ࡱ>       [ bjbj ojjl       4h2l(d6*----- ;?{}}}:``w$  A--AAL  --<LLLAt - -{LA{LXLQ2)[  b-** Dz;b.bK<(ib.rLrbL<     ATTACHMENT A  Mississippi Criminal History System (MCHS) Project Data Entry Subsystem Interface Control Document Version 4.0 November 28, 1998 Table of Contents  TOC \o "1-5" 1.0 Scope  PAGEREF _Toc428959857 \h 1 1.1 Identification  PAGEREF _Toc428959858 \h 1 1.2 Document Overview  PAGEREF _Toc428959859 \h 1 1.3 System Overview  PAGEREF _Toc428959860 \h 1 2.0 Referenced Documents  PAGEREF _Toc428959861 \h 5 2.1 State Documents  PAGEREF _Toc428959862 \h 5 2.2 Other Government Documents  PAGEREF _Toc428959863 \h 5 2.3 Other Documents  PAGEREF _Toc428959864 \h 5 3.0 Interface Requirements  PAGEREF _Toc428959865 \h 6 3.1 Messages Transmitted from Directly Connected Client Workstations  PAGEREF _Toc428959866 \h 6 3.1.1 Basic Transport Protocol  PAGEREF _Toc428959867 \h 6 3.1.2 Connecting Client Workstations  PAGEREF _Toc428959868 \h 6 3.1.2.1 CIC Responsibilities  PAGEREF _Toc428959869 \h 6 3.1.2.2 Vendor Responsible  PAGEREF _Toc428959870 \h 7 3.1.3 Security  PAGEREF _Toc428959871 \h 7 3.1.3.1 CIC Responsibilities  PAGEREF _Toc428959872 \h 7 3.2.3.2 Client Responsibilities  PAGEREF _Toc428959873 \h 7 3.1.4 Message Structure  PAGEREF _Toc428959874 \h 8 3.2 Message Transmitted from Terminal Servers  PAGEREF _Toc428959875 \h 17 3.2.1 Basic Transport Protocol  PAGEREF _Toc428959876 \h 18 3.2.2 Connecting Terminal Servers  PAGEREF _Toc428959877 \h 19 3.2.2.1 CIC Responsibilities  PAGEREF _Toc428959878 \h 19 3.2.2.2 Vendor Responsibilities  PAGEREF _Toc428959879 \h 21 3.2.3 Security  PAGEREF _Toc428959880 \h 21 3.2.3.1 CIC Responsibilities  PAGEREF _Toc428959881 \h 21 3.2.3.2 Vendor Responsibilities  PAGEREF _Toc428959882 \h 21 3.2.3.2 Client Responsibilities  PAGEREF _Toc428959883 \h 23 3.2.4 Message Structure  PAGEREF _Toc428959884 \h 23 3.3 Card Scan  PAGEREF _Toc428959885 \h 32 3.3.1 Basic Transport Protocol  PAGEREF _Toc428959886 \h 32 3.3.2 Security  PAGEREF _Toc428959887 \h 33 3.3.3 Outgoing Message Structure  PAGEREF _Toc428959888 \h 34 3.3.4 Incoming Messages and Processing Requirements  PAGEREF _Toc428959889 \h 35 3.4 Live Scan  PAGEREF _Toc428959890 \h 36 3.4.1 Basic Transport Protocol  PAGEREF _Toc428959891 \h 37 3.4.2 Security  PAGEREF _Toc428959892 \h 37 3.4.3 Outgoing Message Structure  PAGEREF _Toc428959893 \h 37 3.4.4 Incoming Messages and Processing Requirements  PAGEREF _Toc428959894 \h 37 Appendix A ANSI/NIST Tenprint Format  PAGEREF _Toc428959895 \h 39 A.1 Type-1 Record  PAGEREF _Toc428959896 \h 40 A.2 Tenprint Type-2 Record  PAGEREF _Toc428959897 \h 40 A.2.1 Tenprint Fields  PAGEREF _Toc428959898 \h 43 A.2.1.1 Existing Fields  PAGEREF _Toc428959899 \h 44 A.2.1.2 New Fields  PAGEREF _Toc428959900 \h 55 A.2.2 Tenprint Message Layout  PAGEREF _Toc428959901 \h 59 A.3 The Type-10 Record  PAGEREF _Toc428959902 \h 61 A.3.1 Mug Shot Record Fields  PAGEREF _Toc428959903 \h 62 A.3.2 Mug Shot Record Layout  PAGEREF _Toc428959904 \h 67  1.0 Scope 1.1 Identification This document provides the basis for the development of software to interface with the Mississippi Criminal History System (MCHS) through any of four data input and query mechanisms: Transmission from directly connected workstations, Transmission from terminal servers, Card Scan devices, and Live Scan devices. These interfaces are used for data of two basic types: law enforcement messages and fingerprint transmissions. The first two interfaces above deal with law enforcement messages. The last two interface types relate to fingerprints. 1.2 Document Overview The remainder of this document provides requirements for interfacing client devices and systems with the MCHS Switch and criminal history repository source document processing components. Section 1.4 provides a brief overview of the MCHS architecture. Section 2 lists reference documents supporting the ICD. Section 3 provides interface requirements for each of the data input and query mechanisms. Each interface type is subdivided into basic transport protocol requirements, security requirements, and message structure requirements. Appendix A contains supporting information for fingerprint transmissions. 1.3 System Overview The Mississippi Criminal History System (MCHS) is an information processing system based on a criminal history database which includes textual and mug shot information and a fingerprint identification capability. The textual criminal history data is stored in a relational database called the Repository managed by the Oracle database management system (DBMS). Fingerprints are stored and managed by the NEC Automated Fingerprint Identification System (AFIS). Data from hard-copy source documents is entered into MCHS through fingerprint card scanning data entry workstations. Fingerprint data, mug shots and supporting data are also entered through live scan data entry workstations. Live scan and card scan workstations communicate with the Repository over the States Frame Relay network. In addition, MCHS is updated daily with selected inmate status information transmitted electronically from the Department of Corrections. MCHS supports standard NLETS Criminal History Record Information queries from out-of-state agencies, and provides additional query capabilities to in-state users. MCHS also participates in the FBI Interstate Identification Index (III). MCHS provides a central repository for fingerprint-validated records of criminal or suspect persons known to the State of Mississippi. The criminal justice process begins with an arrest, at which time fingerprints are taken. Those fingerprints and accompanying demographic information and information concerning the arrest are be forwarded to the Criminal Information Center (CIC). The forwarding is electronic from Live Scan devices and Card Scan devices, or manual through the US Mail. The fingerprints are used to establish positive identification, linking the arrest to previous criminal history of the arrest subject. An Arrest Tracking Number (ATN) on the fingerprint card establishes the linkage which connects the arrest data with data from subsequent events in the criminal justice cycle. The prosecutor decides whether to file charges resulting from the arrest. Next, the prosecutor will be asked to report filings and will be required to report declinations to the MCHS, providing the ATN with the decision data. The assignment of an arrest case to a prosecution agency depends on locality and severity of the offense charged. The court receives the filed charges and disposes of them, typically by dismissal, acquittal or conviction. The court reports the disposition including the ATN through the Administrative Office of the Courts (AOC) who then reports the data to the MCHS. The DOC receives sentenced felony prisoners and reports reception of prisoners to the MCHS along with fingerprint images, but without an ATN. The MCHS establishes a one-to-one correspondence between the DOC number and the SID number by fingerprint comparison. The DOC also records and reports major status changes to the MCHS for every person under its control or supervision. These reports contain a unique DOC number. Criminal justice agencies throughout the State may request criminal history information from the MCHS for any lawful purpose. The inquiries may contain fingerprint images, in which case the response is based on positive identification, or may not contain such images, in which case the responses are based on the information provided in the inquiry and be of a lesser degree of certainty. Other State agencies and citizens and certain out-of-state agencies may also make inquiries of the MCHS to the extent provided by the legislature. Fees may or may not be charged for such queries, as the legislation provides. Inquiries may require or not require fingerprints as provided by the legislation. State fingerprint experts will search crime scene fingerprints against the file in order to link MCHS subjects to such crime scenes. The MCHS is subdivided into seven separate subsystems that are related to one another. The definition of each subsystem is provided as an overview to provide a foundation for the reader so that they may better understand the work flows that are used to define the conceptual use of MCHS. The overall computer systems are shown in Exhibit 1-1. AFIS. The NEC AFIS21 is designed for efficient and accurate tenprint processing. This subsystem is designed for a paperless environment as the majority of the search requests are received from MCHS in the form of electronic data. The subsystem stores both tenprint and latent fingerprint records in a series of databases built to enhance electronic searches. Data Entry. The Data Entry subsystem allows users to enter data from any authorized workstation within the MCHS. The purpose of this subsystem is to facilitate the entry and maintenance of the data from all end users and to allow retrieval of information by authorized users. Data may take the form of text messages, queries, fingerprint images, mug shots, or other source document images.  Exhibit 1-1. Overall MCHS System. MCHS Switch. The MCHS Switch subsystem is a routing and delivery agent for law enforcement messages generated on Datamaxx (or similar) workstations and serviced by software in the Repository and Mug Shot subsystems. It also provides the service of message routing for non-MCHS users. This service consists of routing messages and responses between users on Datamaxx workstations or legacy terminals and information sources external to MCHS including DMV, NCIC, and NLETS. Fingerprint information is not carried by the MCHS Switch. Controller. The Controller subsystem manages the document work flow. Upon receipt of an incoming source document, the Controller identifies the document type, validates its contents, logs its receipt, determines what processing is required, and passes it to the first processing objective. The work is either processed immediately or placed in a work queue depending on human and machine resource availability. The controller manages work flow queues, moving work through the MCHS work flow based upon criteria established by MCHS management. Repository. The Repository subsystem provides for the receipt, storage, and retrieval of criminal history records. The information is returned in presentation (paper) and transmission (electronic) formats. It also supports ad hoc querying and reporting. Mug Shot. The Mug Shot subsystem provides for the receipt, storage, and retrieval of mug shot images associated with a persons criminal history record. Archive. The Archive subsystem stores all source documents and Document-in-Process (DIP) records. It stores image and textual data (electronic versions of source documents and DIP records), collects statistical operations data, and provides tools to generate ad hoc and fixed-period reports. 2.0 Referenced Documents 2.1 State Documents The following document contains requirements for the MCHS system and is referenced in Appendix A. Request for Proposals, Number 2776, for Implementation of the Mississippi Criminal History System, Department of Information Technology Services, State of Mississippi, 1996. This document is referred to as RFP 2776 throughout the ICD. 2.2 Other Government Documents The following Federal Government documents are required: Integrated Automated Fingerprint Identification System (IAFIS) Interface Control Document. Electronic Fingerprint Transmission Specification (EFTS), US Department of Justice (DOJ), Federal Bureau of Investigation (FBI), Criminal Justice Information Services (CJIS) Division, August 1995. Data Format for the Interchange of Fingerprint Information, American National Standards Institute/National Institute of Standards and Technology (ANSI/NIST), ANSI/NIST CSL-1-1993. Data Format for the Interchange of Fingerprint, Facial & SMT Information, ANSI/NIST-ITL 1a-1997, addendum to ANSI/NIST CSL-1-1993. Interstate Identification Index (III) Operational and Technical Manual, US Department of Justice (DOJ), Federal Bureau of Investigation (FBI), Identification Division. Criminal Justice Information Services (CJIS) Wide Area Network Interface Specification, 1997. National Crime Information Center (NCIC) 2000 Message Book. National Crime Information Center (NCIC) Operating Manual. 2.3 Other Documents The following two documents are required to develop the two NCIC/NLETS interfaces. 1. National Law Enforcement Telecommunications System Users Guide. 2. Message Header Processing in the Law Enforcement Environment using the Datamaxx Message Processing ProtocolSYMBOL 212 \f "Symbol" \s 11__ (DMPP-2020), A white paper Revision 3, July 1997, Datamaxx Applied Technologies, Inc. 3780 Peddie Drive Tallahassee, Florida, 32303 (904) 575-1023. 3. Request For Comment (RFC) 1521, MIME (Multipurpose Internet Mail Extensions), September 1993. 3.0 Interface Requirements The section provides the technical interface requirements for the four MCHS interfaces. 3.1 Messages Transmitted from Directly Connected Client Workstations 3.1.1 Basic Transport Protocol Connection to the MCHS Switch from workstations must use TCP/IP socket streams. The MCHS Switch shall act as the server, the workstation as the client. Specific port numbers and IP addresses are assigned at implementation by the Network Administrator. All messages are framed with the NCIC-2000 message wrapper. The DMPP-2020 document provides an example of one implementation of the NCIC-2000 message header. The framing used is as follows: STRP a four character ASCII start pattern (ff 00 aa 55) indicating the start of a message. cccc a 32-bit binary count including the lengths of the start and end patterns and the length of cccc (4), transmitted in network order. (The value should be the length of the message plus 12). Example: Hex bytes (00, 00, 00, 66) for a binary length of 102 (counting returns and line feeds. The message itself. NCIC-2000 escape sequences for embedded binary images are possible. These are prefixed by the tag IMG/ and followed by a binary byte count, then the image data. ENDP a four character ASCII end pattern (55 aa 00 ff) indicating the end of a message. 3.1.2 Connecting Client Workstations 3.1.2.1 CIC Responsibilities The CIC is responsible for assigning a client workstation record in the database and adding an object mailbox to the line. The information includes: Client workstation name Client workstation IP address Client workstation security profile The CIC is also responsible for providing the IP address and port number of the MCHS Switch as well as the IP address of the client workstation to the vendor. 3.1.2.2 Vendor Responsibilities The vendor is responsible for using the IP addresses and client workstation name provided by the CIC. Client workstations must provide NCIC and NLETS messages in the proper format as described in the appropriate manuals. 3.1.3 Security 3.1.3.1 CIC Responsibilities Workstation and user permissions are assigned and entered into MCHS by the MCHS System Administrator. This activity must be coordinated and accomplished prior to first use of MCHS by either a new user or a new workstation. A description of this activity is beyond the scope of this document. 3.1.3.2 Client Responsibilities The client is responsible for signing on to the MCHS Switch prior to any other message activity. During this sign, on assignment of security keys is made. This is derived from the set of tasks permitted the individual user and those tasks allowed from the specified client workstation. The combination of client and client workstation permissions must be satisfied before any task can be performed. The MCHS Switch supports only one sign-on session per client. If a client signs-on at a second workstation while a session is active at the first, the MCHS Switch will automatically sign the client off from the first client workstation prior to completion of sign-on at the second client workstation. Clients must sign off when all tasks have been completed. It is not sufficient to power-off the PC, the sign-off screen must be invoked. During the period the user is signed on, all messages that are logged are tagged with the users ID. These messages will be stored indefinitely at the Criminal Information Center. The format of the sign on and sign off messages are described below: Sign On Message The Sign On Message allows authorized users to access the MCHS Switch. The Sign On Message consists of four mandatory fields plus the message identifier all delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDOPSMust always be present as DOPS.Agency5 maxAlphanumericMCHOnly value allowedOperator ID8 AlphanumericValid operator IDPassword6-8AlphanumericValid passwordWorkstation5 alphanumericValid workstationORI9AlphanumericValid ORIAn example of a Sign On Message is: DOPS/mch/operid/passwd/TUPE1/MSMHP0000 Sign Off Message The Sign Off Message notifies the MCHS Switch that the user session is terminated. It consists of a single mandatory field consisting of the message identifier. No other data is required. The Sign Off Message must be the last message sent to the MCHS Switch when terminating a session. The message format is below. FieldLengthFormat ValueNotesIdentifier4 alphanumericOPXMust always be present as OPX.An example of a Sign Off Message is: OPX 3.1.4 Message Structure All messages sent to MCHS Switch from client workstations receive an acknowledgment. This one line string contains the name of the workstation repeated twice followed by the date and time and the number of the message received from the workstation that day. The acknowledgment message format is below. Acknowledgment Message FieldLengthFormat ValueNotesWorkstation Name5AlphanumericValid Workstation NameSending workstation nameBlank1AlphanumericBlankWorkstation Name5alphanumericValid Workstation NameRepetition of first fieldBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of the message sent from the workstation. It is reset at midnight.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch received the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch received the messageMessage End1Newline CharacterNewline characterAn example of an Acknowledge Message is: 21120 21120 0004 12:00:00 01/02/98 This example indicates that workstation 21120 sent MCHS Switch a message at 12:00 on January 2, 1998 and it acknowledges the fourth message sent that day. In addition, all unsolicited messages received at a workstation have three parts described below. Source Information. A one line string about the source giving the name, date and time, and the inbound message number of the message. Message. Complete text of the message/response. Destination Information. A one line string about the destination giving the name, date and time, and the outbound message number of this message. The formats of these messages are below. Source Information Portion FieldLengthFormat ValueNotesWorkstation Name5AlphanumericValid Workstation NameResponding workstationBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of message received from the sender.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch received the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch received the messageMessage End1Newline CharacterNewline characterAn example of the Source Information portion is: NCIC 1203 12:00:03 01/02/98 This example indicates that NCIC is sent a response at three seconds past noon on January 2, 1998 and it is the 1,203 response from NCIC. Message Portion The format of the message depends on the sender. Destination Portion FieldLengthFormat ValueNotesWorkstation Name5alphanumericValid Workstation NameReceiving workstation nameBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of message sent to the workstation. It is reset at midnight.