufacturing initiatives. UNIT I Introduction: Introduction to sustainability and drivers for sustainable development and sustainable Sustainable Manufacturing - Concept of Triple bottom line, Environmental, Economic and Social Dimensions of Sustainability, Sustainable Product Development Various Phases. UNIT II Tools and Techniques: Environmental Conscious Quality Function Deployment, Life cycle assessment, Design for Environment, R3 and R6 cycles, loop production systems, Reverse supply chain, product acquisition management Design for Disassembly. UNIT III EIA Standards: CML, EI 95 and 99, ISO 14001 EMS and PAS 2050 standards, Environmental Impact parameters Energy in manufacturing (assessment and minimization)the Design for recycling: Eco friendly product design methods Methods to infuse sustainability in early product design phases UNIT IV Sustainability Assessment: Concept, Models and Various Approaches, Toxic substances in industry, Product Sustainability and Risk/Benefit assessment Corporate Social Responsibility, Industry cooperation for reducing Carbon footprint Green Manufacturing: Dry and near-dry machining, edible oil-based cutting fluids, cryogenic machining, improving work environment, of lean manufacturing, Lean techniques for green manufacturing and strategies for waste reduction in green manufacturing. Textbooks: G. Atkinson, S. Dietz, E. Neumayer  Handbook of Sustainable Manufacturing . Edward Elgar Publishing Limited, 2007. D. Rodick, Industrial Development for the 21st Century: Sustainable Development Perspectives, UN New York, 2007. Reference Books P. Lawn, Sustainable Development Indicators in Ecological Economics, Edward Elgar Publishing Limited. S. Asefa, The Economics of Sustainable Development, W.E. Upjohn Institute for Employment Research, 2005. Notes: In Semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attend only five questions selecting atleast one question from each unit. The use of scientific calculator will be allowed in the examination. However, programmable calculator and cellular phone will not be allowed. For students admitted in B.Tech. 1st Year (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. CHE459C : NANOSCIENCE AND NANOTECHNOLOGY(OPEN ELECTIVE-III)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To initiate the student in the area of development of new materials / nanomaterials for novel applications and devices. To impart foundational knowledge of nanoscience and related fields. To make the students acquire an understanding of the analytical techniques in nanoscience and nanotechnology fields. To help them understand in broad application areas of nanoscienceand nanotechnology in engineering. UNIT-I Types of materials; bonding in materials; crystal structures and defects; amorphous materials; origins of properties of materials; Effect of nanostructures on properties of materials. The science of materials materials science; Historical use of nanoparticles; discovery of the carbon nanotubes; fullerenes; nanostructured materials UNIT-II Particle-wave duality; de-Broglie waves; Schrodinger equation in 1-Dimension; Superposition; Energy eigenstates; Interpretation of wave function; Fermions and Bosons; Electron density of states; Energy bandgaps; Fermi energy; Excitons and Bohr radius. UNIT-III AFM; STM; Transport in nanostructures; 0,1 and 2 dimensional nanostructures; Bandgap engineering; Molecular motors; MEMS and NEMS devices. Biomaterials and nano-biotechnology. UNIT-IV Synthesis of Nanomaterials ZnO and Fe3O4. Characterization of phases and quantification of phases. Applications of Nanomaterials: In textile industry, in catalytic operations, in energy generation, in energy storage, in environmental remediation and in sensors and devices. TEXT BOOKS: NANO:The Essentials Understanding Nanoscience and Nanotechnology, T. Pradeep, Tata McGraw Hill Publishing Company Limited, 2007, 0-07-154830-0. Material Science and Engineering, 7thed. , William D. Callister, Johan Wiley & Sons, Inc. Nanostructured Materials and Nanotechnology, Hari Singh Nalwa, Academic Press, 2002. Nanostructures and Nanomaterials, synthesis, properties and applications., Guozhong Cao, Imperial College Press, 2004. REFERENCE BOOKS: Introduction to Nanoscience, S.M. Lindsay, Oxford University Press, 2010, ISBN: 9780199544219 (Pbk). 2. Nanoscience, Hans-Eckhardt Schaefer, Springer, 2010, ISBN 978-3-642-10558-6. 3. Chemistry of nanomaterials: Synthesis, Properties and applications. C.N.R. Rao, Achim Muller, A.K. Cheetham, Wiley-VCH, 2004. NOTES: Part A: Till academic session 2020-2021:In Semester Examinations, the paper setter will set two questions from each unit (total 8 questions in all), covering the entire syllabus. Students will be required to attempt only five questions, selecting at least one question from each unit. Part B: From Academic Session 2021-2022 onwards: For the semester examination, nine questions are to be set by the examiner. Question no. 1, containing 6-7 short answer type questions, will be compulsory & based on the entire syllabus. Rests of the eight questions are to be set by setting two questions from each of the four units of the syllabus. The candidates will be required to attempt five questions in all, selecting one from each unit. All questions will carry equal marks. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. For students admitted in B.Tech. 1st Year (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. Course Outcomes: After completing this course, students will be able to: Learn about the background on nanoscience and give a general introduction to different classes of nanomaterials. Develop an understanding of the science behind the nanomaterial properties. Apply their learned knowledge to study and characterize nanomaterials. Familiarize themselves with the variety of nanotechnology applications, and know how to approach the synthesis of nanomaterials with a set of desirable properties. EE454C SMART GRID (OPEN ELECTIVE-III)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours UNIT-I Introduction: Concept of smart grid, smart grid control, Communications and Sensing in a Smart Grid, Hardware Architecture, Software architecture, Protocol detail, application & benefits, PLCs Vs RTUs, IEDs, RTU Block diagram, PMU communication interface. UNIT-II Cyber Security of the Smart Grid: Smart Grid Threats, Vulnerabilities and Cyber Security Strategies, Cyber Security Environment, False Data Injection and Attacks in Electric Power Grids Cyber-Physical System Security. UNIT-III Smart Grid Technologies: Energy Management System, Demand side management: peak clipping, valley filling, load shifting etc., state estimation, load forecasting. Time of the day pricing(TOD), Time of use pricing(TOU). UNIT-IV Distributed Generation & Control: Concept of distributed generation, Introduction of various distributed generation sources like wind, solar, fuel-cell, micro-hydro, PHEVs etc., Grid integration and control of distributed generation sources. TEXT BOOKS: 1. T. Gnen, Electric Power Distribution System Engineering, McGraw-Hill, 1986. ISBN: 0- 8493- 5806-X. 2. Distribution System Protection Manual, McGraw-Edison Power Systems, 1990. 3. Westinghouse Electric Utility Ref. Book, Vol.3, Distribution Systems, 1965. 4. R. E. Brown, Electric Power Distribution Reliability, Marcel Dekker Inc., 2002 REFERENCE BOOKS: 1. IEEE Power and Energy Magazine, July/August 2007 Issue 2. James Burke, Power Distribution Engineering, Mercel Dekker, 1994. 3. A.J. Pansini, Electrical Distribution Engineering McGrawHill, 1983. 4. E. Lakervi, E.J.Holmes, Electricity Distribution Network Design, IEE series, 1989. 5. J. Gers and E. J. Holmes Protection of Electricity Distribution Networks 2nd Edition. NOTE: 1. In Semester Examinations, the paper setter will set two questions from each unit (total 8 questions in all), covering the entire syllabus. Students will be required to attempt only five questions, selecting at least one question from each unit. 2. The use of scientific calculator will be allowed in the examination. However, programmable calculator, mobile phones or other electrical/ electronic items will not be allowed in the examination. 3. For students admitted in B.Tech. 1st Year (C-Scheme) in 2019 & onwards and all trailing students: Examinations and evaluations of students shall be conducted, covering the entire syllabus, as per guidelines AICTE Examination Reforms. Students shall be informed about these reforms. Course Outcomes: At the end of this course, students will demonstrate the ability to 1. Understand the features of Smart Grid. 2. Understand to make conventional grid more smart, reliable, and efficient. 3. Understand the technical expertise in the emerging area of smart grid. 4. Understand the concepts of distributed generation. CSE401C ADVANCED COMPUTER ARCHITECTUREB. Tech. Semester VIII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks30--3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To learn the concept of modern computers along-with performance analysis measures. To understand the architectures of various processor types of processors. To explore the paradigms of memory organization. To understand the concepts of parallelization techniques for processing of instructions. UNIT-I Introduction: Elements of modern computers (computing problems, algorithms, hardware, OS, system software); Evolution of computer architecture; Factors affecting system performance; architectural development tracks (Multiple-processor tracks, Multivector & SIMD tracks, Multithread & Dataflow tracks) Conditions of parallelism (Data dependence, Resource dependence, control dependence, Bernsteins Conditions); Hardware & Software parallelism; Program partitioning & Scheduling; Program flow machines (Control flow, Data flow, Demand driven); Parallel processor applications; Speedup performance laws (Amdahls law, Gustafsons law); Scalability (Goals, Metrics, evolution of scalable architectures, open issues) UNIT-II Advanced processor Technology: Design space; Instruction pipelines; Instruction set architecture (RISC, CISC, RISC scalar processors, CISC scalar processors); Superscalar Processors, VLIW architecture; Vector & Symbolic processors; Pipelining: Linear pipeline processors, Nonlinear pipeline processors, Instruction pipeline(pipelined instruction processing, mechanisms for instruction pipelining, dynamic instruction scheduling, branch handling techniques) Parallel & Scalable Architectures: Hierarchical bus system, Crossbar switch & multiport memory, multistage & combining networks; Cache coherence & synchronization mechanisms (cache coherence problem, Snoopy bus protocols, directory based protocols. UNIT-III Advanced Memory Technology: Bus system (Backplane bus specification, addressing & timing protocols, Arbitration, Transaction and Interrupt, IEEE futurebus) Cache organizations (Cache addressing models, cache performance issues); Shared memory organizations (Interleaved memory organization, Bandwidth and fault tolerance, memory allocation schemes, Sequential & weak consistency models. Latency hiding techniques. UNIT-IV Parallel Models and Languages: Parallel Programming Models (Shared-Variable, Message passing, Data-Parallel, Object-Oriented); Parallel languages & Compilers (language features for parallelism, parallel language constructs, optimizing compilers for parallelism); Code optimization & partitioning (Scalar optimization, Local & Global optimization, Vectorization, code generation & scheduling, Trace scheduling compilation); Parallel programming environments (S/W Tools, Y-MP, Paragon, CM-5 Environments , Visualization & Performance tuning) TEXT /REFERENCE BOOKS: Advance Computer Architecture: Parallelism, Scalability, Programmability; 2nd Edition by Kai Hwang & Naresh Jotwani, 2012, TMH. Pipelined and Parallel processor design by Michael J. Fiynn 1995, Narosa. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After successful completion of the course, a student should be able to: Have an understanding of concept of modern computers along-with performance analysis measures. Have an ability to identify the architectures of various processor types of processors. Understand the paradigms of memory organization. Understand the concepts of simultaneous processing of instructions. CSE404C SOFTWARE PROJECT MANAGEMENTB. Tech. Semester VIII (Computer Science and Engg.)LTPCreditsClass Work:25 Marks 3-- 3Examination:75MarksTotal:100 MarksDuration of Examination:3 Hours Course Objectives: To explain needs for software specifications and to study different types of software requirements gathering techniques. To convert the requirements model into the design model and demonstrate use of software and user interface design principles. To justify the role of SDLC in Software Project Development and to study risks associated with a project. To generate project schedule and can construct, design and develop network diagram for different type of Projects. UNIT- I Introduction to Software Project Management (SPM): Definition of a Software Project (SP), SP Vs. other types of projects activities covered by SPM, Fundamentals of Software Project Management (SPM), Need Identification, Vision and Scope document, Project Management Cycle, SPM Objectives, project as a system, management control, requirement specification, information and control in organization, Project management and CMM. Stepwise Project planning: Introduction, selecting a project, identifying project scope and objectives, identifying project infrastructure, analyzing project characteristics, identifying project products and activities, estimate efforts each activity, identifying activity risk, allocate resources, review/ publicize plan. UNIT- II Project Evaluation & Estimation:- Cost benefit analysis, cost benefit evaluation techniques, risk evaluation. Selection of an appropriate project approacht;, structured methods, rapid application development, water fall-, V-process-, spiral-models. Prototyping, delivery. Albrecht function point analysis. Project Scheduling:- Objectives of activity planning, project schedule, projects and activities, Identifying activities, sequencing and scheduling activities, network planning model, Network Diagrams, CPM, representation of lagged activities, backward and forward pass, identifying critical path, activity throat, shortening project , precedence networks. Risk Management:- Introduction, the nature of risk, managing risk, risk identification, risk analysis, reducing the risks, evaluating risks to the schedule, calculating the z values. UNIT- III Project Monitoring & control:- identifying resource requirements, scheduling resources, PERT, Gantt Charts, Earned Value Analysis, Earned Value Indicators: Budgeted Cost for Work Scheduled (BCWS), Cost Variance (CV), Schedule Variance (SV), Cost Performance Index (CPI), Error Tracking, Software Reviews, Types of Review: Inspections, Deskchecks, Walkthroughs, Code Reviews, Pair Programming. Managing contracts and people-: Introduction, types of contract, stages in contract, placement, typical terms of a contract, contract management, acceptance, Managing people and organizing terms: Introduction, understanding behavior, organizational behavior: a back ground, selecting the right person for the job, instruction in the best methods, motivation, working in groups, becoming a team, decision making, leadership, organizational structures, conclusion, further exercises. UNIT- IV Software quality Assurance and Testing:- Testing Objectives, Testing Principles, Test Plans, Test Cases, Types of Testing, Levels of Testing, Test Strategies, Program Correctness, Program Verification & validation, Concept of Software Quality, Software Quality Attributes, Software Quality Metrics and Indicators, The SEI Capability Maturity Model CMM), SQA Activities, Formal SQA Approaches: Proof of correctness, Statistical quality assurance, Clean room process. Software Project Management Tools:- CASE Tools, Planning and Scheduling Tools, MS-Project. TEXT/ REFERENCE BOOK: Software Project Management (2nd Edition), by Bob Hughes and Mike Cotterell, 1999, TMH Software Engineering A Practitioners approach, Roger S. Pressman (5th edi), 2001, MGH Software Project Management, Walker Royce, 1998, Addison Wesley. Project Management 2/c. Maylor Managing Global software Projects, Ramesh, 2001, TMH. S. A. Kelkar, Software Project Management, PHI Publication. Note: In semester Examinations, the examiner will set two questions from each unit (total 8 questions in all) covering the entire syllabus. The students will be required to attempt only five questions selecting at least one question from each unit. For students admitted in B Tech 1st year (C-Scheme) in 2019 and all training students: Examination and evaluations of students shall be conducted as per guidelines AICTE Examinations reforms covering the entire syllabus. The students shall be made aware about the reforms. Course Outcomes: After completing the course the students will be able to: Explain needs for software specifications and different types of software requirements gathering techniques. Convert the requirements model into the design model and demonstrate use of software and user interface design principles. Justify the role of SDLC in Software Project Development and identify the risks associated with a project. Generate project schedule and can construct, design and develop network diagram for different type of Projects. CSE482C PROJECT-IIB. Tech. Semester VIII (Computer Science and Engg.)LTPCreditsClass Work:50 Marks --18 9Examination:100MarksTotal:150 MarksDuration of Examination:3 Hours Course Objectives: To align student s skill and interests with a realistic problem or project To understand the significance of problem and its scope. Students will make decisions within a framework Project involving design/ fabrication/ testing/ computer simulation/ case studies etc. will be evaluated through a panel of examiners consisting of the following: Chairman of Department Chairperson Project coordinator Member Secretary Respective project supervisor Member The student will be required to submit two copies of his/her project report to the department for record (one copy each for the department and participating teacher). Project coordinator will be assigned the project load of maximum of 2 hrs. per week including his own guiding load of one hr. However, the guiding teacher will be assigned maximum of one period of teaching load irrespective of number of students/groups under him/her. Internal evaluation will be carried out four times in a semester. The format of the cover page and the organization of the body of the report for all the B.Tech. will be finalized and circulated by the Dean, Faculty of Engineering and Technology. Course Outcomes: After completing the course the students will be able to: Develop the professional quality of employing technical knowledge obtained in the field of Engineering & Technology. Design and make analysis augmented with creativity, innovation and ingenuity. Develop an understanding on how to work in actual industry environment. Utilise the technical resources and write the technical report. CSE484C PROFESSIONAL TRAINING (LEVEL-4)B. Tech. Semester VIII (Computer Science and Engg.)LTPCreditsClass Work:100 Marks --- 15Examination:250MarksTotal:350 MarksDuration of Examination:3 Hours Course Objectives: Acquire knowledge of the industry in which the internship is done. Apply knowledge and skills learned in the classroom in a work setting. To decide the future application areas of Computer Science and Engineering. Pre-requisite: Students will have to undergo Professional Training (Level-4) of at least one semester from the industry, institute, research lab, training centre etc. who have CGPA of minimum 7.0 till VI sem. with no backlog will only be permitted to proceed for Professional Training. In the 8th semester student can opt for Professional Training in an Industry/ Institute/ Professional / Organization/ Research Laboratory etc. with the prior approval and submit a typed report in the department along with a certificate from the organization. The student will be assigned internal supervisor from the department wh /0=CEGHJPQ]^_`efgh䫹䥓yk]OK3.jhR<hJPB*OJPJQJU^JphhJPhJPCJ OJPJQJ^JhJPCJ OJPJQJ^Jh\PMCJ OJPJQJ^Jh\PMhJP5#h\PMhJP5CJ OJPJQJ^J#h\PMh\PM5CJ OJPJQJ^J hJPaJh+<OJPJQJ^JaJhJPH*OJPJQJ^JaJhOOJPJQJ^JaJh\PMOJPJQJ^JaJhJPOJPJQJ^JaJhJPCJ0OJPJQJ^J Q_`g $^a$gd q $dha$gd 1$~dh]~^`a$gd 1dh]^gd 1Dddh]D^d`gd 1$dh^a$gd 1${dh]{^`a$gd 1 h      E мККЏ~f_ЏUh/h\PM5CJ hs5CJ /jhohJP5CJ UmHnHsH @tH @u hs5CJ mHnHsH @tH @u hJP5CJ h+~hOmH sH hJPCJ8OJPJQJ^J hJPCJ hJPCJ4 h+~CJ4hJPCJ4OJPJQJ^JhJP.jhR<hJPB*OJPJQJU^Jph%hR<hJPB*OJPJQJ^Jph    E  b  $]^a$gd q$a$gd q$,],^`a$gd q$]`a$gd q $^a$gd q !^gdsgd q${d]{^a$gd qE       a b   - d e rrrrrar!hv%hJPB*OJQJ^Jphhv%hJPOJQJ^Jh%hJP5OJQJ^Jhv%hJPOJQJh%hJP5 hJP5h\PM5OJQJ\aJh\PMh\PM5CJH*\aJh\PM5CJ\aJh\PMh\PM5CJ\aJh hJP0JCJhJPjhJPU hOCJh hJPCJ&    % 2 D S X j p x $If`gd q $Ifgd q $If^gd q$s ]s^ `a$gd q $ $If^gd qkd7$$If4Q  VJt"R&*Tv*>&$$$$44 a"ytv% $i$If]ia$gd q$s$If]sa$gd q $If^gd qFf: s$If]sgd q $If`gd q $Ifgd q      $D$If]Da$gd q$8$If]8a$gd q 4$If^4gd q $Ifgd q $If^gd qFf\>$s$If]sa$gd q$e$If]ea$gd q " $ ( * , - / 7 N P R T W Z  $$Ifa$gd q$e$If]ea$gd q$i$If]ia$gd q $Ifgd q $Ifgd:,9 $If^gd qFf[B$s$If]sa$gd q$B$If]Ba$gd q$I$If]Ia$gd qZ \ ` b d e g p $q$If]qa$gd q$b$If]ba$gd q$f$If]fa$gd q$p$If]pa$gd q $Ifgd q $If^gd qFfLF$s$If]sa$gd q $If^gd qFf.N$r$If]ra$gd q$$If^a$gd q $$Ifa$gd q $Ifgd qFf=J$q$If]qa$gd q   D E o p $&*ʽʽװ|rhd] h:,9h:,9hJPh%hJP5;h%h%5aJ h%5aJh%hJP5aJh%hJP5CJaJ h%hJPh%h05h%hJP5h%hJP5B*phh0hJPOJQJ^Jh0h0OJQJ^Jhv%hJPOJQJ!hv%hJPB*OJQJ^Jphhv%hJPOJQJ^J    . 0 2 $h$If]ha$gd q$r$If]ra$gd q $Ifgd q $If^gd qFfR$e$If]ea$gd q$i$If]ia$gd q$s$If]sa$gd q2 4 7 9 < @ B D E G O U Y [ ] _ b d g k m $h$If]ha$gd q $Ifgd q $If^gd qFfV$r$If]ra$gd q$c$If]ca$gd qm o p r y | Ff]$c$If]ca$gd q$h$If]ha$gd q $Ifgd q $If^gd qFfZ$r$If]ra$gd q $C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q$9$If]9a$gd q 5$If^5gd q kd`$$If  xVPJt"R& hv*v*>&((((44 a"ytv% %&-#mnopqrstuvw$a$gd q^gd:,9$ Z@&^a$gd:,9$ & F: Z@&a$gd:,9 $ & F:@&a$gd:,9 & F:gd,^gd q#RSlnopx%&pr79XYGHR~vkkkd h%h0h%hJPB*phh%hJP5hJP5OJQJ\aJh/5OJQJ\aJh\PMh/5CJH*\aJh/5CJ\aJh\PMh/5CJ\aJhJP h%hJPh:,9h:,9CJaJh:,9h:,9PJ h:,9h:,9h:,9h:,9PJ_H9mH @sH @h:,9h:,9mH sH "&qrw| $If`gd q $Ifgd q $If^gd q$a$gd q$]^a$gd q$ $If^gd qkda$$If4Q  VJt"R&````*T`v`*`>&$$$$44 a"ytU  57$p$If]pa$gd q5$If^5`gd q & F=$If^gd,Ffd$s$If]sa$gd q $If`gd q $Ifgd q79;>ACGIKLMVhjl$:$If]:a$gd q5$If^5`gd q $Ifgd q & F=$If^gd,FfWh$q$If]qa$gd q$p$If]pa$gd q$b$If]ba$gd q$f$If]fa$gd qlnqtvz|~ss$:$If]:a$gd q 5$If^5gd q $Ifgd q & F=$If^gd,FfVl$r$If]ra$gd q$C$If]Ca$gd q$J$If]Ja$gd q$q$If]qa$gd q$F$If]Fa$gd q ss$7$If]7a$gd q 4$If^4gd q $Ifgd q & F=$If^gd,FfGp$q$If]qa$gd q$C$If]Ca$gd q$J$If]Ja$gd q$p$If]pa$gd q$F$If]Fa$gd q $E$If]Ea$gd q$9$If]9a$gd q $Ifgd q & F=$If^gd,Ff8t$A$If]Aa$gd q$H$If]Ha$gd q$s$If]sa$gd q$C$If]Ca$gd q"%'+-/019Y[]_b$c$If]ca$gd q$h$If]ha$gd q$r$If]ra$gd q5$If^5`gd q $Ifgd q & F=$If^gd,Ff)x$C$If]Ca$gd q$J$If]Ja$gd qbdgkmopqz$J$If]Ja$gd q$F$If]Fa$gd q$:$If]:a$gd q5$If^5`gd q $Ifgd q & F=$If^gd,Ff|$r$If]ra$gd q$K$If]Ka$gd q$G$If]Ga$gd q$;$If];a$gd q 5$If^5gd q $Ifgd q & F=$If^gd,Ff $r$If]ra$gd q$C$If]Ca$gd q;=?ADGIMOQRX$5$If^5a$gd qFf$c$If]ca$gd q$h$If]ha$gd q$r$If]ra$gd q $Ifgd q & F=$If^gd,FfRWvwz{03JPVuv%&ÿÎÇςwi^i^h/5CJ\aJh\PMh/5CJ\aJhJP5CJ\aJ hJP5 h `hJP hY]h+~h `h `PJh `h `PJ_H9mH @sH @h `h `mH sH  h:,9h `h ` hY]hJP hY]5hY]hJP5hJP5OJQJ\aJ h%hJPh%hJP5h%hJP5B*phX[]`dhlpsv$C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q$9$If]9a$gd q vwkd$$If  xVPJt"R& hv*v*>&((((44 a"yt0wxyzvO $If^gd q$]^a$gd q Z ^Z `gd q$ & F:h^ha$gd ` $^a$gd q$a$gd q+,NO48>?