ĐĎॹá>ţ˙ *,ţ˙˙˙#$%&'()˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ěĽÁ[€ řż:+bjbjŹúŹú .0ΐΐŠž%˙˙˙˙˙˙ˇZZííí˙˙˙˙45dćLˆ™%”-&-&-&-&Ä'Ř' ä'LLLLLLL$nO˘R<CL]íě'˘'"Ä'ě'ě'CL-&-&u L$P$P$Pě'˜8-&í-&L$Pě'L$P$P^ Ý1` ŐmK-&˙˙˙˙ ż}ĆŃŃ„?`==č LśL0ćL%>H LRäO@LRĐmKLRímKœě'ě'$Pě'ě'ě'ě'ě'CLCL$Pě'ě'ě'ćLě'ě'ě'ě'˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙LRě'ě'ě'ě'ě'ě'ě'ě'ě'Z c: COURSE STRUCTURE AND DETAILED SYLLABUS III & IV – B.TECH – I & II - SEMESTERS  FOR B.TECH FOUR YEAR DEGREE COURSE (Applicable for the batches admitted from 2014-15)  ANURAG GROUP OF INSTITUTIONS AUTONOMOUS VENKATAPUR, GHATKESAR, HYDERABAD – 500 088, TELANGANA STATE Subject CodeSubject Name Lectures T/P/D CreditsA55023Design and Analysis of Algorithms414A55024Web Technologies303A55025Computer Networks313A55026Operating systems404A55027Compiler Design313A55211Advanced English Communication Skills Lab032A55212Web Technologies lab032A55213Operating Systems and Computer Networks Lab032A55214Logical Reasoning and Quantitative Aptitude – I032Total171525III YEAR I SEMESTER COURSE STRUCTURE III YEAR II SEMESTER COURSE STRUCTURE Subject CodeSubject Name Lectures T/P/D CreditsA56031Advanced Computer Networks313A56032Data Warehousing and Data Mining313A56033Cloud Computing404 A56034 A56035 A56036Elective – I 1.Human Computer Interaction 2.Unix Programming 3.Computer Graphics31 3A56037Object Oriented Analysis and Design313A56038Software Project Management303A56211Object Oriented Analysis and Design Lab032A56212Data Warehousing and Data Mining Lab032A56213Logical Reasoning and Quantitative Aptitude – II032Total191325 IV YEAR I SEMESTER COURSE STRUCTURE Subject CodeSubject Name Lectures T/P/D CreditsA57043Advanced Databases414A57044Information Security404A57045Big Data313A57046Managerial Economics & Financial Analysis313 A57047 A57048 A57049Elective II Image Processing Information Retrieval Systems Cyber Forensics313 A57050 A57051 A57052Elective III Adhoc Sensor Networks Software Testing Software Development for Portable Devices414A57213Information Security lab032A57214Industry Oriented Mini Project032Total211125 IV YEAR II SEMESTER COURSE STRUCTURE Subject CodeSubject Name Lectures T/P/D CreditsA58038Multimedia Computing414 A58039 A58040 A58041Elective IV Entrepreneurship Multimedia and Rich Internet Applications Soft Computing 30 3 A58042 A58043 A58044Elective V Internet of Things Network Security and Privacy Machine Learning303A58214Seminar063A58215Comprehensive Viva Voce002A58216Project Work01510Total102225 T- Tutorial P- Practical D- Drawing ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 4 1 4 (A55023) DESIGN AND ANALYSIS OF ALGORITHMS Course Objectives: Analyze the asymptotic performance of algorithms. Paradigms and approaches used to analyze and design algorithms and to appreciate the impact of algorithm design in practice. Synthesize efficient algorithms in common engineering design situations. To utilize data structures and algorithmic design techniques in solving new problems Course Outcomes: Acquire the knowledge of algorithm analysis and its notations that are applied on the problems solved by divide and conquer paradigm. Apply the major graph algorithms for model engineering problems and knowledge of the greedy paradigm Apply the dynamic-programming paradigm and recite algorithms that employ this paradigm. Apply the concept of back tracking, branch and bound paradigm for real time problems. Analyze the complexity of problems and differentiate that in terms of P and NP problems with examples. Unit I: Introduction: Algorithm, Pseudo code for expressing algorithms, Performance Analysis-Space complexity, Time complexity, Asymptotic Notation- Big oh notation, Omega notation, Theta notation and Little oh notation, Probabilistic analysis, Disjoint Sets- disjoint set operations, union and find operations. Divide and conquer: General method, applications-Binary search, Quick sort, Merge sort, Stassen’s matrix multiplication. Unit II : Graphs: breadth first search, depth first search, spanning trees, connected and bi connected  components Greedy method: General method, applications-Job sequencing with deadlines, 0/1 knapsack problem, Minimum cost spanning trees, Single source shortest path problem. Unit III: Dynamic Programming: General method, applications-Matrix chain multiplication, Optimal binary search trees, 0/1 knapsack problem, All pairs shortest path problem, Travelling sales person problem, Reliability design. Unit IV: Backtracking: General method, applications-n-queen problem, sum of subsets problem, graph coloring, Hamiltonian cycles.Branch and Bound: General method, applications - Travelling sales person problem,0/1 knapsack problem- LC Branch and Bound solution, FIFO Branch and Bound solution. Unit V: Lower Bound Theory: Comparison Trees, NP-Hard and NP-Complete problems: Basic concepts, non-deterministic algorithms, NP - Hard and NP Complete classes, Clique Decision Problem (CDP), Node cover decision problem. Text Books: Ellis Horowitz, SatrajSahni and Rajasekharam, Fundamentals of Computer Algorithms, Galgotia publications pvt. Ltd, Second Edition, 2007. Aho, Ullman and Hopcroft,Design and Analysis of algorithms, Pearson education, Reprint 2002. Reference Books: R.C.T.Lee, S.S.Tseng, R.C.Chang and T.Tsai,Introduction to Design and Analysis of Algorithms A strategic approach, McGraw Hill,2005. Allen Weiss,Data structures and Algorithm Analysis in C++,Third edition, Pearson education ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 3 0 3 (A55024) WEB TECHNOLOGIES Course Objectives: Developing static web pages using HTML and CSS. Data Validations using JavaScript. To build XML applications with DTD and style sheets that span multiple domains. Developing Dynamic pages. Manipulating data in the database using JDBC. Course Outcomes: Design static web pages and provide client side authentication. Prepare Static Web pages With Validations. Develop new tag sets using XML mechanism. Design and develop web applications using JSP and MVC architecture. Understand database connectivity and retrieving data using client/server database. Unit I: INTRODUCTION TO WEB: Understanding Internet and Web, Web Architecture, Web servers, protocols: HTTP, Introduction HTML: History of HTML, WWW, HTML Basics : Elements, Attributes, Tags, Tables, Forms, Frames.div and span tags. Unit II: CSS: Introduction to cascading style sheet, Types of style sheets, page layout, selectors, pseudo classes and elements. JAVA SCRIPT: Introduction to scripting, control structures, conditional statements, Arrays functions, objects. HTML DOM: Predefined object (Window, Location, History, Navigator). Events, DOM Node methods, Navigation, creating nodes, adding nodes, inserting nodes, removing & Replaces Nodes, Form object and Elements, DHTML with Java Script. Unit III : XML: Basics of XML, Elements, Attributes, validation, Name space. XML Scheme Languages: Introduction to DTD, internal and external DTD, Elements of DTD, DTD Limitations, XML Schema, Schema structure, Elements, parsing XML: XML DOM, Document node, element node, Text node, Java and DOM, Navigating DOM Tree. Unit IV: AJAX: Introduction, Environment, Asynchronous communication, process steps, sending and Retrieving Information, Ajax with XML. Servlets : Introduction, Lifecycle, Generic and HTTP servlet, passing parameters to servlet, HTTP servlet Request & Response interfaces, Deploying web Applications, Session Tracking: Hidden form fields, cookies, URL- Rewriting, session. Unit V: JSP: Introduction, Difference Between servlets & JSP, Anatomy of JSP page, JSP elements: Directives, comments, Expressions, scriptlets, Declaration, Implicit JSP objects, using Action elements. JDBC: Introduction, JDBC Drivers, Loading Driver, establishing connection, Executing SQL statement in JSP pages, MVC architecture. Text Book: Uttam K. Roy, Web Technologies, 8th Impression, Oxford Publication, 2014. Reference Books: Sebesta, Programming World Wide Web, 4th edition, Pearson, 2008. Chris Bates, Web Programming, building internet applications, 2nd edition, WILEY Dreamtech, 2012. Dietel and Nieto, Internet and World Wide Web – How to program, 3rd edition, PHI/Pearson Education Asia, 2012. Marty Hall and Larry Brown, Core Servlets and Java Server Pages Volume 1: Core Technologies, 2nd edition, Pearson 2012. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A55025) COMPUTER NETWORKS Course Objectives: 1. Compare OSI & TCP/IP models 2.  Understand   error detection, correction codes and  framing methods 3.   Explain MAC and types of Ethernet 4.  Discuss the concepts of LANs and Virtual Networks 5.  Outline the concepts of logical addressing Course Outcomes: 1. Analyze TCP/IP and OSI models and various protocols 2. Identify suitable multiple access protocol for different networks 3. Analyze various error handling mechanisms 4.Use of various devices in connecting different types of LANs 5. Compare and contrast ipv4 and ipv6 Unit  I: Network Models-Layered Tasks, OSI model, Layers in the OSI model, TCP/IP protocol Suite, Addressing Unit II: Data Link Layer: Error Detection and Correction-Introduction, Block coding, Cyclic Codes, Check sum. Data Link Control –Framing, Flow and Error Control, Protocols, Noiseless Channels, Noisy Channels, HDLC. Unit III:   Medium Access Control: Multiple Access - Random Access, Controlled Access, Channelization. Wired LANs- IEEE Standards, Standard Ethernet, Changes in standard, Fast Ethernet, Gigabit Ethernet. Unit IV: Connecting LANs, Backbone Networks and Virtual LANs: Connecting Devices, Backbone Networks, Virtual LANs. Unit V: Network Layer: Logical Addressing – IPV4 addresses, IPV6 addresses. Internet Protocol - Internetworking, IPv4, IPv6, Transition from IPv4 to IPv6 Text Book: 1) Behrouz A Forouzan ,”Data Communications and Networking”,4th  Edition, McGraw-Hill. Reference Books: 1) Andrew S. Tanenbaum, Computer Networks, Third Edition. 2) William Stallings, Data Communications, Eight Editions. Pearson Publishers. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 4 0 4 (A55026) OPERATING SYSTEMS Course Objectives Understand operating system concepts Analyze process scheduling and synchronization concepts. Identify deadlock mechanisms Understand memory management approaches. Identify storage management and protection. Course Outcomes: Summarize operating system and process management concepts Apply process scheduling and synchronization related issues. Understand Deadlock prevention, avoidance, detection, recovery mechanisms. Analyze effectively memory management concepts Illustrate various protection and security measures. Unit –I: Operating Systems Overview and Process Management Introduction-What operating system do, Operating system structure (uni-programmed and multi programmed), Operating system operations, Operating system services, System calls, Types of System calls, Operating system structure. Process Management- Process concepts, Process scheduling, Operations on processes, Inter process communication. Unit –II: Process Scheduling and Synchronization Multithreaded programming: Overview, Multithreading models. Process Scheduling – Basic concepts, Scheduling criteria, Scheduling algorithms, Thread scheduling. Process coordination: Synchronization – Background, The critical section problem, Peterson’s solution, Synchronization hardware, Semaphore, Classical problems of synchronization, Monitors. Unit- III: Deadlocks System model, Deadlock characterization, Methods for handling deadlocks, Deadlock prevention, Detection and avoidance, Recovery from deadlock. Unit –IV: Memory Management Swapping, Contiguous memory allocation, Paging, Segmentation. Virtual memory management - Demand paging, copy-on-write, page-replacement, Thrashing. Unit –V: File system, system protection and security Storage management – File concept, Access methods, Directory and disk structure, File-system mounting. System protection- Goals of protection, principles of protection, Domain of protection, Access matrix. System Security – Security problem, Program threats, System and Network threats. Text book: Abraham Silberchatz, Peter B. Galvin, Greg Gagne, Operating System Concepts, 9th edition ,John Wiley, 2016. Reference books: D.M. Dharmdhere, Operating Systems – A Concept based Approach, 2nd Edition. TMH, 2007. Andrew S Tanenbaum, Modern Operating Systems, 3rd Edition, PHI, 2008. Behrouz A. Forouzan,Richard F. Gilberg, Unix and shell programming, cengage Learning 2009. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A55027) COMPILER DESIGN Course Objectives: To introduce the concepts of text processing. To introduce major parsing methods. To introduce the principal ideas in syntax directed definitions and translations and intermediate code generation for typical programming languages. To introduce the technology of code optimization To introduce different code generation algorithms. Course Outcomes: Analyze different phases of compiler and different translators. Design top down parsers and bottom up parsers for the language constructs. Understand the role of symbol table and design various data structures for symbol table. Apply syntactic analysis and generate intermediate code for different programs. Apply different optimization techniques and code generation. Unit - I: Introduction to Compilers: Structure of Compiler-Phases of Compiler, Symbol Table Management, Grouping of Phases into Passes, Compiler Vs Interpreter. Lexical Analysis: Role and need of Lexical Analyzer, Input Buffering, Regular expressions for identifiers, Signed numbers etc.., A Language for specifying Lexical Analyzer, Lexical phase errors. Unit – II: Syntactic Specification: Context Free Grammars, Derivations and Parse Trees, Capabilities of Context Free Grammars, Syntactic Phase errors, Semantic errors. Basic Parsing Techniques: Parsers, Shift-Reduce Parsing, Operator-Precedence parsing, Top-Down parsing, Predictive parsers. Unit – III: Construction of efficient Parsers: LR Parsers, Canonical collection of LR(0) items, Constructing SLR parsing tables, Constructing LR parsing tables, Constructing LALR parsing tables, using Ambiguous grammar, Comparison of SLR, LALR and CALR parsers, Comparison of Top down and Bottom up parsers. Unit - IV: Syntax Directed Translation: Syntax Directed Translation schemes, Intermediate codes, Postfix notation, Three Address code, Quadruples and triples. Symbol table: Contents of Symbol table, Data Structures for symbol tables, representing scope information. Unit –V: Code Optimization: Principal sources of optimization, Loop optimization, Copy Propagation, Dead code elimination, Redundant sub expression elimination. Code Generation: Object programs, problems in Code generation, A Machine Model, A Simple Code generator, Register allocation and assignment, Peephole optimization. Text Book: 1.Alfred V Aho, Jeffrey D Ullman, Principles of Compiler Design Reference Books: 1. J P Trembly and P G Sorenson, The Theory and practice of Compiler Writing 2.Dick Grone, Henri E Bal, Ceriel J H Jacobs , Wiley ,Modern Compiler Design dreamtech. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 0 3 2 (A55211) ADVANCED ENGLISH COMMUNICATION SKILLS LAB 1. Introduction The introduction of the English Language Lab is considered essential at 3rd year level. At this stage the students need to prepare themselves for their careers which may require them to listen to, read, speak and write in English both for their professional and interpersonal communication in the globalised context. The proposed course should be an integrated theory and lab course to enable students to use  good English and perform the following: Gather ideas and information, to organize ideas relevantly and coherently. Engage in debates. Participate in group discussions. Face interviews. Write project/research reports/technical reports. Make oral presentations. Write formal letters. Transfer information from non-verbal to verbal texts and vice versa. To take part in social and professional communication. 2. Objectives: This Lab focuses on using computer-aided multimedia instruction for language development to meet the following targets: To improve the students‘ fluency in English, through a well-developed vocabulary and enable them to listen to English spoken at normal conversational speed by educated English speakers and respond appropriately in different socio-cultural and professional contexts. Further, they would be required to communicate their ideas relevantly and coherently in writing. 3. Syllabus: The following course content is prescribed for the Advanced Communication Skills Lab: Vocabulary Building – synonyms and antonyms, Word Roots, One-Word Substitutes, Prefixes and Suffixes, Study of Word Origin, Analogy, Idioms and Phrases. Reading Comprehension – Reading for Facts, Guessing meanings from context, Scanning, Skimming, Inferring Meaning, and Critical Reading. Writing Skills –Structure and presentation of different types of writing - Resume Writing /E-Correspondence/Statement of Purpose. Technical Writing- Technical Report Writing, Research Abilities/Data Collection/Organizing Data/Tools/Analysis. Group Discussion – Dynamics of Group Discussion, Intervention, Summarizing, Modulation of Voice, Body Language, Relevance, Fluency and Coherence. Presentation Skills – Oral presentations (individual and group) through JAM sessions/Seminars, Written Presentations through Projects/ PPTs/e-mails etc. Interview Skills – Concept and Process, Pre-Interview Planning, Opening Strategies, Answering Strategies, Interview through Telephone and Video-Conferencing. 4. Minimum Requirement: The English Language Lab shall have two parts: i) The Computer aided Language Lab for 60 students with 60 systems, one master console, LAN facility and English language software for self- study by learners. ii) The Communication Skills Lab with movable chairs and audio-visual aids with a P.A System, a T. V., a digital stereo –audio & video system and camcorder etc. System Requirement (Hardware component): Computer network with Lan with minimum 60 multimedia systems with the following specifications: i) P – IV Processor a) Speed – 2.8 GHZ b) RAM – 512 MB Minimum c) Hard Disk  80 GB ii) Headphones of High quality 5. Suggested Software: The software consisting of the prescribed topics elaborated above should be procured and used. Suggested Software: Clarity Pronunciation Power  part II đ Oxford Advanced Learner s Compass, 7th Edition đ DELTA s key to the Next Generation TOEFL Test: Advanced Skill Practice. Lingua TOEFL CBT Insider, by Dreamtech. TOEFL & GRE( KAPLAN, AARCO & BARRONS, USA, Cracking GRE by CLIFFS) đ The following software from  train2success.com đ Preparing for being Interviewed, Positive Thinking, Interviewing Skills, Telephone Skills, Time Management Team Building, Decision making English in Mind, Herbert Puchta and Jeff Stranks with Meredith Levy, Cambridge 6. Books Recommended: Technical Communication by Meenakshi Raman & Sangeeta Sharma, Oxford University Press 2009. Advanced Communication Skills Laboratory Manual by Sudha Rani, D, Pearson Education 2011. English Language Communication : A Reader cum Lab Manual Dr A Ramakrishna Rao, Dr G Natanam & Prof SA Sankaranarayanan, Anuradha Publications, Chennai 2008. English Vocabulary in Use series, Cambridge University Press 2008. Management Shapers Series by Universities Press(India)Pvt Ltd., Himayatnagar, Hyderabad 2008. Communication Skills by Leena Sen, PHI Learning Pvt Ltd., New Delhi, 2009. Handbook for Technical Writing by David A McMurrey & Joanne Buckely CENGAGE Learning 2008. Job Hunting by Colm Downes, Cambridge University Press 2008. Master Public Speaking by Anne Nicholls, JAICO Publishing House, 2006. English for Technical Communication for Engineering Students, Aysha Vish hwamohan, Tata Mc Graw-Hil 2009. Books on TOEFL/GRE/GMAT/CAT/ IELTS by Barron‘s/DELTA/Cambridge University Press. International English for Call Centres by Barry Tomalin and Suhashini Thomas, Macmillan Publishers, 2009. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 0 3 2 (A55212) WEB TECHNOLOGIES LAB Course Objectives: Developing static web pages using HTML and CSS. Data Validations using JavaScript. To build XML applications with DTD and style sheets that spans multiple domains. Manipulating data in the database using JDBC Developing Dynamic pages using servlets, JSP. Course Outcomes: Design static web pages and provide client side authentication. Develop new tag sets using XML mechanism. Understand database connectivity and retrieving data using client/server database. Design dynamic web pages and develop web applications using MVC architecture. Week-1: Design the following static web pages required for an online book store web site. 1) HOME PAGE: 2) LOGIN PAGE: Week -2: Design the student REGISTRATION PAGE: Week- 3: Apply internal and external CSS (Cascading Style Sheets) for week1&2 pages. Week -4: VALIDATION: Write JavaScript to validate the following fields of the above registration page. Week -5: Design the catalogue page Week -6: Write an XML file which will display the Book information which includes the following: Write a Document Type Definition (DTD) to validate the above XML file. Week -7: Install TOMCAT web server and APACHE. While installation assign port number 4040 to TOMCAT and 8080 to APACHE. Make sure that these ports are available i.e., no other process is using this port. Deploy above all pages in to tomcat web server. Week -8: Write a program to display the HELLO WORLD message using servlet. Week - 9: Communicate two servlets using doGET and doPOST methods. Week -10: Write a program to create cookies and retrieval using servlet. Week -11: Write a program to display the HELLO WORLD message using JSP Week -12: Convert all above static web pages into the JSP pages. Week -13: Using registration form. Authenticate the user when he submits the login form using the user name and password from the database Week -14 Create tables in the database which contain the details of items (books in our case like Book name , Price, Quantity, Amount )) of each category. Modify your catalogue page (week 4)in such a way that you should connect to the database and extract data from the tables and display them in the catalogue page using JDBC. Week -15 Implement week -10 in MVC architecture. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 0 3 2 (A55213) OPERATING SYSTEM AND COMPUTER NETWORKS LAB PART A Course Objectives: Analyze system calls that can offer operating system services Demonstrate various operating system concepts Understand and apply concepts towards new operating system design Understand the concept of Dead lock and its avoidance Developing page replacement algorithms Course Outcomes: Understand system calls behavior and implement that can offer operating system services Implement operating system concepts Implement the producer and consumer problem Implement the dead lock avoidance using banker’s algorithm Develop the CPU scheduling applications Write a programs using the following system calls of UNIX operating system: fork, exec, getpid, exit, wait, close, stat, opendir, readdir Write a program to implement multithreading? Give the list of processes, their CPU burst times and arrival times, display or print the Gantt chart for FCFS and SJF. For each of the scheduling policy compute and print the average waiting time and average turnaround time Give the list of processes, their CPU burst times and arrival times, display or print the Gantt chart for Priority and Round Rabin. For each of the scheduling policy compute and print the average waiting time and average turnaround time. Implement producer consumer problem using semaphore? Write a program to implement Banker’s algorithm for deadlock avoidance? Write a program to implement page replacement algorithms (FCFS, Optimal, LRU) PART B Course Objectives:           1. Understand data link layer framing methods. 2. Explain the various error handling mechanism. 3. Understand data link control protocols 4. Implement various protocols of Noisy and Noiseless Channels Course Outcomes: 1. Implement different data link layer framing methods. 2. Analyze error control methods. 3. Implement different protocols of noiseless Channels. 4. Develop programs for protocols in noisy Channels                        Implement the data link layer framing methods Bit stuffing, Character Stuffing. Implement CRC 16 error control mechanism in data link layer Implement minimum hamming Distance Implement Stop and Wait protocol. Implement Go-Back-N and Selective Repeat Request protocols. Implement CSMA/CD Using C program. Write a C program for CSMA/CA. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - I Sem L T / P / D C 0 3 2 (A55214) LOGICAL REASONING AND QUANTITATIVE APTITUDE – I Course Outcomes:  Enhance the problem-solving ability of the students with focusing on basic concepts of arithmetic, algebra, geometry data analysis. Demonstrate various principles involved in solving mathematical problems and thereby reducing the time taken for performing job functions. Unit I : Series Completion: Number Series, Alphabet Series, Alpha – Numeric Series. Analogy: Completing the Analogous Pair, Simple Analogy, Choosing the Analogous Pair, Double Analogy, Word Analogy and Number Analogy. Unit II: Classification / Odd One Out: Word Classification, Number Classification, Letter Classification. Coding – Decoding : Letter Coding, Number Coding, Matrix Coding, Substitution, Deciphering Message Word Codes, Jumbled coding. Unit III: Blood Relations : Deciphering Jumbled up Descriptions, Relation Puzzle – Direction sense test. Number, Ranking & Time Sequence Test – Arithmetical Reasoning – Mathematical Operations. Unit IV : Number System : Test for Divisibility, Test of prime number, Division and Remainder – HCF and LCM of Numbers – Fractions. Unit V : Ratio and Proportion : Properties of Ratio, Comparison of Ratios, Useful Simple Results on Proportion – Partnership and Share – Mixtures. Text Books: Verbal and Non Verbal Reasoning by R.S.Agarwal. Quantitative Aptitude by R.S.Agarwal. Quantitative Aptitude by Abhijit Guha. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56031) ADVANCED COMPUTER NETWORKS Course Objectives: 1.   Understand different Address Mapping Methods 2.   Compare different routing protocols 3.   Understand transport layer protocols 4.   Discuss the concepts congestion control 5.   Outline Application layer Course Outcomes: 1. Analyze TCP/IP and OSI models and various protocols. 2. Analyze various network layer protocols. 3. Compare and contrast various Routing and Congestion control algorithms. 4. Choose suitable protocol (UDP/TCP) of transport layer based on the type of the application. 5. Evaluate various responsibilities of application layer. Unit I :   Introduction- Brief Introduction on Network Models, error detection and correction in data link layer. Network Layer: Address Mapping, Error Reporting and Multicasting-Address Mapping, Internet Control Message Protocol (ICMP), Internet Group Management Protocol (IGMP), Internet Group Management Protocol Version6 (ICMPv6). Unit II: Network Layer: Delivery, Forwarding and Routing- Delivery, Forwarding, Uni-casting Routing Protocols, Multicast Routing Protocols Unit III: Transport Layer: Process to Process Delivery, User Datagram Protocols (UDP), Transmission control Protocol (TCP), Stream Control Transmission Protocol(SCTP). Unit IV:   Transport Layer: Congestion Control and Quality of Service-Data Traffic, Congestion, Control, Quality of Service, Techniques to improve QoS, Integrated Services, Differentiated services. Unit V: Application Layer: Domain Name System- Namespace, Domain Name Space, Distribution of Name Space, DNS in Internet, Resolution, Domain Name Space (DNS) Messages,    Electronic  Mail, File Transfer. Text Book: 1. Behrouz A Forouzan, Data Communications and Networking, 5th  Edition, McGraw-Hill, 2013. Reference Books:  1. Andrew S. Tanenbaum , Computer Network, 5th Edition, Pearson Education India,2014. 2. William Stallings, Data Communications, 8th Edition, Pearson Education,2013. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56032) DATA WAREHOUSING AND DATA MINING Course Objectives: 1. To familiarize the concepts and architectural types of data Warehouses. 2. Provides efficient design and management of data storages using data warehousing and OLAP. 3. To understand the fundamental processes concepts and techniques of data mining. 4. To consistently apply knowledge concerning current data mining research and how this may contribute to the effective design and implementation of data mining applications. 5. To provide advance research skills through the investigation of data-mining Literature Course Outcomes: Design a data mart or data warehouse for any organization Apply Association and classification knowledge to different data sets Apply the clustering Techniques for different data sets Explore recent trends in data mining such as web mining, spatial-temporal mining Unit I: Data Warehouse and OLAP Technology: what is a Data Warehouse, Multidimensional Data Model, OLAP Operations on Multidimensional Data, Data Warehouse Architecture Cube computation:Multiway Array Aggregation, BUC Unit II: Introduction to Data Mining: Fundamentals of data mining, Data Mining Functionalities, Data Mining Task Primitives,Major issues in Data Mining. Data Preprocessing: Needs for Preprocessing the Data, Data Cleaning, Data Integration and Transformation, Data Reduction . Unit III: Mining Frequent Pattern: Associations and Correlations: Basic Concepts,Efficient and Scalable Frequent Item set Mining Methods, Mining various kinds of Association Rules, Classification and Prediction: Issues Regarding Classification and Prediction, Classification by Decision Tree Induction, Bayesian Classification. Unit IV: Cluster Analysis: Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods, Partitioning Methods-K-means, PAM, Hierarchical Methods-BIRCH, Density-Based Methods-DBSCAN, Outlier Detection Unit V: Pattern Discovery in real world data: Mining Time-Series Data, Spatial Data Mining, Multimedia Data Mining, Text Mining, Mining the World Wide Web, Data Mining Applications Text Book: 1.Jiawei Han and MichelineKamber, Data Mining Concepts and Techniques, Second Edition, Elsevier, 2007. Reference Books: 1. Alex Berson and Stephen J. Smith, Data Warehousing, Data Mining & OLAP, Tata McGraw Hill, Tenth Reprint, 2007. 2.ArunK.Pujari , Data Mining Techniques,2nd Edition, Universities press. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 4 0 4 (A56033) CLOUD COMPUTING Course Objectives: To understand the concepts of virtualization and its benefits To impart fundamental concepts in the area of cloud computing. To impart knowledge in applications of cloud computing. Course Outcomes: Compare and contrast different cloud architecture Learn & Implement Virtualization Analyze and design storage mechanisms Apply security mechanism for the Cloud. Understand Disaster recovery in Cloud Unit I: Introduction to Virtualization: Objectives of virtualization, history of virtualization, benefits of virtualized technology, the virtual service desk, what can be virtualized, related forms of computing, cloud computing, software as a service – SaaS, grid computing, utility computing, virtualization processes. Virtualization Technologies-I: Ubuntu (server edition),Altiris, Windows server, Software virtualization, VMware, Intel virtualization, Red Hat virtualization, Soft grid application, Linux virtualization, Desktop virtualization, Hardware virtualization, Resource virtualization, Processor virtualization, Application virtualization. Unit II: Virtualization Technologies-II: Storage virtualization, Virtualization density, Para-virtualization, OS virtualization, Virtualization software, Data Storage virtualization, Intel virtualization technology, Thinstall virtualization suite, Net framework virtualization, Windows virtualization on Fedora, Storage virtualization technologies, Virtualization level, Security monitoring and virtualization, Oracle virtualization. Unit III: Virtualization and Storage Management: The heart of cloud computing-virtualization, defining virtualization, why virtualize, what can be virtualized, where does virtualization happen, how does virtualization happen, on the road to storage virtualization, improving availability using virtualization, improving performance through virtualization, improving capacity through virtualization, business value for virtualization. Unit IV: Introduction to Cloud Computing: Cloud Introduction and overview- Components, Infrastructure and Services, Why Use Cloud Computing, Benefits and Limitations, Cloud Application Architectures, Cloud Infrastructure Models, Cloud Computing Technology- Hardware & Software Infrastructure Cloud Computing Architecture: Requirements, Introduction to Cloud Computing Architecture, various kinds of Cloud Computing Architecture, Grid Computing, Transactional Computing, On Demand Computing, and Distributed Computing. Unit V: Security: Security issues in Cloud Computing - Data Security, Network Security, and Host Security Disaster Recovery: Disaster Recovery Planning, Disasters in the Cloud, Disaster Management. Scaling a Cloud Infrastructure- Capacity Planning, Cloud Scale. Case Studies: Amazon S3, Google APP Engine, IBM Clouds, Oracle OBIEE Text Books:  HYPERLINK "http://www.amazon.com/Ivanka-Menken/e/B002BOBZ8Y/ref=ntt_athr_dp_pel_1" Ivanka MenkenIvanka Menken (Author) › HYPERLINK "http://www.amazon.com/Ivanka-Menken/e/B002BOBZ8Y/ref=ntt_athr_dp_pel_pop_1" Visit Amazon's Ivanka Menken Page Find all the books, read about the author, and more. See  HYPERLINK "http://www.amazon.com/s/ref=ntt_athr_dp_sr_pop_1?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Ivanka%20Menken" search results for this author Are you an author?  HYPERLINK "http://authorcentral.amazon.com/gp/landing/ref=ntt_atc_dp_pel_1" Learn about Author Central , Gerard Blokdijk ,Cloud Computing Virtualization Specialist Complete Certification Kit - Study Guide Book, 2009.Gerard Blokdijk (Author)› HYPERLINK "http://www.amazon.com/Gerard-Blokdijk/e/B002BLL870/ref=ntt_athr_dp_pel_pop_2" Visit Amazon's Gerard Blokdijk PageFind all the books, read about the author, and more.See  HYPERLINK "http://www.amazon.com/s/ref=ntt_athr_dp_sr_pop_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Gerard%20Blokdijk" search results for this author Are you an author?  HYPERLINK "http://authorcentral.amazon.com/gp/landing/ref=ntt_atc_dp_pel_2" Learn about Author Central George Reese, Cloud Application Architectures Building Applications and Infrastructure in the Cloud, O'Reilly Media Press, 2009. Reference Books: Anthony T. Velte, Tobe J. Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach, Publication Person Education, 2009 Tom Clark, Storage Virtualization: Technologies for Simplifying Data Storage and Management, Addison-Wesley, 2005 Curtis Brian J.S. Chee, Cloud Computing Technologies and Strategies of the Ubiquitous Datacenter, 2010 ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56034) HUMAN COMPUTER INTERACTION (ELECTIVE – I) Course Objectives: 1. Demonstrate an understanding of guidelines, principles, and theories influencing human computer interaction. 2. Recognize how a computer system may be modified to include human diversity. 3. Select an effective style for a specific application. 4. Design mock ups and carry out user and expert evaluation of interfaces Course Outcomes: Identify and formulate characteristics and components of graphical user interface. Analyze various design paradigms for human computer interaction. Design & implement human computer interaction using various design techniques. Support Design rules to use HCI in the software process. Unit - I : Introduction : Importance of user Interface – definition, importance of good design. Benefits of good design. A brief history of Screen design. The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface. Unit – II : Design process – Human interaction with computers, importance of human characteristics human consideration, Human interaction speeds, understanding business junctions. Unit – III:  Screen Designing : Design goals – Screen planning and purpose, organizing screen elements, ordering of screen data and content – screen navigation and flow – Visually pleasing composition – amount of information – focus and emphasis – presentation information simply and meaningfully – information retrieval on web – statistical graphics – Technological consideration in interface design. Unit – IV: Windows – New and Navigation schemes selection of window, selection of devices based and screen based controls.  Components – text and messages, Icons and increases – Multimedia, colors, uses problems, choosing colors. Unit - V : Software tools – Specification methods, interface – Building Tools. Interaction Devices – Keyboard and function keys – pointing devices – speech recognition digitization and generation – image and video displays – drivers. Text Books:  Wilbert O Galitz, The essential guide to user interface design, Wiley DreamaTech, 2007. Ben Shneidermann, Designing the user interface. 3rd Edition, Pearson Education Asia, 2001. Reference Books:  Alan Dix, Janet Fincay, GreGoryd, Abowd, Russell Bealg, Human – Computer Interaction., Pearson. Rogers, Sharps ,Interaction Design Prece,. Wiley DreamTech, ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56035) UNIX PROGRAMMING (ELECTIVE – I) Course Objectives: To understand the Unix utilities and be able to work with Bourne again shell (bash). To understand the file concepts, process, role of kernel in process management, signal generation and handling. Introduction to inter process communication, semaphores and multithreading. Course Outcomes: Summarize various utilities and use of shell scripts in UNIX environment. Describe and understand file system, process and signals in UNIX system. Analyze and apply the concepts of inter process communication. Explain thread structure and use of thread API’s in multithreaded programming. Analyze the importance of sockets in network programming. Unit I: Introduction to Unix:- Architecture of Unix, Features of Unix , Unix Commands – PATH, man, echo, printf, script, passwd, uname, who, date, stty, pwd, cd, mkdir, rmdir, ls, cp, mv, rm, cat, more, wc, lp, od, tar, gzip. Unit II : Unix Utilities:- Introduction to unix file system, vi editor, file handling utilities, security by file permissions, process utilities, disk utilities, networking commands, unlink, du, df, mount, umount, find, unmask, ulimit, ps, w, finger, arp, ftp, telnet, rlogin.Text processing utilities and backup utilities , detailed commands to be covered are tail, head , sort, nl, uniq, grep, egrep, fgrep, cut, paste, join, tee, pg, comm, cmp, diff, tr, awk, cpio Unit III : Working with the Bourne shell(bash): Introduction, shell responsibilities, pipes and input Redirection, output redirection, here documents, running a shell script, the shell as a programming language, shell meta characters, file name substitution, shell variables, command substitution, test command, control structures, arithmetic in shell, functions. Filters: Filters and Pipes, Concatenating files, Display Beginning and End of files, Cut and Paste, Sorting, Translating Characters, Files with Duplicate Lines, Count characters, Words or Lines, Comparing Files Unit IV: Inter-process Communications: Introduction to IPC, Pipes, FIFOs, Introduction to three types of IPC-message queues, semaphores and shared memory. Message Queues: Kernel support for messages, Unix system V APIs for messages, client/server example. Semaphores: Kernel support for semaphores, Unix system V APIs for semaphores. Shared Memory: Kernel support for shared memory, Unix system V APIs for shared memory, semaphore and shared memory example. Unit V: Files: File Concept, Files System Structure, Inodes, File Attributes, File Types, Library functions, the standard I/O and formatted I/O in C, stream errors, kernel support for files, System calls, file descriptors. Process: Process concept, Kernel support for process, process attributes, process control-process creation, waiting for a process, process termination, zombie process, orphan process, Process APIs. Signals: Introduction to signals, Signal generation and handling, Kernel support for signals, Signal function, unreliable signals, reliable signals, kill, pause, abort, sleep functions. Text Books: Sumitabha Das, Unix Concepts and Applications, 4th edition, TMH, 2006. T.Chan, Unix System Programming using C++, PHI, 2012. Reference Books: 1.N.Mathew, R.Stones,Wrox, Beginning Linux Programming, 4th edition, Wiley India Edition. 