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch created the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch created the messageMessage End1Newline characterNewline characterAn example of the Destination portion is: 21120 0005 12:01:00 01/02/98 This example indicates the response/message above was received by workstation 21120 at one minute past midnight on January 2, 1998 and it was the fifth message received. Messages bound for NCIC follow the formats described in the NCIC manuals beginning with the Message Key (MKE). The MCHS Switch places additional header information on all NCIC messages but this is not the responsibility of the transmitting terminal. Messages bound for NLETS follow the formats described in the NLETS manual. There is no special NLETS header. Messages bound for the workstations from the MCHS Switch subsystem are treated as unformatted text. There is no special processing for any message received regardless of its source: NLETS, NCIC, MCHS. There are seven MCHS specific messages which the MCHS Switch processes. Workstations integrating with MCHS must support these messages. They are described below: Change Password The Change Password Message directs the MCHS Switch to change a users password. The Change Password Message consists of three mandatory fields plus the message identifier all delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 alphanumericDPWDMust always be present as DPWD.New Password6-8alphanumericOld Password6-8alphanumericMust be a valid password.Confirmation6-8alphanumericMust be identical to the New Password field.An example of a Change Password Message is: DPWD/0abcde/psswrd0/0abcde Local Administrative Message The Local Administrative Message is used to send free-text messages to up to five terminal destinations within the MCHS user community. The Local Administrative Message consists of a combination of mandatory fields. The fields are positional. An exception is the Terminal Destination which can occur from one to five times. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDMSGMust always be present as DMSG. It is delimited by a single slash /.Network Source4 (may expand to 5)AlphanumericMCHSCurrently there is only one network supported, MCHS. This value is followed by a single comma ,.Workstation Source5AlphanumericMust be the five-character workstation id. It is delimited by a single comma ,.Network Destination4 (may expand to 5)AlphanumericCurrently there is only one network supported, MCHS. This value is followed by a single comma ,.Terminal Destinations5 or 9AlphanumericOne to five terminal ids or ORIs which will receive the message. They are delimited by a single comma ,, and ended by a single period ..Message TextUp to 15,000 AlphanumericFree text An example of a Local Administrative Message is: DMSG/MCHS,TUPE1,MCHS,BATES1, ORI456789. The Tupelo office will send the requested materials today Find Message The Find Message is used to search for, and find messages stored by the MCHS Switch in its local data stores. This message will not search archived messages stored on the Level II Journal System. Only the message IDs are returned. Contents of the message must be displayed using the Display Messages Message. A user may find messages from/to the users workstation only. The Find Message consists of a combination of mandatory and optional fields. Fields are preceded by a three-character tag consisting of two alphanumeric characters followed by a slash /. The associated data follows. Fields are delimited by a single space . The fields are keyword driven, and are optional. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDAMFMust always be present as DAMF. It is delimited by a single slash /.From Date11DD-MMM-CCYYBegins with FD/followed by beginning date for search.From Time8HH:MM:SSBegins with FT/followed by beginning time for search.To Date11DD-MMM-CCYYBegins with TD/followed by the search stop dateTo Time11HH:MM:SSBegins with TT/followed by the search stop timeMessage Number9AlphanumericBegins with MN/followed by the message number to be searched for.Sending Workstation5AlphanumericBegins with SW/followed by Sending Workstation which is the subject of the search.Receiving Workstation5AlphanumericBegins with RW/followed by Receiving Workstation which is the subject of the search.Message Type1AlphanumericBegins with MT/followed by the message type. Currently not implemented. An example of a Find Message is: DAMF/FD/01-FEB-1997 FT/10:22:49 TD/03-FEB-1997 TT/01:10:59 /MN123456780abdc RW/TUPE1 SW/BATE1 Display Messages The Display Messages Message directs the MCHS Switch to display a previously retrieved message. The Display Messages Message consists of a single optional field plus the message identifier delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDAMDMust always be present as DAMD.Message Number14AlphanumericMessage number assigned to the message by the MCHS Switch subsystemAn example of a Display Messages Message is: DAMD/5001 Operator Display The Operator Display Message displays all currently logged on operators and their assignments. The Operator Display Message begins with the message identifier delimited by a single slash /. Fields are preceded by a three-character tag consisting of single alphanumeric character followed by a slash /. The associated data follows. Fields are delimited by a single space . The fields are keyword driven, and are optional. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDOPDMust always be present as DOPD.Operator ID8AlphanumericValid operator ID preceded by a O/ and followed by a space .Last Name30AlphanumericLast name proceeded by a L/and followed by a space.First Name20Alphanumeric First name proceeded by a F/and followed by a space.An example of a Display Messages Message is: DOPD/O/12345678 L/Smith F/John Request Mail The Request Mail Message displays responses to previously requests. When a MCHS Switch-unique message response has been satisfied the user is notified. When he wants to review the response he submits a Request Mail Message. The Request Mail Message consists solely of the message identifier. The message is defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDMADMust always be present as DMAD.An example of a Request Mail Message is: DMAD 3.2 Message Transmitted from Terminal Servers A number of workstations on a local-area network may be connected to a server that may act as a concentrator or perform some preliminary formatting or message wrapping before passing the message on. It also may receive messages wrapped, and in this case, remove the wrapping before passing the message on to the local-area network. Basic Transport Protocol The following layers are contained in the basic transport protocol. Contents4Transaction (message)3MCHS Switch Prefix2Message framing1TCP/IP Connection to the MCHS Switch from local-area network systems must use TCP/IP socket streams. The MCHS Switch acts as the server. The terminal server acts as a router. The network administrator for the MCHS Switch assigns specific port numbers and IP addresses at implementation for the terminal server. The local-area network administrator for the district or clients assigns specific port numbers and IP addresses for the client workstations. The terminal server must prefix all messages sent to the MCHS Switch with the MCHS Switch prefix. This is used to identify the client workstation associated with the message. The terminal server must then frame the resulting message with the NCIC-2000 message wrapper. The DMPP-2020 document provides an example of one implementation of the NCIC-2000 message wrapper. The framing used is as follows: STRP a four character start pattern (ff 00 aa 55) indicating the start of a message. cccc a 32-bit binary count including the lengths of the start and end patterns and the length of cccc (4), transmitted in network order. (The value should be the length of the message (including the MCHS Switch prefix) plus 12. The MCHS Switch prefix. This prefix contains the name of the client workstation source for the message. The MCHS Switch prefix terminates with a period. Source 5 bytes 4-character source names have a blank in the 5th byte Delimiter 1 byte Delimiter is a period The message itself. NCIC-2000 escape sequences for embedded binary images are possible. These are prefixed by the tag IMG/ and followed by a binary byte count, then the image data. ENDP a four character end pattern (55 aa 00 ff) indicating the end of a message. An example of a vehicle query from a client workstation name TERM1 on a terminal server with the MCHS Switch prefix added: TERM1.QV.MS0000000.LIC/ABC123.LIS/MS This message is 36|10 or 24|16 bytes long. The binary byte count in hex would be 00 00 00 24. After the message is wrapped with the framing patterns the resultant message looks like: ff 00 aa 55 00 00 00 24 TERM1.QV.MS0000000.LIC/ABC123.LIS/MS 55 aa 00 ff Messages for a client workstation on a terminal server follow the same format. An example of a response message to a client workstation named TERM1 on a terminal server with the framing and byte count removed but the MCHS Switch prefix in place: TERM1.MS0000000 NOT ON FILE ABC123 3.2.2 Connecting Terminal Servers 3.2.2.1 CIC Responsibilities To add a terminal server to the MCHS Switch, the CIC is responsible for the following: Assigning a name for the line and terminal server Assigning an IP address for the terminal server Adding a line for the terminal server Adding an object mailbox for the line Adding an object mailbox for the terminal server Adding a terminal server record to the database including: Terminal server name Terminals server IP address The CIC is also responsible for providing the IP address and port number of the MCHS Switch as well as the IP address of the terminal server to the vendor. 3.2.2.1.1 Adding Terminal Server Client Workstations Client workstation and client permissions are assigned and entered into MCHS Switch by the MCHS System Administrator. This activity must be coordinated and accomplished prior to first use of MCHS by either a new user or a new workstation. Only client workstations are addressed in this document. To add a terminal server client workstation to the MCHS Switch, the CIC is responsible for the following: Assigning a name for the client workstation Adding and object mailbox for the client workstation Adding a workstation record to the database for the client workstation including: Client workstation name Client workstation security profile 3.2.2.2 Vendor Responsibilities The vendor is responsible for using the IP addresses and client workstation name provided by the CIC. Client workstations must provide NCIC and NLETS messages in the proper format as described in the appropriate manuals. Whenever a terminal server looses a connection, it must wait 30 seconds before trying to reconnect. 3.2.3 Security Security is implemented at two levels. First, the terminal server must make an IP connection to the MCHS Switch. The connection will succeed only if the IP address in the record for the terminal server matches the IP address provided by the terminal server. The second level occurs when a user at a client workstation signs on to the terminal server. The terminal server will provide the MCHS Switch with certain pertinent information that allows the MCHS Switch to sign the client on. 3.2.3.1 CIC Responsibilities Workstation and user permissions are assigned and entered into MCHS System by the MCHS System Administrator. This activity must be coordinated and accomplished prior to first use of MCHS by either a new user or a new workstation. During this activity, assignment of security keys is made. This is derived from the set of tasks permitted the individual user and those tasks allowed from the specified client workstation. The combination of client and client workstation permissions must be satisfied before any task can be performed. 3.2.3.2 Vendor Responsibilities The terminal server is responsible for maintaining security between the terminal server and the client workstations. The client workstations must sign on and off of the terminal server. The terminal server is responsible for informing the MCHS Switch when a client signs on or off the terminal server. The format of the sign on and sign off messages sent to the MCHS switch are described below. All messages sent from the terminal server to the MCHS Switch must identify the name of the client workstation that is the source of the message by using the MCHS Switch prefix as described in the section on Basic Transport Protocol for Message Transmitted from Terminal Servers. Sign On Message The Sign On Message allows authorized users to access the MCHS Switch. The Sign On Message consists of five mandatory fields plus the message identifier all delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 alphanumericDOPSMust always be present as DOPS.Agency5 maxAlphanumericMCHOnly value allowedOperator ID8 alphanumericValid operator IDPassword6-8alphanumericValid passwordWorkstation5 alphanumericValid workstationORI9AlphanumericValid ORIAn example of a Sign On Message is: DOPS/mch/operid/passwd/TUPE1/MSMHP0000 Sign Off Message The Sign Off Message notifies the MCHS Switch that the user session is. It consists of a single mandatory field consisting of the message identifier. No other data is required. The Sign Off Message must be the last message sent to the MCHS Switch when terminating a session. The message format is below. FieldLengthFormat ValueNotesIdentifier4 alphanumericOPXMust always be present as OPX.An example of a Sign Off Message is: OPX 3.2.3.2 Client Responsibilities The client is responsible for signing on to the terminal server prior to any other message activity. Clients must sign off when all tasks have been completed. It is not sufficient to power-off the client workstation, the sign-off screen must be invoked. During the period the client is signed on, all messages that are logged are tagged with the users ID. These messages will be stored indefinitely at the Criminal Information Center The MCHS Switch supports only one sign-on session per client. If a client signs-on at a second workstation while a session is active at the first, the MCHS Switch will automatically sign the client off from the first client workstation prior to completion of sign-on at the second client workstation. 3.2.4 Message Structure All messages sent to MCHS Switch from client workstations receive an acknowledgment. This one line string contains the name of the workstation repeated twice followed by the date and time and the number of the message received from the workstation that day. The acknowledgment message format is below. Acknowledgment Message FieldLengthFormat ValueNotesWorkstation Name5alphanumericValid Workstation NameSending workstation nameBlank1AlphanumericBlankWorkstation Name5alphanumericValid Workstation NameRepetition of first fieldBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of the message sent from the workstation. It is reset at midnight.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch received the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch received the messageMessage End1Newline CharacterNewline characterAn example of an Acknowledge Message is: 21120 21120 0004 12:00:00 01/01/98 This example indicates that workstation 21120 sent MCHS Switch a message at 12:00 on January 1, 1998 and it acknowledges the fourth message transmitted that day. In addition, all unsolicited messages sent to a terminal server for a client have three parts described below. Source Information. A one line string about the source giving the name, date and time, and the inbound message number of the message. Message. Complete text of the message/response. Destination Information. A one line string about the destination giving the name, date and time, and the outbound message number of this message. The formats of these messages are below. Source Information Portion FieldLengthFormat ValueNotesWorkstation Name5alphanumericValid Workstation NameResponding workstationBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of message received from the sender.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch received the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch received the messageMessage End1Newline CharacterNewline characterAn example of the Source Information portion is: NCIC 1203 12:00:03 01/01/98 This response indicates that NCIC is sending a response at three seconds past noon on January 1, 1998 and it is the 1,203 response from NCIC. Message Portion The format of the message depends on the sender. Destination Portion FieldLengthFormat ValueNotesWorkstation Name5alphanumericValid Workstation NameReceiving workstation nameBlank1AlphanumericBlankMessage Number4NumericWhole NumberNumber of message sent to the workstation. It is reset at midnight.Blank1AlphanumericBlankTime8hh:mm:ssValid hour, minute, and secondTime MCHS Switch created the messageBlank1AlphanumericBlankDate8mm/dd/yyValid month, day, yearDate MCHS Switch created the messageMessage End1Newline CharacterNewline characterAn example of the Destination portion is: 21120 0005 12:00:03 01/01/98 This example indicates the NCIC response above was sent to workstation 21120 at three seconds past midnight on January 1, 1998 and it was the fifth message sent to 21120. Messages bound for NCIC follow the formats described in the NCIC manuals beginning with the Message Key (MKE). The MCHS Switch places additional header information on all NCIC messages but this is not the responsibility of the transmitting terminal. Messages bound for NLETS follow the formats described in the NLETS manual. There is no special NLETS header. Messages bound for the workstations from the MCHS Switch subsystem are treated as unformatted text. There is no special processing for any message received regardless of its source: NLETS, NCIC, MCHS. There are seven MCHS specific messages which the MCHS Switch processes. Client workstations integrating with MCHS must support these messages. They are described below: Change Password The Change Password Message directs the MCHS Switch to change a users password. The Change Password Message consists of three mandatory fields plus the message identifier all delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 alphanumericDPWDMust always be present as DPWD.New Password6-8alphanumericOld Password6-8alphanumericMust be a valid password.Confirmation6-8alphanumericMust be identical to the New Password field.An example of a Change Password Message is: DPWD/0abcde/psswrd0/0abcde Local Administrative Message The Local Administrative Message is used to send free-text messages to up to five terminal destinations within the MCHS user community. The Local Administrative Message consists of a combination of mandatory fields. The fields are positional. An exception is the Terminal Destination which can occur from one to five times. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDMSGMust always be present as DMSG. It is delimited by a single slash /.Network Source4 (may expand to 5)AlphanumericMCHSCurrently there is only one network supported, MCHS. This value is followed by a single comma ,.Workstation Source5AlphanumericMust be the five-character workstation id. It is followed by a single comma ,.Network Destination4 (may expand to 5)AlphanumericCurrently there is only one network supported, MCHS. This value is followed by a single comma ..Terminal Destinations5 or 9AlphanumericOne to five terminal ids or ORIs which will receive the message. They are delimited by a single comma ,, and ended by a single period ..Message TextUp to 15,000 AlphanumericFree text An example of a Local Administrative Message is: DMSG/MCHS,TUPE1,MCHS,BATES1, ORI456789. The Tupelo office will send the requested materials today. Find Message The Find Message is used to search for, and find messages stored by the MCHS Switch in its local data stores. This message will not search archived messages stored on the Level II Journal System. Only the message IDs are returned. Contents of the message must be displayed using the Display Messages Message. A user may find messages from/to the users workstation only. The Find Message consists of a combination of mandatory and optional fields. Fields are preceded by a three-character tag consisting of two alphanumeric characters followed by a slash /. The associated data follows. Fields are delimited by a single space . The fields are keyword driven, and are optional. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDAMFMust always be present as DAMF. It is delimited by a single slash /.From Date11DD-MMM-CCYYBegins with FD/followed by beginning date for search.From Time8HH:MM:SSBegins with FT/followed by beginning time for search.To Date11DD-MMM-CCYYBegins with TD/followed by the search stop dateTo Time11HH:MM:SSBegins with TT/followed by the search stop timeMessage Number9AlphanumericBegins with MN/followed by the message number to be searched for.Sending Workstation5AlphanumericBegins with SW/followed by Sending Workstation which is the subject of the search.Receiving Workstation5AlphanumericBegins with RW/followed by Receiving Workstation which is the subject of the search.Message Type1AlphanumericBegins with MT/followed by the message type. Currently not implemented. An example of a Find Message from workstation TUPE1 is: DAMF/FD/01-FEB-1997 FT/10:22:49 TD/03-FEB-1997 TT/01:10:59 /MN123456780abdc RW/TUPE1 SW/BATE1 Display Messages The Display Messages Message directs the MCHS Switch to display a previously retrieved message. The Display Messages Message consists of a single optional field plus the message identifier delimited by a single slash /. The fields are positional within the message. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDAMDMust always be present as DAMD.Message Number14AlphanumericMessage number assigned to the message by the MCHS SwitchAn example of a Display Messages Message is: DAMD/5001 Operator Display The Operator Display Message displays all currently logged on operators and their assignments. The Operator Display Message begins with the message identifier delimited by a single slash /. Fields are preceded by a three-character tag consisting of single alphanumeric character followed by a slash /. The associated data follows. Fields are delimited by a single space . The fields are keyword driven, and are optional. The fields are defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDOPDMust always be present as DOPD.Operator ID8AlphanumericValid operator ID preceded by a O/ and followed by a space .Last Name30AlphanumericLast name proceeded by a L/and followed by a space.First Name20Alphanumeric First name proceeded by a F/and followed by a space.An example of a Display Messages Message is: DOPD/O/12345678 L/Smith F/John Request Mail The Request Mail Message displays responses to previously requests. When a MCHS Switch-unique message response has been satisfied the user is notified. When he wants to review the response he submits a Request Mail Message. The Request Mail Message consists solely of the message identifier. The message is defined in the table below: FieldLengthFormat ValueNotesIdentifier4 AlphanumericDMADMust always be present as DMAD.An example of a Request Mail Message is: DMAD 3.3 Card Scan MCHS receives and processes NIST-style (National Institute for Standards and Technology) tenprint messages from Card Scan workstations. Source document content is entered through the Card Scan workstations. The Card Scan software then packages the documents into NIST format and transmits the NIST files to the Controller subsystem via MIME-encoded SMTP e-mail. After the Controller parses and validates the header information, it forwards the NIST transactions to the appropriate subsystems such as AFIS and Repository for further processing. After the transactions have been processed, the Repository may generate an output message such as a rap sheet (in either printed form or ANSI/NIST form) or EFTS file. ANSI/NIST responses will be sent via MIME-encoded SMTP e-mail to the recipients such as an ORI agency or the FBI. A NIST-formatted transaction consists of a number of different record types. The type 1 record serves as a message header containing basic source and destination information. Type 2 records contain textual identification and descriptive information from the source document. Type 4 records contain fingerprint image data. Type 7 data records contain the source document image. Type 10 records contain mug shots. 3.3.1 Basic Transport Protocol Connection to the Controller subsystem from Card Scan workstations must be via SMTP or POP3 e-mail. After a data entry operator enters the text data and scans in the fingerprint images, the Card Scan software validates the text data, then packages the text data and images into NIST format. The NIST format data is then transmitted to the Controller subsystem via MIME-encoded SMTP/POP3 e-mail. (MIME stands for Multipurpose Internet Mail Extensions.) The e-mail message must contain the following header items: To: controller@mscjis.mchs.state.ms.us or To: controller@10.64.1.121, From: , Subject: as described below, Content-type: application/octet-stream, and Content-transfer-encoding: Base64. Note that the NIST file is the only content of the message and that MIME content type of multi-part/mixed (with one part being application/octet-stream) is not allowed. Binary data is encoded using base 64 as documented in the MIME RFC. Except for the subject line described below, the case of elements in the header generally does not matter. Each e-mail message must have a subject line in this format: ; ; , ; ; Note that the fields in the subject line are separated by a semi-colon ";" except for the Last Name, which is followed by a comma. For example, the subject line of an Arrest Fingerprint transaction looks like this: ARR; 0001620681; Johnson, Curtis; 19470805; C The fields in the subject line are defined in the table below: FieldLengthFormat ValueNotesTOT3alphabeticalType of transaction: ARR, APP, or DOCFollowed by a semi-colon.Unique ID Numberup to 12alphanumericFor ARR, it is the Arrest Tracking Number. For APP, Originating Agency Identifier. For DOC, Department of Corrections Number.Followed by a semi-colon.Last Name35alphabeticalSubject's last nameFollowed by a comma. Mixed case.First Name20alphabeticalSubject's first nameFollowed by a semi-colon. Mixed case.DOB8numericSubject's date of birth Must be in format CCYYMMDDL/C1alphabetical"L" for Live Scan "C" for Card Scan"L" if the data is transmitted from Live Scan; "C" if transmitted from Card Scan 3.3.2 Security Security for Card Scan submissions is handled at the Card Scan workstations prior to submission and at the Controller subsystem after submission. Not all operators are enabled to enter data for all source documents. The Card Scan software checks the operator's access privileges before committing any data to the database. The Card Scan devices have their own machine dependent set of user names and passwords that must match those pairings stored in the Repository server. The user name entered in the Card Scan appears on the FROM line of the e-mail messages sent to the Controller subsystem. After the transaction is received by the Controller, the Controller requests the user validation service from the Repository subsystem to validate the user's access privileges and returns the validation status along with other information to the Controller. If it is found that the user is not authorized to enter the transaction, a rejection message will be sent to the user mchs in the Repository server via SMTP e-mail. 3.3.3 Outgoing Message Structure The NIST data consists of two types of records: textual and binary. The textual records are divided into fields, subfields, and items. Each field has a tag of the form t.nn: where t is the record type number and nn is a field number. ASCII control characters FS, RS, GS, and US separate values which are in ASCII. FS separates records; GS separates fields within records; RS separates subfields within fields; and US separates items within subfields. The binary records have a binary byte count followed by data in fixed fields. The following types of NIST records are used in MCHS: Type 1 Record: The header record contains textual information about the transaction such as the type of transaction, (arrest fingerprint, applicant fingerprint, etc.), originator, date and priority, and logical record length. The fields in the Type 1 Record are defined in the table below: Field #FieldMandatoryLengthFormat Field Description1.01LENYesNumericLogical record length1.02VERYes4NumericFormat version number1.03CNTYesInventory of contents1.04TOTYes3AlphanumericType of transaction1.05DATYes8NumericDate in format CCYYMMDD1.06PRYNo1NumericPriority1.07DAIYes9AlphanumericDestination agency identifier1.08ORIYes9AlphanumericOriginating agency identifier1.09TCNYes16AlphanumericTransaction control number1.10TCRNo16AlphanumericTransaction control reference number1.11NSRYes6AlphanumericNative scanning resolution1.12NTRYes6AlphanumericNominal transmitting resolution Type 2 Record: This record contains the textual information associated with the specific transaction. The format of this record varies depending on the transaction type. The field definitions of the Type 2 Record can be found in Appendix A. Type 4 Record: High resolution grayscale image record containing fingerprint binary data from the card scan devices, as defined in ANSI/NIST Standard and compliant with FBI/EFTS image content requirements. There may be up to fourteen Type 4 records. Type 7 Record: Operator-defined binary data transmissions are defined for Type 7 records. The MCHS uses Type 7 records for transmission of all MCHS document images such as fingerprint cards and prosecutor disposition forms. Type 7 records are Fax Group Four compressed within a TIFF format. These records are not required from remote Card Scan or Live Scan devices. Type 10 Record: A combination of text fields and binary data containing a mug shot image. Type 10 records may be present but are stored only for DOC transactions. The field definitions of the Type 2 Record can be found in Appendix A. This purpose of this appendix is to define the field structure and attributes for the electronic formats in which source document data is transmitted from the Data Entry subsystem to the Controller. The NIST Type-2 message formats limit and define the data structures which are provided to store MCHS data. These not only have an important bearing on the MCHS internal functionality, but on the MCHS data compatibility with external applications such as the Interstate Identification Index (III). 3.3.4 Incoming Messages and Processing Requirements The data edit tables which Data Entry work stations use to perform local context-free data verification are retained, managed, and distributed from the Repository. These edit tables are kept in the MCHS Repository so that standard data integrity procedures can be applied to assure accurate, consistent maintenance of all database entries. They are maintained by the Enhanced CCH workstation, using an Oracle Forms application provided as part of the Repository subsystem. In order to reduce network traffic, local copies of the edit tables are maintained on the Data Entry workstations and initial field-level editing takes place there. The Repository downloads the edit tables only if they have changed since the operator last logged on. After updates have been made to MCHS edit tables, an administrator can select to push these new values out to the field via a menu option in the Enhanced Criminal History workstation application. This menu option creates a file of all edit values and e-mails it to every remote station. The format of each line in this file is as follows: A 20 character element name corresponding to an ANSI/NIST field or subfield, A single space, A 30 character code value for the field or subfield, A single space, and A 120-character description for the code value. where an element delineates a particular set of codes (e.g. Agency, Eye Color, Hair Color) as shown in the table below. AgencyAgency TypeArrest TypeCitation TypeCorrect AgencyCorrections StatusCountryCourt AgencyCourt EventEnforce AgencyEnforce EventEye ColorHair ColorMisc Number TypeMoney ConditionName SuffixNotify ForProsecute AgencyProsecute EventRaceRap Sheet TypeReason FingerprintedSample TypeSeveritySexStateStatuteSupplementTattooTime ConditionYes/NoYes/No/UnknownYes/UnknownSome of these element names relate to fields in prosecutor or court dispositions and hence do not apply to tenprint source documents. These edit elements and codes should be ignored. The element, code, and description fields are right padded with spaces. The edit table update message is addressed to an e-mail recipient taken to be the card scan station itself, not to a specific operator of the station. The e-mail message is a normal ASCII text message with a subject of EDT. The Data Entry subsystem does not provide ordinary operators with the ability to update the data edit tables. Requested updates to these tables must be transmitted to DPS through normal administrative channels, and are implemented only by authorized personnel at the MCHS central site. 3.4 Live Scan The Live Scan is very similar in function to the Card Scan portion of the document scanning station in capturing and submitting fingerprint images and textual information, without using hard copy source documents in the process. The Live Scan software packages the source document information into NIST format and transmits the NIST files to the Controller subsystem via MIME-encoded SMTP e-mail. After the Controller parses and validates the header information, it forwards the NIST transactions to the appropriate subsystems such as AFIS and Repository for further processing. After the transactions have been processed, the Repository may generate an output message such as a rap sheet (in either printed form or ANSI/NIST form) or EFTS file. ANSI/NIST responses will be sent via MIME-encoded SMTP e-mail to the recipients such as an ORI agency or the FBI. A NIST-formatted transaction consists of a number of different record types. The type 1 record serves as a message header containing basic source and destination information. Type 2 records contain textual identification and descriptive information from the source document. Type 4 records contain fingerprint image data. Type 7 data records, which contain the source document image, do not apply to Live Scan operations and should not appear in the NIST transaction. Type 10 records contain mug shots. 3.4.1 Basic Transport Protocol Connection to the Controller subsystem from Live Scan workstations must be via SMTP or POP3 e-mail, just as for a Card Scan workstation. The only difference for Live Scan stations is that the final field of the subject line is L indicating Live Scan rather than C for Card Scan. See Section 3.3.1 for more detail. 3.4.2 Security The Live Scan devices have their own machine dependent set of user names and passwords that must match those pairings stored in the Repository server. The user name entered in the Live Scan will appear on the FROM line of the e-mail messages sent to the Controller subsystem. After the transaction is received by the Controller, the Controller requests the user validation service from the Repository subsystem to validate the user's access privileges and returns the validation status along with other information to the Controller. If it is found that the user is not authorized to enter the transaction, a rejection message will be sent to the user mchs in the Repository server via SMTP e-mail. 3.4.3 Outgoing Message Structure The outgoing message structure for Live Scan transactions is the same as for Card Scan transactions. See Section 3.3.3. 3.4.4 Incoming Messages and Processing Requirements Messages arriving at the Live Scan are the same as those arriving at the Card Scan (see Section 3.3.4) except that one additional message may be received. This message provides a block of Arrest Tracking Numbers (ATNs) for use by the Live Scan system. The ATN block message is addressed to an e-mail recipient taken to be the Live Scan station itself, not to a specific operator of the station. The e-mail message is a normal ASCII text message with a subject of ATN. The message body contains four lines, each consisting of a single number. The numbers have the following meanings: Lower limit of the current ATN block, Upper limit of the current ATN block, Lower limit of the next ATN block, and Upper limit of the next ATN block. The first two numbers are used to verify the current range being used at the Live Scan station. The second pair of numbers is the new range. The concept is that each station would be assigned two ranges and would MCHS Switch from the first range to the second at the appropriate time. Following the MCHS Switch, a new block of ATNs would be manually requested and subsequently sent to the station. ATNs are consecutive within the range but a check digit must be suffixed to each. The algorithm is given below. Set sum to 0 and weight to 2. Loop over the digits of the ATN from rightmost to leftmost. Multiply the current digit by the weight and add the product to the sum. Increment the weight. End loop. Divide the sum by 11 and subtract the remainder from 11. The check digit is the result of the previous step if the result is in the range 1 through 9. If the result is 10, the check digit is X and the check digit is 0 if the previous step yielded a result of 11. Appendix A ANSI/NIST Tenprint Format This appendix defines the format for the National Institute of Standards and Technology (NIST) transactions that have been used in the MCHS to transmit source document input. MCHS supports eight NIST-formatted source documents and one NIST-formatted output document (the criminal history record, or rap sheet). Each of these is identified by a Type of Transaction (TOT) value in the NIST Type-1 record that serves as a message header. The documents and their TOT values are: Document NameType of TransactionArrest Fingerprint CardARRApplicant Fingerprint CardAPPDepartment of Corrections Inmate Receipt Fingerprint CardDOCProsecutor Disposition ReportPROCourt Disposition ReportCRTConsolidation OrderCONExpunction OrderEXPDepartment of Corrections Transfer DataDCTCriminal History Record (Rap Sheet)RAPExhibit A-1. Types of Transaction Source documents described in this appendix are: Arrest Fingerprint Card, Applicant Fingerprint Card, and Department of Corrections (DOC) Inmate Receipt Fingerprint Card. Other transactions may only be entered at the MCHS central site or are not entered via fingerprint scanning stations. In addition to the NIST Type-2 records, there is a Type-10 record that is used to transmit Mug Shots. At present, only the Live Scan Workstation located at the Mississippi Department of Corrections (MDOC), Central Mississippi Correctional