^b*Hce»whJPB*phh{ahVhJPB*mH @phsH @hJPhVhJPB*phhVhJPmH @sH @ hVhJPhnnh%5 hVh%hVh%5h/5OJQJ\aJh\PMh/5CJ\aJh/5CJ\aJh/h/5CJH*\aJ+ "#*456$s$If]sa$gd q$$If`a$gd q $$Ifa$gd qFf $If`gd q $Ifgd q6789A^`bdgjlprtuFfk$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $If^gd q $Ifgd q & F<@$If^@gd,Ff $$Ifa$gd quv~FfQ$r$If]ra$gd q$J$If]Ja$gd q$$If^a$gd q$q$If]qa$gd q$$If^a$gd q $If^gd q $Ifgd q & F<@$If^@gd, $If^gd q $Ifgd q & F<@$If^@gd,Ff7$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $If^gd q $&()*2HJL$$If^a$gd q $If^gd q $Ifgd q & F<@$If^@gd,Ff$H$If]Ha$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd qLNQTVZ\^_`f{} $Ifgd q & F<@$If^@gd,Ff$q$If]qa$gd q$J$If]Ja$gd q$$If^a$gd q$p$If]pa$gd q$$If^a$gd q$K$If]Ka$gd q$$If^a$gd q $Ifgd q & F<@$If^@gd,Ff$J$If]Ja$gd q$$If^a$gd q$r$If]ra$gd q  $$If^a$gd q $If^gd q $Ifgd q & F<@$If^@gd,Ffϫ$C$If]Ca$gd q$$If^a$gd q$K$If]Ka$gd qCEGILNPSUWX~Ff$C$If]Ca$gd q$$If^a$gd q $$Ifa$gd q$J$If]Ja$gd q$$If^a$gd q $If^gd q $If^gd q & F<@$If^@gd,Ff;CEGIPUX]gjoqsvwxz}~{|֣wpgwgp]hh75CJhqthY]CJ hqthY]hqthY]5CJ hqth7hqth75CJh"h75\ hVhbhJPhVhJP5mH @sH @hJP5mH @sH @ h+<5hVhJP5hVhJP5B*ph hVhJPhVhJPmH @sH @hVhJPB*mH @phsH @hVhJP\"X^adgkoswz}~$@&]^a$gd q * ^* `gd qFfU$C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q$9$If]9a$gd q$5$If^5a$gd q $6EJ\bj{{k$$If`a$gd q$$If^a$gd qhkdz$$IfEQ'='0='44 a"ytY] $$Ifa$gd q j{|}~Ff$s$If]sa$gd q$$If`a$gd q$$If^a$gd qFff $$Ifa$gd q &'0MSUXZcd "%'01_pqrs{|ŸдܮܮдŸдܮܮРŸРhthh75CJ h7CJh,hqth7B*CJph hVh7h?qh7h7mH @sH @hqth7CJ hqth7hqth75CJ\ h75CJ>  zzjjjZ$s$If]sa$gd q$$If^a$gd q $Ifgd q$ & F>@$If^@a$gd,hkdq$$IfEQ'='0='44 a"ytY]'MOQSVX[$q$If]qa$gd q$$If^a$gd q $Ifgd q$ & F>@$If^@a$gd,Ffq$s$If]sa$gd q$I$If]Ia$gd q$$If^a$gd q[_acdbN$ & F@$If^@a$gdjhkd$$IfUQ'='0='44 a"ytY]FfW$r$If]ra$gd q$$If^a$gd q$J$If]Ja$gd q $ & F@$If^@a$gdjFf$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $Ifgd q #%(,.01qrRhkd%$$IfUQ'='0='44 a"ytY]Ff$r$If]ra$gd q$J$If]Ja$gd q$$If^a$gd q$q$If]qa$gd q rs|Ff+$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $Ifgdt $Ifgd q$ & F@$If^@a$gdj}}$9$If]9a$gd q$$If^a$gd qFf$r$If]ra$gd q$J$If]Ja$gd q$$If^a$gd q$q$If]qa$gd q$$If^a$gd q $If^gdt   *+]bcdfwxû|rh/6h]5H*h]h/6hJP5H*hJPmH @sH @hahJPB*phhVhJPmH @sH @hJPhahJP5 hVhJPhVhJP5 hE5hVh75mH @sH @ h75hf#h75 hqth7 h7CJhqth7CJhVh75,  *+7DP] $Ifgd qgd q$a$gdbFf$C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q]^fx[RRRR $Ifgd qkd$$Ifl\(J t0644 laytU[RRER $If^gd q $Ifgd qkd$$Ifl\(J t0644 laytU T_`a  !!#!!!!!!!! ""7"H"S"e""""####i#j#########ʱh/h/5CJH*\aJh/5CJ\aJh\PMh/5CJ\aJh7 hu5\hVhJP5\ hkehJP hJPH*hahJPB*phhJP hVhJPh/6hJP5H*9 [RRER $If^gd q $Ifgd qkdr$$Ifl\(J t0644 laytU` YLLGG?$a$gd qgd q 0^`0gd qkd6$$Ifl \(J t0644 laytU  !"###j###$$$#$0$>$P$_$ $If`gd q $Ifgd q $If^gd q$]^a$gd q$a$gd q$h@&]^ha$gd q$ & F;h@&]^ha$gd,#$$$$$$$$$$$$$$$$$%"%#%+%8%:%;%<%S%U%V%e%%%%%%%%%%%%& &&&&&&&&$&%&)&.&׽hohJP5B*phh{ahohJPB*mH @phsH @hohJPB*phhJP hohJPhohJPmH @sH @hnnhu5 hVhu hohuhVhu5hg5OJQJ\aJh/5OJQJ\aJ5_$e$w$}$$$$$$$$$$$$$$$$$Ff$s$If]sa$gd q$$If`a$gd q $$Ifa$gd q $If^gd qFf_ $Ifgd q$$$$$$$$$$$$$$$$%%% % $If^gd qFf$I$If]Ia$gd q $$Ifa$gd q$$If^a$gd q $Ifgd q & F?$If^gd, % %%%%%%%%#%8%:%<%>%A%D%F%J%$H$If]Ha$gd q$$If^a$gd q $If^gd q $Ifgd q & F?$If^gd,Ff$I$If]Ia$gd q $$Ifa$gd qJ%L%N%O%P%V%f%h%j%l%o%r%t%x%z%|%}%~%%Ff$H$If]Ha$gd q$$If^a$gd q $If^gd q $Ifgd q & F?$If^gd,Ff $$Ifa$gd q%%%%%%%%%%%%%%%%%%%% $Ifgd q & F?$If^gd,Ffw$J$If]Ja$gd q $$Ifa$gd q$$If^a$gd q $If^gd q%%%%%%%%%&&&&&& &$&&&$$If^a$gd q$$If^a$gd q $If^gd q $Ifgd q & F?$If^gd,Ff]$J$If]Ja$gd q $$Ifa$gd q&&(&)&/&2&4&6&:&>&B&F&I&L&M&N&O&^gd qFf$C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q$9$If]9a$gd q$5$If^5a$gd qFfC$$If^a$gd q.&4&5&6&9&?&@&F&H&L&M&N&O&&&&&&&J'K'N'f'i'j'''''''''Ľuld] h#Gh7h7mH @sH @hqth7CJhqth75CJ\ h75CJhh75CJhqthgCJ hqthghqthg5CJ hqth7hqth75CJ h75\h"h75\h7 hVhJPhghJP hohJP hTN5 h+<5 hJP5hohJP5 O&&&&&&&&&''zjjZ$$If`a$gd q$$If^a$gd qhkd"$$IfE' '0 '44 a"ytg $$Ifa$gd q$@&]^a$gd q ''+'1'9'J'K'L'M'N'P'R'T'U'\'f'g'h'i'j''Ff $s$If]sa$gd q$$If`a$gd q$$If^a$gd qFf  $$Ifa$gd q'''''''''zzjjjZ$s$If]sa$gd q$$If^a$gd q $Ifgd q$ & F@$If^@a$gdjhkd$$IfE' '0 '44 a"ytg''''''''(((((((((()(*(2(3(W(X(\(n(o(((((((((((()+)1)3)ƿΪΤΤΝƿΝΝƿΝvngv h#Gh`%h`%mH @sH @hqth`%CJ heu 5CJhheu 5CJhqtheu B*CJph hqtheu h`%CJ heu CJh#Gheu B*phheu h#Gheu heu mH @sH @hqtheu CJ hqth7hqth7CJhqth7B*CJphh#Gh7B*ph('''''''''(((((( ($q$If]qa$gd q$$If^a$gd q $Ifgd q$ & F@$If^@a$gdjFf$s$If]sa$gd q$I$If]Ia$gd q$$If^a$gd q ($(&((()(*(3(X(Z(\(^(a(d(f(j(}$I$If]Ia$gd q$s$If]sa$gd q$$If^a$gd q $Ifgd q$ & F@$If^@a$gdjFf$r$If]ra$gd q$$If^a$gd q$J$If]Ja$gd qj(l(n(o(((((bNE $Ifgd q$ & F@$If^@a$gdjhkdV$$IfU' '0 '44 a"ytg$r$If]ra$gd qFf$s$If]sa$gd q$$If^a$gd q((((((((((((()+)-)/)1)$ & F@$If^@a$gdjFf\$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $Ifgd q1)4)6)9)=)?)A)B)C)L)h)j)l)n)}}}$$If^a$gd q $Ifgd q$ & F@$If^@a$gdjFfB!$r$If]ra$gd q$$If^a$gd q$J$If]Ja$gd q$$If^a$gdb7$q$If]qa$gd q 3)4)5)6)8)A)B)C)K)h)l)~)))))))))))))*$*%*+*-*.*/*0*2*;*<*=*E*S*W*i*j*z*****ᾴᾎz hE5 hg5h/heu 5CJh/heu 5h#Gh`%5 h#Gh`%h`%mH @sH @ heu 5CJhheu 5CJ hqtheu hqtheu B*CJph h#Gheu heu mH @sH @hqtheu CJ hqth`% h`%CJhqth`%CJ-n)q)t)v)z)|)~))))Rhkd'$$IfU' '0 '44 a"ytg$r$If]ra$gd qFf(%$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q )))))))))))))))*%*Ff)$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $If^gd q $Ifgd q$ & F@$If^@a$gdj%*'*)*+*.*0*3*7*9*;*<*=*F*} $Ifgd q$ & F@$If^@a$gdjFf-$r$If]ra$gd q$$If^a$gd q$J$If]Ja$gd q$$If^a$gdb7$q$If]qa$gd q$$If^a$gd q F*S*U*W*Y*\*_*a*e*g*i*j*z*|*~***$q$If]qa$gd q$$If^a$gd qFfk1$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $If^gd q************** $Ifgd q$a$gdbgd qFf%5$r$If]ra$gd q$J$If]Ja$gd q$$If^a$gd q **********+ + +++*+++,+3+4+6+N+O+W+X+|+}++++++++++++++++++, ,,,/,3,8,:,<,?,X,],c,e,g,,,,ѹͯѹͯѨ؛؛hJPB*ph h75 hVhJPhZ]hJP5H*hJPmH @sH @hTNhTNH*h4t*hJP h$hJPh$hJPB*phh$hJP5 hVhb hJP5hVhJP5=***++-+]TTTT $Ifgd qkdJ7$$Ifl\Fl(Jh t044 laytg-+.+6+O+X+~+]TTTT $Ifgd qkd 8$$Ifl\Fl(Jh t044 laytg~++++++]TTGT $If^gd q $Ifgd qkd8$$Ifl\Fl(Jh t044 laytg+++++++,[VVMMMM $Ifgd qgd qkd9$$Ifl\Fl(Jh t044 laytg,,,4,<,^,[RRRR $Ifgd qkdR:$$Ifl\i(II t0644 laytU^,_,g,,,,[RRRR $Ifgd qkd;$$Ifl\i(II t0644 laytU,,,,,,,,,,,,,,,,,---*-+-E-F-J-L-N-e-w-x------------------------˼Т훩񢩐آ h#GhJPhDLhJPB*ph hJP5H* hDLhJPhDLhJPB*phhDLhJP5 hVhJPhVhJP5 hJP5hJPB*phh$hJPB*phhZ]hJP5H*hJP h$hJPhJPmH @sH @4,,,,,,[RRRR $Ifgd qkd;$$Ifl\i(II t0644 laytU,,,--,-8-E-YTTKKKK $Ifgd qgd qkd<$$Ifl\i(II t0644 laytUE-F-N-x---[RRRR $Ifgd qkdf=$$Ifl\(J t0644 laytU------[RRRR $Ifgd qkd*>$$Ifl\(J t0644 laytU------[RRER $If^gd q $Ifgd qkd>$$Ifl\(J t0644 laytU---O...9/:/YLLLGG?$a$gd qgd q 0^`0gd qkd?$$Ifl\(J t0644 laytU--.C.M.O.P......5/9/:/;/>/@/v/{///00$0%0)0+080s0t0u00000000000000000001&101B1a1c1x2222222222233 3ü h[*hJPh7 hg5\hVhJP5\ h75\hTN hVhTNhTNhTNH*hJP hVhJP hJP5H* h75H*E:/@/0u01x2V3333 44$$If^a$gd q$a$gd q$h@&]^ha$gd q$ & F@h@&]^ha$gd,$a$gd q 3U3V3333333444 4*4+47484<4=4G4H4T4444444455555H6I6i6s6u6ʻʻّ{p{pah/h/5CJH*\aJh/5CJ\aJh\PMh/5CJ\aJhJPCJaJh hJP5CJh^nzhJPB*CJaJph""" *hYY$hJPB*CJaJph"""hTNhJPB*CJaJph""" h){hJPh^nzhJP5 hJP5CJ hJP5 h75h& hVhJPhJP hk3hJP&44 4+484=4H4U4qdddddd $If^gd qkdz@$$IfT:0 'x t0C'44 :apytUTU4V4kd7A$$IfT:ֈ<( 'vivp t0C'44 :ap<ytUTV4W4_44444$If[$\$gd q & FC$If^gd, $7$8$H$Ifgd q & FB$If^gd,44kdpB$$IfT:ֈ<( 'vivp t0C'44 :ap<ytUT4444445$If[$\$gd q & FC$If^gd, $7$8$H$Ifgd q & FB$If^gd,55kdC$$IfT:ֈ<( 'vivp t0C'44 :ap<ytUT55 5)5*525D5 & FC$If^gd, $7$8$H$Ifgd q & FB$If^gd,D5E5kdD$$IfT:ֈ<( 'vivp t0C'44 :ap<ytUTE5F5N5h5i5p55 & FC$If^gd, $7$8$H$Ifgd q & FB$If^gd,55kdF$$IfT:ֈ<( 'vivp t0C'44 :ap<ytUT5555555 & FC$If^gd, $7$8$H$Ifgd q & FB$If^gd,55kdTG$$IfT:4ֈ<( 'vi`v``p t0C'44 :ap<ytUT5555555 $If^gd q $7$8$H$Ifgd q & FB$If^gd,55kdH$$IfT:4ֈ<( 'vi v  p t0C'44 :ap<ytUT555I6j6666677707?7E7W7]7f7 $If`gd q $If`gd q $If`gd q $Ifgd q $If^gd q$]^a$gd q$a$gd qgd qu6w6666666w7x7{77777777#8$8U8V8z8{888888888888888888888999whJP5mH @sH @ hJP5hJP5B*phhVmH @sH @h{a hVhJPhJPmH @sH @hVhJPhnnhg5 hVhghghVhg5hg5OJQJ\aJh/5OJQJ\aJh\PMh/5CJ\aJh/5CJ\aJ.f7w7x7y7z7{7}77777777777$ & FA$If^a$gd,Ff^O$s$If]sa$gd q$$If`a$gd q $$Ifa$gd q $Ifgd q $If^gd qFfK u$If`ugd q777777777777777777777$ & FA$If^a$gd,FfzS $$Ifa$gd q$$If^a$gd q$$If^a$gd q $Ifgd q777777788888 8#8%8)8+8-8.8/878Ff[ $$Ifa$gd q$$If^a$gd q $Ifgd q$ & FA$If^a$gd,FfW$$If^a$gd q78I8K8M8O8R8U8W8[8]8_8`8a8e8n8p8r8t8w8z8 $Ifgd q$ & FA$If^a$gd,Ff_ $$Ifa$gd q$$If^a$gd q$$If^a$gd q $If^gd qz8|88888888888888888$$If^a$gd q$$If^a$gd q $If^gd q E$If]Egd q$ & FA$If^a$gd,Ffc$$If^a$gd q8888888888888888$5$If^5a$gd qFfl$$If^a$gd q$$If^a$gd q$$If^a$gd q $If^gd q E$If]Egd q$ & FA$If^a$gd,Ffg88999 9999999999 $$Ifa$gd qgd q .^gd qFfo$C$If]Ca$gd q$J$If]Ja$gd q$E$If]Ea$gd q$9$If]9a$gd q9999999999:::5:8:9:q:v:w:x:y:::::::::::ĺĄyqfYĄOhVB*CJphhqthQnFB*CJphh#GhQnFB*phhQnFB*ph h#GhQnFhQnFhqthQnFCJhqthQnF5CJ\ hQnF5CJhhQnF5CJhqthgCJ hqthghqthg5CJ hqthQnFhqthQnF5CJ hQnF5\h"hQnF5\ hVhJPhJP hJP5hJP5mH @sH @9999999999:::{{{k{{{{{$$If`a$gd q $$Ifa$gd q$$If^a$gd qhkd0r$$IfE&&0&44 a"ytg ::::::!:#:$:+:5:6:7:8:9:w:Ffw$s$If]sa$gd q$$If`a$gd q $$Ifa$gd q$$If^a$gd qFftw:x:y:::::::zzjjjZ$s$If]sa$gd q$$If^a$gd q $Ifgd q$ & F@$If^@a$gdjhkdz$$IfE&&0&44 a"ytg:::::::::::::::::$$If^a$gd q $If^gd q $Ifgd q$ & F@$If^@a$gdjFf |$s$If]sa$gd q$I$If]Ia$gd q$$If^a$gd q::::::::::::;;/;B;C;D;E;M;N;l;m;q;;;;;;;;;;;;;;;;ϷϰϰϛϰwjËËËhqthVB*CJphhqthVhdB*CJphhVhqthVCJ h#GhQnFhQnF hQnF5CJhhQnF5CJ hqthQnFhqthQnFhdCJ hVCJ hQnFCJhqthQnFCJhqthQnFB*CJphhVB*CJphhqthQnFhdB*CJph&::;;C;D;E;N;bNE $Ifgd q$ & F@$If^@a$gdjhkdT$$IfU&&0&44 a"yt*1$r$If]ra$gd qFf$s$If]sa$gd q$$If^a$gd qN;m;o;q;s;v;y;{;;;;;;;; $If^gd q$ & F@$If^@a$gdjFfL$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q $Ifgd q;;;;;;;;;;;<$r$If]ra$gd qFf$$I$If]Ia$gd\$$If^a$gd\$s$If]sa$gd\$$If^a$gd\ ;;;;;<<<<<<7<8<<<N<O<P<y<z<{<|<}<<<<<<<<<<<<ʿ똎~qkkkchghQnF5 hVCJhqthVB*CJphhqthVhdB*CJphhVB*CJphhVhqthQnFB*CJph h#GhQnF hVhth#GhQnF5hQnF hqthQnFhqthQnFCJ hQnF5CJhhQnF5CJ hqthVhqthVCJhqthVhdCJ <<<<8<:<<<><A<vvfffV$s$If]sa$gd q$$If^a$gd q $If^gd q$ & F@$If^@a$gdjhkd$$IfU&&0&44 a"yt*1A<D<F<J<L<N<O<P<Y<y<{<}<<<$s$If]sa$gd\$$If^a$gd\ $If^gd q $Ifgd q$ & F@$If^@a$gdjFf$s$If]sa$gd q$I$If]Ia$gd q$$If^a$gd q <<<<<<<<<<<<<<<z$I$If]Ia$gd q$$If^a$gd q$s$If]sa$gd q$$If^a$gd q$$If^a$gd qFfe$s$If]sa$gd\$I$If]Ia$gd\$$If^a$gd\<<<<<<<<<<==7=B=]=^=a=d=e=f=l============================ > > >ƾh8phJPB*phhWB*H*phh*+B*phh*+h B*phhJP h$hJP hlw5 h8phJPh8phJP5 hJP5hVhJP5 hb5hghQnF hqthQnFhghQnF5CJhghQnF5B*CJph2<<<<<<<<<<<<<<<<<=$$&`#$/Ifa$gd q$a$gd qgd qFf$s$If]sa$gd q$$If^a$gd q===*=6=C=O=]=fVVVVVV$&`#$/Ifgd qkd6$$IflF ') .  t 6`0    44 layt*1]=^=f==-$&`#$/Ifgd qkd$$Ifl,ֈ 'M3  t 6`044 layt*1=====$&`#$/Ifgd q$&`#$/If^gd q====/$&`#$/Ifgd qkd$$Iflֈ 'M3 t 6`044 layt*1==== >$&`#$/If^gd q$&`#$/Ifgd q$&`#$/If^gd q > >><>/$&`#$/Ifgd qkd $$Iflֈ 'M3 t 6`044 layt*1 >>>>>;><>?>B>C>D>S>T>W>Z>[>\>}>>>>>>>>>>>>>>>>??D?N?O?P?i?j?????????????ԲԨ h*15\hVhJP5\hW hVhWhWhWH*hZ]hJP5H* hVhJPhVhJP5hJP5B*H*phhJPB*ph hJP5H*h8phJP5h8phJPB*ph h8phJPhJP h$hJP4<>D>T>\>~>$&`#$/If^gd q$&`#$/Ifgd q$&`#$/If^gd q~>>>>/$&`#$/Ifgd qkd$$Iflֈ 'M3 t 6`044 layt*1>>>>>$&`#$/If^gd q$&`#$/Ifgd q$&`#$/If^gd q>>?O??/***gd qkd$$Iflֈ 'M3 t 6`044 layt*1????@ABBCDDDD $If^gd q$a$gd q$h@&]^ha$gd q$ & FDh@&]^ha$gd,$a$gd qgd q ?'@,@>@[@@@@@@@@AAA4A5A9A?AGAKASAXAaAqA{AAAAAAABGBUBVBbBqBBBBBCCCCCCACBCCCDDDDDDDDDDDDDDDDDѸѸѸѴ h@hJPh h^nzhJP5 hJP5CJ hQnF5 hJP5 h){hJP hDLhJP h8phJPhHZhJP\ h[*hJPhJP hVhJPDDDDDD $If^gd qskd$$IfT:% t0%44 :ap yt&TDDDDD^M?? $7$8$H$Ifgd q & FE$If^gd,kd$$IfT:F<(v t0%    44 :apyt&TDDDE!E^M?? $7$8$H$Ifgd q & FE$If^gd,kdx$$IfT:F<(v t0%    44 :apyt&TD!E#EEoEqEEEEEEEEEEF(F*F,FEEEoE^M==$If[$\$gd q & FE$If^gd,kd,$$IfT:F<(v t0%    44 :apyt&ToEpEqEyEE^M?? $7$8$H$Ifgd q & FE$If^gd,kd$$IfT:F<(v t0%    44 :apyt&TEEEEE\K== $7$8$H$Ifgd q & FE$If^gd,kd$$IfT:F<(v t0%    44 :apyt&TEEEEEFcFF\WWO??O$]^a$gd q$a$gd qgd qkd̡$$IfT:F<(v t0%    44 :apyt&TFFFFFFFFF GGG-G.G/G0G1G3G5G7G8G$$If`a$gd q $$Ifa$gd qFf> $If`gd q $Ifgd q $If^gd q$a$gd q8G?GIGJGKGLGMGOGWGwGGGGGGGG$$If^a$gd q$$If^a$gd q $Ifgd q & FF@$If^`@gd,Ff$s$If]sa$gd q $$Ifa$gd q$$If`a$gd quGGGGGGGGGGGGGGHHH H HHH;HP@PAPDPGPHPIPKPLPTPUPsPtPPPPþõq`!h"5CJOJQJaJmH sH $hwhh"CJOJQJaJmHsHhwhh"5CJOJQJaJhwhh"CJaJh"CJaJh5mH @sH @ h5h5mH @sH @ h2b5h2b5mH @sH @ hh;5hCJaJ h+hJPhy 5mH @sH @ hS\5 h5 hy 5hhy $mOsOtO{O~OOOOOOOOOOOOOOPPP8 d^8 `gd$d`a$gdh^hgd q $h^ha$gd qFfxFfld$IfgdPPPPPPPPP$P%P,P/P2P5P8P;P>PAPDPHPIPJPh^hgd qFfFfd$IfgdJPLPsPtPPPm$(($Ifa$gdjK$$(($Ifa$gdjHkd$IfK$L$Tl%$ t$644 laytjT $$Ifa$gdjK$${d]{^`a$gd"PPPPPPPPPQQQQQ2Q4QQ?Q@QQQSQRRRT&TUUWWMXTXUXhX5YпПППБzm^^^^^hwhh"CJOJQJaJh"5CJOJQJaJh2h"CJaJh2h"5CJaJh h 5>*CJaJhwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJhwhh"CJaJ'h@h"5CJOJQJaJmH sH $PPPPPPPPPP(($IfgdjK$Hkd $IfK$L$Tl%$ t$644 laytjT PPPP1""(($IfgdjK$kdg$IfK$L$Tlִ   %   ;   J t$6    44 laytjTPPPPPPQ(($IfgdjK$$(($Ifa$gdjK$(($IfgdjK$QQQQ1""(($IfgdjK$kd[$IfK$L$Tlִ   %   ;   J t$6    44 laytjTQQQ QQQQ(($IfgdjK$(($IfgdjK$QQQQ1""(($IfgdjK$kdO$IfK$L$Tlִ   %   ;   J t$6    44 laytjTQQ Q!Q2Q4QQ1% $$Ifa$gdjkdC$IfK$L$Tlִ   %   ;   J t$6    44 laytjT>Q?Q@QSQQQIRRRRRTTTTUUU%gd"%$a$gd" & Fgdjgd"%$a$gd"Gkd7$$IfTl$ ['& t644 laytjTUUWLXMXUX5YYYY/ZZZZZ2[[[[%^gd"% & Fgdj% & Fgdj %$ & Fa$gdj$a$gd"%gd"%$a$gd"%$a$gd"5Y:YYYZZ/ZIZKZZZZ[[[]0]2]i]$^%^8^ࠌ}m[m}P>"h$h"5>*CJOJQJaJhwhh"CJaJ"hwhh"5CJH*aJnH @tH @hwhh"5CJaJnH @tH @hwhh"CJaJnH @tH @'hwhh"5CJOJQJaJnH @tH @!h"5CJOJQJaJnH @tH @"hwhh"5CJH*OJQJaJh"5CJOJQJaJh@h"5CJOJQJaJhwhh"CJOJQJaJhwhh"5CJOJQJaJ[~\ ]]h]i]$^%^8^^_U__``` $$Ifa$gdjgd"% & Fgdj %$h^ha$gd" d^gd"$hd-DM ^ha$gd"$ & Fd-DM ^a$gdj8^^^k_q_y_z_```````aaaaDaEaIaJaKaZafagara~aaaaʺʺʺʺo[OʺOʺohwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH "hwhh"5CJH*OJQJaJ*hwhh"5CJOJQJ\aJmH @sH @"hwhh"5CJOJQJ\aJhwhh"5CJOJQJaJhwhh"CJaJh"CJOJQJaJhHh"5CJOJQJaJhHh"CJOJQJaJ`` aaa a"a$a,a-a_VVVVV $IfgdjIkd$$IfTl%$ t$644 laytjT $$Ifa$gdjIkd$$IfTl%$ t$644 laytjT -a8a:aDaEa'kdF$$IfTlִy VC %   (F t$6    44 laytjT $IfgdjEaGaIaKaMaNaZa\afa $Ifgdj $$Ifa$gdj $Ifgdjfagahaiaja0''' $Ifgdjkd<$$IfTlִy VC %   (F t$6    44 laytjTjakalarata~a $Ifgdj $Ifgdj~aaaaa0''' $Ifgdjkd2$$IfTlִy VC %   (F t$6    44 laytjTaaaaaa $Ifgdj $Ifgdjaaaaaaaaabbbb b!b"bǹ~iT?~,%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJphhh"CJOJQJaJhh"CJaJhh"5CJaJh h 5>*CJaJ!h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJaJhwhh"5CJOJQJaJaaaa0(#gd"$a$gd"kd($$IfTlִy VC %   (F t$6    44 laytjTaagbbbbbldeeefggghqirizijkkk`gd"gd"%$a$gd"$a$gd" $ a$gd" % & Fh^hgdj & Fh^hgdj"b#b$b%b&b'b(b)b*b+b,b-b.b/b0b1b2b3b4b5b6b7b8b9b;bխnYnYՃխD)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph;b)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJphh"CJOJQJaJhh"CJOJQJaJ)hh"@B* CJOJQJaJphbbbbbbbbbbbbbbbbbbb­˜nnYD/)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJphbbbbbbbbbbbbbb­nYD/)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph bbbbbb ccccclddd³nYF6'h87Dh"CJOJQJaJh87Dh"5CJOJQJaJ%hwhh"B* CJOJQJaJph)hwhh"@B* CJOJQJaJph)hwhh"@B* CJOJQJaJphhwhh"CJOJQJaJhwhh"5CJOJQJaJ!h"5CJOJQJaJmH sH hh"CJOJQJaJ%hh"B* CJOJQJaJph)hh"@B* CJOJQJaJph)hh"@B* CJOJQJaJph ddddddddTeUeeeeffghhhhhi6iriiiiiiijjjjjjjjjjjjRkSkkkkZlklnֶֶֶֶֶֶֶֶֶ֤֔hwhh"5CJaJhSh"5CJOJQJaJ#hwhh"5CJOJPJQJaJh"CJOJQJaJmH sH hwhh"5CJOJQJaJhwhh"CJOJQJaJh87Dh"CJOJQJaJh"CJOJQJaJ1kkkZlkll0m}mnnnnooooop$d-DM a$gd"$ & Fd-DM ^a$gdjd-DM gd"h^hgd" & Fgdjgd" & Fgdjgd"nnnooooppppp q q qq2r*CJOJQJaJh"CJaJnH @tH @"hwhh"5CJH*aJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @hwhh"CJaJppp q?qqqq2r3r4r5r6r7r8r9r:r;rrgr $$Ifa$gdj%gd"gd"$8d-DM ^8a$gd"=r>rgrhrrrrrrrrrrsssss-s/s7s9sJsMsNs%t&t(t/t0t=tiuuuu'v0v6vvvwwlxvxxxx֯yֹֹֹyh"5CJaJh!!h"OJQJh!!h"CJOJQJaJh2>h"OJQJh2>h"5h h 5>*hwhh"5CJaJ!h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJOJQJaJhwhh"CJOJQJaJ.grhrrrrrrrrr_VVVVV $IfgdjIkdz$$IfTl%$ t$644 laytjT $$Ifa$gdjIkd$$IfTl%$ t$644 laytjT rrrrr'kd$$IfTlִx C %   (F t$6    44 laytjT $Ifgdjrrrrrrrrr $Ifgdj $Ifgdjrrrrr0''' $Ifgdjkd$$IfTlִx C %   (F t$6    44 laytjTrrrsss $Ifgdj $Ifgdjsssss0''' $Ifgdjkd$$IfTlִx C %   (F t$6    44 laytjTsss-s/s7s $Ifgdj $Ifgdj7s8s9s0,$ 8]^8a$gd"kd$$IfTlִx C %   (F t$6    44 laytjT9sNswsss&t't(t/tiujuru&v'v0vv?wwwwlxxxx%$a$gd" $ Ha$gd"gd"$a$gd"%$ & F^a$gdjgd"xNyyyyyzr{s{{{||||}%} %$ & Fa$gdj$d-DM ^a$gd"$ & Fd-DM ^a$gdjd-DM gd"gd"%$ & F^a$gdj%$ & F^a$gdjxyyys{{{{||||||f}g}}}}}}}~ӲĦxi]iRBRBhwhh"5CJOJQJaJhwhh"CJaJh"CJOJQJaJhRh"CJOJQJaJhRh"CJaJh"5CJaJhRh"5CJaJhRh"5>*CJaJh"CJaJnH @tH @"hwhh"5CJH*aJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @hwhh"5CJaJhh"5CJOJQJaJ%}g}}}}}}}~2~3~YEkd$$IfTl"N! t644 laytjTEkd$$IfTl"N! t644 laytjT $$Ifa$gdjgd" %$ & Fa$gdj ~~2~3~Y~Z~^~_~`~o~z~{~~~~~~~~~~~ghr߃ !VWXe%G޳޳޳ӳӳӳӪӪӢӢӳӉyjyhwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @h"5CJaJnH @tH @h6h"5CJaJh"CJaJh"5CJaJhwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJOJQJaJ!h"5CJOJQJaJmH sH )3~5~7~9~A~B~M~O~Y~ $IfgdjY~Z~\~^~`~5,,, $IfgdjkdT$$IfTlִu_I d"K{   t6    44 laytjT`~b~c~o~q~z~ $Ifgdj $Ifgdj $$Ifa$gdjz~{~|~}~~~5,,, $Ifgdjkd3$$IfTlִu_I d"K{   t6    44 laytjT~~~~~~~ $Ifgdj $Ifgdj~~~~~5,,, $Ifgdjkd$$IfTlִu_I d"K{   t6    44 laytjT~~~~~~ $Ifgdj $Ifgdj~~~~~500($a$gd"gd"kd$$IfTlִu_I d"K{   t6    44 laytjT~ghr߃WXeL$ & Fd-DM ^a$gdjd-DM gd"$ & Fda$gdjgd"$a$gd"$a$gd"$%<=Nň*Z[]~ $$Ifa$gdjgd" $ & Fa$gdjdhgd"h^hgd"$d-DM ^a$gd"$ & Fd-DM ^a$gdjGI<=N]de~ÊĊ "#:<DEOc-^øvbVVVVhwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH $hwhh"CJOJQJaJmHsHhwhh"5CJOJQJaJh6h"5>*CJaJhwhh"CJaJhwhh"CJaJnH @tH @h"CJaJnH @tH @hwhh"5CJaJnH @tH @"hwhh"5CJH*aJnH @tH @ ~ÊĊƊȊʊҊӊaTTTTT (($IfgdjGkd'$$IfTl%$ t$644 laytjT$(($Ifa$gdjGkd$$IfTl%$ t$644 laytjT ӊފ&kd~$$IfTlִy A %  8  J t$6    44 laytjT (($Ifgdj (($Ifgdj$(($Ifa$gdj (($Ifgdj 3&&& (($Ifgdjkdo$$IfTlִy A %  8  J t$6    44 laytjT " (($Ifgdj (($Ifgdj"#$%&3&&& (($Ifgdjkd`$$IfTlִy A %  8  J t$6    44 laytjT&'(:<D (($Ifgdj (($IfgdjDEFGO3+++%$a$gd"kdQ$$IfTlִy A %  8  J t$6    44 laytjTO-.7ĎE|%  & Fdgdj %$ & Fa$gdjgd"%$a$gd"%$a$gd" $ a$gd"^ێEАҐ‘ÑőܒޒoʓƺᓄxfT"h:1lh"5>*CJOJQJaJ"hwhh"5CJH*aJnH @tH @h"CJaJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @h"5CJaJh:1lh"5CJH*aJh:1lh"5CJaJh:1lh"5CJOJQJaJhwhh"CJaJhwhh"5CJOJQJaJhwhh"CJOJQJaJݒߒnoɓʓ^ΕEƖȖgd" $ & Fa$gdj %$ & Fa$gdj%$a$gd"$8d-DM ^8a$gd"$ & Fd-DM a$gdjd-DM ^gd"^ɖ)*+PQUVWfpqʗ,7>š Oضȥȅȅȅwwwwwkbkh"5CJaJhech"5CJaJhwhh"5CJ\aJhwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH "hwhh"5CJOJQJ\aJhwhh"5CJOJQJaJhwhh"CJaJhwhh"CJOJQJaJh"5CJOJQJaJ&Ȗɖ*+-/1TGGG (($IfgdjEkd$$IfTl"N! t644 laytjT$(($Ifa$gdjEkdB$$IfTl"N! t644 laytjT $$Ifa$gdjgd"19:EGP (($IfgdjPQSUW5((( (($Ifgdjkd$$IfTlִu_I d"K{   t6    44 laytjTWYZfhp (($Ifgdj (($Ifgdj$(($Ifa$gdjpqrst5((( (($Ifgdjkd$$IfTlִu_I d"K{   t6    44 laytjTtuv (($Ifgdj (($Ifgdj5((( (($Ifgdjkd$$IfTlִu_I d"K{   t6    44 laytjT (($Ifgdj (($Ifgdj5,, 7$8$H$gd"kd$$IfTlִu_I d"K{   t6    44 laytjT./7 JPQbgd" & Fh7$8$H$^hgdj & Fh7$8$H$^hgdj 7$8$H$gd" $7$8$H$a$gd" $7$8$H$a$gd"OQb|tu)+b/0nƢǢ@ȼתȞ{cNcC;Ch"CJaJhLIh"CJaJ(h"B*CJaJfHphq .h\h"B*CJaJfHphq .hwhh"B*CJaJfHphq h"5CJ\aJhwhh"5CJaJ"hwhh"5CJH*aJnH @tH @h"CJaJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @hwhh"5CJ\aJhwhh"CJaJ;{|uwab0n$ & F7$8$H$a$gdj 7$8$H$gd"$d-DM ^a$gd"$ & Fd-DM ^a$gdjd-DM gd"gd"A>?t$(($Ifa$gdjGkdd$$IfTl#I# t644 laytjT $$Ifa$gdj 7$8$H$gd"gd" & F7$8$H$gdj @Aȣ>?VWtuƤѤҤߤ Ǽ{{{{iYh"h"5CJOJQJaJ"h h 5>*CJOJQJaJhwhh"5CJaJ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJhwhh"CJaJhwhh"5CJ\aJh"CJaJhLIh"CJaJ.hLIh"B*CJaJfHphq !tuwy{ (($IfgdjGkd$$IfTl#I# t644 laytjT 2%%% (($Ifgdjkd$$IfTlִ~N #} (* t6    44 laytjT (($Ifgdj (($Ifgdj$(($Ifa$gdj2%%% (($Ifgdjkd$$IfTlִ~N #} (* t6    44 laytjTƤȤѤ (($Ifgdj (($IfgdjѤҤӤԤդ2%%% (($Ifgdjkd$$IfTlִ~N #} (* t6    44 laytjTդ֤פ (($Ifgdj (($Ifgdj2-%%$a$gd"gd"kd$$IfTlִ~N #} (* t6    44 laytjTgf)bا^&bҩ 8]~% & Fgdj%$a$gd"dhgd"gd"% & Fgdj '+,-NOPgh˭̭׭ ѿѴшwшwcwcwcwcшшw܈Ѵ'hZ'h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJhZ'h"5CJ\aJhwhh"5CJ\aJh"5CJ\aJ"hZ'h"5>*CJOJQJaJhwhh"CJaJhwhh"5CJaJh"5CJaJh"h"CJOJQJaJ&~ɫq+-OPFGkd$$IfTl#I# t644 laytjT$(($Ifa$gdjGkd$$IfTl#I# t644 laytjT $$Ifa$gdjgd"% & Fgdj (($Ifgdj2%%% (($IfgdjkdT$$IfTlִ~N #n (* t6    44 laytjTí˭ (($Ifgdj (($Ifgdj$(($Ifa$gdj˭̭ͭέϭ2%%% (($Ifgdjkd8$$IfTlִ~N #n (* t6    44 laytjTϭЭѭ׭٭ (($Ifgdj (($Ifgdj2%%% (($Ifgdjkd$$IfTlִ~N #n (* t6    44 laytjT (($Ifgdj (($Ifgdj 2*%%gd"$a$gd"kd$$IfTlִ~N #n (* t6    44 laytjT "No9аѰ4ѱױ\9ԽԽԽԽ԰veZeZeKZhZ'h"5>*CJ\aJhwhh"CJaJ hwhh"5B*CJaJphhZ'h"5CJH*aJhZ'h"5CJaJhZ'h"5CJOJQJaJhwhh"5CJOJQJaJh"5CJOJQJaJ-hwhh"B*CJOJQJaJmHphsHhwhh"CJOJQJaJhwhh"5CJaJhwhh"CJOJQJaJh "AOo:xаѰ4kѱױ$ & F7$8$H$a$gdj 7$8$H$gd"  & Fdgdj %$ & Fa$gdj%$a$gd" % & Fdhgdjgd"\ҳoɴ:<bcue$(($Ifa$gdjGkd$$IfTl<#" t644 laytjT $$Ifa$gdj%$7$8$H$^a$gd"%$ & F7$8$H$a$gdj% & Fgdjgd" 7$8$H$gd" 9;<bcĵŵƵյ-/IӶϳϓϓϓĄ}ocWLWLha#hC CJaJha#hC CJ\aJhC hC 5CJaJh h 5>*CJaJ hC 5\hwhh"CJOJQJaJhwhh"5CJaJ'hch"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJOJQJaJ(hwhh"5B*CJOJQJaJphh"CJOJQJaJ (($IfgdjGkd<$$IfTl<#" t644 laytjT µĵƵ2%%% (($Ifgdjkd$$IfTlִu_I d<#K{ (5 t6    44 laytjTƵȵɵյ׵ (($Ifgdj (($Ifgdj$(($Ifa$gdj2%%% (($Ifgdjkdx$$IfTlִu_I d<#K{ (5 t6    44 laytjT(($If]gdj (($Ifgdj (($Ifgdj2%%% (($Ifgdjkd\$$IfTlִu_I d<#K{ (5 t6    44 laytjT (($Ifgdj (($Ifgdj2-%)$a$gd"%gd"kd@$$IfTlִu_I d<#K{ (5 t6    44 laytjT/Զ+wxojȽɽ׽ )$ & Fa$gdj)$a$gd")$a$gd" $ & Fa$gdjgdC ӶԶ*+vwxмȽֽ׽ɾ )!йЁqbqhwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @h"5CJaJnH @tH @hwhh"CJPJaJh"5CJPJaJhch"5CJPJaJ h"5hch"5 h"5\hwhh"5 hwhh"hwhh"5\ hC 5\ha#hC CJaJha#hC CJ\aJ$ɾ){!$d-DM ^a$gd"$ & Fd-DM ^a$gdjd-DM gd") & Fgdj )$ & Fa$gdj)$a$gd"$ & Fda$gdj) & Fgdj ,-uvwyzĶwgT>*hwhh"5CJOJQJ\aJmH @sH @$hwhh"CJOJQJaJmHsHhwhh"5CJOJQJaJh"CJaJha#hC CJ\aJha#hC CJaJhch"CJaJh"5CJaJhwhh"5CJaJhch"5>*CJaJhwhh"CJaJhwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @"hwhh"5CJH*aJnH @tH @ -vxz|l$(($Ifa$gdjIkd$$$IfTl%$ t$644 laytjT $$Ifa$gdj Z^`Zgd" $ & Fa$gdjgdcgd"p^pgd"  $%0;<IJY[cdevwx|}ۿ۟۟ۿ۟یzgXLh$CJOJQJaJha#h$CJOJQJaJ%ha#h$5>*CJOJQJ\aJ"h$h$5CJOJQJ\aJ%h h 5>*CJOJQJ\aJhwhh"5CJaJ'hU$_h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJOJQJaJ'hwhh"5CJOJQJaJmH @sH @ (($IfgdjIkd$$IfTl%$ t$644 laytjT$(($Ifa$gdj 0## (($Ifgdjkd$$IfTlִx @ %   (I t$6    44 laytjT $ (($Ifgdj$(($Ifa$gdj (($Ifgdj$%&'0## (($Ifgdjkd$$IfTlִx @ %   (I t$6    44 laytjT'()*02; (($Ifgdj (($Ifgdj;<=>0## (($Ifgdjkd$$IfTlִx @ %   (I t$6    44 laytjT>?@AY[c (($Ifgdj (($Ifgdjcdex0( %$a$gd$$a$gd"kd$$IfTlִx @ %   (I t$6    44 laytjTx}./77{|!K%gd")$a$gd"$a$gd" %$^a$gd$%$ & F^a$gdj}/67L7J|KXIJIJ|eVIJIJhwhh"CJOJQJaJ,hwhh"B*CJOJPJQJ\aJph/hwhh"5B*CJOJPJQJ\aJphhwhh"\ h*'\ hwhh"hwhh"5\"hwhh"5CJOJQJ\aJhwhh"5CJOJQJaJ!h$5CJOJQJaJmH sH h$CJOJQJaJh$h$CJOJQJaJ!>q$d-DM ^a$gd"$ & Fd-DM ^a$gdjd-DM gd"gd" )^`gd")gd")$a$gd"<=?Ͽxi]N?h*'h"CJOJQJaJh*'h*'CJOJQJaJh*'CJOJQJaJha#h*'CJOJQJaJhwhh"CJOJQJaJha[h"5>*CJaJh"5CJaJ"hwhh"5CJH*aJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @hwhh"5CJaJhwhh"5\ h*'5\ h"5ha[h"5 hwhh"X=>?Aq$|$If^`|a$gdjgd"%$ & F^a$gdjgd"dgd" dgd"$d-DM ^a$gd" ?ABCLpqr %&57?