2.W.R.Stevens, Unix Network Programming, PHI, 2001. Graham Glass, King Ables, Unix for programmers and users, 3rd Edition, Pearson Education, 2003. B.A.Forouzan and R.F.Gilberg, Unix and Shell programming, Cengage Learning, 2009. W.R.Stevens, Advanced Programming in the Unix environment, 2nd Edition, Pearson Education, 2001. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56036) COMPUTER GRAPHICS (ELECTIVE – I) Course Objectives: 1. To exemplify the major computer graphics application areas. 2.To create computer models of 2D And 3D objects using mathematical knowledge and skills. 3. Understating the 2D and 3D transforms Course Outcomes: To discriminate the various structures of Computer Graphics system. To analyze basic principles of implementing Computer Graphics primitives. To compare and contrast between implementation of 2D and 3D Transformations. To differentiate the techniques for representing 3D geometrical objects. To analyze requirements and constraints for hidden surface removal and rendering methods. Unit I: Introduction:Computer-Aided design, Presentation graphics, Computer Art, Entertainment, Education and Training, Visualization, Image processing, Graphics user interfaces. Graphics Systems: Video display devices, Raster scan systems, Random scan systems, Input devices, Hard-copy devices, Graphics software. Unit II: Basic Graphic algorithms: Overview, Scan converting lines, Scan converting Circles, Scan converting Ellipse, Filling polygons, Clipping lines (Cohen Sutherland & Liang Barsky), Clipping polygons (Sutherland Hodgeman). Unit III: Geometrical Transformations: 2D Transformation (Translation, Rotation, Scaling, Shearing & reflection), Homogeneous co-ordinates and matrix representation of 2D transformations, Composition of 2D transformations, the window-to-view port transformation. 3D Transformations: Matrix representation of 3D Transformations (Translation, Rotation, Scaling, Shearing & reflection.). Unit IV: Viewing in 3D: Projections, Specifying an arbitrary 3D view, Examples of 3D viewing Curves and surfaces: Polygon meshes, Hermite curves, Bezier curves, Bezier surfaces, B-Spline surfaces. Unit V: Visible surface determination: classification of visible surface determination algorithms (Back -Face Detection, Depth-Buffer, Scan line), BSP- Tree Method and Octree Method. Illumination and Shading: Illumination models (Ambient Light, Diffuse & Specular Reflection and Phong Model), Shading models for Polygons (Gouraud & Phong). Text Book: 1. Donald Hearn and M. Pauline Baker ,Computer Graphics C version, , 2nd Edition, 2011, Pearson. Reference Books: 1.Foley, Van Dam, Feiner, Hughes, Computer Graphics Principles and Practice in C, 2nd Edition, 2013, Pearson. 2. D.F. Rogers ,Procedural Elements for Computer Graphics, 2nd Edition, TMH ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 1 3 (A56037) OBJECT ORIENTED ANALYSIS AND DESIGN Course Objectives: Object oriented Analysis and Design using UML present the concepts and techniques necessary to effectively use system requirements to drive the development of a robust design model. To acquire UML, a common language for talking about requirements, designs, and component interfaces. Model a real-world application by using a UML class diagram. Showing how we apply the process of object oriented analysis and design to software development. Pointing out the importance and function of each UML model to the process of object oriented analysis and design, and explaining the notation of various elements in these models. Course Outcomes: Recognize the concepts and principles of object oriented programming concepts. Understand the purposes, major components and key mechanisms of Class and Object Diagram. Describe the basic resource management responsibilities of Interaction Diagram. Knowledge on State-chart Diagram. Applying the techniques for Component and Deployment Diagrams. Unit I: Introduction to UML: Importance of modeling, principles of modeling, object oriented Modeling, conceptual model of the UML, Architecture, Software Development Life Cycle. Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Unit II: Advanced Structural Modeling: Advanced classes, advanced relationships, Interfaces, Types and Roles, Packages Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams. Design class diagram for Library information system. Unit III: Basic Behavioral Modeling-I: Interactions, Interaction diagrams. Basic Behavioral Modeling-II: Use cases, Use case Diagrams, Activity Diagrams. Design Use cases, Use case diagrams, Interaction diagram and Activity diagram for library system. Unit IV: Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and space, state chart diagrams. Design State machine for different objects in library system Unit V: Architectural Modeling: Component, Deployment, Component diagrams and Deployment diagrams. Design and document of library system. Text Book: Grady Booch, James Rumbaugh, Ivar Jacobson, The Unified Modeling Language User Guide, 7th Impression, Pearson Education, 2008. Reference Books: Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado, UML2 Toolkit, 2nd Edition, WILEY-DreamTech India Pvt. Ltd., 2012. Meilir Page-Jones, Fundamentals of Object Oriented Design in UML, Illustrated Edition, Pearson Education, 2000. Pascal Roques, Modeling Software Systems Using UML2, 1st edition, WILEY-DreamTech India Pvt. Ltd., 2011. Atul Kahate, Object Oriented Analysis & Design, 1st Edition, The McGraw-Hill Companies, 2007. Mark Priestley, Practical Object-Oriented Design with UML, 2nd Edition, TATA McGrawHill, 2005. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 3 0 3 (A56038) SOFTWARE PROJECT MANAGEMENT Course Objectives: 1. A basic knowledge of software project management principles 2. The ability to come up with a project schedule and assign resources 3. Choose an appropriate project development methodology (e.g. waterfall, spiral …) 4. Identify project risks, monitor and track project deadlines Course Outcomes: 1. Apply the practice of project management in delivering of projects. 2. Evaluate the project against strategic, technical and economic criteria. 3. Identify effort estimation and activity plan of a project. 4. Categorize and prioritize actions for risk management. 5. Evaluate the characteristics of various team structures. Unit I: Introduction to software project management: Introduction, importance of software project management, Categorization of software project, problems, setting of objectives, stakeholders, the business case, management control. Stepwise: overview of project planning: Introduction, selection of projects, objectives infrastructure, products and activities, activity risks. Analysis of project characteristics, estimation of effort for each activity, allocation of resources, review/publicize plan/execute plan. Unit II: Programme management and project evaluation: programme management, management of allocation of resources within a programme, strategic programme management, creating a programme management, aids to programme management, benefits, evaluation of individual project’s, technical assessment, cost benefit analysis, evaluation techniques, cash flow forecasting. Selection of an appropriate project approach: choosing technologies, technical plan content list, and dynamic system development method. Unit III: Software effort estimation: applications and its problems, the basis of software estimation. Activity Planning: objectives, plan, project schedules, projects and activities(sequencing and scheduling),network planning models, formulating the network models, far ward and backward pass, identifying the critical path, activities. Unit IV: Risk Management: framework (identification, assessment, planning, and management), evaluating risks to the schedule, applying the PERT techniques, monte carol simulation, and critical chain concepts. Resource Allocation: Nature, identifying requirements, scheduling, creating critical paths, counting costs, publishing, cost schedule, scheduling sequence. Unit V: Monitoring and control: creating framework, collecting data, visualizing progress, cost monitoring, earned value analysis, prioritizing monitoring, change control. Managing contracts: ISO 12207 approach, supply process, types, stages, typical terms of a contract, contract management, acceptance. Managing people and organizing teams: organizational behavior, selecting the right person, instruction and best methods, motivation, Oldham-Hackman job characteristics working in groups, becoming a team, decision making, leadership, organizational structures, dispersed and virtual teams, influence of culture, stress, health and safety. Text Books: 1. Bob Hughes and Mike Cotterell, Software Project Management, Tata McGraw-Hill, 4TH Edition. 2. Newtown Square A Guide To The Project Management Body Of Knowledge (PMBOK Guide)., Pa. : Project Management Institute, Inc., 2004. Print. Reference Books: 1. Walker Royce, Software Project Management: Pearson Education, 2005. 2. Joel Henry: Software Project Management, Pearson Education. 3. PankajJalote:Software Project Management in practice, Pearson Education. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 0 3 2 (A56211) OBJECT ORIENTED ANALYSIS AND DESIGN LAB Course Objectives: Identify Use Cases and develop the Use Case model. Identity the conceptual classes and develop a domain model with UML Class diagram. Using the identified scenarios find the interaction between objects and represent them using UML Interaction diagrams. Identify the business activities and develop an UML Activity diagram. Design the State Chart diagram. Course Outcomes: The students understands the process to be followed in the software development life cycle Find practical solutions to the problems Solve specific problems alone or in teams Manage a project from beginning to end Projects 1 .ATM System 2. Online Quiz System 3. Online Ticket Reservation System Week 1-2 : Model use case diagrams for the above specified projects Week 3-4 : Model class diagrams for the above specified projects Week 5-6: Model activity diagrams for the above specified projects Week 7-8 : Model sequence diagrams for the above specified projects Week 9-10: Model collaboration diagrams for the above specified projects Week 11-12: Model state chart diagrams for the above specified projects Week 13-14: Model component diagrams for the above specified projects Week 15-16: Model Deployment diagrams for the above specified projects ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 0 3 2 (A56212) DATA WAREHOUSE AND DATA MINING LAB Course Objectives: To implement data warehouses for different organizations. To analyze the process of preprocessing the data. To test the real world data sets using supervised learning and unsupervised learning. To determine the performance and accuracy of models. To handle small data mining project for a given practical domain. . Course Outcomes: 1. The data mining process and important issues around data cleaning, pre-processing and integration. 2. The principle algorithms and techniques used in data mining, such as clustering, association mining, classification and prediction Week-1: Design multi-dimensional data models namely star, snowflake and Fact constellation schemas for one enterprise (Like banking). Week-2-3: Apply below preprocessing techniques on given dataset. Handling Missing Values , Remove records having a NULL value, Replace Numeric attributes by mean value, Remove Nominal attributes having null value, Sampling, Discretization (Binning) , Normalization Week-4: Market basket analysis using Association Rule Mining  HYPERLINK "http://www.stefanoscerra.it/movie-reviews-classification-weka-data-mining/"  Week-5: movie reviews classification using WEKA Tool Week-6: weather classification using WEKA Tool Week-7: Multiple regression analysis on sales data set Week-8: Demonstrate K-means based Clustering in weka Week-9:Demonstrate hierarchical based Clustering in weka Week-10: apply classification, cluster technique on time series data sets Week-11:apply classification, cluster technique on time spatial data sets Week-12:DemonstrateOutlier detection technique Week-13-16: Credit Risk Assessment Description: The business of banks is making loans. Assessing the credit worthiness of an applicant is of crucial importance. You have to develop a system to help a loan officer decide whether the credit of a customer is good, or bad. A bank's business rules regarding loans must consider two opposing factors. On the one hand, a bank wants to make as many loans as possible. Interest on these loans is the banks profit source. On the other hand, a bank cannot afford to make too many bad loans. Too many bad loans could lead to the collapse of the bank. The bank's loan policy must involve a compromise: not too strict, and not too lenient. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) III Year B.Tech. CSE - II Sem L T / P / D C 0 3 2 (A56213) LOGICAL REASONING AND QUANTITATIVE APTITUDE – II Course Outcomes:  Enhance the problem-solving ability of the students with focusing on basic concepts of arithmetic, algebra, geometry data analysis. Demonstrate various principles involved in solving mathematical problems and thereby reducing the time taken for performing job functions. UNIT I : Data Sufficiency : Problems in which a question on any topic such as Coding – Decoding, Blood Relations, Directions, Arithmetical Reasoning , etc. Puzzle Test : Classification Type Questions, Seating Arrangements Comparison Type Questions, Sequential Order of Things, Selection Based on given conditions, Family – Based Puzzles , Jumbled Problems. UNIT II: Assertions and Reason – Logical Venn Diagrams – Alpha Numeric Sequence Puzzle. Cubes and Dice – Analytical Reasoning. UNIT III : Logical Deduction: Logic, Statement – Arguments, Statement – Assumptions, Statement – Conclusions, Deriving Conclusions from Passages. Clocks & Calendar. UNIT IV: Simple Interest : Effect of change of P, R and T on Simple Interest – Compound Interest: Conversion Period, Difference between Compound Interest and Simple Interest – Time and Work – Time and Distance. UNIT V: Mensuration: Area of Plane Figures, Volume and Surface Area of solid figures. Data Interpretation: Tabulation, Bar Graphs, Pie Charts, Line Graphs. Text Books: Verbal and Non Verbal Reasoning by R.S.Agarwal. Quantitative Aptitude by R.S.Agarwal. Quantitative Aptitude by Abhijit Guha. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 4 1 4 (A57043) ADVANCED DATABASES Course Objectives: Understand the role of a database management system in an organization. Understand basic database concepts, including the structure and operation of the relational data model. Understand the concept of a database transaction and related database facilities, including concurrency control, backup and recovery, and data object locking and protocols. Course Outcomes: Design a distributed database system with Local Independence, Hardware Independence , Ability to achieve Local autonomy, Location Transparency, Fragmentation Transparency, Replication Transparency To execute distributed query executed at several different Data Processing sites. Understands the Query optimization to perform transparently by the DDBMS. Develop the distributed system which may heterogeneous and should provide DBMS independence Unit I: Features of Distributed versus Centralized Databases, Principles Of Distributed Databases -Levels of Distribution Transparency, Reference Architecture for Distributed Databases , Types of Data Fragmentation, Integrity Constraints in Distributed Databases, Parallel Database Systems-Parallel Architectures, Parallel DBMS Techniques, Distributed Database Design, A framework for Distributed Database Design, The Design of Database Fragmentation, The Allocation of Fragments. Unit II: Translation of Global Queries to Fragment Queries, Equivalence Transformations for Queries, Transforming Global Queries into Fragment Queries, Distributed Grouping and Aggregate Function Evaluation, Parametric Queries, Optimization of Access Strategies, A Framework for Query Optimization, Join Queries, General Queries. Unit III: The Management of Distributed Transactions, A Framework for Transaction Management , Supporting Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions, Architectural Aspects of Distributed Transactions, Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks, Concurrency Control based on Timestamps, Optimistic Methods for Distributed Concurrency Control. Unit IV: Reliability, Basic Concepts, Non-blocking Commitment Protocols, Reliability and concurrency Control, Determining a Consistent View of the Network, Detection and Resolution of Inconsistency, Checkpoints and Cold Restart, Distributed Database Administration, Catalog Management in Distributed Databases, Authorization and Protection Unit V: Distributed Object Database Management ,Object Distributed Design, Architectural Issues, Alternative Client/Server Architectures, Cache Consistency, Object Management, Object Identifier Management, Pointer Swizzling, Object Migration, Distributed Object Storage, Object Query Processing, Object Query Processor Architectures, Query Processing Issues, Query Execution , Transaction Management, Transaction Management in Object DBMS , Transactions as Objects. Text Books: Stefano Ceri, Giuseppe Pelagatti,Distributed Database Principles & Systems, McGraw-Hill. M.TamerOzsu, Patrick Valduriez,Principles of Distributed Database Systems, - Pearson Education. Reference Books: RamezElmasri, Shamkant B. Navathe,Fundamentals of Database systems, 5th Editions, Pearson educations, 2008. Raghurama Krishnan, Database Management Systems, Johannes Gehrke, TMH, 3rd Edition, 2003 ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 4 0 4 (A57044) INFORMATION SECURITY Course Objectives: Analyze the importance of information Security in real world. Compare and analyze different encryption Algorithms. Summarize authentication functions using MAC and Hash.   Analyze security importance of various web applications. Categorize various types of intruders and viruses Course Outcomes: Analyze the importance of information Security in real world. Designing and analysis of different encryption Algorithms. Implementation of MAC and Hash functions, security at different layers of a network. Explore different types of intruders and viruses. Unit I: Information Security: Introduction, History of Information security, What is Security, CNSS Security Model, Components of Information System, Balancing Information Security and Access, Approaches to Information Security Implementation, The Security Systems Development Life Cycle. Unit II : Cryptography: Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation , AES structure, Analysis of AES , Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange. Unit III: Message Authentication and Hash Functions: Authentication requirements and functions, MAC and Hash Functions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos. Unit IV Security at layers (Network, Transport, Application): IPSec, Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME. Unit V Intruders, Virus and Firewalls: Intruders, Intrusion detection, password management, Virus and related threats, Countermeasures, Firewall design principles, Types of firewalls. Text Books: 1. Michael E. Whitman, Herbert J. Mattord,Principles of Information Security, CENGAGE Learning, 4th Edition. 