Facility (CMCF) provides the capability to capture a Mug Shot; consequently, Mug Shot Type-10 records, which may be included in any tenprint transaction, are processed in the DOC Inmate Receipt Fingerprint Card transaction. The format of the Mug Shot Type-10 record is described in Appendix A.3. ANSI/NIST-CSL 1-1993, paragraph 6.1, page 4, states, "For each Type-1, Type-2, and Type-9 record that is formulated, the fields contained within that record shall be numerically ordered." However, MCHS application design does not assume numeric ordering for the fields in these records. The other record types defined in the standard do not have numbered fields. We are assuming that the fields in a Type-2 record may contain printable characters only. ANSI/NIST-CSL 1-1993, paragraph 9, page 10, states, "Type-2 logical records shall contain textual information relating to the subject of the transaction and shall be represented in an ASCII format." Paragraph 9.1.3 states, "Individual fields required for given transaction types, including field size and content, shall conform to the specifications set forth by the agency to whom the transmission is sent." FBI examples show text in all upper case, but the MCHS standard will be mixed case. Information separator characters and their abbreviations are: DescriptionAbbreviationASCII CodeFile SeparatorFS1CGroup SeparatorGS1DRecord SeparatorRS1EUnit SeparatorUS1FExhibit A-2. Information Separator Characters A.1 Type-1 Record The type-1 record is as defined in the ANSI/NIST-CSL 1-1993 standard. It must be the first record in the transaction. A.2 Tenprint Type-2 Record The NIST Type-2 fields are listed below. Those fields for which a field number is available (i.e., those fields defined in the source FBI documentation) are listed first, in field number order, followed by those new fields which were identified in RFP 2776 but for which no number had been provided. For each field, the following information is provided: Field identification (field number and field name). Field description (data type and length, whether or not the field repeats, and TOTs in which the field occurs). Discussion (the source document(s) from which the field description was derived; the expected data content and function; and the considerations which determined our field description). Issues (any matters on which we required customer feedback). This section combines the message formats for the following source documents: Arrest Fingerprint Card, Applicant Fingerprint Card, and DOC Inmate Receipt Fingerprint Card. These, in turn, are represented by the following NIST TOTs: CodeDescriptionARRArrestAPPApplicantDOCDepartment of Corrections Inmate ReceiptExhibit A-3. Tenprint Card Types of Transaction Layout for the ARR TOT is taken from the EFTS CAR record, starting on page D-1, with exceptions as stated on RFP 2776 pages 83 and 84. These exceptions are listed below. Retention Code is not used; Attention Indicator is not used; Send Copy To is not used; Name and Aliases fields are combined into a single NAME field which allows multiple occurrences; Age Range is not used; Height Range is not used; Weight Range is not used; NCIC Fingerprint Classification is not used; Date of Arrest Suffix is not used; Arrest Segment Literal is not used; Court Segment Literal is not used; Custody or Supervisory Status Start Date is not used; Custody or Supervisory Status Literal is not used; Sex is redefined to allow only Male, Female; Race is redefined to provide spelled-out versions of the FBI codes; Scars, Marks, Tattoos is redefined to provide two subfields: first same as FBI list, second a free-text description; Color Eyes is redefined to provided spelled-out versions of FBI codes; Hair Color is redefined to provide spelled-out versions of FBI codes; Pattern Level Classifications will be redefined to fit the Mississippi AFIS codes; Palm Prints Available Indicator will be redefined to Yes, No; Photo Available Indicator will be redefined to Yes, No; Occupation and Employer and Address will be combined into a single field with two subfields; Arrest Tracking Number will be added; Arresting Agency ORI will be added; Driver License field will be added with two subfields: state, number; Arrest Type field will be added with these options: Adult, Juvenile, Juvenile as Adult; and Arrest Charges will be added as a field with these subfields: Severity, Counts, Citation, Description, Offense Date, Disposition. Layout for the APP TOT is taken from the EFTS NFUF record, starting on page D-19, with exceptions as stated on RFP 2776 page 87. These exceptions as excerpted from RFP 2776 are shown below. The type-1 record shall be the same as that defined for the NFUF-type electronic document in the FBI document Electronic Fingerprint Transmission Specification, the version in effect on the day of contract, with these exceptions: Type of Transaction to be APP; and Designation Agency Identifier to be the ORI for MCHS. The type-2 record for textual data shall be the same as that defined in the same FBI document, same version, except: Retention Code is not used; Attention Indicator is not used; Send Copy To is not used; Name and Aliases fields are combined into a single NAME field which allows multiple occurrences; NCIC Fingerprint Classification is not used; Place of Birth is not used; Country of Citizenship is not used; Scars, Marks and Tattoos is not used; Color Eyes is not used; Hair Color is not used; Employer and Address is not used; Occupation is not used; Residence of Person Fingerprinted is not used; Gender is redefined to allow only Male, Female; Race is redefined to provide spelled-out versions of the FBI codes; Pattern Level Classifications will be redefined to fit the Mississippi AFIS codes; Driver License field will be added with two subfields: State, Number; and Fields are added for FeePaid; ResponseAddress; Purpose. Layout for the DOC TOT is taken from the ARR TOT, with exceptions as stated on RFP 2776 page 88. These exceptions are shown below. The type-1 record is the same except: The Type of Transaction will be DOC. The type-2 record is the same except: Occupation, Employer and Address field is not used; Residence of Person Fingerprinted is not used; Date of Arrest is not used; Arresting Agency ORI will not be used; Arrest Type field will not be used; Arrest Charges field will not be used; DOC field will be added; and Previous Status field will be added. A.2.1 Tenprint Fields The field list below contains combined entries for all three Tenprint TOTs. Presented first are the fields that can be mapped from the RFP to existing EFTS fields. Following those are those new fields for which no existing EFTS field number can be identified. A.2.1.1 Existing Fields 2.001 Logical Record Length: Description: Five-digit integer; non-repeating; occurs and is mandatory on ARR, APP and DOC records. Discussion: EFTS page C-9 states, "This field contains the length of the logical record specifying the total number of bytes, including every character of every field contained in the record. The length of the LEN field is included in the total length of the record." This length includes the information separator characters. 2.002 Image Designation Character (IDC): Description: Two-digit integer; non-repeating; occurs and is mandatory on ARR, APP and DOC records. Discussion: EFTS page C-8 states, "The Image Designation Character shall be a sequentially assigned positive integer starting from zero and increasing by one for each finger position, image, or Type-2 record present. Each IDC value matches a value in the Content (CNT) field of the Type-1 message header." 2.008 "No Charge" Indicator: Description: Ten-digit integer; non-repeating; occurs and is optional on APP records only. Discussion: The name is a bit misleading. EFTS page C-11 states, "When a User Fee transaction is resubmitted and no additional payment should be charged, this field shall contain the Transaction Control Number of the original submission." The Transaction Control Number is in the Type-1 record, field number 1.09, identifier TCN. Page D-22 describes the "No Charge" Indicator as "Applicable on resubmission only so fee is not charged again," and it would appear that the presence of this field is what identifies the record as a resubmission. 2.009 Originating Agency Case Number: Description: Ten-character alphanumeric; non-repeating; occurs and is optional on ARR and APP records. Discussion: EFTS page C-11 states, "This field contains the 1-10-character Originating Agency Case Identifier (OCA) that has been assigned by this agency." This" agency means the originating agency. As a result of Technical Exchange Meeting (TEM) Number 3, it has been determined that this field does not occur on the DOC record. 2.014 FBI Number: Description: Nine-character alphanumeric; non-repeating; occurs and is optional on ARR, APP and DOC records. Discussion EFTS page C-5 states, "This field contains the subject's FBI number, if known. A valid FBI number shall be no more than nine alphanumeric characters." 2.015 State Identification Number (SID): Description: Ten-character alphanumeric; non-repeating; occurs on ARR and DOC records only; is not permitted on records input to MCHS, but is mandatory on records passed from MCHS to III. Discussion: EFTS page C-15 states, "This field contains any known state identification number. The format is the standard two-character abbreviation of the state name, followed by the number." EFTS page D-1 shows this as a 3-10 character alphanumeric item; optional; repeating, with zero to five occurrences. A length of ten characters would permit the use of eight numeric digits in addition to the two-character abbreviation of the state name. The numeric portion of the SID must include a check digit, as must the ATN, and the same check digit algorithm must be used for both. The Modulus/11 algorithm has been used as per direction by the State. The SID is the MCHS logical master key for a criminal subject. Since MCHS is the sole judge of what the correct SID is, SID is not accepted as an input value; however, once the subject has been registered in MCHS, the SID must accompany subsequent transactions regarding that subject. 2.016 Social Security Account Number: Description: Nine-digit integer; repeats zero to four times; occurs and is optional on ARR, APP and DOC records. Discussion: EFTS page C-1 states, "This field shall contain the subject's social security number, if known. This number shall be entered as nine or ten consecutive digits with no embedded punctuation characters. . . .No foreign social security numbers shall be used." EFTS page D-1 describes this field as a 9-10 digit numeric value. We know of no reason to suppose that a Social Security Number can have ten digits. NCIC Part IV, Section 16, page 4-29, states, "Must be nine numeric characters and not less than 001010001. The use of an 8 or 9 as the first character or 00 in the fourth and fifth positions is prohibited." 2.017 Miscellaneous Identification Number: Description: Alphanumeric field consisting of two subfields; repeats zero to four times; occurs and is optional on ARR, APP and DOC records. Subfields are as follows: FieldLengthNumber Type15Number Value12Exhibit A-4. Miscellaneous Number Subfields Discussion: EFTS page C-10 states, "If there are any miscellaneous identification numbers, they shall be entered in this field. The format of the data shall be a two-letter identifying code, followed by a hyphen (-), followed by the number itself. The following table lists the acceptable two-letter identifying codes. If 'AF' or 'AS' is entered, all characters following the hyphen must be numeric. Interspersed blanks are invalid. Types of numbers not listed in the following table (such as driver's license) shall not be entered. Only U.S. passport numbers shall be entered; foreign numbers shall be ignored. The size of the MNU is limited to 15 characters. . . ." EFTS page D-1 shows a 15-character MNU field consisting of a two-character type, a hyphen, and 12 characters of MNU value. We will use a more explicit structure with two subfields. The EFTS table of codes follows: Identifying AgencyCodeAir Force Serial NumberAFAlien Registration NumberARAir National Guard Serial Number, Army Serial Number, or National Guard Serial NumberASBureau Fugitive Index NumberBFCanadian Social Insurance NumberCIU. S. Coast Guard Serial NumberCGIdentification Order NumberIOMarine Corps Serial NumberMCMariner's Document or Identification NumberMDRCMP Identification or Fingerprint Section NumberMPNational Agency Case NumberNANavy Serial NumberNSPassport Number (U. S. only)PPPort Security Card NumberPSSelective Service NumberSSVeterans Administration Claim NumberVAExhibit A-5. Miscellaneous Number Codes DPS requested that a 15-character expanded type value, rather than a two-character code, will be stored in the Repository. A table of codes must be available, however, in order to convert Repository values for export to III. Further, DPS may want to use Miscellaneous Number types not found on the EFTS list of number types. These issues do not affect the message structure. 2.018 Name/Aliases: Description: Alphanumeric field consisting of four subfields; repeats zero to 11 times; occurs and is mandatory on ARR, APP and DOC records. Subfields are as follows: FieldLengthLast Name35First Name20Middle Name20Suffix4Exhibit A-6. Subject Name Subfields Discussion: RFP page 83 states, "Name and Aliases fields are combined into a single NAME field which allows multiple occurrences." For field number 2.018, NAM (Name), EFTS page C-10 states, "This field contains the name(s) of the subject. The format shall be the surname followed by a comma, followed by the given name(s), which are separated by a space. Part IV of the NCIC Code Manual describes in greater detail the manner in which each name is to be entered." For field number 2.019, AKA (Aliases), EFTS page C-1 states, "This field contains alias names of the subject. The format is the same as described in the NAM field, including NCIC formatting rules, and the same 30-character limit applies to the field length. Up to ten aliases may be provided, separated from one another by the RS character." The formatting rules are found on NCIC pages 4-1 and 4-2. The NAM field is mandatory on the ARR, APP and DOC records; combining it with the AKA field gives a total of 11 possible occurrences. Thirty characters is not enough to store certain Hispanic names, in which both the paternal and maternal surnames may occur (for example, "JOSE ANTONIO DE LA MADRID-RODRIGUEZ"). In such cases, the NCIC rule is to abbreviate the middle name and, if necessary, the first name, and then to store various permutations of the name as aliases. Also, the task of parsing out the elements of a single name field can be complex and error-prone. A better solution is to provide separate subfields for the name components, and make these subfields long enough to store a complete name without abbreviation. This is the approach contemplated in the RFP, as illustrated in the sample Rap Sheet Type-2 message on page 78 and the IDENTIFICATION table definition on page 96. We have taken the column lengths from that table. We consider, however, that the 20-character length proposed for last name is not enough, and have used 35 characters instead. Where MCHS must exchange Name data with external sources which use the standard NCIC name format, it is necessary to parse this format into the MCHS Name data elements. On page D-1, EFTS shows the ampersand as a valid character for the AKA (Alias) field but not for the NAM (Name) field. NCIC makes no mention of the ampersand. We know of no special use for an ampersand in this context, and the MCHS design makes no special provision for this character. RFP page 97 shows no edit for the suffix element, but page 104 shows EDIT table values for NameSuffix. However, the largest of these values is only three characters. The suffix is shown as four characters long, and this length has been retained. It should be emphasized to the operators, and to any consumer of the data, that this model makes no distinction between "true" name and alias. Attempts to implement or infer such a distinction (for example, by entering the "true" name first, followed by aliases, or by reading such a convention into the data) should be strongly discouraged. 2.020 Place of Birth: Description: Two-character alphanumeric; non-repeating; occurs and is mandatory on the ARR and DOC records only. Discussion: EFTS page C-12 states, "The subject's place of birth shall be entered in this field. Indicate in this POB field the state (Mexican, United States), territorial possession, province (Canadian), or country of birth. The appropriate two-letter abbreviation shall be used as listed in Part IV of the NCIC Code Manual." NCIC Part IV refers to the state and country codes listed in Part VI. EFTS also provides criteria for coding the Place of Birth when the State is not provided. 2.021 Country of Citizenship: Description: Two-character alphanumeric; non-repeating; occurs and is optional on the ARR and DOC records only. Discussion: EFTS states, "This field contains the name of the country of which the subject is a citizen. Entry must be a valid country code from Code Table POB in Part IV of the NCIC Code Manual." 2.022 Date of Birth: Description: Eight-digit integer; repeats one to five times; occurs and is mandatory on the ARR, APP and DOC records. Discussion: EFTS page C-3 states, "This field contains the date of birth. It is entered as an eight-digit number in the same format as specified for CDD." That format is YYYYMMDD. EFTS continues, "A ninth character, a hyphen, is added in the rightmost position of the first listing of DOB for all persons less than 18 years of age. MM must be 01-12. DD must be 01 to valid length of month and year combination. If day, month or year is unknown, enter as 00. If day, month or year is unknown, enter as 00. Up to five multiple occurrences of this field may be listed to indicate different dates of birth. . .". MCHS will require a complete, valid date for all fields that contain a date value. Incomplete dates (for example, 19640500) or invalid dates (for example, 19630229) are not accepted. The EFTS ninth-character flag for persons less than 18 years of age is redundant, and is not supported in the MCHS design. The subject's age at the time of arrest can be obtained by comparing the Date of Birth with the Date of Arrest, while the Arrest Type will indicate whether the subject was processed as a juvenile or as an adult at the time of arrest. 2.024 Sex: Description: Six-character alphanumeric; non-repeating; occurs and is mandatory on the ARR, APP and DOC records. Discussion: RFP page 83 states, "Sex is redefined to allow only Male, Female." EFTS page C-14 states, "This field is used to report the gender of the subject. The entry is a single character selected from the following table." In addition to codes for "M" and "F," that table provides other codes for unspecified gender, transvestite or impersonator. The MCHS does not use these additional codes. 