@ARTXijēēijēxhXha#hC0CJOJQJ\aJhC0hC05CJOJQJaJ"h h 5>*CJOJQJaJh"5CJaJhwhh"5CJaJ'hU$_h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJ"hwhh"5CJOJQJ\aJhwhh"CJOJQJaJhwhh"CJaJqr_RRRRR (($IfgdjGkd $$IfTl#I# t644 laytjT$(($Ifa$gdjGkd$$IfTl#I# t644 laytjT %kdd$$IfTlִ~N #n (* t6    44 laytjT (($Ifgdj (($Ifgdj$(($Ifa$gdj (($Ifgdj2%%% (($IfgdjkdH$$IfTlִ~N #n (* t6    44 laytjT  (($Ifgdj (($Ifgdj2%%% (($Ifgdjkd,$$IfTlִ~N #n (* t6    44 laytjT57? (($Ifgdj (($Ifgdj?@AT2-(%gdC0gd"kd$$IfTlִ~N #n (* t6    44 laytjTX{|PQY~M]ðç|p||pe||pY|hC0CJOJQJaJhwhh"CJaJh"CJOJQJaJhwhh"5CJOJQJaJhwhh"CJOJQJaJhwhh"5CJaJhC05CJaJ%hC0hC0B*CJOJQJaJph333hC0hC0CJOJQJaJ%ha#hC0B*CJOJQJaJph333hCJOJQJaJha#hC0CJOJQJaJ"T|PQYMI % & F^gdj%gd"%$a$gdC0gd"%$a$gd"$a$gd"%$ & F ^a$gdjHJ\Y[;=t/0ABz<ԴqaRFRhWCJOJQJaJha#hCJOJQJaJhWCJOJQJaJmH sH hwhh"5CJOJQJaJ"hU$_h"5>*CJOJQJaJ"hwhh"5CJH*aJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @hwhh"CJH*OJQJaJhwhh"5CJaJhwhh"CJOJQJaJhU$_h"5CJOJQJaJIJK\1st/0Bgd"$hd-DM ^ha$gd"$ & Fhd-DM ^ha$gdjd-DM gd"% & Fgdjgd"%gd"<9:Ikd$$IfTl%$ t$644 laytjT $$Ifa$gdj dgd" %$ & F a$gdj<"#89:~ȸȸȸȸ~j^ȸ^ȸ^Oh h 5>*CJ\aJhwhh"5CJaJ'heo[h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH *hwhh"5CJOJQJ\aJmH @sH @$hwhh"CJOJQJaJmHsHhwhh"5CJOJQJaJhwhh"CJaJhh"CJOJQJaJhhCJOJQJaJhWhCJOJQJaJ:m~ (($IfgdjIkdP$$IfTl%$ t$644 laytjT$(($Ifa$gdj 0## (($Ifgdjkd$$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0## (($Ifgdjkd$$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0## (($Ifgdjkd$$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0,$ 8]^8a$gd"kd$$IfTlִy A %   (H t$6    44 laytjTojrsFGO$a$gd"gd"%$a$gd"$a$gd" %$ & Fa$gdjgdWnoijs/FO`FGHZ%Gȿ}t}dUdhwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @h"5CJaJhvh"5CJaJhwhh"CJaJhwhh"CJOJQJaJhwhh"5CJOJQJaJhwhh"5CJaJhW5CJaJhWhWCJOJQJaJhWCJOJQJaJha#hWCJOJQJaJhWhW5CJ\aJ_GHIZ7q$$ & Fhd-DM ^ha$gdjd-DM ^gd"$a$gd" $ & Fa$gdj $^a$gd"$ & F^a$gdjgd"$%;<MNeOQo $$Ifa$gdj $]a$gd" %$ & F a$gdjgd"%$a$gd"$hd-DM ^ha$gd"GI;<MNNOQnopte\H=hwhh"CJaJ'heo[h"5CJOJQJaJmH sH h"5CJaJhWh"CJOJQJaJhWhWCJOJQJaJhWCJOJQJaJha#hWCJOJQJaJhwhh"5CJOJQJaJ"hvh"5>*CJOJQJaJhwhh"CJOJQJaJhwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @"hwhh"5CJH*aJnH @tH @op[NNNN (($IfgdjIkd$$IfTl%$ t$644 laytjT$(($Ifa$gdjIkd$$IfTl%$ t$644 laytjT 79ABDL ޟޟޟӖӟӟӟӎr^'h>h"5B*CJKH$\aJphh>h"5CJaJnH @tH @h>h"5CJaJh"CJaJh"5CJaJhwhh"5CJaJ'hp(h"5CJOJQJaJmH sH 'heo[h"5CJOJQJaJmH sH hwhh"CJaJhwhh"5CJOJQJaJ!h"5CJOJQJaJmH sH # (($Ifgdj0## (($Ifgdjkd<$$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0## (($Ifgdjkd2 $$IfTlִy A %   (H t$6    44 laytjT  (($Ifgdj (($Ifgdj0## (($Ifgdjkd( $$IfTlִy A %   (H t$6    44 laytjT79A (($Ifgdj (($IfgdjABCD0$$ $]a$gd"kd $$IfTlִy A %   (H t$6    44 laytjTDEL^gdW & F-D@&M gdj 7$8$H$gd"$a$gd"$a$gd"gd" !"ILM հ㡕vdv"hWhW5CJH*aJnH @tH @hWhWCJaJnH @tH @hWhW5CJaJnH @tH @hWB*CJaJphhwhh"B*CJaJph'h>h"5B*CJKH$\aJph jh>h"5CJUaJh>h"5>*CJaJh>h"5CJaJ h>h"5B*CJaJph% . 7$8$H$gd" & F7$8$H$gdj n^`ngd"$d-DM ^a$gdW$ & F d-DM ^a$gdj$d-DM a$gdW)*+GHI]aйЭueTeeeTuT@'hp(h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJ'heo[h"5CJOJQJaJmH sH 'h$h"5CJOJQJaJmH sH h"CJOJQJaJmH sH h"CJOJQJaJhwhh"CJaJnH @tH @h"CJaJhwhh"CJaJh>h">*CJaJh>h"5>*CJaJhW5>*CJaJ !"#$%&'()+H $$Ifa$gdj @ R^@ gd" 7$8$H$gd"HI[NNNN (($IfgdjIkdp $$IfTl%$ t$644 laytjT$(($Ifa$gdjIkd $$IfTl%$ t$644 laytjT (($Ifgdj0## (($Ifgdjkd $$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj-. "MOstu}ؿnbWOWOWbh"CJaJhp(h"CJaJhp(h"5CJaJ'h"B*CJOJQJaJmH phsH (hp(h"5B*CJOJQJaJph%hp(h"B*CJOJQJaJph(h h >*B*CJOJQJaJphh"CJOJQJaJmH sH h"5CJaJhwhh"CJaJhwhh"5CJaJhwhh"5CJOJQJaJ0## (($Ifgdjkd $$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0## (($Ifgdjkd$$IfTlִy A %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0% @ R^@ gd"kd$$IfTlִy A %   (H t$6    44 laytjT/tu}ST]     gd"$ !^a$gd" #^gd" gd"gd" $da$gd" dgd" $^gd"$ 6$Zd]Za$gd" $R^a$gd"}ST]xz    F G z |             " ԤԵԤԤlW(hp(h"6B*CJOJQJaJphEjhp(h"B*CJOJQJU_H9aJmHnHphsH tH u(hp(h"5B*CJOJQJaJphh"CJaJh"5CJaJhp(h"5CJaJ%hp(h"B*CJOJQJaJphhp(h"CJaJh"mH sH  hp(h"h"5mH sH hp(h"5"   ;        o ~bb$$$ & Fd1$7$8$^a$gdj d^gd" q^gd"$ & F1$7$8$]^a$gdjm$$ & F1$7$8$]^a$gdjm$ & F1$7$8$^gdjm$ dgd"$$$Kd1$7$8$^Ka$gd" " N n o {         8QR[rRTGHYدÛ|l|aL(h>h">*B*CJOJQJaJphh"5CJ\aJhp(h"CJH*aJnH @tH @hp(h"CJaJnH @tH @hp(h"5CJaJnH @tH @hp(h"CJaJh>h"tH'h"B*CJOJQJaJmH phsH (hp(h"5B*CJOJQJaJph%hp(h"B*CJOJQJaJph(hp(h"6B*CJOJQJaJpho    R/0GHY dgd" dgd"-DM ^gd"$ & F-DM ^a$gdj -DM gd"gd"$$$ & Fd1$7$8$^a$gdj'm-ss$(($Ifa$gdjIkd$$IfTl%$ t$644 laytjTp$If^p`gdj 7$8$H$gd"$$$ & Fd1$7$8$a$gdj Y-.TUYZ[jvwn=>UQ$%뾲neeeh"5CJaJ'h1h"5CJOJQJaJmH sH !h"5CJOJQJaJmH sH hwhh"5CJOJQJaJhwhh"CJaJmHsHhwhh"5CJaJhwhh"CJaJh>h"CJOJQJaJ%h>h"B*CJOJQJaJph(h>h"5B*CJOJQJaJph'-.024<=HJT (($IfgdjIkd$$IfTl%$ t$644 laytjT TUWY0## (($Ifgdjkd\$$IfTlִy VA %   (H t$6    44 laytjTY[]^jlv (($Ifgdj (($Ifgdjvwxy0## (($IfgdjkdR$$IfTlִy VA %   (H t$6    44 laytjTyz{| (($Ifgdj (($Ifgdj0## (($IfgdjkdH$$IfTlִy VA %   (H t$6    44 laytjT (($Ifgdj (($Ifgdj0#gd" @ ^@ `gd"kd>$$IfTlִy VA %   (H t$6    44 laytjTnow=>G$%2|!hWX_R$ & Fd-DM ^a$gdjgd"$a$gd"%2WX_=?AIjkƶӇtdTTTC!h"5CJOJQJaJmH sH hwhh"5CJOJQJaJhUh"5CJOJQJaJ%hwhh"B*CJOJQJaJphhUh"5>*CJaJ"hwhh"5CJH*aJnH @tH @hwhh"CJaJnH @tH @hwhh"5CJaJnH @tH @h"5CJaJnH @tH @h"5CJaJhwhh"CJaJh1h"5CJaJhwhh"5CJaJR<=IO89:;=? dgd"  gd"$ & Fda$gdjgd"$d-DM ^a$gd"$ & Fd-DM ^a$gdj?jkSFFFF (($IfgdjGkd$$IfTl#I# t644 laytjT$(($Ifa$gdjGkd4$$IfTl#I# t644 laytjT $$Ifa$gdj (($Ifgdj2%%% (($Ifgdjkd$$IfTlִ~N # (* t6    44 laytjT!)*+<>BQ R     $$ʾʾʾʳsi\MEh"CJaJhwhh"CJOJQJaJhWhWCJPJaJhWCJPJaJha#hWCJPJaJha#hWCJ\aJhWhW5CJaJh h 5>*CJaJhW5CJOJQJaJhwhh"CJaJhwhh"5CJaJhwhh"5CJOJQJaJ!h"5CJOJQJaJmH sH 'hjSh"5CJOJQJaJmH sH  (($Ifgdj (($Ifgdj$(($Ifa$gdj2%%% (($Ifgdjkd$$IfTlִ~N # (* t6    44 laytjT (($Ifgdj (($Ifgdj2%%% (($Ifgdjkd$$IfTlִ~N # (* t6    44 laytjT!) (($Ifgdj (($Ifgdj)*+>2-(gdW%gd"kd$$IfTlִ~N # (* t6    44 laytjT> R      !S! "c""Q##$H$$&%i%j%gd" & F >d^`>gdj%gd"$ & F d7$8$H$a$gdj$ & F d7$8$H$^a$gdj$&%*%h%i%j%|%%&&&'''' '"'$'%'X'Y'''''''''''''޻xhVhhhhhhh"hwhh"5CJOJQJ\aJhwhh"5CJOJQJaJhwhh"CJOJQJaJhWh"CJPJaJhWh"5CJaJmHsHhWhWCJPJaJhWCJPJaJha#hWCJPJaJhh"5>*CJaJh"CJaJhwhh"CJaJhwhh"5CJaJhjSh"CJaJ j%|%%=&&&''$'%'X'p`$(($Ifa$gdjGkdt$$IfTl$G$ t644 laytjT $$Ifa$gdj$7$8$H$a$gdW$ & F7$8$H$a$gdj$ & F7$8$H$^a$gdjgd" X'Y'[']'_'g'h's'u'' (($IfgdjGkd$$IfTl$G$ t644 laytjT '''''2%%% (($Ifgdjkd$$$IfTlִ~N U$0 (( t6    44 laytjT'''''' (($Ifgdj (($Ifgdj$(($Ifa$gdj'''''2%%% (($Ifgdjkd$$IfTlִ~N U$0 (( t6    44 laytjT'''''' (($Ifgdj (($Ifgdj'''''2%%% (($Ifgdjkd$$IfTlִ~N U$0 (( t6    44 laytjT'''''' (($Ifgdj (($Ifgdj''''2--gd"kd$$IfTlִ~N U$0 (( t6    44 laytjT'''''(((((((-*>*?*N*Q*++++++++,,/,0,E,P,Q,\,g,h,,ɾꌾ}k[k[[[[[[hwhh"5CJOJQJaJ"hwhh"5CJOJQJ\aJhwhh"CJOJQJaJhwhh"CJaJ hwhh"hwhh"5 h"5hl%hl%CJaJhl%CJaJha#hl%CJaJhl%hl%5CJPJ\aJ!h h 5>*CJPJ\aJhwhh"5CJaJh"5CJaJ#''\(((((((&)')p)q))))),*-* )^`gd")$ & F^`a$gdj)gd" $da$gdl%$ & F^a$gdj $7$8$H$a$gdl%-*>*?*Q***1+n++++$|$If^`|a$gdj dgd" & F^gdj$ & F^a$gdj 7$8$H$gdl% 7$8$H$gd"$ & F^`a$gdj +++,, , ,,,,_RRRRR (($IfgdjGkd $$IfTl#I# t644 laytjT$(($Ifa$gdjGkd$$IfTl#I# t644 laytjT ,",$,/,0,%kdd$$IfTlִ~N U#0 (* t6    44 laytjT (($Ifgdj0,2,4,6,8,9,E,G,P, (($Ifgdj$(($Ifa$gdj (($IfgdjP,Q,R,S,T,2%%% (($IfgdjkdH$$IfTlִ~N U#0 (* t6    44 laytjTT,U,V,\,^,g, (($Ifgdj (($Ifgdjg,h,i,j,k,2%%% (($Ifgdjkd, $$IfTlִ~N U#0 (* t6    44 laytjTk,l,m,,,, (($Ifgdj (($Ifgdj,,,,,,,,---...>.q8w8888889 9::j:k:n:o:p:wwh`Uh:ch?_*CJaJhJPCJaJh h"CJOJQJaJh"CJaJh 5CJaJh h CJOJQJaJh CJOJQJaJha#h CJOJQJaJh h 5CJ\aJh h 5>*CJ\aJh"5CJaJhwhh"CJaJhwhh"5CJOJQJaJhwhh"5CJaJ,,,,,2--(gd gd"kd!$$IfTlִ~N U#0 (* t6    44 laytjT,-N---...@./1M1112Z3 4O4|56D7@8q8w88$a$gd"`gd"gd"  & Fdgdjgd"gd  %$ & Fa$gdj888 9o99:k:l:m:n:p:q:: $$Ifa$gd qgd qh^hgd q$ W^`Wa$gd"gd" %$ & Fa$gdj dgd" p:q::::::::::: ; ; ;;;;; ;!;*;+;,;I;J;K;S;T;U;f;g;h;i;;;;߳߳߳xmbmh3|hMCJaJh3|h9 CJaJhMh(Q>*CJaJhMh9 5>*CJ\aJh h 5>*CJ\aJ!hPV5CJOJPJQJ^JaJ#hohPV5CJOJQJ^JaJ%hPV5OJQJ^JmH @nH sH @tH  hohPV+hUhPV5OJQJ^JmH nH sH tH h3h(QCJaJ$:::::::::cVMMMM $Ifgd q ,$If`,gd qHkdH"$$IfTl=(F( t(644 lBaytPVT $$Ifa$gd qHkd!$$IfTl=(F( t(644 lBaytPVT:::::&kd"$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytPVT $Ifgd q:::::: ; ;; $$Ifa$gd q $$Ifa$gd q $Ifgd q;;;;;/&&& $Ifgd qkd#$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytPVT;;;;!;+; $$Ifa$gd q $Ifgd q+;,;-;.;/;2))) $Ifgd qkd$$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytPVT/;0;1;I;K;S; $$Ifa$gd q $Ifgd qS;T;U;h;i;2***$a$gd qkdr%$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytPVTi;;<<<<v>>>>?K@KALAVACCCDE[F\FtFF $ & F a$gd,$a$gd q$a$gd q$a$gd q$ & F a$gd,;;<<M<N<}<~<<<<<<<<<.=F=G=N=f>u>v>}>>>>>>>??;?]?^??@J@K@_@tlhCJaJh3h ^5CJ\aJh3h ^CJaJh8CJaJh ^CJaJh3h9 CJaJh3h(QCJaJh3h9 5CJ\aJhb5CJ\aJh3|h(QCJaJh3|h3CJaJh3|hMCJaJh3|h9 CJaJh3|CJaJ'_@b@c@@@AAA!ALAUAVAzAAAAAAA[C^CCCCCCCCCDD%DDDDEEEEEEEE{mmh3h@05CJ\aJh3h*5CJ\aJh3hYCJaJh3h@0CJaJh3hY'kCJaJh3hN.CJaJh3h}CJaJh3hN.5CJ\aJh3hCJaJh3h9 CJaJh3h9 5CJ\aJh3h5CJ\aJ*EEEEEEE\FbFcFrFsFtFFF$G%GRGSGTGGGGGHH[H\H]H^HeHõܭ~peZOhu/5CJ\aJhY'k5CJ\aJh1h}CJaJh1h}5CJ\aJh1h7i 5CJaJh1hB5CJaJh1h1CJaJh1hN.5CJaJh1CJaJh3h7i 5CJ\aJh7i h7i 5CJ\aJh7i 5CJ\aJh3hN.5CJ\aJh3h@0CJaJh3hN.CJaJFTGGGH]H^HdHeHXIIjJkJ}JJJK]KK"L#LIL $$Ifa$gd q$ & F a$gd q $ & Fa$gd,$a$gd q $ & F a$gd,eHWIXIyI{IIIIIIJJjJkJlJ|J}JJJJJJ⽵|maVNVNChdhdCJaJh00CJaJh3h}CJaJhBh}>*CJaJhBh}5>*CJ\aJhBhv5>*CJ\aJh3hu/5CJ\aJhNh' 6CJ]aJhNhN6CJ]aJhNCJaJh' h' CJaJhN5CJ\aJh' h' 5CJH*\aJh' 5CJ\aJhu/CJaJhu/hu/CJaJJKK!K*K\K]KaKjKKKKKKK"L#L)L-LHLILJL}L~LLLLLLLLLLLLLLLLLLLLLnnnn!h(P5CJOJPJQJ^JaJ#hoh(P5CJOJQJ^JaJ%h(P5OJQJ^JmH @nH sH @tH  hoh(P+hUh(P5OJQJ^JmH nH sH tH +hUhig5OJQJ^JmH nH sH tH h3hN.CJaJh00CJaJhdhdCJaJhdh}CJaJ+ILJL}L~LLLLLLcVMMMM $Ifgd q ,$If`,gd qHkd&$$IfTl=(F( t(644 lBayt+`T $$Ifa$gd qHkd`&$$IfTl=(F( t(644 lBayt+`TLLLLL&kd'$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`T $Ifgd qLLLLLLLLL $$Ifa$gd q $$Ifa$gd q $Ifgd qLLLLL/&&& $Ifgd qkd'$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`TLLLLLL $$Ifa$gd q $Ifgd qLLLLL2))) $Ifgd qkd($$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`TLLLLLM $$Ifa$gd q $Ifgd qLLMMMMMM|M}MMMMMKNLNOOOO#O$O@Oɻ{l]K@Kh3hPNCJaJ#h3hPN5B* CJ\aJphhb5B* CJ\aJphhHb?5B* CJ\aJphhKhKB* CJaJphhKB* CJaJphhKhPNB* CJaJphhKCJaJhxhPN5>*CJaJh h 5>*CJaJhxCJaJ hoh(P+hUh(P5OJQJ^JmH nH sH tH !h(P5CJOJPJQJ^JaJMMMM2**$a$gd qkd)$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`TMM}MMLNOOO$OOOFPGPOPQQQQ#R$R.RRRR $ a$gd q$a$gd q$a$gd q$ & F a$gd, $ a$gd q@OCODOmOnOOOOOOOEPFPGPNPOPlPPPQQ!Q$Q%QSQTQQQQQQQQ"R$R۲̧ttttbtt#h3hm5B* CJ\aJphh3h+B* CJaJph#h3h+5B* CJ\aJph#h3h 5B* CJ\aJphh3h+CJaJh3h3|B* CJaJphh3hPNCJaJh3hPNB* CJaJph#h3hPN5B* CJ\aJph#h3h3|5B* CJ\aJph"$R-R.RRRRRRSSTTTTWTXTTTTTTTHUIUUUUUUVVVVV⠎zogzXzh' h~M5CJH*\aJh~MCJaJhu/h~MCJaJh~M5CJ\aJhCJH*aJ#hmhm5B* CJ\aJph#hmh5B* CJ\aJphhKo5B* CJ\aJph#h3h 5B* CJ\aJphh3hB* CJaJphh3hCJaJ#h3h5B* CJ\aJph!RSSSTTTTIUUUUUVVVWWWXXeXX  & F qgd, & F q]gd,$ & F ha$gd,$a$gd qVEWLWfWWWWWW XXXXX"XMXcXeXfXXXXXXXXXY Y YYY,Y-Y.Y/YoYpYĸ|tltltldlllddhKoCJaJhaCJaJhQCJaJhV CJaJhwCJaJhgCJaJhQCJH*aJhM*CJaJh00CJaJh3h00CJaJhQ5>*CJ\aJhQhQ5>*CJ\aJh 5>*CJ\aJhNh~M6CJ]aJh~MCJaJh' h~MCJaJ%X.YoYpYqYYYYHkd*$$IfTl=(F( t(644 lBayt+`T $$Ifa$gd q$a$gd q  & F qgd, & F Sq^`gd,pYqYwY{YYYYYYYYYYYYYYZZZ ZZZZZ Z!Z>Z?Z@ZHZIZJZKZDZǪǪǪǗǗDžttDžttDžtǪi^hQ5CJ\aJh3hH&uCJaJ!hVn5CJOJPJQJ^JaJ#hohVn5CJOJQJ^JaJ%hVn5OJQJ^JmH @nH sH @tH  hohVn+hUh.O5OJQJ^JmH nH sH tH +hUhVn5OJQJ^JmH nH sH tH +hUhQ5OJQJ^JmH nH sH tH h3hKoCJH*aJ!YYYYYYYYYY $Ifgd q ,$If`,gd qHkd +$$IfTl=(F( t(644 lBayt+`T YYYYY/&&& $Ifgd qkdt+$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`TYYYYZZ $$Ifa$gd q $Ifgd q $$Ifa$gd qZ Z Z Z Z/&&& $Ifgd qkdh,$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`T Z ZZZZ Z $$Ifa$gd q $Ifgd q Z!Z"Z#Z$Z2))) $Ifgd qkd\-$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`T$Z%Z&Z>Z@ZHZ $$Ifa$gd q $Ifgd qHZIZJZKZ2**$a$gd qkdJ.$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`TKZ\Z^Z_ZbZkZZZZZ[[3[4[w[y[z[[[[[[[[[[[[[$]+],]4]]]^^^^^^___ `O`P`˶˶˶ւwւււււււււhK5CJ\aJh3hK5CJ\aJh3hKCJPJaJhhK5CJ\aJhhKCJaJhv hKCJPJaJhKCJaJhv hKCJaJh3hKCJaJhQhK5>*CJ\aJh h 5>*CJ\aJ.KZ^Z_ZZ[4[x[y[z[[$],]^^^___``haaa$ D X%a$gdK$a$gdK $ a$gdK$ & F a$gd,$a$gdKP`` aaaaaaaaQcRcScZcLdNdodqdddd e`eaeqereseeeee¹ܮܗ܌~rcrXhM*hKCJaJhQhK5>*CJ\aJhK5>*CJ\aJhNhK6CJ]aJh' hKCJaJh' hK5CJH*\aJhKCJaJhu/hKCJaJhK5CJaJhChK5CJaJhZhK5CJ\aJhK5CJ\aJh3hK5CJ\aJh3hKCJaJaaaMbbScYcZcMdNdd`eaereseeee`ff gggggd q $ ha$gd q$ & F ha$gd,$ & F a$gd,$a$gdKeee_faffff gegjgggggggggg.h/hThUhWhYh\h^hkhlhmhthʺttbQb!hL)5CJOJPJQJ^JaJ#hohL)5CJOJQJ^JaJ%hL)5OJQJ^JmH @nH sH @tH  hohL)+hUh.O5OJQJ^JmH nH sH tH +hUhL)5OJQJ^JmH nH sH tH hL)CJaJh00CJaJh3hvCJaJh.OhKCJaJhQhKCJaJhKCJaJhQhK>*CJaJgggg.h/h1h3h5h^QHH $Ifgd q ,$If`,gd qHkd/$$IfTl=(F( t(644 lBayt+`THkd8/$$IfTl=(F( t(644 lBayt+`T $$Ifa$gd qgd q5h=h>hIhKhTh $Ifgd qThUhWhYh\h/&&& $Ifgd qkd/$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`T\h^h_hkhmhuh $$Ifa$gd q $Ifgd q $$Ifa$gd qthuhvhhhhhhhhhhhhhhhhhhhiii$i(inioisi}iiiii9j:j*CJ\aJh h 5>*CJ\aJh3hCJaJ#hohL)5CJOJQJ^JaJ+hUhL)5OJQJ^JmH nH sH tH  hohL)!hL)5CJOJPJQJ^JaJ*uhvhwhxhyh/&&& $Ifgd qkd0$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`Tyhzh{hhhh $$Ifa$gd q $Ifgd qhhhhh2))) $Ifgd qkd1$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`Thhhhhh $$Ifa$gd q $Ifgd qhhhh2**$a$gd qkd2$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`Thhioii:j;j*CJ\aJh5>*CJ\aJhh5>*CJ\aJh 5>*CJ\aJhNh~M6CJ]aJh' h~MCJaJh' h~M5CJH*\aJh~MCJaJhu/h~MCJaJh~M5CJ\aJhbh~M5CJ\aJhbhb5CJ\aJhbh5CJaJhh5CJaJttttPuRuTu`uxuuuuu v:v;v*mH nH sH tH &hq'EhMp5>*CJmH nH sH tH &h h 5>*CJmH nH sH tH +hUhMp5OJQJ^JmH nH sH tH  hohMph3 Y5CJOJQJ^JaJ!hMp5CJOJPJQJ^JaJ#hohMp5CJOJQJ^JaJ8w9w:w;w-"" $Ifgd qK$kdI5$IfK$L$Tlִa !(FaFFF FS FF t(6    44 lBBayt+`T;wwDwFwPw $$Ifa$gd qK$ $Ifgd qK$PwQwRwSwTw0%%% $Ifgd qK$kd@6$IfK$L$Tlִa !(a FS FF t(6    44 lBayt+`TTwUwVwnwpwxw $$Ifa$gd qK$ $Ifgd qK$xwyww0!$If^gd qkd17$IfK$L$Tlִa !(a FS FF t(6    44 lBayt+`Tw=xxJyyyy{{{u|p}z$If]^gd q$If]^gd q$$If]^a$gd q$$If]^a$gd q$If]^gd q$ & F $If]^`a$gd, zz{{{{{{{u||p}q}} ,ˀԁvx߰߰ߕz߰_SHh3 YhMpCJaJh3 YhMp5CJaJ5hq'EhMpB*CJOJQJaJmH nH ph%%%sH tH 5hq'EhMpB*CJOJQJaJmH nH phsH tH 5hq'Eh3 YB*CJOJQJaJmH nH phsH tH hq'EhMp5mH nH sH tH hq'Eh3 Y5mH nH sH tH hq'Eh`JmH nH sH tH hq'EhMpmH nH sH tH "hq'EhMp5\mH nH sH tH p}q}{} ԁ q$ & F q$If]a$gd,d$If^gd q$If]^gd q$d$If^a$gd q$If]^gd q$If]^gd q$$If]^a$gd q BÃ(wx~rsʅ݆p & F9$If]^`gd,$If^gd q $$Ifa$gd q q$Ifgd q$ & F q$If]a$gd,$ & F q$If`a$gd,xqsʅ1̆ۆ݆ކ>AopqstLJˇ!ȫ~s~sh~hsh~s]sh3 Yh00CJaJh3 YhYrCJaJh3 YhMpCJaJhxCJaJh3 YCJaJh3h3 YCJaJ"hq'EhMp5>*mH nH sH tH hb5>*mH nH sH tH hNh~M6CJ]aJh' h~MCJaJh' h~M5CJH*\aJh~MCJaJhu/h~MCJaJh~M5CJ\aJ"p"yz{|}~ $$Ifa$gd q & F9 q$If]^`gd, & F9y$If]^`ygd,!"#=Axy̶xbLbLELEL hohMp+hUhMp5OJQJ^JmH nH sH tH +hUh#N-5OJQJ^JmH nH sH tH #h#N-h(Q5CJOJQJ^JaJhb5CJOJQJ^JaJ hoh{+hUh{5OJQJ^JmH nH sH tH +hUhx45OJQJ^JmH nH sH tH h bhx4CJaJh bh00CJaJh bhMpCJaJh bh3 YCJaJh bCJaJXHkd{8$$IfTl=(F( t(644 lBaytMpT $$Ifa$gd q$a$gd qJkd"8$$IfTlq)F) t)644 lBayt3 YT $Ifgd q ,$If`,gd qHkd8$$IfTl=(F( t(644 lBaytMpT '()*+012=ӽzhWH6hW#hohx45CJOJQJ^JaJh{a5CJOJQJ^JaJ!hMp5CJOJPJQJ^JaJ#hohMp5CJOJQJ^JaJ%h#N-5OJQJ^JmH @nH sH @tH %hMp5OJQJ^JmH @nH sH @tH +hUh#N-5OJQJ^JmH nH sH tH  hohMp+hUhMp5OJQJ^JmH nH sH tH +hUhx45OJQJ^JmH nH sH tH +hUh{a5OJQJ^JmH nH sH tH /&&& $Ifgd qkd#9$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytMpT')1 $$Ifa$gd q $Ifgd q12345/&&& $Ifgd qkd:$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytMpT567=?I $$Ifa$gd q $Ifgd q=>?HIJghiqrɉˉ܉݉މ߉|}տܿձ|phYNYNYBYBh`CJaJmH @sH @h`h`CJaJh`h`CJaJmH @sH @h`CJaJh`5>*CJ\aJh(Q5>*CJ\aJhth9 5>*CJ\aJh h 5>*CJ\aJh3h(QCJaJh3h9 5CJ\aJ+hUhMp5OJQJ^JmH nH sH tH  hohMp!hMp5CJOJPJQJ^JaJ#hohMp5CJOJQJ^JaJIJKLM2))) $Ifgd qkd ;$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytMpTMNOgiq $$Ifa$gd q $Ifgd qqrʉˉމ2***$a$gd qkd;$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytMpTމ߉}k3Ò$ & F a$gdj $ & Fa$gdj$ & F a$gdj$ & F;^`;a$gd,$ & F`a$gd,$a$gd q4Ujk<=EFcdЗ;ӽӽyynnnnhyhyCJaJhyCJaJhyh9 CJaJhUCJaJh$"Wh$"WCJaJh3h$"WCJaJh$"WCJaJh3h9 CJaJh3h(QCJaJh5CJ\aJh3h9 5CJ\aJh(QCJaJh`CJaJh`h`CJaJmH @sH @)dd<=fgh{Jkd<$$IfTl=(F( t(644 lBayt~MT $$Ifa$gd q $$Ifa$gd q $ & Fa$gd,$a$gd q$ & F a$gdj;<=fgh˜ĘƘȘ̘٘ژۘܘ#$%6ʫʓʓ≄xih h 5>*CJ\aJhdh5>*CJ\aJ h{a5hK'h#R5PJ/hq'Eh#R5CJOJQJaJmH @nH sH @tH /hq'Eh{a5CJOJQJaJmH nH sH tH  hoh#R/hq'Eh#R5CJOJQJaJmH nH sH tH hK'h#R5h3h(QCJaJhyh(QCJaJ#h $Ifgd q ,$If`,gd qHkd?=$$IfTl=(F( t(644 lBayt+`T $$Ifa$gd q ˜ĘƘȘ/&&& $Ifgd qkd=$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`TȘ̘٘ۘ͘ $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd>$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt+`T $$Ifa$gd q $Ifgd q2))) $Ifgd qkd{?$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`T# $$Ifa$gd q $Ifgd q#$%892***$a$gd qkdi@$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt+`T6789mn";<^_}~23[\›Ûěћқޛ+,01YZ^_ΜϜ01´ͬͤœͬͬͬ͆͜͜†~h$"WCJaJh3h_CCJaJh3hp~QCJaJh]CJaJh0CJaJh8CJaJh3h9 5CJ\aJh3h(QCJaJh3h9 CJaJhBo1hb>*CJaJh(Q5>*CJ\aJhBo1h9 5>*CJ\aJ19n<_~3\,ZϜ2H$  0\a$gd q$  HXa$gd q $ !\&a$gd q$a$gd q$ & F a$gd,12מVWXZ[]^bȽݽݵggOgOgOg/hq'Eh0iM5CJOJQJaJmH nH sH tH /hq'EhK'5CJOJQJaJmH nH sH tH  hohK'hUhK'5hK'5CJ\_H9aJ hK'5 h~M5hK'hK'5hK'CJaJh(<CJaJh3hCJaJh>*CJaJhh>*CJaJhCJaJh$"WCJaJh3h0CJaJh_CCJaJ(*VX $$Ifa$gd q $7$8$H$a$gd q$ & F  `a$gdj$ %a$gd q $ a$gd q$ & F a$gd,$a$gd q Ÿğ̟[NEEE $Ifgd q ,$If`,gd qJkdA$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qLkdWA$$IfTl.=(F( t(644 lBayt~MT̟͟؟ڟ $Ifgd q,## $Ifgd qkd B$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $$Ifa$gd q $Ifgd q     "ef ǽǽϽϱtg]g]gS]FShu h(<CJ_H9aJhXCJ_H9aJhJCJ_H9aJhJhJCJ_H9aJhu 5>*CJ\_H9aJ!hu hu 5>*CJ\_H9aJ!h h 5>*CJ\_H9aJhu 5CJ\_H9aJ hohK' hK'5hK'hK'5PJhK'hK'5/hq'EhK'5CJOJQJaJmH nH sH tH /hq'Eh0iM5CJOJQJaJmH nH sH tH /&&& $Ifgd qkdC$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT     $$Ifa$gd q $Ifgd q  !"/&&& 7$8$H$gd qkdC$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT"fY[\mn67 7$8$H$^gdO4k$ & F $^`a$gdj$ $a$gd q 7$8$H$gd q $7$8$H$a$gds" $7$8$H$a$gd q & F7$8$H$^`gd,   `bԡ%&YZ[\knڹڬڢyobWLhJhJCJaJhO4khJCJaJhO4khXCJ_H9aJhK'CJ_H9aJhJCJ_H9aJhX5>*CJ\_H9aJ!hXhX5>*CJ\_H9aJh(<CJ_H9aJhO4khO4kCJ_H9aJhXCJ_H9aJhu hs"CJ_H9aJhqCJ_H9aJhu h(<CJ_H9aJhs"CJ_H9aJhs"h(<CJH*_H9aJ5678NRTXijkĦŦǦɦ˦Ϧܦݦަߦ&'(ºyyyyylh0iM5CJOJQJaJhK'h0iM5PJ/hq'Eh0iM5CJOJQJaJmH @nH sH @tH /hq'Eh0iM5CJOJQJaJmH nH sH tH  hoh0iMhUh0iM5 h0iM5hK'h0iM5h>h>5CJ\aJh>CJaJhK'CJaJhJhJCJaJhO4kCJaJ)7MNjkHHkd@E$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdD$$IfTl=(F( t(644 lBaytpT $$Ifa$gd q$ $a$gd qĦ $Ifgd q ,$If`,gd qĦŦǦɦ˦/&&& $Ifgd qkdE$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT˦ϦЦܦަ $$Ifa$gd q $Ifgd q/&&& $Ifgd qkdF$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $$Ifa$gd q $Ifgd q2))) $Ifgd qkd|G$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT& $$Ifa$gd q $Ifgd q&'(;2*! 7$8$H$gd q$a$gd qkdjH$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT(9:;<@rsw%&)*deҩөCDOPwzj]]]]]PjhhE5CJ\_H9aJh>h>CJ_H9aJh>h>5CJ\_H9aJ!h>hhE5>*CJ\_H9aJhhECJ_H9aJhhEhhECJ_H9aJ h>hhECJPJaJnHtHhhECJPJaJnHtHhhE5>*CJ\_H9aJh>5>*CJ\_H9aJ!h>h>5>*CJ\_H9aJ!h h 5>*CJ\_H9aJ;<s&OPXS1 $7$8$H$a$gd q $7$8$H$a$gd q 7$8$H$^gd q$ & F7$8$H$^`a$gdj & F7$8$H$^`gdj & F7$8$H$`gdj 7$8$H$gd qw!#z{Ȭ'(1Ie,-1;C4569),ȱ˱  *µ󭢗h~MCJaJhu/h~MCJaJh~M5CJ\aJhCJaJhhE5CJ\_H9aJh>h>5CJ\_H9aJh>hhECJ_H9aJh>CJ_H9aJhhECJ_H9aJh>h>CJ_H9aJ51(eˮ,-C6)ȱ $a$gd q$ $^a$gd q $7$8$H$a$gd q 7$8$H$gd q $7$8$H$a$gd q `-.gPڵ $$Ifa$gd q $`a$gd q$ & FLW7$8$H$^`Wa$gd, & FLW7$8$H$^`Wgd, & FLD7$8$H$`Dgd,$ $^a$gd q$a$gd q *,`dz-gr%OPQĵٵڼtfXPKPK h0iM5hK'h0iM5h0iMCJPJaJnHtHhPCJPJaJnHtHhPhRCJ_H9aJhhEhRCJ_H9aJ h>hRCJPJaJnHtHhRCJPJaJnHtHhhEhhE5>*CJ\aJhhECJaJhNh~M6CJ]aJh~MCJaJh' h~MCJaJh~M5CJ\aJh' h~M5CJH*\aJٵڵ۵4579;?LMNOUVWbcdmnoظظظ|n|dhi|CJ_H9aJhP5>*CJ\_H9aJhb5>*CJ\_H9aJ!h h 5>*CJ\_H9aJh0iMCJPJaJnHtH h0iM5hK'h0iM5PJhK'h0iM5/hq'Eh0iM5CJOJQJaJmH @nH sH @tH /hq'Eh0iM5CJOJQJaJmH nH sH tH  hoh0iMhUh0iM5"ڵ۵cVMMMM $Ifgd q ,$If`,gd qHkdI$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdXI$$IfTl=(F( t(644 lBaytpT)+45&kdJ$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd q579;?@LNV $$Ifa$gd q $Ifgd qVWXYZ/&&& $Ifgd qkdJ$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpTZ[\bdn $$Ifa$gd q $Ifgd qnopqr2))) $Ifgd qkdK$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTrst $$Ifa$gd q $Ifgd q2& $`a$gd qkdL$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTd45<|}BQ $7$8$H$a$gd q$ & FG7$8$H$a$gd, $7$8$H$a$gd q bd234JVWعvwӺԺ޺ߺ=>!^_%yz׽ؽEFTU׾ؾ)IUV|}µߵߵߵµߵߵߵߵߵߵµߵߵµߵߵµߵߵߵߵߵߵߵhi|5CJ\_H9aJhPhPCJ_H9aJhPhP5CJ\_H9aJhPhi|CJ_H9aJhi|CJ_H9aJhPCJ_H9aJhi|hi|CJ_H9aJB}BFPQT  ghipbd"vw־{m{\!hi|hi|5>*CJ\_H9aJhNh~M6CJ]aJh' h~MCJaJh' h~M5CJH*\aJh~MCJaJhu/h~MCJaJh~M5CJ\aJhy%5CJ\aJh~M5>*CJ\_H9aJhi|CJ_H9aJhPhPCJ_H9aJhi|5CJ\_H9aJhPhP5CJ\_H9aJ ghopcdvwc!B $$Ifa$gd q$7$8$H$^a$gd q$ & FH7$8$H$a$gd,$a$gd q $7$8$H$a$gd q $ac!%'+ABCvwûlbbhK'h0iM5PJ/hq'Eh~M5CJOJQJaJmH nH sH tH /hq'Eh0iM5CJOJQJaJmH @nH sH @tH /hq'Eh0iM5CJOJQJaJmH nH sH tH  hoh0iMhUh0iM5 h0iM5hK'h0iM5h0iMCJ_H9aJhi|hi|CJ_H9aJhi|CJ_H9aJhi|5>*CJ\_H9aJ&BCvwy{}cVMMMM $Ifgd q ,$If`,gd qHkdN$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdM$$IfTl=(F( t(644 lBaytpT&kdlN$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd q $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd`O$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT #IKLMŴzizizizizizi\h:h0iMCJ_H9aJ!h:h0iMB*CJ_H9aJph"""h0iMB*CJ_H9aJph"""h0iM5CJ\_H9aJh0iM5>*CJ\_H9aJ!huPh0iM5>*CJ\_H9aJ!h h 5>*CJ\_H9aJh0iMCJ_H9aJhK'h0iM5PJhK'h0iM5/hq'Eh0iM5CJOJQJaJmH nH sH tH  hoh0iM $$Ifa$gd q $Ifgd q2))) $Ifgd qkdTP$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT $$Ifa$gd q $Ifgd q2"$7$8$H$^a$gd qkdBQ$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTKLMU'cdlS $7$8$H$a$gd q 7$8$H$^gd q & FI-DM gd, 7$8$H$gd q $7$8$H$a$gd qM'Nxy&RSxyBCbcd12SUYck 57kh' h~M5CJH*\aJh~MCJaJhu/h~MCJaJh~M5CJ\aJh0iM5CJ\_H9aJh0iMCJ_H9aJh:h0iMCJ_H9aJh:h0iM5CJ\_H9aJ*CJ\_H9aJ!hy/h0iM5>*CJ\_H9aJh~M5>*CJ\_H9aJhNh~M6CJ]aJh~MCJaJh' h~MCJaJWJAA $Ifgd q ,$If`,gd qHkdR$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkd0R$$IfTl=(F( t(644 lBaytpT $$Ifa$gd q%&(*+,0=>?@FGHSTU^_`}~ɱ᩟᩟᩟pe]h/CJaJhh/CJaJhJh/5>*CJ\aJh h 5>*CJ\aJhb5>*CJ\aJ hJ5hK'hJ5PJhK'hJ5/hq'Eh]`25CJOJQJaJmH nH sH tH /hq'EhJ5CJOJQJaJmH @nH sH @tH /hq'EhJ5CJOJQJaJmH nH sH tH  hohJ!% $Ifgd q%&(*,/&&& $Ifgd qkdR$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT,01=?G $$Ifa$gd q $Ifgd qGHIJK/&&& $Ifgd qkdS$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpTKLMSU_ $$Ifa$gd q $Ifgd q_`abc2))) $Ifgd qkdT$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTcde} $$Ifa$gd q $Ifgd q2**$a$gd qkdU$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTvw$a$gd q$a$gd q$ & F+ a$gd, $ a$gd qIJ./wFGdeԾɤɋh]`25CJ\aJhleh/5CJPJaJhleh/5CJaJhleh/5CJ\aJh/5CJ\aJh3h/CJaJh3h/5CJ\aJh3hSCJaJh/CJaJhJh/CJaJ6Ge49c $$Ifa$gdt $ a$gd q$ & F- a$gd, 7$8$H$gdI$a$gd q$ & F, -a$gd,4z89bcȮ|qiqiqiqiaVh>h[CJaJh[CJaJh/CJaJhwh/CJaJhy/hICJ_H9aJhICJ_H9aJh/5>*CJ\aJhwh/5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh' h]`2CJaJh' h]`25CJH*\aJh]`25CJ\aJh]`2CJaJhu/h]`2CJaJ BChikmprҺ~o`hjh[5>*CJ\aJh h 5>*CJ\aJh3h[CJaJhJh[5PJhJh[5/hq'Eh[5CJOJQJaJmH @nH sH @tH  hoh[/hq'Eh[5CJOJQJaJmH nH sH tH )ht5CJOJQJaJmH nH sH tH /hq'EhJ5CJOJQJaJmH nH sH tH "BCEGIQR]PGGGG $Ifgd q ,$If`,gd qJkdV$$IfTl=(F( t(644 lBayttT $$Ifa$gd qJkdV$$IfTl=(F( t(644 lBayttTR]_h $Ifgd qhikm,## $Ifgd qkdNW$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayttTmprs $$Ifa$gd q $$Ifa$gd q $Ifgd q,## $Ifgd qkdGX$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayttT $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd@Y$$IfTlִB Mj+!=(a FS FF t(6    44 lBayttT $$Ifa$gd q $Ifgd q/'''$a$gd qkd3Z$$IfTlִB Mj+!