2. William Stallings, Cryptography and Network Security, Pearson Education,4th Edition Reference Books: 1. C K Shyamala, N Harini, Dr T R Padmanabhan, Cryptography and Network Security : Wiley India, 1st Edition. 2. Bernard Menezes, Network Security and Cryptography: CENGAGE Learning 3. AtulKahate, Cryptography and Network Security: McGraw Hill, 2nd Edition ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A57045) BIG DATA Course Objectives: To understand the performance management this interprets the meaning of big data in company databases using pre-determined queries and multidimensional analysis.  To understand the Data exploration i.e. makes heavy use of statistics to experiment and get answers to questions those managers might not have thought of previously. To understand the social analytics measure the vast amount of non-transactional data that exists today. To understand the decision science which involves experiments and big data analysis Course Outcomes: Know about sources of BigData and Analyzing Tools. Map statistical methods to analyze huge data. Know the other frameworks in Distributed File Systems. Know to create cluster in Hadoop distributed file system. Apply Map Reduction in HDFS. Unit I: INTRODUCTION TO BIG DATA Introduction to BigData ,Characteristics of Big Data, Traits of Big data,Challenges of Conventional Systems, Sources of Big Data, Evolution Of Analytic Scalability, Analytic Processes and Tools, Analysis vs Reporting, Modern Data Analytic Tools, Statistical Concepts: Sampling Distributions -Re-Sampling -Statistical Inference -Prediction Error. Unit II: BIG DATA IN ENTERPRISE Problems with traditional large-scale systems, Big Data in enterprise, Comparison with other systems, Hadoop Frame work. Unit III: INTRODUCTION TO HADOOP History of Hadoop, Data Storage and Analysis,Hadoop -Setup hadoop -Pseudo mode-Cluster mode-IPv6-Installation of java, hadoop-Configurations of hadoop. Unit IV: HDFS The Hadoop Distributed File System-HDFS Design and Architecture-HDFS Concepts-Interacting HDFS using command line-Interacting HDFS using Java APIs-Dataflow-Blocks-Replica-Hadoop Processes-Name node-Secondary name node-Job tracker-Task tracker-Data node. Unit V: MAP REDUCE How MapReduce Works-Anatomy of a Hadoop Cluster-Hadoop Ecosystem Components-Developing Map Reduce Application-Phases in Map Reduce Framework-Map Reduce Input and Output Formats-Introduction to Writing a MapReduce Program-The MapReduce Flow-Examining a Sample MapReduce Program-Basic MapReduce API Concepts-The Driver Code-The Mapper-The Reducer. Introduction to Languages and Databases HadoopProgramming languages: Pig, Hive NOSQL Databases: Cassandra, Mongo, Cloudera, CouchDB, HBase Text Books: Bill Franks, “Taming the Big data tidal wave”,SAS , Wiley, 2012. Tom White “ Hadoop: The Definitive Guide” Third Edition, O’reilly Media, 2012. Reference Books: Michael Minelli, Michele Chambers, AmbigaDhiraj,JimStogdill, “BigDataBigAnalytics : Emerging Business Intelligence and Analytic Trends for Today's Businesses”, 1st Edition,Wiley Publications,2013 Chris Eaton, Dirk DeRoos, Tom Deutsch, George Lapis, Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data”, McGrawHill Publishing, 2012 PeteWarden, “Big Data Glossary”, O’Reilly, 2011. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A57046) MANAGERIAL ECONOMICS AND FINANCIAL ANALYSIS Course Objective: To explain the basic principles of Managerial Economics, Accounting and Current Business Environment underlying business decision making. Unit I: Introduction to Managerial Economics:Definition, Nature and scope of Managerial Economics – Demand Analysis: Demand Determinants, Law of Demand and its exceptions. Elasticity of Demand: Definition, Types, Measurement and Significance of Elasticity of Demand. Demand Forecasting, methods of Demand Forecasting (Survey Methods, Statistical Methods, Expert Opinion Method, Test Marketing, Controlled Experiments, Judgmental Approach to Demand Forecasting) Unit II: Theory of Production and Cost Analysis: Production Function – Isoquants and Isocosts, MRTS, Least Cost Combination of Inputs, Laws of Returns, Internal and External Economics of Scale. Cost Analysis: Cost concepts, Opportunity Cost, Out of Pocket Costs vs. Imputed Costs. Break – Even Analysis (BEA) – Determination of Break – Even Point (simple problems) – Managerial Significance and limitations of BEA. Unit III: Introduction to Markets & Pricing Policies: Market structures: Types of Competition, Features of Perfect Competition, Monopoly and Monopolistic Competition, Price – Output determination in case of Perfect Competition Objectives and Policies of Pricing – Methods of Pricing: Cost Plus Pricing, Marginal Cost Pricing, Sealed Bid Pricing, Going Rate Pricing, Limit Pricing, Market Skimming Pricing, Penetration Pricing, Two – Part Pricing, Block Pricing, Peak Load Pricing, Cross Subsidization. Unit IV: Capital and Capital Budgeting: Capital and its significance, Types of Capital, Estimation of Fixed and Working Capital requirements, Nature and scope of Capital Budgeting, features of Capital Budgeting proposals, Methods of Capital Budgeting: Payback Method, Accounting Rate of Return (ARR) and Net Present Value Method, Profitability Index, Internal Rate of Return ( simple problems) Unit V: Introduction to Financial Accounting: Double – Entry Book Keeping, Journal, Ledger, and Trial Balance – Final Accounts (Trading Account, Profit and Loss Account and Balance Sheet with simple adjustments). Financial Analysis through ratios: Computation, Analysis and Interpretation of Liquidity Ratios (Current Ratio and Quick Ratio), Activity Ratios ( Inventory Turnover Ratio and Debtor Turnover Ratio), Capital Structure Ratios ( Debt – Equity, Interest Coverage Ratio), and Profitability Ratios (Gross Profit Ratio, Net Profit Ratio, Operating Profit Ratio, P/E Ratio and EPS). Text Books: Aryasri, Managerial Economics and Financial Analysis, TMH, 2009. Varshney&Maheshwari, Managerial Economics, Sultan Chand, 2009. ReferenceS: Raghunatha Reddy &Narasimhachary, Managerial Economics & Financial Analysis, Scitech, 2009. V. Rajasekarn& R. Lalitha, Financial Accounting, Pearson Education, New Delhi, 2010. Suma Damodaran, Managerial Economics, Oxford University Press, 2009. Domnick Salvatore, Managerial Economics in a Global Economy, 4th Edition, Cengage, 2009. Subhash Sharma & M. P. Vittal, Financial Accounting for Management, Text & Cases, Machmillan, 2008. S. N. Maheshwari& S. K. Maheshwari, Financial Accounting, Vikas 2008. Truet and Truet, Managerial Economics; Analysis, Problems and Cases, Wiley, 2009. Dwivedi, Managerial Economics, Vikas 2009. M. Kasi Reddy and S.Saraswathi, Managerial Economics and Financial Accounting, PHI, 2007. Erich A. Helfert, Techniques of Financial Analysis, Jalco, 2007. Codes / Tables: Present Value Tables need to be permitted into the Examination Hall. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A57047) IMAGE PROCESSING (ELECTIVE-II) Course Objectives: Analyze general terminology of digital image processing. Develop Fourier transform for image processing in frequency domain. Evaluate the methodologies for image segmentation, restoration, topology, etc. Implement image process and analysis algorithms. Apply image processing algorithms in practical applications. Course Outcomes: To acquire the fundamental concepts of a digital image processing system. To identify and exploit analogies between the mathematical tools used for 1D and 2D signal analysis and processing. To analyze 2D signals in the frequency domain through the Fourier transform. To design and implement algorithms for digital image processing operations such as histogram equalization, enhancement, restoration, filtering, and de-noising. To acquire an appreciation for the image processing issues and techniques and be able to apply these techniques to real world problems. Unit I: Introduction: What Is Digital Image Processing? -The Origins of Digital Image Processing -Examples of Fields that Use Digital Image– Fundamental Steps of digital image processing– Components of an Image Processing System- Elements of Visual perception –Image sensing and acquisition – Sampling and quantization (Pages 1-42and 46-67, R1). Unit II: Image Transforms:Fourier transforms –1D and 2D. Cosine, Sine, Haar, Slant, KL, HadmardTransforms . Unit III: Image Enhancement– Background, some basic intensity transformation functions, Histogram processing. Image Restoration – Introduction, image observation models, inverse and wiener filtering, FIR wiener filtering, filtering using image transforms least square filters Unit IV: Color Image Processing: Color fundamentals, color models pseudo – Color image processing – intensity slicing gray level to color transformation Image compression – Fundamentals, some basic compression methods – Huffman coding Golomb coding, LZW and Digital Watermarking. Unit V: Image Segmentation – Fundamentals, point, line, and edge detection, thresholding and region base segmentation. Text Book: 1). Gonzalez R.C., Woods R. E., Digital Image Processing, 3rd Edition, 2008, Pearson, Prentice – Hall of India Pvt. Ltd., New Delhi. Reference Book: 1). Anil K. Jain , Fundamentals of Digital Image Processing, Prentice – Hall of India Pvt. Ltd., New Delhi. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A57048) INFORMATION RETRIEVAL SYSTEMS (ELECTIVE-II) Course Objectives: This course studies the basic principles and practical algorithms used for information retrieval and text mining To understand the functions of Information retrieval To provide exploration of information retrieval systems’ evaluation tools To provide hands-on experience in evaluating search engines to solve computational search problems. To understand the complexity of Information Retrieval Systems. Course Outcomes: Acquire the knowledge of information retrieval system and its capabilities Comprehend the knowledge of indexing and Data structure that can used for storing the data Know the concept of indexing and clustering of the information Understand the searching techniques and visualization Have a handle on algorithms for text searching and multimedia retrieval Unit I: Introduction to Information Retrieval Systems: Definition, Objectives, functional overview, Relation to Database Management system. IRS capabilities: Search capabilities, Browse Capabilities, Miscellaneous Capabilities Unit II: Cataloging and Indexing: History of objectives of Indexing, indexing process, automatic indexing Data Structure: Introduction to Data structure, Stemming Algorithms, Invert file system, N-Gram Data structure, PAT data structure, Hypertext and XML data structure Unit- III: Automatic Indexing: Classes of Automatic indexing, Statistical indexing, Natural language, concept Indexing, Hypertext Linkage. Document and Term Clustering: Introduction to clustering, Thesaurus Generation, Manual clustering, Automatic term clustering Unit IV: User Search Techniques: Searching statement and binding, Similarity Measurement and Ranking, Relevance Feedback, Selective dissemination of information search, weighted searches of Boolean system. Information Visualization: introduction to information visualization, Cognition and perception Unit V: Text Search Algorithms: Introduction to Text search techniques, Software text search algorithms, hardware text search system Multimedia information retrieval: Spoken language audio retrieval, Non- speech audio retrieval, Graph Retrieval, Imagery retrieval, video retrieval Text Book: Gerald J.Kowalski, Mark T. Maybury,Information storage and retrieval systems, theory and implementation, 2nd Edition, Springer publications. Reference Books: Christopher D. Manning and Prabhakar, Raghavan,Introduction to information Retrieval, Cambridge University Press, 2008. Ricardo baeza-Yates,Modern information retrieval, Pearson Education, 2007. Robert Korthage,Information storage and Retrieval, John wiley& sons. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 3 1 3 (A57049) CYBER FORENSICS (ELECTIVE-II) Course Objectives: Create a document review, retention, and destruction policy. Write an acceptable use policy and employer privacy statement. List and describe the generally accepted computer forensic procedures. Explain and list the various legislation and regulations that impact technology. Analyze forensic analysis reports. Course Outcomes: Perform a forensic investigation by following guidelines to secure the crime or corporate scene. Learn what legal issues are involved and what rights the person of interest has. Perform digitally and court approved images of evidence to be used in a court of law. Learn how to document and store evidence. Learn how to analyze evidence using commercial forensic software and also how to create a report of the said evidence. Unit I: Computer Forensics and Investigations: What iscomputer Forensics? Use of computer forensics in Law Enforcement, Computer Forensics Assistance to Human Resources/Employment Proceeding,Computer Forensics services,Benefits of Professional Forensics Methodology, Steps taken by Computer Forensics Specialists. Types of Computer Forensics Technology:Types of Military Computer Forensic Technology,Types of law Enforcement-Computer forensic Technology – Types of Business computer Forensic Technology. Computer Forensics Evidence and capture: Data Recovery Defined Data Backup and Recovery – The Role of Back-up in Data Recovery – The Data – Recovery Solution Unit II: Evidence Collection and Data Seizure: Why Collection Evidence? Collection Options - Obstacles - Types of Evidence – The Rules of Evidence – General Procedure – Collection and Archiving –Methods of Collection – Artifacts – Collection Steps – Controlling Communication: The Chain of Custody duplication and Preservation of Digit Evidence:PreservingtheDigital Crime Scene – Computer Evidence Processing Steps – Legal Aspects of Collection and Preserving computer Forensics Evidence.Computer Image Verification and Authentication: Special Needs of Evidential Authentication – Practical Conserdation – Practical Implementation Unit III: Computer Forensics analysis and validation:Determining what data to collect and analyze,validating forensic data,addressing data-hiding techniques, performing remote acquisitions Network Forensics: Network Forensics:Network forensics overview,performing live acquisitions,developing standard procedures for network forensics using network tools,examining the honeynet project Unit IV: Processing Crime and Incident Scenes: Identifying Digital Evidence, Collecting the Evidence in Private-Sector Incident Scenes, Processing law Enforcement Crime Scenes, Preparing for a Search, Securing a Computer Incident or Crime Scene, Sizing Digital evidence at the Scene, Storing Digital evidence, obtaining a Digital Hash. Current Computer Forensics Tools: Evaluating Computer Forensics Toll Needs, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and Testing Forensics Software Unit V: E-mail Investigations Cell Phone and Mobile Device Forensics: Exploring the Role of E-mail in Investigations, Exploring the Role of Client and Server in E-mail, Investigating E-mail Crimes and Violations, Understanding E-mail Servers, Using Specialized E-mail Forensics Tools, Understanding Mobile Device Forensics, Understanding Acquisition Procedure for Cell Phones and Mobile Devoices Text Books: John R.Vacca, Computer Forensics,Computer Crime Investigation,firewallMedia,New Delhi Nelson, Phillips Enfinger,Steuart, Computer Forensics and Investigations, Cengage Learning. Reference Books: Keith J. Jones, Richard Bejthich, Curtis W Rose ,Real Digital Forensics, Addition- Wesley Pearson Education. Tony SammesandBairnJenkinson,Forensic Compiling A Practitioner’s Guide, , Springer International edition. Christopher L.T.Brown,Computer Evidence Collection & Presentation, Firewall Media. Jesus Mena ,Homeland Security, Techniques & Technologies, Firewall Media. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 4 1 4 (A57050) ADHOC SENSOR NETWORKS (ELECTIVE-III) Course Objectives: To understand the concepts of Ad hoc sensor networks To understand the MAC and transport protocols for ad hoc networks To understand the security protocols in Adhoc sensor networks To understand the applications of ad hoc and sensor networks Course Outcome: 1. Apply the concepts of Ad hoc sensor networks. 2. Analyse various MAC protocols for ad hoc sensor networks. 3. Create new architecture of Wireless sensor networks. 4. Design security protocols for Ad hoc sensor networks. Unit I: Introduction to Ad Hoc Networks: Cellular and Ad hoc wireless networks----Characteristics of MANETs, Applications of MANETs and challenges -– Topology based Routing :Proactive :DSDV ,WRP, Reactive :AODV ,DSR and Hybrid Routing protocols :CEDAR ,ZRP .Position based :LAR Unit II:  MAC Protocols: Issues of MAC layer-Contention based protocols-MACAW ,BTMA ,MACA ,Contention based with reservation-D-PRMA,HRMA-Multicast Routing ,Tree-Based Multicast Routing :MCEDAR,MZRP,BEMRP, MAODV .,Mesh based Multicast Routing :ODMRP,DCMP. Unit III: Basics of Wireless, Sensors and Applications: Applications, issues, Classification of sensor networks, Architecture of sensor network Data Retrieval in Sensor Networks: Data Dissemination: RumorRouting, SAR, Direct Diffusion, Cost-Field Approach, SPIN, and SMECN), Data Gathering: Direct Transmission, PEGASIS, Chain-Based Unit IV: Sensor Networks Security: Security in Ad Hoc networks, Security Attacks :Network Layer Attacks ,Transport Layer Attack ,Application Layer Attacks, Key management :Key management in ASN Secure routing in ASN:SAR ,Security Aware AODV,ARAN TCP over Ad Hoc: TCP protocol overview, TCP and MANETs, Solutions for TCP over Adhoc, F-TCP,ELFN-TCP,TCP-Bus, split TCP, Ad hoc TCP Unit V: Sensor Network Platforms and Tools: Sensor Network Hardware, Berkeley motes, Sensor Network Programming Challenges, Node-Level Software Platforms Operating System:TinyOS - Imperative Language:nesC, Dataflow style language: TinyGALS, Node-Level Simulators, ns-2 , TOSSIM Text Books: C.Siva Ram Murthy ,B.S. Manoj, Adhoc Wireless Networks :Architectures and protocols, PEARSON FengZhao,LeonidaJ.Guibas , Wireless Sensor Networks, An Information processing Approach, Reference Books: Carlos demoraiscordeiro, Dharma PrakashAgrawal,Adhoc Sensor Networks-Theory and Applications(2nd edition),. Subir Kumar Sarkar, Wireless Ad hoc Mobile Wireless Networks – Principles, Protocols and Applications , Auerbach Publications, Taylor & Francis Group, 2008 JagannathanSarangapani , Wireless Ad hoc and Sensor Networks – Protocols, Performance and Control CRC Press, Taylor & Francis Group, 2010. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 4 1 4 (A57051) SOFTWARE TESTING (ELECTIVE –III) Course Objectives: Understand fundamentals of Software testing. To understand Path, Transaction, Dataflow & Domain testing Strategies. To analyze node reduction algorithm. To explore the logic & state testing strategies. Acquire knowledge on various automated testing tools Course Outcomes: Prioritize & categorize the bugs and take necessary measures. Apply Path, Transaction, and Dataflow& Domain testing Strategies. Identify Number of test cases by applying node reduction algorithm. Apply logic & state testing strategies. Understand various automated testing tools. Unit I : Introduction: Purpose of testing, Dichotomies, model for testing, consequences of bugs, taxonomy of bugs Flow graphs and Path testing: Basics concepts of path testing, predicates, path predicates and achievable paths, path sensitizing, path instrumentation, application of path testing. Unit II: Transaction Flow Testing: Transaction flows, transaction flow testing techniques. Dataflow testing:-Basics of dataflow testing, strategies in dataflow testing, application of dataflow testing. Unit III: Domain Testing:-domains and paths, Nice & ugly domains, domain testing, domains and interfaces testing. Paths, Path products and Regular expressions: Path products & path expression, reduction procedure, applications, regular expressions & flow anomaly detection. Unit IV: Logic Based Testing: Overview, decision tables, path expressions, kv charts, specifications. State, State Graphs and Transition testing: State graphs, good & bad state graphs, state testing. Unit V: Matrices and Application: Motivational overview, matrix of graph, relations, power of a matrix, node reduction algorithm. Study of different automated testing tools. Text Books: Boris Beizer ,Dreamtech, Software Testing techniques , Second edition. Dr.K.V.K.K.Prasad, Software Testing Tools, Dreamtech First edition Reference Books: GlenfordMyers , The art of Software testing, 2nd edition, 2004. Brain Marrick, The craft of software testing, 1st edition, Pearson Education. N.Chauhan,Software Testing-, 1stedition., Oxford University Press. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 4 1 4 (A57052) SOFTWARE DEVELOPMENT FOR PORTABLE DEVICES (ELECTIVE-III) Course Objectives: Explore both theoretical and practical issues of mobile computing. Understand the main components of an Android application and its entire life Cycle. Use external resources, manifesting adapters and intents. Understand Android persistent storage and techniques: databases, and Content Providers. Course Outcomes: Analyze the architecture and technical challenges of mobile devices and cellular wireless communications Analyze architecture of android and current trends in mobile operating systems. Apply suitable software tools and APIs for the development User Interface of a particular mobile application. Develop and design apps for mobile devices using SQLiteDatabase. Apply the location based service and telephony in android applications Unit I Introduction to MobileComputing, novel applications, limitations, and architecture. GSM: Mobile services, System architecture, Radio interface, Protocols, Localization and calling, Handover, Security, and New data services. Unit II  Introduction to Android, Features of Android, The development framework: Understanding the Android Software Stack, Android Application Architecture; the Dalvik Virtual Machine, Creating First Android Application, Types of Android Applications, Android Development Tools: The Android Virtual Device Manager, Android Emulator, The Dalvik Debug Monitor Service. Unit III Creating applications and Activities: Introduction to the application Manifest File, Using the Manifest Editor, Externalizing Resources: Creating Resources - Simple Values, Drawables, Layouts, Menus, Animations. The Android Activity Life cycle; Building User Interfaces: Fundamental Android UI design, Introducing Layouts: Defining Layouts, Using Layouts to Create Device Independent User Interfaces, Optimizing Layouts. Unit IV Databases and Content Providers: Introduction to Android Databases, Introducing SQLite, Content Values and Cursors, working with SQLite Databases - Introducing the SQLiteOpenHelper, Querying a Database, Extracting Values from a Cursor, Adding, Updating, and Removing Rows, Creating Content Providers, Using Content Providers - Introducing the Content Resolver, Querying Content Providers, Adding, Deleting, and Updating Content Unit V Maps and Location based services: Using the location based services, Selecting a Location Provider, Selecting a Location provider, Finding current location; Creating Map-Based Activities: Introducing Map View and Map Activity, Creating a Map-Based Activity, Maps and Fragments Telephony and SMS: Using telephony - Initiating Phone Calls, Accessing Telephony Properties and Phone State, Monitoring Changes in Phone State Using the Phone State Listener, Introducing SMS and MMS - Using SMS and MMS in Your Application, Sending SMS and MMS from Your Application Using Intents, Sending SMS Messages Using the SMS Manager Text Books: 1. JochenH.Schiller,Mobile Communications, , Second edition, Pearson Publication 2004. 2.Reto Meier , Professional Android 4 Application Development, 1st Edition,Wrox Press, Wiley Publishing, 2014 Reference Books: PradeepKothari,Android Application Development (with Kitkat Support), Black Book, ,2014,Dreamtech Press publisher,Kogent Learning Inc., 2014 Erik Hellman,Android Programming: Pushing the Limits, , 1st Edition, Wiley Publications, 2014. Mike Wolfson,Android Developer Tools Essentials, , O’Reilly Edition, 1st Edition, 2013. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - I Sem L T / P / D C 0 3 2 (A57213) INFORMATION SECURITY LAB Course Objectives: Understand the Security Scanner through NMAP Explain the packet analyser. Understand different encryption algorithms. Implement simple encryption algorithms using C Understands brute force attack Course outcomes: Implements port scanning. Performs security scanning and network exploration Analysis of packet protocols,IP spoofing. Implements various encryption algorithms. Illustrates PGP and digital signature. Software Requirements:NMAP, WIRESHARK,JCRYPT TOOL. Week 1 1. Installation of NMAP. Week2 2. Implement port scanning with NMAP Week 3 3. Perform the following using NMAP .Find ports on a system .Find active machines .Find the version of remote OS. Week 4 4. Installation of Wireshark. Week 5 5. Perform an experiment to sniff for router traffic by using Wireshark. Week 6,7 Implement Simple Data Encryption Standard (SDES) Algorithm through C program Week 8,9 7. ImplementDiffie–Hellman key exchange algorithm through C program. Week 10 8. Installation of Jcrypt tool Week 11 9. Implement DES algorithm using Jcrypt tool Week 12 10. Implement RSA algorithm using Jcrypt tool Week 13 11. Implement HASH algorithm using Jcrypt tool Week 14 12. Implement SHA1 algorithm using Jcrpty tool Week 15 13. Implement brute force algorithm in C . ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - IISem L T / P / D C 4 1 4 (A58038) MULTIMEDIA COMPUTING Course Objectives: 1. To understand properties of multimedia & characteristics of data streams. 2. To understand basic concepts of sound and audio. 3. To know representation of digital image and its applications. 4. To outline various video formats in multimedia applications. 5. To list out various data compression techniques. Course Outcomes: 1. Analyze various data streams in multimedia. 2. Analyze speech recognition in sound/ audio. 3. Edit graphic files using graphics software to improve the images and analysis of image. 4. Develop visual effects & rendering effects by using animation. 5. Apply data compression techniques & tools in real time applications Unit I: Introduction - Branch-over lapping Aspects of multimedia , Global structure of multimedia, data streams:medium, main properties ofmultimedia system, multimedia, traditional data streams characteristics, data streams characteristics for continuous media Unit II: Sounds /Audio: Basic sound concepts: computer representation of sounds, audio Formats, music: MIDI basic concepts, MIDI devices, MIDI messages, MIDI and SMPTE timing standards , MIDI software, speech: speech generation, speech analysis, speech transmission. Unit III: Image and graphics: basic concepts, digital image representation, image format, graphic format, computer image processing, image synthesis, image analysis, image transmission. Unit IV: Video and animation: Video signal representation, computer video format, television : conventional system, enhanced definition system, high –definition system, transmission Computer –based animation: Basic concepts, animation languages, method of controlling animation, display of animation, transmission of animation . Unit V: Data compression: storage space, coding requirements, source ,entropy and hymode coding, compression techniques: JPEG,H.261(PX64),MPEG,DVI Text Book: 1. Multimedia: computing, communication and Applications, Ralf steinmetz and klaranahrstedt. Reference Books 1. Z.N. Li and M.S. Drew, Fundamentals of Multimedia. Prentice Hall, 2003. 2. K. Jeffay and H. Zhang, Readings in Multimedia Computing and Networking. Morgan Kaufmann, 2002. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - IISem L T / P / D C 3 0 3 (A58039) ENTREPRENEURSHIP (ELECTIVE – IV) Course Outcomes: Have the knowledge on various concepts of business management and approaches. Understand and analyze the interconnections between the development of key functional areas of business organization and the management thought process. Acquire team management skills and to become a competent leader, who possesses complex and integrated real world skills. Be ethically conscious and socially responsible managers, capable of contributing to the development of the nation and quality of life. Unit-I: Understanding Entrepreneurial Mindset- The revolution impact of entrepreneurship- The evolution of entrepreneurship- Approaches to entrepreneurship- Process approach- Twenty first centaury trends in entrepreneurship. Case1: Ready, Aim, Fire Fire (B. Janakiram, M.Rizwana, page 212), Case2: Henry Ford, (B. Janakiram, M. Rizwana, page 214) Case 3: From candle seller to CEO (Arya Kumar P.No. 48) Unit-II: The individual entrepreneurial mind-set and Personality- The entrepreneurial journey- Stress and the entrepreneur- the entrepreneurial ego- Entrepreneurial motivations.Corporate Entrepreneurial Mindset-the nature of corporate entrepreneur- conceptualization of corporate entrepreneurship Strategy-sustaining corporate entrepreneurship. Case : Globalizing Local Talent, (B. Janakiram, M. Rizwana, page 228). Unit-III: Launching Entrepreneurial Ventures-Opportunities identification- entrepreneurial Imagination and Creativity- the nature of the creativity process-Innovation and entrepreneurship. Methods to initiate Ventures- Creating new ventures-Acquiring an Established entrepreneurial venture- Franchising-hybrid-disadvantage of Franchising. Case 1: Water, Water everywhere: but not a drop to drink, (Richard Blundel , Page 48). Case 2: Critical Incident, Mark Robinson: Strategy Mapping Business (Richard Blundel, Page 48). Case 3: Pets.com (Arya Kumar P.No. 88) Case 4: creativity in start-ups (Arya Kumar P.No. 166) Case 5: Opportunity – Earthmoving Industry (Arya Kumar P.No. 211) Unit-IV: Legal challenges of Entrepreneurship-Intellectual property protection-Patents, Copyrights-Trademarks and Trade secrets-Avoiding trademark pitfalls. Formulation of the entrepreneurial Plan- The challenges of new venture start-ups, Poor financial Understanding-Critical factors for new venture development-The Evaluation process-Feasibility criteria approach. Case 1:Victoria, Tomlinson; Network. (Richard Blundel, Page 99). Case 2: Tim Lockett, Knowing your Customers & Suppliers (Richard Blundel Page128). Case 3: Google (Arya Kumar P.No. 248) Case 4: Tata Motors – Nano (Arya Kumar P.No. 279) Unit-V:Strategic perspectives in entrepreneurship- Strategic planning-Strategic actions- strategic positioning-Business stabilization- Building the adaptive firms-Understanding the growth stage-Unique managerial concern of growing ventures. Case 1: To Lease or Not: A Cash flow Question (David H.Holt, Page 452). Case 2:- Public Sector - address seed capital (David H.Holt, Page 453). TextBooks 1. D F Kuratko and T V Rao “Entrepreneurship- A South-Asian Perspective “Cengage Learning, 2012. (For PPT, Case Solutions Faculty may visit : login.cengage.com) Cases: Arya Kumar “Entrepreneurship- creating and leading an entrepreneurial organization” Pearson 2012. Richard Blundel” Exploring Entrepreneurship Practices and Perspectives, Oxford, 2011. David H Holt” Entrepreneurship:New Venture Creation” PHI,2013. Journal: 1. The Journal of Entrepreneurship, Entrepreneurship Development Institute of India,Ahmedabad, 2. Journal of Human Values: IIM Calcutta. Reference Books: Vasant Desai “Small Scale industries and entrepreneurship” Himalaya publishing 2012. Rajeev Roy “Entrepreneurship” 2e, Oxford, 2012. B.Janakiram and M.Rizwana” Entrepreneurship Development: Text & Cases, Excel Books,2011. Stuart Read, Effectual Entrepreneurship, Routledge, 2013. Robert Hisrich et al “Entrepreneurship” 6th e, TMH, 2012. Nandan H, Fundamentals of Entrepreneurship, PHI, 2013 Shejwalkar, Entrepreneurship Development, Everest, 2011 Khanka, Entrepreneurship Development, S.Chand, 2012 ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - IISem L T / P / D C 3 0 3 (A58040) MULTIMEDIA AND RICH INTERNET APPLICATIONS DEVELOPMENT (ELECTIVE IV) Course Objectives: Provides students with the basic concepts and techniques of interactive authoring. Introduces students with the advanced scripting skills necessary for implementing highly interactive, rich internet applications using multimedia technologies and authoring tools. Students will develop aesthetic value and competencies in multimedia authoring. Students to master industry-wide software and technologies to create highly interactive, rich internet applications. Course Outcomes: Evaluate the usage of multimedia technology in various rich internet applications. Apply tools and techniques for the design and development of various multimedia objects. Apply multimedia authoring tools and technologies to design and integrate various multimedia objects into rich internet applications Integrate user interface and web design principles in their application development. Unit I: Introduction to Multimedia: Internet and Multimedia communications, Multimedia Networks, Multimedia Applications, Multimedia Information representation-Digitization Principles, Text, Images, Audio and Video, Compression Methods-Basic Coding Methods-Run Length coding, Huffman coding, Arithmetic coding. Unit II: Multimedia Applications in Networks: Introduction, Application Level Framing, Audio/Video Conferencing-SessionDirectories, Audio/Video Conferencing, Adaptive Applications, Receiver Heterogeneities, Real Time Application with Resource Reservation, Video Server, Applications requiring reliable multicast-White Board, Network Text Editor for Shared Text Editing, Multi Talk, Multicast file transfer. Unit III: Web 2.0: What is Web 2.0, Search, Content Networks, User Generated Content, Blogging, Social Networking, Social Media,Tagging, Social Marking, Rich Internet Applications, Web Services, Mashups, Location Based Services, XML, RSS, ATOM, JSON, and VoIP, Web 2.0 Monetization and Business Models, Future of the Web. Unit IV: Rich Internet Applications (RIAs) with Adobe Flash and Flex: Adobe Flash-Introduction, Flash Movie Development, Learning Flash with Hands-on Examples, Publish your Flash Movie, Creating Special Effects with Flash, Creating a website splash screen, action script, Web Sources. Adobe Flex 2-Introduction, Flex Platform Overview, Creating a Simple User Interface, Accessing XML data from your Application. Unit V: Ajax-enabled Rich Internet Application: Introduction, Traditional Web Applications vs Ajax Applications, Rich InternetApplication with Ajax, History of Ajax, Raw Ajax example using xmlhttprequest object, Using XML, Creating a full scale Ajax Enabled application, Dojo Toolkit. Text Books: Franklin F Kuo, JJoaquin Garcia, Wolf gang Effelsberg, Multimedia Communications: Protocols and Applications, , Prentice Hall Publications. Fred Halsall,,Multimedia Communications: Applications, Networks, Protocols and Standards, Addison Wesley Publications. Reference Books: Rich Tretola, Simon barber and Renaun Erickson, Wrox, Professional Adobe Flex Wiley India. Nalin K Sharda ,Multimedia Information Networking, ,PHI Learning. Ralf Steinmetz and KlaraNahrstedt ,Multimedia Computing, Communications & Applications, Pearson Education. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - IISem L T / P / D C 3 0 3 (A58041) SOFT COMPUTING (ELECTIVE IV) Course Objectives: To learn the key aspects of Soft computing To know about the components and building block hypothesis of Genetic algorithm. To understand the features of neural network and its applications To study the fuzzy logic components To gain insight onto Neuro Fuzzy modeling and control. Course Outcomes: Acquire the knowledge soft computing and correlation with other computing techniques. Comprehend the knowledge of artificial neural networks and its generations. Know the concept of genetic algorithms and its applications. Understand the Fuzzy logic structure and operations. Have a handle on Neuro-fuzzy concepts. Unit I : Introduction To Soft Computing And Neural Networks : Soft Computing Introduction , Hard computing Vs Soft computing, Artificial intelligence , Developments of ANNs, Neural computing Vs Conventional Computing, SWARM Intelligent system: Strengths and Weakness, Application. Unit II : Artificial Neural Networks: First Generation: Introduction to neural networks, Classification of ANN: Architecture, learning/ Training, Training and Testing Modes, Active/ Transfer function, First-generation neural networks: McCulloch and Pitts Neuron model, Perceptron network. Second Generation: Back propagation neural networks, Kohonen neural networks, Hopfield neural networks. Unit III: Genetic Algorithms: Introduction, Procedures of GAs: Genetic representations, Selection, operators, Mutation, Natural inheritance operators. Working of GAs: Binary or Discrete, Real or Continuous, Genetic algorithms applications: TSP, EPDP, Optimization of weights in ANNs, Applicability of Genetic algorithms: Parallel GA, Convergence proof of GA, evolutionary programming, Working of evolutionary programming. Unit IV : Fuzzy Logic : Introduction to fuzzy logic, Human learning ability, imprecision and uncertainty, Undesirability, Probability theory Vs Possibility Theory, Classical sets and Fuzzy Sets , Fuzzy set Operations, Fuzzy Relations – Fuzzy composition, Structure of Fuzzy inference systems : Fuzzification, Fuzzy propositions, Connectives, Implication relations, Inference procedures and algorithms, De-fuzzification, Assessment of De-fuzzification methods, Fuzzy Controllers: Antecedent/consequent variables, IF/THEN rules and inference, Fuzzy decision making, Unit V : Neuro-Fuzzy Modeling: Adaptive Neuro-Fuzzy Inference Systems – Coactive Neuro-Fuzzy Modeling – Classification and Regression Trees – Data Clustering Algorithms – Rule base Structure Identification –Neuro-Fuzzy Control.(Text 2) Text Books: 1. N.P. Padhy, S.P.Simon, Soft Computing,OXFORD University press. 2. S.N.Sivanandam,Introduction to Genetic Algorithms,S.N.Deepa, Wiley, 2007. Reference Books: 1. Mitchell Melanie,An Introduction to Genetic Algorithm, Prentice Hall, 1998. 2. James A. Freeman and David M. Skapura,Neural Networks Algorithms, Applications, and Programming Techniques, Pearson Edition, 2003. 3. S. N. Sivanandam, S. Sumathi and S. N. Deepa, Introduction to Fuzzy Logic using MATLAB,Springer, 2007. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - IISem L T / P / D C 3 0 3 (A58042) INTERNET OF THINGS (ELECTIVE V) Course Objectives: To understand the basics of Internet of Things To get an idea of some of the application areas where Internet of Things can be applied To understand the middleware for Internet of Things To understand the concepts of Web of Things To understand the concepts of Cloud of Things with emphasis on Mobile cloud computing Course Outcomes: Identify and design the new models for market strategic interaction Design business intelligence and information security for WoB Analyze various protocols for IoT Design a middleware for IoT Analyze and design different models for network dynamics Unit I : Introduction to Internet of Things (IoT) - Definition and characteristics of IoT, Physical Design of IoT, Logical Design of IoT, IoT Enabling Technologies, IoT Levels and Deployment Templates. Unit II : Domain Specific IoTs Introduction, Home Automation, cities, Environment, Energy, Retail, Logistics, Agriculture, Industry, Health and Lifestyle. IoT and M2M Introduction to M2M, Difference between IoT and M2M, SDN and NFV to IoT. Basics of IoT System Management with NETCOZF, YANG NETCONF, YANG, SNMP NETOPEER Unit III : Developing Internet of Things: IoT Platform Design Methodology, Introduction, IoT Design Methodology, Case Study on the IoT System for Whether Monitoring, Motivation for using Python. Unit IV : IoT Systems –Logical Design using Python, Introduction, Installing Python, Python Data Types and Data Structures, Control Flow and Functions, Modules , Packages, File Handling, Date/Time Operations, Classes, Python packages of Internet of Things,JSON,XML,HTTP,Lib and URL lib, SMTP lib. Unit V : IoT Physical Device and Endpoints, What is an IoT Device, Exemplary Device: Raspberry Pi About Raspberry Board, Linux on RaspberryPi,Raspberry Pi Interfaces, Serial, SPI, I2C. Programming Raspberry Pi with Python, Other IoT Devices. Text Book: ArshdeepBahga and Vijay Madisetti,Internet of Things A Hands -on approach,Universities Press, 2015. Reference Books: 1.HonboZhou,The Internet of Things in the Cloud: A Middleware Perspective, CRC Press, 2012 2. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the Internet of Things, Springer – 2011 3. David Easley and Jon Kleinberg,Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010 4. Olivier Hersent, Omar Elloumi and David Boswarthick,The Internet of Things: Applications to the Smart Grid and Building Automation, Wiley, 2012 ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - II Sem L T / P / D C 3 0 3 (A58043) NETWORK SECURITY AND PRIVACY (ELECTIVE V) Course Objectives: Network security basics, security architecture, and security models. Network security planning, risk management and policy Choose the most adequate security countermeasures to satisfy specific security requirement in RFIDs and sensor networks Identify the most common threats against privacy. Course Outcomes: Upon Completion of the course, the students should be able to, Apply the basic security algorithms required by any computing system. Predict the vulnerabilities across any computing system. Security solution for any computing system Unit I: Fundamentals and Mathematics Of Cryptography Overview - Classical Crypto Systems – Substitution Ciphers –Transposition Ciphers- Stream and Block Ciphers – Introduction to Number Theory – Congruences – Chinese Remainder theorem – Modular Arithmetic-Modular Exponentiation – Fermats and Eulers Theorem - Finite Fields – GF(2n) Fields. Unit II: Encryption Techniques Symmetric Encryption Techniques – DES – AES- Public-Key Cryptography and RSA – Key Management - Diffie-Hellman Key Exchange – Elliptic Curve Cryptography – Symmetric Key Distribution – Kerberos - X.509 Authentication Service - differential cryptanalysis - linear cryptanalysis - side channel attack - lattice reduction attack - Merkle-Hellman knapsack attack - Hellman's time-memory tradeoff (TMTO) attack Unit III : Hash Functions And Signatures Message Authentication and Hash Functions – Description of MD Hash Family – Secure Hash Algorithms – SHA 512 - Digital Signatures and Authentication Protocols – Digital Signature Standard – Process, Services, Attacks on Digital Signature- Digital Signature Schemes. Unit IV: Security Practices Vulnerability Analysis - Flaw Hypothesis Methodology, NRL taxonomy and Aslam’s model - Auditing - Anatomy of an Auditing System - Design of Auditing Systems - Posteriori Design - Auditing mechanisms - Risk Analysis and Management - Disaster Recovery Planning/Incident Response Planning - Intrusion Detection System Unit V :Secure Development Secure Coding - OWASP/SANS Top Vulnerabilities - Buffer Overflows - Incomplete mediation - XSS - Anti Cross Site Scripting Libraries - Canonical Data Format - Command Injection - Redirection - Inference – Application Controls - Secure Software Development Life Cycle - Testing, Maintenance and Operation - Evaluation of Security Systems Text Books: 1. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson Education, Fourth Edition, 2006. 2. OWASP top ten security vulnerabilities: http://xml.coverpages.org/OWASP-TopTen.pdf Reference Books: 1. Mark Stamp, “Information Security: Principles and Practice”, Wiley Inter Science, 2011. 2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Fourth Edition, Pearson Education, 2007. ANURAG GROUP OF INSTITUTIONS (AUTONOMOUS) IV Year B.Tech. CSE - II Sem L T / P / D C 3 0 3 (A58044) MACHINE LEARNING (ELECTIVE V) Course Objectives: To understand the concepts of machine learning To understand supervised and unsupervised learning and their applications To understand the theoretical and practical aspects of probabilistic graphical models To appreciate the concepts and algorithms of reinforcement learning To learn aspects of computational learning theory <<< Course Outcomes: To implement a neural network for an application of your choice using an available tool To implement probabilistic discriminative and generative algorithms for an application of your choice and analyze the results To use a tool to implement typical clustering algorithms for different types of applications To design and implement an HMM for a sequence model type of application To identify applications suitable for different types of machine learning with suitable Justification Unit I : INTRODUCTION:Machine Learning - Machine Learning Foundations –Overview – applications - Types of machine learning - basic concepts in machine learning Examples of Machine Learning -Applications - Linear Models for Regression-Linear Basis Function Models - The Bias-Variance Decomposition - Bayesian Linear Regression - Bayesian Model Comparison Unit II: SUPERVISED LEARNING: Linear Models for Classification, Linear Models for Classification - Discriminant Functions -Probabilistic Generative Models - Probabilistic Discriminative Models - Bayesian Logistic Regression.Decision Trees - Classification Trees- Regression Trees - Pruning. Neural Networks -Feed-forward Network Functions - Error Back propagation,RadialBasis Function Networks. Unit III : UNSUPERVISED LEARNING: Clustering- K-means - EM - Mixtures of Gaussians - The EM Algorithm in General -Model selection for latent variable models - high-dimensional spaces -- The Curse of Dimensionality -Dimensionality Reduction - Factor analysis - Principal Component Analysis - Probabilistic PCA- Independent components analysis Unit IV : PROBABILISTIC GRAPHICAL MODELS : Directed Graphical Models - Bayesian Networks - Exploiting Independence Properties - From Distributions to Graphs -Examples -Markov Random Fields - Inference in Graphical Models - Learning –Naive Bayes classifiers-Markov Models – Hidden Markov Models. Unit V : ADVANCED LEARNING: Sampling – Basic sam)*QSTWX§Ž˛ł´ś¸Őŕ   ) ďáĎĹ´ĹáŭřŎ‡}sgZJ:hŤRřh—Oű5OJQJ\^JhŤRřhc0Ô5CJOJQJaJhÝT‚5CJOJQJaJhu"ýhÝT‚5OJQJhu"ýhÝT‚5CJhu"ýhÝT‚5CJ h,­hÝT‚h,­hÝT‚OJQJ'jhÝT‚hÝT‚5UmHnHsH u hÝT‚5\ jhÝT‚5U\mHnHuh,­hÝT‚5\#hÍ%ehÝT‚5B* CJ\aJph°Ph,­hÝT‚5B*\ph˙h,­hÝT‚5B*CJ \php0 )*QRSUVWXY^}°ą˛´ľśˇ¸Őŕ ÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷ňň÷÷÷÷ę$a$gdÝT‚gdÝT‚$a$gdÝT‚ * 7 8 A B H I Q ěěěěěěěě$$„đ &P#$/„´Ifa$gd—Oű) * 6 8 @ B G I P Q R W X ^ ‡ ˆ Ž Ś § ­ Ć Ç Í ć ç í   < = C _ ` f h q r y š › Ą Ř Ů Ú é ę ý ţ  óăóăóăóăóÜóÜŇóÜŇóÜŇóÜŇóÜŇóÜŇóÜŇóÜŇóČóČóÜŇóÜóşÜŞšhÝT‚5CJOJQJaJhÝT‚hÝT‚5CJOJQJaJhŤRřhBkä5CJOJQJaJhŤRřh—Oű5OJQJ^Jh828OJQJ^Jhż˜OJQJ^J h0]˜h—OűhŤRřh—Oű5OJQJ\^JhŤRřh—OűOJQJ^J1Q R S T U V @----$$„đ &P#$/„´Ifa$gdBkäżkdśr$$If–l4Ö”ÉÖr”˙„‘ű ü$`”`/ ```N` t  6P”đ ”´Ö0öˆ6öÖÖÖ˙˙˙˙˙Ö”´4Ö4Ö laöyt—OűV W X _ ě*ěÂkdČs$$If–l4Ö”Ör”˙„‘ű ü$ D” D/  D` DN D t  6P”đ ”´Ö0öˆ6öÖ˙˙˙˙˙ÖÖÖ”´4Ö4Ö lBÖaöyt—Oű$$„đ &P#$/„´Ifa$gdBkä_  ƒ … ‡ ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkä‡ ˆ  >+$$„đ &P#$/„´Ifa$gdBkäŔkdćt$$If–lÖ”fÖr”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oű   ˘ ¤ Ś ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkäŚ § Ž >+$$„đ &P#$/„´Ifa$gdBkäŔkdču$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—OűŽ Ŕ Â Ä Ć ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkäĆ Ç Î >+$$„đ &P#$/„´Ifa$gdBkäŔkdęv$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—OűÎ ŕ â ä ć ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkäć ç î >+$$„đ &P#$/„´Ifa$gdBkäŔkděw$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oűî ţ   ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkä  >+$$„đ &P#$/„´Ifa$gdBkäŔkdîx$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oű 6 8 : < ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkä< = D >+$$„đ &P#$/„´Ifa$gdBkäŔkdđy$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—OűD Y [ ] _ ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkä_ ` g >+$$„đ &P#$/„´Ifa$gdBkäŔkdňz$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oűg ” – ˜ š ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´Ifgd828š › ˘ >+$$„đ &P#$/„´Ifa$gdBkäŔkdô{$$If–lÖ”Ör”˙„‘ű ü$€D”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oű˘ Ň Ô Ö Ř ďÜÜÜ$$„đ &P#$/„´Ifa$gdBkä$„đ &P#$/„´IfgdBkäŘ Ů Ú ŕ ă >+++$$„đ &P#$/„´Ifa$gdBkäŔkdö|$$If–lÖ”#Ör”˙„‘ű ü$€”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oűă ć é ę  ěě+&gdBkäŔkdř}$$If–lÖ”Ör”˙„‘ű ü$€”€D/ €D`€DN€D t  6P”đ ”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöyt—Oű$$„đ &P#$/„´Ifa$gdBkä  * + 1 A B N O [ ] e g l n u v w } Ÿ   Ś Î Ď Ő ě í ô ő    ] ^ d   – š ş Ŕ ď đ ö ďßĎÂď߲Ľ˛Ľ˛Ľ˛Ľ˛Ľž”Ľž”Ľž”Ľž”Š”}oĽž”Ľž”Ľž”Ľž”hŤRřh—Oű5OJQJ^JhŤRřhż˜OJQJ^Jh—OűOJQJ^Jhż˜OJQJ^J h0]˜h—OűhŤRřh—OűOJQJ^JhŤRřh—Oű5OJQJ\^JhÝT‚5CJOJQJaJhÝT‚hÝT‚5CJOJQJaJhŤRřhBkä5CJOJQJaJhŤRřhÝT‚5CJOJQJaJ+  B O \ ] f g m n v úúĺĺĺĺĺĺĺĺ$$„Ž&`#$/„´Ifa$b$gd—OűgdBkä v w ~ =($$„Ž&`#$/„´Ifa$b$gdBkäÂkdú~$$If–lÖ”gÖr”˙sĺuř ü$D‹D' DbD[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oű~ ™ ›  Ÿ íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäŸ   § =($$„Ž&`#$/„´Ifa$b$gdBkäÂkdů$$If–lÖ”gÖr”˙sĺuř ü$€D‹€D' €Db€D[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oű§ Č Ę Ě Î íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäÎ Ď Ö =($$„Ž&`#$/„´Ifa$b$gdBkäÂkdţ€$$If–lÖ”“Ör”˙sĺuř ü$€D‹€D' €Db€D[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—OűÖ ć č ę ě íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäě í î ő ü =((($$„Ž&`#$/„´Ifa$b$gdBkäÂkd‚$$If–lÖ”Ör”˙sĺuř ü$€D‹€D' €Db€D[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oűü   - @ T V X Y Z [ ] ęŘĹĹĹęęęęęę$„Ž&`#$/„´Ifb$gdBkäm$$„Ž&`#$/„´Ifb$gdBkä$$„Ž&`#$/„´Ifa$b$gdBkä ] ^ e =($$„Ž&`#$/„´Ifa$b$gdBkäÂkdƒ$$If–lÖ”kÖr”˙sĺuř ü$€D‹€D' €Db€D[ t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oűe ‰ ‹   íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkä  — =($$„Ž&`#$/„´Ifa$b$gdBkäÂkd „$$If–lÖ”gÖr”˙sĺuř ü$€D‹D' DbD[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oű— ł ľ ˇ š íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäš ş Á =($$„Ž&`#$/„´Ifa$b$gdBkäÂkd…$$If–lÖ”gÖr”˙sĺuř ü$€D‹D' DbD[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—OűÁ é ë í ď íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäď đ ÷ =($$„Ž&`#$/„´Ifa$b$gdBkäÂkd†$$If–lÖ”;Ör”˙sĺuř ü$€D‹€D' €Db€D[D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oű÷   " íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäö " # ) a b c r s † Œ   Ą ­ Ž ş ź Ä Ć Ë Í Ô Ő Ö Ű Ü Ţ ß â ü ý ˙  "#&679:=nóěâóěóÔěķīěó›ó›ó›ó›óěˆě~t~óě~t~óě~t~óě~t~óh˜ ÁOJQJ^Jh:kOJQJ^J%hŤRřh—OűB*CJOJQJaJphhŤRřh—Oű5OJQJ\^JhŤRřhÝT‚5OJQJhÝT‚5OJQJ\^JhŤRřhş#Ě5OJQJ\^JhŤRřh—Oű5OJQJ^Jhż˜OJQJ^J h0]˜h—OűhŤRřh—OűOJQJ^J-" # * =($$„Ž&`#$/„´Ifa$b$gdBkäÂkd‡$$If–lÖ”aÖr”˙sĺuř ü$€D‹D' €Db€D[€D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oű* [ ] _ a íŘŘŘ$$„Ž&`#$/„´Ifa$b$gdBkä$„Ž&`#$/„´Ifb$gdBkäa b c i l =((($$„Ž&`#$/„´Ifa$b$gdBkäÂkd'ˆ$$If–lÖ”wÖr”˙sĺuř ü$€‹€D' €Db€D[€D t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖaöe4yt—Oűl o r s ęę%Ĺkd,‰$$If–lÖ”MÖr”˙sĺuř ü$€‹€D' €b€D[€ t  6`”Ž”´Ö0öˆ6öÖÖÖÖ”´4Ö4Ö lBÖBÖaöe4yt—Oű$$„Ž&`#$/„´Ifa$b$gdBkäs t ž Ą Ž ť ź Ĺ Ć Ě Í Ő úúúîîîîîîîî $$Ifa$gd—Oűgdş#Ě Ő Ö × Ř Ů Ú Ű D66666dđ¤$IfgdZ ‘şkd7Š$$If–l4Ö”Ör”˙îC,!ü$`U`v `Ě`R`D• t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—OűŰ Ü ă ö D5) d$IfgdZ ‘$d$Ifa$gd˜ Áşkd@‹$$If–l4Ö”Ör”˙îC,!ü$ DU Dv  DĚ DR D• t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oűö ř ú ü ý đđđ9đśkdOŒ$$If–lÖ”<Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘ óäää-śkdG$$If–lÖ”Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘ d$IfgdZ ‘ '0246đäđđđ d$IfgdZ ‘$d$Ifa$gdZ ‘67>hjlH9-99 d$IfgdZ ‘$d$Ifa$gdZ ‘śkd?Ž$$If–lÖ”÷Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oűlnopw~…đ9đđđđśkd7$$If–lÖ”fÖr”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘norsvwyz€„…‘–—Ö×ÚŰŢßáâčéěíúRSUVYyz|}€“Ś§¨ˇ¸šĚÍůďĺďŰďĺďĺďÎŔłŠłůďĺďŰďĺďĺďÎŔłůďĺďłůďĺďłĺłůłŔů™‰yhÝT‚hÝT‚5CJOJQJaJhŤRřhş#Ě5CJOJQJaJh$PhBkä5CJOJQJaJhŤRřOJQJ^JhŤRřh—OűOJQJ^JhŤRřh—Oű5OJQJ^JhŤRřh:kOJQJ^Jh—OűOJQJ^Jh˜ ÁOJQJ^Jh:kOJQJ^J h0]˜h—Oű/…‘˘ŔĐŇÔÖóâââÓÓÓ$d$Ifa$gdZ ‘ & Fd$IfgdZ ‘m$ d$IfgdZ ‘Ö×ŘßćíH9999$d$Ifa$gdZ ‘śkd/$$If–lÖ”[Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oűíú"LNPRóăăăÔÔÔ$d$Ifa$gdZ ‘ & Fd$IfgdZ ‘ d$IfgdZ ‘RSZsuwH9-99 d$IfgdZ ‘$d$Ifa$gdZ ‘śkd'‘$$If–lÖ”‘Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oűwyz ˘đ9đ-đ d$Ifgd˜ Áśkd’$$If–lÖ”÷Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘˘¤Ś§¨Žąđđ9đđđśkd“$$If–lÖ”‚Ör”˙îC,!ü$€DU€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöytŤRř$d$Ifa$gdZ ‘ą´ˇ¸šäđđ944gdBkäśkd”$$If–lÖ”Ör”˙îC,!ü$€U€Dv €DĚ€DK€Dœ t Ö0öˆ6ÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘ÍÓăäđńý˙ %ABIJWXdŽŻśˇžżĚÍŘ !'67=PňâŇ¾¾¾¾¾Ž›Ž‘ľŽ‘‡‘zlľlľŽ‘‡‘zlľlľŽ‘ľŽ‘ľhŤRřh—Oű5OJQJ^JhŤRřh˜ ÁOJQJ^Jh—OűOJQJ^Jh˜ ÁOJQJ^J%hŤRřh—OűB*CJOJQJaJph h0]˜h—OűhŤRřh—OűOJQJ^JhŤRřh—Oű5OJQJ\^JhŤRřhş#Ě5CJOJQJaJhŤRřhÝT‚5CJOJQJaJhÝT‚5CJOJQJaJ*äńţ˙ óóóóóóóó $$Ifa$gd—OűD66666dđ¤$IfgdZ ‘şkd•$$If–l4Ö”vÖr”˙ę?,!ü$`˛`. `Ľ`_`D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű&;=D5)5 d$IfgdZ ‘$d$Ifa$gdZ ‘şkd–$$If–l4Ö”Ör”˙ę?,!ü$ D˛ D.  DĽ D_ D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű=?ABCJQđđ7đđđškd—$$If–lÖ”SÖr”˙ę?,!ü$€D˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘QXduŸŻął´śđäÔĂÔđđđđ & Fd$IfgdZ ‘m$ & Fd$IfgdZ ‘ d$IfgdZ ‘$d$Ifa$gdZ ‘ śˇ¸żĆÍF7777$d$Ifa$gdZ ‘škd˜$$If–lÖ”ĺÖr”˙ę?,!ü$€D˛€D. €DĽ€D_€¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—OűÍŘě  óăăăÔÔÔ$d$Ifa$gdZ ‘ & Fd$IfgdZ ‘ d$IfgdZ ‘ !(02F::+$d$Ifa$gdZ ‘ d$IfgdZ ‘škd™$$If–lÖ”˜Ör”˙ę?,!ü$€D˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű2467>đđ7đškdř™$$If–lÖ”ťÖr”˙ę?,!ü$€D˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘PU\]clpyz{Š‹›œžČÉćçôőööéâŘéöéâéĘ❯ťŸrcRBha-śhě*,5CJOJQJaJ ha-śhě*,0JCJOJQJaJhAMčhě*,CJOJQJaJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJhŤRřhBkä5CJOJQJaJhŤRřh—Oű5CJOJQJaJh$PCJOJQJaJhŤRřh—OűCJOJQJaJhŤRřh—Oű5OJQJ^Jh˜ ÁOJQJ^J h0]˜h—OűhŤRřh—OűOJQJ^JhŠXOJQJ^J>VXZ\óäää$d$Ifa$gdZ ‘ d$IfgdZ ‘\]dqsF7+7 d$IfgdZ ‘$d$Ifa$gdZ ‘škdëš$$If–lÖ”SÖr”˙ę?,!ü$€D˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oűsvyz{„đđ7đđđškdޛ$$If–lÖ” Ör”˙ę?,!ü$€D˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘„‡Š‹œđđ72gdBkäškdќ$$If–lÖ”:Ör”˙ę?,!ü$€˛€D. €DĽ€D_€D¤ t Ö0öˆ6öÖÖÖÖ4Ö4Ö lBÖaöyt—Oű$d$Ifa$gdZ ‘œÉçôőö7ce‘’“öááĐťŽœœŽŽyĐ$„Đdđ¤7$8$H$^„Đa$gdě*,$¤7$8$H$a$gdě*,„Đdđ¤7$8$H$^„Đgdě*, $dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdě*,$dđ¤7$8$H$a$gdě*,$ Ć÷˙J dđ¤a$gdě*,„Đ`„Đgd$P ö7bcen‘’“Ś×ńĺńĐťŞœ‹}lZI9*hz4ęhě*,CJOJQJaJha-śhě*,5CJOJQJaJ ha-śhě*,0JCJOJQJaJ"ha-śhě*,5CJOJQJ\aJ ha-śh7BO0JCJOJQJaJhě*,0JCJOJQJaJ ha-śhě*,0JCJOJQJaJh$P0JCJOJQJaJ hZ ‘hě*,B*OJQJ\ph(hyřhyřB*CJOJQJ\aJph(hyřhě*,B*CJOJQJ\aJphhyřCJOJQJaJhyřhě*,CJOJQJaJ“ŚŘUžóôôMĽ žČÔߡÁÝńÚÚÚÚÓÓÉÉÉÉÉğğźźÄ° $„g˙]„g˙a$gdě*,$a$gdě*,gdě*, & F¤gdě*,¤gdě*, & F"„ě„Šýdđ¤<*$^„ě`„Šýgdě*, „Zdđ¤<^„Zgdě*,×Řňóô "DEXžĎ01?ÔÝŢßóˇŔÁÎ8IÝäĺć-ťÇ­ďŕďÎź­¤ž”¤‰¤¤‰¤|¤¤¤¤¤ž¤j­"ha-śhě*,5CJOJQJ\aJ hě*,5ha-śhě*,5hě*, ha-śhě*,ha-śhě*,5\ hě*,0Jha-śhě*,0Jha-śhě*,CJOJQJaJ"ha-śhě*,5CJOJQJ]aJ"hz4ęhě*,5CJOJQJ]aJhz4ęhě*,CJOJQJaJhz4ęhě*,5CJOJQJaJ%ÝćťÇP­žCžŸ Ą˘Ł¤ĽŚúňĺÔÂłĄŠŠŠŠŠŠŠŠgdě*, & Fdđ¤d¤d[$\$gdě*, & Fdđ¤d¤d[$\$gdě*,dđ¤d¤d[$\$gdě*, & Fdđ¤d¤d[$\$gdě*, & Fdđ¤d¤[$gdě*, dđ¤d¤[$gdě*,$a$gdě*,gdě*,­žCžŁĽŚĂÄŃŇÓő9MNTchkt„…ďäŐÍĹÍľ¨™ŠyncncnĹncnUHŐhě*,5CJOJQJaJh$P0JCJOJQJaJhGEhZ ‘OJQJhGEhě*,OJQJ ha-śhAMč0JCJOJQJaJhAMčhAMčCJOJQJaJhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhGEOJQJhě*,OJQJha-śhě*,CJOJQJaJha-śhě*,OJQJha-śhě*,5CJOJQJaJŚÄŃŇÓ"k…‘¤Ô÷GaęęŐġ­ ­€€€€€ & Fdđ¤*$gdě*,$dđ¤7$8$H$a$gdě*, $dđ¤a$gdě*, dđ¤gdě*, $dđ¤a$gdZ ‘$dđ¤7$8$H$a$gdAMč$ Ć÷˙J dđ¤a$gdAMč$ Ć÷˙J dđ¤a$gd(Š…‹Œ‘¤Ą7 { Î ě š!É!="H"Ź"ľ"’#˘#Ń$Ň$â$]%g%L&[&' 'Ÿ'­'ů' (•)Ť)Č)É)Ö)éÔÂÔ˛Ł˛Ł˜Ł˛Ł˛Ł˛Ł˛Ł˛Ł‹˛Ł˛Ł˛Ł˛Ł˛Ł˛Ł‹{n_hAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhě*,5CJOJQJaJha-śhě*,OJQJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ"hě*,B*CJOJQJ\aJph(ha-śhě*,B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJph%˘â 7 { Î Ď Ř š!ş!Ĺ!="Ź"’#“#ž#ŕ#Ń$Ň$Ý$đć×××Ĺ׸¸¸¸¸¸¸¸¸¸¸¸¸¸ $dđ¤a$gdě*,$ & Fdđ¤a$gdě*,m$ & Fdđ¤*$gdě*, dđ¤gdě*,„hdđ¤*$^„hgdě*,Ý$]%L&M&W&'Ÿ' 'Ź'­'ř'ů' (K(­()”)•)ňňňňňňňňňÚÉňąąąąŹgdě*,$ & F „ě„äýdđ¤^„ě`„äýa$gdě*,$„Đdđ¤^„Đa$gdě*,$ & F „ě„äýdđ¤^„ě`„äýa$gdě*, $dđ¤a$gdě*,•)–)—)˜)™)š)›)œ))ž)Ÿ) )Ą)˘)Ł)¤)Ľ)Ś)§)¨)Š)Ş)Ť)É)Ö)ęęęęęęęęęęęęęęęęęęęęęęŐŐ$ Ć÷˙J dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gdě*,Ö)×)*G*Q*l*m**Ą*é*+F+u+‡+ž+,0,o,•,–,—,îäÖäČÖž°°°°°ž°°°°°ää $„Ф^„Đa$gdě*, $¤a$gdě*, $ Ć ¤a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$dđ¤7$8$H$a$gdAMčÖ)×)ú)*G*O*Q*Z*l*m*€** *Ą*Â*Ă*É*č*é*ďâ×Ć¸ŞœŠycTATA1A1Thě*,B*CJOJQJaJph%ha-śhě*,B*CJOJQJaJphha-śhě*,CJOJQJaJ+ha-śhě*,5B*CJOJQJ\aJph ha-śhě*,B*OJQJ\ph"ha-śhě*,5CJOJQJ]aJh$P0JCJOJQJaJhě*,B*OJQJ\phha-śhě*,5OJQJaJ hyřhě*,B*OJQJ\phhyřhě*,OJQJhyřhě*,OJQJaJ ha-śhAMč0JCJOJQJaJé*++E+F+U+t+u+†+‡+ž+˝+ž+ă+,,,/,0,n,o,u,”,•,—, ,Ą,Ż,-- ----&-?-u-†-Ţ-ß-č-ë-ě-.....ěÝěÝěÍݡÝěÍÝěÍÝěÍÝěÝěÍÝĄˇŽˇěݡě͡ěˇěˇěݡě͡ŽxÍě+h~qXhě*,5B*CJOJQJ\aJph%hě*,5B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJphhě*,B*CJOJQJaJphha-śhě*,CJOJQJaJ%ha-śhě*,B*CJOJQJaJph/—,Ą,---ß-ŕ-ě-Ź.­.ˇ.!/"/+/˝/ž/ż/Ŕ/Ě/#0%070ňňňččňňňňňňňňňňňňň×Éč ĆĹ dđ¤gdě*,$„Đdđ¤^„Đa$gdě*, dđ¤gdě*, $dđ¤a$gdě*,..#.$.../.6.7.G.Q.b.c.k.l.u.v.Š.‹...™.š.Ť.Ź.ś.ˇ.Ç.Č.ę.ë.ě.ö.÷.˙.// /// /!/(/)/+/2/3/9/:/L/M/O/^/_/n/o/€//‚/ƒ/“/”/™/š/Ÿ/ /ďÜďÜďÜďÜĆÜďÜďÜďÜďÜďÜďܡƤƤĆÜďÜďÜďÜďÜďܡĆÜďƤƤƤďÜďÜďƤÜďÜďÜďÜď%hě*,5B*CJOJQJ\aJphha-śhě*,CJOJQJaJ+ha-śhě*,5B*CJOJQJ\aJph%ha-śhě*,B*CJOJQJaJphhě*,B*CJOJQJaJph@ /ź/˝/ž/Ŕ/É/ 0 0#040Ŕ0ß0ŕ0á0â0˙01 111ěÝÇ´ÇěŸěÇ쒅x’hxYJ9 ha-śhAMč0JCJOJQJaJhAMčhAMčCJOJQJaJhAMčh(ŠCJOJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJhAMč5CJOJQJaJhě*,5CJOJQJaJ(ha-śhě*,B*CJH*OJQJaJph%hě*,5B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJphha-śhě*,CJOJQJaJ%ha-śhě*,B*CJOJQJaJph70q0Ŕ0Á0Â0Ă0Ä0Ĺ0Ć0Ç0Č0É0Ę0Ë0Ě0Í0Î0Ď0Đ0Ń0Ň0Ó0Ô0Ő0Ö0×0ńńÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ$ Ć÷˙J dđ¤a$gdě*, „Đdđ¤^„Đgdě*,×0Ř0Ů0Ú0Ű0Ü0Ý0Ţ0ß0ŕ0á0â01 111P1~1ęęęęęęęęęęęŐŐŔŻĽ—dđ¤7$8$H$gdě*, dđ¤gdě*,$dđ¤7$8$H$a$gdAMč$ Ć÷˙J dđ¤a$gdAMč$ Ć÷˙J dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gdě*,121P1z1}1~11ˆ1˜1™1š11Ą1˘1Ł1¤1ś1ˆ2™2Á3óč×ɸ¨š†u†g\ɸ†J:J:ha-śhě*,CJOJQJ]aJ"ha-śhě*,5CJOJQJ]aJhě*,5OJQJaJha-śhě*,5OJQJaJ!hě*,5B*CJOJQJ\ph'ha-śhě*,5B*CJOJQJ\phh$P0JCJOJQJaJha-śhě*,5CJOJQJaJ ha-śhě*,B*OJQJ\phhě*,B*OJQJ\ph hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJ~11š1Ł1¤1ś1ˇ1Ü1222[2‡2ˆ2™2š2Ő23ęÜŇÁłł     łłł$ & F+dđ¤*$7$a$gdě*,$ & F*dđ¤*$7$a$gdě*,$dđ¤7$a$gdě*,$dđ¤7$8$H$a$gdě*, dđ¤gdě*,$¤7$8$H$a$gdě*,$ Ć÷˙J dđ¤a$gdě*,3]3Œ3Á3Â3Ë3˙3á4R5^5†5Â5&6ä6đ6ú6‰7”7§7=8G8s8Ú8A9ěěěŕŕŕŕŕŕŕŕŕŕŐŐŐŕŕŕÇÇÇÇ$dđ¤7$a$gdě*, $dđa$gdě*, $dđ7$a$gdě*,$ & F+dđ¤*$7$a$gdě*,Á3Ę3Ë3˙3R5]5^5†5ä6ď6đ6ú6‰7“7”7§7=8F8G8s8“9ž9ě9î9 ::˘:¤:;;;;;<;I;J;m;ďâďÓďâďÓďâďÓďâďÓďâďÓďÓĂÓďÓĂÓ´§—Š{k^hGEhě*,OJQJaJha-śhě*,5CJOJQJaJhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhě*,5CJOJQJaJha-śhě*,CJOJQJaJha-śhě*,CJH*OJQJaJha-śhě*,CJOJQJaJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJ#A9’9“9ž9 ::s:š:;;;;;;;;;ńńĺČĺ°°°§§’’’’’’$ Ć÷˙J dđ¤a$gdě*, $7$a$gdě*,$ & F„ě„äýdđ7$^„ě`„äýa$gdě*,$ & F Ćúě„ „0ýdđ7$^„ `„0ýa$gdě*, $dđ7$a$gdě*,$dđ¤7$a$gdě*,;;<;I;J;‹;ş;ť;Ô;Ő;é;<<<Ń<ęŐŐę˽˯˧rr$ & F „ě„äýdđ¤7$8$H$^„ě`„äýa$gdě*,$ & F „ě„äýdđ¤^„ě`„äýa$gdě*,$a$gdě*,$¤7$8$H$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gdě*, m;‹;ş;ť;Ä;Ô;Ő;č;é;<;<5=6=H=+>őäŐÇ´˘€qaN|>š>ş>Ä>[?\?@+@ââŇŇżżż¨¨•‹‹‹ƒ‹$a$gdě*, $¤a$gdě*,$ ĆŹ&„Đd^„Đa$gdě*,$ & F; Ćěd*$8$H$a$gdě*,$ & F;d*$8$H$a$gdě*,$ Ćh7$8$H$a$gdě*,$ & F „ě„äýdđ¤7$8$H$^„ě`„äýa$gdě*,+>,>|>¸>š>ş>Â>Ă>Ţ>\?n?