2.025 Race: Description: Seven-character alphanumeric; non-repeating; occurs and is mandatory on the ARR, APP and DOC records. Discussion: EFTS page C-13 states, "This field is used to indicate the race of the subject. Use the predominant race code from the following table." This table provides single-letter codes, but it gives text expansion rather than single-word equivalents. RFP page 97 shows the race field with a length of 7 characters, and page 104 gives the spelled-out EDIT table values for this column. Combining these sources yields the following equivalence table: RFPEFTS CodeEFTS DescriptionAmerindIAmerican Indian, Eskimo, or Alaskan native, or a person having origins in any of the 48 contiguous states whom maintains cultural identification through tribal affiliation or community recognition.AsianAChinese, Japanese, Filipino, Korean, Polynesian, Indian, Indonesian, Asian Indian, Samoan, or any other Pacific Islander.BlackBA person having origins in any of the black racial groups of Africa.OtherUOf indeterminate race.WhiteWCaucasian, Puerto Rican, Cuban, Central or South American, or other Spanish culture or origin, regardless of race.Exhibit A-7. Race Codes Note that, to the FBI, a Spanish-speaking person of pure African descent is White, not Black. DPS is aware of this source of ambiguity, and has indicated that no software solution will be required. 2.026 Scars, Marks, and Tattoos: Description: Alphanumeric with two subfields; repeats zero to ten times; occurs and is optional on the ARR and DOC records only. Subfields are: Field NameField LengthMark Code20Mark Description20Exhibit A-8. Scars, Marks and Tattoos (SMTs) Subfields Discussion: EFTS page C-15 states, "For each scar, mark, or tattoo present on the subject, the appropriate NCIC code shall be used in this information item. Up to ten such codes may be entered and shall be separated by the RS separator character." RFP page 83 states, "Scars, Marks, Tattoos (SMTs) is redefined to provide two subfields: first same as FBI list, second a free-text description." NCIC codes are found in Part IV, Section 13, beginning on page 4-6. EFTS page D-2 shows a 10-character field. RFP page 98 however, shows two 20-character fields for mark code and description. 2.027 Height: Description: Three-character alphanumeric; non-repeating; occurs and is optional on ARR, APP and DOC records. Discussion: EFTS page C-8 states, "This field contains the subject's height as a three-character value. If reported in feet and inches, the first (leftmost) digit is used to show feet while the two rightmost digits are used to show the inches between 00 and 11. If reported in inches, the leftmost character is "N" followed by two digits. If height is unknown, 000 is entered." The MCHS format is feet and inches (the first EFTS format). Since the field is to be optional, the EFTS 000 value is excluded by field edits, as is any value less than four feet. The value may not be less than 4 feet or greater than 8 feet 11 inches. 2.029 Weight: Description: Three-digit integer; non-repeating; occurs and is optional on the ARR, APP and DOC records. Discussion: EFTS page C-16 states, "In this field the subject's weight in pounds is entered. If weight is unknown, 000 is entered. Since this field is optional in the MCHS, the EFTS 000 value is excluded. The value may not be less than 70 pounds or greater than 600 pounds. 2.031 Eye Color: Description: Ten-character alphanumeric; non-repeating; occurs and is mandatory on the ARR and DOC records only. Discussion: RFP page 83 states, "Color Eyes is redefined to provide spelled-out versions of FBI codes." EFTS page C-4 provides 3-character codes and expansions for this value. RFP page 95 shows eye color defined as varchar(1), checked against the EDIT table. This is an error for "varchar(10)". A list of the supported edit values, with MCHS and EFTS equivalents, follows: EFTS CodeEFTS ValueMCHS ValueBLKBlackBlackBLUBlueBlueBROBrownBrownGRYGrayGrayGRNGreenGreenHAZHazelHazelXXXUnknownUnknownExhibit A-9. Eye Color Codes 2.032 Hair Color: Description: Ten-character alphanumeric; non-repeating; occurs and is mandatory on ARR and DOC records only. Discussion: RFP page 83 states, "Hair Color is redefined to provide spelled-out versions of FBI codes." EFTS page C-8 provides 3-character codes and expansions for this value. RFP page 95 shows a 10-character hair color. A list of the supported edit values, with MCHS and EFTS equivalents, follows: EFTS CodeEFTS ValueMCHS ValueBALBaldBaldBLKBlackBlackBLNBlond or StrawberryBlondeBROBrownBrownGRYGray or Partially GrayGrayREDRed or AuburnRedSDYSandySandyWHIWhiteWhiteXXXUnknownUnknownExhibit A-10. Hair Color Codes 2.035 Palm Prints Available: Description: Three-character alphanumeric; non-repeating; occurs and is mandatory on the ARR and DOC records only. Discussion: EFTS page C-13 states, "If palm prints are available, this field shall contain a "Y"; otherwise, the field shall be omitted." RFP page 83 states, "Palm Prints Available indicator will be redefined to Yes, No." Where the value in this field indicates that Palm Prints are available, a Repository SAMPLE record is stored with a SAMPLE_TYPE value of Palmprint, the CONTRIBUTOR set to the Originating Agency ORI value from the Type-1 record, and the DATE_REPORTED set to the Transaction Date value from the Type-1 record. 2.036 Photo Available: Description: Three-character alphanumeric; non-repeating; occurs and is mandatory on the ARR and DOC records only. Discussion: EFTS page C-12 states, "If a photograph of the subject is available, this field shall contain a "Y"; otherwise, the field shall be omitted". RFP page 84 states, "Photo Available indicator will be redefined to Yes, No." Where the value in this field indicates that a Photo is available, a Repository SAMPLE record is stored with a SAMPLE_TYPE value of Photo, the CONTRIBUTOR set to the Originating Agency ORI value from the Type-1 record, and the DATE_REPORTED set to the Transaction Date value from the Type-1 record. 2.037 Reason Fingerprinted: Description: Twenty-character alphanumeric; non-repeating; occurs and is mandatory on the APP record only. Discussion: EFTS page C-14 states, "This field is used to indicate the purpose of a civil or applicant fingerprint card submission. This field will indicate if the card is submitted for licensing, gun permit, or criminal justice employment. This field is used by the FBI to determine if user fees are charged." RFP page 87 states, "Fields are added for FeePaid, ResponseAddress, Purpose" to the APP record. Following discussions with DPS, it has been determined that the Purpose field would duplicate the existing Reason Fingerprinted field; accordingly, the Purpose field has been dropped. Initially, no Applicant data will be stored in the Repository. The MCHS design, however, provides for the future capability to store records for certain classes of Applicant. The Reason Fingerprinted might well determine whether a given Applicant record was stored in the Repository. 2.038 Date Printed: Description: Eight-digit integer; non-repeating; occurs and is mandatory on the ARR, APP and DOC records. Discussion: EFTS page C-4 states, "This field contains the date that the subject was fingerprinted." This is a date of format YYYYMMDD. It represents the date of information for the occupation, employer and address data derived from the event. 2.039 Occupation, Employer and Address: Description: Alphanumeric with five subfields; non-repeating; occurs and is optional on the ARR record only. Subfields are: Subfield NameLengthMax OccurrencesOccupation501Employer351Employer Address, 1351Employer Address, 2351Employer Address, 3351Exhibit A-11. Occupation, Employer and Address Subfields Discussion: RFP page 84 states, "Occupation and Employer and Address will be combined into a single field with two subfields." EFTS field number 2.040 (Occupation) provides 50 characters, while field number 2.039 (Employer and Address) provides 120. Both fields contain undivided free-text values. The Address has been divided into three lines in order to facilitate formatted printing. The subjects Residence Address will follow the same format. 2.041 Residence of Person Fingerprinted: Description: Alphanumeric with three subfields; non-repeating; occurs and is optional on the ARR record only. Subfields are: Subfield NameLengthMax OccurrencesSubject Address, 1351Subject Address, 2351Subject Address, 3351Exhibit A-12. Subject Address Subfields Discussion: EFTS provides 120 characters of free text for this field, which is the same size provided to store the subject's Employer plus the Employer's address. 2.045 Date of Arrest: Description: Eight-digit integer; non-repeating; occurs and is mandatory on the ARR record only. Discussion: EFTS page C-3 states, "This field contains the date of arrest." The date format is YYYYMMDD. This value is stored in the Repository twice, recording the arrest itself and also the charge-like events associated with the initial arrest). 2.056 Identification Comments: Description: Fifty-character alphanumeric; non-repeating; occurs and is optional on the ARR and DOC records only. Discussion: EFTS page C-8 states, "Additional miscellaneous identification remarks providing the reason for caution may be entered in this field. The first character may not be a blank." In the MCHS, this field contains other information besides cautionary information, and is captioned simply as Identification Comments. 2.067 Image Processing Field: Description: Alphanumeric, with three subfields; non-repeating; occurs and is optional on the ARR, APP and DOC records. Subfields are: Subfield NameLengthMax OccurrencesEquipment Make501Equipment Model251Equipment Serial Number251Exhibit A-13. Image Processing Subfields Discussion: EFTS page C-9 states, "This free text field is used to log the make, model , and serial number of the equipment used to acquire images. The make, model, and serial number of the acquisition devices shall be separated by the US separator character." EFTS page D-4 shows a length of 100 characters for this field. We divided this field into subfields as specified above. 2.068 Image Pre-Processing: Description: One-character alphanumeric; non-repeating; occurs and is optional on ARR, APP, and DOC records. Discussion: EFTS page C-9 states, "This field is used to indicate whether the image is original or compressed. A 'Y' indicates that the image is an original image or processed with a lossless algorithm. A 'N' or a blank indicates otherwise." Since this is a machine-readable field only, the one-character format has been retained. A blank is not an acceptable value, since the field itself is optional. 2.070 Request for Rap Sheet: Description: Thirty-character alphanumeric; non-repeating; occurs and is optional on the ARR, APP and DOC records. Discussion: EFTS page C-14 states, "The purpose of this field is to allow the contributors, in case of an Ident, to optionally request the rap sheet of the suspect. A 'Y' indicates that a rap sheet is desired and an 'N' or blank field indicates that no rap sheet should be returned with the Ident response. EFTS did not anticipate the multiple rap sheet format and content variations required for MCHS. Eighteen such variations have been identified. At Technical Exchange Meeting Number 3, it was suggested that we might adopt a positional coding scheme in which the first letter would code the transmission format (Electronic, FAX, Print/Mail), the second would code the report level (General or Felony), while the third would code the report format (Red/Green, Full, Compressed, Summary). DPS has indicated, however, that not all combinations of these elements are valid; specifically, there is no Felony Summary report. Further, there may be future requirements for report formats that do not fit into this coding scheme. Accordingly, this field has been changed to a text field that may contain one of the following values: Rap Sheet FormatsElectronic CompressedElectronic Felony CompressedElectronic FullElectronic Felony FullElectronic SummaryFAX General Red/GreenFAX Felony Red/GreenFAX CompressedFAX Felony CompressedFAX FullFAX Felony FullFAX SummaryPrint/Mail General Red/GreenPrint/Mail Felony Red/GreenPrint/Mail CompressedPrint/Mail Felony CompressedPrint/Mail FullPrint/Mail Felony FullExhibit A-14. Rap Sheet Formats A.2.1.2 New Fields The following fields have been added in response to RFP requirements. They are numbered from 2.700 up. 2.701 Arrest Tracking Number (ATN): Description: Ten-character numeric; non-repeating; occurs and is mandatory on the ARR record only. Discussion: The ATN will contain a check digit, as will the SID, and the same check digit algorithm will be used for both. 2.702 Arresting Agency ORI: Description: Nine-character alphanumeric; non-repeating; occurs and is mandatory on the ARR record only. Discussion: RFP page 84 states, "Arresting Agency ORI will be added" to the ARR record. 2.703 Driver License Number: Description: Alphanumeric with two subfields; repeats zero to four times; occurs and is optional on the ARR, APP and DOC records. Subfields are: Subfield NameLengthMax OccurrencesLicense State21License Number201Exhibit A-15. Driver License Subfields Discussion: RFP page 84 states, "Driver License field will be added with two subfields: state, number" to the ARR record, and similar language occurs on page 87 for the APP record. This is not one of the fields excluded from the DOC record. A repeating field with four occurrences has been provided for consistency with field number 2.017 (Miscellaneous Identification Numbers), above. While four occurrences may be more than necessary, it is not unusual for a criminal suspect to carry more than one Driver License. The License Number subfield has been expanded to 20 characters for consistency with NCIC. DPS does contemplate storing International Driver License numbers; other foreign driver license numbers are expected to be rare. 2.704 Arrest Type: Description: Fifteen-character alphanumeric; non-repeating; occurs and is mandatory on the ARR record only. Discussion: RFP page 84 states, "Arrest Type field will be added with these options: Adult, Juvenile, Juvenile as Adult." On RFP page 88, this field was excluded from the DOC record. On RFP page 103, the following values (not all of are arrest types) are listed for the EventType element: Event TypesBench WarrantDisposedFail to AppearFiledAdult ArrestJuvenile ArrestJuv-as-Adult ArrestExhibit A-16. Event Types The Arrest Type is a subset of a larger Event Type class. While all of the Event Type values are stored in a common Repository column, each different Source Document provides a separate list of values so that only the Event Types appropriate to that document can be entered from it. DPS is the source of the complete list of Event Types and the subsets to be enterable from each source document. 2.705 Charges: Description: Alphanumeric with eight subfields; repeats one to 99 times; occurs and is mandatory on the ARR record only. Subfields are: Field NameLengthMax OccurrencesCitation211Description1201Supplement401Severity111Counts31Offense Date81Action141Remark501Exhibit A-17. Arrest Charges Subfields Discussion: RFP page 84 states, "Arrest Charges will be added as a field with these subfields: Severity, Counts, Citation, Description, Offense Date, Disposition." Subsequent discussions with DPS have clarified and added to these subfields. The subfield breakdown and attributes for the Arrest Charges field on the ARR record are identical to that for the Prosecutor Charges field on the Prosecutor Case Intake Report record. The Sentences field on the Court Disposition Report message extend this subfield structure by adding additional subfields. Values listed for the severity code are shown in Exhibit A-18. Severity LevelsFelonyMisdemeanorUnknownViolationExhibit A-18 Severity Levels Action was omitted from the RFP by mistake. This data item has been renamed from Disposition to Action following discussions with DPS. On page 103, the following values for the EDIT table Disposition element are listed: Action ValuesDismissedGuiltyNo ProsecutionNot GuiltyTurned OverExhibit A-19. Actions This subfield is a subset of a global Action class, for which other subsets occur on the Prosecutor Disposition Report and the Court Disposition Report. The values listed above include values that would not be appropriate for the Arrest Fingerprint Card record. Each form has its own set of valid values for the Action subfield. Following discussions with DPS, a 50-character free text Remark subfield has been added to this field. 2.706 Fee Paid: Description: Floating point with precision 3.2; non-repeating; occurs and is optional on the APP record only. Discussion: RFP page 87 states, "Fields are added for FeePaid, ResponseAddress, Purpose" to the APP record. DPS has indicated that this is to be a monetary amount, in dollars and cents, and must be large enough to accommodate the fee charged by the FBI added to the fee charged by DPS. 2.707 Response Address: Description: Alphanumeric with six subfields; non-repeating; occurs and is mandatory on the APP record only. Subfields are: Subfield NameLengthMax OccurrencesAddressee501Address, 1351Address, 2351Address, 3351Voice Phone Number201FAX Number121Exhibit A-20 Response Address Subfields Discussion: RFP page 87 states, "Fields are added for FeePaid, ResponseAddress, Purpose" to the APP record. The following subfield structure has been reviewed by DPS: 1. Addressee. This is the name of the person or company to which the response is to be sent. It is 50 characters long. 2. Address Line 1. The first line of the address; it is 35 characters long. 3. Address Line 2. The second line of the address; it is 35 characters long. 4. Address Line 3. The third line of the address; it is 35 characters long. 5. Voice phone number. If it is to include hyphens, as shown in the example, it should be at least varchar(12). A length of 20 has been provided to accommodate extensions. 6. FAX number. A length of 12 characters has been provided to include hyphens, as shown in the example. 