=(a FS FF t(6    44 lBayttT'(01cdWY`ap  lmsԳh[5CJ\aJh[CJPJaJh3h[CJPJaJh3h[5CJPJ\aJh3h[5CJ\aJh3h[CJaJhUCJaJh[CJaJh(h[CJaJhjh[>*CJaJh[5>*CJ\aJ-(dWXYamn$ & F! a$gd, $ a$gd q$a$gd q$a$gd q$ & F ha$gd,st>?FGnpwik)}~ٹ~p_SIhICJ_H9aJhJh[>*CJaJ!hJh[5>*CJPJ\aJh]`25>*CJPJ\aJhNh]`26CJ]aJh' h]`2CJaJh' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJh"5CJaJhJh[5CJaJh3h[CJaJh3h[5CJ\aJhJh[5CJ\aJtnopvwjk}~ Q$ $^a$gd q$ & F" a$gd, 7$8$H$gdI$a$gd q$ & F! a$gd,  PQR789@ACDûpXX/hq'EhPS5CJOJQJaJmH nH sH tH /hq'Eh{a5CJOJQJaJmH nH sH tH /hq'Eh-M5CJOJQJaJmH nH sH tH  hoh-M hJh-MhJh-M5 hJ5h-MCJaJhhECJaJhUCJaJhJh[CJPJaJhJh[CJaJhj CJaJhy/hICJ_H9aJ !WJAA $Ifgd q ,$If`,gd qHkdz[$$IfTl=(F( t(644 lBaytQT $$Ifa$gd qHkd&[$$IfTl=(F( t(644 lBaytQT $$Ifa$gd q!)*57@ $Ifgd q@ADFH/&&& $Ifgd qkd[$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytQTDEFGHKLMZ[\]_defqrs|}~ϷϟuphuauuauaYMh 5>*CJ\aJh-MCJaJ hoh-MhJhPS5 h{a5hJh-M5PJhJh-M5/hq'EhPS5CJOJQJaJmH @nH sH @tH /hq'Eh-M5CJOJQJaJmH nH sH tH /hq'EhJ5CJOJQJaJmH nH sH tH /hq'Eh-M5CJOJQJaJmH @nH sH @tH /hq'EhJ5CJOJQJaJmH @nH sH @tH HMNZ\e $$Ifa$gd q $Ifgd qefghi/&&& $Ifgd qkd\$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytQTijkqs} $$Ifa$gd q $Ifgd q}~2))) $Ifgd qkd]$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytQT $$Ifa$gd q $Ifgd q2$ $^a$gd qkd^$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytQTLM )NOt}ɐuɦme]XeSe ht5 h]`25hJhJ5hJh y5h yCJaJhAVtCJaJhbCJaJhAVthJCJaJhAVth-MCJaJhhTCJaJhTCJaJh-MCJaJhhPSCJaJhCJaJhAVthPSCJaJhAVthPS5CJ\aJhAVth 5CJ\aJh h 5>*CJ\aJM Lu $$Ifa$gd'$ $^a$gd q$ & F^a$gdj$ $a$gd q !"%&'4567>?@KLMVWXuvwڪzڒrhcrhrhrhrh\ h'0J+>* h{a5hJh y5PJhJh y5/hq'EhJ5CJOJQJaJmH nH sH tH /hq'Eh y5CJOJQJaJmH @nH sH @tH /hq'EhJ5CJOJQJaJmH @nH sH @tH /hq'Eh{a5CJOJQJaJmH nH sH tH /hq'Eh y5CJOJQJaJmH nH sH tH  hoh y hJh y#cVMMMM $Ifgd q ,$If`,gd qHkd_$$IfTl=(F( t(644 lBaytQT $$Ifa$gd qHkd_$$IfTl=(F( t(644 lBaytQT&kd:`$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytQT $Ifgd q "'(46? $$Ifa$gd q $Ifgd q?@ABC/&&& $Ifgd qkd.a$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytQTCDEKMW $$Ifa$gd q $Ifgd qWXYZ[2))) $Ifgd qkd"b$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytQT[\]uw $$Ifa$gd q $Ifgd q2&& [$\$gd'kdc$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytQTFG&'TU#$UVss^)h58h585>*CJPJ\aJmH @sH @!h58h585>*CJPJ\aJh585>*CJPJ\aJ!h'h'5>*CJPJ\aJ:h'h'B*CJPJaJfHmH @phq sH @2h'h'B*CJPJaJfHphq h'CJaJh'h'>*h'h'0J+>*h h 0J+>*" TG'U$V $ B a$gd58 $ B a$gd'$ & Fda$gdj$a$gd' & Fd[$\$gdj & Fdgdj)*-.cdw"#UVἮ~s~sh[~N~[~AhJh58CJPJaJh58h'CJPJaJh58h58CJPJaJh58h'CJaJh58h58CJaJh58CJaJhAVth'CJaJhJh'>*CJaJ!hJh'5>*CJPJ\aJh585>*CJPJ\aJ&h]h585CJPJ\aJmH @sH @!h]h585CJH*PJ\aJh]h585CJPJ\aJh58h58CJPJ\aJ*.c#VXr~ $$Ifa$gd q$a$gd q$ & FM a$gdj$ $a$gd' $ B a$gd'$ & F B 7^7`a$gdj & F B 7^7`gdj & F 77]^7`gdjVXrs$%&./01BCDE༲༲༲ܧujjhh)hvCJaJhh)hv>*CJaJhh)hv5>*CJ\aJh h 5>*CJ\aJhSsCJaJh3hvCJaJhvhv5PJhvhv5/hq'Ehv5CJOJQJaJmH @nH sH @tH hv/hq'Ehv5CJOJQJaJmH nH sH tH hvCJaJ%rscVMMMM $Ifgd q ,$If`,gd qHkdRd$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdc$$IfTl=(F( t(644 lBaytpT&kdd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd q $$Ifa$gd q $$Ifa$gd q $Ifgd q/&&& $Ifgd qkde$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $$Ifa$gd q $Ifgd q  2))) $Ifgd qkdf$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT   $&. $$Ifa$gd q $Ifgd q./01D2***$a$gd qkd|g$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTDENOWfgpABZ[ $ a$gd q $ a$gd q$a$gd q$a$gd q$ & F# a$gd, $ a$gd q%}~OVWwgop@BHIYZ⾰פיh]`2CJaJhu/h]`2CJaJh]`25CJ\aJh j6hv5CJaJh;6hv5CJ\aJhv5CJ\aJh3hv5CJ\aJh3hvCJaJhvCJaJhh)hvCJaJhPchvCJaJ/[@o!#M $$Ifa$gd q $ a$gd q$ & F% a$gd, $ a$gd q$a$gd q$ & F$ a$gd,.5Ono !ڹrdYK=hvhv5CJ\aJhahv5CJ\aJhahvCJaJhhv5CJ\aJhDOhv5CJ\aJhDOhvCJaJhhvCJaJhvCJaJhhv>*CJaJhhv5>*CJ\aJh3hvCJaJhNh]`26CJ]aJh]`2CJaJh' h]`2CJaJh]`25CJ\aJh' h]`25CJH*\aJ!"#MN    <klҳҳҫҫҫ˖xlaahE]hvCJaJhh)hv>*CJaJhh)hv5>*CJ\aJh h 5>*CJ\aJh3hvCJaJhvhv5PJhvhv5/hq'Ehv5CJOJQJaJmH @nH sH @tH  hvhv/hq'Ehv5CJOJQJaJmH nH sH tH h&hv5CJ\aJhvCJaJ&MNcVMMMM $Ifgd q ,$If`,gd qHkdh$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdjh$$IfTl=(F( t(644 lBaytpT&kdi$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd q $$Ifa$gd q $$Ifa$gd q $Ifgd q/&&& $Ifgd qkdj$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $$Ifa$gd q $Ifgd q2))) $Ifgd qkdj$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT  $$Ifa$gd q $Ifgd q    2***$a$gd qkdk$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT m+,3"%-p r {       o r   (gd q$a$gd q$a$gd q$ & FQ a$gdj $ a$gd q+,23bcu%),<=m o p r z          /     _ a o r  żżżűżżűŝűꩄyqh]`2CJaJhu/h]`2CJaJh]`25CJ\aJhU8hv5CJH*aJhU8hv5CJaJhvCJaJhhvCJaJhv5CJaJh&;hv5CJaJhv5CJ\aJh3hv5CJ\aJh3hvCJaJhs+hvCJaJ,(}FMH $$Ifa$gd q $ a$gd q$ & FR a$gdj $ a$gd q$a$gd q$a$gd qgd qFLMcf #$&H_ڸtttti[C/hq'Ehv5CJOJQJaJmH nH sH tH h&hv5CJ\aJhv5CJ\aJhs+hvCJaJhE]hvCJaJhvhvCJaJhvCJaJhv5>*CJ\aJhhv5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh]`2CJaJh' h]`2CJaJh]`25CJ\aJh' h]`25CJH*\aJ cVMMMM $Ifgd q ,$If`,gd qHkd*m$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdl$$IfTl=(F( t(644 lBaytpT$%'),.;<=DEFQRS\]^{|}HI~s~s~s~shh3hvCJaJhahvCJaJhvCJaJ hSshvhahv5>*CJ\aJh h 5>*CJ\aJhU85>*CJ\aJhvhv5PJhvhv5/hq'Ehv5CJOJQJaJmH @nH sH @tH /hq'Ehv5CJOJQJaJmH nH sH tH  hvhv'$%&kd~m$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd q%'),./;=E $$Ifa$gd q $$Ifa$gd q $Ifgd qEFGHI/&&& $Ifgd qkdrn$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpTIJKQS] $$Ifa$gd q $Ifgd q]^_`a2))) $Ifgd qkdfo$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTabc{} $$Ifa$gd q $Ifgd q2**$a$gd qkdTp$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTI $ a$gd q$a$gd q$a$gd q$ & F a$gd, $ a$gd q+,2cd)*+,@AOP !U߸h' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJhU85CJ\aJhv5>*CJ\aJhr5hvCJPJaJhr5hv5CJ\aJhvCJaJh3hvCJaJh3hv5CJ\aJ/P  U#$h$ & F a$gd,$ & F a$gd, $ a$gd q$a$gd q$ & F a$gd,U"#$h:;opqrsĸ|eMFMFMFM h-fsh-fs/hq'Eh-fs5CJOJQJaJmH nH sH tH ,hq'Eh-fsCJOJQJaJmH nH sH tH hvh-fsCJaJh-fsCJaJhvhvCJaJhr5hvCJaJh3hvCJaJhvCJaJh+`hv>*CJaJh+`hv5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh]`2CJaJh' h]`2CJaJ;prEHkdq$$IfTl=(F( t(644 lBaytpTHkdBq$$IfTl=(F( t(644 lBaytpT $$Ifa$gd q $ a$gd q$ & F a$gd, $Ifgd q ,$If`,gd q/&&& $Ifgd qkdq$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT         ! > ? @ H J K \ ] ^ _ a b h l Y!Z!a!ǽǽǽǽǽ϶xmememe]h ULh-fs5h-fsCJaJh-h-fsCJaJh-fs>*CJaJh-fs5>*CJ\aJhXih-fs5>*CJ\aJh h 5>*CJ\aJh3h-fsCJaJ h-fsh-fsh-fsh-fs5PJh-fsh-fs5/hq'Eh-fs5CJOJQJaJmH nH sH tH /hq'Eh-fs5CJOJQJaJmH @nH sH @tH     $$Ifa$gd q $Ifgd q $$Ifa$gd q     /&&& $Ifgd qkdr$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT       $$Ifa$gd q $Ifgd q ! " # $ 2))) $Ifgd qkds$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT$ % & > @ H  $$Ifa$gd q $Ifgd qH I J K 2%$a$gd q $ da$gd qkdt$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpTK ^ _  !*!Y!Z!a!@#B#J#$$$%%%&&&'A'$a$gd q$ h^ha$gd q$ & FS a$gdj $ a$gd q$a$gd qa!n!B#O#$$%%&'''(((()Z)a){)))))****˩˞ui^W^Oh79CJaJ h" h-fsh" h-fsCJaJh-fs5>*CJ\aJh)~h-fs5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh' h]`2CJaJh' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJh-fshy%h-fs5CJ\aJhy%h-fsCJaJhy%h-fs5CJaJA'~''''''(())))))/*r****+ $$Ifa$gd q $ a$gd q$ & FT a$gdj $ a$gd q$a$gd q******+++++,+J+K+p+q+s+u+x+z+++++++++++ƮƖƏwƏƏ__WMWHWMW h\@5h79h795PJh79h795/hq'Eh795CJOJQJaJmH @nH sH @tH /hq'EhSs5CJOJQJaJmH nH sH tH  h79h79/hq'Eh]`25CJOJQJaJmH nH sH tH /hq'Eh\@5CJOJQJaJmH nH sH tH /hq'Eh795CJOJQJaJmH nH sH tH ,hq'Eh79CJOJQJaJmH nH sH tH hvh79CJaJ++J+K+M+O+Q+Y+Z+cVMMMM $Ifgd q ,$If`,gd qHkdv$$IfTl=(F( t(644 lBaytpT $$Ifa$gd qHkdu$$IfTl=(F( t(644 lBaytpTZ+e+g+p+q+&kdVv$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT $Ifgd qq+s+u+x+z+{++++ $$Ifa$gd q $$Ifa$gd q $Ifgd q+++++/&&& $Ifgd qkdJw$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytpT++++++ $$Ifa$gd q $Ifgd q+++++++++++++++++ ,,,,>,L,n,,,,,,,,,...ø}r}r}r}r}rdrdYdrYdh\@5CJ\aJh\@h\@5CJ\aJh\@h\@CJaJh\@CJaJh79>*CJaJh795>*CJ\aJh -Ah795>*CJ\aJh h 5>*CJ\aJh3h79CJaJh79h79CJaJ/hq'Eh795CJOJQJaJmH nH sH tH  h79h79h79h795h79h795PJ"+++++2))) $Ifgd qkd>x$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT++++++ $$Ifa$gd q $Ifgd q+++2& $V^Va$gd qkd,y$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytpT++++ ,>,n,,,,,,....00111$ ^a$gd q $ a$gd q $V^Va$gd q $ & Fa$gd, $ \a$gd q$a$gd q $>^>a$gd q.....00111R2m213f344o:q:x:j;l;;;; <<*<~<<<<==wh\h\@h\@>*CJaJh\@h\@5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh' h]`2CJaJh' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJhO#5CJ\aJh\@5CJ\aJh\@CJaJh\@h\@5CJ\aJh\@h\@CJaJ 1R20313:3444 5T556088&99o:p:q:$ & F a$gd, $ & Fa$gd, $^a$gd q$a$gd q $ a$gd q $ a$gd q$ ^a$gd qq:w:x:k;l;;~<<<<<<!=B==== $$Ifa$gd q $ & Fa$gd,$ ^a$gd q $ a$gd q$a$gd q=====>>*>+>,>->/>2>8>9>F>G>H>J>K>P>Q>R>]>^>_>h>i>j>>>>>>>ΞΆ|w||||hh h 5>*CJ\aJ h{a5hG3hG35PJ/hq'Eh]`25CJOJQJaJmH @nH sH @tH /hq'EhG35CJOJQJaJmH @nH sH @tH /hq'Eh]`25CJOJQJaJmH nH sH tH /hq'EhG35CJOJQJaJmH nH sH tH hG3hG35 hG3hG3hqBhG3CJaJ"==>>> > >>>>k^UUUUU $Ifgd q ,$If`,gd qDkdoz$$Iflg+F( t(644 lBaytp $$Ifa$gd qDkdz$$Iflg+F( t(644 lBaytp >!>*>+>->*kdz$$Iflִgn  = #+FaFFF FS FF t(6    44 lBBaytp $Ifgd q->/>2>9>:>F>H>Q> $$Ifa$gd q $Ifgd qQ>R>S>T>U>3*** $Ifgd qkd{$$Iflִgn  = #+FaFFF FS FF t(6    44 lBBaytpU>V>W>]>_>i> $$Ifa$gd q $Ifgd qi>j>k>l>m>n>6---- $Ifgd qkd|$$Iflִgn  = #+a FS FF t(6    44 lBaytpn>o>>>> $$Ifa$gd q $Ifgd q>>>>6..$a$gd qkd}$$Iflִgn  = #+a FS FF t(6    44 lBaytp>>>>>7?d?e?l?m?y?z?{???@ @!@+@@@@@@@3A4AxAAAAAA>B?BCBDBTBUBBBBBC C C Cٻ٭٭٭٭٭٭٭٭٭٭٭٢ٖ|h]`25>*CJ\aJh hG35CJPJaJh hG35CJaJhG35CJ\aJh3hG35CJ\aJh5CJ\aJh hG3CJaJhG3CJaJh3hG3CJaJh hG3>*CJaJh hG35>*CJ\aJ.>>>7?d?e?m?@@!@@@@wAxAA>B?BUBBB$ & F2 a$gd, $ a$gd q$a$gd q$a$gd q $ va$gd q$ & F va$gd,B C C CCCDD]DEE*EcEeEEEhFFFF$$If]^a$gd q $ a$gd q$ & F3 a$gd, $ a$gd q$a$gd q$ & F2 a$gd, CCDD'D)D]DDDDEE)E*EbEcEeEEEEEgFhFiFFFFFFȮuujcj\TPHhphp5hphpCJaJ hphG3 hqAhG3hqAhG3CJaJh!8hG3CJaJhG3hG3CJaJhG3CJaJhG35>*CJ\aJh!8hG35>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh' h]`2CJaJh' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJFFFFFFFFFaTKKKK $Ifgd q ,$If`,gd qIkd~$$IfTl"F t44 lBa<yt 1T $$Ifa$gd qIkd~$$IfTl"F t44 lBa<yt 1TFFFFGG(G2G3G>GJGKGhGjGrGwGxGyGGGGHHHHH%I&I0J7J8JPJQJcJ*K,K4K5KJKôÑÃÃÃÃxlcÃÃhpCJ\aJh hpCJ\aJhp5CJ\aJh3hp5CJ\aJhCJaJh!hp>*CJaJh!hp5>*CJ\aJh h 5>*CJ\aJh3hpCJaJjhphpUhphp5/hq'Ehp5CJOJQJaJmH nH sH tH  hphp&FGGGG%kdB$$IfTlִ(u G"FXFFFFS FoF t    44 lBBa<yt 1T $Ifgd qGGGGGG(G*G2G $$Ifa$gd q $$Ifa$gd q $Ifgd q2G3G4G5G6G.%%% $Ifgd qkd=$$IfTlִ(u G"FXFFFFS FoF t    44 lBBa<yt 1T6G7G8G>G@GJG $$Ifa$gd q $Ifgd qJGKGLGMGNG1((( $Ifgd qkd8$$IfTlִ(u G"XFS FoF t    44 lBa<yt 1TNGOGPGhGjGrG $$Ifa$gd q $Ifgd qrGsGyG1% $]a$gd qkd-$$IfTlִ(u G"XFS FoF t    44 lBa<yt 1TyGGGGHcHHHH/J0J8J+K,K5K?L@L$ ]^a$gd q$]^a$gd q$ ]^a$gd q$ ]^a$gd q$ & FU ]^a$gdj$]^a$gd qJKKK@LGLHLILnLqL_M`MaMbMfMgMhMrMyMzMM;NOAODOKO=P?PbPdPP翱ߌvn_h' h]`25CJH*\aJh]`2CJaJhu/h]`2CJaJh]`25CJ\aJhV5CJ\aJh{jhp5CJ\aJh{jhp5CJaJh!hp5CJ\aJhp5CJ\aJhpCJ\aJh=@UhpCJ\aJhpCJaJh3hp5CJ\aJh3hpCJaJ#@LHLIL`MaMbMzMMMO?O@OAOBOCODOJOKO$a$gd q $]a$gd q$ & FW ]a$gdj $]a$gd q$]^a$gd q$]^a$gd qKO>P?P@PAPPSQTQeQfQQQQR^RRRR $$Ifa$gd q $ a$gd q$ & FV ]^a$gdj$]^a$gd q$a$gd qPPPPSQTQcQeQ]R^RRRRRRR-S.SSSTSVSXS[S]SjSkSlSsStSuSSSĸzzzzbzbzZPZPzZhh5PJhh5/hq'Eh5CJOJQJaJmH @nH sH @tH /hq'Eh5CJOJQJaJmH nH sH tH hhphOAihpCJaJhpCJaJh3hpCJaJhphp>*CJaJhphp5>*CJ\aJh]`25>*CJ\aJhNh]`26CJ]aJh]`2CJaJh' h]`2CJaJRR-S.S0S2S4S*CJaJh h 5>*CJaJh(Ehy,CJaJh(EhCJaJh(EhB* CJaJph/hq'Eh5CJOJQJaJmH nH sH tH hhh5hh5PJSSSSS5,,, $Ifgd qkd$$Iflִgn  V= !`'a 6F FF t$    44 lBayt2SSSSSS $$Ifa$gd q $Ifgd qSSS5$$ h^ha$gd qkd$$Iflִgn  V= !`'a 6F FF t$    44 lBayt2SSSTTTUUUU0V1V:VLWMWWWXX $^a$gdy, $^a$gdy, $^a$gdy, $^a$gdy,$a$gdy,$ ^a$gdy,$ & F7 na$gd, $ a$gdy,UUUUUUUUUUUU/V1V9V:VVVWVVV W!WLWMWVWWW~WWWWWWWWWWWXX XXXXXXXXXXXXXYY$Y&YYYYYYZ Z Z Z Z꽴ܩܩԽܩhy,5CJ\aJhy,5CJaJhn1hy,5CJaJhn1hy,CJaJhy,CJaJh3hy,5CJ\aJh3hy,CJaJh+Bhy,CJaJAXXYYYY Z ZVZZ [g[[[[[[ $^a$gdL$ & F^a$gdj$ :^a$gdy, $^a$gdy,#$ ,,( X 4 lh!"$^a$gdy, $^a$gdy, $^a$gdy, ZZZ[[[\\\\]F]M]g]]]]]^^^^$^'^3^F^G^^ºͫ͠؃xmaRRGhhy,CJaJhhy,B* CJaJphh(Ehy,5CJaJh3hy,CJaJh.hy,CJaJh.Qhy,5>*CJ\aJhNhy,6CJ]aJh' hy,CJaJh' hy,5CJH*\aJhy,CJaJhu/hy,CJaJhy,5CJ\aJhy,5>*CJ\aJhy,B* CJaJphhn1hy,B* CJaJph[\\]]]]]^^G^^^^^^^$ n8^8a$gd q $ a$gdy, $ a$gdy,$ & FX ^a$gdj$ ^a$gdL$ :^a$gdL $^a$gdL^^^^^^^^^^__C_D_i_j_l_n_q_s________________ʾkkcYcYcYcYcYhh5PJhh5/hq'Eh5CJOJQJaJmH @nH sH @tH h/hq'Eh5CJOJQJaJmH nH sH tH ,hq'EhCJOJQJaJmH nH sH tH hCJaJhB* CJaJphhn1B* CJaJphhy,B* CJaJphhhy,CJaJhy,CJaJhhy,CJaJ"^__C_D_F_H_J_R_cVMMM $Ifgd q ,$If`,gd qHkd$$IfTl=(F( t(644 lBayt\aTHkd$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd qR_S_^_`_i_ $Ifgd qi_j_l_n_q_/&&& $Ifgd qkdH$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTq_s_t____ $$Ifa$gd q $Ifgd q $$Ifa$gd q_____/&&& $Ifgd qkd<$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aT______ $$Ifa$gd q $Ifgd q_____2))) $Ifgd qkd0$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT______ $$Ifa$gd q $Ifgd q_______?`@`}`~```````azbbddeezg%i&i*i1iɺ؊~s~s~s~sesZOh@5CJ\aJh@5>*CJaJhh5CJ\aJhhCJaJhh5CJaJh3hCJPJaJh+jhCJPJaJh+jhCJaJh3hCJaJhQh5>*CJ\aJh h 5>*CJ\aJh5CJ\aJh/hq'Eh5CJOJQJaJmH nH sH tH _____2***$a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT_@`~`````aybzbbdddeeexgzggg)huhhh%igd q$a$gd q$a$gd q$ & FZ a$gdj%i&i'i(i)i*i0i1i$j%j|j7k8kIkkkk:ljlll $ a$gd q$ & FY na$gdj$ & FY a$gdj$a$gd qgd q1i#j%jFjHj|jjjj7k8kHkIkkkkk9l:lhljlllllȯvivivavaYNhh CJaJhCJaJhCJaJhhCJPJaJhhCJaJhhCJ\aJhCJ\aJh5>*CJaJhh5>*CJaJh@5>*CJaJhNh@6CJ]aJh' h@CJaJh' h@5CJH*\aJh@5CJ\aJh@CJaJhu/h@CJaJlllllmmmRE ,$If`,gd qHkd`$$IfTl=(F( t(644 lBayt\aTHkd $$IfTl=(F( t(644 lBayt\aT $$Ifa$gd q$ n8^8a$gd qlllmm7m8m:m*CJaJh 5>*CJ\aJhXih 5>*CJ\aJh h 5>*CJ\aJh3h CJaJh h 5PJh h 5/hq'Eh 5CJOJQJaJmH @nH sH @tH h /hq'Eh 5CJOJQJaJmH nH sH tH (mmm m!m,m.m7m $Ifgd q7m8m:m*CJ\aJh)~h CJaJhh 5CJaJh@CJaJh CJaJh3h CJaJh3h 5CJ\aJh 5CJ\aJ6ttuuu;vvJwww*CJ\aJh)~h 5>*CJ\aJh@5>*CJ\aJhNh@6CJ]aJh@CJaJh' h@CJaJh@5CJ\aJh' h@5CJH*\aJzzz{||@}B}q}r}}k_ $$Ifa$gd qEkdx$$Ifl#F" t"44 lBaytn$$If]^a$gd q $ a$gd q$ & F\ a$gdj$ & F[ a$gdj $ a$gd q q}r}}}}}}} ~ ~3~4~5~F~H~I~e~g~~~~~~~~~~~>?@]%OP|ԀǼtkh=5CJaJh=B*CJaJphh=h=CJaJh=CJaJh=5CJ\aJhjh' CJaJh' CJaJh%j8h' CJaJhL_h' CJaJhL_h' 5>*CJ\aJh h 5>*CJ\aJh=5>*CJ\aJhL_h' 5 h3nh' *}}}}}}}}}} $$Ifa$gd qEkdϐ$$Ifl#F" t"44 lBaytn }}}}}2&&& $$Ifa$gd qkd&$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn}}}}}} $$Ifa$gd q}}}}}2&&& $$Ifa$gd qkd$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn}}}}~ ~ $$Ifa$gd q ~ ~ ~~~5))) $$Ifa$gd qkd$$Iflִ. 9f# Fc FF| t"    44 lBaytn~~~)~+~3~ $$Ifa$gd q3~4~5~H~3##$]^a$gd qkd$$Ifl ִ. 9f# Fc FF| t"    44 lBaytnH~I~t~~~>@$]^a$gd=$ g]^a$gd=$]^a$gd=$ SS]^Sa$gd qm$$ & Fh 4]a$gdjm$$]^a$gd qԀ<MN-7Ulmoօ),PXYZ[^eWYz|wldwUh' h@5CJH*\aJh@CJaJhu/h@CJaJh@5CJ\aJh@5>*CJ\aJhL_h' CJaJh h' 5CJaJh' 5CJaJhL_h' 5CJaJhL_h' 5CJ\aJh=h=CJaJh=B*CJ\aJphh=h=CJ\aJh=5CJ\aJh=CJaJ!89UVm*YZ[\]^deXY$a$gd q$]^a$gd q$ & Fi ]a$gdjm$$ & Fi v]a$gdjm$$ v]^a$gd q$ v]^a$gd=YklmnÈ/Zy{$$If]^a$gd q$ v]^a$gd qm$$ & Fj v]a$gdjm$$ v]^a$gd q$a$gd q|kn~Èˈψ,-./5BTUWXYZcnwxz{ȹyqfa h" 5hL_h" CJaJh" CJaJh>h' CJaJhxxh' CJaJh' CJaJhPh' CJaJhL_h' CJaJhL_h' >*CJaJhL_h' 5>*CJ\aJh@5>*CJ\aJhNh@6CJ]aJh@CJaJh' h@CJaJh@5CJ\aJ%؉ى%&=>efwyzՊ֊JdghopqRZ\ynynycyhi15CJ\aJhi1hi1CJaJhi1CJaJhi15CJaJhL_h" 5CJ\aJh~h" CJaJh" CJaJh%yh" CJaJhL_h" CJaJhL_h" 5>*CJ\aJh h 5>*CJ\aJhL_h" 5 h3nh" hL_h" h" 5 h@5&؉ىۉ݉߉i]]]]]]] $$Ifa$gd qEkdQ$$Ifl#F" t"44 lBaytn $$Ifa$gd qEkd$$Ifl#F" t"44 lBaytn &kd$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn $$Ifa$gd q% $$Ifa$gd q%&'()2&&& $$Ifa$gd qkd$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn)*+13= $$Ifa$gd q=>?@A5))) $$Ifa$gd qkd$$Iflִ. 9f# Fc FF| t"    44 lBaytnABC[]e $$Ifa$gd qefyz3##$]^a$gd qkd$$Ifl ִ. 9f# Fc FF| t"    44 lBaytnz֊ghpqR[\IJST*$]^a$gdi1$]^a$gdi1$]^a$gd q$]^a$gd q$ & F 4]a$gdjm$\fRpq܎ݎ#=IRSo*+,.LMijkrdfĻİujbuh@CJaJhu/h@CJaJh@5CJ\aJh@5>*CJ\aJh" 5>*CJ\aJhvh" 5CJaJhL_h" 5CJaJh" 5CJ\aJh" 5CJaJh" CJaJhi1B*CJaJphhi15CJ\aJhi1hi1CJaJhi1CJaJhi15CJaJ#*+-.MaijkqrefxyΔ$a$gd q$ & F v]a$gdjm$$ v]^a$gd q$]^a$gd q $xyΔݔߔIJQTuڕەܕڸwwsh`[`TM hulhI h+hI hI5h+hI5hhCJaJhIh^pCJaJh" CJaJh~h" CJaJhL_h" CJaJhL_h" >*CJaJhL_h" 5>*CJ\aJh@5>*CJ\aJhNh@6CJ]aJh@CJaJh' h@CJaJh@5CJ\aJh' h@5CJH*\aJΔJەܕi] $$Ifa$gd qDkd|$$Iflp*F( t(644 lBa3yt'@g$$If]^a$gd q$ n8^8a$gd q$ v]^a$gd qm$$ & F v]a$gdjm$ ܕ67S]^iuvٖږDEy{{|ؙڙĵӓӓӓzzzozzzozhI5CJ\aJh3hI5CJ\aJh3hICJaJh"_hICJaJh+hICJaJhI5>*CJ\aJh"_hI5>*CJ\aJh h 5>*CJ\aJhICJaJh+hI5hI/hq'EhI5CJOJQJaJmH nH sH tH + +-6 $Ifgd q ,$If`,gd qDkdљ$$Iflp*F( t(644 lBa3yt'@g 679;>3*** $Ifgd qkd&$$Iflִ(u J^#p*FaFFF FS FF t(6    44 lBBa3yt'@g>FGSU] $$Ifa$gd q $Ifgd q]^_`a3*** $Ifgd qkd$$Iflִ(u J^#p*FaFFF FS FF t(6    44 lBBa3yt'@gabciku $$Ifa$gd q $Ifgd quvwxyz6---- $Ifgd qkd$$Iflִ(u J^#p*a FS FF t(6    44 lBa3yt'@gz{ $$Ifa$gd q $Ifgd q4$$$]^a$gd qkd$$Ifl ִ(u J^#p*a FS FF t(6    44 lBa3yt'@gږEyz{{|ؙڙxy$ v]^a$gd q$ v]^a$gd q$]^a$gd q$]^a$gd q$ & F 4]a$gdjOPxyabcj\^pqsºvhv\MhEhI5>*CJ\aJhSw5>*CJ\aJhNhn6CJ]aJh' hnCJaJh' hn5CJH*\aJhnCJaJhu/hnCJaJhn5CJ\aJhn5>*CJ\aJhICJaJh~YhI5CJaJh~YhI5CJ\aJhI5CJ\aJh3hICJaJh3hI5CJ\aJ+abcij]^pqrsȟ$ & F v]a$gdj$a$gd q$ v]^a$gd q$]^a$gd q$ & Fi v]a$gdjȟMNstuvwàĠ  ºqqqYqYqOOhdLhdL5PJ/hq'EhdL5CJOJQJaJmH @nH sH @tH /hq'EhdL5CJOJQJaJmH nH sH tH  hulhdLhdLhdL5 hdLhdLhdLh hICJaJhEhICJaJhSwCJaJhEhSwCJaJh3hICJaJhEhI>*CJaJhEhI5>*CJ\aJhI5>*CJ\aJNtvà $$Ifa$gd qFkd$$Iflg#Fq! tq!644 lBaytR $$Ifa$gd q $ a$gd q$ & F v]a$gdjàĠƠȠʠҠӠޠ $Ifgd q ,$If`,gd qFkdL$$Iflg#Fq! tq!644 lBaytR 0''' $Ifgd qkd$$IflִgT /#F+FFFFG FUF tq!6    44 lBBaytR   $$Ifa$gd q $Ifgd q $$Ifa$gd q    0''' $Ifgd qkd$$IflִgT /#F+FFFFG FUF tq!6    44 lBBaytR   !"#@ABJKL]^_cȡɡ͡OPQRS\zǸǢ|ocǪǪǪh3hdL5CJaJh3hdLCJPJaJhNhdL5CJ\aJhNhdLCJPJaJhNhdLCJaJhdLCJaJh3hdL5CJ\aJh h 5>*CJ\aJh3hdLCJaJhdLhdL5PJhdLhdL5/hq'EhdL5CJOJQJaJmH nH sH tH hdL&" $$Ifa$gd q $Ifgd q"#$%&3*** $Ifgd qkd~$$IflִgT /#+FG FUF tq!6    44 lBaytR &'(@BJ $$Ifa$gd q $Ifgd qJKL_3++$a$gd qkdd$$IflִgT /#+FG FUF tq!6    44 lBaytR _ɡQRS\]^iuv$ & F5 ha$gd, $  a$gd q$a$gd q$a$gd q$ & F4 ha$gd,^hizƥǥ23ŧ vz{|٩۩_`hnCJaJhu/hnCJaJhn5CJ\aJhe*hdL5CJH*\aJhe*hdL5CJ\aJhe*hdL5CJaJhehdL5CJ\aJhdL5CJ\aJhdLCJaJh3hdL5CJ\aJh3hdLCJaJ,f`ìĬBuڭ$1$7$8$G$H$a$gd q$ & F6 ha$gd, $  a$gd q$a$gd q$ & F5 ha$gd,«<C]¬ĬABCfgtuv٭ۭڸtgttgtZPFhcCJPJaJhdLCJPJaJhwhdLCJPJaJhEhdLCJPJaJhEhdLCJaJh3hdLCJaJhdLhdLCJaJhdLCJaJhdL5>*CJ\aJhe*hdL5>*CJ\aJhn5>*CJ\aJhNhn6CJ]aJhnCJaJh' hnCJaJhn5CJ\aJh' hn5CJH*\aJۭBCDMPvwxҮӮծ׮ٮ߮ ,-.67Ľ易llbbbbbhdLhc5PJ/hq'Ehc5CJOJQJaJmH @nH sH @tH hc/hq'Ehc5CJOJQJaJmH nH sH tH  hulhchdLhc5h'hc5CJ\aJ hdLhchc5B*CJaJphhchcB*CJaJphhk5B*CJaJph h'hc5B*CJaJph$BCwxJFkd$$Ifl&F' t'644 lBaytc $$Ifa$gd qFkdJ$$Ifl&F' t'644 lBaytc $$Ifa$gd q$1$7$8$G$H$a$gd qǮɮҮ $Ifgd q ,$If`,gd qҮӮծ׮ٮ0''' $Ifgd qkd$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBaytcٮ߮ $$Ifa$gd q $Ifgd q0''' $Ifgd qkd$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBaytc $$Ifa$gd q $Ifgd q3*** $Ifgd qkdޤ$$IflִB Mj+!&< FS FF t'6    44 lBaytc,.6 $$Ifa$gd q $Ifgd q6783$$1$7$8$G$H$a$gd qkdͥ$$IflִB Mj+!&< FS FF t'6    44 lBaytc89:MvկFGHOk<=Ealm gd q $ a$gd q $ a$gd q)$a$gd q)gd q & Fh1$7$8$G$H$^hgdjgd q$ 1$7$8$G$H$gd q 1$7$8$G$H$gd q7:KLM̯ͯԯկEFHOYjkٰڰ<=FN`akԱձJKlmuʻzzz٤rrzzhcCJaJh'hc5CJ\aJhc hc5\h'hc5\ h'hch'hcCJaJhcB*CJaJphh'hcB*CJaJphh'hc5;CJ\aJhc5CJ\aJh h 5>*CJ\aJh'hc5CJaJ(mvϳгسk@h1$7$8$G$H$^h`gd q & Fh1$7$8$G$H$^hgdjgd q$1$7$8$G$H$a$gd q $ a$gd q $ a$gd q gd q $ a$gd qACtvг׳سDEjl?@Hsu$έvvvvhvhvhJFhc5CJH*aJhJFhc5CJaJ hJFhc5B*CJaJphh'hc5CJaJh'hc5;CJaJhJFCJaJhc5CJ\aJh'hc5CJ\aJhcCJaJh'hcCJaJhc5B*CJaJph h'hc5B*CJaJph(I۷,-.45()DO Jv & Fh1$7$8$G$H$^hgdj & Fh^hgdjgd q$a$gd q Dgd q & Fh1$7$8$G$H$^hgdj$,-.5')Dvw࿰աՖ|s|eTeHhg$B*CJaJph h'hc5B*CJaJphhg$5B*CJaJphhJF5CJaJh'hJF5CJaJhNhJF6CJ]aJh' hJFCJaJh' hJF5CJH*\aJh'hJFB*CJaJph"""h'hJFCJaJhu/hJFCJaJhJF5CJ\aJhJFCJaJh'hcCJaJhJFhc5CJaJvw?@t{o $$Ifa$gd qFkd$$Ifl&F' t'644 lBayt $$Ifa$gd q$1$7$8$G$H$a$gd q1$7$8$G$H$`gd q ;1$7$8$G$H$gd q >?@tuʽ˽̽սֽ׽ʿʷkkaaaaahdLha5PJ/hq'Eha5CJOJQJaJmH @nH sH @tH ha/hq'Eha5CJOJQJaJmH nH sH tH  hulha h'ha5B*CJaJphhdLha5ha5CJ\aJh'ha5CJ\aJ hdLha hg$hc5B*CJaJphhahcB*CJaJph#tuwy{ $Ifgd q ,$If`,gd qFkd$$Ifl&F' t'644 lBayt 0''' $Ifgd qkdf$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt $$Ifa$gd q $Ifgd q½0''' $Ifgd qkd[$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt½ýĽʽֽ̽ $$Ifa$gd q $Ifgd qֽ׽ؽٽڽ3*** $Ifgd qkdP$$IflִB Mj+!&< FS FF t'6    44 lBaytڽ۽ܽ $$Ifa$gd q $Ifgd q3$gd q$1$7$8$G$H$a$gd qkd?$$IflִB Mj+!&< FS FF t'6    44 lBaytLMUVgh$&78jl8:PQk;umumuummhaCJaJha5B*CJaJph h'ha5B*CJaJphhc5B*CJaJph h'hc5B*CJaJphh'hcCJaJh'hcB*CJaJphh'hc5;CJ\aJha5CJ\aJh'ha5CJ\aJhahaCJaJ*~LMUh$8 Dgd q$1$7$8$G$H$`a$gd q$1$7$8$G$H$a$gd q$1$7$8$G$H$`a$gd q$1$7$8$G$H$a$gd q 1$7$8$G$H$gd q & F1$7$8$G$H$^gdjZ;$a$gd q  gd q & Fh1$7$8$^hgdjm$ & Fh1$7$8$G$H$^hgdjm$gd q$1$7$8$G$H$a$gd q$1$7$8$G$H$`a$gd qHJCJdȼuf[M[Ah'hc5CJaJhNha6CJ]aJh' haCJaJh' ha5CJH*\aJh'haB*CJaJph"""h'haCJaJhu/haCJaJha5CJ\aJha5CJaJhaha5CJH*aJhaha5CJaJh'ha5CJaJha5;CJaJh'ha5;CJaJh'hcCJaJhaCJaJKEFGHIJKLMNOPQ$1$7$8$G$H$a$gd qgd q Dgd q & Fh^hgdj  & Fh^hgdjgd q  gd qFGXYfhiʹ{mbmZIZB hulh&/ h'h&/5B*CJaJphhdLh&/5h&/5CJ\aJh'h&/5CJ\aJ hdLh&/hcB*CJaJphh&/hcB*CJaJphhg$5B*CJaJphha5B*CJaJph h'hc5B*CJaJphh'hc5CJaJh'hcCJaJhc5CJaJha5CJaJh'ha5CJaJQRSTUVWXi $$Ifa$gd qFkd.$$Ifl&F' t'644 lBayt $$Ifa$gd q$1$7$8$G$H$a$gd q  "$*789@ABMNOXYZwxyùùùùù㪞uj`h'hc5\h'hcCJaJh'hc5;CJ\aJh&/5CJ\aJh h 5>*CJ\aJh'hc5CJaJh&/h&/B*CJaJphhdLh&/5PJhdLh&/5/hq'Eh&/5CJOJQJaJmH @nH sH @tH h&//hq'Eh&/5CJOJQJaJmH nH sH tH   $Ifgd q ,$If`,gd qFkd$$Ifl&F' t'644 lBayt  "$0''' $Ifgd qkdث$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt$*+79A $$Ifa$gd q $Ifgd qABCDE0''' $Ifgd qkdͬ$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBaytEFGMOY $$Ifa$gd q $Ifgd qYZ[\]3*** $Ifgd qkd­$$IflִB Mj+!&< FS FF t'6    44 lBayt]^_wy $$Ifa$gd q $Ifgd q3$$$1$7$8$G$H$a$gd qkd$$IflִB Mj+!&< FS FF t'6    44 lBaytN&; %`gd q%$a$gd q%gd q%$a$gd q %$`a$gd q)$a$gd q)gd q & Fh^hgdjgd q!57^`MNrt򶪶yoy]Nh&/0J&5CJOJQJaJ#h'h&/0J&5CJOJQJaJh'hc5\#h'hc0J&5CJOJQJaJh&/0J&CJOJQJaJ h'hc0J&CJOJQJaJh&/CJOJQJaJh'hcCJOJQJaJh'h&/5CJOJQJaJhc5CJOJQJaJh'hc5CJOJQJaJh&/5CJOJQJaJt &(:;Dqs  68EOQY`lnu|￲￲tth&/CJOJQJaJh'hcCJOJQJaJ h'h&/0J&CJOJQJaJ#h'h&/0J&5CJOJQJaJhc5CJOJQJaJh'hc5CJOJQJaJ#h'hc0J&5CJOJQJaJh&/0J&CJOJQJaJ h'hc0J&CJOJQJaJ-&'\cUW<>Ḫynf[Lfy=h' h(w5CJH*\aJh'h(wB*CJaJph"""h'h(wCJaJh(wCJaJhu/h(wCJaJh(w5CJ\aJh(wh(w0J*5CJaJh(wh(w5CJaJh'h(w5CJaJh'h(w5;CJaJh'hc5CJaJh&/CJOJQJ]aJh'hcCJOJQJ]aJ h'hc0J&CJOJQJaJh&/0J&CJOJQJaJ'C)E\bcVWr,-G|'()  & Fh^hgdj$a$gd q  & Fh^hgdjgd q>r+,-EFG{|&'*8:;fghn˿˳{l`YKh'h 5CJ\aJ hdLh hcB*CJaJphh hcB*CJaJphhg$5B*CJaJph h'hc5B*CJaJphh'hc5;CJaJh'hcCJaJh'hc5CJaJh'h(w5CJaJh(w5CJaJhNh(w6CJ]aJh(wCJaJh' h(wCJaJh(w5CJ\aJ)+;gCFkd$$Ifl&F' t'644 lBayt $$Ifa$gd qHkd$$IflV&F' t'644 lBayt $$Ifa$gd q$1$7$8$G$H$a$gd qgd qnoqt    !*+,IJKSTUfghǯ߉߉߉߉߉~o`h'hc5;CJ\aJh h 5>*CJ\aJh h CJaJhdLh 5PJ/hq'Eh 5CJOJQJaJmH @nH sH @tH h /hq'Eh 5CJOJQJaJmH nH sH tH  hulh h'h 5B*CJaJphhdLh 5h'h 5CJ\aJh 5CJ\aJ# $Ifgd q ,$If`,gd q0''' $Ifgd qkdN$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt   $$Ifa$gd q $Ifgd q0''' $Ifgd qkdC$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt!+ $$Ifa$gd q $Ifgd q+,-./3*** $Ifgd qkd8$$IflִB Mj+!&< FS FF t'6    44 lBayt/01IKS $$Ifa$gd q $Ifgd qSTUh3$gd q$1$7$8$G$H$a$gd qkd'$$IflִB Mj+!&< FS FF t'6    44 lBayth GHIPc#6XYbtgd q'gd q$a$gd q)$a$gd q)$a$gd q)gd q & F h^hgdjhGOPc#56df+-WXYbstHJ­­­­­˜|qiih#CJaJh'h CJaJhcCJaJh CJaJh'h 5CJaJ(hcB*CJaJfHph"""q (h B*CJaJfHph"""q .h'hcB*CJaJfHph"""q h'h 5\ hc5\h'hc5\h'hcCJaJ)ik|~?