@)@*@D@Z@[@Č@á@DAFAGAHAMANARASAwA6B7B|B‡BˆBĽBC,CŠCCC‘C’CŚC+D:DĎDŘDŰDÝDEńäńäÝÍŔ͹͹ÍŔÍąĽąÍąĽ™ąÍŔÍŔÍąĽąÍŔ͹͹ÍŔÍŔ͹͹͹‹z hR~hě*,CJOJPJQJaJhě*,CJOJPJQJaJh(ŠCJOJQJaJhě*,CJOJQJaJha-śhě*,CJOJQJaJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJ ha-śhě*,h÷ßhě*,OJQJ^Jh÷ßhě*,OJPJQJ^J0+@Č@É@EAFAGAHATA|B}B‰BCC‰CŠC“C+DĎDŰDEE-EzEőőőőőőőőőíőőőőőââÚĎÚÚĂ „*dđ^„*gdě*, dđ¤*$gdě*,dđgdě*, $dđa$gdě*,$a$gdě*, $¤a$gdě*,EE-E/EzE€EÍEÚEĺEçEęEěE F FFFFWFpF§FôäÖĹôśŞś›ô›‹~ocoVK: hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJh(ŠCJOJQJaJhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śhě*,CJOJQJaJh$PCJOJQJaJh`CBhě*,CJOJQJaJ h`CBhě*,CJOJPJQJaJhě*,CJOJPJQJaJh`CBhě*,5CJOJQJaJhě*,CJOJQJaJzEŃEĺEćEçEčEéEęEëEěE FFFpF§FŰFäFóóëćŢŢŢŢŢÉÉÉżąžą$„Đdđ¤x¤x`„Đa$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gd(Š$a$gdě*,gdě*,dđgdě*, „Âdđ^„Âgdě*,§F¨FąFŰFăFäFőF>G@G:KJK2M=M–MŠM.N/NGNśNˇNĹNOO9OJOŠOšOČOŘO:P;PNPÔPäPqQrQQSBS˘SŁSńăŃźŚ–‡w‡–‡–‡Ńf‡Ńf‡Ńf‡fŃfŃf‡f‡–‡Ńf‡–‡–‡– hZ5hě*,CJOJPJQJaJhZ5hě*,CJH*OJQJaJhZ5hě*,CJOJQJaJhZ5hě*,5CJOJQJaJ+hZ5hě*,5B*CJOJQJ\aJph(hZ5hě*,5B*CJOJQJaJph#hZ5hě*,5CJOJPJQJaJh$P0JCJOJQJaJhZ5hě*,0JCJOJQJ(äFőFfH.IvIJJAJTJ‡JŁJşJK9K:KJKĂKĎL2M@M–M/NˇNëëëëŮŮŮŮŮŮŮŮŮëëëëëëëĹĹ$ & F2dh¤x¤xa$gdě*,m$$ & F7dh¤x¤xa$gdě*,$„Đdh¤x¤x^„Đa$gdě*,m$ˇN9OŠO;PÔPrQsQÁQĂQlRSSŁS˝SÖSôSThTpTëëëŮëÉÉąąąąąąąąą$„hdđ¤x¤x^„ha$gdě*,m$$„h„˜ţdđ¤x¤x^„h`„˜ţa$gdě*,m$$dđ¤x¤xa$gdě*,m$$ & F2dh¤x¤xa$gdě*,$ & F2dh¤x¤xa$gdě*,m$ŁSpTŞTtU˘UBVFVźYúYZZl^n^q^Ž^^œ^^Ŕ^Ţ^__ńáńáńŃńĹńáńŸ¨›Œ|odSDhGEhě*,CJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJha-śhě*,5CJOJQJaJhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhZ ‘5CJOJQJaJhě*,CJOJQJaJhZ5hě*,CJH*OJQJaJhZ5hě*,5CJOJQJaJhZ5hě*,CJOJQJaJpTŞTtU¨UřU^VđV@WĚW2XvX XÎXôXY:Y\YüYţYZZçççŐŐŐŐŐŐĂĂĂĂĂĂĂąççç$ & F6dđ¤x¤xa$gdě*,$ & F3dđ¤x¤xa$gdě*,$ & F5dđ¤x¤xa$gdě*,$„h„˜ţdđ¤x¤x^„h`„˜ţa$gdě*,m$ZtZÎZm[ł[\_\ť\ú\C]Ż]^l^m^n^o^p^q^^đđđđđđđđđđđÝÍ͸¸¸Ł$ Ć÷˙J dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gdě*,$dđ¤x¤xa$gdě*,m$ & F4 ĆÂdđ¤x¤xgdě*, & F4dđ¤x¤xgdě*,^œ^^Ţ^__-_._A_q_”_ĺ_`@`A`ęŐ˽ճĄšŠŠŠŠŠ „Ф^„Đgdě*, & F-„8¤*$^„8gdě*,¤gdě*, Ć÷˙J dđ¤gdě*, $¤a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gd(Š__._A_A`R`]afaŘaâa bb_bibČbÓbíb÷b—cĄc”ddßdęd#e-eleuełežeőeffŠfĘgÓgűgüghh'hňâŇĂŇĂł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤ł¤—‡zkhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhě*,6CJOJQJaJhŇthě*,CJOJQJaJhŇthě*,5CJOJQJaJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJ(A`R`’`ź`a]afašaČaŘaâa bb_bibvbÉbÓbíb÷b—cĄc”dřččččÜŃŃŃÉÉÉÉÉÉ˝ÉÉÉÉÉÉ $„Đ^„Đa$gdě*,$a$gdě*, $dđa$gdě*, $ Ćea$gdě*, & F.„8¤*$^„8gdě*,¤gdě*,”ddßdęd#e-elevełežeőeffŠfĘgÓgűgügh'h(h÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷ęŮÄÄŻ$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gd(Š$„8dh¤^„8a$gdě*, $dh¤a$gdě*,$a$gdě*,'h(hKhih—h˜hĄhĚhÍhÔhçhóijcnfnnnonn€nŽnďâ×ơŠ™‰x™i™i\™iF3F%hě*,5B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJphhě*,5CJOJQJaJha-śhě*,CJOJQJaJ ha-śhě*,0JCJOJQJaJha-śhě*,5CJOJQJaJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJhGEhě*,CJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJha-śhě*,5CJOJQJaJ(hih—h˜hĚhÍhÔhçh%iSi•iĚióij\jjőçŇČҡŻœœœœœŻ‰‰ & F„ě„äýdđ^„ě`„äýgdě*, & F„ě„äýdđ^„ě`„äýgdě*,dđgdě*,$dđ¤7$8$H$a$gdě*, $¤a$gdě*,$ Ć÷˙J dđ¤a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,j­jčjkkœkÉkŞl˜mÍmncndnenfnnnonƒnŽn˝něěěçŮŮŮŮŮŮŮĚĚĚĚ´´Ś „ dđ¤^„ gdě*, „Đdđ¤^„Đgdě*, dđ¤gdě*, $dđ¤a$gdě*,$ & Fdha$gdě*,gdě*, & F„ě„äýdđ^„ě`„äýgdě*,˝nînoWoXojokoŁoĹoýo1p=pIp™pšpÖp×pńńńăăăńńńńŮŮž°š° & F$„8dđ¤*$1$9D^„8gdě*, „hdđ¤^„hgdě*, & F# ĆĐ8„8dđ¤*$1$9D^„8gdě*, dđ¤gdě*, „Đdđ¤^„Đgdě*, „ dđ¤^„ gdě*,ŽnXoko=pIp™pšpÖp×púpűpqq~qqžq¤qĽqŚq§qŠqĆqÇqÔqŐqřqrěÖěÖěÇěÇěÇěÇěÇěÇˇŞŞ€qfYNhGEhě*,OJQJhGEhě*,OJQJaJhě*,5OJQJaJhAMčh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhZ ‘5CJOJQJaJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJha-śhě*,CJOJQJaJ+ha-śhě*,5B*CJOJQJ\aJph%ha-śhě*,B*CJOJQJaJph×púpűpqqZq[q~qqžq qéŰĹŰŻœ†Űp^ Ć÷˙J dđ¤gdě*, & F)„8dđ¤*$1$9D^„8gdě*, & F(„8dđ¤*$1$9D^„8gdě*,„8dđ¤*$1$9D^„8gdě*, & F'„8dđ¤*$1$9D^„8gdě*, & F&„8dđ¤*$1$9D^„8gdě*, „hdđ¤^„hgdě*, & F%„8dđ¤*$1$9D^„8gdě*,  qĄq˘qŁq¤qĽqŚq§q¨qŠqÇqÔqŐqrDrEr~rrííííĺĺĺĺĺĐĐĆƸŻ§˘gdě*,$a$gdě*, Ćegdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gd(Š$a$gdě*, Ć÷˙J dđ¤gdě*,rDrErNr}rrr‘r’rşrťrČrďâÔÄâžxZ4x4Kh0]˜hě*,0J'B*CJOJQJaJeh@fHphqĘ ˙˙˙˙rĘ˙@:h0]˜hě*,0J&OJQJeh@fHqĘ ˙˙˙˙rĘ˙@Kh0]˜hě*,0JB*CJOJQJaJeh@fHphqĘ ˙˙˙˙rĘ˙@KhXzhě*,0JB*CJOJQJaJeh@fHphqĘ ˙ńńńrĘ˙@hZ5hě*,5CJOJQJaJh$P0JCJOJQJaJhě*,5CJOJQJaJ hGEhě*,B*OJQJ\ph ČrÉrŃrŇrÔrŐrÚrŰrărärćrçrňrórűrür sssžs sŠsutŮȢȢȢȢȢȢȢȄuj[K<hZ5hě*,CJOJQJaJh`CBhě*,5CJOJQJaJhXzhě*,CJOJQJaJhXzhě*,OJQJh|d˘hě*,CJOJQJaJ:h|d˘hě*,0J&OJQJeh@fHqĘ ˙ńńńrĘ˙@Kh|d˘hě*,0JB*CJOJQJaJeh@fHphqĘ ˙ńńńrĘ˙@ h|d˘hě*,0JCJOJQJaJKh|d˘hě*,0J'B*CJOJQJaJeh@fHphqĘ ˙ńńńrĘ˙@rs sŠsôsztƒtĺtdunu&v0vŞvłv=wIwywŸwĆwăwđwňçßßßßßßßßßßßßßÔÔÔżż$ Ć÷˙J dđ¤a$gdZ ‘  & F0dđgdě*,dđgdě*, $ & F1a$gdě*, $ & F1¤a$gdě*,utvtzt‚tƒtdumunu&v0vŞvłv=wIwywžwŸwĆwăwđwńwx3x`xixƒxôĺŘČĺŘČĺČĺČĺČĺšôšŠšŠ}raSA"ha-śhě*,5CJOJQJ]aJh$P0JCJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJha-śhě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJhĐ whě*,CJOJQJaJh`CBhě*,5CJOJQJaJhě*,5CJOJQJaJhZ5hě*,CJOJQJaJhě*,CJOJQJaJđwńw3x`x„x…x†x™xËxôxyLykyly}yľyęŕŇÄಧ˜˜˜˜˜§§†$„Đdđ¤^„Đa$gdě*,m$„Đdđ¤^„Đgdě*,m$ dđ¤gdě*,m$ Ć÷˙J dđ¤gdě*, $ Ć ¤a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,ƒx„x…x†x˜x™xĘxËxóxôxyyKyLykyly|y}y´yľyŕyáy,z-z‹zŒzĆzÇzČzĎzÓzîâŇź­š­š­š­š­š­ź­š­š­š­š­š­‹ub%h`CBhě*,B*CJOJQJaJph+h`CBhě*,5B*CJOJQJ\aJphh`CBhě*,CJOJQJaJ%ha-śhě*,B*CJOJQJaJphha-śhě*,CJOJQJaJ+ha-śhě*,5B*CJOJQJ\aJphha-śhě*,5CJOJQJaJha-śhě*,5OJQJ"ha-śhě*,5CJOJQJ]aJľyáy-zŒzÇzČzÓz:{|!|Ł|­|K}V}~~~á~î~K]ś€€ííííŕŐŐŐŐŐŐŐŐŐŐŐŐŐĆŐĆĆĆ$„Đdđ^„Đa$gdě*, $dđa$gdě*, $dđ¤a$gdě*,$„Đdđ¤^„Đa$gdě*,m$Ózßzáz9{:{G{I{z{|||!|.|0|P|˘|Ł|Ť|ś|˝|J}K}R}V}e}g}}~~~~~.~0~B~á~ć~ç~ë~*,JKZŠŒ—ëŰČšŁČŁČšŁČŁČŁČšŁČŁČšŁČŁČŁČšŁČŁČŁČŁŁČ{ČšŁČ{Č(h`CBhě*,B*CJH*OJQJaJph%hě*,5B*CJOJQJ\aJph+h`CBhě*,5B*CJOJQJ\aJphh`CBhě*,CJOJQJaJ%h`CBhě*,B*CJOJQJaJphhě*,B*CJOJQJaJph(hŒ ˘hě*,5B*CJOJQJaJph.—łśšâä € €€€€€€€3€@€B€äŃÂŃ­ŃäÂ䑆~vnc~SD5hě*,5CJOJQJ]aJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJha-śhGEOJQJhGEOJQJhZ ‘OJQJhě*,OJQJha-śhě*,OJQJ6ha-śhě*,B*CJOJQJaJfHphqĘ ˙˙˙˙(h`CBhě*,B*CJH*OJQJaJphh`CBhě*,CJOJQJaJ%h`CBhě*,B*CJOJQJaJph6h`CBhě*,B*CJOJQJaJfHphqĘ ˙˙˙˙€€ € € € € €€€€€€€€€€3€@€A€B€„€÷÷÷ňňňňňňňňňňňňÝÝĚĚ dđ¤gdě*,$dđ¤7$8$H$a$gdě*,$ Ć÷˙J dđ¤a$gdZ ‘gdě*,dđgdě*,B€f€„€Ż€ą€˛€ť€Ü€<=PVƒWƒhƒiƒx„€„„Ł„#…óč×ɸޘŒz˜kV˜Ck3C3kha-śhě*,5CJOJQJaJ%ha-śhě*,5>*CJOJQJ]aJ(ha-śhě*,B*CJOJQJ\aJphha-śhě*,CJOJQJaJ"ha-śhě*,5CJOJQJ]aJha-śhě*,5OJQJ"ha-śhě*,5CJOJQJ]aJh$P0JCJOJQJaJ ha-śhGEB*OJQJ\phhě*,B*OJQJ\ph hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJ„€ą€˛€Ü€=P›ůL‚ű‚VƒWƒhƒiƒ¤ƒěƒ&„ńńŕÖńÁÁÁÁÁŽ˘˘’’’$ & F dđ¤a$gdě*, $dđa$gdě*,m$$dđ¤7$8$H$a$gdě*,m$$„8„˜ţdđ¤^„8`„˜ţa$gdě*, dđ¤gdě*,$dđ¤7$8$H$a$gdě*,dđ¤7$8$H$gdě*,&„w„x„„#…T…U…_…ś…k†v†"‡ľ‡Ŕ‡’ˆďáŐĐĐČČşşŹ›ˆzˆ $1$7$8$H$a$gdě*,$dđ¤1$7$8$H$a$gdě*,$dđ¤7$8$H$a$gdě*, dh1$7$8$H$gdě*, dđ1$7$8$H$gdě*,dhgdě*,gdě*, Ć dhgdě*, „Ţdđ¤^„Ţgdě*,$ & F dđ¤a$gdě*,#…4…T…U…Z…[…^…_…z…đ…†i†k†p†u†v†Ž†"‡@‡ľ‡ş‡ť‡ż‡Ŕ‡Đ‡‘ˆ’ˆ“ˆšˆ›ˆżˆI‰J‰U‰W‰ť‰ź‰Ď‰@ŠďŕÓďÓďŕďŕďŕÇÓďŕďŕďŕďÓďŕďŕÇŕďŕďഞ‰vžav(ha-śhě*,5B*CJOJQJaJph%ha-śhě*,B*CJOJQJaJph(ha-śhě*,B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJph%hě*,5B*CJOJQJ\aJphhě*,CJOJQJaJhě*,5CJOJQJaJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ&’ˆ“ˆ›ˆI‰J‰U‰ź‰Í‰AŠŠŠ‹ŠŒŠŠŽŠŠŠ‘Š’Š“ŠěŰËÄÄšłŚŚĄĄĄĄĄĄĄĄĄgdě*, $„ĐH$^„Đa$gdě*,H$gdě*, „Ф^„Đgdě*,¤gdě*,dđ¤1$7$8$H$gdě*,$dh1$7$8$H$a$gdě*,$dđ¤1$7$8$H$a$gdě*,@ŠAŠjŠlŠ‰ŠŠŠ‘Š–Š—Š˜ŠľŠÂŠĂŠÄŠčŠ‹.‹ëŘĂŘ븰¨~qaTI8 hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJha-śhě*,5CJOJQJaJhě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJha-śhGEOJQJhGEOJQJhě*,OJQJha-śhě*,OJQJ(ha-śhě*,B*CJH*OJQJaJph%ha-śhě*,B*CJOJQJaJph(ha-śhě*,5B*CJOJQJaJph“Š”Š•Š–Š—Š˜ŠľŠÂŠĂŠÄŠ‹.‹/‹H‹I‹S‹g‹úúúúúĺĺĐĐƸаĐƞ Ć` ¤*$7$8$H$gdě*,m$$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdZ ‘gdě*,.‹/‹8‹H‹I‹O‹R‹g‹Œ0ŒřŒ ;ŽYŽßŽŕŽ ‰ł?‘q‘Ç‘Č‘ó’ô’ţ’“”ďáŃÁł¨Ń™Ń™Ń™Ń™™™Ń™Ń™™Ńp]H(ha-śhě*,5B*CJOJQJaJph˙%ha-śhě*,B*CJOJQJaJph˙8ha-śhě*,B*CJOJQJ\aJmH @nH @ph˙sH @tH @hě*,CJOJQJaJha-śhě*,CJOJQJaJhě*,5OJQJaJha-śhě*,5OJQJaJha-śhě*,5CJOJQJaJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJha-śhě*,5CJOJQJaJg‹Ľ‹ä‹ŒŒ/Œ0ŒbŒƒŒŠŒŃŒ÷ŒůŒ;Ž<Ž‰Š”âââÝÝÝŔŔŔŔŔ¸ŤŤŤŤžŤ $dđ¤a$gdě*, $dđ¤a$gdě*,$a$gdě*, & F„ě„äýdđ¤*$7$8$H$^„ě`„äýgdě*,m$gdě*, & F ĆĐ„ě„äý¤*$7$8$H$^„ě`„äýgdě*,m$”>‘?‘J‘ó’ô’ţ’”ý”ţ”•k•Ç•–N–O–[–×–U—Š—ňňňňňçŮŮňňňňňňňňžĽĽ & F Ćě„ě„äýdđ¤^„ě`„äýgdě*, & F Ćě„ě„äýdđ¤@&^„ě`„äýgdě*,$$dđ¤a$gdě*, $dđ¤gdě*, $dđ¤a$gdě*,”7”ý”•••k•}•Ç•ĺ•––O–[–\–°–ą–ž–ż–Ě–×–Ř–Ů–1—2—S—T—Ž——˜ě×ĹľĽ–Ľ–Ľ–Ľ–ĽŽŠŽseYeŽŠŽYKYŽŠjh‹‹<OJQJUha-śhě*,<OJQJha-śhě*,<OJQJ\jh‹‹OJQJUha-śhě*,OJQJh‹‹jh‹‹Uha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJha-śhě*,CJOJQJ\aJ"ha-śhě*,5CJOJQJ\aJ(ha-śhě*,5B*CJOJQJaJph˙%ha-śhě*,B*CJOJQJaJph˙˜ ˜.˜/˜T˜U˜˘˜Ł˜˝˜ž˜ż˜Đ˜+™0™?™H™I™J™¤™Ľ™Č™É™šš”š•šŁš¤šČšÉš››1›2›@›A›F›G›R›S›`›a›Ž›´›ľ›Ć›Đ›÷ëÝë÷Ů÷ëÝëÎÁÎłëł÷Ů÷ëÝë÷Ů÷ëÝë÷Ů÷ëÝΫΫΫΫΏha-śhě*,5CJOJQJaJha-śhě*,CJOJQJaJha-śhě*,0J)OJQJhě*,OJQJha-śhě*,<OJQJ\ha-śhě*,KH$OJQJha-śhě*,OJQJh‹‹jh‹‹<OJQJUha-śhě*,<OJQJjh‹‹U.Š—A˜ż˜3›´›ľ›Ć›Dœśœćć˲¨›ƒhhccgdě*,$$$ & F„ě„äýdđ¤^„ě`„äýa$gdě*,$ & F„ě„äýdđ¤^„ě`„äýa$gdě*, $dđ¤a$gdě*, dđ¤gdě*, & F Ćě„ě„äýdđ¤^„ě`„äýgdě*, & F Ćě„ě„äýdđ¤@&^„ě`„äýgdě*, & F Ćě„ě„äýdđ¤^„ě`„äýgdě*, Лћܛݛߛŕ›ů›ú›DœGœOœźœ˝œÂœĚœ"#&'DQôĺôĺôĺôĺооЫЖ†{nanQBhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJhZ ‘5CJOJQJaJhě*,5CJOJQJaJha-śhě*,OJQJha-śhě*,5CJOJQJaJ(ha-śhě*,5B*CJOJQJaJph"""%ha-śhě*,0JB*CJOJQJph˙"hě*,5B*CJOJQJaJph˙(ha-śhě*,5B*CJOJQJaJph˙ha-śhě*,CJOJQJaJhě*,CJOJQJaJ !"#$%&'DQR”ÁÂćőžúúúĺĺĺĺĺĐĐĺƸ套Ć$¤7$8$H$a$gdě*,„p„Ф7$8$H$^„p`„Đgdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdZ ‘$ Ć÷˙J dđ¤a$gdě*,gdě*,QRv”ÁÂËĺôő÷˙žžžž…žňĺÚÉşŹ››tcQB7Bha-śhě*,OJQJha-śhě*,CJOJQJaJ"ha-śhě*,5CJOJQJ]aJ ha-śhě*,B*OJQJ\phhě*,5OJQJaJha-śhě*,5OJQJaJhě*,0JCJOJQJaJ ha-śhě*,0JCJOJQJaJh$P0JCJOJQJaJhGEhě*,CJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJhě*,5CJOJQJaJžžž†žÖžŸ\Ÿ]ŸnŸÂŸ R ‹ řďßßÍą†kkkk & F„ě„äýdđ¤*$7$8$H$^„ě`„äýgdě*,d¤¤-DMĆ ˙˙˙˙[$\$gdě*,¤¤-DMĆ ˙˙˙˙[$\$gdě*,„ó„Ýý¤¤-DMĆ ˙˙˙˙[$\$^„ó`„Ýýgdě*,„ó„Ýýdđ¤^„ó`„Ýýgdě*,„ě„äýdđ^„ě`„äýgdě*,„´^„´gdě*,¤gdě*, …ž†žŐžÖžŸŸ\ŸlŸmŸnŸŒ  – — ˜ ™ Ľ ĄĄ)ĄEĄřĄůĄ˘˘˘˘°˘ť˘ź˘˝˘ž˘Î˘B¤C¤E¤O¤P¤Q¤X¤ěÝěÝěÖÍÇÍÝ´§ššˆÖ„ÖˆÖy§o§ˆÖÍÇÍeˆÖ„ÖÍÇ͈ha-śhě*,0J5hě*,0JB*ph333ha-śhě*,B*ph333hě*,ha-śhě*,5hě*,0JB*ph333ha-śhě*,0JB*ph333ha-śhě*,0JB*ph333%ha-śhě*,B*CJOJQJaJph333 hě*,0Jha-śhě*,0J ha-śhě*,ha-śhě*,CJOJQJaJ%ha-śhě*,5>*CJOJQJ]aJ'‹ Œ  ™ )ĄřĄůĄ˘Ż˘°˘˝˘C¤D¤E¤Q¤Á¤,Ľ-Ľ9Ľ}ĽŚŚ'ŚôôÚÚÚÚÚÚÚÚÚÚÚÚÚÚÚÚÚÚĂĂd¤¤-DMĆ ˙˙˙˙[$\$gdě*,$d¤¤-DMĆ ˙˙˙˙[$\$a$gdě*, ¤7$8$H$gdě*,X¤Á¤Â¤Ě¤-Ľ6Ľ7Ľ8Ľ9ĽGĽ}ĽĽŚ%Ś'Ś8Ś9ŚSŚgŚ‘Ś’ŚŰŚěŚîŚ%§&§e§…§‹§Œ§§–§š§œ§§ş§Ç§Č§ůďçůŢŐĎŐçůçůŢŐůËůËůËůŢŐůËůËůťŹťœœpchě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJhě*,5CJ$OJQJaJha-śhě*,5CJ$OJQJaJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJhě*, hě*,0Jha-śhě*,0Jha-śhě*,0Jha-śhě*,5ha-śhě*,0J5 ha-śhě*,%'Ś€ŚŰŚÜŚîŚN§‹§Œ§§Ž§§§‘§’§“§”§•§–§ääÍͲ˛¨–––––––––– Ć÷˙J dđ¤gdě*, $¤a$gdě*, & Fd¤¤-DMĆ ˙˙˙˙[$\$gdě*,d¤¤-DMĆ ˙˙˙˙[$\$gdě*, & Fd¤¤-DMĆ ˙˙˙˙[$\$gdě*,–§—§˜§™§š§›§œ§§ş§Ç§Č§ ¨7¨Q¨`¨a¨t¨u¨ęęęęęęęŐŐęË˝ŻŻę˝˝$¤7$8$H$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdZ ‘$ Ć÷˙J dđ¤a$gdě*,Č§ě§ ¨7¨@¨Q¨_¨`¨a¨u¨†Š˜Š+Ş,ŞjŞkŞšŞşŞóŞôŞţŞŘŤâŤŹ­Ű­Ż!ŻëŻěŻ°‡°—°ě°óč×ÉšŤšŠxexVeVeVeVešVšVšVšVešešeha-śhě*,CJOJQJaJ%ha-śhě*,B*CJOJQJaJph"ha-śhě*,5CJOJQJ]aJha-śhě*,5CJOJQJaJ ha-śhě*,0JCJOJQJaJhě*,0JCJOJQJaJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJ u¨Ę¨:Š†Š‡Š™ŠăŠ,ŞkŞşŞôŞőŞţŞŘŤâŤęęęŘŘËśśśś˘’$dđ¤d7$8$H$\$a$gdě*,$¤d7$8$H$\$a$gdě*,$„p„Đ7$8$H$^„p`„Đa$gdě*,$ & Fdđ¤7$8$H$a$gdě*, $ & F¤a$gdě*,$ Ćh¤7$8$H$a$gdě*,$ & Fdđ¤7$8$H$a$gdě*,⍏­ˇ­ŻěŻőŻśąžą´#´j´ ´Ą´˛´ěŢŢěϡŢŢŻŸŠ~~ $dđH$a$gdě*,$ & Fdđ¤7$8$H$a$gdě*,$ & Fdđ¤a$gdě*,$a$gdě*,$„Ädđ¤d1$7$8$H$\$]„Äa$gdě*, ĆŹ&dđ¤d\$gdě*,$dđ¤d\$a$gdě*,$dđ¤d7$8$H$\$a$gdě*, ě°ö°:ąHąśąĹą–˛Ÿ˛\łdł´#´ ´˛´ ľľ@ľAľ|ľ~ľ1ś3śWśYśZś[śxś…śéÖéÖơơơ˘Ö˘Ö˘Ö˘ÖÖÖ}Öm]NhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJha-śhě*,5CJOJQJaJhě*,B*CJOJQJaJph(ha-śhě*,B*CJH*OJQJaJph(ha-śhě*,5B*CJOJQJaJphha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ%ha-śhě*,B*CJOJQJaJph,ha-śhě*,5@ˆB*CJOJQJaJph˛´ ľAľ˘ľőľWśXśYśZś[śxś…ś†śČśőśďďßßßŇŇŇ˝¨¨˝ždđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdZ ‘$ Ć÷˙J dđ¤a$gdě*, $dh¤a$gdě*,$ & Fdđ¤a$gdě*,$„ĐdđH$^„Đa$gdě*,…ś†śŞśČśďśôśőśţśˇˇˇ ˇ3ˇ÷ˇňĺÚÉťŞœ†xgW?*(ha-śhě*,B*CJOJQJ]aJph.ha-śhě*,5B*CJOJQJ\]aJphha-śhě*,5CJOJQJaJ ha-śhě*,0JCJOJQJaJhě*,0JCJOJQJaJ+ha-śhě*,5B*CJOJQJ\aJphh$P0JCJOJQJaJ ha-śhě*,B*OJQJ\phhě*,B*OJQJ\ph hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJhě*,5CJOJQJaJ őśˇˇ ˇ3ˇrˇĚˇöˇ÷ˇ¸L¸–¸ă¸,šîŕËşŸŸŸ“…ssss & Fdđ¤7$8$H$gdě*,dđ¤7$8$H$gdě*, $7$8$H$a$gdě*,$„8„˜ţdđ¤7$8$H$^„8`„˜ţa$gdě*,m$$dđ¤7$8$H$a$gdě*,$ Ć÷˙J dđ¤a$gdě*,$¤7$8$H$a$gdě*,$dđ¤7$8$H$a$gdě*, ÷ˇ¸J¸L¸…š†š‡šŽššš;şKşLşÂşĂşËşĚşĺşćşŚť§ť¨ťąť˛ťłťÎťĎťąźĂź*˝+˝3˝4˝ëŘĂŘĂŽ˜…˜Ř˜ëŘv˜…˜ëŘvؘ…˜dTv˜Řv˜…ha-śhě*,5CJOJQJaJ"ha-śhě*,5CJOJQJ\aJha-śhě*,CJOJQJaJ%hě*,5B*CJOJQJ\aJph+ha-śhě*,5B*CJOJQJ\aJph(ha-śhě*,B*CJOJQJ\aJph(ha-śhě*,B*CJOJQJ]aJph%ha-śhě*,B*CJOJQJaJph(ha-śhě*,5B*CJOJQJaJph ,š†š‡šš;şĂşÍş§ť¨ťłťąź+˝5˝‰˝ń˝ú˝ŤžIżJżUż¨żíÜÜÜÔÜÔÜÜĚÔÜÇÔÜĚÔÜܲ$„Đdđ¤7$8$H$^„Đa$gdě*,gdě*,$a$gdě*,$a$gdě*,$dđ¤7$8$H$a$gdě*, & Fdđ¤7$8$H$gdě*,4˝5˝B˝C˝‰˝œ˝˝đ˝ń˝ř˝ů˝ú˝žŤžĂžÄž=ż>ż?ż@żIżUż›żé×Ǹ飐¸é}éǸ×Ǹq¸q¸YD(ha-śhě*,B*CJOJQJ]aJph.ha-śhě*,5B*CJOJQJ\]aJphhě*,CJOJQJaJ%hě*,5B*CJOJQJ\aJph%ha-śhě*,B*CJOJQJaJph(ha-śhě*,5B*CJOJQJaJphha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ"ha-śhě*,5CJOJQJ\aJ+ha-śhě*,5B*CJOJQJ\aJph›żż¸żÉżężëżŔŔvŔxŔˆŔ‰ŔŠŔžŔŸŔ¤ŔÁŔÎŔĎŔóŔÁéÔźÔŞÔéÔéԛˆ›|›l]PC8hGEhě*,OJQJhGEhě*,OJQJaJhě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJhě*,CJOJQJaJ$ha-śhě*,CJOJQJaJnHtHha-śhě*,CJOJQJaJ"hě*,B*CJOJQJ]aJph.ha-śhě*,5B*CJOJQJ\]aJph(ha-śhě*,B*CJOJQJ]aJph+ha-śhě*,B*CJH*OJQJ]aJph¨żˇż¸żÉż9Ŕ†Ŕ‡ŔˆŔ‰ŔŠŔ‹ŔŒŔŔŽŔŔŔ‘Ŕ’Ŕ“Ŕ”ŔęŮŮęęŮŮĚś¤¤¤¤¤¤¤¤¤¤ Ć÷˙J dđ¤gdě*, Ć÷˙J „Đdđ¤^„Đgdě*, Ć÷˙J gdě*,$dđ¤7$8$H$a$gdě*,$„Đdđ¤7$8$H$^„Đa$gdě*,”Ŕ•Ŕ–Ŕ—Ŕ˜Ŕ™ŔšŔ›ŔœŔŔžŔŸŔ ŔĄŔ˘ŔŁŔ¤ŔÁŔÎŔĎŔÁííííííííííííííííŘŘĂš dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdZ ‘ Ć÷˙J dđ¤gdě*,Á>Á?ÁmÁnÁ|ÁÁEÂçÂHĂűĂ Ä\ÄśÄńççŇČŔ§§’’Ŕyy$ & F: ĆĐdđ¤7$8$H$a$gdě*,$ & F!dđ¤d¤d[$\$a$gdě*,$ & F! Ćźdđ¤d¤d[$\$a$gdě*,dđgdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*, $¤a$gdě*,dđ¤7$8$H$gdě*, Á>Á?ÁHÁmÁoÁuÁ|ÁÁ¨ÂćÂűĂ Ä[ÄhĹpĹqņĹĆ?ĆqĆyĆzƙĆéĆÇyÇďÝĎźŹŸŹ~m~XEŹŸŹ~Ź~ŹŸŹ~Ź~%ha-śhě*,B*CJOJQJaJph(ha-śhě*,B*CJOJQJ\aJph ha-śhě*,CJOJPJQJaJha-śhě*,CJOJQJaJ"ha-śhě*,5CJOJQJ]aJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJ%ha-śhě*,5CJOJQJ\]aJh$P0JCJOJQJaJ"hGEhě*,CJOJQJ\]aJ hGEhě*,B*OJQJ\phśÄĹ)ĹhĹiĹrĹĆqĆ{ĆéĆ:ÇyÇzÇ{Ç|LJÇČÇyČzȄČ@ÉAÉIÉééĐĆĆĆžĆĆĆĆĆĆĆĆĆĆĆžĆĆĆ$a$gdě*, $¤a$gdě*,$ & F: ĆĐdđ¤7$8$H$a$gdě*,$ & F: ĆФ7$8$H$a$gdě*,yÇ{Ç|DždžǣÇČÇĺÇzȂȃȡČ@ÉAÉGÉHÉaÉËÉÖÉĘĘ-Ę/ĘSĘUĘfʹʳĘČĘÉʊˌˢËÁËÂËîËđËWĚYĚzĚ{Ě̞́ĚňĺŐňŐĆŐĆŐňŐĆňŐňŐĆŐľ§ľ•ľĆŐľ•ľ§ľ•§ľ§ľ•ľ•ľŠ‚ŠrhZ ‘hZ ‘5CJOJQJaJhě*,OJQJha-śhě*,OJQJ#ha-śhě*,0J$CJH*OJQJaJhě*,0J$CJOJQJaJ ha-śhě*,0J$CJOJQJaJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJhGE5CJOJQJaJhě*,5CJOJQJaJ+IÉËÉÖÉUĘfĘäĘTË˝ËĚzĚ{Ě|Ě}Ě~Ě̞̫̬̀́Ě÷÷č÷ŮŮŮŮŮÔÔÔÔÔÔÔżżŞ$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdZ ‘gdě*,$ & F „„^„„a$gdě*,$ & F „*^„*a$gdě*,$a$gdě*,žĚŤĚŹĚĐĚîĚÍÍ&ÍBÍCÍVÍp΃ÎČĎÓĎÔĎńáÔɸ¨šˆzeRˆBˆ3hě*,5CJOJQJ\aJha-śhě*,CJOJQJ\aJ%ha-śhě*,B*CJOJQJaJph(ha-śhě*,5B*CJOJQJaJphha-śhě*,5OJQJaJ"ha-śhě*,5CJOJQJ\aJh$P0JCJOJQJaJha-śhě*,5CJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJha-śhě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJŹĚîĚÍÍBÍCÍV͖ÍÝÍ1ÎpÎq΂΃ÎĘÎőçŇÁőľŁŁŁŁÁy$„Đdđ¤1$7$8$H$^„Đa$gdě*,$dđ¤1$7$8$H$a$gdě*,$„Ф7$8$H$^„Đa$gdě*, $7$8$H$a$gdě*,$dđ¤7$8$H$a$gdě*,$ Ć÷˙J dđ¤a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,ĘÎĎTώĎĘĎËĎŐĎÖĎśĐÓŃÔŃŐŃßŃEÓĐÓŃÓŇÓŢÓ;ÔčččččŐÂŐŐÂŻœŐŐÂŻŐŐ$dí¤1$7$8$H$a$gdě*,$dt˙¤1$7$8$H$a$gdě*,$d˙˙¤1$7$8$H$a$gdě*,$dđ¤1$7$8$H$a$gdě*,$„Đdđ¤1$7$8$H$^„Đa$gdě*,ÔĎÖĎĐśĐßĐŇŃŐŃÝŃŢŃ ŇEÓsÓĎÓŇÓÜÓÝÓúÓ;ÔNÔÚÔůÔ&Ő'Ő(Ő)Ő*Ő2Ő3Ő4ŐDŐüŐֻ֢֙֡ÖH×\×Î×ő×!Ů#Ů/كمٓ٢ŮńßĎßĎńßŔßĎßĎńßŔßĎßĎłĎńĎłĎßŔߣńŁńßŔßĎßĎßĎńßń“ń|-ha-śhě*,CJOJQJaJfHqĘ ˙˙˙˙ha-śhě*,CJH*OJQJaJha-śhě*,5CJOJQJaJhě*,CJOJQJ\aJhě*,5CJOJQJ\aJha-śhě*,CJOJQJ\aJ"ha-śhě*,5CJOJQJ\aJha-śhě*,CJOJQJaJ.;Ô'Ő(Ő)Ő*Ő4Őü՘֣֙ÖH×Î×!Ů"Ů#Ů/Ů0ِŮÚÚěěěěěěěěěěěěěŮěÁÁŻě$„hdđ¤`„ha$gdě*,m$$„hdđ¤1$5$7$8$H$^„ha$gdě*,$d˙˙¤1$7$8$H$a$gdě*,$dđ¤1$7$8$H$a$gdě*,˘ŮäŮÚ Ú1Ú2Ú Ű ŰŰŰŰŰ5ŰBŰCŰçĐÁŻŸÁƒsfVsF7*hě*,5CJOJQJaJhZ ‘hZ ‘CJOJQJaJhZ ‘hZ ‘5CJOJQJaJha-śhZ ‘5CJOJQJaJhě*,5CJOJQJaJha-śhě*,5CJOJQJaJ6ha-śhě*,B*CJOJQJaJfHphqĘ ˙˙˙˙ha-śhě*,CJOJQJ\aJ"ha-śhě*,5CJOJQJ\aJha-śhě*,CJOJQJaJ-ha-śhě*,CJOJQJaJfHqĘ ˙˙˙˙0ha-śhě*,CJOJQJ]aJfHqĘ ˙˙˙˙Ú Ú1Ú2Ú}Ú˝Ú Ű Ű Ű Ű ŰŰŰŰŰŰŰěŮŮÁŠ‹‹‹‹‹‹‹‹‹‹ Ć÷˙J dđ¤gdě*, $„h`„ha$gdě*,$„hdđ¤1$5$7$8$H$^„ha$gdě*,$„Čdđ¤1$5$7$8$H$`„Ča$gdě*,$dđ¤1$7$8$H$a$gdě*,$dë˙¤1$7$8$H$a$gdě*,ŰŰŰŰŰŰ5ŰBŰCۅ۳۴ŰĺŰćŰúŰ-܀ÜíííííŘŘĂšŤĂšĂŤ  & F/dđ¤gdě*,$dđ¤7$8$H$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdZ ‘ Ć÷˙J dđ¤gdě*,CŰgۅ۳۴۽ŰĺŰćŰúŰÜÜÜÜPÜQÜXÜYÜöÜ÷ÜÝÝ#Ý$Ý<Ý=Ý\Ý]Ý^Ýóč×ÇšŠÇ˜hhhhYhhYY˜ha-śhě*,CJOJQJaJ1ha-śhě*,0JCJOJQJaJfHqĘ ˙˙˙˙-ha-śhě*,CJOJQJaJfHqĘ ˙˙˙˙ ha-śhě*,0JCJOJQJaJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJha-śhě*,5CJOJQJaJ hGEhě*,B*OJQJ\phhGEhě*,OJQJhGEhě*,OJQJaJ€Ü÷Ü=Ý]Ý^ÝoÝĘÝóÝŢDŢEŢNŢ\ŢrޖޗŢŰŢß`ßňňňáÔ˝˝˝˝ŻŻŻŻŻ§˘˘˘gdě*,$a$gdě*, Ć dđ¤gdě*, & F!dđ¤*$-DMĆ ˙˙˙˙gdě*, -DMĆ ˙˙˙˙gdě*,$dđ¤7$8$H$a$gdě*,  & F/dđ¤gdě*,^ÝnÝDŢNޖޡޢŢĺŢçŢĂŕÄŕáŕîŕďŕá1áîßĚşŞ’Šß}m^QD9hGEhě*,OJQJhGEhě*,OJQJaJhě*,5CJOJQJaJhZ ‘hŰďCJOJQJaJhZ ‘hŰď5CJOJQJaJhŰď5CJOJQJaJhě*,OJQJha-śhě*,OJQJhě*,CJOJQJ]aJha-śhě*,CJOJQJ]aJ"ha-śhě*,5CJOJQJ]aJ%ha-śhě*,5>*CJOJQJ]aJha-śhě*,CJOJQJaJ"ha-śhě*,5CJOJQJ\aJ`߼ßîß6ŕ|ŕĂŕÄŕáŕîŕďŕ1á_á`áŒááöá â âúúúúńÜÇÇÜ˝ŻÜ§–˝ŻŻ$dđ¤7$8$H$a$gdě*,$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdŰď$ Ć÷˙J dđ¤a$gdě*, ĆŞgdě*,gdě*,1á_á`áiáŒááňáóáôáőáöá âDăEăGăXăYăďßŃÁ´¨Ÿ¨ŸÁˆydO7O/ha-śhě*,5B*CJOJPJQJ\aJph)ha-śhě*,B*CJOJPJQJaJph)ha-śhě*,B*CJOJPJQJaJphha-śhě*,B*OJQJph,ha-śhě*,5B*CJOJPJQJaJphhě*,5OJQJha-śhě*,5OJQJha-śhě*,0JOJQJha-śhě*,5CJOJQJaJh$P0JCJOJQJaJha-śhě*,5CJOJQJaJ hGEhě*,B*OJQJ\ph âEâwâÍâăDăEăYăŔăFäGäÎäĎäĺĺŰĺÜĺćčččččÚÚġŻĽĽĽĽ˜˜Ľ $dđ¤a$gdě*, dđ¤gdě*,$a$gdě*, „8„˜ţ^„8`„˜ţgdě*,„8„˜ţdđ¤7$8$H$^„8`„˜ţgdě*,dđ¤7$8$H$gdě*, & F,„8dđ¤*$7$8$H$^„8gdě*,YăZă\ă˝ăżăŔăEäNäĎäŘäĺÜĺăĺććććsćtć|ć¤ćęŐŔ¨Ŕ•…v…vf…vf[SOS…:)ha-śhě*,B*CJKH$OJQJaJphh‹‹jh‹‹Uha-śhě*,OJQJha-śhě*,CJOJQJ\aJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ%ha-śhě*,B*CJOJQJaJph/ha-śhě*,5B*CJOJPJQJ\aJph)ha-śhě*,B*CJOJPJQJaJph)ha-śhě*,B*CJOJPJQJaJph)ha-śhě*,B*CJOJPJQJaJphććŤćŰćÜćççIçJçƒç„çÎçĎçččIčJčrčsčőęöęřęëőđőőőőőőőőőőőőőőëëăđÖÁ$ Ć÷˙J dđ¤a$gdŰď $dđ¤a$gdě*,$a$gdě*,gdě*,gdě*, dđ¤gdě*,¤ćĽćŤć˛ćŐćÜćăćççççJçQçƒç„çŒçĎç×çč"č-č?čJčTčsč€čóęôęőęöę÷ęéÔÄľĽÄľĽľÄĽÄĽľÄĽÄĽÄĽľĽ—Š|ŠrŠgS'h`CBhě*,CJOJQJ]aJmHsHh`CBhě*,OJQJhě*,OJQJ^Jh`CBhě*,OJQJ\^Jh`CBhě*,OJQJ^Jh„a#hě*,5OJQJ^Jha-śhě*,CJOJQJ\aJha-śhě*,CJOJQJaJha-śhě*,5CJOJQJaJ)ha-śhě*,B*CJKH$OJQJaJph,jh‹‹B*CJKH$OJQJUaJph÷ęřęë"ë#ëAëFëSëqëžëŸë ë¨ëŮëëëďßĐø­Ľ¸”†ugWJhě*,5CJOJQJaJhZ5hě*,5CJOJQJaJh$P0JCJOJQJaJ hGEhGEB*OJQJ\phhě*,B*OJQJ\ph hGEhě*,B*OJQJ\phhGEOJQJhGEh(ŠOJQJhGEhě*,OJQJhě*,5CJOJQJaJhZ ‘hŰďCJOJQJaJhZ ‘hŰď5CJOJQJaJ h`CBhě*,CJOJQJ_H9aJë"ë#ëqëŸë ëÚëëëqěüěíšídîmîźîăîęŐË˝˝ľ°Ł˜°°°ËË$a$gdě*, $ & F9a$gdě*, $ & F9¤a$gdě*,gdě*,$a$gdě*,dđ¤7$8$H$gdě*, dđ¤gdě*,$ Ć÷˙J dđ¤a$gdě*,$ Ć÷˙J dđ¤a$gdŰďëëěëíëîëěě$ě%ě-ě.ě0ě1ě6ě7ě?ě@ěBěCěNěOěWěXěeěŮł•ołoL;Ů;Ů;Ů;Ů;Ů;Ů;Ů; hXzhě*,0JCJOJQJaJEhě*,0J'B*CJOJQJaJeh@fHphqĘ ˙ńńńrĘ˙@Kh0]˜hě*,0J'B*CJOJQJaJeh@fHphqĘ ˙˙˙˙rĘ˙@:h0]˜hě*,0J&OJQJeh@fHqĘ ˙˙˙˙rĘ˙@Kh0]˜hě*,0JB*CJOJQJaJeh@fHphqĘ ˙˙˙˙rĘ˙@KhXzhě*,0JB*CJOJQJaJeh@fHphqĘ ˙ńńńrĘ˙@eěpěqěúěüěídîmîâîăîäîďîˆď‰ďŠď“ď\đ]đeđúđűđń„ń…ń†ń‡ń‹ńŒńâÓČÓ¸Š¸ŠŠ¸ŠŠ¸Š¸Š€Šok\PhBkäCJOJQJaJhŤRřhBkäCJOJQJaJhě*, hě*,5CJOJQJ\^JaJhZ5hě*,5CJOJQJaJhě*,5CJOJQJaJhě*,CJOJQJaJhZ5hě*,CJOJQJaJhú(˝hě*,5CJOJQJaJhXzhě*,OJQJhXzhě*,CJOJQJaJ:hXzhě*,0J&OJQJeh@fHqĘ ˙ńńńrĘ˙@ăîäîďîvď‰ďŠď“ď]đeđ´đúđűđń7ń]ń„ń…ń†ń‡ńˆń‰ńŠń‹ńŒńńőđćććđđđđđđđŢŢŢđŮđÔÔÔÔÔÔgdBkägdě*, & F8gdě*, dđ¤gdě*,gdě*, dđ¤xgdě*,ńŽńńń‘ń’ń“ń”ń•ń–ń—ń˜ńśńĂńÄńň$ň%ňBňúúúúúúúúúúúííŘËš¨í$dđ¤7$8$H$a$gd(Š„Đdđ¤7$8$H$^„Đgd(Š $dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gd(Š $dđ¤a$gd(ŠgdBkäŒń˜ńľńśńĂńÄńćńň$ň%ň.ňBňJňKň^ň˝óĎóôä×äÇşŻžŽ€pdU?*p(ha-śh(ŠB*CJOJQJ\aJph+ha-śh(Š5B*CJOJQJ\aJphh`+Ůh(ŠCJOJQJaJha-śh(Š5OJQJha-śh(Š5CJOJQJaJhePĺ0JCJOJQJaJha-śh(Š5CJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh(ŠCJOJQJaJBňKň^ň_ň§ňóźó˝óÎóĎó•ôçô1őőŽőő羒’’žőő€€€€ő$ & FMdđ¤*$a$gd7BO,$ & F` Ć2Đ(ź Päx  4 Č#\'đ*„.2Ź5@9dđ¤*$a$gd7BO($ Ć2”(ź Päx  4 Č#\'đ*„.2Ź5@9dđ¤a$gd(Šm$dđ¤7$8$H$gd(Š dđ¤gd(ŠĎóőő•ő–ő™ős÷t÷y÷|÷÷ŔřÁřĂřÄřĹřËřÎřŃřyúzú{ú„ú…úŃűŮűÜű§ýľýrţ„ţÉţËţ:˙<˙U˙r˙s˙€˙ńáŇŔŇńŔŇŔŇń´¨™ŔŇŔŇń´ńŔŇńŔŇńáńáń‰ń‰ńylyh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJH*OJQJaJha-śhGECJOJQJaJhGECJOJQJaJh(ŠCJOJQJaJ#ha-śh(Š5CJOJPJQJaJh(Š5CJOJPJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJ&Žőő˜ő™ős÷t÷~÷÷ÁřÂřĂřÄřĹřĐřŃřzú{ú…úŃűŇűŰűÜű§ý¨ýŠýľýňĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺĺŰ dđ¤gd(Š $dđ¤a$gd(Š $dđ¤a$gd(Šľýśýţqţrţ„ţńţK˙L˙M˙N˙O˙P˙Q˙R˙S˙T˙U˙őëŐÎÎľœÎőőőőőőőőő & FM Ć*Ţ„’„>ţ¤*$^„’`„>ţgd7BO & FM Ć*Đ„’„>ţ¤*$^„’`„>ţgd7BO¤gd(Š & FH Ć8„Đ„¤^„Đ`„gd7BO  & FH¤gd7BO dđ¤gd(ŠU˙s˙€˙˙ż˙ń˙'(f›Ô ?