2.709 Department of Corrections Number: Description: Ten-character alphanumeric; non-repeating; occurs and is mandatory on the DOC record only. Discussion: RFP page 88 states, "DOC field will be added" to the DOC record. RFP page 89 maps this element to the DOC Database "DOCNUMB" element. A.2.2 Tenprint Message Layout Exhibit A-21, Tenprint Message Layout Summary, presents the Tenprint Message fields in tabular form. The column headings for that figure are: Field #: The NIST Field Number referenced in the field descriptions above. C: Condition. Values are M for Mandatory, and O for Optional. TOT: The Type of Transaction in which the field may occur. Values are from Exhibit A-2, Tenprint Card Types of Transaction, above. Where the field may occur in all three Types of Transaction, a value of ALL is shown. T: Type of data. Values are N for Numeric, and A for Alphanumeric. L: Length of the field or subfield data in bytes. This does not include information separator characters. O: Occurrences, where 1 indicates a non-repeating item, and a number greater than 1 indicates the maximum number of occurrences of a repeating field. Field Name: The English-language identification of the field. Field #CTOTTLOField Name2.001MALLN51Logical Record Length2.002MALLN21Image Designation Character (IDC)2.008OAPPN101No Charge Indicator2.009OARR, APPA101Originating Agency Case Number2.014OALLA91FBI Number2.015OARR, DOCA101State Identification Number (SID)2.016OALLN94Social Security Account Number2.017OALL4Miscellaneous Identification NumberA15Number TypeA12Number Value2.018MALL11Name/AliasesA35SurnameA20First NameA20Middle NameA4Suffix2.020MARR, DOCA21Place Of Birth2.021OARR, DOCA21Country Of Citizenship2.022MALLN85Date Of Birth2.024MALLA61Sex2.025MALLA71Race2.026OARR, DOC10Scars, Marks And TattoosA20CodeA20Description2.027OALLA31Height2.029OALLN31Weight2.031MARR, DOCA101Eye Color2.032MARR, DOCA101Hair Color2.035MARR, DOCA31Palm Prints Available Indicator2.036MARR, DOCA31Photo Available Indicator2.037MAPPA201Reason Fingerprinted2.038MALLN81Date Printed2.039OARR1Employer, Address, And OccupationA50OccupationA35EmployerA35Employer Address, 1A35Employer Address, 2A35Employer Address, 32.041OARR1Residence Of Person FingerprintedA35Residence Address, 1A35Residence Address, 2A35Residence Address, 32.045MARRN81Date Of Arrest2.056OARR, DOCA501Identification Comments2.067OALL1Image Processing FieldA50Equipment MakeA25Equipment ModelA25Equipment Serial Number2.068OALLA11Image Preprocessing2.070OALLA301Request For Rap Sheet2.701MARRN101Arrest Tracking Number (ATN)2.702MARRA91Arrest Agency ORI Number2.703OALL4Driver License NumberA2License StateA20License Number2.704MARRA171Arrest Type2.705MARR99ChargesA21CitationA120DescriptionA40SupplementA11SeverityN3CountsN8Offense DateA14ActionA50Remark2.706OAPPF61Fee Paid2.707MAPP1Response AddressA50AddresseeA35Address, 1A35Address, 2A35Address, 3A20Voice Phone NumberA12Fax Number2.709MDOCA101Department Of Corrections NumberExhibit A-21 Tenprint Message Layout Summary A.3 The Type-10 Record The NIST standard for Mug Shot data was still under discussion when the Mug Shot subsystem was designed and developed. At the first MCHS Technical Exchange Meeting (TEM) in Jackson, Mississippi on October 24, 1996, it was agreed that the standard set forth in the NIST Addendum would be followed. The developers of the Live Scan system began integration of the digital camera with Live Scan after the Addendum was finalized in December 1997. They used the final document. It was also agreed at the first TEM that the NIST Addendum data elements for Scars, Marks, and Tattoos (SMTs) would not be supported in MCHS. Accordingly, the Type-10 record format presented here supports only Mug Shots, and omits those fields that the NIST Addendum provides for SMTs. SMT data was the major change from the Draft to Final NIST standard. A.3.1 Mug Shot Record Fields The following field list presents field attributes for the individual Type-10 record fields. These are derived entirely from the NIST Addendum. No new fields are proposed. 10.001 Logical Record Length: Description: Seven-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 7 states: This mandatory ASCII field contains the total count of the number of bytes in the Type-10 logical record. Field 10.001 specifies the length of the record including every character of every field contained in the record and the information separators. The GS character shall separate the length of Field 10.001 from the next field. This length includes the length of Field 10.999, which contains the binary Mug Shot image. 10.002 Image Designation Character (IDC): Description: Four-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 7 states: This mandatory one to four byte ASCII field is used to identify the facial or SMT image data contained in this record. This IDC matches the IDC found in the file content field of the Type-1 record. 10.003 Image Type: Description: Four-character alphanumeric; non-repeating; mandatory. Discussion: NIST Addendum page 7 states: This mandatory ASCII field is used to indicate the type of biometric image contained in this record. This field shall contain FACE, SCAR, MARK, or TATTOO to indicate a face, scar, mark or tattoo image. Since the MCHS supports only Mug Shots for the Type-10 record, this field is always set to FACE. 10.004 Source Agency/ORI: Description: Nine-character alphanumeric; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field shall contain the identification of the administration or organization that originally captured the facial image contained in the record. Normally, the ORI of the agency that captured the image will be contained in this field. The size and data content of this field shall be defined by the user and be in accordance with the receiving agency. The format adopted here is the MCHS standard ORI format. 10.005 Photo Date: Description: Eight-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field contains the date that the facial or SMT image contained in the record was captured. The date appears as eight digits in the format CCYYMMDD. . . . The complete date must be a legitimate date and not exceed the current date. This is the standard MCHS date format. 10.006 Horizontal Line Length: Description: Four-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field shall contain the number of pixels contained on a single horizontal line of the transmitted message. 10.007 Vertical Line Length: Description: Four-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field contains the number of horizontal lines contained in the transmitted image. 10.008 Scale Units: Description: One-digit integer; non-repeating; mandatory. Description: NIST Addendum page 9 states: This mandatory ASCII field is used to specify the units used to describe the image resolution. A 1 in this field indicates pixels per inch, or a 2 indicates pixels per centimeter. A 0 in this field indicates none. In this case the quotient of HPS/VPS gives the pixel aspect ratio. 10.009 Horizontal Pixel Scale: Description: Two-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field is used to specify the horizontal resolution of the image if [field number 10.008 (Scale Units)] contains a 1 or a 2. Otherwise, it indicates the horizontal component of the pixel aspect ratio. 10.010 Vertical Pixel Scale: Description: Two-digit integer; non-repeating; mandatory. Discussion: NIST Addendum page 9 states: This mandatory ASCII field is used to specify the vertical resolution of the image if [field number 10.008 (Scale Units)] contains a 1 or a 2. Otherwise, it indicates the vertical component of the pixel aspect ratio. 10.011 Compression Algorithm: Description: Six-character alphanumeric; non-repeating; mandatory. Discussion: NIST Addendum page 10 states: This mandatory ASCII field is used to specify the algorithm used to compress the color or grayscale image. An entry of NONE in this field indicates that the data contained in this field is uncompressed. The method for the compression of facial and SMT images is specified by the baseline mode of the Joint Photographic Experts Group (JPEG) algorithm formatted in accordance with the JPEG File Interchange Format, Version 1.02 (JFIF). An entry of JPEGB indicates that the scanned or captured image was compressed using baseline JPEG. An entry of JPEGL indicates that the lossless mode of the JPEG algorithm was used to compress the image. If the image is captured in grayscale, then only the luminescence component will be compressed and transmitted. 10.012 Colorspace: Description: Four-character alphanumeric; non-repeating; mandatory. Discussion: NIST Addendum page 10 states: This mandatory ASCII field shall contain the color space used to exchange the image. For compressed images, the preferred colorspace using baseline JPEG and JFIF is YCbCr to be coded as YCC. An entry of GRAY shall be used for all grayscale images. For uncompressed color images containing non-interleaved red, green and blue pixels in that order, this field shall contain RGB. All other colorspaces are undefined. 10.020 Subject Pose: Description: One-character alphanumeric; non-repeating; optional. Discussion: NIST Addendum page 10 states: This is an optional field to be used for the exchange of facial image data. When included, this field shall contain a one ASCII character code selected from Table-11 to describe the pose of the subject. For the angled pose entry (A), field 10.021 shall contain the offset from the full face orientation. Table-11 is transcribed as Exhibit A-22, Subject Pose: Pose DescriptionPose CodeFull Face FrontalFRight Profile (90 degree)RLeft Profile (90 degree)LAngled PoseAExhibit A-22. Subject Pose 10.021 Pose Offset Angle: Description: Three-digit signed integer (four digits including the sign); non-repeating; optional Discussion: NIST Addendum page 11 states: This field shall only be used for the exchange of facial image data. Field 10.020 [(Subject Pose)] must contain an A to indicate an angled pose of the subject - not a full face or profile. This ASCII field specifies the pose position of the subject at any possible orientation within a circle. The offset angle shall be measured from the full-face pose position and have a range of values from -180 degrees to +180 degrees. A positive angle is used to express the angular offset as the subject rotates from a full-face pose to their right (approaching a left profile). A negative angle is used to express the angular offset as the subject rotates from a full-face pose to their left (approaching a right profile). If the entry in the [Subject Pose] field is an L or an R, the contents of this field are ignored. 10.022 Photo Description: Description: Alphanumeric field consisting of two subfields; repeats zero to twenty times; optional. Subfields are as follows: FieldLengthPhoto Descriptor8Other Physical Characteristic10Exhibit A-23. Photo Description Subfields Discussion: NIST Addendum page 11 states: This optional ASCII field shall be used for the exchange of facial image data. It shall describe special attributes of the captured facial image. Attributes associated with the facial image may be selected from Table 12 and entered in this field. Physical characteristics, such as freckles, may be entered as a subfield consisting of two information items. The first is PHYSICAL followed by the US separator, followed by the characteristic as listed in Part 4 Section 13 of the NCIC Code Manual. The OTHER category is used to enter unlisted or miscellaneous attributes of the facial image. This information shall be entered as a two information item subfield. The first is OTHER followed by the US separator, followed by the unformatted text used to describe the attribute. Multiple attributes and subfields may be listed but must be separated by the RS character. Table 12 is transcribed as Exhibit A-24, Photo Descriptors: Facial Image AttributeAttribute CodeSubject Wearing GlassesGLASSESSubject Wearing HatHATSubject Wearing ScarfSCARFPhysical CharacteristicsPHYSICALOther CharacteristicsOTHERExhibit A-24. Photo Descriptors The National Crime Information Center (NCIC) Code Manual reference is presumably to paragraph 13.13, Other Physical Characteristics, on page 4-18. This is reproduced below as Exhibit A-25 Other Physical Characteristics. Some of these characteristics would not be apparent on a facial photograph, but are included for the sake of completeness: Item/LocationCodeBald/BaldingBALDCleft chinCLEFT CHINDimple, ChinDIMP CHINDimples, left cheek (face)DIMP L CHKDimples, right cheek (face)DIMP R CHKFrecklesFRECKLESHair implantsHAIR IMPLPierced abdomenPRCD ABDMNPierced backPRCD BACKPierced ear, one, nonspecificPRCD EARPierced earsPRCD EARSPierced left earPRCD L EARPierced right earPRCD R EARPierced genitaliaPRCD GNTLSPierced lip, nonspecificPRCD LIPPierced lip, upperPRCD ULIPPierced lip, lowerPRCD LLIPPierced nipple, nonspecificPRCD NIPPLPierced nipple, leftPRCD L NIPPierced nipple, rightPRCD U NIPPierced nosePRCD NOSEStuttersSTUTTERSExhibit A-25. Other Physical Characteristics 10.999 Image Data: Description: 5,000,000-byte binary; non-repeating; mandatory Discussion: NIST Addendum page 14 states: This field shall contain all of the grayscale or color data from a face, scar, mark, or tattoo image. It shall begin with the ASCII identifier 10.999:, and be followed by image data in a binary representation. If compression is used, the pixel data shall be compressed in accordance with the compression technique specified in the CGA field. If the JPEG algorithm is . . . used to compress the data, this field shall be encoded using the JFIF format specification. A.3.2 Mug Shot Record Layout Exhibit A-26, Mug Shot Record Layout Summary, presents the Mug Shot Record fields in tabular form. The column headings for that figure are: Field #: The NIST Field Number referenced in the field descriptions above. C: Condition. Values are M for Mandatory, and O for Optional. T: Type of data. Values are N for Numeric, A for Alphanumeric and B for Binary. L: Length of the field or subfield data in bytes. This does not include information separator characters. O: Occurrences, where 1 indicates a non-repeating item, and a number greater than 1 indicates the maximum number of occurrences of a repeating field. Field Name: The English-language identification of the field. Field #C TLOField Name10.001MN71Logical Record Length10.002MN41Image Designation Character (IDC)10.003MA41Image Type10.004MA91Source Agency/ORI10.005MN81Photo Date10.006MN41Horizontal Line Length10.007MN41Vertical Line Length10.008MN11Scale Units10.009MN21Horizontal Pixel Scale10.010MN21Vertical Pixel Scale10.011MA61Compression Algorithm10.012MA41Colorspace10.020OA11Subject Pose10.021ON41Pose Offset Angle10.022O20Photo DescriptionA81Photo DescriptorA101Other Physical Characteristic10.999MB5,000,0001Image DataExhibit A-26. Mug Shot Record Layout Summary l p page 68 l p HK12LMNOPefugj' UmHnHujUmHnHuj-UmHnHujUmHnHujUmHnHu mHnHu 56CJj56CJU6;CJ OJQJ CJ$OJQJ5CJ$OJQJ5CJ(OJQJ6CJ8OJQJjCJOJQJUOJQJ CJ OJQJ(2HIJK`{$a$1$&$$d%d&d'dNOPQa$&$$d%d&d'dNOPQa$Q1eD0m4 t 6 f &   L  ,-./0EF`abcd$%?@ABCijj UmHnHuj UmHnHuj UmHnHuj UmHnHuj UmHnHuj! UmHnHuj UmHnHujUmHnHu mHnHu6+,-./MNhijkl  . / jzUmHnHujUmHnHujUmHnHujUmHnHujUmHnHuj UmHnHuj UmHnHu mHnHujUmHnHuj UmHnHu2/ 0 2 3 S T n o p r s   0 1 2 4 5 E F ` a b d e   jUmHnHujhUmHnHujUmHnHujnUmHnHujUmHnHujtUmHnHujUmHnHu mHnHujUmHnHu7 ! " $ % > ? Y Z [ ] ^ m n  : ; < > ? t u jUmHnHujPUmHnHujUmHnHujVUmHnHujUmHnHuj\UmHnHujUmHnHu mHnHujUmHnHujbUmHnHu2& _ @  4 v D$c#61$1$$$  p (  L     . / 0 2 3 U V p q r t u   #$>?@BC_`z{|~j8UmHnHujUmHnHuj>UmHnHujUmHnHujDUmHnHujUmHnHujJUmHnHu mHnHujUmHnHu7 "#BC]^_abz{2%ჀCJj56CJUjUmHnHuj&UmHnHujUmHnHuj,UmHnHujUmHnHuj2UmHnHu mHnHujUmHnHujUmHnHu26 D[n'F & FEƀb+fF & FEƀb+fF & FEƀb+f1$[nWm "S##2%&((*( x x1$1$F & FEƀb+f2%7%&&(()(M(Y(d*o*,,--".*. 6 6*6+6,6-699:::K;;;EF FFYFZFFFFFFFGG5G6GHHHH5I6IJJJJ2K3KOKPKKKKK0L1LMLNLLLLLMMBMCMP+P3P@PPPPPPPQQqQrQQQQQR6 jU j CJU5^*(M(d*,-".H/a/u//0011$F & FEƀb+f.1$1$ x 1x1=22t34z4445Z556%7@71$  & F^`1$ & F  & F  & F & F & F & F & FF & FEƀb+f.@7777899::8;;G<l<<= 0^`0 01$^`0 p1$^p` 1$^`1$1$ 1$=6=T=x=iJ & F Eƀb+fJ & F Eƀb+fJ & F Eƀb+fx=>8>?$?A?g@@FCCDDEEEF FFF & F$1$If$ & F$1$Ifa$ & F1$ & F1$ & F & F  & F0^`0 & FFF$F'F4F9FYF[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 laYFZFaFgFtFxFFF\NNNN>\ & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laFFFFFFFFFN$$Ifl    r${{{{{0    4 la$ & F$1$Ifa$FFFFFFFGGN$$Ifl    r${{{{{0    4 la$ & F$1$Ifa$GGGGG*G4G5G6GN|N$$Ifl    r${{{{{0    4 la$ & F$1$Ifa$6GGGHHHHHHH & F$1$If$ & F$1$Ifa$ $ & F1$a$ & F & F1$ & F1$ HHIIII5I[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 la5I6IaIyIJJJ\RKFF8$ & F$1$Ifa$ & F & F1$ $ & F1$a$$$Ifl    r${{{{{0    4 laJJJJJJJJBD$$Ifl4    r${{{{{0    4 la & F$1$If$ & F$1$Ifa$JKK2K3K9K;KHK>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$HKNKOKPKaKcKpKK>H$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$KKKKKKKKLt>>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$IfKKKKKK0L1L\NNNN>\t & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la1L7L9LFLLLMLNLSL>X$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$SLUL^L}LLLLL>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$LLLLLLLL>8$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$LLMMMM/MAML>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$IfAMBMCMM,NNLBB= & F $ & F1$a$$$Ifl    r${{{{{0    4 la & F !$1$IfNOFOOPq*% & FF & F Eƀb+f F & F Eƀb+f F & F Eƀb+fPP$P+P3P9P?P & F$1$If$ & F$1$Ifa$ & F?P@PQPSP`PwPP[<MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 laPPPPPPP\tNNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laPPPPPPPP\LNNNN>\t & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laPQQQQQQ!Q>X$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$!Q#Q,QKQqQrQxQzQ>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$zQQQQQQQQ>8$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$QQQQQQQRL>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$IfRRR`RRR,SBSLGGGGG & F$$Ifl    r${{{{{0    4 la & F !$1$IfRRRR,SOSWSdSSSSS?T@T\T]TTTTTUUOUPUTZcZkZxZZZZZ[[`[a[8]I]Q]^]]]`^a^^^r_s_,`-`a`b`cccdodpdddee\e]eeef fffggigjggg8iGiOi\iiijj:j;j*l;lClPlllllAmBmmmEo B*ph5bBSHSOSWS]ScSdSuSBL$$Ifl4    r${{{{{0    4 la & F$1$If$ & F$1$Ifa$uSwSSSSSSS>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$SSSSSSSS>$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$SS?T@TFTHTUT[T>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$[T\T]TbTdTmTTTLT>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$IfTTTTTTTT\tNNNN>\4 & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laTTTTTUU(U>$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$(U*U9 & F$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$UCV>WWtXY(YTZVZ\ZcZkZqZwZ & F$1$If$ & F$1$Ifa$ $ & F1$a$ & F1$ & F wZxZZZZZZ[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 laZZZZZZZ\NNNNN$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laZZZZZZ[[![\NNNNN\4N$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la![%[2[3[`[a[[>7 & F1$$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$[[8]:]<]B]I]Q]W]]] & F$1$If$ & F$1$Ifa$ $ & F1$a$ & F & F1$ ]]^]i]l]y]~]][MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r }${{;L 0    4 la]]]]]]`^\hN>NN> & F !$1$If$ & F$1$Ifa$$$Ifl    r }${{;L 0    4 la`^a^t^v^^^^^\NNNN>\l & F !$1$If$ & F$1$Ifa$$$Ifl    r }${{;L 0    4 la^^_ __r_s__>$$Ifl    r }${{;L 0    4 la & F !$1$If$ & F$1$Ifa$____,`-`:`H`N> & F !$1$If$$Ifl    r }${{;L 0    4 la$ & F$1$Ifa$H`U`V`a`b``aNG@ & F1$ & F1$$$Ifl    r }${{;L 0    4 la$ & F$1$Ifa$a|bcccccdd & F$1$If$ & F$1$Ifa$ & Fdddd"d'dod[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ Bt"{1{2 0    4 laodpdzd}dddd\LNNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 laddddddee\<NNNN>\, & F !$1$If$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 laeee)e*e\e]eee> $$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$eeheqereeeee>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$eeef fff,f>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$,f-fffffff>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$fggggggigL>>>>$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$Ifigjgkgggg8i:iZOOOOJ@ $ & F1$a$ & F  & F !1$$$Ifl    /r@ Bt"{1{2 0    4 la:i@iGiOiUi[i\igiB$$Ifl4    r@ 6${1{{Z 0    4 la & F$1$If$ & F$1$Ifa$gijiwi|iiiii>$$Ifl    r@ 6${1{{Z 0    4 la & F !$1$If$ & F$1$Ifa$iiijj;j>3  & F !1$$$Ifl    r@ 6${1{{Z 0    4 la & F !$1$If$ & F$1$Ifa$;jMj,l.l4l;lClIlOl & F$1$If$ & F$1$Ifa$ & F & F1$OlPl[l^lklpll[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ 6${1{{Z 0    4 lalllllll\|NNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r@ 6${1{{Z 0    4 lallll m mAmBmMm\HNNNNN\TN$ & F$1$Ifa$$$Ifl    r@ 6${1{{Z 0    4 laMmPm^m_mmmmND $ & F1$a$$$Ifl    r@ 6${1{{Z 0    4 la$ & F$1$Ifa$mmGoMoTo\oboho & F$1$If$ & F$1$Ifa$ & F & F1$EoTo\oioooXu]uuuvvjwlwww]xaxbydykymy}~*2? <=[\NOőPQmnܒݒNOkl“ޓߓ,-`a4]erݗޗ01MNBC 1b5CJH*H*65`hoiotowoooo[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ 6${1{{Z 0    4 laooopTqnq\RG@9 & F1$ & F1$  & F 1$ $ & F1$a$$$Ifl    r@ 6${1{{Z 0    4 lanqqqqqqq9di$$Ifl04    @   04 la ( & F$If ($ & F$Ifa$DC$Eƀۣ+qqqqX~ ( & F$If ($ & F$Ifa$i$$Ifl04   @  04 laqqqqL~ ( & F$If ($ & F$Ifa$i$$Ifl04   @  04 laqqrr(~ ( & F$If ($ & F$Ifa$i$$Ifl04   @  04 lar r rs8uXuuv,wrwwwtkkb & F1$ & F^ & F@ ^@ ` & F1$ ( & FZ^`Zi$$Ifl04    @   04 la w]xxOyyzOzPzF{V{i{j{{{|} & F  & F0^`0 & FK & F1$C$Eƀʣ+ & F1$^ & F1$ & F1$|2|b||iJ & F Eƀb+f J & F Eƀb+f J & F Eƀb+f |||iJ & F Eƀb+fJ & F Eƀb+f|}/}eJ & F 8Eƀb+f.N & F xxEƀb+f/}K}}~G`N & F 88Eƀb+f^81$J & F 8Eƀb+f.eaN & F 88Eƀb+f^8N & F 88Eƀb+f^8e}i_] 0^`0J & F Eƀb+f.J & F Eƀb+f..Nه#*28> $1$If $$1$Ifa$$1$a$ 1$1$DC$Eƀ+>?JMZ_[PPPPD  !