@Bceõ~vk\vMh' hl5CJH*\aJh'hlB*CJaJph"""h'hlCJaJhlCJaJhu/hlCJaJhl5CJ\aJhl5CJaJhlhl5CJaJh'hl5CJaJh'hl5;CJaJh'hcCJOJQJaJh'h#5\ hc5\h'hc5\h'hcCJaJh#CJaJUpNk}~ABSTn  & Fh^hgdj $`a$gd q$a$gd qgd qh^hgd q  & Fh^hgdj & Fh^hgdjRSTlmnLMN[]^_`ghǾ|ngYMBhW6hW6CJaJhGBhW65CJaJhGBhW65;CJaJ hdLhW6hW65B*CJaJphhg$5B*CJaJph h'hW65B*CJaJphh6v7B*CJaJph"""h'hcCJaJh'hc5CJaJhl5CJaJh'hl5CJaJhlhl5CJaJhNhl6CJ]aJhlCJaJh' hlCJaJM^_ $$Ifa$gd qFkd$$Ifl&F' t'644 lBayt$h$If^ha$gd qm$$1$7$8$G$H$a$gd q  & Fh^hgdj:;<DEFGXYέέέݧg1hGBhW65B*CJaJfHphq 4h h 5>*B*CJaJfHphq hGBhW65CJaJhW6B*CJaJph"""hdLhW65PJhdLhW65/hq'EhW65CJOJQJaJmH @nH sH @tH hW6/hq'EhW65CJOJQJaJmH nH sH tH  hulhW6 $Ifgd q ,$If`,gd qFkdk$$Ifl&F' t'644 lBayt 0''' $Ifgd qkd$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt $$Ifa$gd q $Ifgd q0''' $Ifgd qkd$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt   $$Ifa$gd q $Ifgd q 3*** $Ifgd qkd$$IflִB Mj+!&< FS FF t'6    44 lBayt !":<D $$Ifa$gd q $Ifgd qDEFG3&$a$gd q $h^ha$gd qm$kd$$IflִB Mj+!&< FS FF t'6    44 lBaytGZ&'/[\p24$ & F-DM a$gdjm$$a$gd q$a$gd q $9Da$gd qY'/IZ[p14ĹĹĹĹٹĨj\KK hGBhW65B*CJaJphhg 5B*CJaJph1hW6hW65B*CJaJfHph"""q 1hW6hW65B*CJaJfHphq hW6hW65CJaJ hW6hW65B*CJaJphhGBhW6CJaJhGBhW65CJaJh -5CJaJhGBhW6B*CJaJph.hGBhW6B*CJaJfHphq 5Qop$-DM ^a$gd qm$ $`a$gd q$a$gd q $7$8$H$a$gd q$ & F-DM a$gdjm$$-DM a$gd qmnp .ʻՓzXMMXBhW6hW6CJaJhGBhW6CJaJChGBhW60J+B*CJaJeh@fHphq r@hdLCJPJaJh'hcB*CJaJph"""hNhW66CJ]aJh' hW6CJaJh' hW65CJH*\aJh'hW6B*CJaJph"""h'hW6CJaJhW6CJaJhu/hW6CJaJhW65CJ\aJhGBhW65CJaJ7;8IJmnvj $$Ifa$gd qFkd$$Ifl&F' t'644 lBayt $$Ifa$gd q$1$7$8$G$H$a$gd q $ & F9Da$gdj $9Da$gd q$ hh^ha$gd q ;79FHIJKRSlmn~wi^iVO73737ha /hq'Eha 5CJOJQJaJmH nH sH tH  hulha hdLha 5ha 5;CJaJhGBha 5;CJaJ hdLha ha 5B*CJaJphhg$5B*CJaJph h'ha 5B*CJaJph(ha B*CJaJfHph"""q .hGBhW6B*CJaJfHph"""q .hW6hW6B*CJaJfHph"""q hW6hW6B*CJaJph $Ifgd q ,$If`,gd qFkdݸ$$Ifl&F' t'644 lBayt 0''' $Ifgd qkd2$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt"#$,-.5FGHǽǽǽǽǽϹ~eM.hGBha B*CJaJfHphq 1hGBha 5B*CJaJfHphq 4h h 5>*B*CJaJfHphq hGBha CJaJ(ha B*CJaJfHph"""q ha hdLha 5PJhdLha 5/hq'Eha 5CJOJQJaJmH nH sH tH /hq'Eha 5CJOJQJaJmH @nH sH @tH  $$Ifa$gd q $Ifgd q0''' $Ifgd qkd'$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt $$Ifa$gd q $Ifgd q3*** $Ifgd qkd$$IflִB Mj+!&< FS FF t'6    44 lBayt  "$, $$Ifa$gd q $Ifgd q,-.53+#$a$gd q$a$gd qkd $$IflִB Mj+!&< FS FF t'6    44 lBayt5Hpqz019*e: $ & Fa$gdjm$$a$gd q$a$gd q $9Da$gd qpqz019*ɾѥќќѐzrgXrIh' hs5CJH*\aJh'hsB*CJaJph"""h'hsCJaJhsCJaJhu/hsCJaJhs5CJ\aJhsha 5CJaJhhi5CJaJhhi5;CJaJhGBha 5;CJaJhGBha CJaJhhiCJaJhGBha 5CJaJChGBha 0J+B*CJaJeh@fHphq r@`#%= $$Ifa$gd, $ ga$gd)'a$ & Fh^ha$gdj $9Da$gd q $9D^a$gd q$-DM [$\$a$gd q $`a$gd q$a$gd qZa{"$%=>rs׵xpi\X\XG!h)'a5OJQJ^J_H9mH sH h)'ah)'a5OJQJ^J_H9 hulh)'ahSwh)'a5h)'a5CJ\aJhkCJaJhGBha CJaJ=ha 0J+B*CJaJeh@fHphq r@ChGBha 0J+B*CJaJeh@fHphq r@hW65CJaJhGBha B*ph"""hNhs6]hs h' hs=>rsuwyk^UUUUU $Ifgd, ,$If`,gd,DkdO$$Ifl'F( t(644 lBaPyt, $$Ifa$gd,Dkd$$Ifl'F( t(644 lBaPyt, *kd$$IflִEg{ 'FaFFF FS FF t(6    44 lBBaPyt, $Ifgd, 78klνΫΫΫΧ~rj_S_S_j_S_hBlh)'aCJ\aJhBlh)'aCJaJh)'aCJaJh?Oh)'a>*CJaJh?Oh)'a5>*CJ\aJh h 5>*CJ\aJh3h)'aCJaJh)'a#h)h)'a5CJOJQJ^JaJ!h)'a5OJQJ^J_H9mH sH h)'a5OJQJ^J_H9h)h)'a5OJQJ^J_H9'hnh)'a5OJQJ^J_H9mH sH  $$Ifa$gd,$ $Ifa$gd, $Ifgd,3*** $Ifgd,kd$$IflִEg{ 'FaFFF FS FF t(6    44 lBBaPyt, $$Ifa$gd, $Ifgd,6---- $Ifgd,kd$$IflִEg{ 'a FS FF t(6    44 lBaPyt, $$Ifa$gd, $Ifgd,6,$$a$gd)'a bgd)'akd}$$IflִEg{ 'a FS FF t(6    44 lBaPyt,8l      $ a$gd)'a$a$gd)'a$a$gd)'a$ & Fh^ha$gdj $ a$gd)'aBC?@  .TU!"         G H        ûðhu/h)'aCJaJh)'a5>*CJ\aJh?Oh)'a5>*CJ\aJh#7h)'aCJaJh3??h)'aCJaJh)'aCJaJh3h)'aCJaJh3h)'a5CJ\aJh)'a5CJ\aJh?Oh)'a5CJ\aJh?Oh)'aCJaJ/               $ `   $1$7$8$G$H$a$gd q $ & Fa$gdj $ & Fa$gdj$a$gd)'a$^`a$gd)'a$   X !^`a$gd)'a   6 = W       # $ _ `         ڸҕҕҊyn`YKC< hulhkhdLhk5h}?hk5CJ\aJ hdLhkhk5B*CJaJphh)'ahkCJaJ h)'ahk5B*CJaJphh)'ah)'aCJaJh?Oh)'aCJaJh)'a>*CJaJh?Oh)'a5>*CJ\aJh)'a5>*CJ\aJhNh)'a6CJ]aJh)'aCJaJh' h)'aCJaJh)'a5CJ\aJh' h)'a5CJH*\aJ   YLCC $Ifgd q ,$If`,gd qFkd$$Ifl&F' t'644 lBayt $$Ifa$gd qFkdl$$Ifl&F' t'644 lBayt $$Ifa$gd q 679;=CPQRYZ[fghqrsNOPW.ùùùùù㱦~~~sf~sf~h}?hkCJPJaJhk5CJPJaJh}?hkCJaJh}?hk5CJ\aJh h 5>*CJ\aJhGBhkCJaJhkCJaJhdLhk5PJhdLhk5/hq'Ehk5CJOJQJaJmH @nH sH @tH hk/hq'Ehk5CJOJQJaJmH nH sH tH ( +-6 $Ifgd q679;=0''' $Ifgd qkd$$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt=CDPRZ $$Ifa$gd q $Ifgd qZ[\]^0''' $Ifgd qkd $$IflִB Mj+!&F<FFF FS FF t'6    44 lBBayt^_`fhr $$Ifa$gd q $Ifgd qrstuv3*** $Ifgd qkd$$IflִB Mj+!&< FS FF t'6    44 lBaytvwx $$Ifa$gd q $Ifgd q3++$a$gd qkd$$IflִB Mj+!&< FS FF t'6    44 lBaytDNOPW.7{|$`-DM ^``a$gd q$`-DM ^``a$gd q $7$8$H$a$gd q$ & Fh-DM ^ha$gdj$-DM a$gd q.7F|9;FGeg&ܾ{k_M7?7G7U778888 & Fh^hgdjgd q$a$gd q$a$gd q$a$gd q $7$8$H$a$gd q@0a0b0l0m0x0y0~0000000000-1W1X1p1q1u1v11111111111111111222 222,2-2627282<2@2c2d2z2{222222222222233 3 333;3<3M3T3f3g333333h5CJaJhFnh5CJaJhCJaJhFnhCJaJU3334444,4-4?4@4D4E4I4J4O4P4]4^4a4b4j4k44444444444@5A5B5K5X5Y5f555.6U6V6a6b6i6j6o6p6z6{666666666667 7&7'7=7>7?7D7G7T7U7a7b7777hi35CJaJhi3CJaJh5CJaJhFnh5CJaJhFnhCJaJhCJaJN7777777777777$8%8q8r8z8{88888888888F9G9H9Y9^99999::m;n;p;;;;̻th' h5CJH*\aJh'hB*CJaJph"""h'hCJaJhu/hCJaJh5CJ\aJhCJaJhCJaJh5CJaJhh5CJaJhi35CJaJhFnh5CJaJhFnhCJaJhi3CJaJ-8F9H9Y99999::o;p;;<<<<K=>>?%$ & F>^`>a$gdj%$a$gd q gd q $`a$gd q$a$gd qgd q gd q & Fh^hgdj; <<.<<<<<<<<??*CJaJhhqr5>*CJ\aJh h 5>*CJ\aJh.M5>*CJ\aJ hohqr h{a5hqrhqr5PJhqrhqr5/hq'Ehqr5CJOJQJaJmH nH sH tH /hq'Ehqr5CJOJQJaJmH @nH sH @tH $??????? $$Ifa$gd q $Ifgd q????,## $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aT??????? $$Ifa$gd q $Ifgd q?????/&&& $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT?????? $$Ifa$gd q $Ifgd q???@/''$a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT@@P@@@IAJAKA_A`AAAA'BSBBBC:C|CCCC$ & F |a$gd,$ & F a$gd,$a$gd q$ & F& a$gd, $ a$gd qKA[A\A^ACCCCC7D8D*CJ\aJhqr5>*CJ\aJhqr5CJ\aJh3hqrCJaJhI5CJ\aJh3hqr5CJ\aJCCCC8D9DaDDD'E)EXEYEE|Hkd$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd q $ ga$gd q$ & F ga$gd, $ ha$gd q$a$gd q EEEEEEEEEE $Ifgd q ,$If`,gd qHkd$$IfTl=(F( t(644 lBayt\aT EEEEE/&&& $Ifgd qkdV$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTEEEEEEEEEEEEEEEEE F FFFFF)F*F+FFFFF^G_GGGGGǽǽǽǽ籦|titititit[h4vh4v5CJ\aJhWLh4vCJaJh4vCJaJhh4v>*CJaJhh4v5>*CJ\aJh h 5>*CJ\aJh3h4vCJaJ h4vh4v h{a5h4vh4v5PJh4vh4v5/hq'Eh4v5CJOJQJaJmH @nH sH @tH /hq'Eh4v5CJOJQJaJmH nH sH tH #EEEEEE $$Ifa$gd q $Ifgd qEEEEE/&&& $Ifgd qkdJ$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTEEEEEE $$Ifa$gd q $Ifgd qEEEEE2))) $Ifgd qkd>$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTEEE FFF $$Ifa$gd q $Ifgd qFFF+F2**$a$gd qkd,$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT+F,FFF`GGGGG^HH0II:JJJPKKLLLLL$a$gd q$ & F^ h^ha$gdj  & F^h^hgdj$ & F] a$gdj $ a$gd qGLLLLLLLLL+M,MMMNNSNTNUNWNNNNNNNNNNNNNNrZZ/hq'Eh\a5CJOJQJaJmH @nH sH @tH /hq'Eh{a5CJOJQJaJmH nH sH tH  hoh\a/hq'Eh\a5CJOJQJaJmH nH sH tH h\aCJaJhWLh4vCJaJhRh4vCJaJh3h4vCJaJh4v5>*CJ\aJh h4v5>*CJ\aJh4vCJaJh4vh4vCJaJ LLLL,MMNUNWNNNNHkd$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd q $ ga$gd q$ & F_ ga$gdj$a$gd q NNNNNNNNNN $Ifgd q ,$If`,gd qHkdn$$IfTl=(F( t(644 lBayt\aT NNNNN/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTNNNNNN $$Ifa$gd q $Ifgd qNNNNNNNO O OOOO2O3O4OOOOPOROVOOOOOOO-P2P[P\PPPὮumehCJaJh\aCJaJh_{%h\aCJaJh_{%h_{%CJaJh_{%CJaJh\a5>*CJ\aJh\ah\a5>*CJ\aJh h 5>*CJ\aJh> 5>*CJ\aJ/hq'Eh\a5CJOJQJaJmH nH sH tH  hoh\a h{a5h\ah\a5PJh\ah\a5"NNNNO/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTOOOO OO $$Ifa$gd q $Ifgd qOOOOO2))) $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTOOO2O4OOQORO2&&& $ a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTROOO.P\P]PPPQQJQKQQQRIRKRhR $$Ifa$gd q$ ^a$gd q$ & Fa a$gdj $ a$gd q$ & F` a$gdjPPPPPPQQKQLQQQQQQQRRHRKRLRhRiRRRRRRRRʿطxx`x/hq'Eh{a5CJOJQJaJmH nH sH tH  hoh\a/hq'Eh\a5CJOJQJaJmH nH sH tH (hUh_{%CJ^J aJmH nH sH tH h_{%h_{%CJaJh_{%CJaJh_{%5>*CJaJh_{%h_{%5>*CJaJh_{%CJ\aJh\aCJ\aJh\a5CJaJhh\a5CJaJhRiRRRRRRRR]PGGGG $Ifgd q ,$If`,gd qJkd$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd qJkd$$IfTl=(F( t(644 lBayt\aTRRRR $Ifgd qRRRR,## $Ifgd qkd8$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTRRRRRRRRRRRRRRRRRSSS%S&S'S8S9S;SCSSSTTT7TTTTTǽǽǽǽǽϱwlwlwlwlw`hh\a5CJaJh_{%h_{%CJaJh_{%CJaJh_{%5>*CJ\aJh_{%h_{%5>*CJ\aJh h 5>*CJ\aJh\aCJaJ hoh\a h{a5h\ah\a5PJh\ah\a5/hq'Eh\a5CJOJQJaJmH nH sH tH /hq'Eh\a5CJOJQJaJmH @nH sH @tH $RRRRRRR $$Ifa$gd q $Ifgd qRRRR,## $Ifgd qkd1$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTRRRRRRR $$Ifa$gd q $Ifgd qRRRSS/&&& $Ifgd qkd*$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTSSSSS%S $$Ifa$gd q $Ifgd q%S&S'S:S;S/'''$a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT;SS T3TTT'U(U9U:UsUtUU>VcVVVVV $$Ifa$gd q $^a$gd q $ & Fca$gdj $ a$gd q $ & Fba$gdjTTUU%U&U'U(U9U:UyUUU5V?VCVgVVVVVVVVVV#W$W@Wº˜hPII hoh\a/hq'EhU#5CJOJQJaJmH nH sH tH /hq'Ehn5CJOJQJaJmH nH sH tH /hq'Eh\a5CJOJQJaJmH nH sH tH ,hq'Eh\aCJOJQJaJmH nH sH tH h_{%h_{%CJaJh_{%CJaJh\aCJaJh_{%h_{%5>*CJaJh_{%CJ\aJh\aCJ\aJhh\a5CJaJh\a5CJaJVV#W$W&W(W*W2W3W]PGGGG $Ifgd q ,$If`,gd qJkdn$$IfTl%F! t!644 lBayt.MT $$Ifa$gd qJkd$$IfTl%F! t!644 lBayt.MT3W>W@WIW $Ifgd q@WAWIWJWLWNWPWTWaWbWcWdWeWfWkWlWmWxWyWzWWWWWWWWWWWWWWϰϰϨϨϨȑvg\h qh qCJaJhKHh q5>*CJ\aJh h 5>*CJ\aJh q5>*CJ\aJh_{%CJaJ h{a5h_{%h\a5PJh_{%h\a5/hq'Eh\a5CJOJQJaJmH @nH sH @tH  hoh\a/hq'Eh\a5CJOJQJaJmH nH sH tH /hq'Eh{a5CJOJQJaJmH nH sH tH  IWJWLWNW,## $Ifgd qkd$$IfTlִ' M7%FvFFvF&F FF t!6    44 lBBayt.MTNWPWTWUWaWcWlW $$Ifa$gd q $Ifgd qlWmWnWoW,## $Ifgd qkd$$IfTlִ' M7%FvFFvF&F FF t!6    44 lBBayt.MToWpWqWrWxWzWW $$Ifa$gd q $Ifgd qWWWWW/&&& $Ifgd qkd$$IfTlִ' M7%vv&F FF t!6    44 lBayt.MTWWWWWW $$Ifa$gd q $Ifgd qWWW/# $ a$gd qkd$$IfTlִ' M7%vv&F FF t!6    44 lBayt.MTWWWWWWXXXMX{XXX$Y`YYZZ'ZlZmZZZ$ & F a$gdj$ nb^n`ba$gd q$ & F a$gdj$ ^a$gd qWWXXXXXPXQXXXeYYYYYYZ'ZZZZZZ'[([)[][^[{[|[[[[[[[[[[[[[[[[[[[h@hL_h@5 h3nh@ hL_h@ h@5hL_h@CJaJh+iCJaJh q5>*CJ\aJh qh q5>*CJ\aJhKJCJaJh qh q5CJ\aJh qCJaJh qh qCJaJh.MCJaJ0ZZZZZZZZZZZZZZZZZZZZZZZZ$ v]^a$gd qm$$ ^a$gd q$ & F a$gdjZ([)[][^[`[b[d[l[UIIII $$Ifa$gd qEkd$$Ifl#F" t"44 lBaytn $$Ifa$gd qEkd$$Ifl#F" t"44 lBaytn$$If]^a$gd ql[m[x[z[[ $$Ifa$gd q[[[[[2&&& $$Ifa$gd qkdf$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn[[[[[[ $$Ifa$gd q[[[[[2&&& $$Ifa$gd qkd]$$Iflִ. 9f#FFFF Fc FF| t"    44 lBBaytn[[[[[[ $$Ifa$gd q[[[[[5))) $$Ifa$gd qkdT$$Iflִ. 9f# Fc FF| t"    44 lBaytn[[[[[[ $$Ifa$gd q[[[3*  gd qkdE$$Ifl ִ. 9f# Fc FF| t"    44 lBaytn[[\\#\,\-\k\\ ]']`]a]{]|]]]]]]^e^z^^^^^^_(_6_7_G_H_________%`'`(`˸ítøÀph\ahn5>*CJ\aJhnhn5>*CJ\aJh%yh@CJaJh6wh@CJaJh@CJaJh h@CJaJh~hnCJaJhnCJaJhnhnCJaJhL_hnCJaJhL_hn5>*CJ\aJh h 5>*CJ\aJ+[\\-\m\\\\=]}]]]] ^^_7_H_ ^gd q$ & F W^`Wa$gdj & F W^`Wgdj  gd q$ & F 4]a$gdjm$$]^a$gd qH____`%`'`(`]`^``yHkd:$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd q$ ^a$gd q$ & F 4]a$gdjm$ ^gd q (`+`,`]`^``````````````````````````aaaaaaa/a理理理yqbh h 5>*CJ\aJh+iCJaJh\aCJaJ h{a5h+ih\a5PJh+ih\a5/hq'Eh\a5CJOJQJaJmH @nH sH @tH /hq'Eh{a5CJOJQJaJmH nH sH tH  hoh\a/hq'EhU#5CJOJQJaJmH nH sH tH /hq'Eh\a5CJOJQJaJmH nH sH tH %`````````` $Ifgd q ,$If`,gd qHkd$$IfTl=(F( t(644 lBayt\aT `````/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aT`````` $$Ifa$gd q $Ifgd q`````/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aT`````` $$Ifa$gd q $Ifgd q`````2))) $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT```aaa $$Ifa$gd q $Ifgd qaaaa1a2&&& $ a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aT/a0a2a_ajakaaaaaabbbbkbbbbbbc:cUc\ctccccccccc'd(dDdžŵܔ|d|]|]| hoh\a/hq'EhU#5CJOJQJaJmH nH sH tH /hq'Eh\a5CJOJQJaJmH nH sH tH h\aCJaJh+i5>*CJaJhlovh+i5>*CJaJh+iCJ\aJ hKHhKHhKHhKH5CJaJh*Ih+iCJaJh+iCJaJh+i5>*CJ\aJh*Ih+i5>*CJ\aJ#1a2a^aaabbbbbbcc,cVcuccccc $$Ifa$gd q$ & Fe a$gdj$ ^a$gd q$ & Fd a$gdj $ a$gd qcc'd(d*d,d.d6d7dcVMMMM $Ifgd q ,$If`,gd qHkd$$IfTl=(F( t(644 lBayt\aT $$Ifa$gd qHkd$$IfTl=(F( t(644 lBayt\aT7dBdDdMdNd&kdN$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aT $Ifgd qDdEdMdNdPdRdTdXdedfdgdhdidjdodpdqd|d}d~ddddddddddddddϰϰϨϨϨȑsg_hKCJaJh+i5>*CJ\aJh+ih+i5>*CJ\aJh h 5>*CJ\aJh\aCJaJ h{a5h+ih\a5PJh+ih\a5/hq'Eh\a5CJOJQJaJmH @nH sH @tH  hoh\a/hq'Eh\a5CJOJQJaJmH nH sH tH /hq'Eh{a5CJOJQJaJmH nH sH tH  NdPdRdTdXdYdedgdpd $$Ifa$gd q $Ifgd qpdqdrdsdtd/&&& $Ifgd qkdB$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt\aTtdudvd|d~dd $$Ifa$gd q $Ifgd qddddd2))) $Ifgd qkd6$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTdddddd $$Ifa$gd q $Ifgd qddddd2&&& $ a$gd qkd$$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt\aTdd eeeeffffffffVgngghhhh$ & Fg a$gdj $ ga$gd q $ ga$gd q $ a$gd q$ & Ff a$gdjdeeBede{eeeeee9f:fAf]f^ffffffffffffffTg\gcgogxg}ggggggggghȿȧyynynnnnnnnnhKhKCJaJhK5>*CJ\aJh+ihK5>*CJ\aJh4v5CJ\aJh4vCJaJh\ah\aCJ\aJh+ih+iCJ\aJh+i5CJaJhh\a5CJaJh\a5CJaJh+iCJaJh\aCJaJhKCJaJhKh+iCJaJ+hhhhhhhBhChyhzhhhhhhhhhhhhhhhhhhhhhhiiii{{{{{pdhE]h3??>*CJaJh3h3??CJaJh|th3??5PJh|th3??5/hq'Eh3??5CJOJQJaJmH @nH sH @tH h3??/hq'Eh3??5CJOJQJaJmH nH sH tH h+5CJ\aJhn5CJ\aJh Xw5CJ\aJhK5CJ\aJhKhKCJaJhKCJaJ#hBhChyhzh|h~hhhcVMMM $Ifgd q ,$If`,gd qHkdf$$IfTl=(F( t(644 lBaytTHkd$$IfTl=(F( t(644 lBaytT $$Ifa$gd qhhhhh $Ifgd qhhhhh/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytThhhhhh $$Ifa$gd q $Ifgd qhhhhh/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytThhhhhh $$Ifa$gd q $Ifgd qhhhhh2))) $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytThhhhhi $$Ifa$gd q $Ifgd qiiii2&$a$gd q $^a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBaytTiiiiii`iaiiiSjTjjjjjjjjwm~mmmmm&o.o/oQoppppqMqNqr r rrrrrrjsks·ͷͷͷ©©©©©©©©ͩ©©©’shTh3??5CJ\aJ hTh3??5B*CJaJph"""hTh3??5CJaJh3??5CJ\aJh3h3??5CJ\aJhE]h3??CJaJh3h3??CJaJh3??CJaJhE]h3??>*CJaJhE]h3??5>*CJ\aJh h 5>*CJ\aJ-iiiaiiTjjjjjvmwmm%o&o/o~opppr$ L( h@ `"a$gd q$a$gd q $^a$gd q$ & F' a$gd, $ a$gd q$a$gd qrrrrrksssssssttuuuuv\vvvw$ & F a$gd,$ & F( a$gd, $ a$gd q$a$gd qkssssssttttu^ueuuuuuwww2w3whwiwwwwĹĢėzrgOKOKOKOh|Y/hq'Eh|Y5CJOJQJaJmH nH sH tH hIh|YCJaJh|YCJaJhTh3??5>*CJ\aJhNh3??6CJ]aJh' h3??CJaJh' h3??5CJH*\aJh3??CJaJhu/h3??CJaJh3??5CJ\aJh3??5>*CJ\aJh3h3??CJaJhTh3??5CJaJhTh3??5CJ\aJww2w3whwiwkwRE ,$If`,gd qHkd$$IfTlg+F( t(644 lBayt'@gTHkd~$$IfTlg+F( t(644 lBayt'@gT $$Ifa$gd q$ v]a$gd qkwmwowwwxwwww $Ifgd qwwwww/&&& $Ifgd qkd0$$IfTlִgn  = #+FaFFF FS FF t(6    44 lBBayt'@gTwwwwww $$Ifa$gd q $Ifgd q $$Ifa$gd qwwwwwwwwwwwxxxxxxMyNyOyUyVycyyyzzzzzм|m|^LL^L^LL#h3h|Y5B* CJ\aJphh3h|YB* CJaJphh-lh|YB*CJaJphh-lh|YB* CJaJphhYDh|Y>*CJaJ h|Y5>*B* CJ\aJph&hYDh|Y5>*B* CJ\aJph&h h 5>*B* CJ\aJphh3h|YCJaJ/hq'Eh|Y5CJOJQJaJmH nH sH tH h|Yh|Yh|Y5wwwww/&&& $Ifgd qkd)$$IfTlִgn  = #+FaFFF FS FF t(6    44 lBBayt'@gTwwwwww $$Ifa$gd q $Ifgd qwwwww2))) $Ifgd qkd"$$IfTlִgn  = #+a FS FF t(6    44 lBayt'@gTwwwwww $$Ifa$gd q $Ifgd qwwwxx2***$a$gd qkd$$IfTlִgn  = #+a FS FF t(6    44 lBayt'@gTxaxxyMyNyOyVyzzzE{F{{{{f|g|p|8}9}P}$a$gd q$a$gd q$ & Fm Sa$gdj$ & Fm SS^S`a$gdjzzzD{F{{{{{e|f|g|o|p|||7}9}>}H}N}O}P}Q}}}}}}} ~!~n~o~p~w~iǸ޸Ǹ޸ӡwlahu/h3??CJaJh3??5CJ\aJh3??5>*CJ\aJh|Y5>*CJ\aJ#hh|Y5B* CJ\aJphh|YCJaJhejh|YB* CJaJphh|Y5B* CJ\aJphh|YB* CJaJphh3h|YCJaJ#h3h|Y5B* CJ\aJphh3h|YB* CJaJph$P}Q}}}!~n~o~p~v~w~jk}~ڀۀ $ & Fn a$gdj$a$gd q$ ]a$gd q$ & F8 ]a$gd,$ ]a$gd qik)}ـڀۀ  <=>Hӹ}qbqbqbqbqbqbqbqVhZJ/B* CJaJphh-lh|YB* CJaJphh|YB* CJaJphh82h|YCJaJh|&Eh|YCJaJhb}h|YCJaJh|Y5>*CJ\aJh-lh|Y5>*CJ\aJh3??5>*CJ\aJhNh3??6CJ]aJh' h3??CJaJh' h3??5CJH*\aJh3??5CJ\aJh3??CJaJ >GHkd\$$IfTl=(F( t(644 lBayt'@gTHkd$$IfTl=(F( t(644 lBayt'@gT $$Ifa$gd q $ a$gd q$ & Fn a$gdjDEGILN[\]defqrs|}~ععرررќ~rj_j_jh$hZJ/CJaJhZJ/CJaJh$hZJ/>*CJaJh$hZJ/5>*CJ\aJh h 5>*CJ\aJh3hZJ/CJaJhZJ/hZJ/5PJhZJ/hZJ/5/hq'EhZJ/5CJOJQJaJmH @nH sH @tH  hZJ/hZJ//hq'EhZJ/5CJOJQJaJmH nH sH tH h-lhZJ/B* CJaJph%!#%-.9;D $Ifgd q ,$If`,gd qDEGIL/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gTLNO[]e $$Ifa$gd q $Ifgd q $$Ifa$gd qefghi/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gTijkqs} $$Ifa$gd q $Ifgd q}~2))) $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gT $$Ifa$gd q $Ifgd q2***$a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gTZ[crs|ˆ$a$gd q$a$gd q$ & F a$gd, $ a$gd q'[bcɅʅs{|ևׇstϊЊ׊ɋˋ"ho⽴⩞|h' h?T%CJaJh' h?T%5CJH*\aJh?T%CJaJhu/h?T%CJaJh?T%5CJ\aJhZJ/5CJaJhb}hZJ/5CJaJhZJ/5CJ\aJh3hZJ/5CJ\aJh3hZJ/CJaJhZJ/CJaJh$hZJ/CJaJ,tϊЊ֊׊ʋˋ"݌ތ8oA $$Ifa$gd q $ a$gd q$ & F a$gd,$a$gd q$ & F ha$gd,o݌ތo~ABwxwswswsw[w[wSISIhjvhjv5PJhjvhjv5/hq'Ehjv5CJOJQJaJmH @nH sH @tH hjv/hq'Ehjv5CJOJQJaJmH nH sH tH hjvCJaJhYhZJ/CJaJhZJ/CJaJhb}hZJ/CJaJh3hZJ/CJaJhb}hZJ/>*CJaJhb}hZJ/5>*CJ\aJh?T%5>*CJ\aJh' h?T%CJaJhNh?T%6CJ]aJABwxz|~cVMMMM $Ifgd q ,$If`,gd qHkd$$IfTl=(F( t(644 lBayt'@gT $$Ifa$gd qHkdt$$IfTl=(F( t(644 lBayt'@gT&kd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gT $Ifgd q $$Ifa$gd q $$Ifa$gd q $Ifgd qŽ/&&& $Ifgd qkd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gTʎˎ̎Վ֎׎UX$ IQRS`bǸththththth_hhjv5CJaJhjvhjv5CJaJhjvhjvCJaJh)hjvCJaJh$hjvCJaJhjvCJaJh$hjv>*CJaJh hjv5>*CJ\aJh h 5>*CJ\aJh3hjvCJaJhjvhjv5PJhjvhjv5/hq'Ehjv5CJOJQJaJmH nH sH tH hjv%ŽÎĎʎ̎֎ $$Ifa$gd q $Ifgd q֎׎؎َڎ2))) $Ifgd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gTڎێ܎ $$Ifa$gd q $Ifgd q2***$a$gd qkd$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gTUԏ$ GIQQRiєX˕$ $ & Foa$gdjgd q$a$gd q$ & Fp a$gdj$a$gd qbfi%&(*1#%FH|—ɗ78Iƻug_WLhjvh CJaJh CJaJhjvCJaJhjvhjv5>*CJaJhNha5s6CJ]aJh' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJaJhjv5>*CJaJhjvhjvCJaJhjvhjv5CJ\aJhjvhjv5CJaJhjv5CJaJ$%&'(*01$%|78IؘP $$Ifa$gd q $ a$gd q$ & Fq a$gdj$a$gd qgd q $ a$gd qٙڙ   !&,-.789>VWX`abstuxͺͺ粨粨粨㝍tghQh CJPJaJh 5CJPJaJh(h 5CJPJaJh h 5>*CJPJaJh>5CJPJaJh h 5PJh h 5%h 5OJQJ^JmH @nH sH @tH +hUh 5OJQJ^JmH nH sH tH h /hq'Eh 5CJOJQJaJmH nH sH tH $ٙڙܙޙcVMMMM $Ifgd q ,$If`,gd qHkd4$$IfTl=(F( t(644 lBayt'@gT $$Ifa$gd qHkd$$IfTl=(F( t(644 lBayt'@gT&kd$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gT $Ifgd q    $$Ifa$gd q $$Ifa$gd q $Ifgd q !"#$/&&& $Ifgd qkd|$$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBayt'@gT$%&,.8 $$Ifa$gd q $Ifgd q89:;<2))) $Ifgd qkdp$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gT<=>VX` $$Ifa$gd q $Ifgd q`abu2&& $ a$gd qkd^$$IfTlִB Mj+!=(a FS FF t(6    44 lBayt'@gTu<%'/GIR=@BY $ & Fra$gdjgd q$a$gd q$a$gd q $ a$gd q$ & Fs a$gdjx'/IRBVYɡˡfh/23:,.OQ˥ҥ@Aݻҡti[ihNha5s6CJ]aJh' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJaJh h 5CJH*\aJh h 5CJ\aJh 5CJaJh h CJaJh h 5CJaJhwh CJPJaJh CJPJaJ BƢO1239:-.@ARX $ a$gd q$ & Ft a$gdj$a$gd qgd q & Frgdj $ & Fra$gdjAR§ "%'456=>?JKLUVWtuv~û||tjtjtjtjtj_h>5CJPJaJhO*hO*5PJhO*hO*5/hq'EhO*5CJOJQJaJmH @nH sH @tH hO*/hq'EhO*5CJOJQJaJmH nH sH tH hIhO*CJaJh'@gCJaJh-lhZJ/B* CJaJphhjvCJaJh h CJPJaJh h CJaJh h 5>*CJaJ$§HkdL $$IfTl=(F( t(644 lBaytGT $$Ifa$gd q$ v]a$gd q $ a$gd q $ a$gd q $Ifgd q ,$If`,gd qHkd $$IfTl=(F( t(644 lBaytGT  "%/&&& $Ifgd qkd $$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytGT%'(46> $$Ifa$gd q $Ifgd q $$Ifa$gd q>?@AB/&&& $Ifgd qkd $$IfTlִB Mj+!=(FaFFF FS FF t(6    44 lBBaytGTBCDJLV $$Ifa$gd q $Ifgd qVWXYZ2))) $Ifgd qkd $$IfTlִB Mj+!=(a FS FF t(6    44 lBaytGTZ[\tv~ $$Ifa$gd q $Ifgd q~2&& $ a$gd qkd $$IfTlִB Mj+!=(a FS FF t(6    44 lBaytGT©'Xd&'67;>nopszlnǻǃxmbZmha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJaJhO*5>*CJaJhe5CJ\aJhO*hO*5CJ\aJhO*5CJaJhO*hO*CJaJhO*hO*5CJaJhO*hO*CJPJaJhO*hO*5CJPJaJh,hO*5CJPJaJh h 5>*CJPJaJѨ+]©'WXd&'> & Fugdjgd q$a$gd q$a$gd q $ a$gd q$ & Fv a$gdj:nopqrsyzmnűڲs$ & Fw a$gdj$a$gd q $ a$gd q & Fugdj $ & Fua$gdjű ,ٲڲPQvwڹwohPLPLh~/hq'Eh~5CJOJQJaJmH nH sH tH  hulh~h~h~5h~CJaJh~CJPJaJhO*CJPJaJhO*hO*CJPJaJhO*hO*CJaJhO*hO*5>*CJaJha5s5>*CJaJhNha5s6CJ]aJha5sCJaJh' ha5sCJaJha5s5CJ\aJh' ha5s5CJH*\aJPQSUZMD $Ifgd q ,$If`,gd qDkd $$Iflr(F( t(644 lBaytG $$Ifa$gd qDkd $$Iflr(F( t(644 lBaytG $$Ifa$gd qgd qUW_`kmv $Ifgd qvwy{~3*** $Ifgd qkdb$$Iflִry +H !(FaFFF FS FF t(6    44 lBBaytGwxy{~ҴӴԴܴݴ޴ߴϷϟϗϗϗω~rcTr~h)h~5>*CJ\aJh h 5>*CJ\aJh)h~>*CJaJh3h~CJaJh~h~h~5PJh~h~5/hq'Eha5s5CJOJQJaJmH @nH sH @tH /hq'Eh~5CJOJQJaJmH @nH sH @tH /hq'Eh~5CJOJQJaJmH nH sH tH /hq'Eha5s5CJOJQJaJmH nH sH tH ~ $$Ifa$gd q $Ifgd q3*** $Ifgd qkdW$$Iflִry +H !(FaFFF FS FF t(6    44 lBBaytG $$Ifa$gd q $Ifgd q6---- $Ifgd qkdL$$Iflִry +H !(a FS FF t(6    44 lBaytGҴԴܴ $$Ifa$gd q $Ifgd qܴݴ޴ߴ6....$a$gd qkd;$$Iflִry +H !(a FS FF t(6    44 lBaytGUV;<жҶ./շ޸]^ֹ׹߹BCúĺȺɺʺۺܺlmɻ⯣hlDhlD5CJaJhlDh~5CJaJh&Ph~5CJaJh:h~5CJ\aJh~5CJ\aJh3h~5CJ\aJh3h~CJaJh~CJaJh)h~CJaJ9V<ѶҶַ׷ֹ׹ºúĺܺ$a$gd q$a$gd q$ & Fx a$gdjܺ'Wnopvwjk½}~ʾ˾$ 7^7a$gdlD $7^7a$gdlD $^a$gdlD $ a$gdlD$ & Fy a$gdjmnpvwik½)}~ɾʾ˾OPۿܿ³¨͚ti^iSHhlDhlDCJaJh&hlDCJaJhhlDCJaJh9hlDCJaJh~hlDCJaJh9hlD5>*CJ\aJhlD5>*CJ\aJhNhlD6CJ]aJh' hlDCJaJh' hlD5CJH*\aJhlD5CJ\aJhlDCJaJhu/hlDCJaJhlDhlDhlD5CJaJhlD5CJaJ hlDhlD˾PܿDEzFkd*$$Iflo*F( t(644 lBa2yt~R $$Ifa$gd q7^7gd q$ & Fz nW^n`Wa$gdjDEz{ ߿߿߷߷߷ץ|ti|eh&hHhHCJaJhH5>*\h&5>*\h&h&5>*\h h 5>*\h&h~R5>*\h~R5>*\h~h~R5PJh~h~R5/hq'Eh~R5CJOJQJaJmH @nH sH @tH hUh~R5/hq'Eh~R5CJOJQJaJmH nH sH tH h6u5>*\#z{} $Ifgd q ,$If`,gd qFkd$$Iflo*F( t(644 lBa2yt~R 0''' $Ifgd qkd$$Iflִ't I]#o*FaFFF FS FF t(6    44 lBBa2yt~R $$Ifa$gd q $Ifgd q0''' $Ifgd qkd$$Iflִ't I]#o*FaFFF FS FF t(6    44 lBBa2yt~R $$Ifa$gd q $Ifgd q3*** $Ifgd qkd$$Iflִ't I]#o*a FS FF t(6    44 lBa2yt~R $$Ifa$gd q $Ifgd q 3**W`Wgd qkd$$Iflִ't I]#o*a FS FF t(6    44 lBa2yt~R Dh$tu}KLb$^`a$gd q $^a$gdd9$^`a$gd q & F^`gdj ^`gd q$Msu23:ABIJL`bcFHYZ!õõõêˢõֵ֑zhu/ha5sCJaJh~Rha5s5CJaJht5CJaJh;CJaJhd9CJaJhHhHCJaJhHhH5CJ\aJhHCJaJh&h&CJaJhH5CJ\aJhHh&5CJ\aJ hH5\h&h&5\.bcZ!l'(9:Sgd q$ & F W^`Wa$gdj$ & FW^`Wa$gdj$^`a$gd ql'(9:SV>?tuɾ||d/hq'Eh6u5CJOJQJaJmH nH sH tH h~/hq'Eh~5CJOJQJaJmH nH sH tH  hulh~h6uh~5h~RhQhQCJaJhPCJaJhQhHCJaJhPhHCJaJh~RhH5>*CJaJh' ha5sCJaJhPha5sCJaJha5sCJaJ>?th$W$]&@#$/If`Wa$gd qPkd$$Ifl=(F( t 6@](644 lBayt~R$$]&@#$/Ifa$gd q$W$]&@#$/If`Wa$gd qtuwy{$W$]&@#$/If`Wa$gd qPkd($$Ifl=(F( t 6@](644 lBayt~R 'kd$$IflִB Mj+!=(FaFFF FS FF t 6@](6    44 lBBayt~R$W$]&@#$/If`Wa$gd q$W$]&@#$/If`Wa$gd q"5Ϸϯϯϯϡujcj[h|h~5 h|h~h|h~CJaJh)h~CJaJh~CJaJhbh~5>*h h 5>* h~5h~h6uh~5PJh6uh~5/hq'Eh6u5CJOJQJaJmH @nH sH @tH /hq'Eh~5CJOJQJaJmH nH sH tH /hq'Eh~5CJOJQJaJmH @nH sH @tH "'kd$$IflִB Mj+!=(FaFFF FS FF t 6@](6    44 lBBayt~R$W$]&@#$/If`Wa$gd q$W$]&@#$/If`Wa$gd q*kd$$IflִB Mj+!=(a FS FF t 6@](6    44 lBayt~R$W$]&@#$/If`Wa$gd q$W$]&@#$/If`Wa$gd q* $^a$gd qkd$$IflִB Mj+!=(a FS FF t 6@](6    44 lBayt~RS,.6^`h$ 7^7a$gd q$ 7^7a$gd q$ & F| 7^7`a$gdj 7^7gd q.6`h./~56qrbiζ衖tih' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJaJh6uh~5\h6uh6u5\h8h6u5CJ\aJh8h~5CJ\aJh8h6u5CJaJh8h~CJaJh8h~5CJaJ$.~5q1x$ & F~ 7^7`a$gdj $7^7a$gd q7^7gd q 7^7gd qi01!"$%&'@Avw÷xxxx`x`xXNXNxXh6uh~5PJh6uh~5/hq'Eh~5CJOJQJaJmH @nH sH @tH /hq'Eh~5CJOJQJaJmH nH sH tH ,hq'Eh~CJOJQJaJmH nH sH tH h~h6uh~CJaJh8h~5CJaJh8h~CJaJh8h~5>*CJaJha5s5>*CJaJh' ha5sCJaJhNha5s6CJ]aJ"#$&@AvHkd$$IfTlg+F( t(644 lBaytGT $$Ifa$gd qgd q $ a$gd q$ & F~ 7^7`a$gdjvwy{} $Ifgd qHkd$$IfTlg+F( t(644 lBaytGT /&&& $Ifgd qkdt$$IfTlִgn  = #+FaFFF FS FF t(6    44 lBBaytGT $$Ifa$gd q $Ifgd q $$Ifa$gd q/&&& $Ifgd qkdm$$IfTlִgn  = #+FaFFF FS FF t(6    44 lBBaytGT $$Ifa$gd q $Ifgd qwx/0yEMN`uŶ}o}o}g}o}o}o}o}o}o}heCJaJh3h~5CJ\aJh3h~CJaJh[|h~CJaJh~CJaJh[|h~>*CJaJh[|h~5>*CJ\aJh h 5>*CJ\aJhlD5>*CJ\aJ/hq'Eh~5CJOJQJaJmH nH sH tH h~h6uh~5h6uh~5PJ(2))) $Ifgd qkdf$$IfTlִgn  = #+a FS FF t(6    44 lBaytGT $$Ifa$gd q $Ifgd q2&& $7^7a$gd qkdY$$IfTlִgn  = #+a FS FF t(6    44 lBaytGTxxyDENtu}$ | 7^7a$gd q $7^7a$gd q $7^7a$gd q$ 88^8`a$gdlD$ & F. 88^8`a$gd,$ 7^7a$gd qu|}cdj\^pqyzǼrf[[[h+Fh~CJaJh+Fh~>*CJaJh+Fh~5>*CJ\aJhNha5s6CJ]aJh' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJ\aJhh~5CJaJh~CJaJh3h~CJaJh3h~5CJ\aJUcdj]^pq $7`7a$gd q$a$gd q$V^`Va$gd q$ & F/ hV^`Va$gd,$ h7^7a$gd q $7^7a$gd qzABwl` $$Ifa$gd qJkdL $$IfTl~p*F% t%644 lBayt T$$If^a$gd q 3;^3`;gd q$ h3;^3`;a$gd q$ & F0 h3;^3`;a$gd, @ABwx+ϷݳݳݷqeZh~5CJ\aJhJh~>*CJaJhJh~5>*CJ\aJh h 5>*CJ\aJh 5>*CJ\aJ/hq'EhJ5CJOJQJaJmH nH sH tH h~/hq'Eh~5CJOJQJaJmH nH sH tH  hulh~ hJh~hJh~5hJCJaJh~CJaJhQh~CJaJwxz|~ $Ifgd qJkd $$IfTl~p*F% t%644 lBayt T ,## $Ifgd qkd!$$IfTlִ~(u J^#p*FFFF FS FF t%6    44 lBBayt T $$Ifa$gd q $Ifgd q,## $Ifgd qkd"$$IfTlִ~(u J^#p*FFFF FS FF t%6    44 lBBayt T $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd#$$IfTlִ~(u J^#p* FS FF t%6    44 lBayt T $$Ifa$gd q $Ifgd q/## $`a$gd kd#$$IfTlִ~(u J^#p* FS FF t%6    44 lBayt T_`acj89A78C  $^a$gd $^a$gd $ }^a$gd q$ & F}8^8a$gdj$ }^a$gd q+>]^_abcij9@AIJK4Y8:BCh 9pqRSl+,ȺȺȺhFh~5CJaJhKH5CJ\aJh3h~CJaJh3h~5CJ\aJh~5CJ\aJh|h~5 h|h~h|h~CJaJh~CJaJh)h~CJaJ8kl,Y;$ 77^7a$gd qgd $ 7a$gd q$ & F{ 7^`a$gdj$ & F{^`a$gdj $^a$gd ;O'()lmnpzԲԧߋxmfxm^VNAhJhJ5B*phhJhJ5hJCJaJhJh~5 h|h~h|h~CJaJh~CJaJhb}h~CJaJh4eh~5>*CJaJhNha5s6CJ]aJh' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJha5s5>*CJaJh~5CJaJhQh~5CJaJP)npui $$Ifa$gd qJkd$$$IfTl$)F% t%644 lBayt T$$If^a$gd q $ 7a$gd q$ & F 7`a$gdj 77^7gd q $%0<=Z\defwyz567>?@\ȹsnjX#hzhB*CJOJQJ^JaJphwwwhzh hzh5hL_h" 5CJ\aJhv`h" CJaJh%yh" CJaJh" CJaJhL_h" CJaJhL_h" 5>*CJ\aJh h 5>*CJ\aJh 5>*CJ\aJhJ/hq'EhJ5CJOJQJaJmH nH sH tH  hulhJhJhJ5" $Ifgd qJkdR%$$IfTl$)F% t%644 lBayt T ,## $Ifgd qkd%$$IfTlִ$(u J^#)FFFF FS FF t%6    44 lBBayt T $ $$Ifa$gd q $Ifgd q$%&',## $Ifgd qkd&$$IfTlִ$(u J^#)FFFF FS FF t%6    44 lBBayt T'()*02< $$Ifa$gd q $Ifgd q<=>?@/&&& $Ifgd qkd'$$IfTlִ$(u J^#) FS FF t%6    44 lBayt T@ABZ\d $$Ifa$gd q $Ifgd qdefy/## $7^7a$gd qkd($$IfTlִ$(u J^#) FS FF t%6    44 lBayt Tyz 67?@<F$  7^7a$gdzh$  7^7a$gdzh $7^7a$gdzh $7^7a$gdzh$7[$\$^7a$gdzh $7^7a$gd q$ & F 47^7`a$gdjm$ $7^7a$gd q ;<^%&  !"YZ#&9ٲr`rWh" 5CJaJ"hh" 5CJ\aJmH @sH @hh" 5CJaJmH @sH @hh" 5CJaJh" 5CJ\aJh;Uh" 5CJ\aJhChCCJaJhzhB*CJaJph#hzhB*CJOJQJ^JaJph333hzh5CJaJhChzhCJaJ hzh5hzh5CJ\aJhzhCJaJhzh  "Y9:A45GHYZ$ v7^7a$gd q $7^7a$gd q$ vnn^n`a$gd q$ & F nn^n`a$gdj7-DM ^7gd q$  7^7a$gdzh9:;A35VXGHXY23456ݻݰʢ{ph]hRNhRFhICJaJh" huoeh" CJaJh~h" CJaJh" CJaJhL_h" CJaJhL_h" >*CJaJhL_h" 5>*CJ\aJha5s5>*CJ\aJhNha5s6CJ]aJh' ha5sCJaJh' ha5s5CJH*\aJha5sCJaJhu/ha5sCJaJha5s5CJ\aJh 5CJ\aJh" 5>*CJ\aJ2346ijtGkd)$$IfTl|"&b! tb!644 layt yT $$Ifa$gd y $ a$gd q$  ^a$gd qgd q$ & F v`a$gdjm$ 69=hij%&'(9;òòئhIhI5>*CJ\aJh h 5>*CJ\aJh{3C5>*CJ\aJ!hI5CJOJQJaJmH @sH @)hI5CJOJQJaJmH @nH sH @tH  hI5hI5CJOJQJaJ)hI5CJOJQJaJmH nH sH tH 3 $Ifgd y $Ifgd]Gkd)$$IfTl|"&b! tb!644 layt yT 2))) $Ifgd ykdX*$$IfTlִ{! |"&a&&c&e&&S &"&] tb!6    44 layt yT $$Ifa$gd y $Ifgd y $$Ifa$gd y2))) $Ifgd ykdP+$$IfTlִ{! |"&a&&c&e&&S &"&] tb!6    44 layt yT $$Ifa$gd y $Ifgd y2))) $Ifgd ykdH,$$IfTlִ{! |"&a&&c&e&&S &"&] tb!6    44 layt yT& $$Ifa$gd y $Ifgd y&'(;2)) gdIkd@-$$IfTlִ{! |"&a&&c&e&&S &"&] tb!6    44 layt yT;Idv$'nC D M          4 5 6 7 % & A     ɬއhIh]CJaJhIhI5CJ\aJh]hI5CJaJh]h y5CJaJhI5CJaJhVCJaJhIhI5CJaJh{3C5CJaJhICJaJhIhICJaJmH @sH @hIhICJaJ4;$C D M    % & A  gdI  gdI $ a$gdI $ a$gdI $ a$gdI nnW^n`WgdI & F nnW^n`WgdjA   E     28l)RTgd q  & F gdj gdI gdI & F ^`gdj289lm)*RST׾׏׏׏׏׆}unVRVRVuRVuh~/hq'Eh~5CJOJQJaJmH nH sH tH  hulh~hJh~5h~5CJaJhJ5CJaJh^dCJaJhIh{3C5>*CJaJhIhI5>*CJaJh]5>*CJaJhI5>*CJaJhIhI6CJ]aJhIhICJaJhIhI5CJ\aJhIhI5CJH*\aJ TMDDD $Ifgd qJkd.$$IfTlp*F[# t[#644 lBayt T $$Ifa$gd qJkd8.$$IfTlp*F[# t[#644 lBayt T$$If^a$gd q $Ifgd q,## $Ifgd qkd.$$IfTlִ  +J;^#p*FvFvF*FFF#F t[#6    44 lBBayt T $$Ifa$gd q $$Ifa$gd q $Ifgd q,## $Ifgd qkd/$$IfTlִ  +J;^#p*FvFvF*FFF#F t[#6    44 lBBayt T $$Ifa$gd q $Ifgd q  /&&& $Ifgd qkd0$$IfTlִ  +J;^#p*vv*FF#F t[#6    44 lBayt T "#%hi eg*+^˺zzmcUcmcmcmcmcmhs"hiCJH*_H9aJhiCJ_H9aJhu hiCJ_H9aJhJCJ_H9aJhS6CJ_H9aJhS6hS6CJ_H9aJhJ5>*CJ\_H9aJ!hu hJ5>*CJ\_H9aJ!h h 5>*CJ\_H9aJh~5CJaJ#h)h~5CJOJQJ^JaJ+hUh~5OJQJ^JmH nH sH tH h~     $$Ifa$gd q $Ifgd q/# $ a$gd qkd1$$IfTlִ  +J;^#p*vv*FF#F t[#6    44 lBayt T$%i^`ars v7$8$H$^vgdi$v7$8$H$^va$gdi$ $7^7a$gd q$ 77$8$H$^7a$gd q & F 77$8$H$^7`gdj 77$8$H$^7gd q^  _aps89:;LMNO齯}}}tldl] hulh~hGhG5hGh~5hS65CJaJhx7CJaJhJhx7CJaJhO4khx7CJaJhS6CJ_H9aJhJCJ_H9aJhJ5>*CJ\_H9aJ!hXhJ5>*CJ\_H9aJhu hiCJ_H9aJhihiCJH*_H9aJhiCJ_H9aJhO4khiCJ_H9aJ9;NOqe $$Ifa$gd qJkd2$$IfTlp*Fo$ to$644 lBamyt\T$$If^a$gd q$ 7^7a$gdx7$ & F^`a$gdj$ & F^a$gdjOST㭛|re[eQeQehqHCJ_H9aJhCJ_H9aJhqHhqHCJ_H9aJhGCJ_H9aJ!h h 5>*CJ\_H9aJh\5>*CJ\_H9aJ#h)h~5CJOJQJ^JaJ+hUh~5OJQJ^JmH nH sH tH hGh~5/hq'EhG5CJOJQJaJmH nH sH tH h~/hq'Eh~5CJOJQJaJmH nH sH tH  $Ifgd qJkd3$$IfTlp*Fo$ to$644 lBamyt\T ,## $Ifgd qkdd3$$IfTlִ if#p*FF-FFFD FF  to$6    44 lBBamyt\T $$Ifa$gd q $Ifgd q,## $Ifgd qkdb4$$IfTlִ if#p*FF-FFFD FF  to$6    44 lBBamyt\T $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd`5$$IfTlִ if#p*-FD FF  to$6    44 lBamyt\T $$Ifa$gd q $Ifgd q/"" 7$8$H$^gd qkdX6$$IfTlִ if#p*-FD FF  to$6    44 lBamyt\TTab[\]nom$ & FKnb7$8$H$^n`ba$gd, 77$8$H$^7gd q & F7$8$H$`gdj 7$8$H$gd qUV`ayef  |}Z]mo %/79lu󮗮&hGCJPJ_H9aJmH @nH @sH @tH @,hQhQCJPJ_H9aJmH @nH @sH @tH @hQCJ_H9aJhGCJaJhG5>*CJ\_H9aJ!h(<hG5>*CJ\_H9aJhCJ_H9aJhGCJ_H9aJhyhGCJ_H9aJ-u "#$YZvx·jjjee h[K5/hq'Eh[K5CJOJQJaJmH nH sH tH hG/hq'EhG5CJOJQJaJmH nH sH tH  hulhGhGhG5 hG5 hqH5hEh+CJaJhIh+CJaJhGCJaJ&hGCJPJ_H9aJmH @nH @sH @tH @,hyhGCJPJ_H9aJmH @nH @sH @tH @'m#$Yym $$Ifa$gd qJkdP7$$IfTlp*F$ t$644 lBayt\T$$If^a$gd q $ va$gd q 7$8$H$gd q & FKnb7$8$H$^n`bgd,YZ\^`hitv $Ifgd qJkd7$$IfTlp*F$ t$644 lBayt\T ,## $Ifgd qkd 8$$IfTlִ dg#p*FIFFFFH FF  t$6    44 lBBayt\T $$Ifa$gd q $Ifgd q,## $Ifgd qkd 9$$IfTlִ dg#p*FIFFFFH FF  t$6    44 lBBayt\T $$Ifa$gd q $Ifgd q/&&& $Ifgd qkd:$$IfTlִ dg#p*IFH FF  t$6    44 lBayt\T   ! !h!j!l!M"N"X"Y"Z"\"a"g"v""""""""""Z#[#$$q$r$%%O%R%b%Ƶv!h(<hqH5>*CJ\_H9aJh>2oCJ_H9aJhyhqHCJ_H9aJhqHhqHCJ_H9aJhqHCJ_H9aJ!h h 5>*CJ\_H9aJh\5>*CJ\_H9aJ#h)hG5CJOJQJ^JaJ+hUhG5OJQJ^JmH nH sH tH hG, $$Ifa$gd q $Ifgd q/"" 77$8$H$^7gd qkd;$$IfTlִ dg#p*IFH FF  t$6    44 lBayt\T  !j!l!Y"Z"""""#$P%Q%R%c%d%%%77$8$H$^7`gdG( 77$8$H$^7gd q & F7$8$H$`gdj 7$8$H$gd qb%d%%%%%&&&&&$&,&.&a&b&j&{&~&&&&&&&&&&&&'''߻ҧ|||||qfaYaYR hulh hGh 5 h 5h 5CJ\aJh^ 5CJ\aJ,hyhqHCJPJ_H9aJmH @nH @sH @tH @&hqHCJPJ_H9aJmH @nH @sH @tH @&hXCJPJ_H9aJmH @nH @sH @tH @,hQhXCJPJ_H9aJmH @nH @sH @tH @hyhXCJ_H9aJhXCJ_H9aJhqHCJaJhqH5>*CJ\_H9aJ %&b&&&&''*'k_ $$Ifa$gd qFkd;$$Iflp*F}& t}&644 lBa_yt $$If^a$gd q$ gnb^n`ba$gd q & Fb7$8$H$^`bgdj$ & F87$8$H$^8a$gdj'*'+'P'Q'l'n'q'w'x''''''''''''''''(;(E(((((&)))0)1)6)**㣛yyyyykyyh h 5CJ\aJh CJaJh hG&CJaJh hG&5>*CJ\aJh>2oCJaJh h CJaJ#h)h 5CJOJQJ^JaJ+hUh 5OJQJ^JmH nH sH tH  h 5hGh 5h /hq'Eh 5CJOJQJaJmH nH sH tH &*'+'-'/'1'9':'E'G'P' $Ifgd q $$Ifa$gd qFkdR<$$Iflp*F}& t}&644 lBa_yt P'Q'S'U'W'0''' $Ifgd qkd<$$Iflִ(u J^#p*F5FFF FS FF t}&6    44 lBBa_yt W'_'`'l'n'w' $$Ifa$gd q $Ifgd qw'x'y'z'{'0''' $Ifgd qkd=$$Iflִ(u J^#p*F5FFF FS FF t}&6    44 lBBa_yt {'|'}'''' $$Ifa$gd q $Ifgd q'''''3*** $Ifgd qkd>$$Iflִ(u J^#p*5 FS FF t}&6    44 lBa_yt '''''' $$Ifa$gd q $Ifgd q''''3$ gnb^n`ba$gd qkd?$$Iflִ(u J^#p*5 FS FF t}&6    44 lBa_yt ''<(((')()))0)***+++:-;-C-....g//|00$ gnb^n`ba$gd q$ gnb^n`ba$gd q*****++++,9-;-B-C-I-.....f/g/j/m/////{0|0000000001111222233333333333333Ƽ h'5\ h'5hUh'5 h 5\h h'5\h h 5\h 5CJ\aJh CJaJh hG&CJaJh h 5CJ\aJh hG&5CJ\aJ;000001233334$ gnb$If^n`ba$gd q$ gnb^n`ba$gd q$ gnb^n`ba$gd q 44/4^4_4`41Zkd@$$IfTl0$$?Q t644 layt T$ gnb$If^n`ba$gd qZkd@$$IfTl0$$?Q t644 layt T3 4#4)4,4H4K4y4{4444555566666788'8*9298999Q:X:::::T;X;f;i;;;;;?&?,?ʼʴʼʴʼʼʗʴʌ伌企h5CJ\aJh 5CJ\aJh>2oCJaJh CJ]aJh h CJ]aJh CJaJh h 5CJ\aJh h CJaJhPRh 5>*CJ\aJh>2o5CJ\aJ h'5\h h 5\.`4444441ZkdA$$IfTl0$$?Q t644 layt TZkdZA$$IfTl0$$?Q t644 layt T$ gnb$If^n`ba$gd q4445555666778)9*929Q:::$ g*b^*`ba$gd>2o$ g*b^*`ba$gd>2o$ gnb^n`ba$gd q$ g^a$gd>2o$ gnb^n`ba$gd q:: ;;;;;P<<===H>>??,? @$ & F g^`a$gdj$ & F g8^8a$gdj$ g8^8`a$gd>2o$ & F g8^8a$gdj$ gnb^n`ba$gd q,?@ @@@AADAEAABBBBBBCCCCCCDᄇoWS;/hq'Eh'5CJOJQJaJmH nH sH tH hi/hq'Ehi5CJOJQJaJmH nH sH tH "h hi5CJ\aJmH @sH @hi5CJ\]aJmH @sH @h h>2o5CJ\aJh>2oCJaJh h>2oCJaJh>2oh>2o5CJaJh>2o5CJ\]aJmH @sH @"h'h CJH*]aJmH @sH @h'h CJaJmH @sH @h'h CJ]aJmH @sH @ @@EAABBB-BB&CcCCCC $$Ifa$gd q$ & F g^`a$gdj$ gnb^n`ba$gd>2o$ g^a$gd q$ & F g^`a$gdj CCDD D D DDD!D]TTTTTT $Ifgd qJkdB$$IfTlg)'F" t"644 lBayt~T $$Ifa$gd qJkd,B$$IfTlg)'F" t"644 lBayt~T DDD,D-D/D1D4D6DCDDDEDLDMDNDYDZD[DdDeDfDDDDDDDDDDDDDDDDEEEùùùùù㭜}qhqhqhqhqh~CJ]aJhihiCJ]aJ hPRhPR5>*CJ\]aJhi5>*CJ\]aJ hPRhi5>*CJ\]aJhi5CJ\]aJhIhi5PJhIhi5/hq'Ehi5CJOJQJaJmH @nH sH @tH hi/hq'Ehi5CJOJQJaJmH nH sH tH &!D#D,D-D#kdB$$IfTlִg } j+!)'F*FFFFS FF t"6    44 lBBayt~T $Ifgd q-D/D1D4D6D7DCDEDMD $$Ifa$gd q $$Ifa$gd q $Ifgd qMDNDODPD,## $Ifgd qkdC$$IfTlִg } j+!)'F*FFFFS FF t"6    44 lBBayt~TPDQDRDSDYD[DeD $$Ifa$gd q $Ifgd qeDfDgDhDiD/&&& $Ifgd qkdD$$IfTlִg } j+!)'*FS FF t"6    44 lBayt~TiDjDkDDDD $$Ifa$gd q $Ifgd qDDDD/$ g^a$gd qkdE$$IfTlִg } j+!)'*FS FF t"6    44 lBayt~TDDDEUEEEEEGGGHHHH6I7I?I(J%K&K2K$ g^a$gd q$ & F g`a$gdj$ g^a$gd qEE F FGGHHH6I7I?I%K&KNNNNnQoQpQqQrQ𸪛|j_Qh h$/5CJ\aJh$/5CJ\aJ"h hi5CJ\aJmH @sH @ hihi56CJ\]aJh~hiCJ\]aJh~hi5CJ\]aJh~56CJ\]aJhi56CJ\]aJhi5CJ\]aJhiCJ]aJh~CJ]aJhihiCJ]aJhihi5CJ\]aJ2KLMM]NNNNOSPPoQpQrQQ $$Ifa$gd q$ gnb^n`ba$gd q$ & F gO;^O`;a$gdj$ & F g^a$gdj$ g^a$gd q$ & F g^a$gdjrQQQQQQQQQQQQQQQQQQQRRRRRR-R.R/R7R8R9RJRLRMRʲΚΚΒΒΒzkz`h$/5CJ\aJh h 5>*CJ\aJh$/h$/5CJ\aJhIh$/5PJhIh$/5/hq'Eh$/5CJOJQJaJmH @nH sH @tH /hq'Eh'5CJOJQJaJmH nH sH tH h$//hq'Eh$/5CJOJQJaJmH nH sH tH 2hq'Eh$/5CJOJQJ\aJmH nH sH tH !QQQQQQQQQQ]TTTTTT $Ifgd qJkd2G$$IfTl=(Fg% tg%644 lBaByt$/T $$Ifa$gd qJkdF$$IfTl=(Fg% tg%644 lBaByt$/T QQQQ#kdG$$IfTlִA B7!=(FFFF FS FF tg%6    44 lBBaByt$/T $Ifgd qQQQQQQQQQ $$Ifa$gd q $$Ifa$gd q $Ifgd qQQQQ,## $Ifgd qkdH$$IfTlִA B7!=(FFFF FS FF tg%6    44 lBBaByt$/TQQQQRRR $$Ifa$gd q $Ifgd qRRRRR/&&& $Ifgd qkdI$$IfTlִA B7!=( FS FF tg%6    44 lBaByt$/TRRR-R/R7R $$Ifa$gd q $Ifgd q7R8R9R/$ gnb^n`ba$gd qkdJ$$IfTlִA B7!=( FS FF tg%6    44 lBaByt$/T9RMRNRR SSSSSSTBUGUOUQVVVwW$ gnb^n`ba$gd q$ & F;^`;a$gdj$ & F g]`]a$gdj$ & F ;^`;a$gdj$ gnb^n`ba$gd qMRNRRRSSSS>S?SSSSSSSTTBUGUOUUUVVxWWWWWWWXX3YVYXYZZ'[-[[ɻɰɻɏtiihD5CJ\aJh$/h$/5CJH*\aJhDh$/CJH*aJhDh$/5CJ\aJhDCJaJhDhDCJaJhDh$/CJaJhDhD5CJ\aJh$/h$/5CJ\aJh~CJaJmH @sH @h$/h$/CJaJmH @sH @h$/hPR5CJ\aJ(wWxWWXXX3YYY[Z\ZmZZ}$ & F gnW^n`Wa$gdj$ & F gnW^n`Wa$gdj$ & F gn`a$gdj$ & F gnb^n`ba$gdj$ gnb^n`ba$gd q$ gnb^n`ba$gd q Z'[[[[\^__`````[aa$ & F g]`]a$gdj$ & F ;^`;a$gdj$ gnb^n`ba$gd~$ & F hnW^n`Wa$gdj$ gnb^n`ba$gd q$ g^a$gd q[\\^_````bbbbbbbbbbbbbbb·kgkgkgkOkOkGhIhd5/hq'Ehd5CJOJQJaJmH @nH sH @tH hd/hq'Ehd5CJOJQJaJmH nH sH tH 2hq'Ehd5CJOJQJ\aJmH nH sH tH hd5CJ\aJhDh~CJaJmH @sH @hDh~CJaJh$/h~5CJ\aJh~5CJ\aJhDh$/CJaJhDhDCJaJhDh$/CJaJmH @sH @aabbbbbjJkd|K$$IfTl=(F5" t5"644 lBatyt8IT $$Ifa$gd q$ gnb^n`ba$gd q$ & F ;^`;a$gdj$ & F g]`]a$gdjbbbbbbbbbb $Ifgd qJkdK$$IfTl=(F5" t5"644 lBatyt8IT bbbb,## $Ifgd qkd8L$$IfTlִ$  N:!=(FFsFkFF9 FF t5"6    44 lBBatyt8ITbbbbbbc $$Ifa$gd q $$Ifa$gd q $Ifgd qbbccccccccc:c;coFoGoRo]TTTTTT $Ifgd qJkdP$$IfTl=(F# t#644 lBayt8IT $$Ifa$gd qJkd$P$$IfTl=(F# t#644 lBayt8IT RoTo]o^o#kdP$$IfTlִJf `&r/!=(FFF*FFL FF t#6    44 lBBayt8IT $Ifgd q^o`oboeogohotovo~o $$Ifa$gd q $$Ifa$gd q $Ifgd q~oooo,## $Ifgd qkdQ$$IfTlִJf `&r/!=(FFF*FFL FF t#6    44 lBBayt8ITooooooo $$Ifa$gd q $Ifgd qooooo/&&& $Ifgd qkdR$$IfTlִJf `&r/!=(*FL FF t#6    44 lBayt8IToooooo $$Ifa$gd q $Ifgd qooo/'$a$gd qkdS$$IfTlִJf `&r/!=(*FL FF t#6    44 lBayt8ITooooopp)p*p4p5pJpRpopppqpup|pppppppppppppqqqsʻzoaUhIh3??5CJaJhIh3??5CJ\aJh3h3??CJaJh3??CJaJh .h3??B* CJaJphhYDh3??B*CJaJphhYDh3??B* CJaJphh3??B* CJaJphhrPOh3??B* CJaJphhYDh3??>*CJaJhIh3??CJaJhh)h3??5>*CJ\aJh h 5>*CJ\aJ!ooo'pqpppppqsssvvvGxHxPxmznzz7^7gd q $7^7a$gd q$a$gd q$ & F1 `a$gd,$a$gd q $7^7a$gd qssvvHxnxnzozzzW{Z{a{S|U|v|x||||}g}h}y}}}w~赪zn__PhIh3??B* CJaJphhIh3??5>*CJ\aJh[K5>*CJ\aJhNh[K6CJ]aJh' h[KCJaJh' h[K5CJH*\aJh[KCJaJhu/h[KCJaJh[K5CJ\aJh|Yh3??5CJH*\aJh|Yh3??5CJ\aJhPR5CJ\aJhIh3??CJaJhIh3??5CJaJzz {W{X{Z{`{a{T|U||g}h}y}}} $ a$gd q$ 7^7a$gd q $7^7a$gd q$a$gd q$nW^n`Wa$gd q nb^n`bgd q nb^n`bgd q & Flnb^n`bgdj7^7gd q}!~y~~~~~~TJkdT$$IfTlz=(F$ t$644 lBayt8IT $$Ifa$gd q $7$8$H$a$gd q $ a$gd q $ ga$gd q$ & Fk Sn`a$gdj$ & Fk SnS^S`a$gdj w~x~~~~01PQvwz|~ζzpzpzpzpzphh8ICJaJh|th|t5PJh|th|t5/hq'Eh|t5CJOJQJaJmH @nH sH @tH /hq'EhG5CJOJQJaJmH nH sH tH h|t/hq'Eh|t5CJOJQJaJmH nH sH tH h|tCJaJh3hQCJaJhIh3??B* CJaJphhIh3??B*CJaJph"PQSUW_`kmv $Ifgd qJkd*U$$IfTlz=(F$ t$644 lBayt8IT $$Ifa$gd q vwz|,## $Ifgd qkdU$$IfTlִzS 1 rE!=(F FFFF) FF t$6    44 lBBayt8IT|~ $$Ifa$gd q $Ifgd q,## $Ifgd qkdV$$IfTlִzS 1 rE!=(F FFFF) FF t$6    44 lBBayt8IT $$Ifa$gd q $Ifgd q/&&& $Ifgd qkdW$$IfTlִzS 1 rE!=( F) FF t$6    44 lBayt8IT $$Ifa$gd q $Ifgd q/$77$8$H$]^7a$gd qkd|X$$IfTlִzS 1 rE!=( F) FF t$6    44 lBayt8IT*in(PQRVŁƁȁρЁ?@{DŽȄ?@qfqfqffqfqfqfqffh3hoCJaJh3ho5CJ\aJho5CJ\aJhRho5CJ\aJhRhoCJaJhRhRCJaJhRCJaJhohoCJaJhoCJaJhPR5>*CJ\aJho5>*CJ\aJhoho5>*CJ\aJh h 5>*CJ\aJ(jRƁǁȁЁz{Ȅ_`$7]^7a$gd q$7]^7a$gd q$ & FOn7$8$H$]^n`a$gdj$77$8$H$]^7a$gd qghdžȆ`oƇLJ!"Ả‹]^mȍɍ͍΍ύލߍacj\^ܸƭ{h[KCJaJhu/h[KCJaJh[K5CJ\aJhRCJaJh-hR5CJaJh3hRCJaJh-hR5CJ\aJh3hR5CJ\aJhoCJaJhR5CJ\aJh3ho5CJ\aJh3hoCJaJ,"lmȍɍߍ6Ў%abcij$ & FN n]^n`a$gdj$7]^7a$gd q$7]^7a$gd qj]^pt, $$Ifa$gd q $^a$gd q$ & FP V7$8$H$]^`Va$gdj$77$8$H$]^7a$gd q$7]^7a$gd q pst{+-ڼҭ|qqqqqqf[h3hoCJaJh3hRCJaJhohRCJaJhRhR>*CJaJhRhRCJaJhRhR5CJ\aJhR5>*CJ\aJhohR5>*CJ\aJhRCJaJhNh[K6CJ]aJh[KCJaJh' h[KCJaJh[K5CJ\aJh' h[K5CJH*\aJғӓ(*,02<>@VXZ^lnp”竡竡竡{qdqdqhqHhqHCJ_H9aJhqHCJ_H9aJ!h h 5>*CJ\_H9aJh3hoCJaJ h2.5 hK[k5h|th2.5PJh|th2.5/hq'Eh2.5CJOJQJaJmH @nH sH @tH /hq'EhG5CJOJQJaJmH nH sH tH h2./hq'Eh2.5CJOJQJaJmH nH sH tH 'ғӓՓדٓ]TTTTTT $Ifgd qJkdY$$IfTl=(F$ t$644 lBa!yt`T $$Ifa$gd qJkdtY$$IfTl=(F$ t$644 lBa!yt`T #kd0Z$$IfTlִ3y Mj+!=(F~FvFFFS FF t$6    44 lBBa!yt`T $Ifgd q(,> $$Ifa$gd q $Ifgd q>@BD,## $Ifgd qkd.[$$IfTlִ3y Mj+!=(F~FvFFFS FF t$6    44 lBBa!yt`TDFHJVZn $$Ifa$gd q $Ifgd qnprtv/&&& $Ifgd qkd,\$$IfTlִ3y Mj+!=(~vFS FF t$6    44 lBa!yt`Tvxz $$Ifa$gd q $Ifgd q”/# $^a$gd qkd$]$$IfTlִ3y Mj+!=(~vFS FF t$6    44 lBa!yt`T”*+Ζϖ,Z[PT $7$8$H$a$gd q & FW7$8$H$^`WgdjW7$8$H$^`Wgd q 7$8$H$gd q)*+–Ö͖ΖIRYZ͗Ηtu OƙǙTUǚȚɚʚϚٚ},hQhzCJPJ_H9aJmH @nH @sH @tH @hyhzCJ_H9aJhzCJ_H9aJhqHCJaJhqH5>*CJ\_H9aJ!h(<hqH5>*CJ\_H9aJhCJ_H9aJhqHCJ_H9aJhyhqHCJ_H9aJhqHhqHCJ_H9aJ,Tɚ_ΛϛiJkd^$$IfTl=(F% t%644 lBayt7T $$Ifa$gd q 7$8$H$gd qW7$8$H$^`Wgd q & F*W7$8$H$^*`Wgdj$ & F7$8$H$a$gdj 03]^_`~Λϛ,-024:GHIKLQRS^_uumc^Ymcm h#5 h{5h|th#5PJh|th#5/hq'Eh#5CJOJQJaJmH @nH sH @tH h#/hq'Eh#5CJOJQJaJmH nH sH tH h#CJaJh2.CJaJh(<CJaJ,hyhqHCJPJ_H9aJmH @nH @sH @tH @&hqHCJPJ_H9aJmH @nH @sH @tH @&hzCJPJ_H9aJmH @nH @sH @tH @"   ", $Ifgd qJkdz^$$IfTl=(F% t%644 lBayt7T ,-02,## $Ifgd qkd^$$IfTlִO Mj+!=(F*FvFF.FS FF t%6    44 lBBayt7T24:;GIR $$Ifa$gd q $Ifgd qRSTU,## $Ifgd qkd_$$IfTlִO Mj+!=(F*FvFF.FS FF t%6    44 lBBayt7TUVWX^`j $$Ifa$gd q $Ifgd q_`bijk45ij}}}mcVcL}hz2CJ_H9aJhxhxCJ_H9aJhxCJ_H9aJhxhx5CJ\_H9aJh#CJ_H9aJhS6h#CJ_H9aJh#5>*CJ\_H9aJ!hu h#5>*CJ\_H9aJ!h h 5>*CJ\_H9aJh2.CJaJ/hq'Eh#5CJOJQJaJmH nH sH tH h#h|th#5 h{5h|th#5PJjklmn/&&& $Ifgd qkd`$$IfTlִO Mj+!=(*v.FS FF t%6    44 lBayt7Tnop $$Ifa$gd q $Ifgd q/&&& 7$8$H$gd qkda$$IfTlִO Mj+!=(*v.FS FF t%6    44 lBayt7T5b$a$gd q$ $a$gd q $7$8$H$a$gd q$L7$8$H$`La$gd q & FL7$8$H$`Lgdj 7$8$H$gd qɞabs՟bՄքڄ;<4bkuڹڹگږ}hZn#hxCJaJhxh?CJ_H9aJh;tCJ_H9aJhu h[KCJ_H9aJUhxCJ_H9aJh[KCJ_H9aJhu h{CJ_H9aJh{CJ_H9aJhu h#CJ_H9aJh#CJ_H9aJh#h#CJH*_H9aJ-o will be responsible for internal evaluation and interaction with the industry/place of training. Internal evaluation will be carried out four times in semester. The final report should be in a prescribed format. The final internal evaluation will be done by a Committee consisting of three teachers from different specialization to be constituted by the Chairperson of the department. The basis of evaluation will primarily be the technical knowledge and exposure of the student towards different processes and the functioning of the organization along with the presentation to demonstrate his/her learning. Internal supervisor will be assigned 2 periods per week load. Course Outcomes: After completing the course the students will have: An ability to apply knowledge of mathematics, science, and engineering. An ability to design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability An ability to function on multidisciplinary teams and to identify, formulate, and solve engineering problems. An understanding of professional and ethical responsibility.     B. Tech. 3rd semester to 8th semester CSE: Approved in 15th meeting of Academic Council held on 14.08.2020. applicable to all students admitted in 2018-19 & onwards and trailing students.  PAGE \* MERGEFORMAT 98 B. Tech. 3rd semester to 8th semester CSE: Approved in 15th meeting of Academic Council held on 14.08.2020. applicable to all students admitted in 2018-19 & onwards and trailing students.  PAGE \* MERGEFORMAT 99 . 123FLˆÈňƈȈɈˈ̈ΈψЈш҈ӈԈވ Rֽɽֽ{{{sisisishL9hs6H*hL9hs6hEhO}hujhuUhwhh(QCJaJhwhha@CJaJh(Bh(QCJaJh(Bh#CJ_H9aJhS6h#5CJaJhS6h#CJ_H9aJh#CJ_H9aJh#5>*CJ\_H9aJ!hXh#5>*CJ\_H9aJ'3ˆĈňLjȈʈˈ͈Έψgd+_$ W^`Wa$gd q {d]{gd"$ & F $W7$8$H$^`Wa$gdj$ & F $W^`Wa$gdj$ & F $W^`Wa$gdjψЈш҈ӈԈo$ W^`Wa$gd q ^gd"$a$gdsRq͉ω1Popپ٭hwhh(QCJaJ h"CJ hu h'U6hL9hs6H*hEhO}hh'UmHnHuh jh UhL9hs6 hO}6!D 00&P 1+:pmh. A! "E#$8%0 2(>&P 1+:pj. A! "$#$%0 (>&P 1+:pj. A! "$#$%0 (A 0&P 1+:pj. A!"#$%0 (>&P 1+:pj. A!"#$%0 (>&P 1+:p58. A!"#$%0 (>&P 1+:pL. A!"#$%0 >&10:p. A!"#$% >&P 1+:pj. A!"t#$%0 %>&P 1+:pj. A!"#$%0 (>&P 1+:pj. A!"#$%0 (>&P 1+:pP. A!"#$%0 *>&P 1+:pG. A!"#$%0 (DdJ&D  3 @@"? 7Dd ` @ %&b  s >A?Picture 5Rj6SCOeF6b F>6SCOeJFIFddtFile source: http://en.wikipedia.org/wiki/File:Deenbandhu_Chhotu_Ram_University_of_Science_and_Technology_logo.jpgC   %# , #&')*)-0-(0%()(C   (((((((((((((((((((((((((((((((((((((((((((((((((((A!1AQa"q2BR#b$36rt&4s1!1"AQaq2#3B ?((jAji fo4T*@PPPPPPPVX;i}E-[ 'k>7PFwm:q )##٩T@1f5n㲠ZcIWB~B11ުJK193tcw)"CILie=z̞Y*2Ph3P7"É(M*p9V3SMM%=Zơ7cG6ZHZs)lj'dk .z,E{EMN9i37R+N;Zigy[A3r&_YLh%%疥J wNz 8O\/iI&]l2A*Sjܧ-VyJ{_*ThZPʰ\ /X2sd+PX0rS;* ` 0X@I1P^g"-ivZJT><_G鱬*o*8@u-XuVI p'WIEe6ݭ4j"?1mb&/x 1q6-%)HR2R$i_8Q;xKZU:쨑#{:|My Fz4oз*G/ӸS\!^j*['xG?5Y n%:WLԺ1:[q%:XYUmxek!O8xpz׵Q[v=kAJG( }qP6FXe+)''bwڱy3V@}>֥`9~v#<G׉N;X)' iZ\?2ߙIDU4M v$]eŮ&+̤\.rdl-<돬ַEc e!$c_;=|w.mwD'w*g{j 1浅%q[ҵ0}v>%Lh xb$1uOԅ"H]bҤX5Zӥ=9$e 8GQ⮮jk([V^Վk9#ǸAej֟tJY#nwMetKI@=^[I۵"n9>Mqкe-ajd8!>?r*XW ¡tmU%p'`LWn6 ~E:,]ܸTqg,4+`4ȅ#Jt 4#6 ?z\k+2vb(ʵ1q q B FALuZnZa'ddVIL;- T[J|+c_JN+q( /Ul\+KnxwO}瑮[XY\9][I.Qymru5nEsNkiGFc+qЯaΜ^N,V;qVvv{SM/xO'd[|3jHquaݸ>㝐qOY =~|u>N"4۷^ @ZԚEU*md[eN<.mo P9`䰰B I_"jMaϩm&c($-;m`;:f?}eiq)+IPTTExWRy>;㘮g D83Y "bFFou#h<+jpxFA؁~Uz({8$}raRpl^'dl/Jnk/>frs^[Y6fCvM(֛?æ< n!jJPTGpkg8ˆwDnp\ -Ge#*Z.9&nwZ^WX[ͺxd-'VyڿHU+3"Ԩĺˉ BrPkM<2oTnmJk2m[ԣ:٢^<$V} .JT]E|%ԡ ZpaV|?:*Ϯ_t (g1-(dRnqgbyWkr ^MS[۬D4>&8J87Vs1UF\0_kH4O<0d69K+rj\\^I-$#)'|?z`y耠 ֖WY5$iP ‡k► %aIzNv<yK$5ϕ\՟Meh,ŝ |OoL'<['\{zKر,`|\Ktgb'Vd{CI!vˇZ RS?ucF D0W^a0r;j't%^*jQxg-P;+='[+,ppTK;UQG .d:'.ɒ߸Yܞ¸W]3oꈯQtqɍ#WkJ\G $U;QҪE4ؑEv,PwS´,d(VP{^+;7}fRu,{ywߞjz;~u}Xگ#Ձy5T4Z^?F} ?ElUPz4v93"]ACG#n] fJHdj;8qÒ AA8;=%NlV] uݚa\j[vC8–F ҹ\z_[).:yܤtqip>N/5îIN6:|S _G7rc!yn1ީ a婯ts.pM GM2KojJr8mv1ҳ۫:[R=/ܲFRFgbU5Т*Ӟ9|ěh XjrOPGzN &?3gVQYA}RCR}!LKqy8;cOA΁`ʗtf5Mky\F;Z@9I*w%WҸ|/5-nT͌ X-[C$`~`N+XB6hSTRA=k+ )hiȷ^?{jpb縮DM ) d(\L(]Fqs{ O 96t#(25A^H!u%-**yĐp~qW& '@BxG"G/'ϊ/áLƞ<{->ݝl<ڟ?N*I HRHRO":./M<3,W-Qn'+^I-D%TC5e)畄#Y=WkhiOlRUI+\@YO m]B}[jo0$2X3`Õw+6s?`(Fkzo˵ p^.QSٶ{j͞[FN7aqe/v"6x0\=?S]6e jI q`t3|%w?/:,g5]m5ר?hM-W3Y^~ 3D}~8@MڤCwiufRq XRvIV3sVoz?х!_v>j +~˒O ?u_M>E)ܢA}Ҷ2EqgӉzd7sYL~ edp VmɊ#GԦ>_Gs.:췞R*D}Վ[F=^x-7` sU5~$' SsblKokʉnpyDckvS*;c>+euι$iq+UҴ()'%]^:bcNo&R."[U.|m6ߋʦ:g8ڴj|8Eұ6\e|eEx # t*a+;@ڮ!T<:#]]&g}N ;~~ %χJJT>f~TKi>\iahXTEb|'O3#tODO/=- 6ڤN{f:T tT;YUus\=>NŖuͲpQtziʵɶ1QXC*o1tèĘVv7ߗUҎX+>싕mJmk;U{5IIǭ@$)# 6zu( əPw \6S V!KS˟J-ୠ(<ŘxVBC@R7[!{-jlH)s9[(騒a*G;!Vz2o#IgeIiNmLŌz{R-ma[ ha)I=I\9Y~0q q(qcq^Ec؏AnYm: 6>GqX^Ŕq:l&U%(18<N. 6éP??_B #ܓCPZg8>|N/ʊ('pjrN@\< fcCN;}J!cT0;Z#jҫU ^LmHPZ*Vq3֊S\2nE-M7Da ǯZi5n/d= m;{d}Q%J[daH=H+uQn]lz޵Dh`(I}q$d$~%g'(# ҭ#4چz.5qcfRM0kc֐@Cj()]P!D`0<]ܱcQñm w+(; <VTFy-,!‚N65+mZ4eZҗ%@nB@5(((5Z.Z鵨WxxU<(Y_b|QqvMÚ4N!ǐ 㙪Tc=t=St_O8 h+w%joc؝ک$ A]m$d8pThab#@1t!2BP[BylABV +&_;e".s|tr{Ѳ[5EzyWv]#r>8N\uxs\Nt2ByX_] Q_IOGOUqҀ٬y`a!HQx:(,OMR\_Ve>in meg9vTWIBCUl[o>j%`H% ) % rAUJ9c6*( \ZPN X~͑ܩy[$^:k1/cbfc7HNZG5VKs/I%}o 9neHn:vp:z-Z_Q@v*#gYWi]?eTmݕ918?Ƕ+ЋמJi1oQ$]65-vq!|({UE.oͪcR%U2ȹ Da$.%8\i@,:I=3N;v ,vfىl;D|oz#Ovز>Yҡ+(iіXX.S&A k;d!,28}}ZutV 0tb +}3Wv]JיtXG#P[0 0v{Erjvxq.jW+,uʂ}s q_KDԣS.y@&\Z2K1SI~YNV;WD.2笵@(g5B@:^'Hi8pu'nh*lܟN ?Uaۣ)K(⹭dr hj3HRJF9,.Nsǯk$n6d Dc$M[ȹjÓEӋc2nɇ^!-(%X@c45v?rkvȽI6$;ClXJ*s]/ Y~;p#KcL٠Xĵ!>H>ܺq,vIFD%xoo"z?#̺,s}ì4͙JARFs GkU:WPCԖvn ^m_ii5SYDYK,&Ky+ϼʔ9Uo- */Se#?TD0Ny}{VzҖB24i'%߇T1{+28O^ !nMTʚM>ۜJ<~ʧZ[bޫؠk%Wy#%~*ذ`G#MZ&bBπ{kز`Ցop}MuM:avI;^! -QZs\k>K*\'kvkƭȲT[ d u2KI8z7Po{|֓䆋iZx9ZtuS2h`Hk96۬* *7'ҭfG?ğ$WdmK-'!@+Zy RP'37N(e;W[5ѪmPJ"LU2^H9.J-3TI ,'c]XEyq138`* $w'~e]``o CvcJ8eq9 IVX٤j ܽa|IZBqr*>Q&S7HʵDO2SK=fJ 2uRؙU<%cj3Yw]J ߻-CJp5xxuuƵ 7@RA jFS.K mǏzU7SV eaerydŻxVڶ ۚϥ|L=,o+\y'r~d~80h%1m'rOkmPZ뉽h)6%Bݓ?UT8q/7u "u(^B'תOp} jDmEcn0FPnP(,0.#ɴ]%cv=T0L$HۭDQ#*O\P˝SvyY! kjV{Lxldr5E1Jih[Arq [8)H<9=Qss#QY qJp+qϵcS?ץl}P ̕p']CQ% _i[4v$I $t('8Ԟu~T{ꄋ[EGHu`}j~xd?餫u3]-[0^@œ F'ǐ4b$v؊e†HJR;+FPTך2 ? rgx>dǺJڣb#Wi6^ꖖ#!)Ҹ7h atf/>\S)iLEv___GKPYem6Km!(B@JRtOfcڀ( R֚ѪR\}4a2CvWXrՓw/Oy;tVjW|~ LkJ bQ%@rryRⱷ"ZaD. 1#9 U''5= 0YS!kRBF2z#|th$7Ʈ%C's\S@PPPPPPx$$If"!v h55555*5T5v5*5 #v#v#v#v#v*#vT#vv#v*#v :V 4Q>&+++++++, 55555*5T5v5*5 / /  / / / 4 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 4'>&+++++ + + , 55555h5v5*55 5 v5 *5 / /  / / 4 a"ytv%$kd*9$$If4'   xVPJt"R&hv*v*>&000044 a"ytv%\$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / 4 a"ytv%!kd<$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / / /  / / /  /  4 a"ytv%!kd@$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kd~D$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 6>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kdoH$$If6   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kd`L$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kdQP$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kdBT$$If2   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V >&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kd3X$$If   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V >&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"ytv%!kd$\$$If   xVPJt"R&hv*v*>&000044 a"ytv%$$If"!v h5 55h5v5*555v5 *5 #v #v#vh#vv#v*#v#v#vv#v *#v :V >&, 5 55h5v5*555v5 *5 / / /  / / /  / / / 4 a"ytv%r$$If"!v h55555*5T5v5*5 #v#v#v#v#v*#vT#vv#v*#v :V 4Q>&+++++++55555*5T5v5*5 / /  / / / 4 a"ytU$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 4'>&+++++ + + 55555h5v5*55 5 v5 *5 / /  / / 4 a"ytU$kd+c$$If4'   xVPJt"R&   hv * v * >&000044 a"ytU\$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / 4 a"yt0!kdf$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / / /  / / /  /  4 a"yt0!kdzj$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kdyn$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 6>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kdjr$$If6   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kd[v$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kdLz$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V 2>&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kd=~$$If2   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V >&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kd.$$If   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h55555h5v5*55 5 v5 *5 #v#v#v#v#vh#vv#v*#v#v #v v#v *#v :V >&, 55555h5v5*55 5 v5 *5 / / /  / /  / /  /  /  4 a"yt0!kd$$If   xVPJt"R&hv*v*>&000044 a"yt0$$If"!v h5 55h5v5*555v5 *5 #v #v#vh#vv#v*#v#v#vv#v *#v :V >&, 5 55h5v5*555v5 *5 / / /  / / /  / / / 4 a"yt0K$$If"!v h5525} 55 5M555 #v#v2#v} #v#v #vM#v#v#v :V 4E0 '+++5525} 55 5M555 4 a"ytUkd$$If4E P= !