$1$If $$1$Ifa$$$Ifl4    r${{{{{0    4 la\QQQQE\  !$1$If $$1$Ifa$$$Ifl    r${{{{{0    4 laΊQ$$Ifl    r${{{{{0    4 la $$1$Ifa$ );<=QQ|$$Ifl    r${{{{{0    4 la $$1$Ifa$ =ACPZ[\QNK 1$1$$$Ifl    r${{{{{0    4 la $$1$Ifa$ F$$Ifl4    r${{{{{0    4 la $1$If $$1$Ifa$+/NOzE?$1$a$$$Ifl    r${{{{{0    4 la  !$1$If $$1$Ifa$zP~őޑ $1$If $$1$Ifa$1$1$  7P[DPPPPD  !$1$If $$1$Ifa$$$Ifl4    r${{{{{0    4 laPQWYflm\tQQQQE  !$1$If $$1$Ifa$$$Ifl    r${{{{{0    4 lamn\HQQQQE  !$1$If $$1$Ifa$$$Ifl    r${{{{{0    4 laƒȒՒےܒ\tQQQQE  !$1$If $$1$Ifa$$$Ifl    r${{{{{0    4 laܒݒNO\QQQQE\t  !$1$If $$1$Ifa$$$Ifl    r${{{{{0    4 laOUWdjklqEX$$Ifl    r${{{{{0    4 la  !$1$If $$1$Ifa$qs|“ȓʓEt$$Ifl    r${{{{{0    4 la  !$1$If $$1$Ifa$ʓדݓޓߓE8$$Ifl    r${{{{{0    4 la  !$1$If $$1$Ifa$,-9;M_PEEE $$1$Ifa$$$Ifl    r${{{{{0    4 la  !$1$If_`aQPJJH$1$a$$$Ifl    r${{{{{0    4 la  !$1$IfGx 4q*% & FF & F Eƀb+fF & F Eƀb+fF & F Eƀb+f4PV]ekq & F$1$If$ & F$1$Ifa$ & Fqr[<MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 laǗɗ֗ܗݗ\tNNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 laݗޗ01\LNNNN>\t & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la179FLMNS>X$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$SU^}>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$ƘȘј>8$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$ј/AL>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$IfABC 1bwLGGGGG & F$$Ifl    r${{{{{0    4 la & F !$1$Ifw}BL$$Ifl4    r${{{{{0    4 la & F$1$If$ & F$1$Ifa$К>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$ tuPQPQwij$2:GQRHI­í@ADUNOwܳݳ;<]jr B*ph5b ">$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$"/tu{}>t$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$LT>>>$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la & F !$1$If\tNNNN>\4 & F !$1$If$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la +PQ]>$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$]_qΜ>9 & F$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$ΜytUe & F$1$If$ & F$1$Ifa$ $ & F1$a$ & F1$ & F áСա[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r${{{{{0    4 la\NNNNN$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la$(56PQ^\NNNNN\4N$ & F$1$Ifa$$$Ifl    r${{{{{0    4 la^bop>7 & F1$$$Ifl    r${{{{{0    4 la & F !$1$If$ & F$1$Ifa$wz & F$1$If$ & F$1$Ifa$ $ & F1$a$ & F & F1$[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r }${{;L 0    4 la(5:\hN>NN> & F !$1$If$ & F$1$Ifa$$$Ifl    r }${{;L 0    4 la¥\NNNN>\l & F !$1$If$ & F$1$Ifa$$$Ifl    r }${{;L 0    4 la)=JKƦ>$$Ifl    r }${{;L 0    4 la & F !$1$If$ & F$1$Ifa$ƦͦڦۦijwN> & F !$1$If$$Ifl    r }${{;L 0    4 la$ & F$1$Ifa$57DNGG@ & F1$ & F1$$$Ifl    r }${{;L 0    4 la$ & F$1$Ifa$D#$+2:@F & F$1$If$ & F$1$Ifa$H & FC$Eƀ+F & FFGRUbg[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ Bt"{1{2 0    4 laɫʫ\LNNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 la QR\<NNNN>\, & F !$1$If$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 laRZ]ij> $$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$HI]_l>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$lm­í٭ۭ>$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$If$ & F$1$Ifa$@ANP]^L>>>>$ & F$1$Ifa$$$Ifl    r@ Bt"{1{2 0    4 la & F !$1$IfDUZOOOOJ@ $ & F1$a$ & F  & F !1$$$Ifl    /r@ Bt"{1{2 0    4 laB$$Ifl4    r@ 6${1{{Z 0    4 la & F$1$If$ & F$1$Ifa$ΰӰ>l$$Ifl    r@ 6${1{{Z 0    4 la & F !$1$If$ & F$1$Ifa$NO>3  & F !1$$$Ifl    r@ 6${1{{Z 0    4 la & F !$1$If$ & F$1$Ifa$yz & F$1$If$ & F$1$Ifa$H & FC$Eƀ+F & F & F1$ܳ[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ 6${1{{Z 0    4 laܳݳ;\|NNNN> & F !$1$If$ & F$1$Ifa$$$Ifl    r@ 6${1{{Z 0    4 la;<FIVW\HNNNNN\TN$ & F$1$Ifa$$$Ifl    r@ 6${1{{Z 0    4 la1ND $ & F1$a$$$Ifl    r@ 6${1{{Z 0    4 la$ & F$1$Ifa$1> & F$1$If$ & F$1$Ifa$ & F & F1$öжն[MMMM= & F !$1$If$ & F$1$Ifa$$$Ifl4    r@ 6${1{{Z 0    4 la&5s3\RGBB; & F1$ & F  & F 1$ $ & F1$a$$$Ifl    r@ 6${1{{Z 0    4 la38~ȾlF & F Eƀb+fF & F Eƀb+f & FȾ Cq*% & FF & F Eƀb+fF & F Eƀb+fF & F Eƀb+f]cjrx~ $ & F$1$Ifa$$ & F$1$Ifa$ & F$1$If & F & F^ ~[PPBPP$ & F$1$Ifa$ & F$1$If$$Ifl4    r $fT2 ~ 0    4 larcd M[@P<J?A8 .pE[  ?\h 6BHSkGYelR]%1>*CJ6CJOJQJ6>*CJOJQJ CJOJQJ56CJOJQJ0J B*phCJ5PLA3A$ & F$1$Ifa$ & F$1$If$$Ifl    r $fT2 ~ 0    4 la & F !$1$IfyAD3$ & F$1$Ifa$$$Ifl    r $fT2 ~ 0    4 la & F !$1$If & F$1$IfA`$$Ifl    r $fT2 ~ 0    4 la & F !$1$If & F$1$If<=3 $$Ifl    r $fT2 ~ 0    4 la & F !$1$If & F$1$If$ & F$1$Ifa$=ACKd & F !$1$If$ & F$1$Ifa$ & F$1$If\(QCQQ$ & F$1$Ifa$ & F$1$If$$Ifl    r $fT2 ~ 0    4 la q:LG@GG@ & F1$ & F$$Ifl    r $fT2 ~ 0    4 la & F !$1$If:Qj & F$1$If$ & F$1$Ifa$$ & F$1$Ifa$ & F 8  & F h8p  & F H::,$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl4    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$ I;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 la (>?D+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$DHLMNd & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$dejnrtI;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 lat+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$ & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$I;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 la+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$  & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$ !&*.0I;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 la0=[\a+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$aeily & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$I;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 la+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$ & F !$1$If$ & F$1$Ifa$$ & F$1$Ifa$I;;--$ & F$1$Ifa$$ & F$1$Ifa$$$Ifl    ֈ\ B6$F8 0    4 la+KL+$$Ifl    ֈ\ B6$F8 0    4 la & F !$1$If$ & F$1$Ifa$LM@<SENF & FEƀb+f & F1$ & F & F h8 & F 8 N^q*F & FEƀb+fF & FEƀb+fF & FEƀb+fPWco}~@h$$Ifl\H$Z Z Z Z 4 la & F$If & FF & FEƀb+f ~"#.h$$Ifl\H$Z Z Z Z 4 la & F$If.?OTUdyxh$$Ifl\H$Z Z Z Z 4 la & F$If[W@ & F1$ & Fh$$Ifl\H$Z Z Z Z 4 la & F$IfWvPOF & FEƀb+f! & F & F1$ 5q*(F & FEƀb+f$F & FEƀb+f#F & FEƀb+f"8V4- - <<$If & F & F & F & F & F & FF & FEƀb+f. -.FJt|| <<$Ifx$$Ifl0 ((04 lalJKfjkxdX <<$Ifi$$Ifl0 04 lalBFGkopi$$Ifl0 04 lal <<$If ?q*(F & FEƀb+f'F & FEƀb+f&F & FEƀb+f%<ZX$$IfP4F> Hi  ! (((0    4 Pa <<$If (+./>ADw\w`wX~$$IfP4F> Hi  !0    4 Pa <<$If DEt}}{}{~$$IfP4F> Hi  !0    4 Pa}!e~`F & FEƀb+f( & F & F & FF & FEƀb+f.~qlcTT$ & F<<$If & F & FF & FEƀb+f*F & FEƀb+f)0vv$ & F<<$Ifz$$IfP40 ]  ((04 Pa",-1Z[7<{ & F & F$ & F<<$Ifk$$IfP40 ]  04 Pa 7St :g:g g>vc&$ & F .h8p@ P !g^a$cA   A     n     $$ & F .h8p@ P !^a$$$ & F .h8p@ P !^a$, & F&$ & F .h8p@ P !g^a$  1 S k    a   g&$ & F" .h8p@ P !Z^a$,Z & F&$ & F .h8p@ P !^a$$$ & F .h8p@ P !^a$ ;W~ !'?\ 6 & F & F & F&$ & F$ .h8p@ P !^a$&$ & F$ .h8p@ P !Z^a$HkGYlR%  "7""""$ & F<<$If & F "7"C"""#<#G#&&0)***++++,77798D8':E:Q:::;;; <<@@@A"ABBB)C4CDEEEEhFiFFFFFRG3HTH`HHHH I I!IZIeIKKK(L3LNNNO(O5PFPRPPP4RURRRRSjSuST56 CJOJQJ56CJOJQJ>*5[""""@vv$ & F<<$Ifz$$IfP40Dd  ((04 Pa"" ###<#&&&&D{{mX$ & F<($If^a$ & F<($If & F & F$ & F<<$Ifk$$IfP40Dd 04 Pa &&&&pu`$ & F<($If^a$ & F<($If{$$IfP440 hv ((04 Pa&&' ' 'a'd'e'''''''xqhqqq$ & F<($If^a$ & F<($Ifk$$IfP40 hv04 Pa ''''''' ( ((:(=(>(p(qq|qqk$$IfP40 hv04 Pa$ & F<($If^a$ & F<($If p(s(t((((((((((((q\qqxq & F<($Ifk$$IfP40 hv04 Pa$ & F<($If^a$ (())),)/)0)Y)**+tqqlggg & F & F$ & F<($If^a$ & F<($Ifk$$IfP40 hv04 Pa ++++++f8z$$IfP40Ec ((04 Pa$ & F<<$Ifa$ & F<<$If++++++++++++/<u@u(upk & F & F$ & F<<$Ifa$ & F<<$Ifk$$IfP40Ec04 Pa /3B4b5Z67798':E::;; <v>4?@@ABB)CDDE$ & F<<$Ifa$ & F<<$If$ & F & FEEEEEE^DM$ & F<<$Ifa$$$IfP4Ft o! (((0    4 PaP & F<<$IfEEEEhFiFoFqFFFFF sbs8sbssb$ & F<<$Ifa$ & F<<$If~$$IfP4Ft o!0    4 PaP FFFFFRGSGlG3HTHHsbs]XXX & F & F$ & F<<$Ifa$~$$IfP4Ft o!0    4 PaP & F<<$If HHHH I Iw8z$$IfP40l; ((04 Pa & F<<$If I II!I"IZIKK(L]NNNOO5PT||||||||| & F & F & F<<$Ifk$$IfP40l;04 Pa5PFPP2R4R>RIRTRURYR_RWD$$IfP44F`   (((0    4 Pa & F<<$If & F _ReRfRjRoRtRuRyRRRRRRRs<sDs<~$$IfP4F`   0    4 Pa & F<<$If RRRRRRRRRRRRRRDsssDsssTsss & F<<$If~$$IfP4F`   0    4 Pa RRRjSTTTTTTT<$$IfP4Fv_  (((0    4 Pa & F<<$If & F & F TTzUUUU+V6VAXXXdXXXZZ [j[u[^^^[_f_Q`y```aaaaccc3dYddddseeeeefggygghhhgiiij jkkk llmmm6nAnrrCttuuiutuuv vkvvvvvvxwwwwwzzzU{`{z|>*5 CJOJQJ56CJOJQJ]TTTTTTTTTTTTTUsDssD~$$IfP4Fv_  0    4 Pa & F<<$If U U UU&U+U,U0U>UBUCUGUMUSUss\sD~$$IfP4Fv_  0    4 Pa & F<<$If SUTUXU^UdUeUiUqUyUzUUU+VDsssTsssnii & F & F & F<<$If~$$IfP4Fv_  0    4 Pa +V WAXXXXYZZj[]^^[_Q`y``a aa$ & F<<$Ifa$ & F<<$If & Faa(a+a-alD^MM$ & F<<$Ifa$ & F<<$If$$IfP4F e`  (((0    4 Pa-a.a7a:aD>`>PX$$Ifl4    jj0    4 lal$ & F(($Ifa$X$$Ifl4    jj0    4 lals-s.sDsEsZs[sjskssssssssss\X@\(D4xX$$Ifl4    jj0    4 lal$ & F(($Ifa$sssssstt*t+tBtCtdtwttt\xD` & F & F & F$ & F(($Ifa$X$$Ifl4    jj0    4 laltuiuuvkvvvvwwxwwww$ & F<<$Ifa$ & F<<$If & F & F$ & F wwwwwlL^MM$ & F<<$Ifa$ & F<<$If$$IfP4F a  (((0    4 PawwwwwwwzzU{z|Tsbb]XXXX & F & F$ & F<<$Ifa$ & F<<$If~$$IfP4F a  0    4 Pa z||||||<3(X$$IfP404 Pab$$IfP44 ( 04 Pa$ & F<<$Ifa$z|||~~~-P]mnuvȃɃԃՃͅ0;Pht yËT_B`loՠơ١)~ݣȥԥSr~XuBVb56>*5 CJOJQJ56CJOJQJ[||||||||||||}~~-@8DT & F & F$ & F<<$Ifa$X$$IfP404 Pa-8?OPY\^K<$$IfP44F *  (((0    4 Pa$ & F<<$Ifa$ & F<<$If^_koqr}LsbbDsbb<sb$ & F<<$Ifa$ & F<<$If~$$IfP4F *  0    4 Pa p0bpHbp4b & F<<$If~$$IfP4F *  0    4 Pa$ & F<<$Ifa$ \]p4bp]XX & F & F & F<<$If~$$IfP4F *  0    4 Pa$ & F<<$Ifa$ ]mnuv 14X$$IfP4    0    4 Paa$$IfP4     ( 0    4 Pa$ & F<<$If^a$$,o$ & F<<$If^a$ & F  & F^$ & F<<$If^a$X$$IfP4    0    4 Pa,1 1@X$$IfP4X04 Pa$ & F<<$If^a$a$$IfP4X ( 04 PaȃɃԃՃJ0Ph04 & F  & F^X$$IfP4X04 Pa$ & F<<$If^a$  I@$$IfTP44FW t!  (((0    4 Pa$ & F<<$Ifa$ & F<<$If'*,-8;=jD\KKjD\KK$ & F<<$Ifa$ & F<<$If$$IfTP4FW t!  0    4 Pa=>ILNObegjD\KKjd\KK$ & F<<$Ifa$ & F<<$If$$IfTP4FW t!  0    4 PaghsvxyKjD\KKjFA & F & F$ & F<<$Ifa$ & F<<$If$$IfTP4FW t!  0    4 PaKĉ_ZËTF & FEƀb+f+ & F & F  & F^` - Zq*F & FEƀb+f.F & FEƀb+f-F & FEƀb+f,Zȏcq*F & FEƀb+f1F & FEƀb+f0F & FEƀb+f/ȐʐΐАҐԐҤFfc$ & F<<$Ifa$ & F<<$If  & Fh^h5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$ &5' & F<<$If$$Ifl4֞J, fb.& 04 lal&(,.13I & F<<$If$ & F<<$Ifa$IJP5' & F<<$If$$Ifl4֞J, fb.& 04 lalPR[]`b & F<<$If$ & F<<$Ifa$5x' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lalڑ & F<<$If$ & F<<$Ifa$ڑۑ5' & F<<$If$$Ifl4֞J, fb.& 04 lal  & F<<$If$ & F<<$Ifa$  5' & F<<$If$$Ifl4֞J, fb.& 04 lalA & F<<$If$ & F<<$Ifa$ABC5X' & F<<$If$$Ifl4֞J, fb.& 04 lalCDEGJKW & F<<$If$ & F<<$Ifa$WXY5\' & F<<$If$$Ifl4֞J, fb.& 04 lalYZ[]`an & F<<$If$ & F<<$Ifa$nou5|' & F<<$If$$Ifl4֞J, fb.& 04 laluw{|} & F<<$If$ & F<<$Ifa$5H' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5T' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5X' & F<<$If$$Ifl4֞J, fb.& 04 lalʒ & F<<$If$ & F<<$Ifa$ʒ˒̒5@' & F<<$If$$Ifl4֞J, fb.& 04 lal̒͒ΒВҒӒڒ & F<<$If$ & F<<$Ifa$ڒے5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal 0 & F<<$If$ & F<<$Ifa$0175' & F<<$If$$Ifl4֞J, fb.& 04 lal79=?ACQ & F<<$If$ & F<<$Ifa$QRX5\' & F<<$If$$Ifl4֞J, fb.& 04 lalXZ^`bdh & F<<$If$ & F<<$Ifa$hio5`' & F<<$If$$Ifl4֞J, fb.& 04 laloquwy{ & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5<' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5X' & F<<$If$$Ifl4֞J, fb.& 04 lal“ÓœȓɓՓ & F<<$If$ & F<<$Ifa$Փ֓ܓ5h' & F<<$If$$Ifl4֞J, fb.& 04 lalܓޓ & F<<$If$ & F<<$Ifa$5h' & F<<$If$$Ifl4֞J, fb.& 04 lal  & F<<$If$ & F<<$Ifa$  5' & F<<$If$$Ifl4֞J, fb.& 04 lal ", & F<<$If$ & F<<$Ifa$,-35' & F<<$If$$Ifl4֞J, fb.& 04 lal35>@CEP & F<<$If$ & F<<$Ifa$PQW5' & F<<$If$$Ifl4֞J, fb.& 04 lalWYbdfh & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$Ŕ5' & F<<$If$$Ifl4֞J, fb.& 04 lalŔǔ˔͔ДҔ & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal: & F<<$If$ & F<<$Ifa$:;<5T' & F<<$If$$Ifl4֞J, fb.& 04 lal<=>@CDO & F<<$If$ & F<<$Ifa$OPQ5L' & F<<$If$$Ifl4֞J, fb.& 04 lalQRSUXYb & F<<$If$ & F<<$Ifa$bcd5x' & F<<$If$$Ifl4֞J, fb.& 04 laldefhkl & F<<$If$ & F<<$Ifa$5x' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5x' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$Õ5' & F<<$If$$Ifl4֞J, fb.& 04 lalÕŕɕʕ˕͕ & F<<$If$ & F<<$Ifa$5|' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5|' & F<<$If$$Ifl4֞J, fb.& 04 lal- & F<<$If$ & F<<$Ifa$-./5|' & F<<$If$$Ifl4֞J, fb.& 04 lal/01367L & F<<$If$ & F<<$Ifa$LMS5' & F<<$If$$Ifl4֞J, fb.& 04 lalSUY[]_n & F<<$If$ & F<<$Ifa$nou5' & F<<$If$$Ifl4֞J, fb.& 04 laluw & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lalǖ & F<<$If$ & F<<$Ifa$ǖȖɖ5d' & F<<$If$$Ifl4֞J, fb.& 04 lalɖʖ˖͖Жі & F<<$If$ & F<<$Ifa$5h' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$#5' & F<<$If$$Ifl4֞J, fb.& 04 lal#%)+-/C & F<<$If$ & F<<$Ifa$CDJ5' & F<<$If$$Ifl4֞J, fb.& 04 lalJLPRUWm & F<<$If$ & F<<$Ifa$mnt5' & F<<$If$$Ifl4֞J, fb.& 04 laltvz| & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lalʗ & F<<$If$ & F<<$Ifa$ʗ˗ї5' & F<<$If$$Ifl4֞J, fb.& 04 lalїӗחؗٗۗ & F<<$If$ & F<<$Ifa$5\' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$  5d' & F<<$If$$Ifl4֞J, fb.& 04 lal   ! & F<<$If$ & F<<$Ifa$!"(5' & F<<$If$$Ifl4֞J, fb.& 04 lal(*.035A & F<<$If$ & F<<$Ifa$ABH5h' & F<<$If$$Ifl4֞J, fb.& 04 lalHJNOPS[ & F<<$If$ & F<<$Ifa$[\]5L' & F<<$If$$Ifl4֞J, fb.& 04 lal]^_aden & F<<$If$ & F<<$Ifa$nop5\' & F<<$If$$Ifl4֞J, fb.& 04 lalpqrtxy & F<<$If$ & F<<$Ifa$5T' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5L' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5@' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5X' & F<<$If$$Ifl4֞J, fb.& 04 lalØŘƘӘ & F<<$If$ & F<<$Ifa$ӘԘ՘5D' & F<<$If$$Ifl4֞J, fb.& 04 lal՘֘ט٘ܘݘ & F<<$If$ & F<<$Ifa$5D' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5p' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lal "3 & F<<$If$ & F<<$Ifa$3455P' & F<<$If$$Ifl4֞J, fb.& 04 lal5679<=G & F<<$If$ & F<<$Ifa$GHI5T' & F<<$If$$Ifl4֞J, fb.& 04 lalIJKMPQ\ & F<<$If$ & F<<$Ifa$\]^5T' & F<<$If$$Ifl4֞J, fb.& 04 lal^_`befq & F<<$If$ & F<<$Ifa$qrs5T' & F<<$If$$Ifl4֞J, fb.& 04 lalstuwz{ & F<<$If$ & F<<$Ifa$5t' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5T' & F<<$If$$Ifl4֞J, fb.& 04 lal & F<<$If$ & F<<$Ifa$5' & F<<$If$$Ifl4֞J, fb.& 04 lalřǙʙ̙ & F<<$If$ & F<<$Ifa$450+& & F & F & F$$Ifl4֞J, fb.& 04 lal4wB`Ǟoՠơ١H~ݣ|ȥ/,Sr & F & FrاXuۨBVު8bDaƬ­1*=Uj & Fbު 8CDam­έ*=IUjvCD`ٵVaӹ߹Tbúκ¾YhWź0JmHnHu0J j0JUCJOJQJ 5OJQJ56OJQJ5>*OJQJ CJOJQJ56CJOJQJ5>*Hjس CU_`rt_T{$$Ifl440 : - ((04 lal$ & FPP$Ifa$ & FPP$If & F tuٵtupu<upk & F & F$ & FPP$Ifa$ & FPP$Ifk$$Ifl40 : -04 lal VӹTZabsuaPz$$Ifl40 : F ((04 lal$ & F<<$Ifa$ & F<<$If & F uvú_upkkkk & F & F$ & F<<$Ifa$ & F<<$Ifk$$Ifl40 : F04 lal ¾ھww & F<<$Ifz$$Ifl40   ((04 lal2;<RXYzdtt & F & F<<$Ifk$$Ifl40  04 lalzpL{$$Ifl440 4  ((04 lal & F(($If & F *+FQRnyz\`L & F(($Ifk$$Ifl40 4  04 laldp`` & F(($Ifk$$Ifl40 4  04 lal+67ITUgrstxxx & F(($Ifk$$Ifl40 4  04 lal1<=JTx` & F(($Ifk$$Ifl40 4  04 lalTU^ghLzuuuupu & F & F$ & F & F & F(($Ifk$$Ifl40 4  04 lal 'q*F & FEƀb+f4F & FEƀb+f3F & FEƀb+f2q*(F & FEƀb+f7F & FEƀb+f6F & FEƀb+f5 $<<$Ifa$ <<$If <<$If$$Ifl44ֈf> z}xbb ((((((<04 lal <<$If $<<$Ifa$ H>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal "DELN1l$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$NPRT_`1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$`gikmo $<<$Ifa$ <<$IfHl>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$ $<<$Ifa$ <<$IfHp>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal 1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$+,1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$,3579;P $<<$Ifa$ <<$IfPQXZ\^H>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal^`vw~1l$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$1t$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$ $<<$Ifa$ <<$IfH>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$1h$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$  $<<$Ifa$ <<$If   H>111 $<<$Ifa$ <<$If$$Ifl4ֈf> z}xbb 04 lal34;=1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$=?IKVW1$$Ifl4ֈf> z}xbb 04 lal <<$If $<<$Ifa$W$ !$h]ha$&`1$1$  !$1$  5OJQJ56OJQJOJQJ#0P/ =!"#$% P/ =!"#$%&00 P/ =!"#$%Dd<  C A2 4WR@MӓygjD6`!4WR@Mӓygj6e1xxXKTE>y0hFEQb5A#Ơk7Ƹu&ܹ֭LlU{ntR]u~wέ:UFo-1"J֪Zyk[іo Yq1 ⡵!a)}"%.9Q?ZO*-(zXreTu33s|f]z e|Y5]IM gw%69rSOwIBӇ}$@6LzG;>u`oo }?D9s1軅mhQn> G}۰;wPضw{(WaFS76- D\FKZ]D60nύG. 5w]Λ|%DxG`R,;>sDq`0v| jǥ]+gy|+PcMj\BbBILXTgl;Ly)&xaxWt.fH_&zi0m ŨGiL=`V_}%<~ @GycMex{␬Ct^G +OQ|mɇ^=iy!{N̛hq}WVM>vOtP|9)ףvP#n"~FH+V{4aYDh?DlCZC/p;WQ2sYMJ y/gq.)|g0܋t%c ~)lykkwMXr/dQ@R-?5٬αMNkw ut=>8ip+oŋRÜDsA3>Rp rSp;p\C\Ankߧ;nr9\kwyRKsxVs ]5qEܘ{Vxg8i d^QNl;ix܃Mσ!siǪԈˬFKhvVkݬFݸ楜mN#b.L8OBC{Φ\ȹc -ݙ5Qrg~9`m5wڥӰ9Ѫ4\ݽy(sٞW=ima}glwQ>SiXmssְJK5nl5҉3jag=sUg(nL|ufQ>7,7]Wܘ㌘xc-w2krPq 3!O4, \ݷzojY ]O۶**3`^ZVcZ+eyo*Y!s{65^Tת5D={fOpB1ұFE)#jE9[Wcޙn;]̻N%Y—]<0'p=gѻ=+rpumfLwsi E5wZePW8EFd߭ܿw[|ŭ[v.ݼP~:{7yV&nFF:+(z ֑ځdm]Գgk2jk ։ںkkzօ)wj*u ֧ Ԩ}m)?Oa6g5uLS}DyK _Toc428959857}DyK _Toc428959858}DyK _Toc428959859}DyK _Toc428959860}DyK _Toc428959861}DyK _Toc428959862}DyK _Toc428959863}DyK _Toc428959864}DyK _Toc428959865}DyK _Toc428959866}DyK _Toc428959867}DyK _Toc428959868}DyK _Toc428959869}DyK _Toc428959870}DyK _Toc428959871}DyK _Toc428959872}DyK _Toc428959873}DyK _Toc428959874}DyK _Toc428959875}DyK _Toc428959876}DyK _Toc428959877}DyK _Toc428959878}DyK _Toc428959879}DyK _Toc428959880}DyK _Toc428959881}DyK _Toc428959882}DyK _Toc428959883}DyK _Toc428959884}DyK _Toc428959885}DyK _Toc428959886}DyK _Toc428959887}DyK _Toc428959888}DyK _Toc428959889}DyK _Toc428959890}DyK _Toc428959891}DyK _Toc428959892}DyK _Toc428959893}DyK _Toc428959894}DyK _Toc428959895}DyK _Toc428959896}DyK _Toc428959897}DyK _Toc428959898}DyK _Toc428959899}DyK _Toc428959900}DyK _Toc428959901}DyK _Toc428959902}DyK _Toc428959903}DyK _Toc428959904C}Dd1@$<  C A2|d^Q ~:y|d`!|d^Q ~:y @q{YU|x\ xTE{νbee,aU/1I \X|QQYʢ<#*H1Pu;}{oRSNuΩ(NEQ8SEC*WRUǒkT==HI6QQQTjToj(U Q S6)^u.U(զ )1zۗۗ&w;2~{f P_2w;1e2nWn}cxI8%$nG'CUuPS}}]w $_%!L_|{rgud+d-M4JL3Ń&J>}գuM-ڦ,+Ded[ovOm8ձ1u$ e/x<؉щ7cURHgV'>/0>llE2gI35?ϕ3W%d.}oQhVS+ASz;ގwZdUU<<[DG1TO mS1k!)v$ćZ{l%Udq[sr pSbaw]e0%!8daNx})JPWDo=V'-gL5Va[!cU!Q5pI^5#\56^+/6a[lv%rb%ͣ3neFpՉ@UlQ<: ]<ufGP+*. T1C1VcinX2keG>u{ݮdF[@~Բp-<13zHo}2"qtJF>tgru3cdڒ ^xXXZxx%9y3d :B-/W as'ps?>^OKF"suzz7V6/ A%c-4# `QVSyq#'x`Q >Ix܉YW9c0'xM jTE~;D_V+ZTXBzU#j]5(`hJ$[ȎDmɊmb*Ȫn Mm%L i|oOC6aQ֬ydJS q؇.|dOI:1؏gy'h&5ʚ|?Y;WQcK4"AZ+F|*{:>]PCƛW`Q[ԖhJ5̷8aRr&醙gğUOȄo%1RO'*[ e_p|,-|BҼ6a5鳁zެ#f_c2y^H>4B~oG@\=+=D|s#+ٻRq)Q|h]`K`9ʣP۵D,Yǩf~dPy귏+71M[󡃙G?x5bǻ̹Љz^+)c|g;xp |ƚesdg#|(ddr{j4ҪX?N1󃰛I<w`7;~.Q<*ky߻3H҈R)~"%x w`O>PÐ^&(IlZ& :QzGm/E(ș;˵JkCjھ=KYY_RJ~@wS2Q1[1A+^ġC28Vz;q35V$pSc1vϛܯ+ҎCs] xsΥw6\y-"˟RW|MJ' IϕۻyO[Gj*5>'Glx}-EܾXB9wSUz(/7r\eK/e6^˜R"?4s@elg;`} Nr@rZ(o\KF_p-'֝h' 2N&)oxh37{gY'Snwz/ۑ3 G$#v2kGB>CF)7$tcJ}_,cT|[}Q~Ы߀,e{- q ZMj75߭QTJ es+ZP6v{}5uBN-ڎS6p}[Yu 1ʱ+ynj8;=t;m%_7ԍ%>F83þT\Ŵ)Oh&|uwZ[񻚯2ba͢_W[xW.Gv=zМݦt%8Y3y޶L=Z#Yu8{\=c LBD:9 keS.w{hmj-BX|e7ove\CXYѮ? E:B[M}f&p^D(}K:, |eq^cC LnWw`%k Zj~ͱTGYd3DO$(Vd׏2 E@0:КAT"ZcI~a,K/b 5tuXgKh#~Yu6tTG˔8%6jcoRQ,ArSsM-}礽>?N 9_H VrMɞ~K {SydfN>6 f9w9;r/Gxl3H\hd" 0'M& ½%_ş|+"C4 yH'{N׉"M&wa2? |4*[l ;7?@KAAEԃ_I\Gj@u%?L.اAgR7c3IERn=5=lʿ\F4̃רnۘvIFiӧO+q"pcEF&iZ ouRʤIww g 1_V$,y9)zg`؝6F*!׮يŋ#g6cMa9~Y"_nVE|&vo%E Uwٚ@ۿRۿeU۵?hf?CY⿳";On޽~tQnh]Ǯևj B.øpv aI>VecFJ9hʹ-E|;>A{ߧ-|*Q$*ЖrG_qz zw!''"y5# Z]G1KcE QěmP ac#sY`ZB j#Eqw  ۷qY~>}nGE&}GUm*P4 9\_{[`>DAk݈on3omga[_7!o@nGKIe{v# *t)a֍h4vdEDO(vf%Tȫ Zw17v':.YVۨ _?B +ZdXe8}JtY >{I1Rd]%sls тeבUq ߁~ WZ/`p IFC-Z]I#UsykelڇƪXVI+'a ? 32?(gzsOB}YK^h֬l-RکK^0tbdi"yQn9x %ʙ82!YLw@&D, a_(d5; geѸO!I^ ɚFE6(l-YsI2,QDbg/yhK^φư 4EyDdmGk4Wq |”uE/-?Ns\z=zE٣%$/)Z|p*W{8rW,ѳ3ػ*l@ "{ ,%d@dDE@°qA|(,PaYf}(`T}lSAy8*:(n hT|&}&A~oUUN{2njO~hu\ $WЎ?~=U(vDw8ށ-ʝ嘷S=yW #w7(xpmjYU- Fn6{h\j%ZyTm&yNm5I|xno^2E%-J+wh]Z|?*\eExx]f}kx:S(I,u}<&>|pXOͭ{'uFWi<ǁ=q1S<|6,_lXm[kSbܼ1quRU9uF:sD$?T&׳/WiߋNYqFЃ^:j*C*h*VhT5TkT7Қ>MZ3uv hnq ʴEDNK$ā+NT;jb֪Q1p4 Ju+vK=0 H;r NZsLHa^x|њ*[Ơ-tv U9~ _Byn+1td.{ΤoiYynsҽc?/Tܫڡ`!UZVW}l'Tvuq~? ~ςL~| 37{x:t*yB#:^huBqq+!ʚSL}|)>Ta(LGOj-U}=%Xf&~^|oP8rBqITEɬ-[EQ/Mٻ.dt%E5^WC\uGަfI}N;w ~qEm69GpW4:ީQ[[4XOHyBPWA2rzRP% jTXg]UKUi5KVVگ)VC[:y) Ks{-Wd/L{Cܫ7g>~M(cIFVꃐܧ^Gsn/pbjߋ}#aj#,iCX0t%ZʔUʌHV4tU$@:^ɪjFrP(HVcٶJP)DUWuSՃ8}ö@3s:"Y!kG)0^:0c]!