$'``2`}  M0 '$$$$44 a"ytU$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 4E0 '+++5525} 555 515 5 5 5 4 a"ytUrkd$$If4E  P!= !$'  2 }  10 '000044 a"ytUs$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V %0 ', 5525} 555 515 5 5 5 4 a"ytY]okd$$If%  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 20 ', 5525} 555 515 5 5 5 4 a"ytY]okdܖ$$If2  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 20 ', 5525} 555 515 5 5 5 4 a"ytY]okdš$$If2  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 0 ', 5525} 555 515 5 5 5 4 a"ytY]okd$$If  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 20 ', 5525} 555 515 5 5 5 4 a"ytY]okd$$If2  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V 20 ', 5525} 555 515 5 5 5 4 a"ytY]okdt$$If2  P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V  0 ', 5525} 555 515 5 5 5 4 a"ytY]okdZ$$If   P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V  0 ', 5525} 555 515 5 5 5 4 a"ytY]okd@$$If   P!= !$'2}  10 '000044 a"ytY]s$$If"!v h5525} 5555 515 5 5 5 #v#v2#v} #v#v#v #v1#v #v #v #v :V  0 ', 5525} 555 515 5 5 5 4 a"ytY]okd&$$If   P!= !$'2}  10 '000044 a"ytY]G$$If"!v h5<5555 51555 5 #v<#v#v#v #v1#v#v#v #v :V  0 ', 5<555 51555 5 4 a"ytY]#kd $$If  P!= !$'< 10 '((((44 a"ytY]$$If"!vh5='#v=':V E0='5='4 a"ytY]_$$If"!v h55555 555,5 y#v#v#v#v#v #v#v#v,#v y:V 4E0='+++++++55555 555,5 y4 a"ytY]kd$$If4E 3+ #Q'```` ``,`y0='$$$$44 a"ytY]$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V 4E0='+++++ + + 555555 55 75 5 ,5 y4 a"ytY]rkdh$$If4E  3+ #Q'     7  , y0='000044 a"ytY]$$If"!vh5='#v=':V E0='5='4 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V  0=', 555555 55 75 5 ,5 y4 a"ytY]okd$$If   3+ #Q' 7,y0='000044 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V U0=', 555555 55 75 5 ,5 y4 a"ytY]okd$$IfU  3+ #Q' 7,y0='000044 a"ytY]$$If"!vh5='#v=':V U0=',5='4 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V U0=', 555555 55 75 5 ,5 y4 a"ytY]okdY$$IfU  3+ #Q' 7,y0='000044 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V U0=', 555555 55 75 5 ,5 y4 a"ytY]okd?$$IfU  3+ #Q' 7,y0='000044 a"ytY]$$If"!vh5='#v=':V U0=',5='4 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V U0=', 555555 55 75 5 ,5 y4 a"ytY]okd$$IfU  3+ #Q' 7,y0='000044 a"ytY]s$$If"!v h5555555 55 75 5 ,5 y#v#v#v#v#v#v #v#v 7#v #v ,#v y:V U0=', 555555 55 75 5 ,5 y4 a"ytY]okd$$IfU  3+ #Q' 7,y0='000044 a"ytY]A$$If"!v h55555 55755 ,5 y#v#v#v#v #v#v7#v#v ,#v y:V U0='5555 55755 ,5 y4 a"ytY]#kd$$IfU + #Q' 7,y0='((((44 a"ytY]$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l  t065J555ytU_$$If"!v h555 55+5A5V55 #v#v#v #v#v+#vA#vV#v#v :V 40_'+++++++555 55+5A5V55 4 a"ytgkd$$If4 T-&Q #s'``` `+A`V``0_'$$$$44 a"ytg$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 40_'+++++ + + 555 555+55 T5 V5 5 4 a"ytgrkda$$If4  T-Ie&Q> #s'     +T V  0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 0_', 555 555+55 T5 V5 5 4 a"ytgokdj$$If  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 0_', 555 555+55 T5 V5 5 4 a"ytgokdP$$If  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 0_', 555 555+55 T5 V5 5 4 a"ytgokd6$$If  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 0_', 555 555+55 T5 V5 5 4 a"ytgokd$$If  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 20_', 555 555+55 T5 V5 5 4 a"ytgokd$$If2  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V 20_', 555 555+55 T5 V5 5 4 a"ytgokd$$If2  T-Ie&Q> #s' +TV0_'000044 a"ytgs$$If"!v h555 5555+55 T5 V5 5 #v#v#v #v#v#v+#v#v T#v V#v #v :V  0_', 555 555+55 T5 V5 5 4 a"ytgokd$$If   T-Ie&Q> #s' +TV0_'000044 a"ytgG$$If"!v h55555+55T5v5 5 #v#v#v#v+#v#vT#vv#v #v :V  0_', 5555+55T5v5 5 4 a"ytg#kd$$If  -Ie&Q>!#s'+Tv0_'((((44 a"ytg$$If"!vh5 '#v ':V E0 '5 '4 a"ytg_$$If"!v h555j 5}55555 #v#v#vj #v}#v#v#v#v#v :V 4E0 '+++++++555j 5}55555 4 a"ytgkd$$If4E 3 {#'```j }````0 '$$$$44 a"ytg$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V 4E0 '+++++ + + 555j 55555 75 5 5 4 a"ytgrkd $$If4E  3F0} {#'   j  7   0 '000044 a"ytg$$If"!vh5 '#v ':V E0 '5 '4 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V  0 ', 555j 55555 75 5 5 4 a"ytgokd$$If   3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd$$IfU  3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokdp$$IfU  3F0} {#'j 70 '000044 a"ytg$$If"!vh5 '#v ':V U0 ',5 '4 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd$$IfU  3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd$$IfU  3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd#$$IfU  3F0} {#'j 70 '000044 a"ytg$$If"!vh5 '#v ':V U0 ',5 '4 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd*($$IfU  3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd,$$IfU  3F0} {#'j 70 '000044 a"ytgs$$If"!v h555j 555555 75 5 5 #v#v#vj #v#v#v#v#v 7#v #v #v :V U0 ', 555j 55555 75 5 5 4 a"ytgokd/$$IfU  3F0} {#'j 70 '000044 a"ytgG$$If"!v h5555555755 5 #v#v#v#v#v#v7#v#v #v :V U0 ', 555555755 5 4 a"ytg#kd3$$IfU F0} {#'70 '((((44 a"ytg$$If!vh5J5h55#vJ#vh#v#v:V l t05J5h55ytg$$If!vh5J5h55#vJ#vh#v#v:V l t05J5h55ytg$$If!vh5J5h55#vJ#vh#v#v:V l t05J5h55ytg$$If!vh5J5h55#vJ#vh#v#v:V l t05J5h55ytg$$If!vh5I555#vI#v#v#v:V l t065I55I5ytU$$If!vh5I555#vI#v#v#v:V l t065I55I5ytU$$If!vh5I555#vI#v#v#v:V l t065I55I5ytU$$If!vh5I555#vI#v#v#v:V l t065I55I5ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh5J555#vJ#v#v#v:V l t065J555ytU$$If!vh55x#v#vx:V : t0C'55x4 :pytUT7$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V : t0C'5v55i5v55p4 :p<ytUT7$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V : t0C'5v55i5v55p4 :p<ytUT7$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V : t0C'5v55i5v55p4 :p<ytUT7$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V : t0C'5v55i5v55p4 :p<ytUT7$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V : t0C'5v55i5v55p4 :p<ytUT[$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V :4 t0C'+++5v55i5v55p/ 4 :p<ytUTi$$If!vh5v55i5v55p#vv#v#vi#vv#v#vp:V :4 t0C'+++5v55i5v55p/ / 4 :p<ytUTv$$If!v h55E555R55v555 #v#vE#v#v#vR#v#vv#v5#v :V 4F0%(+++++++55E555R55v555 44i44a"ytgkdJ$$If4F Fu $'``E``R`v`5`0%($$$$44i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V 4F0%(+++++ + + 55E55555R5S5 75 v5 55 44i44a"ytgkdM$$If4F  F>u $'  E  RS7 v 5 0%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kdQ$$If   F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kdU$$If   F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kdZ$$If   F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V 0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kd+^$$If  F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kdDb$$If   F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kd]f$$If   F>u $'ERS7v50%(000044i44a"ytg$$If!v h55E55555R5S5 75 v5 55 #v#vE#v#v#v#v#vR#vS#v 7#v v#v 5#v :V  0%(, 55E55555R5S5 75 v5 55 44i44a"ytg}kdvj$$If   F>u $'ERS7v50%(000044i44a"ytgl$$If!v h5V5555R5S575v5 55 #vV#v#v#v#vR#vS#v7#vv#v 5#v :V 0%(, 5V5555R5S575v5 55 44i44a"yt*11kdn$$If >u $'VRS7v50%(((((44i44a"yt*1$$If"!vh5&#v&:V E0&5&4 a"ytg_$$If"!v h55555 55755 #v#v#v#v#v #v#v7#v#v :V 4E0&+++++++55555 55755 4 a"ytgkdr$$If4E 3+ "&```` `7``0&$$$$44 a"ytg$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V 4E0&+++++ + + 555555 55 75 5 4 a"ytgrkdv$$If4E  3+ "&     7 7  0&000044 a"ytg$$If"!vh5&#v&:V E0&5&4 a"ytge$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V  0&, 555555 55 75 5 4 a"yt*1okdz$$If   3+ "& 770&000044 a"yt*1e$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V U0&, 555555 55 75 5 4 a"yt*1okd|~$$IfU  3+ "& 770&000044 a"yt*1$$If"!vh5&#v&:V U0&,5&4 a"yt*1e$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V U0&, 555555 55 75 5 4 a"yt*1okd$$IfU  3+ "& 770&000044 a"yt*1e$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V U0&, 555555 55 75 5 4 a"yt*1okd$$IfU  3+ "& 770&000044 a"yt*1$$If"!vh5&#v&:V U0&,5&4 a"yt*1e$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V U0&, 555555 55 75 5 4 a"yt*1okd&$$IfU  3+ "& 770&000044 a"yt*1e$$If"!v h5555555 55 75 75 5 #v#v#v#v#v#v #v#v 7#v #v :V U0&, 555555 55 75 5 4 a"yt*1okd$$IfU  3+ "& 770&000044 a"yt*19$$If"!v h55555 557575 5 #v#v#v#v #v#v7#v #v :V U0&, 5555 5575 5 4 a"yt*1#kd֒$$IfU + "& 770&((((44 a"yt*1$$If!vh5) 5. 5#v) #v. #v:V l t 6`05) 5. 5/ yt*1 $$If!vh5M555355 #vM#v#v#v3#v#v :V l, t 6`05M555355 / yt*1$$If!vh5M555355 #vM#v#v#v3#v#v :V l t 6`05M555355 yt*1$$If!vh5M555355 #vM#v#v#v3#v#v :V l t 6`05M555355 yt*1$$If!vh5M555355 #vM#v#v#v3#v#v :V l t 6`05M555355 yt*1$$If!vh5M555355 #vM#v#v#v3#v#v :V l t 6`05M555355 yt*1$$If!vh5%#v%:V : t0%,5%4 :p yt&T$$If!vh5v55#vv#v#v:V : t0%,5v554 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v554 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v554 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v554 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v554 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v55/ 4 :pyt&T$$If!vh5v55#vv#v#v:V : t0%,5v55/ / 4 :pyt&Tv$$If!v h55E555 55555 #v#vE#v#v#v #v#v#v5#v :V 4F0&+++++++55E555 55555 44i44a"ytUkdƢ$$If4F FVX #&``E`` ``5`0&$$$$44i44a"ytU$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V 4F0&+++++ + + 55E55555 5%5 v5 5 55 44i44a"ytUkdN$$If4F  FVX #&  E   %v  5 0&000044i44a"ytU$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V  0&, 55E55555 5%5 v5 5 55 44i44a"yt*1}kd$$If   FVX #&E %v50&000044i44a"yt*1$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V  0&, 55E55555 5%5 v5 5 55 44i44a"yt*1}kd$$If   FVX #&E %v50&000044i44a"yt*1$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V 4\0&+, 55E55555 5%5 v5 5 55 /  44i44a"yt*1kd$$If4\  FVX #&`E %v50&000044i44a"yt*1$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V 40&+, 55E55555 5%5 v5 5 55 /  44i44a"yt*1kd$$If4  FVX #& E %v50&000044i44a"yt*1$$If!v h55E55555 5%5 v5 5 55 #v#vE#v#v#v#v#v #v%#v v#v #v 5#v :V 0&55E55555 5%5 v5 5 55 /  44i44a"yt T}kd $$If  FVX #&E %v50&000044i44a"yt Tl$$If!v h55555 5%5v55 55 #v#v#v#v#v #v%#vv#v#v 5#v :V 0&, 55555 5%5v55 55 44i44a"yt*11kdA$$If VX #& %v50&((((44i44a"yt*1l$$If!v h55555 5%5v55 55 #v#v#v#v#v #v%#vv#v#v 5#v :V 0&, 55555 5%5v55 55 44i44a"yt*11kd$$If VX #& %v50&((((44i44a"yt*1$$If!v h5}55555555 5 #v}#v#v #v :V 065}55 5 ytT!kd$$IfT &<R h ~}06((((44 laytT$$If!v h5}55555555 5 #v}#v#v #v :V 065}55 5 ytT!kd$$IfT &<R h ~}06((((44 laytT$$If!v h5}55555555 5 #v}#v#v #v :V 065}55 5 ytT!kd$$IfT &<R h ~}06((((44 laytT$$If!v h5}55555555 5 #v}#v#v #v :V 065}55 5 ytT!kd$$IfT &<R h ~}06((((44 laytTX$IfK$L$c!vh5$#v$:V l t$65$aytjTX$IfK$L$c!vh5$#v$:V l t$65$aytjT$IfK$L$c!vh55 5 55& 5| 5(5F#v#v #v #v#v& #v| #v(#vF:V l t$65 5 5 55; 5 5 5JaytjT$IfK$L$c!vh55 5 55& 5| 5(5F#v#v #v #v#v& #v| #v(#vF:V l t$65 5 5 55; 5 5 5JaytjT$IfK$L$c!vh55 5 55& 5| 5(5F#v#v #v #v#v& #v| #v(#vF:V l t$65 5 5 55; 5 5 5JaytjT$IfK$L$c!vh55 5 55& 5| 5(5F#v#v #v #v#v& #v| #v(#vF:V l t$65 5 5 55; 5 5 5JaytjTU$$If!vh5&#v&:V l$ t65&aytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjT$$If!vh55 5 555 5(5F#v#v #v #v#v#v #v(#vF:V l t$655 5 555 5(5FaytjTQ$$If!vh5!#v!:V l t65N!aytjTQ$$If!vh5!#v!:V l t65N!aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjTU$$If!vh5$#v$:V l t$65$aytjTU$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 55% 5{ 5(5H#v#v #v #v#v% #v{ #v(#vH:V l t$655 5 558 5 55JaytjT$$If!vh55 5 55% 5{ 5(5H#v#v #v #v#v% #v{ #v(#vH:V l t$655 5 558 5 55JaytjT$$If!vh55 5 55% 5{ 5(5H#v#v #v #v#v% #v{ #v(#vH:V l t$655 5 558 5 55JaytjT$$If!vh55 5 55% 5{ 5(5H#v#v #v #v#v% #v{ #v(#vH:V l t$655 5 558 5 55JaytjTQ$$If!vh5!#v!:V l t65N!aytjTQ$$If!vh5!#v!:V l t65N!aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjT$$If!vh55555K5{ 5(5#v#v#v#vK#v{ #v(#v:V l t65555K5{ 5 5aytjTV$$If!vh5I##vI#:V l t65I#aytjTV$$If!vh5I##vI#:V l t65I#aytjT$$If!vh55555}5 5(5*#v#v#v#v}#v #v(#v*:V l t65555}5 5(5*aytjT$$If!vh55555}5 5(5*#v#v#v#v}#v #v(#v*:V l t65555}5 5(5*aytjT$$If!vh55555}5 5(5*#v#v#v#v}#v #v(#v*:V l t65555}5 5(5*aytjT$$If!vh55555}5 5(5*#v#v#v#v}#v #v(#v*:V l t65555}5 5(5*aytjTV$$If!vh5I##vI#:V l t65I#aytjTV$$If!vh5I##vI#:V l t65I#aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjTV$$If!vh5"#v":V l t65"aytjTV$$If!vh5"#v":V l t65"aytjT$$If!vh55555K5{ 5(55#v#v#v#vK#v{ #v(#v5:V l t65555K5{ 5(55aytjT$$If!vh55555K5{ 5(55#v#v#v#vK#v{ #v(#v5:V l t65555K5{ 5(55aytjT$$If!vh55555K5{ 5(55#v#v#v#vK#v{ #v(#v5:V l t65555K5{ 5(55aytjT$$If!vh55555K5{ 5(55#v#v#v#vK#v{ #v(#v5:V l t65555K5{ 5(55aytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5I#v#v #v #v#v#v #v(#vI:V l t$655 5 555 5(5IaytjT$$If!vh55 5 555 5(5I#v#v #v #v#v#v #v(#vI:V l t$655 5 555 5(5IaytjT$$If!vh55 5 555 5(5I#v#v #v #v#v#v #v(#vI:V l t$655 5 555 5(5IaytjT$$If!vh55 5 555 5(5I#v#v #v #v#v#v #v(#vI:V l t$655 5 555 5(5IaytjTV$$If!vh5I##vI#:V l t65I#aytjTV$$If!vh5I##vI#:V l t65I#aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjT$$If!vh555555n 5(5*#v#v#v#v#vn #v(#v*:V l t655555n 5(5*aytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjTZ$$If!vh5$#v$:V l t$65$aytjTZ$$If!vh5$#v$:V l t$65$aytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjT$$If!vh55 5 555 5(5H#v#v #v #v#v#v #v(#vH:V l t$655 5 555 5(5HaytjTV$$If!vh5I##vI#:V l t65I#aytjTV$$If!vh5I##vI#:V l t65I#aytjT$$If!vh555555 5(5*#v#v#v#v#v #v(#v*:V l t655555 5(5*aytjT$$If!vh555555 5(5*#v#v#v#v#v #v(#v*:V l t655555 5(5*aytjT$$If!vh555555 5(5*#v#v#v#v#v #v(#v*:V l t655555 5(5*aytjT$$If!vh555555 5(5*#v#v#v#v#v #v(#v*:V l t655555 5(5*aytjTV$$If!vh5G$#vG$:V l t65G$aytjTV$$If!vh5G$#vG$:V l t65G$aytjT$$If!vh5555550 5(5(#v#v#v#v#v0 #v(#v(:V l t6555550 5(5(aytjT$$If!vh5555550 5(5(#v#v#v#v#v0 #v(#v(:V l t6555550 5(5(aytjT$$If!vh5555550 5(5(#v#v#v#v#v0 #v(#v(:V l t6555550 5(5(aytjT$$If!vh5555550 5(5(#v#v#v#v#v0 #v(#v(:V l t6555550 5(5(aytjTV$$If!vh5I##vI#:V l t65I#aytjTV$$If!vh5I##vI#:V l t65I#aytjT$$If!vh5555550 5(5*#v#v#v#v#v0 #v(#v*:V l t6555550 5(5*aytjT$$If!vh5555550 5(5*#v#v#v#v#v0 #v(#v*:V l t6555550 5(5*aytjT$$If!vh5555550 5(5*#v#v#v#v#v0 #v(#v*:V l t6555550 5(5*aytjT$$If!vh5555550 5(5*#v#v#v#v#v0 #v(#v*:V l t6555550 5(5*aytjTR$$If!vh5(#v(:V l t(65(BytPVTR$$If!vh5(#v(:V l t(65(BytPVT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytPVT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytPVT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytPVT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytPVTR$$If!vh5(#v(:V l t(65(Byt+`TR$$If!vh5(#v(:V l t(65(Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`TR$$If!vh5(#v(:V l t(65(Byt+`TR$$If!vh5(#v(:V l t(65(Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`TR$$If!vh5(#v(:V l t(65(Byt+`TR$$If!vh5(#v(:V l t(65(Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`TU$IfK$L$l!vh5(#v(:V l t(65(Byt+`TU$IfK$L$l!vh5(#v(:V l t(65(Byt+`T$IfK$L$l!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$IfK$L$l!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$IfK$L$l!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T$IfK$L$l!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`TW$$If!vh5)#v):V l t)65)Byt3 YTR$$If!vh5(#v(:V l t(65(BytMpTR$$If!vh5(#v(:V l t(65(BytMpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytMpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytMpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytMpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytMpTV$$If!vh5(#v(:V l t(65(Byt~MTR$$If!vh5(#v(:V l t(65(Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt+`T[$$If!vh5(#v(:V l. t(65(Byt~MTW$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTW$$If!vh5(#v(:V l t(65(ByttTW$$If!vh5(#v(:V l t(65(ByttT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByttT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByttT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55ByttT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55ByttTR$$If!vh5(#v(:V l t(65(BytQTR$$If!vh5(#v(:V l t(65(BytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytQTR$$If!vh5(#v(:V l t(65(BytQTR$$If!vh5(#v(:V l t(65(BytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytQT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytQTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTR$$If!vh5(#v(:V l t(65(BytpTR$$If!vh5(#v(:V l t(65(BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytpTS$$If!vh5(#v(:V l t(65(BaytpS$$If!vh5(#v(:V l t(65(Baytp$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytp$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytp$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Baytp$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaytpY$$If<!vh5#v:V l t5Ba<yt 1TY$$If<!vh5#v:V l t5Ba<yt 1T$$If<!vh5X55555S 5o5#vX#v#v#v#v#vS #vo#v:V l t5X55555S 5o5BBa<yt 1T$$If<!vh5X55555S 5o5#vX#v#v#v#v#vS #vo#v:V l t5X55555S 5o5BBa<yt 1T$$If<!vh5X55555S 5o5#vX#v#v#v#v#vS #vo#v:V l t5X55555S 5o5Ba<yt 1T$$If<!vh5X55555S 5o5#vX#v#v#v#v#vS #vo#v:V l t5X55555S 5o5Ba<yt 1TU$$If!vh5$#v$:V l t$5$Bayt2U$$If!vh5$#v$:V l t$5$Bayt2$$If!vh5a555 565 55#va#v#v#v #v6#v #v#v:V l t$5a555 565 55BBayt2$$If!vh5a555 565 55#va#v#v#v #v6#v #v#v:V l t$5a555 565 55BBayt2$$If!vh5a555 565 55#va#v#v#v #v6#v #v#v:V l t$5a555 565 55Bayt2$$If!vh5a555 565 55#va#v#v#v #v6#v #v#v:V l t$5a555 565 55Bayt2R$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTU$$If!vh5"#v":V l t"5"BaytnU$$If!vh5"#v":V l t"5"Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l  t"5555 55c 55|BaytnU$$If!vh5"#v":V l t"5"BaytnU$$If!vh5"#v":V l t"5"Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l  t"5555 55c 55|BaytnS$$If3!vh5(#v(:V l t(65(Ba3yt'@gS$$If3!vh5(#v(:V l t(65(Ba3yt'@g$$If3!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBa3yt'@g$$If3!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBa3yt'@g$$If3!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Ba3yt'@g$$If3!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l  t(65a555 55S 55Ba3yt'@gX$$If!vh5q!#vq!:V l tq!65q!BaytR X$$If!vh5q!#vq!:V l tq!65q!BaytR $$If!vh5+55555G 5U5 #v+#v#v#v#vG #vU#v :V l tq!65+5555G 5U5 BBaytR $$If!vh5+55555G 5U5 #v+#v#v#v#vG #vU#v :V l tq!65+5555G 5U5 BBaytR $$If!vh5+55555G 5U5 #v+#v#v#v#vG #vU#v :V l tq!65+5555G 5U5 BaytR $$If!vh5+55555G 5U5 #v+#v#v#v#vG #vU#v :V l tq!65+5555G 5U5 BaytR S$$If!vh5'#v':V l t'65'BytcS$$If!vh5'#v':V l t'65'Bytc$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BBytc$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BBytc$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Bytc$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytcS$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytS$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytW$$If!vh5'#v':V lV t'65'Byt S$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytS$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytS$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytS$$IfP!vh5(#v(:V l t(65(BaPyt,S$$IfP!vh5(#v(:V l t(65(BaPyt,$$IfP!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaPyt,$$IfP!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaPyt,$$IfP!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaPyt,$$IfP!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaPyt,S$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Bytr$$If!vh5"#v":V   t65"22 l4 BytEdHTn$$If!vh5"#v":V t65"22 l4 BytEdHT$$If!vh55555H5b 55#v#v#v#vH#vb #v#v:V t65555H5b 5522 l4 BytEdHT$$If!vh55555H5b 55#v#v#v#vH#vb #v#v:V t65555H5b 5522 l4 BytEdHT$$If!vh55555H5b 55#v#v#v#vH#vb #v#v:V t65555H5b 5522 l4 BytEdHT$$If!vh55555H5b 55#v#v#v#vH#vb #v#v:V t65555H5b 5522 l4 BytEdHTS$$If!vh5'#v':V l t'65'BytS$$If!vh5'#v':V l t'65'Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BByt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55Byt$$If!vh5<555 55S 55#v<#v#v#v #v#vS #v#v:V l t'65<555 55S 55BytW$$If!vh5(#v(:V l t(65(Byt\aTW$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTW$$If!vh5(#v(:V l t(65(Byt\aTW$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT\$$If!vh5!#v!:V l t!65!Bayt.MT\$$If!vh5!#v!:V l t!65!Bayt.MT$$If!vh5v55v5&55 55#vv#v#vv#v&#v#v #v#v:V l t!65v55v5&55 55BBayt.MT$$If!vh5v55v5&55 55#vv#v#vv#v&#v#v #v#v:V l t!65v55v5&55 55BBayt.MT$$If!vh5v55v5&55 55#vv#v#vv#v&#v#v #v#v:V l t!65v55v5&55 55Bayt.MT$$If!vh5v55v5&55 55#vv#v#vv#v&#v#v #v#v:V l t!65v55v5&55 55Bayt.MTU$$If!vh5"#v":V l t"5"BaytnU$$If!vh5"#v":V l t"5"Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|BBaytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l t"5555 55c 55|Baytn$$If!vh5555 55c 55|#v#v#v#v #v#vc #v#v|:V l  t"5555 55c 55|BaytnR$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aTR$$If!vh5(#v(:V l t(65(Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt\aTR$$If!vh5(#v(:V l t(65(BytTR$$If!vh5(#v(:V l t(65(BytT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytTW$$If!vh5(#v(:V l t(65(Bayt'@gTW$$If!vh5(#v(:V l t(65(Bayt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBayt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBayt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Bayt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Bayt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gTR$$If!vh5(#v(:V l t(65(Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BByt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Byt'@gTR$$If!vh5(#v(:V l t(65(BytGTR$$If!vh5(#v(:V l t(65(BytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BytGTS$$If!vh5(#v(:V l t(65(BaytGS$$If!vh5(#v(:V l t(65(BaytG$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytG$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytG$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaytG$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaytGX$$If2!vh5(#v(:V l t(65(Ba2yt~RX$$If2!vh5(#v(:V l t(65(Ba2yt~R$$If2!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBa2yt~R$$If2!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBa2yt~R$$If2!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Ba2yt~R$$If2!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55Ba2yt~Rl$$If!vh5(#v(:V l t 6@](6,5(Byt~Rl$$If!vh5(#v(:V l t 6@](6,5(Byt~R $$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t 6@](6,5a555 55S 55BByt~R $$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t 6@](6,5a555 55S 55BByt~R$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t 6@](6,5a555 55S 55Byt~R$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t 6@](6,5a555 55S 55Byt~RW$$If!vh5(#v(:V l t(65(BaytGTW$$If!vh5(#v(:V l t(65(BaytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BBaytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaytGT$$If!vh5a555 55S 55#va#v#v#v #v#vS #v#v:V l t(65a555 55S 55BaytGT\$$If!vh5%#v%:V l t%65%Bayt T\$$If!vh5%#v%:V l t%65%Bayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55BBayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55BBayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55Bayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55Bayt T\$$If!vh5%#v%:V l t%65%Bayt T\$$If!vh5%#v%:V l t%65%Bayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55BBayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55BBayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55Bayt T$$If!vh5555 55S 55#v#v#v#v #v#vS #v#v:V l t%65555 55S 55Bayt T\$$If!vh5b!#vb!:V l tb!65b!9ayt yT\$$If!vh5b!#vb!:V l tb!65b!9ayt yT$$If!vh5a55c5e55S 5"5]#va#v#vc#ve#v#vS #v"#v]:V l tb!65a55c5e55S 5"5]9ayt yT$$If!vh5a55c5e55S 5"5]#va#v#vc#ve#v#vS #v"#v]:V l tb!65a55c5e55S 5"5]9ayt yT$$If!vh5a55c5e55S 5"5]#va#v#vc#ve#v#vS #v"#v]:V l tb!65a55c5e55S 5"5]9ayt yT$$If!vh5a55c5e55S 5"5]#va#v#vc#ve#v#vS #v"#v]:V l tb!65a55c5e55S 5"5]9ayt yT\$$If!vh5[##v[#:V l t[#65[#Bayt T\$$If!vh5[##v[#:V l t[#65[#Bayt T$$If!vh5v5v5*5555#5#vv#v*#v#v#v#v##v:V l t[#65v5*5555#5BBayt T$$If!vh5v5v5*5555#5#vv#v*#v#v#v#v##v:V l t[#65v5*5555#5BBayt T$$If!vh5v5v5*5555#5#vv#v*#v#v#v#v##v:V l t[#65v5*5555#5Bayt T$$If!vh5v5v5*5555#5#vv#v*#v#v#v#v##v:V l t[#65v5*5555#5Bayt T\$$Ifm!vh5o$#vo$:V l to$65o$Bamyt\T\$$Ifm!vh5o$#vo$:V l to$65o$Bamyt\T$$Ifm!vh55-5555D 55 #v#v-#v#v#v#vD #v#v :V l to$655-5555D 55 BBamyt\T$$Ifm!vh55-5555D 55 #v#v-#v#v#v#vD #v#v :V l to$655-5555D 55 BBamyt\T$$Ifm!vh55-5555D 55 #v#v-#v#v#v#vD #v#v :V l to$655-5555D 55 Bamyt\T$$Ifm!vh55-5555D 55 #v#v-#v#v#v#vD #v#v :V l to$655-5555D 55 Bamyt\T\$$If!vh5$#v$:V l t$65$Bayt\T\$$If!vh5$#v$:V l t$65$Bayt\T$$If!vh5I55555H 55 #vI#v#v#v#v#vH #v#v :V l t$65I55555H 55 BBayt\T$$If!vh5I55555H 55 #vI#v#v#v#v#vH #v#v :V l t$65I55555H 55 BBayt\T$$If!vh5I55555H 55 #vI#v#v#v#v#vH #v#v :V l t$65I55555H 55 Bayt\T$$If!vh5I55555H 55 #vI#v#v#v#v#vH #v#v :V l t$65I55555H 55 Bayt\TX$$If_!vh5}&#v}&:V l t}&65}&Ba_yt X$$If_!vh5}&#v}&:V l t}&65}&Ba_yt $$If_!vh55555 55S 55#v5#v#v#v #v#vS #v#v:V l t}&655555 55S 55BBa_yt $$If_!vh55555 55S 55#v5#v#v#v #v#vS #v#v:V l t}&655555 55S 55BBa_yt $$If_!vh55555 55S 55#v5#v#v#v #v#vS #v#v:V l t}&655555 55S 55Ba_yt $$If_!vh55555 55S 55#v5#v#v#v #v#vS #v#v:V l t}&655555 55S 55Ba_yt g$$If!vh5?5Q#v?#vQ:V l t65?5Qyt Tg$$If!vh5?5Q#v?#vQ:V l t65?5Qyt Tg$$If!vh5?5Q#v?#vQ:V l t65?5Qyt Tg$$If!vh5?5Q#v?#vQ:V l t65?5Qyt T\$$If!vh5"#v":V l t"65"Bayt~T\$$If!vh5"#v":V l t"65"Bayt~T$$If!vh5*55555S 55#v*#v#v#v#v#vS #v#v:V l t"65*55555S 55BBayt~T$$If!vh5*55555S 55#v*#v#v#v#v#vS #v#v:V l t"65*55555S 55BBayt~T$$If!vh5*55555S 55#v*#v#v#v#v#vS #v#v:V l t"65*55555S 55Bayt~T$$If!vh5*55555S 55#v*#v#v#v#v#vS #v#v:V l t"65*55555S 55Bayt~T\$$IfB!vh5g%#vg%:V l tg%65g%BaByt$/T\$$IfB!vh5g%#vg%:V l tg%65g%BaByt$/T$$IfB!vh5k55555? 55#vk#v#v#v#v#v? #v#v:V l tg%65555 55S 55BBaByt$/T$$IfB!vh5k55555? 55#vk#v#v#v#v#v? #v#v:V l tg%65555 55S 55BBaByt$/T$$IfB!vh5k55555? 55#vk#v#v#v#v#v? #v#v:V l tg%65555 55S 55BaByt$/T$$IfB!vh5k55555? 55#vk#v#v#v#v#v? #v#v:V l tg%65555 55S 55BaByt$/T\$$Ift!vh55"#v5":V l t5"655"Batyt8IT\$$Ift!vh55"#v5":V l t5"655"Batyt8IT$$Ift!vh55s5k5559 55#v#vs#vk#v#v#v9 #v#v:V l t5"655s5k5559 55BBatyt8IT$$Ift!vh55s5k5559 55#v#vs#vk#v#v#v9 #v#v:V l t5"655s5k5559 55BBatyt8IT$$Ift!vh55s5k5559 55#v#vs#vk#v#v#v9 #v#v:V l t5"655s5k5559 55Batyt8IT$$Ift!vh55s5k5559 55#v#vs#vk#v#v#v9 #v#v:V l t5"655s5k5559 55Batyt8IT\$$If!vh5##v#:V l t#65#Bayt8IT\$$If!vh5##v#:V l t#65#Bayt8IT$$If!vh555*555L 55#v#v#v*#v#v#vL #v#v:V l t#6555*555L 55BBayt8IT$$If!vh555*555L 55#v#v#v*#v#v#vL #v#v:V l t#6555*555L 55BBayt8IT$$If!vh555*555L 55#v#v#v*#v#v#vL #v#v:V l t#6555*555L 55Bayt8IT$$If!vh555*555L 55#v#v#v*#v#v#vL #v#v:V l t#6555*555L 55Bayt8IT\$$If!vh5$#v$:V l t$65$Bayt8IT\$$If!vh5$#v$:V l t$65$Bayt8IT$$If!vh5 55555) 55#v #v#v#v#v#v) #v#v:V l t$65 55555) 55BBayt8IT$$If!vh5 55555) 55#v #v#v#v#v#v) #v#v:V l t$65 55555) 55BBayt8IT$$If!vh5 55555) 55#v #v#v#v#v#v) #v#v:V l t$65 55555) 55Bayt8IT$$If!vh5 55555) 55#v #v#v#v#v#v) #v#v:V l t$65 55555) 55Bayt8IT\$$If!!vh5$#v$:V l t$65$Ba!yt`T\$$If!!vh5$#v$:V l t$65$Ba!yt`T$$If!!vh5~5v5555S 55#v~#vv#v#v#v#vS #v#v:V l t$65~5v5555S 55BBa!yt`T$$If!!vh5~5v5555S 55#v~#vv#v#v#v#vS #v#v:V l t$65~5v5555S 55BBa!yt`T$$If!!vh5~5v5555S 55#v~#vv#v#v#v#vS #v#v:V l t$65~5v5555S 55Ba!yt`T$$If!!vh5~5v5555S 55#v~#vv#v#v#v#vS #v#v:V l t$65~5v5555S 55Ba!yt`T\$$If!vh5%#v%:V l t%65%Bayt7T\$$If!vh5%#v%:V l t%65%Bayt7T$$If!vh5*5v55.55S 55#v*#vv#v#v.#v#vS #v#v:V l t%65*5v55.55S 55BBayt7T$$If!vh5*5v55.55S 55#v*#vv#v#v.#v#vS #v#v:V l t%65*5v55.55S 55BBayt7T$$If!vh5*5v55.55S 55#v*#vv#v#v.#v#vS #v#v:V l t%65*5v55.55S 55Bayt7T$$If!vh5*5v55.55S 55#v*#vv#v#v.#v#vS #v#v:V l t%65*5v55.55S 55Bayt7T^/ 666666666vvvvvvvvv6666>6>66666666666666666666666666666>6666666666666666>6H666666666666666666666666666666666666666666666666666666666666666662 0@P`p2 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH @nH @sH @tH @@`@ 0iMNormalCJ_HaJmH sH tH h`h ?_* Heading 1$$@&+5B*CJOJ QJ \aJmHph6_sHtHt`t _ Heading 2$$d@&a$/5B*CJOJ PJQJ \aJmHph[sHtHDA`D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List  z9qLight Shading1G:V044j;@ j; jDjD(fdfd5B*ph5\5\5\5\jj z9q Table Grid7:V0@@@ PNList Paragraph ^m$4@"4 +_0Header H$.1. +_0 Header Char4 @B4 +_0Footer H$.Q. +_0 Footer CharPZ`bP PV Plain Texta$CJOJ QJ aJmHsHtHN/qN PVPlain Text CharCJOJ PJQJ ^J aJX/X _Heading 2 Char#5B*CJOJ PJQJ \aJph[JB`J _0 Body Text xa$CJaJmHsHtH@/@ _0Body Text Char CJPJaJ\/\ ?_*Heading 1 Char'5B*CJOJ PJQJ \^JaJph6_6U`6 ?_*0 Hyperlink >*B*phcP P ?_*0 Balloon TextCJOJ QJ aJmHsHtHN/N ?_*0Balloon Text CharCJOJ QJ ^J aJJ^@J ){0 Normal (Web)dd[$\$CJaJB' B JP0Comment ReferenceCJaJH H "JP0 Comment Text!CJaJmHsHtHJ/!J !JP0Comment Text Char_HmHsHtH@j @ $JP0Comment Subject#5\V/AV #JP0Comment Subject Char5\_HmHsHtHP`RP c No Spacing% CJOJQJ_HaJmH sH tH Oa cphbe`r (c0HTML Preformatted7' 2( Px 4 #\'*.25@9CJOJ QJ aJmHsHtHP/P 'c0HTML Preformatted Char OJ QJ ^J VoV cDefault )7$8$H$!B*CJ_HaJmH phsH tH 0O0 c a-size-large*W`* W6Strong5\TS@T -a@Body Text Indent 3,hx^hCJaJNN ,a@Body Text Indent 3 CharCJaJHH a@Table Paragraph .1$7$8$_H PK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] J#BqOkk=`2e~ֳOJ  F  Ɣ  I  ɕ  < |   hE R#.&'3)*,- 3u69:;< >?DuGHIOP5Y8^a"b;bbbbdn=rx~G^O@ 9Ӷ}?X<G }" Y%$',p:;_@EeHJL@O$RVpYKZP`ethklqt-wzx!=;61 (w*ٵ}MksDV!Ua!*+.=> CFJKPSU Z^_1iloyq}Ԁ|\ܕ ۭ7$t>nhY  .M',.@037;?KAEGNPRT@WW[(`/aDddhikswziobxAwmiu+96;^Oub%'*3,?DErQMR[bmosw~_RPRT\cos} !"$&13>HJUXbloy{} !&-/05<?ADINPY[afgqsvw !$*/13<@BLNPZ]^hjlvx~   (,49@DLOXcfos{| ),48:DEMQS]`dgpr|  Z 2 m 7lbXvw6uLXj[ r] _$$ %J%%%&&O&''' (j((1)n))%*F***-+~++,^,,,E----:/4U4V44455D5E5555555f77778z8889:w:::N;;<A<<<=]==== ><>~>>>?DDD!EQU[`-aEafaja~aaaakpgrrrrrss7s9sx%}3~Y~`~z~~~~~~~~ӊ "&DOȖ1PWpttѤդ~˭ϭ Ƶ$';>cxq?TI:$oADH o -TYvyR?)>j%X'''''''''-*+,0,P,T,g,k,,,8:::;;+;/;S;i;FILLLLLLLMMRXYYYZ Z Z$ZHZKZag5hTh\huhyhhhhh2ptvww8w;wPwTwxwwp} p15IMqމhȘ#9̟ "7Ħ˦&;1ڵ5VZnrBS%,GK_cRhm!@Hei}?CW[r .D[M (%EI]a   $ H K A'+Z+q+++++++1q:=>->Q>U>i>n>>>BFFG2G6GJGNGrGyG@LKORHSVStSxSSSSSX[^R_i_q_______%ilm7m?mXm\mpmtmmmtz}}}}} ~~3~H~Y%)=Aez*Δ6>]auzà "&J_Үٮ68mvt½ֽڽQ$AEY])+/Sh DG,5=  6=Z^rvr[ry',.......//8?v????????@CEEEEEEEF+FLNNNNOOOBVZ~Uv~ܴܺ˾z btvw$'<@dy&;A T mY%*'P'W'w'{'''''04`44: @C!D-DMDPDeDiDDD2KQQQQQRR7R9RwWZabbbccc cDcLcioRo^o~ooooooz}v|j>Dnv”T,2RUjnψQSUVWXYZ[]^_`abdefghijklmnpqrtuvwxyz{|~     #%'()*+,-./02456789:;<=?@ABCDEFGIKLMNOPQRSTVWYZ[\]^_`acdefghijkmnpqrstuvwxz|~     "#$%'()*+,.12346789:;=>@BCEFGHJKLMOQRSTUVWXZ\]^_`bcdehijklmnoprtuxyz{|}~     "#%&'()+,-.02456789:;=>?ACDEFGHIJKMOQRSTUVWXY[\_`abcdefgikmnopqrstuwyz{|}   !"#$%&')*+-./01235678:;<=>?ABCEFGHIJKMNPQRSTUVWYZ[\]^_`abdeghijklmnpqrtuvwxyz}~     !"#$%&'(*+-./01235679;<=>?@ABCFGHIJKLNOPRTUVWXYZ[\^_abcefhijklmnoqstuvwxyz{}~g!LJ_XXX!!L # @s(     C 2@@ Group 463703"e)?PK!8[Content_Types].xmlAN0EH%N@%邴K@`dOdlyLhoDX3'AL:*/@X*eRp208J妾)G,R}Q)=HiҺ0BL):T뢸WQDY;d]6O&8* VCLj"󃒝 yJ.;[wIC_ :{IOA !>Ø4 p;fɑ3׶Vc.ӵn(&poPK!8! _rels/.relsj0 }qN/k؊c[F232zQLZ%R6zPT]( LJ[ۑ̱j,Z˫fLV:*f"N.]m@= 7LuP[i?T;GI4Ew=}3b9`5YCƵkρؖ9#ۄo~e?zrPK!b drs/e2oDoc.xmlVn }@7dXiRU~"a@@ֻalnEQ*U}0s9pfuV%NRJTS__>l(qIDIw)D[-+a (W H[3wP0Yk3I*@e:\8֫qn OdI!7OϻLh,3mǧ4+Y`u<#{wjku,}P͵ki1&Ov?,骒֧g)%O4l@`|1?dhƯP}xCEd"b :Wi\7#=z%I-28Hȕ;nZfn O\?nU6s>d!5r^yZb_ lWa]5X;^C BxV jKy^ĭF7` TKc~. 0u"v0.ٕ*p̣C˒]8?K#076A@T?E 2Ci'iɎƄ?gҴlN?bNa蟐lBC#1Oٌ =G %Z"jNWlH1t% a!ː4OMB W l2u(aݎoPK!('drs/downrev.xmlLAk@e MR,$jxcΆm/e}-Gӈ:W[VO"ą5 >ۗ56I,LJ SmKJإMtEEĶΠ+p妑II5 [ZWT\7`7z7zYO>&?CډFAxgQ 3=PK-!8[Content_Types].xmlPK-!8! /_rels/.relsPK-!b .drs/e2oDoc.xmlPK-!('drs/downrev.xmlPK B  B^C#DE.FGQUVX^^##Shape 658041"×PK![Content_Types].xmlJ0*miG]`Hm6 Xwt?. g#Wi3E).+7 >ON ޑ1ˋz "+R RhB.} /<^ITխ%rHK4uK~I0xM e`|X}đ I`߽N4aG2$RKIZ)4(M9`ctB{m:f@`3n|O,ܗr޾jxR0T ,0@}WBLǬ5vPK!3/A9drs/shapexml.xmlQ(K-*ϳU23PRHKOKU qӵPR(.IKIKUL-VPK! drs/downrev.xmlDj0Bn׉bJ!CkkVRmO_93 'ӊzXV/#ĥ W bpYck\Ay1v {_a.ҕ5tK}}%ucV>EQ" 6j车5 N/n>xğpIpPj8@x=|ko%c _@nPK-![Content_Types].xmlPK-!1_a ._rels/.relsPK-!3/A9)drs/shapexml.xmlPK-! drs/downrev.xmlPK [B  B^C#DE.FGQUVX^^##Shape 658042"×PK![Content_Types].xmlJ0*miG]`Hm6 Xwt?. g#Wi3E).+7 >ON ޑ1ˋz "+R RhB.} /<^ITխ%rHK4uK~I0xM e`|X}đ I`߽N4aG2$RKIZ)4(M9`ctB{m:f@`3n|O,ܗr޾jxR0T ,0@}WBLǬ5vPK!3/A9drs/shapexml.xmlQ(K-*ϳU23PRHKOKU qӵPR(.IKIKUL-VPK!drs/downrev.xmlDAk@ޚ 1iz+Ug; m뻅B|ìɴb5,qiuÕapYckA=1vO.G].+k2"b{>Ⱦ1M+8NBT_F:X~/x vw }~/ 7?PK-![Content_Types].xmlPK-!1_a ._rels/.relsPK-!3/A9)drs/shapexml.xmlPK-!drs/downrev.xmlPKy xB  c 4Shape 8#" ?  X 10273"? B S  ?3;JJ&tGj;;j y tpage2page3page8page4page5page6page7page9page10_GoBackpage12page13page14page23page17page62page59page50page66page47#BqOhkkkkkkw}=p&BZֳOvK #BqOhkkkkkkw}=p&BZֳOvKbg  dj17$*T^tz#HR SYjp B L o u !!##<$?$%%&&C&M&c&i&&&' '5'8'(#(((&)0),,8,<,j.p...!1'192?2g2q22233336677D7N7c7i7777788-93999<<>%>>>BB(G.GGGGGGGGHHHHHVI]I RRRR_RhRkRrRhSnSY Y YY'a6accddddddddjjjjpp qqNqYqqqqqqqvvvv~xx1y:yzzzzk|s||||}$}*}L}V}px҃ڃ!+EL,0_f͔ڔ !-2JP]eqv•=DENelpwxږ#>Emq~No 94;px!(BK&2AGOjp /8S[ üǼʼϼ&]c (enfjmrW`P^8? #,<Eloov7?Yb0;L y}   .8EKRV]rt}   !     GL]f6MRVlv!(8>@HRV####&'))>*I***}++--00<<<<.=:=n=t=}==== >>C>J>vBzBRHaHJJVJaJfJkJtJK&K.K5KvKKKKNOOOXX'^+^bbcceee f ffnfzf|ffff)g7gggkk[pdp2x7x^xixxyaygyoyuy}}~~~ltѐҐvžӞܞӤۤ ץߥ_fiq )4<os;?,1NXy~fp\_gk *3hk{ 4;FPmp  AF\c27J^"+ C G !!!!L!O!!!!!!!!!" " "#"7":"Q"T"i"l"""""""# #*#7#E#H#V#Y#e######L$O$$$$$$$$$%%%%g&j&&&&&&'{'''' (#(J(M(i(l((((( ))@)C)))))))***#*$*)*H*R*T*^*_*o*p*{*********<+E+O+Y+y+|+++,,,!,t,y,{,,,,,,,,- ---------000000 1 11166:6;6?6F6J6r6w6y6666::>?I?6A:AhArAAAB$BFFJJKKN!N|NNNNNO OORRUUdViV X%XO[T[u[z[[[\"\4\<\q\{\``KeUee fhhhh#i+iLiRiiiiijjkk[q_q$r.rRr\rrrrr ss%s/s:sDssss t ttHtRtdtntttttttttuuuuUuaubuluou{uuuuuuuuv4v9vvvvvvv!w(wGwKwwwwwwwO^aezڨȩͩ!êΪ ;@)-:Cõŵʵ#,aj¶ /W\]q¾ʾ=IUW`dtͿֿؿݿ߿ %'.;A[mow&,/8:>DPU\^fp|~  (*01FJQSY[bfnz[egmv} ~[bdkmw*-5,9Eacowosdm>DIQlx:@FM `kow~"'_el9@R[]ds~ '/W^W[!*bh'+MS#-wz!&'.- 9 ^ e m r   GM emx!!F"J"#$%%%% &&0&6&I&O&&&&&&& ''#')'M'S'i'o'''''i(r(((((((i+s+`,j,)-9-&3*35577B9F9<<==G=R========= >>D>R>>>>?l?z?????iBmBRFVFJJJJLLLL;NBNOOOO3PAP[PePPPPP?QIQzQQQQQQRRHSPSSSSSGTKTWW YYV[_[.\2\eeeeeeff\fafff*g/g4g=gEgMgNgSgk!kBmLmpqzquu}}}}8~?~w~}~,0@FIPelmt""+4<ΠԠ-2w ae"߯/3 ǻ"*1)-)0;B%(2T`GMu|~+/NT~=Mx,0CK_g ,GQ  +hs{CM V^dl&,?Ijtz9CITYdTXzely!\b(/0Gpt9 = {!! """"!"("}""""A%G%B)N)----s....y0000T1[1337789==B>H>+?0?7A=ADDjHmHnIvIJJJKKKKKHLML[LcLdPjP X%XZZ9Z@ZfZpZZZZZ.]4]__bbh hkk lll lpp%v.v0>A ALHrHtHHHHHHHHHHHHHHHH II!I1I4I;I{IIII,J:JJJgKKKKxLL:MGMOPPPPPQQQQRRRRESOSQWTWWWXXX Y YYY+Y-Y7Y8YCYEYIYKYMYNYYYlYqYYYYYZZ]%]]]]]___``parayazabbccccccYdkddd/e0e|e}efhhii>jfjhjjjjjjjjjjjjjjjkk,k/k6k0lhmymmno?o]oppu#uuuuuuvv1v3v@vBvLvMvXvZv^v`vbvcvnvvvvvvvwxx,yyyrz-{^{e{|{{]|d|an]}‚Ăтӂ݂ނ(9<Cw~!,f߇_kɎ)+8:DEOQUWYZev’q͔̔ݔ7FK=?suŜלםޝsţȣ-Pѥ֥ No9<acĭƭȭɭԭدۯjǵ48zɼʼڼܼ */AX[bʾо8D/6vJW|FJCpr 47>VL\m0@B8:lm}s%._iFNQnp 69@P&(I./u|}RT\no  QRH X Y     & ' l m     , . ; = G H S U Y [ ] ^ i |      Aik!(hkDP#%WYfhrsT!Y!#####$$$$!$"$.$0$8$9$D$V$[$m$$$$))s+v+..G3r344!7#799<<<<=&==>GfIfgglgppqqvv||\gQW ֆ؆} ŏƏЏՏۏ6823`a0{(dˣף+ )ʴFP&Fmx&  qu  3#7###''''333344525Q5^566jBoBMMT(U[[dd0e2eee7f9fff@gghhhh2jHISW[`k|@ E F       + ,     ^ ` h    ip}''))g**r,y,T1X1B=R=1?3???0@6@wGGxMMHPMPZZ c cddRnTno!p|||W}L[$AIVF~Q֞ PU$R.2\`&*HJTV46X]}03Le),{}bsv4?C!!""#U#,R-c7 du i4C TU% F$mD !8Y !& 1?\ ZVRj ' P0&d ص&WxQLOd|w:;wBZnIeҩo.s{DD.SRy0$6Ay]"Nze"j"@'N2# &}JgV̪882*{CBL7.:\FM2Xn"\TM@m3Kt4? U.b 8fQS0NJ -" q>9N4(NJF`P8P'N f@t]Mj~ 9!<]p7!.$!!1`~'"`~'"6_"4xb"z`mH%w 0%h %f 4%fti'&8.NY'.a'8)@a(Vr5(w010( RN)]~:L+)\l+R$f:,_^ /.\n8j'U.Z#.Mx/Bv( 1H 2>Dd2, 3؞RpX3vr `3uQ 3 3394vA^{; 5|qS5tnMU5*65؞RHT7ftU7oSY8hRf8,8)S?9Bsg9fyW9:1$5(V:0:XB;Tw;kkG;hUK;6&<@n9R ?I*?.x*|4?./@⎸}Qp@K\Y@U&@"#e@>:Vok@p@|+ھaAu&JAM~AlB(fBx\*eBhZpqD貎GD. "DpE>J. E^ |-E|~ ToF̆n GB6N HR0{Hu(%Ho2AI"cKJdS+J*~~mCKKj2Lh.L>L<rCM~?M.fKNF|*fN~ OftONgFp^P\uPucMPh$P dQZfRJ IR`PXFS<}  T.[TMr"TP2H|^Uj2Un5 rU7VsjV.*-WZ<$5W~ WQbYO.>UZ(M)Z:\F[oLK\K\7^]զ I]ft"]n#^S_+ __J5_gVza2DzXb?`IzbVHb.rHcftfPcanoc5FUfFX-g]o$5go$5g7-gЈX(g?rHh> hmw`hftE i.Rnni.`i h^Jj4Mdj)rdkP0&J3kJklTUqGmx BnkD~nŚ+?,o q(%oRe;m!hp sp\A-pw 0rpd"qkDZ]q0P9WqK\^rRE,5rb 8-rTGasdBV Cs+Dtty0Dub 8bvZ6sN,v <9vfttX=vJqU[vJ+v"Buv,V'Y#w ڨJfwbc! w"#hw؞R7x9x}yyRspIy>:VK?y z: -zF~ Ozr.m{&{z=|\\o|?`I |Vp *}f< f}.{<~66Mj~<ȰEN~l:!=ftJj/p^p`@CJOJPJQJRHc^J_H aJo(sH tH . ^`_H sH tH "   ^ `_H sH tH "  U ^U `_H sH tH "  ^`_H sH tH "  ^`_H sH tH "  ;^;`_H sH tH "  ^`_H sH tH "  ^`_H sH tH " ^`CJaJ.^`CJaJ.pp^p`CJaJ.@  ^@ `CJaJ. ^`CJaJ.v^`CJaJ.F^`CJaJ.^`CJaJ.P^P`CJaJ./p^p`@CJOJPJQJRHc^J_H aJo(sH tH .V^V`_H o(sH tH " = ^= `_H o(sH tH " #^#`_H o(sH tH "  ^ `_H o(sH tH " ^`_H o(sH tH " ^`_H o(sH tH " ^`_H o(sH tH " "^"`_H o(sH tH " ^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`OJPJQJ^J.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L./p^p`@CJOJPJQJRHc^J_H aJo(sH tH .5p^p`5@CJOJPJQJRHc\^J_H aJo(sH tH .  ^ `_H sH tH "  U ^U `_H sH tH "  ^`_H sH tH "  ^`_H sH tH "  ;^;`_H sH tH "  ^`_H sH tH "  ^`_H sH tH " ^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.h ^`hH.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.8^8`6.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.h ^`o(hH.^`OJ QJ ^J o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o PP^P`OJ QJ o( ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`5o(.^`.L^`L.h ^h `5.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h x^x`hH.h H L^H `LhH.h  ^ `hH.h ^`hH.h L^`LhH.h ^`hH.h X^X`hH.h (L^(`LhH.h^h`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h 8^8`hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.L^`L.h ^h `5.8 ^8 `.L^`L.^`.^`.xL^x`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L..8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.. *^*`5hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h8^8`OJQJo(hHh^`OJ QJ ^J o(hHoh ^ `OJ QJ o(hHh ^ `OJQJo(hHhx^x`OJ QJ ^J o(hHohH^H`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hH^`o(.^`.xL^x`L.H ^H `. ^ `.L^`L.^`.^`.XL^X`L.^`5o(.^`. L^ `L.j^j`.:^:`. L^ `L.^`.^`.zL^z`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. *^*`5hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`5hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. 8^8`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`5o(hH.T^T`OJ QJ ^J o(o $ ^$ `OJ QJ o(  ^ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( d^d`OJQJo(4^4`OJ QJ ^J o(o ^`OJ QJ o(.K^K`OJPJQJ^Jo(.^`.L^`L. ^ `. ^ `.[L^[`L.+^+`.^`.L^`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L..hu^u`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`OJPJQJ^J.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h uL^u`LhH.h E ^E `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h UL^U`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`CJaJ.^`CJaJ.pp^p`CJaJ.@  ^@ `CJaJ. ^`CJaJ.v^`CJaJ.F^`CJaJ.^`CJaJ.P^P`CJaJ. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`5o(hH. ^`o(hH. L^`Lo(hH. h ^h `o(hH. 8 ^8 `o(hH. L^`Lo(hH.^`5\o(hH. ^`o(hH. xL^x`Lo(hH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L..^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5\.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(hH. ^`o(hH. L^`Lo(hH. h ^h `o(hH. 8 ^8 `o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. xL^x`Lo(hH..^`5.^`o(.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^h`.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L. *^*`5hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.h ^`5hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5.^`.L^`L.m ^m `.=^=`. L^ `L.^`.^`.}L^}`L.^`5o(.^`.L^`L.h ^h `5.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`5\o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L.h^h`o()8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5.^`o(.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.~ L^~ `L.N ^N `.^`.L^`L.^`.^`.^L^^`L..8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`o(hH.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`OJPJQJ^J.^`^J.pL^p`L^J.@ ^@ `^J.^`^J.L^`L^J.^`^J.^`^J.PL^P`L^J.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.8^8`5o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.h 8^8`5hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`. ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH..^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h ^`hH.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.h^h`.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`. ^ `. L^ `L.x^x`.H^H`.L^`L.^`.^`.L^`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`OJPJQJ^Jo(hH. ^`o(hH. pL^p`Lo(hH. @ ^@ `o(hH. ^`o(hH. L^`Lo(hH. ^`o(hH. ^`o(hH. PL^P`Lo(hH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.h 8^8`o(hH.h ^`hH.h  L^ `LhH.h  ^ `hH.h x^x`hH.h HL^H`LhH.h ^`hH.h ^`hH.h L^`LhH.5.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`CJo(.p^p`.@ L^@ `L.^`.^`.L^`L.^`.P^P`. L^ `L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.l^`lo(8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5OJPJQJ^Jo(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`5.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h vL^v`LhH.h F ^F `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h VL^V`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.^`5o(.^`.L^`L.h ^h `.8 ^8 `.L^`L.^`5.^`.xL^x`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`OJQJo(^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH. ^`5\o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.8^8`.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h^h`5.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.8^8`o(.^`. L^ `L. ^ `.x^x`.HL^H`L.^`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. ^`o(hH. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.h ^`hH.h ^`hH.h vL^v`LhH.h F ^F `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h VL^V`LhH.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`5o(.^`.h L^`L5hH.h ^h `.8 ^8 `.L^`L.^`.^`.xL^x`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.h ^`hH.h ^`hH.h pL^p`LhH.h @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PL^P`LhH.^`o(. ^`hH. pL^p`LhH. @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PL^P`LhH.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.8^8`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`5o(hH. ^`o(hH. L^`Lo(hH. h ^h `o(hH. 8 ^8 `o(hH. L^`Lo(hH.^`5\o(hH. ^`o(hH. xL^x`Lo(hH.^`5o(hH.^`OJ QJ ^J o(o p^p`OJ QJ o( @ ^@ `OJQJo(^`OJ QJ ^J o(o ^`OJ QJ o( ^`OJQJo(^`OJ QJ ^J o(o P^P`OJ QJ o(^`.^`.vL^v`L.F ^F `.^`.L^`L.^`.^`.VL^V`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L. %dQ>as{DL.`i"{<~{Z]qok@Op *}?\ qGmQbYi6;0r mjv - (%Hu 9R <&<$!7^]%op@sg9c2x"T-g5pqD( 1Dtt[oc7.  N HX(gi'&% RN) | !& :l+=|\TMJ3kd"qrCMt]w~>MdjcMP<9v K?y-' s7xrdk+vklC |Qp@Wq|fN|`3xQ|?(V:rp|hw 3M)Z? *?N^rBn|d2U.b#VnniSRspzbU&@! w|mH%-p|mCKK|^U|0{HaA| Ozw>L!GDtX=vUbgdRj &JARf8zXbo|ToFL+)p^P0(,8@a(Tw;a'pX3XFS{; 5 CsfPc+?,o z9!n G B;fBb"Mj~"D^fR$e"N5(Y@VzUZ6_"b:y]"m!hp8*eBj'U.brHh:,|-Ed kc<394MU5U&$5WfKNmD EN~ -MP'2S_uv5_bvHbK\Du,5re;%qS5Y 7 Y kG;%SY8}9x"_`~'" 3o$5g0:sN,vwY WJF*-Wm{[T IR hY#wE iSuPU[v.UK;h^Jj/@+ _-z-rV7V2AIJj37-g#^^ /.< f} T?M9If V.NY'o|4?`=Dp7!9NpEpY m/KU7F~nOdMx/S?9B+JFUf M~A. EcKJrUJfwpIye@ZnIP'BpU3@i l                 m        Lp0        n5 @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @@i l         @ @ @ @ @ @ @ @ @^|         @ @ @ @ @ @ @ @ @r'                 pr8 @ @ @ @ @ @ @ @@i l        2Gw,Ն9D:}6ּTlFd4fOb         @ @ @ @ @ @ @ @ @bO|y,&J>ՖF&,J[        SL% @ @ @ @ @ @ @ @         r'         @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @.;p        J T_;L_ԇ| R*.Fy{          @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ T @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @&@$ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @          @ @ @ @ @ @ @ @ @                  4                  @ @ @ @ @ @ @ @ @          @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @P. @ @ @ @ @ @ @ @HS @ @ @ @ @ @ @B] @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @@i l         @ @ @ @ @ @ @ @ @         r                 L @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @b @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @         @ @ @ @ @ @ @ @ @|          @ @ @ @ @ @ @ @ @          @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @HS @ @ @ @ @ @ @ @ @ @ @ @ @ @ @          @ @ @ @ @ @ @ @ @һ:8P( HIX@`Zn C @ @ @ @ @ @ @ @                  CR @ @ @ @ @ @ @ @.;p                 h  @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @.;p         @ @ @ @ @ @ @ @ @         \^        Z6        ^V         @ @ @ @ @ @ @ @ @.;p        6        >2E        (#                          r'         @ @ @ @ @ @ @ @ @.;p         @ @ @ @ @ @ @ @ @                           .;p        DZ#$N&ih-ЎZ66|t Tn9  @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @                            @ @ @ @ @ @ @ @ @                                    by5Zf V^H4F֯:Ė<pr8 @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @Kv  @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @nX# @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @.;p                                    @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @                   @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @         8 @ @ @ @ @ @ @ @                           pr8 @ @ @ @ @ @ @ @  @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @^VȌOP*TlT<"aV*c4abNmCi g~&DhBQS $J>Qvi{jC ) W=w9 Ejg VL:c\f?qd h vE.QB  T Y +k v u V/ 6? I V lh 7i ]j j /d  " %+ 9 _ eu ]3 R @08E G!adw@-@l^+`d+~9LN2b3JP'Uma2'"G(PJS'&/r~w L/i1eZ'9?GSdQdx*#QK~*'Jlw,T}E K M b\ ^ !!!>1!x!s"qz"O#U#f#s#g$4$%y3%?T%`%y%_{%j&|u&K'S'}\'7(,(F(:M(p( (J)L)h)m)*!*O*?_*e*4t*Zz*+*+K+P+,| ,E,qM,Q,Xx,-#N-2.RV.$/ZJ/k/u/000C0*1:1n1Bo12%2f22[2]`2 333F3_^3z304P4s4,-5r56#/6}26;6S6 j6x7#7I7b76v7Y8!8U8:,979d9::4j:p:Yu:>;5[;h;[ <<(<2<R<Ud<m<'=I=J>3??Hb?&s?z?@>(@6A@A*A -A3AQHA(B+BkBrBC{3C_CDD1D4D87DjEEq'E(EhE~E+F^FQnF#G.RG_HHH7HqHBHHHEdHI*I8ISIJJKJTJYK[K?L~M\PMaM0iM4NI2oV?oKo/p8p^pbpp q qz9q Er)^rhr~ ss !sa5s-fsjs;tAVt}jt|tH&uu?uNuzu4vJv[gvlov(wnw(wSw Xwcwxxy y yg#zkz^nzrz{i|3|;|[|k|6w|b}f}>w})~X~' $)$&,9EM\ ,Qr|JbgzlDPXm N..N!Wv)qf+/|9J\NaT?"+.4OVzr eOg"#L9[}#Q`p2\xJ[*'jSc>\$by:bHBJ]P!(CgE.ANt4t>*Rz*>Yr~-KHw Ss a@U$7y~a & 3+<Bl w/;Z@z/KWLjkn$0LIZa{KS _ f0`iy,8iKH1R5`Nwl`JDkB~l%G3iy -'5\Rsx4?VO Do'w3u`eto+y/pEJ`YDKcKgF+t\@@#KVwh2;o L "EV"2L8n7Q~YyVUhx> 8E8/Q^ gwK$T"!x8h;;?Os ]a.Oq 7=H(PQ.P"Mn}G| FGu}*v(bow?I5ZW6>6uz )jv@!1p!Evyx >FMQhVt~` &,&z2Qdhqr)v_QRjH%58#RePbyC bjvj6]ezhKtz){5R{.;uKN P8[tSab{ $,*.oO}i dL~br{7Ti3?=WMp{aa XGX  X'0o56\>$ m_0 1GI .Ma[ 3Ls*!CuP\^I ')K4-MU `uvy JFI^`t 1[M*M)$D]CLiy0Y\aoDG&m-. 4#<PhG`QLv%)TNdPisRrxz@@*+-.jk*+=>˄˅JX@X2Xh@X6Xp@XtX@X6Xp@X XD@XLX@XX, @X@UnknownG*Ax Times New Roman5Symbol3. *Cx Arial9^ Algerian7.@CalibriABook AntiquaG5  jMS Mincho-3 fg;(SimSun[SO;. *Cx Helvetica?= *Cx Courier New7@CambriaC.,{ @Calibri Light5. .[`)Tahoma;WingdingsA$BCambria Math"1h盈g/̈G' zWO|WO!n20!$ ;QHX  $P(Q2!xx Windows UserdcrustP                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                   Oh+'0p   , 8 DPX`hWindows UserNormaldcrust6Microsoft Office Word@e@6`^@v@S@zz՜.+,D՜.+,0 hp  SandeepOW!  Title 8@ _PID_HLINKSA9b lhttps://www.amazon.in/s/ref=dp_byline_sr_book_1?ie=UTF8&field-author=Erach+Bharucha&search-alias=stripbooksb z4khttps://www.amazon.in/s/ref=dp_byline_sr_book_2?ie=UTF8&field-author=Asthana+Meera&search-alias=stripbooksb Ehttp://www.dcrust.ac.in/b   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | }                            ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                          ! " # $ = > A Root Entry FHWz@ Data b1Table~ u-WordDocument <SummaryInformation( DocumentSummaryInformation8 MsoDataStoreVzwWzGEOVDHSY==2VzwWzItem  PropertiesUCompObj y   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q