__~4hHdMWM|<+szOY9OJxO,œ+p ht \:v)s|I.WGFRpKeNa'VNj;o_ ̠E=MAz?׫O][P_‡OzғT ESHDd7{&j L{.ET( *14jHK uh<}z"fR718ߟuK]P,=Bybj 6J[R^ބX3Pg$f6gQ`4yfP J6tBcE4I$KM)f)b=C4 ˛0R<,i,Wo/yx*xoG2ЁNabJ]~.z<3=KoҴn3cPpqΞ&~ȶm7h4UD{x%^7zqۖq㫟M' 1.]X9D'#:I׳K=foP~/& 밊DfMPl"6eixvo #^wE::˛]Ş `Jyn6,&R6"n!jT&I4H<{D"ȼ l'~O~?>ß;{{.Z^&L{@*FbCk ʚV1/> #,NDt-m-Li,5 24qS/oQo+]S @YAjJWCjYʛ0'{s`ϱMC.{t3쭜7a&l|N n#yQxX&i 5bPT{%1MXLϡsvRym@kj@xֵ?oBmsX c"ƛ:"ƋAϛV7-īM + &doT &ٸ5մV֑ MhE8Q;ӃpbjL/N=!'Ѳ,NOZD]zsyPShzDi-=pN/DdxCk\#k+dok=Z*-È kVn3b('bw3OM}ڕ4%>jd%?̓脃Sb[ӑ>kq#83I^3x׼V<x]f-}y^جn4̦{I|,QC ~~Ed;uP^c_ W<&f\? ~ÏCGտ̢}6Uf'`NE.3"߂Ve*tÔzI!.Gͳо [Ǭi6Я0Yf&D?QOʍ6k-JTfzVa@F:dsS`U64 \'q9}_~s>-&GOf_5<}=gg1pX_wh]ܧ2;LE4-ou1u/zsk~Re}}A8Z m= :Ȼ+04 ϣE%?]M --\ϹW7*G3gZsoM6zl[OizՈ"L=g/ɲ1ј+/Z2z{vص"UK`5Xל׎HVseKu*w8OC}HoF?\]cڠY9|y">ձ̟j/1r'4GІ=/aOgK9%?}7diO|?t(?PQ=>q\ [w=+2tNFyIoҲ3o)mm(`@i,P:R l35/l%>=D"l"Nn|vf,ӒZyty+s QxWxיrFbX+3$0 Z)iAlc&9FlĚ$V7R蘕n"ZU</_Fy~a[C5DQ[jVzj^ Uhvj'hv{D3hSEߛNs*}D|XNՄ8%>gÂ+]3zoZ^ r)6Y­3kLa?'< xf3-upܩ@`!HT :4g?=KF`r} ?V^s ~%dcIMy}ɟh}^^v0^qcIņoFM0|iׯ\5":'P#_P1?>?]Csρ%;fՒOQ'z}RJ+U#Uʕ?H_k9W3:FuN~y_9֏^o4>jG_~z|Ut[^'NKw>~z|;/:GҿD?zN/:'#s:~92v_ukF6u]s_+Ǐ^coKwiBw%sWg:vSdJJ^'߮zk|^'߮YY#nFB{]iׯKφ _zy}~NoDɷ z7/d~{JJ [V7=l7U=Z{AJ ?ջ| y^8Z}+èWkz7W+^6{*z9Y76oc~{~CrB wx6{Mx^p~w8_dOeZ;/Pynnnϭop(\>'l}[ڌ~YR^ڵ+/=-,/SfZFb|ke΍;ݷ+_>:ۃnپfW}\Ÿɓ/Gm 1+~}c_4d 1!/q~̍\ u+goC~n Zz9^KkIVW^1 ̏9kZ^Kkz-Cmk[AvP\vI]keV6PkZeZDkZGQ%Z^Kk3 2Z^ 쏦rbgP^t~}މ>Ɗ֧ue7Gh(؍>߷OPB=bx6^t2EkZ^k%K+z,Ŋz^kqz^kZz^Z^Kkz-Y%zm^kz-Ke3z\,ve>SԳM}/2?Q 涢=zG(ٻ#|gz-#7^kz-]e EmkAr%vIGRO={ZeZDkZGQ%Z^Kk3 2Z^+l}V'~z-&7몟yGcZ옒5I ALo+PiyP`B?BB. .G"]D"۽t!@.N_=}5 ?M7lxqQ;|9SUptb~`l.s⅚Էoߐ(ݯ_?KECl~DH꒖ JHQD8; O2yB|QzРAD9eY>(=x`gwgK4Έ҉."Xh]_}UgwWq-Ɋ,"J2]T%y-4Cuv( EDaÆ9D ՠY& J>["YeoD#F8$kAdmh mE=@(=j(gwh@4DD餤$gPшdhCG!$D1c8G$f9 QzرѢɦ,G#J''';Ž$ALF7n;U$y/4TD锔gњdKhSSSݓEYNF?~{xdhSҜE{C(=ag,ёd{h'N-:r6I3$;A(g/\ D@\(=eg"<.,!Jk%Y.A:u{xdhMI2QzU/,W!JϘ1ٽF D3g:׋$@\(=k,gF1`h_ugwAr(4,DtgwH"9e6ٳ$Y(=ggvJr,4suvHB܅(=o,0EG YA^xXNr 4K,qvo\ҥKݹ-oBEpvu$߂f(l2g:hg/_>'6+[InfWDLgɭ,/ JbY^D^r;.h!JZKr74W^Or/4 J[@"e(fgw;L4ːQzڵn;F04KQzݺu$A Qzn>o/NB,(agwG2e,ƍ$YVD޴i<ɳ,A~U $C(λH47o]b Ͳ;H k Jggg;kzYD޲e; "f(uVgw ΰ(mkݷzHfy+mpw=/d9h{=gm^E,oC޾}w-Ɋ,"JرثJZhw˫F*4˻wWd5hE~xHրfytNNWd-hwϻdmh!Jz$ofy?={x Hփf~n5"eD{:zwlͲ-G}n5%y'4vsv?5#cwv?K4?cgw'%{YvB>p5ɖ,A>xY ,E>t萳$@'|'04nҟ~8,{ J>|׉,_BϜ:Gqvu!ˈGuvͲcǜ$A(}qg`/dhO8&rɓ'ü~${C(})gHo~,G"JGX;K$9et렛c$YETo$ɡ,SO>NHf(_8'z$YNDsvORI&C(_:yIB(}gLo ɉ,g"JWto:),Ϟ="9\Ds9{sH΂f9Q믿vv/擜r!b5wnvvrmP٘jm'Άތ el;fw&L`%c57@Vdl;fZ5jm'^ XݙЙ*Sƶkvg@/V2\{1RL`Xƶkv/^ vry 0<Nٝ=Xvrг1LN=uL`5UƶkvO &vr4詘*Mƶkv@OV)2\{ L`5FƶkvNVdl;fpqjm'=X ݃GaA2\?L`_ƶkv vr^Љm' =X/@V/vr}1UWNtoL`m'~:X=-c5~X=)c5;@ :vrGVvr]0U[N tgL`m'n&j%c5[@? Zvr1UsN}t{L`um'n&j"c5~X!c5Bc2\6V6N]%&+c5o=&YƶkvAXvrwc2\:tL`U]ƶkv_}&^ƶkvW &"c5+Aߎ *vr 1UN}5t]L`um' fL`um'7a+!c5#>1sl;fw>1Um':&AƶkvzL`wN-tUL`m'teL`7N5t%L`m'>]X_@ &Bƶkv]X}.c5O@V'dl;fh vrO#'TƶkvO`u@ƶkvQVdl;fK'#c5sKL;@wvrm)xm2\; el;fwYXevr _ jm'^ }ZVkel;f*jm'΄>)xLNٝ}LV2\{1g'Z,c5@"x2\{X͓O`.c5gB2\ X=3O`Sƶkvw^,x2\+BXuBYVvr iNt g m'n=MVdl;fw[)'j+c5' *^ƶkvN_x>k9k 'E(} Hk=\`j{zr5*0R5=)uo[͓c*7|毠9bs-hBk8gZR/4ΩԥgfK/ia(Gպ-3;;|"U%-3o̙ y6{G\.\"_Rs"lR[V"> l_oL~59>~)?;ٚ00_]q(j%,DRuj8K34*j-UVX[tֱ:6Ddžxc3tl-Ա:Nۢc;ulӱ}:vJN阪a+,Uҭ:VYXCkc-uuб:Ct,Oؙ->"_U%σQRQ.v8S,lDow q~I/{EJ1Rἱm9"{0,>.8>Ȉ$Z@%w)fIhqnbd7yL%i;Ih]λx ȗF'IܼKwo ׈F7Ih]λxMD#ُhn%f&o$Eu9Am $A$Es.޹] &\ѺwFrIܼKb;FѺ0]D#9hn%{nAR9Z)rH$)wG hn&{8~KJdhz+yh$%)y@$yL FrIh]{8 1HR)SzOIh]Q D# IܼKbq.ՈFr1Ih]{D#hn%{d-\FR9Z^.2C4I]2_ $H6GrޫE jyLﵢ)MFr-Ih]{hdS\OR47D#2Ih]UKFUyLr [FѺfqfyL-j "-$Eu9m#W6yLŵ@v$ɷI6GrEW %$Es.J4mw^@H4;I]2?}E4mw@!$Es.{-@ =$Eu9"[Fr/IܼKv sFKѺWb(W$Es. ѺA1D#yhn%H"C4GH]2 F8Ih]dH$)w>-rH&)y*&HJR47SL4!Ѻ#9h$yLo)rHJѺw D#P]2-k.F")yZK4$Es.]1h$I6Gr dIܼKwe9 deѺ9r #sH]2[+\N4I6Gr55@$ɚ$Es.޵uHd-Ѻw% )uH]2[H')ygY|h$H]2Yoh$ͭkz_h D#y!I|/snj D#ٔhs.m D#MR47D#قhs.lER47 .lCR9Znhn%ӻ{F-Ih]λ/F=IܼK5 5$Eu9NA d'yL@$H6Gr]c@&ɮ$Es.7X'IR47= uD#9hs.dW\@R47dw\DR9Z^bH.!)w5ȾD#ד~P`kzד͔=q=~DדGkq\h_ H&z=e@nO\ONR^M2 5דL ʀ`O\O{ (R=q=~D/ H{2 דI3\ D?Mד(R{zrޝC{=2 {'ze@''ݖi\eD?Fד)K=q=~DO HH/"ze@"O\O߻1ƞ\wQAt7ʀ O\O(](RG=q=~Lד莔O\Os H}{FeO\O{чf@j''=f@j''}7 ̀ݞ\D#0RwzzryDEC3 uדf@GO\O( ̀QO\Of@''3 ''5cf@kO\O{ѣf@j''wf@j''f@3O\Oc ̀Ǟͻ]R_ԯzcşw)Vxޤ_b$.yusM %7i^ڿצĎ&2rޤӶZ7$;wQnJoY)7idfkdʇ{&XO MI~ޤҔi\;PS)n{ҲäΛ+%$;oҮۃm^#܏Ku`pʊ)ϛ&8l>#ş7iPo'%Hwsbѱ:6X&d%;oRT5wOl cY:c-tױ:Gc:Vc3ul-ұE:ZVFۨctlױ:v\ǎX0Młi*VUǪX=c:c9:ctWZr-bPZp%;oҠF^7iPZ.P]gD&J!t,KZX kcuѱ:6B t@fL[ctlֱ:Qv.ۯcu츎1UV U2DUcteXXұ^ik& JKmYifWI[N _ti&ZE0IT Kt,KZX kcuѱ:6B t@fL[ctlֱ:Qv.ۯcu츎1UVX[Uuӱz:c:c9:Kl͛+ek)j@Iϛ) y=]fuݚhVY]*Uz)oqNh%T 0$?oT~fϱؓLzwGS]չTBWZ@8>s!ѹdVNs+9v=v\#-Dqc5o=hS t10ʥz+z*^:gJտEᙎj333{3q۳#Ρ0Hkx V}gr*CH0㢿rtsWcJuOB3Y?9N-:{N6ƋnDG#b{'~!2?˥=R\H2P[Q){V$v> o($w?Q+ Qg95. gmd ~c7eΏύ~gW3;%ztt?SS)h|-s>@Au\Xf߲`o#g;߲1hl 咴\;Ӫ.:=#9_!T{Ie=½s 2(:j<| /,X.{|f s?^}E832EkOoy 'fՕck?hAX8G OFm,'VFI9eFNh߿Z勺-̕AyQo(Fy WW(BڨepuOtkfFw6G UVp#|+ز&wȏAoW_.;g ~e&FnON~Ɯo[`7> gEXGK!ϣ),B'‹'X+|-հ{5`rM_X>y ʀ?I?ј_:,-"Bn)65,:@9frlNenZ]m;V]s5~}+Õ?(; =1^oGm^f45m`_=aH#'fkz;h9'wJtVSgi<ڇ8Fӝ 2dcl-SXn$ʸ= Kr=j9*x߫H.`8wE΅ۏG(רh3ή*Jkb4͙Mq "8ۯE(hgUc%ʵ>[2nX\2nT\;Uᜩ2n 밑 r䚫|@2UɽNUr$WԄ3UI*D 2^:F;u|ZEg/ְ<)uW(>pRe*2#-ocT0ѽ됨_]ʍVVP3k'?aWJr7vh79'CK,EqˁP[wP+XAWj`5.(Xn *wr 9n:v\+rwnA8n..Au=m! BO o`;v} 1^|9>sC:O%Kr*^QJ.ڗFh<zP;4^iɟ~^@^Z ]X.mOM x? ;BOBO+B+d8mz ͇_zg6^ZI wriNJ`kHdj}p=BR]-lg{Bp:)a$כ mC!߳PWɁlJ6Vkϡ>Q%qManˠevw]]`wۙ\I! /rMMaR *Zzn/MϜǵuU!NWqs6;[Pɮb9g*>zc_$?z#M-c}yGVtv}|H֊L'SQD2eHs /GޑxQ~QQ r(w5AQS:a</ɬ]Fn(5B~']3CfFfSFye=g@yQ~ f(ZUy\WD7헺+I)i%'W|D Hu+RKH};V荟kH[#m^m^twnpDznnf- wtS$r]A\vx7Bέn98 #Z;\,'7z 9H"}t7z^ gZVG(ȁ%kB`8an7p XT"ؾ6rk|CPpͯj{,'7zC].;c9;&N=yMXNnwvMWxus?t.q7>qn tCQ e(ׂr3jCpG(3CyQڨ&e[ϠgQ)':A Z zӱ?*'4y)nw+v';o?9%挵ۢG`"K:$_7G95ᾩ{q~z#Mn߃fUvwAGo\bcGo섿;TqI%yj" <<&%1'^u4¹XnmuVû\b9V@2rٵ[7n{PQŻNnƿKEN'wsګ.WN(~歵;A<&{# =ѯpbgn~V%:+gqwؗN elu8l O%kgu*vSU$8insv ^rEny2 U$*:u.n\P\un\svgAr]tt/w\iX\WgN;%չLq;߹DB1 Ι*#pV\wB\='\Z7Sʸ=L5pzuswq߃$8=^2noN2W'}T7ށ4}KfUJqh%J=.77Gop4c$[nI'\;|԰D-wjI\=?;⢿;N&us*)<?>/ROW:bDs`:uF͓;o}yc/s^qOi // `2۬x7Amx_ɔpzpXf N"Y9RrZJmִT2e'=9)\/=Ѵn3n$Eerldw29b.F'Izwo1ȹD#ٛhsLλX|GR^&}XBhsL{x%D#9hsL;W,9%)\/"Vh$my!h$ )\/&h$my/h$GmyH$)\/Gl5}yoh$ǒ}bz+ hsLλ@ D#Y@R^&=A D#9hsL{D#9)S$$vh$'my?"vh$!)\/*h$myO_h$myh$gmyO4H6爃@ 9$Eersa \29Fr>Iz3$LjF294'Fr1IzRFr)Iz2aH.#)\/^.$6H.')\/~ARPIzjQh#Wmyi@#ɵ$EerEiD#hsLeQ |hsLUQ D#*IzFq.ՈFr#IzfQ sFr3IzQZD#hsL{Hn#)\/~[42h$&)\/.ـh$my/لh$'%ח:-ehdSIqKlN4myh$wmyٚh$myWy9H%)\/Rt*hsL+D#IzqFIzAF Iz!ȮD#yhsLdw)ٗh$Omy@4I6@"_I6Cv sF2DR^&툡@N4Iz#J4hsL;`rH,29oHH6S| d*Iz7μEd:Izw5 )\/l=LR^&}5ȇF29T 'du294 dM29ZHd-29:l )uH6[sM4I6伳@%,29FB d#R8}ȅD#y!)qXRZh$myg[ˁ|h$I6[X+\N4-H6[Yk\I4H6X\C4mH6伯^rH^AR^&z ȗF-鿋; +3t0)E"a YQ A N*8@ !lIZIH0KQAW6q&*3~wfq^3ݏs_=wS:^=0$IHtvL+{PHDtvL+{hO9JzVsB>CTJg˴/ iR)]/ V GP)]/ʾ,. A^FtvL+E!y21BH*eZWE 2iWQ)]/ʾ:)䫤A^MtvL+IWήieOG 'P)]/ʮ 4:*eZٓB% r2);B' r 2i!!! r2B" F*eZ7EIJzV訐1iήieω*/ 9JzV\2S Q)]/ʞU YN|*eZ iBV@= !O# r1V%G<4%TJu^}\ȏJzVB~4TJg˴oANtvL+gy2Qw!JzV@YM[xWX/Wz\=&:e5:{(/#H?JP#&Wg't5jru0j`/IzYM@!:e5:?^VkIZ/}H>^V{w:e5:'TO/=HCP=&Wgw#}7@u\};/5o/]H@u\ݙNoN^V;^DP&WgW@U{YM@:e5:;"="/g!3e5:tujruo&Wg7JP^VLP&Wg#=yYM~tݤFP&Wg"=vyYM~Wu/ٿ'e:H^\[җo&Wgo#=yYM /o&Wg?O:zjruԳ^V7BP&Wg?E":zjruFJP&Wg?Nt /ُG&Wg#ݗyYM~ga/>\tO:Ze5:{ tjrujjUϥU^V&Otu;Iԝ^VBP˽&Wg/#1:Ze5:V[&Wg/"}&@-\tG:Ze5:{j:e5:{6J:e5:{&r:e5:{:{YMξt1뽬&Wg_Gu^V'v!@M\} !@]e5:{ڑƫo+՘3T~nB#{ή9:F$cr\.'>]`鸜>ceSsssϷe< ʳ ){<)XZj5ۃ=Ȣ"{hE>Tks -3]ؽRKA"s'}1}Zu{\ze2Nve'w74~M~@͓yoccX6vEQ4KRRVJJC9n~BSꃷ]}9"A]pNN?w֪.+0z\n Ί%mw=ZcU񛵺Girf{%[%A AMmg#FAI/IF!Hds'C˯ly?;#^D)+ۧkr['Ǻy"d=^g^{} ysK}my+\oⷊVѓunq U,tl>G:S~ '{*ٮ~]t~$mUP[w5PWpʤ_\\W~3K݋nwa[\*68,Ֆ3K/ygeQxW o̒ŶIsx{-Fu=fC{enߗ\)-,ݒlׇmf)N6[si{:ͯ&W&/V)My@> Heading 2,2 $<5CJ>@> Heading 3,3 $<5CJ>@> Heading 4,4 $<5CJ>> Heading 5,5 $<5CJDD Heading 6,6 $< 56:CJ`` Heading 7($$ `- a$B*CJ(OJQJkH'44 Heading 8 $$a$CJ4 @4 Heading 9 $$a$5<A@< Default Paragraph Font,@, Header  !, @, Footer  !"" bullets0O0 Exhibit <<56O2 Bulletsx & F<<>Th?^`00 Author Note6B**)@Q* Page NumberCJ2Bb2 Body Text CJl>rl Title<$ ) p@ P !a$5CJOJQJkH88 Figure Title$dha$FF Bullet Format<<^`6O6 ComputereseCJOJ QJ kH$$ hading 1L#L Table of Figures $ H^`H8@8 TOC 1  $ 5;CJOJQJ>@> TOC 2 $ :CJOJ QJ F@F TOC 3 $ ^6CJOJ QJ B@B TOC 4 $ ^ CJOJ QJ BB TOC 5! $ ^ CJOJ QJ BB TOC 6" $ p^p CJOJ QJ BB TOC 7# $ L^L CJOJ QJ BB TOC 8$ $ (^( CJOJ QJ BB TOC 9% $ ^ CJOJ QJ 1b PDLh& & F>Th.@OJ QJ kH',r, authors note'>P@> Body Text 2(Z1$^`Z.Q. Body Text 3)B*PP Box Format**8$d !%d !&d !'d !^8`,U@, Hyperlink >*B*CJlC@l Body Text Indent9,$ & p@ P !h^ha$   % G F z z z z z z z z z z z z z z z z$z$z z z z z z z z z z z z z z$z$z z !z "z #z $z %z &z 'z (z )z *z +z ,z -z .z /z 0z 1z 2z 3z 4z 5z 6z 7z 8z 9z :z ;z$<z$=z >z ?z @z Az Bz Cz Dz B"(H+%39AFK-OtT;Y^bg-hUm]tzH{kOƍvx6I'ҽ1L"O' &2<ZE3NS\ycmrzw8Լ3\D  1  ^}kRwjn+/[y !"#$%9&&'%(7)*>+,-./0<1 2Q3456G789:;<=>?c@*A+B5CDLE2HIJK`{Q1eD0m4t6f&_@ 4 v  D $ c   # 6 D [ n WmS2!"($*$M$d&()"*H+a+u++,,-x-=..t/0z0001Z112%3@333345566877G8l88969T9x9:8:;$;A;g<<F??@@AAAB BBBB$B'B4B9BYBZBaBgBtBxBBBBBBBBBBBBBBBBBCCCCCC*C4C5C6CCCDDDDDDDDEEEE5E6EaEyEFFFFFFFFFFGG2G3G9G;GHGNGOGPGaGcGpGGGGGGGGGGGGGG0H1H7H9HFHLHMHNHSHUH^H}HHHHHHHHHHHHHIIII/IAIBICII,JJKFKKLL$L+L3L9L?L@LQLSL`LwLLLLLLLLLLLLLLLMMMMMM!M#M,MKMqMrMxMzMMMMMMMMMMMMMMNNN`NNN,OBOHOOOWO]OcOdOuOwOOOOOOOOOOOOOOO?P@PFPHPUP[P\P]PbPdPmPPPPPPPPPPPPPPQQ(Q*QSStTU(UTVVV\VcVkVqVwVxVVVVVVVVVVVVVVVVVWW!W%W2W3W`WaWWW8Y:Y?JMZ_Ά );<=ACPZ[\ +/NOzP~ōލ 7PQWYflmnƎȎՎێ܎ݎNOUWdjklqs|ȏʏ׏ݏޏߏ,-9;M_`aQGx 4PV]ekqrǓɓ֓ܓݓޓ0179FLMNSU^}ƔȔє/ABC 1bw}Ж "/tu{} +PQ]_qΘytUeÝН՝$(56PQ^bopwz(5:¡)=JKƢ͢ڢۢijw57D#$+2:@FGRUbgɧʧ QRZ]ijHI]_lm©é٩۩@ANP]^DUάӬNOyzܯݯ;<FIVW1>òвղ&5s38~Ⱥ Cڼ]cjrx~ҾӾy¿<=ACKd q:Qj (>?DHLMNdejnrt !&*.0=[\aeily+KLM@<SEN^PWco}~"#.?OTUdy[WvPO58V4- -.FJKfjkBFGkop?<(+./>ADEt}!e~",-1Z[7St :g:g g>vcA A n1Sk a   g     ; W ~     ! ' ? \   6HkGYlR% 7 <""""""""# # #a#d#e############# $ $$:$=$>$p$s$t$$$$$$$$$$$$$%%%,%/%0%Y%&&'''''''''''''''''+/B0b1Z23394'6E6677 8v:4;<<=>>)?@@AAAAAAAAAhBiBoBqBBBBBBBBBRCSClC3DTDDDDD E E EE!E"EZEGG(H]JJJKK5LFLL2N4N>NINTNUNYN_NeNfNjNoNtNuNyNNNNNNNNNNNNNNNNNNNNNNjOPPPPPPPPPPPPPPPPPPQ Q QQ&Q+Q,Q0Q>QBQCQGQMQSQTQXQ^QdQeQiQqQyQzQQQ+R SATXTTUVVjWYZZ[[Q\y\\] ]]](]+]-].]7]:]<]=]Q]T]V]W]k]n]p]q]]]]]]__2`3`A`H`X`Y`l`o`q`r``````````saaaVbbcycddgeue|eeeeeeeeeeeeeeefgg hii6jnnnnnnnoooo-o.oDoEoZo[ojokooooooooooooooopp*p+pBpCpdpwppqiqqrkrrrrwsxssssssssssssssvvUwzxxxxxxxxxxxxxxxxxyzz-{8{?{O{P{Y{\{^{_{k{o{q{r{}{{{{{{{{{{{{{{{{{{{{{{{{{\~]~m~n~u~v~~~~~~~~J0Ph  '*,-8;=>ILNObeghsvxyKą_ZÇT- ZȋcŒȌʌΌЌҌԌ &(,.13IJPR[]`bڍۍ  ABCDEGJKWXYZ[]`anouw{|}ʎˎ͎̎ΎЎҎӎڎێ 0179=?ACQRXZ^`bdhioquwy{ÏŏȏɏՏ֏܏ޏ   ",-35>@CEPQWYbdfhŐǐː͐АҐ:;<=>@CDOPQRSUXYbcdefhklÑőɑʑˑ͑-./01367LMSUY[]_nouwǒȒɒʒ˒͒Вђ#%)+-/CDJLPRUWmntvz|ʓ˓ѓӓדؓٓۓ    !"(*.035ABHJNOPS[\]^_adenopqrtxyÔŔƔӔԔՔ֔הٔܔݔ "345679<=GHIJKMPQ\]^_`befqrstuwz{ŕǕʕ̕4wB`ǚo՜ƝٝH~ݟ|ȡ/,SrأXuۤBVަ8bDaƨ©1*=Ujد CU_`rtuٱVӵTZabsuvö_ºں2;<RXYzӼռ *+FQRnyz½Ͻٽڽ+67ITUgrsǾѾҾ1<=JTU^gh' "DELNPRT_`gikmo +,3579;PQXZ\^`vw~   34;=?IKVW00`000000000000 0 00 0 00000 0 00 0 0 0000000000000000 0 00000@ #  #  #  #  # #  W H+a+ a+H+, , , , , , , , ,H+0000%3%3(333333333(38G8l8 l8 l8 l8 l88 G8 :( 38 ; $;8 ; g< g< g< g< @ @ @ @ @ @ @@ @ @ @ @ @@ @ @ @ @ @@ @ @ @ @ @@ @ @ @ @ @@ @ @ @ @ @@ @ @ @ @ @@ @ g< C C C C C C CC C C C C CC C( 3 aE aE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aE  aE aE aE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aEaE aE aE aE aE aE aE aE U U U U U U UU U U U U UU U U U U UU U U U U UU U U U U UU U aE W W W W W W W WW W W W W WW W W W W WW W W W W WW W W W W WW W W W W WW W W W W WW W aE \ \ \ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \ \ \ \ \ \ \\ \ \ \ \ \\ \ \ \ \ \\ \ aE ;f ;f ;f ;f ;f ;f ;f;f ;f ;f ;f ;f ;f;f ;f ;f ;f ;f ;f;f ;f ;f ;f ;f ;f;f ;f ;f ;f ;f ;f;f ;f aE i i i i i ii i i i i ii i %3 k( kTm (Tm (TmTm (Tm (TmTm (Tm (TmTm (Tm (TmTm (Tm (TmTm (Tm (Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm Tm( k8 jw w w w w w w w w wwwww w w w w w8jw||(k~~8~8~.. .  . 8~zzzz(k~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~~ ~ ~ ~ ~ ~ ~ ~ U U U U U U UU U U U U UU U U U U UU U U U U UU U U U U UU U ~        ~ 7 7 7 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 7 7 7 7 7 7 7 7 7 77 7 7 7 7 77 7 7 7 7 77 7 ~   ~ 1 1 1 1 1 11 1 1 1 1 11 1 %3 & &( &                                                ( & ( &                                                                                        ( &        %3 (  W W(  (  (      ! " #        $ % &t     ' ( )                              ,  ,             ," ,$ $ $ $ $ $ $ $ (  8                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     8   Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp Wp Wp Wp WpWp WpWp WpWp WpWp WpWp WpWp WpWp WpWp Wp Wp Wp Wp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp Wp WpWp WpWp WpWp WpWp WpWp Wp Wp WpWp WpWp WpWp WpWp WpWp WpWp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp WpWp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp Wp(  ݈ *݈ +݈ ,݈ -݈ .݈ /݈ 0݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈ ݈ ݈ ݈ ݈ ݈݈ ݈ ݈  (  j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j j jj j jj j jj j jj j jj j j j j j j j j jj j jj j jj j j j j j j jj j jj j jj j jj j jj j jj j j j j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j jj j j j j j j(   1 2 3 4 5 600000/ 2%REorTz|b>l& 6[*(1@7=x=FYFFFG6GH5IJJHKKK1LSLLLAMNP?PPPP!QzQQRBSuSSS[TTT(UUwZZZ![[]]]`^^_H`adoddeeee,ffig:igii;jOlllMmmhoonqqqqrw|||/}e>=zPmܒOqʓ_4qݗ1SјAw"]Μ^ƦDFRlܳ;13Ⱦ~=: Ddt 0aLN~.W-JD}~7c ""&&'p((++/EEFH I5P_RRRTUSU+Va-ana2dqddiijrsstwwz||-^]=gKZ&IPڑ ACWYnuʒ̒ڒ07QXhoՓܓ ,3PWŔ:<OQbdÕ-/LSnuǖɖ#CJmtʗї !(AH[]npӘ՘35GI\^qs4rjtuzT N`,P^ =W      !"#$%&'()*+,-./0123456789:;<=?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijkmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~1MOe-/Eac$@Bi,.Mik/2Sor14Ead!$>Z]m;>t  / 2 U q t  # ? B _ { ~   " B ^ a z    2*2,2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%9!~ _Toc422122668 _Toc422147732 _Hlt436457472 _Hlt436210762 _Toc424651937 _Toc428959857 _Toc422122669 _Toc422147733 _Toc424651938 _Toc428959858 _Toc422122671 _Toc422147735 _Toc424651939 _Toc428959859 _Toc422122670 _Toc422147734 _Toc424651940 _Toc428959860 _Toc422122672 _Toc422147736 _Toc424651941 _Toc428959861 _Toc422122673 _Toc422147737 _Toc424651942 _Toc428959862 _Toc422122674 _Toc422147738 _Toc424651943 _Toc428959863 _Toc422122675 _Toc422147739 _Toc424651944 _Toc428959864 _Toc422122676 _Toc422147740 _Toc424651945 _Toc428959865 _Toc424651946 _Toc428959866 _Toc422147741 _Toc422147742 _Toc424651947 _Toc428959867 _Toc422147743 _Toc428959868 _Toc428959869 _Toc428959870 _Toc428959871 _Toc428959872 _Toc428959873 _Toc422147744 _Toc424651949 _Toc428959874 _Toc422147745 _Toc424651950 _Toc428959875 _Toc422147746 _Toc424651951 _Toc428959876 _Toc422147747 _Toc424651952 _Toc428959877 _Toc428959878 _Toc428959879 _Toc428959880 _Toc428959881 _Toc428959882 _Toc422147748 _Toc424651953 _Toc428959883 _Toc428959884 _Toc424651954 _Toc428959885 _Toc422147750 _Toc424651955 _Toc428959886 _Toc422147751 _Toc424651956 _Toc428959887 _Toc422147752 _Toc424651957 _Toc428959888 _Toc422147753 _Toc424651958 _Toc428959889 _Toc422147754 _Toc424651959 _Toc428959890 _Toc422147755 _Toc424651960 _Toc428959891 _Toc422122680 _Toc422147756 _Toc424651961 _Toc428959892 _Toc422147757 _Toc424651962 _Toc428959893 _Toc422147758 _Toc424651963 _Toc428959894 _Toc422147759 _Toc424651964 _Toc428959895 _Toc424651965 _Toc428959896 _Toc371415814 _Toc424651966 _Toc428959897 _Toc371415815 _Toc424651967 _Toc428959898 _Toc371415816 _Toc428959899 _Toc371415817 _Toc428959900 _Toc371415818 _Toc424651968 _Toc428959901 _Toc424651969 _Toc428959902 _Toc424651970 _Toc428959903 _Toc424651971 _Toc428959904  # # # # WWWWH+a+a+a+a+,,,,--00%3%3%3%33333333G8l8:;$;g<aEaEaEikkllTmmmjww|~.==z~& WWWWvttt   ' ' dpdpww  !"#$%&(')*+,-./0123456789:;AB<=>?@CEFDGHIJKLMNOPQRSTUVWXYZ[e\]^_`abcdfghijklmnopqrstuvwxyz{|}" " " " 5 5 5 5 llll`+`+`+`+t+t+t+t+,,,,1111?3?3?3?3333333G8k886:#;@;<xExExEkklmmmmmmww|~==M44222999uuuOOO,,    > > vpvp33 1Pe0Ed$Ci/Ml3Ss5Ee%>^m?t  3 U u  # C _   # B b z  ^7D )&b&&&(#(4456666687K77F8==??BCXC`CEEYE`EcGoGUH]HHHjIsIJJbKjK#M+MMM@NHNNNwOOdPlPPPxQQTTVVVVVV%W1WXX[[\\Rbcbbb-f5fiikkXqqqqrrssttvvd~r~ρځMY͆(~*rys{בߑU]Ȕʔrz  ț֛Ýϝ(4bnȞО(Σ֣!z%"TaCJ]i4?  deal!!%%++//33|6}6h:n:<<>>,@5@GG1I}IJJ}L~LMMMM3O4OQQTT8W9W [![Q\a\\\__aa?c@ceeRfYfggiill7q8q9r:r#w$w}}~~"#Ȝɜ* ПџϢآ+,uv(8-.n}::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::itn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docitn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docitn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docitn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docitn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docitn5C:\WINNT\Profiles\kimballm\MCHS\CDRLS\ICD\ICD_v4a.docCriminal Information Center"H:\MCHS Equipment List\ICD_v4a.docPatricia Whitley4H:\Projects-Procure\34164CICresearch\34164CICicd.docPatricia WhitleykC:\Documents and Settings\cciss39\Application Data\Microsoft\Word\AutoRecovery save of 34164CICicd-AttA.asdPatricia Whitley9H:\Projects-Procure\34164CICresearch\34164CICicd-AttA.docee`i@~Ye0#j0"~e(:mt"(S#i@xMFoVNi@:1%QeET\i@8rhepe9&Ati@|wV}*@h^`.hh^h`CJOJQJo(@h^`. 88^8`OJ QJ o(!@h ^`OJQJo(- 88^8`OJ QJ o(!@h^`. 88^8`OJ QJ o(! 88^8`OJ QJ o(!hh^h`CJOJQJo(0^`0o(0^`0o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........hh^h`CJOJQJo(@h^`.hh^h`CJOJQJo(@h^`.@h8^8`.hh^h`CJOJQJo( 88^8`OJ QJ o(! 88^8`OJ QJ o(!%e"~"~"~@"~"~"~H"~"~Pp~Y:1%Q:1%Q:1%Q :1%Qd:1%Q:1%Q:1%Ql8rh8rh8rh8rhtxMF(:V}(S#ET\mt"oVN0`|w9&At#j0`@h^`CJOJQJo( @h^`.L` @h^`.`g@h^`.`g@h^`.T`n@h^`.`n@h^`.`n@h^`.\`i@h ^`OJQJo(`o@h^`.`i@h8^8`.p`o@h8^8`.`@h^`. @h^`.x s@h^`.s@h^`.(Hs@h^`. Js@h^`.AAAB BBBB$B'B4B9BYBZBaBgBtBxBBBBBBBBBBBBBBBBBCCCCCC*C4C5C6CDDDDDDDDEEEE5E6EFFFFFFFFFFGG2G3G9G;GHGNGOGPGaGcGpGGGGGGGGGGGGGG0H1H7H9HFHLHMHNHSHUH^H}HHHHHHHHHHHHHIIII/IAIBICILL$L+L3L9L?L@LQLSL`LwLLLLLLLLLLLLLLLMMMMMM!M#M,MKMqMrMxMzMMMMMMMMMMMMMMNNN,OBOHOOOWO]OcOdOuOwOOOOOOOOOOOOOOO?P@PFPHPUP[P\P]PbPdPmPPPPPPPPPPPPPPQQ(Q*Q?JMZ_Ά );<=ACPZ[\ +/NOōލ 7PQWYflmnƎȎՎێ܎ݎNOUWdjklqs|ȏʏ׏ݏޏߏ,-9;M_`a4PV]ekqrǓɓ֓ܓݓޓ0179FLMNSU^}ƔȔє/ABCbw}Ж "/tu{} +PQ]_qÝН՝$(56PQ^bopwz(5:¡)=JKƢ͢ڢۢijw#$+2:@FGRUbgɧʧ QRZ]ijHI]_lm©é٩۩@ANP]^άӬNOyzܯݯ;<FIVW>òвղ]cjrx~ҾӾy¿<=ACKd j (>?DHLMNdejnrt !&*.0=[\aeily+KLPWco}~"#.?OTUdy- -.FJKfjkBFGkop(+./>ADE",-1Z[7 """"""""# # #a#d#e############# $ $$:$=$>$p$s$t$$$$$$$$$$$$$%%%,%/%0%&'''''''''''''''')?@@AAAAAAAAAhBiBoBqBBBBBBBBBRCSCTDDDDD E E EE!E"E2N4N>NINTNUNYN_NeNfNjNoNtNuNyNNNNNNNNNNNNNNNNNNNNjOPPPPPPPPPPPPPPPPPPQ Q QQ&Q+Q,Q0Q>QBQCQGQMQSQTQXQ^QdQeQiQqQyQzQy\\] ]]](]+]-].]7]:]<]=]Q]T]V]W]k]n]p]q]]]]]2`3`A`H`X`Y`l`o`q`r`````````dgeue|eeeeeeeeeeeeeee6jnnnnnnnoooo-o.oDoEoZo[ojokooooooooooooooopp*p+pBpCpwsxsssssssssssssUwzxxxxxxxxxxxxxxxxxz-{8{?{O{P{Y{\{^{_{k{o{q{r{}{{{{{{{{{{{{{{{{{{{{{{{{\~]~m~n~u~v~~~~~~~~h  '*,-8;=>ILNObeghsvxyŒȌʌΌЌҌԌ &(,.13IJPR[]`bڍۍ  ABCDEGJKWXYZ[]`anouw{|}ʎˎ͎̎ΎЎҎӎڎێ 0179=?ACQRXZ^`bdhioquwy{ÏŏȏɏՏ֏܏ޏ   ",-35>@CEPQWYbdfhŐǐː͐АҐ:;<=>@CDOPQRSUXYbcdefhklÑőɑʑˑ͑-./01367LMSUY[]_nouwǒȒɒʒ˒͒Вђ#%)+-/CDJLPRUWmntvz|ʓ˓ѓӓדؓٓۓ    !"(*.035ABHJNOPS[\]^_adenopqrtxyÔŔƔӔԔՔ֔הٔܔݔ "345679<=GHIJKMPQ\]^_`befqrstuwz{ŕǕʕ̕ CU_`rtuӵTZabsuv_ºں2;<RXYӼռ *+FQRnyz½Ͻٽڽ+67ITUgrsǾѾҾ1<=JTU^gh "DELNPRT_`gikmo +,3579;PQXZ\^`vw~   34;=?IKVW@ISS-ConsultantsNe02:winspoolHP LaserJet 8000 Series PSISS-ConsultantsS odXXLetterPRIV0''''\KhC{ISS-ConsultantsS odXXLetterPRIV0''''\KhC{X@UnknownEastern Operations Gz Times New Roman5Symbol3& z Arial9MCharcoal;"HelveticaIlprcCourier NewYM lprc regularCourier New9PalatinoWTms RmnTimes New Roman71Courier3TimesMMMonacoCourier NewG&Typographic Ext"h[*T8dkF-dkF AwF!F$20dE2.TAB 1:_REQUEST FOR PROPOSAL FORM/ COVER LETTERPaul B. AndersonPatricia WhitleyOh+'0 ( DP l x  /TAB 1:_REQUEST FOR PROPOSAL FORM/ COVER LETTER0AB Paul B. AndersonR PaulaulNormal Patricia WhitleyR P5trMicrosoft Word 9.0P@@!@@FAw՜.+,0 hp  ITN/PRC!E2 /TAB 1:_REQUEST FOR PROPOSAL FORM/ COVER LETTER Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F@eData S1TablerWordDocumentoSummaryInformation(DocumentSummaryInformation8CompObjjObjectPool@e@e  FMicrosoft Word Document MSWordDocWord.Document.89q