@QňňáÔáňňňňĘĘłłłłłĘĘ & FNdđ¤*$-DMĆ ˙˙˙˙gd7BO dđ¤gd(Š $dđ¤a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š€˙˙Ł˙ż˙đ˙ń˙ú˙(?QSZ[\ňĺÚÉşŹš‰yfšWšH:h(ŠCJOJPJQJaJh(Š5CJOJPJQJaJha-śh(ŠCJOJQJaJ%ha-śh(ŠB*CJOJQJaJph"""ha-śh(Š5CJOJQJaJ ha-śh(ŠCJOJPJQJaJ#ha-śh(Š5CJOJPJQJaJhePĺ0JCJOJQJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJaJQĘ RST\uv€  ŕáâäÉɜɍĄ”””””””””” $dđ¤a$gd(Š dđ¤gd(Š dđ¤gd(Šm$ Ćb„údđ¤*$^„úgd(Š & Fa Ćb„ú„ňţdđ¤*$^„ú`„ňţgd7BO & Fa ĆT„ú„ňţdđ¤*$^„ú`„ňţgd7BO\v|~€ ßăĺě퍳´gt9JO U V [ \ y z ‡ ˆ Ş Ć  ďŕÎŕďÎŕďŔďÎŔďÎŕďÎďÎď°Ł°Ł“†“ylaP hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh(ŠCJOJPJQJaJ#ha-śh(Š5CJOJPJQJaJh(Š5CJOJPJQJaJ ha-śh(ŠCJOJPJQJaJâăäĺíŞŤ´fghiuâ9:KLť O P Q R S ňňňňňňňňňčččÖÖčččÖÖÖÖÎÎÎ$a$gd(Š„8„˜ţdđ¤^„8`„˜ţgd(Š dđ¤gd(Š $dđ¤a$gd(ŠS T U V W X Y Z [ \ z ‡ ˆ Ć    3 4 ÷÷÷÷÷÷÷÷÷ęęŮĚŮ÷ş°° dđ¤gd(Š$ Ć÷˙J ¤a$gd(Š $dđ¤a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Š   3 8 J   ( ) ; E G h ÷ 7OŘŕâz„†ŃFIKTUZ[pqrz{č  2BCńăÓÄÓÄ°™°™ÓŒÓĀĀÄӌÓÄӌÓĀÄӌӌÄpÄӌÓĀÄÓĀh Uh(Š5CJOJQJaJh(ŠCJOJQJaJh(Š5CJOJQJaJ-ha-śh(ŠCJOJQJaJfHqĘ ˙˙˙˙'h(ŠCJOJQJaJfHqĘ ˙˙˙˙ha-śh(ŠCJOJQJaJha-śh(Š5CJOJQJaJhePĺ0JCJOJQJaJhGEh(ŠCJOJQJaJ,4 × } ĺ 9 J } Ť â  < = F G h ččččăÁÁÁÁšŽ $dđ¤a$gd(Š $„ ^„ a$gd(Š&$ & Fc Ć*8’ěF T„ě„äýdđ¤*$^„ě`„äýa$gd7BO"$ & Fc„ě„äýdđ¤*$-DMĆ ˙˙˙˙^„ě`„äýa$gd7BOgd(Š & Fb„ě„äýdđ¤*$^„ě`„äýgd7BOh ×Řáâyz…†¤HIJKUqr{  2Y•–—Łňňňňňňňňňňňňňňňňňňňňňčččňčč dđ¤gd(Š $dđ¤a$gd(ŠCYde”•¤7J÷ůţ)*Lh‘’¤ńâÖâǡńˇńˇ¤”‡”zmbQCQhGEB*OJQJ\ph hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%ha-śh(Š5>*CJOJQJ]aJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJh(ŠCJOJQJaJha-śh(ŠCJOJQJaJha-śh(ŠCJOJQJaJŁ¤ĺ78IJĆřůúűüýţ)*őĺĺőőőŐŐŐĚÇÇÇżż˛˛Ą$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Šgd(Š„h^„hgd(Š$ & FGdđ¤a$gd7BO$ & FFdđ¤a$gd7BO dđ¤gd(Š*h’ĽÚŰw€$EOĺđĘßéoktAš ňááŐŐÉŔÉÉŔÉÉŔŔÉÉŔŔÉŔÉÉ„h^„hgd(Š $„h^„ha$gd(Š $„h^„ha$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š¤ĽŽŮÚŰâëěw€Ľ$9ENOväĺďđńăÓĆśŠ™ŠŠ}ŠŠmŠŠ^ŠNŠh€K¨h(Š5CJOJQJaJh€K¨h(ŠCJOJQJaJh™ZĂh(Š5CJOJQJaJh×uťh(Š5CJOJQJaJh(ŠCJOJQJaJh~"Ih(Š5CJOJQJaJh(Š5CJOJQJaJh¨ ‘hGE5CJOJQJaJh(Š5CJOJQJaJh¨ ‘h(Š5CJOJQJaJhePĺ0JCJOJQJaJhGEh(ŠCJOJQJaJ.Ęßčéks™Acš Ä E!K!Q!…"‡"b$p$ˇ$Ó$Ô$â$ă$%!%ďăďăÖĆśăÖśăÖăÖăÖŚă–ă†ăviv`SHhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh~"Ih(Š5CJOJQJaJh%°h(ŠCJH*OJQJaJhnSh(Š5CJOJQJaJhź[`h(Š5CJOJQJaJh€K¨h(Š5CJOJQJaJh(Š5CJOJQJaJh(ŠCJOJQJaJh&cĆh(Š5CJOJQJaJš Ĺ !E!Q!­!"G" "#J#œ#Ç#!$b$ˇ$Ô$â$ă$!%O%öîîöććććććććććöŮŮŃÄł$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Š & Figd7BO & Fhgd7BO„h^„hgd(Š!%N%O%X%j%v%w%x%~%%€%”%Ô&ç&”())$)%)4){*‚*„*–*é*ń*ó*+X+i+,ďŕŇÂźł¤˜ˆÂxkxk\xÂO¤ÂO¤ÂO¤¤h(Š5CJOJQJaJhj°h(ŠCJOJQJaJhj°h(ŠOJQJ^Jhj°h(Š5CJOJQJaJha-śh(ŠCJOJQJ\aJha-śh(Š5OJQJha-śh(ŠCJOJQJaJha-śh(Š0J h(Š0Jha-śh(Š5CJOJQJaJhePĺ0JCJOJQJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phO%j%x%%€%“%”%•%Ď%&d&–&Ô&÷ćŐ÷ÍÄź „„„k$ & FO Ćěš „ě„äý^„ě`„äýa$gd7BO$ & FO Ć @ ěš „ě„äý¤^„ě`„äýa$gd7BO$ & FO Ć @ ^š „ě„äý¤^„ě`„äýa$gd7BO$a$gd(Š $a$gd(Šm$$a$gd(Š$dđ¤7$8$H$a$gd(Š$dđ¤7$8$H$a$gd(Š$a$gd(Š Ô&Ő&ć&ç&2'Ś'ó'”()))&)')z*{*„*…*č*é*ó*ô*X+˙+÷÷÷äŃŃŃž÷÷÷÷÷÷÷÷÷÷÷÷÷÷$ & FA„ě„äý^„ě`„äýa$gd7BO$ & FA„ě„äý^„ě`„äýa$gd7BO$ & FA Ćě„`„a$gd7BO$a$gd(Š˙+, , ,›,--#-$-”-•-–-˘-Ł-(.).:.;.§.¨.Š.Ş.Ť.Ź.­.Ž.Ż.°.÷÷÷÷÷÷÷÷÷÷÷÷÷ë÷÷÷ë÷÷÷÷÷÷÷÷÷ $„Đ^„Đa$gd(Š$a$gd(Š,, ,!,›,Ź,-!-#-6-–-Ł-Ţ-ŕ-).;.¨.ľ.ś.š.Ö.×.ä.ĺ./#/0/2/ďâďÓďÓďâďÓďÓĂÓďÓ˛¤˛”‡”~qfUGhGEB*OJQJ\ph hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh(Š5>*CJOJQJ]!ha-śh(Š5>*CJOJQJ]ha-śh(ŠCJH*OJQJaJha-śh(ŠCJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ°.ą.˛.ł.´.ľ.ś.ˇ.¸.š.×.ä.ĺ.#/S/T/U/|/Œ// /÷÷÷÷÷÷÷÷÷ęęâŐÄâęźÄę´¤gd(Šm$$a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Š$a$gd(Š2/R/S/T/U/^/{/|/Œ// /4171I1­2Ž2ľ2ś2‘3’3—3™3š3›3˘4Ł4Š4Ź4­4Ž4Ť5Ź5­5ďŕÔĹˇŞš‘Łr_ršŞšĹšŞšŞšĹšŞšŞšĹSĹh(ŠCJOJQJaJ%hÚk-h(Š5CJOJQJ\]aJhÚk-h(ŠCJOJQJaJhÚk-h(Š5CJOJQJaJha-śh(Š0Jha-śh(Š5CJOJQJaJh(Š5CJOJQJaJhePĺ0JCJOJQJaJha-śh(ŠCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\ph  /0H0’0÷06171H1I1”1ď1.2d2­2Ž2ś2čččččÝÓÓśśśś–‰‰ $dđ¤a$gd(Š $ & FQ Ć ÂĐě„ě„äýdđ¤*$^„ě`„äýa$gd7BO$ & FO Ć@ „ě„äýdđ¤*$^„ě`„äýa$gd7BO dđ¤gd(Š dđ¤gd(Šm$ & FP„ě„äýdđ¤*$^„ě`„äýgd7BOś2:3‘3’3›3ý3˘4Ł4Ž4/5Ź5­5Ž5Ż5¸5}6Ü6Ý6ĺ6ý6b7ö7÷788ňňňňňňňňňňňňňňňňňňňňçßßÔ $ & FKa$gd7BO$a$gd(Š $dđa$gd(Š $dđ¤a$gd(Š­5Ž5Ż5´5ś5ˇ5¸5Ü6Ý6â6ă6ä6ĺ6÷78m8o88Ą8Š9°9˛9ł9Ď9Đ9Ţ9ß9:ňâňâňâÓâňâňâÓâČźČâČŠ“€pcpSFhGEh(ŠOJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%h(Š5B*CJOJQJ]aJph+ha-śh(Š5B*CJOJQJ]aJph%ha-śh(Š5CJOJQJ\]aJha-śh(ŠH*OJQJha-śh(ŠOJQJha-śh(ŠCJOJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJ8Ą89d9Š9Ş9Ť9Ź9­9Ž9Ż9°9ą9˛9ł9Đ9Ţ9ß9:U:úňňňęęęęęęęúúúÝÝČťŞ$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gd(Š $dđ¤a$gd(Šdđgd(Š & FLgd7BOgd(Š::T:U:V:\:]:^:_:o::€:”:Ď;á;Ž==•=—=˜=ž=ˆ?Ż?&@1@2@V@%A?AŒBőäŐÉť­ť­”ɝ……u…iY……L……h(Š5CJOJQJaJhÚk-h(Š5CJOJQJaJh(ŠCJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJha-śh(Š0Jha-śh(Š5CJOJQJaJh>Ŕ0JCJOJQJaJhePĺ0JCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJU:V:o::€::”:Ń:;X;Ş;Î;Ď;ŕ;á;C<•<ë<=Ž==÷ďŢ÷ďŘÁÁÁÁÁŘźźŹŹŹŹŹď & FE„ě„äý^„ě`„äýgd7BOgd(Š & FQ Ć@ „ě„äý^„ě`„äýgd7BOm$gd(Šm$$dđ¤7$8$H$a$gd(Š$a$gd(Š$a$gd(Š=˜=Ę>'@(@2@˘BŁBŻB+D.D7D€E=F>FGFĚGÍGÎGĎGŰG1HHŸH÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷÷ßß÷$ & FC„8„äýdđ¤^„8`„äýa$gd7BO$a$gd(ŠŒBB˘BŁBŠBŽBŻBŮBbCtCÜCőC.D6D7D\D€E E=FFFGF\FÍGŰGHŸHJJJ7J8JEJFJhJ„JôĺŐČŐČŐĺŐĺôĺŐČŐĺŐĺŐČŐĺźąŐ多Š}ŠČpehGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJh(ŠCJ0OJQJha-śh(ŠCJ0OJQJha-śh(ŠOJQJha-śh(Š5OJQJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJh(ŠCJOJQJaJ"ŸH IwIËIJJJJ8JEJFJ„J°JąJĐJßJăJěěěěŕŘŘËËÁ´ŁÁÁ‘Ł$„Ф7$8$H$`„Đa$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š $¤a$gd(Š $dđ¤a$gd(Š$a$gd(Š $„h^„ha$gd(Š$ & FD„8„äý^„8`„äýa$gd7BO„JŻJ°JąJşJĐJŢJßJâJăJöJ÷JčKéKřKůKúKóLôLőLďŕÓĹľŹ‘ľr[rr[H:ha-śh(ŠKHOJQJ\$ha-śh(ŠOJQJmH @nH @sH @tH @,h <Żh(ŠCJOJQJaJmH @nH @sH @tH @h <Żh(ŠCJOJQJaJh <Żh(Š5CJOJQJaJha-śh(Š5OJQJha-śh(ŠCJOJQJaJha-śh(Š0Jha-śh(Š5CJOJQJaJh>Ŕ0JCJOJQJaJh(Š5CJOJQJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phăJöJ÷J,KnKŹKéKęKúK2LuL´LőLöLúëĚĚĚŻŚŚ˜˜˜˜z$„Đd¤¤-DMĆ ˙˙˙˙[$\$^„Đa$gd(Š  Ćadđ¤gd(Š Ćagd(Š & FR Ć ĐZ*„ě„äýdđ¤*$^„ě`„äýgd7BO & FR ĆĐ„ě„äýdđ¤*$7$8$H$^„ě`„äýgd7BO Ćadđ¤gd(Šm$gd(Š őLöLţL˙LM"MKMMNNNNNYNlN›NOOOOOOKOŁOĆO`PePfPiPjPkPőěćěŘÍÂÍšě暣ŽŁ{Łěk^kŁ{Ł{ě^k^kh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%ha-śh(ŠB*CJOJQJaJph(ha-śh(ŠB*CJOJQJ\aJph+ha-śh(Š5B*CJOJQJ\aJphha-śh(Š0Jha-śh(ŠB*phha-śh(ŠnH @tH @ha-śh(Š5B*\ph h(Š0Jha-śh(Š0Jha-śh(ŠKH\öLMMNNNOOŁOôO`PkPXQ¨QÝQçQzRöR÷RS`SşSĺĺĺĺĺŮŃŮŃŃŃŮŮŮČŮŮČѸ¸$ & F?dđ¤a$gd7BO $a$gd(Šm$$a$gd(Š $„]„a$gd(Š$d¤¤-DMĆ ˙˙˙˙[$\$a$gd(ŠkPzP…PXQiQ¨QŞQŻQĹQÝQâQăQĺQćQçQ RyRzR‹R”R¨RöRSëŐŔŐ­­‘‚yl\l\Ő­‚ë­J‚\"ha-śh(Š5CJOJQJ\aJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š0Jha-śh(ŠCJOJQJaJh(ŠCJOJQJaJh(ŠB*CJOJQJaJph%ha-śh(ŠB*CJOJQJaJph(ha-śh(ŠB*CJOJQJ\aJph+ha-śh(Š5B*CJOJQJ\aJph(ha-śh(Š5B*CJOJQJaJphSşSĚS*T,T8TÓTÔT^U_UaUdUU‚UUU˛UËUëŰŃĹŃ° °“„qaTaK>3hGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%h(Š5B*CJOJQJ]aJphha-śh(ŠCJOJQJaJh5 h(ŠCJOJQJh5 h(ŠCJKHOJQJ\(h5 h(ŠCJOJQJmH @nH @sH @tH @ha-śh(ŠH*KH\ha-śh(ŠKH\ha-śh(Š5CJOJQJaJ'ha-śh(ŠCJOJQJ\aJmH @sH @şSťSĚS8TÔT_U`UaUbUcUdU‚UUUËU÷÷ĺĎźˇŤŸŸŸ’’Š} $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Š Ć dhgd(Š $„Đ^„Đa$gd(Šgd(Š & FTdđ¤*$7$8$H$gd7BO$ & FTdđ¤*$7$8$H$a$gd7BO$ & FT¤¤[$\$a$gd7BO$a$gd(ŠËUüUýUţU˙UVVV)V*V+V>V?VľV W?W@WAWRWkXďŕŐĘźŞ¤ŞšŞŠzkdYK=Şdha-śh(Š5OJQJ]h <Żh(Š5OJQJ]ha-śh(ŠOJQJ ha-śh(Šha-śh(ŠCJOJQJaJha-śh(ŠCJOJQJ]aJha-śh(Š5CJOJQJaJha-śh(Š5CJ h(Š0J"ha-śh(Š5CJOJQJ]aJh>Ŕ0JCJOJQJaJhGEh(ŠCJaJhGEhGECJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phËUýU˙UV)V*V+V>V?VlVľVÚV WîâŘĘÂłŠŠuu$ & FS„ě„äý¤¤[$\$^„ě`„äýa$gd7BO$ & FS„ě„äýdđ¤^„ě`„äýa$gd7BOm$ dđ¤gd(Š„°„Ф^„°`„Đgd(Š$a$gd(Š$¤7$8$H$a$gd(Š $¤a$gd(Š $ Ć˙a$gdGE$dđ¤7$8$H$a$gd(Š W@WAWRWWŇWX>XjXkXvXčŮÔľľľš€iÔ$ Ćě„8¤¤[$\$^„8a$gd(Š$ & FV Ćě„8¤¤[$\$^„8a$gd7BO$ & FU ĆĐě„8¤¤[$\$^„8a$gd7BO$ & FR Ć@ ě„ě„äý¤¤[$\$^„ě`„äýa$gd7BOgd(Š„ědđ¤*$^„ěgd(Š & FS„ě„äýdđ¤*$^„ě`„äýgd7BO kXpXtXuXvX‚XßXY•YšYYžYŸYšYńYZ_Z`ZeZiZjZkZ{ZÓZ˙Zs[x[{[|[}[[Ú[\;\<\A\C\D\E\^\ę\ë\÷\>]ƒ]…]—]Ç]É]^ ^ňâňâͺͺňâňâͺͺâňâňâͺͺňâňâͺͺÍňâňâÍşŤâœş‘⍁Ťha-śh(ŠCJH*OJQJaJha-śh(ŠOJQJha-śh(ŠB*OJQJphha-śh(ŠCJOJQJaJ%ha-śh(ŠB*CJOJQJaJph(ha-śh(Š5B*CJOJQJaJphha-śh(Š5CJOJQJaJh(Š5CJOJQJaJ2vXßX•YŸYńY`ZkZÓZs[}[Ú[<\E\ë\÷\>]ƒ]…]—]óóîĺîîĺîîĺîîĺîÖÇžľ $a$gd(Šm$ Ć{ gd(Š & F<dđ¤*$gd7BO & F<dđ¤*$gd7BO 7$8$H$gd(Šgd(Š $7$8$H$a$gd(Š—]Ů]'^j^k^l^m^n^o^p^q^r^s^t^u^v^”^Ą^˘^Ý^ěěÚŐŐŐŐŐŐŐŐŐŐŐŐČČŔł $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Šgd(Š$ & F=dđ¤*$a$gd7BO$ & F=dđ¤*$a$gd7BOm$ ^E^G^k^v^“^”^Ą^˘^Ä^Ý^ć^ç^ţ^˙^_ _C_D_L_`_ńáńÖƚưŁ˜‡y‡j^P@^4@ha-śh(Š5OJQJha-śh(Š5CJOJQJaJh>Ŕ0JCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJhGEB*OJQJ\ph hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠOJQJha-śh(ŠCJH*OJQJaJha-śh(ŠCJOJQJaJÝ^˙^_4_C_D_M_`_a_¤_ř_3`‹`œ`aWaîćÜÜćËźźĽĽĽĽ ††$ & F>„ě„äý¤¤[$\$^„ě`„äýa$gd7BOgd(Š & FW„ě„äýdđ¤*$^„ě`„äýgd7BO Ćadđ¤gd(Šm$$dđ¤7$8$H$a$gd(Š $¤a$gd(Š$a$gd(Š$dđ¤7$8$H$a$gd(Š`_a_b_¤_‹`š`›`œ`PbXbYb9cCcEcscŒcŽc¸cÚcöc‰dŹd­d˛dśdˇdÜd?eveweŠe­eĆe^f`fďäŐäŜŏŁš“Łš“‹‹“‹“xpŁĹśĹś_ś_śĹśY h(Š0J ha-śh(ŠCJOJPJQJaJha-śh(Š5ha-śh(ŠPJha-śh(Š5\ha-śh(Š\ ha-śh(Šha-śh(Š0Jha-śh(Š0Jha-śh(ŠKH\ha-śh(ŠCJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠB*OJQJphha-śh(ŠOJQJha-śh(Š5CJ OJQJaJ"WaĆabObPbYb9c:cEcŹd­dˇd­e]fĺżżĄ‡‡‡‡‡‡zzr$a$gd(Š $dđ¤a$gd(Š$d¤¤-DMĆ ˙˙˙˙[$\$a$gd(Š$„Đd¤¤-DMĆ ˙˙˙˙[$\$^„Đa$gd(Š%$ & F>„ě„äýd¤¤-DMĆ ˙˙˙˙[$\$^„ě`„äýa$gd7BO$ & F>„ě„äý¤¤[$\$^„ě`„äýa$gd7BO ]f^f_f`fjfhhh4iˆj‰j•jějbkcktkl`l¸lšl÷ééééééé÷÷÷ŘË÷÷ąąąŹgd(Š$ & F@„Ф<-DMĆ ˙˙˙˙^„Đa$gd7BO $dđ¤a$gd(Š$„hdđ¤^„ha$gd(Š$dđ¤a$gd(Šm$$a$gd(Š`fefifjf‹fŽfŔfÂfŢfţfg gzgÓghh?hźhŮh3i4iEicioiqiâiýi‡j‰j•j˜jëjějôj÷çŘÄسسسسس÷çŘĄłŘçسسسŘçvŘe!h(ŠCJOJQJ\aJmH @sH @-ha-śh(ŠCJOJQJaJfHqĘ ˙˙˙˙'h(ŠCJOJQJaJfHqĘ ˙˙˙˙#ha-śh(Š5CJOJPJQJaJ ha-śh(ŠCJOJPJQJaJ&ha-śh(Š5CJOJPJQJ\aJha-śh(ŠCJOJQJaJha-śh(Š5CJOJQJaJha-śh(Š0J!ôj2k4kIkKkbktkÇkËkĚkÝkćkll5l7l:lŔ0JhGEh(ŠCJOJQJaJhGEh(ŠCJOJQJaJhGEB*OJQJ\ph hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(ŠCJOJQJaJha-śh(Š5CJOJQJaJ mÍmęmnEndnenvnnĂníno>o?orosozo”o•oœoÁoÂoÉoío p&p÷÷÷÷÷ňňęęęęęňňňňáňňáňňáŘŘ„Đ^„Đgd(Š„Đ`„Đgd(Š & F_gd7BOgd(Š & Fmgd7BO&pFpGpNplpmptpżpŔpÁpĘpqq!qhqiqjqrq‘q’qšqÇqČqÉqŃqrröńńčńńčńńńŕńńčńńńčńńčńńńčń & F_gd7BO„Đ`„Đgd(Šgd(Š„Đ^„Đgd(Šr r*CJOJQJ]aJh(ŠCJOJQJha-śh(ŠCJOJQJhÔQœh(Š5CJOJQJ%ha-śh(Š5>*CJOJQJ]aJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJ+çzčzézęzëzöz÷zV{W{X{h{i{´{|||||ńńńńńßŃßńńńźźŤ–––$ Ć÷˙J dđ¤a$gd(Š$ Ć dđ¤a$gd(Š$ Ć „Đdđ¤^„Đa$gd(Š$dđ¤*$a$gd(Š Ć „Đdđ¤^„Đgd(Š Ć dđ¤gd(Š||||| |!|"|#|$|%|&|'|(|)|*|+|,|-|.|/|0|1|2|3|4|5|6|ęęęęęęęęęęęęęęęęęęęęęęęęęęę$ Ć÷˙J dđ¤a$gd(Š6|7|8|9|:|X|e|f|¤|Ň|Ó|í|ý|ţ|}]}ęęęęÝÝĐĐżŹŹŹŹœ‡$ & Fldđ¤7$8$H$a$gd7BOdđ¤1$7$8$H$gd(Š$dđ¤1$7$8$H$a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š $dđ¤a$gd(Š$ Ć÷˙J dđ¤a$gd(ŠW|X|e|f|ˆ|¤|Ń|Ň|Ó|Ü|ě|í|ü|}÷~ňâ×ĘżŽŸo`PC6h5 h(ŠCJOJQJh(Š5CJOJQJaJh–kŠh(Š5CJOJQJaJh(Š5CJOJQJ\aJ"hrŃh(Š5CJOJQJ\aJhKiš0JCJOJQJaJhGEh(ŠCJOJQJ\aJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5OJQJaJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJ]}ö}o~÷~ř~ŮS€‹€Œ€•€ĺ,‚-‚7‚€ƒ׃ęęęÚÇÇŽššÇÇÇÇÇÇÚ„Đdđ¤1$7$8$H$^„Đgd(Š„ „Đdđ¤1$5$7$8$H$]„ ^„Đgd(Š$dđ¤1$7$8$H$a$gd(Šdđ¤1$7$8$H$gd(Š$ & Fldđ¤7$8$H$a$gd7BO÷~ř~˙~%Š€‹€Œ€”€•€̀+‚,‚-‚6‚7‚Z‚[‚ׄ؄لڄۄă„ä„…8‡?‡şˆĈň%‰R‰S‰l‰y‰Ŕ‰Á‰ωgŠhŠńßÓĂ´Ó´ßÓĂ´Ó´ßÓĂÓ´Ó´Ó´ßÓĂ´ß´§—ˆxˆxˆxˆxˆkh(ŠCJOJQJ\aJhľBfh(ŠCJOJQJ\aJhľBfh(ŠCJOJQJaJhľBfh(Š5CJOJQJaJh(Š5CJOJQJaJhrŃh(ŠCJOJQJaJhÔQœh(Š5CJOJQJaJh(ŠCJOJQJaJ"hrŃh(Š5CJOJQJ\aJh5 h(ŠCJOJQJaJ(׃7„8„_„–„؄لڄۄä„J†‹†ކ߆‡7‡8‡îŢŢŢŢŢŢŢËËłžŢŠŠŢ„Đdđ¤1$7$8$H$^„Đgd(Š„Đdđ¤1$5$7$8$H$^„Đgd(Š Ć\„Đdđ¤1$7$8$H$^„Đgd(Š$dđ¤1$7$8$H$a$gd(Šdđ¤1$7$8$H$gd(Šdđ¤1$5$7$8$H$gd(Š8‡)ˆqˆšˆşˆĈňS‰m‰Á‰ЉěÔÔÄŻŻÄ–u]$„hdđ¤1$5$7$8$H$^„ha$gd(Š $ & Fj ĆĐh„hdđ¤1$5$7$8$H$^„ha$gd7BO„ „hdđ¤1$5$7$8$H$]„ `„hgd(Š„´dđ¤1$5$7$8$H$]„´gd(Šdđ¤1$7$8$H$gd(Š Ć\„Đdđ¤1$7$8$H$^„Đgd(Š$dđ¤1$7$8$H$a$gd(Š Љ'ŠgŠhŠrŠsŠҊüŠýŠ‹d‹•‹ď‹*ŒeŒœŒՌ ŢŢĹĹĹĹľľľ••••••••$ & Fk Ćh„hdđ¤1$5$7$8$H$^„ha$gd7BOdđ¤1$7$8$H$gd(Š„h„˜ţdđ¤1$5$7$8$H$^„h`„˜ţgd(Š $ & Fj ĆĐh„hdđ¤1$5$7$8$H$^„ha$gd7BOhŠqŠrŠsŠ—ŠՊěŠüŠýŠţŠ ‹ ‹Ž‹΋SŒUŒ &'56XqîßîĎŔĎŔąŸßŸą“ąƒąsfs]PEhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJhrŃh(ŠCJH*OJQJaJh(ŠCJOJQJaJ"hrŃh(Š5CJOJQJ\aJhrŃh(ŠCJOJQJaJhľBfh(ŠCJOJQJaJhľBfh(ŠCJOJQJ\aJh(Š5CJOJQJ\aJ"hľBfh(Š5CJOJQJ\aJ '56q—˜׍ĺćçčýţRŽňňęÝĚęĚĚ꟨••$ & Fddđ¤1$7$8$H$a$gd7BO$dđ¤1$7$8$H$a$gd(Š„đdď¤1$7$8$H$^„đgd(Šd˙˙¤1$7$8$H$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Šq–—˜Ą׍؍ăäĺćçčýţ͏܏ޏe‘k‘l‘n‘Š‘œ’’ž’Ľ’ďŕÔĆ´Ľ´Ľ´Ô–„rc–SC–rĽ–r–S–rha-śh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJ"ha-śh(Š5CJOJQJ\aJ"ha-śh(Š5CJOJQJ\aJha-śh(ŠCJOJQJaJh(Š5CJOJQJ\aJ"hŁvđh(Š5CJOJQJ\aJhKiš0JCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phRŽX͏ޏ1Š‘d‘e‘m‘n‘’ž’§’¨’éééâŐŐŐŐÁąĄąĄ$dĺ¤1$5$7$8$H$a$gd(ŠdŇ˙¤1$7$8$H$gd(Šdď¤1$7$8$H$gd(Š„đdď¤1$7$8$H$^„đgd(Š & FBdđ¤xgd7BO¤xgd(Š$ & Fddđ¤1$7$8$H$a$gd7BOĽ’Ś’¨’͒7”?”@”B”K”{•ƒ•„•†•Õ— —!—#—K—8˜D˜L™M™O™^™˝™kšlšsštšyš–š—š¤šĽšǚăšńâĐâĐńâĐâĐńâĐâĐńâĐâĐâĹâĐ⸊âŖ†y†ńlahGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%ha-śh(Š5>*CJOJQJ]aJh5\ h(ŠCJOJQJaJh5\ h(ŠCJOJQJha-śh(ŠOJQJ"ha-śh(Š5CJOJQJ\aJha-śh(ŠCJOJQJaJh(Š5CJOJQJ\aJ$¨’6”7”A”B”z•{•|•…•†•——"—#—8˜9˜E˜F˜ëëŰˡˇŰŰËŁŰŰˡŰŰË$dç¤1$5$7$8$H$a$gd(Š$dߤ1$5$7$8$H$a$gd(ŠdŇ˙¤1$7$8$H$gd(Šdď¤1$7$8$H$gd(Š$dä¤1$5$7$8$H$a$gd(ŠF˜ӘԘL™M™N™O™`™a™˝™šăÓˇ˛šÓ‡‡qY$ & F]dđ¤*$1$7$8$H$a$gd7BO$ & F\dđ¤1$7$8$H$a$gd7BO$dđ¤1$7$8$H$a$gd(Š$„ĐdÖ¤1$5$7$8$H$^„Đa$gd(Šgd(Š$ & Fe„ĐdÖ¤1$5$7$8$H$^„Đa$gd7BOdŇ˙¤1$7$8$H$gd(Š$ & Fe„dÖ¤1$5$7$8$H$`„a$gd7BO škšlšmšnšošpšqšršsštšušvšwšxšyš—š¤šĽšăšçÔÔÔÔÔÔÔÔÔĎĎĎĎϸŤ $dđ¤a$gd(Š $¤a$gd(Š $dđ¤a$gd(Šgd(Š$dđ¤1$7$8$H$a$gd(Š$ & F]dđ¤*$1$7$8$H$a$gd7BOăš› ›!›*›9›F›H›I›\›]›xœyœ‹œŒœǝȝďŕÎŔŽŸŽ{k_k{PE6ha-śh(ŠCJOJQJaJha-śh(ŠOJQJha-śh(ŠCJ OJQJaJha-śh(ŠOJQJ]ha-śh(ŠCJOJQJ]aJ"ha-śh(Š5CJOJQJ]aJ"ha-śh(Š5CJOJQJ]aJh(Š5CJOJQJ\aJ"hŁvđh(Š5CJOJQJ\aJhKiš0JCJOJQJaJ"ha-śh(Š5CJOJQJ\aJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phăš ›!›9›G›H›I›\›]›‰›ڛœAœxœyœ‹œŒœîääîîîÖÖ¸žžžžÖ”” $¤a$gd(Š$ & Ff Ćě„dđ¤*$`„a$gd7BO$ & Ff ĆŢ’ě „dđ¤*$`„a$gd7BO$dđ¤a$gd(Šm$ $¤a$gd(Š$dđ¤7$8$H$a$gd(ŠŒœâœ.k ǝȝѝážâžěž k l v ˘˘˘ ˘K¤L¤U¤8Ľ9ĽEĽéééééá×××××××××××××××××× $¤a$gd(Š$a$gd(Š$ & Fg„0ýdđ¤*$`„0ýa$gd7BOȝѝžážâžěžŸl v ‰ ˘˘˘ ˘+˘K¤L¤U¤i¤9ĽEĽÔĽćĽ%§1§5§6§8§9§U§V§d§e§ďßĐŔďßĐďßĐłŁďßĐŔďßĐďĐďИŽ‡€‡pcpZh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ hGE5CJ h(Š5CJha-śh(Š5CJha-śh(ŠOJQJha-śh(Š5CJOJQJaJh(Š5CJOJQJaJha-śh(Š5CJ OJQJaJha-śh(ŠCJOJQJaJhXpŔh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ EĽ‡ĽÔĽŐĽćĽ5ŚťŚ%§&§'§(§)§*§+§,§-§.§/§0§1§2§3§4§5§6§ńńççńńńÚÚÚÚÚÚÚÚÚÚÚÚŇŇŇŇŇ$a$gd(Š $dđ¤a$gd(Š $¤a$gd(Š $„Ф^„Đa$gd(Š6§7§8§9§V§d§e§Ł§ȧɧĺ§ň§ó§ü§¨@¨˜¨̨ř¨÷÷÷ęę÷ÝĚ÷ÂĚĚ˝śœœœœ & FX ĆĂ„ě„äýdđ¤*$^„ě`„äýgd7BO¤gd(Šgd(Š $¤a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š $dđ¤a$gd(Š$a$gd(Še§‡§Ł§ǧȧɧҧĺ§ń§ó§ü§¨NŠOŠaŠbŠ\Ş]ŞgŞ)Ť>ŤtŹ€Źóč×ČźŽž}scXHc9X9c9c9cha-śh(ŠCJOJQJaJha-śh(Š5CJ OJQJaJha-śh(ŠOJQJha-śh(Š5CJOJQJaJha-śh(Š5\"hŁvđh(Š5CJOJQJ\aJh(Š5CJOJQJ\aJhŁvđh(Š5CJOJQJaJhKiš0JCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJř¨NŠOŠaŠbŠŚŠäŠŞ"Ş\Ş]ŞgŞ)Ť>ŤĎŤtŹ€Ź8­ĺŘÎΚššššŘŻ˘˘˘š˘˘$a$gd(Š $dđ¤xa$gd(Š dđ¤xgd(Š$ & FI„ě„äý¤^„ě`„äýa$gd7BO $¤a$gd(Š $dđ¤a$gd(Š & FX ĆĂ„ě„äýdđ¤*$^„ě`„äýgd7BO8­9­:­O­nŽxŽlŻmŻyŻzŻŢŻ߯đŻM°ź°IąÝąŢąňňňňňňčččĘ˝ľŁŁŁŁ™ $¤a$gd(Š$„’„>ţ¤^„’`„>ţa$gd(Š$a$gd(Š $dđ¤a$gd(Š$ & FX Ć † Ć„¤ýdđ¤*$`„¤ýa$gd7BO dđ¤gd(Š $dđ¤xa$gd(Š€Ź:­O­nŽxŽĎŽŃŽüŽýŽ Ż Ż@ŻCŻlŻyŻzŻŢŻ߯đŻăąäąćąčą˛˛˛˛7˛Q˛Z˛ńáńáńŃńŃńŃńŃńáÁ´ńáńŹĄŹ‘„‘vi^M hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJOJQJ\]h(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠOJQJh(ŠOJQJh5\ h(ŠCJOJQJha-śh(Š5CJOJQJaJha-śh(ŠCJH*OJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJŢąßąŕąáąâąăąäąĺąćąçąčą˛˛˛Q˛v˛w˛˛Ş˛Ť˛ľ˛ȲúúúúíúúúúúŕŕĎíĎĎĎĎĎĘúgd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š $dđ¤a$gd(Šgd(ŠZ˛\˛u˛v˛w˛€˛œ˛˛ž˛¨˛Š˛Ş˛Ť˛´˛ľ˛Ȳîł˙łž´ňáŇÁł ooÁe^L*CJOJQJ]aJh(Š5>*CJOJQJ]aJ%ha-śh(Š5>*CJOJQJ]aJ%hXpŔh(Š5>*CJOJQJ]aJhXpŔh(ŠCJOJQJaJhXpŔh(Š5CJOJQJaJh(Š5CJOJQJaJh(Š5OJQJ\^JhXpŔh(Š5OJQJ\^JhXpŔh(ŠOJQJ^Jh(ŠOJQJ^Jůˇúˇ¸&¸0š1š2š<šPšŒşşŠşűťüťź źˆźßźŕźńźňźN˝÷÷÷÷÷÷÷÷÷ďďďęÝęŇŇËËËŔ „Ф^„Đgd(Š¤gd(Š „v¤^„vgd(Š „v„Šý^„v`„Šýgd(Šgd(Š$a$gd(Š$a$gd(ŠN˝½Ă˝Ä˝Ĺ˝Ć˝Ç˝Č˝É˝Ę˝Ë˝č˝ő˝ö˝5ž]ž^žxž‡žˆž‰žöńńńńńńńńńääÜϞܴžž´ $¤a$gd(Š$dđ¤7$8$H$a$gd(Š $dđ¤a$gd(Š$a$gd(Š $dđ¤a$gd(Šgd(Š„Đ^„Đgd(ŠÉ˝Ę˝Ë˝ç˝č˝ő˝ö˝ž5ž\ž]ž^žgžxžzžˆžěŮɟɳŚ›Š{oaQ?-"hŁvđh(Š5CJOJQJ\aJ"hŁvđh(Š5CJOJQJ]aJhŁvđh(Š5CJOJQJaJhKiš0JCJOJQJaJha-śh(Š5CJaJhGEh(ŠCJOJQJaJ hGEh(ŠB*OJQJ\phhGEh(ŠOJQJhGEh(ŠOJQJaJh(Š5CJaJh(Š5CJOJQJaJha-śh(Š5CJOJQJaJ%ha-śh(Š5>*CJOJQJ]aJ%ha-śhGE5>*CJOJQJ]aJˆž‰žžžăżçżöżůżúżéÁęÁôÁőÁÂNĂOĂYĂZĂmĂŰÄÝÄßÄëÄěÄĹ7ĆCĆDĆbĆbÇmÇnÇÇ•Ç($)ńáÔÄᾌԾá–ᾆáváľjľáZáľáváľáváľXľUha-śh(Š5CJOJQJaJh(ŠCJOJQJaJha-śh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(Š5CJOJQJaJha-śh(ŠCJOJQJaJha-śh(ŠCJOJQJaJha-śh(Š5CJOJQJaJh5\ h(ŠCJOJQJha-śh(Š5CJOJQJaJhŁvđh(ŠCJOJQJaJ"‰žžžÍžżmżążăżçżůżúżRŔőŘťžtőő_$ & FJ„ě„äý¤^„ě`„äýa$gd7BO $dđa$gd(Š$ & FZ ĆĂ&ý„ě„äýdđ¤*$^„ě`„äýa$gd7BO$ & FZ ĆĂ´ţ„ě„äýdü¤^„ě`„äýa$gd7BO$ & FZ ĆĂĐ„ě„äýdü¤^„ě`„äýa$gd7BO$ & FZ ĆĂ^„ě„äýdü¤^„ě`„äýa$gd7BO $¤a$gd(Š RŔŐŔ2Á{ÁéÁęÁôÁőÁNĂOĂYĂZĂÜÄÝÄŢÄßÄëÄěÄ7Ć8ĆCĆDĆbÇcÇęęŐŐËËËËËËËËËËËËËËËËËËË $¤a$gd(Š$ & F[„ě„äý¤^„ě`„äýa$gd7BO$ & FJ„ě„äý¤^„ě`„äýa$gd7BOcÇmÇnÇ$)%)1)2))ą)˛)ż)Ŕ)*]*ź* + +++++++őőőőőőččőőőŰŰŰËžžžžžžž $dđ¤a$gd(Š$ & Fodü¤a$gd7BO $ & Fo¤a$gd7BO $ & Fq¤a$gdŹs3 $¤a$gd(Špling methods , Reinforcement Learning- K-Armed Bandit Elements - Model-Based Learning- Value Iteration- Policy Iteration. Temporal Difference Learning Exploration Strategies- Deterministic and Non-deterministic Rewards and Actions. Semi - Supervised Learning. Computational Learning Theory Text Books: Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2006 Tom Mitchell, Machine Learning, McGraw-Hill, 1997 References: Kevin P. Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012 EthemAlpaydin,Introduction to Machine Learning, Prentice Hall of India, 2005 Hastie, Tibshirani ,Friedman, The Elements of Statistical Learning, 2nd Edition, Springer,2008 Stephen Marsland, Machine Learning –An Algorithmic Perspective, CRC Press, 2009 COMPUTER SCIENCE AND ENGINEERING $)1)2)ą)ż)Ŕ)˘*¤*ź* + +++)+6+8+9+:+ďŕŃďÂѲѧ˜mXTPhŔAhÝT‚(h @ŕhÝT‚5B*CJOJQJaJph˙"hÝT‚5B*CJOJQJaJph˙h}@hÝT‚5B*\ph°đha-śh(ŠOJQJha-śh(ŠCJOJQJaJhXpŔh(ŠOJQJhXpŔh(ŠCJH*OJQJaJha-śh(ŠCJOJQJaJhXpŔh(ŠCJOJQJaJha-śh(ŠCJ OJQJaJha-śh(Š5CJOJQJaJ+++6+7+8+9+:+ňâŇŇĐĐň$-D`MĆ ˙°đa$gdÝT‚$-D`MĆ ˙°đa$gdÝT‚ $dđ¤a$gd(Š,1h°Đ/ °ŕ=!° "° # $ %°°Đ°Đ ĐśrDdA ö ƒOđ|˛ đ ł đXżaŒű| AÁ?ż˙€ĂżPicture 1đ€bđćqă58’§>ßŕޟ{A˙ÂqDGnđşqă58’§>ßŕޟ{A˙‰PNG  IHDRŻŞT=ˆ‘sRGBŽÎé pHYsÄĂÚj˜ÜqNIDATx^흼U•ř§ĎüÚŤé=¤Ńť4‘‚ `G]\DDAÝőogíbCÖRQDE@Šô˘Ąz!ŢóúűŐéó˙Î;îěoCP_Œ’ó—ůÍÜšĺÜsĎ=ýŞa*Ż+Ž4ĂTźŘwb=T•(ÔtG3B7RuUՓXÓT%Œ\ÝäĆ#UUâ×`ţw”ÚëgŔŚŠ†nĂŃm…‰×4ӌÔ$TB]qĹĄ˘%şa(‰ÇJ˝~óşÄ†Ŕ÷͜Š4”PŐüÄ 4E‹ ßP4E9T5‰˘(Qľ$Qă01†äőv˝ŽhƒŽëő(`ň5]Ńíw‹şď]YFFI”Ć‘"DFšĆĆńzDP˙u„ 0ąî$ŚǍnĎšđ™Ę—î^Đ[KTK÷ă$Œ#Đ"P¸ 6‘×ßő:†$Q,EŠÇŐĐČ]řĐęyÝĆ<×<˙ą/QTӈŢGšÂ6C$Týő‡ Ż3ÚŁĐ° ýŠëżY^V<Eő‚EáóKV%ŠaˆDôb§9^‡čđ¤ 1ëiĄŽ:ğĽčĚŻť:3ŹT•ĎTô=ťáĄľqĘV¤(äĆ°‘úkpüMü~ Ž&0ŻA‚â@Éń™F˘ůA—Ť~öŢUnb'Z˘xśâ(_V"Ś]ŻUƒo.Ź4Ş.ŇŚc:A‚f tzÝ]ŻAlP5[ ´ŘśR61Ő8{j†ŞsѓTżĄ(mŚ$aÝvÚTŐ"…öĐâž+ŸęˇľęÇN‚%Ż;\xMĘHŠţbŮҔXő$b%w÷ŞúOçw鹢Ĺ’JWm˝ŕšeՆŤ(šč!˝đ˘çˏŽň‹ŚĄÇ7$Ě×ČbŁşeąëctÂŕ (Î"WůÁƒKŞąnĄćŘJ8¨YP…T5p˜uEËE{c=úŻ‡V7-1­HyCűôÚŔ3‰˝ZNˇ°D‰ůĆďçŽ{´Kł˝Řs‚0ŒL]‹vˆšĽľ(ë˜ŘŽĚ ‰ŁÚc‚ď=ť1Ý&’7ř†×6XĄĽ˜%” ŠęVUíŃ%ö„věŁPLԌąę v¨‰îC ˝žŒ0ôŠ˘z‰‘óĂÜĺs6<׍Dj]O`:ÂDŃzi1Âh„Mëľ(…eÓţä"]=Ä&&ÍDşŃw揍‡ś("ŐÄO”|Pt#ÁJ™ÄI€4Ąšâ6ć[ˇ*Îgî^&šşâh%pÇ0ƒP1´-–ţZÖCźąÁR _rŠ0˙čšţŮ+ŠnŤ‰™­ąŽŞÁŽcŘËXlTşfZš•JŹ×Đ\FQĂ4ĚŮ˝ę÷çŹ3 =4,=|$”@ ^äó•ńÄÍאqZ™˝Ú˙ÎŁ˝VŢöŁž”DuäIMk˜šÇDŁuˆŐ´¤— ĽˆŃĘHy…ŽÄŻBďĘyýsÖ֑4Ą 9Ăh¨5?¨,|˘^ĂřđÄE rŇŸx˘ýÁ†bĂP&ŞŠŤ˙ša#`Ŕ>¨QŹ†>JĘԖĄZŞ ŘUź¸ą!pžőpWk4Lęň’Ň[řÚI^‹ű Ž-6ĹPž9gÝS}‘Ö+§řy-ŠŒČ՘wE… Dş›Ha%ž׊„v`Ɗm6š^Hżoř÷­m\úB”S‚ p˘śDWjzŠDoІí 0€7.ďżfţ éačiz &ů$ $2^Š0 ŽÂ#ĂôĚźy0%ŽFf.˛lŹšČŞŁB<Î}şëń55Ő."‘ĆAXĐUÖk÷R_{>ӕş~Â=ą> 4Ű2ę~Œy*ßZŁsƔŽÜncěé-ɘ„!D†ˆPNZqĽ­ŞŤ{Í9˝˝kzž>*Š÷‰ĺĺ˝Ă'n8nF[ąŽyN˘Ö#˝ňZŇí çąfŚŤxŽj×ô×VLR(žcŸľěQj6Ú°4łÓ—\}ÁüPńĐ7MSŘxŔˆ–Ăw{ňduL‹^ӕbä襛žŤśŔ4Z~÷¸( ˊ´N޲Zp˙ĆřÎyľ9=ĺŢ:ŇęŔyNůĎGř č %šnÔMώC=ÎÇŢՑQAłĄ…E-)Ťf‹ęÖ<Ç°#3T¸SŞ‘ZDˇ“k;ŔOŻáo ihŒ­Ż5ě zâÄŞŻÖcčźâéAĹ9<ăƒzđHˇwŇMý°rř¤QogżßΐFÎ3Ź.#4j!­ŠÇÝšqń†ž§Ţ=cLkŽUżÖ­žrgď3ę“G˜w˝kL{^)&ĹÜźěî%á.łZŽĘéżZÜ˝žjĺóúom;h|űiwžpOœ”ăg8Ÿ˜Rúňă•Ő‰g%ÉÄÎ\’čÇOlůňí ĽQR W1,E­Ww˝˛ť42šăřÉíE|ë-xR3RZoőĄ•ƒľpĎq­ÝŐÁőn2ŚčÜúöą&ć=ľnވŘÔˇĹv@ Ý O؋Ĺ4$ƒ˙ŔŇŢr%wÝâţDŔLĆľ)Wž}D] WŹŽžőÇJŕŐŔűůq“'ŒŠ~ȘŻ–{ç.ŁNĺäÚI3ó#íň—÷(šVýćC:ßžÇč3÷–ý/ě;ríbÖ/xbŐ7î[íÓvń“şĽ'\¨>Óܡ+ŚéĽnŢÂőćżlcXżóäi—ż-óIS'ŠŤ`Qu?ŒŇ0…Ží).c;Ŕ†ň#Vh‚ęaÉTó—skťŒëH’Ú]+ĘZŘ_ˆËp c ÖHľ2zœyÇĘęˇ] ‰ôţăĚQĽdĐtJ¨“°„R"śľES֙yŁ˝şMł˜ŤiZą_Šk‰{ô”qjÝşśŽ€Đ0 ŕ 7żzĄ<˝X ‚ňĂëť°lŕ)Ĺ-Ÿzp]lX˙šÇčq­Šzí]vô˜“§TÍ ŒŠŚäa5­í*Ř{;Ŕ†”…ÄŃîĐŞ)AcöÚĆyoiaá=UśžîľBŁ3ƒQVĆ´ýɛgŒ°Ă+ćÖŽ[´ŢF…Š2Š aäĹđœŁËZ#fœřžÝâë=†F˘ĂO‹Ľ†Ţ„ĆÓůóúŞ’Ó>0Š­Ąš0–žşů=ţO˜ŽjΜőÉÚ ŹhÁŞzđđZw„Úąk‡RŐBMkÝFç’Ďžy;F‹e[QIq=xSXÜí†kŘ.źd5÷÷ŔˆąžęöFç;Q8jW uňŁKjž‡ç&ZĹW•vĐÎŘ'úcőÍYÝiŕ‰Şč/=˘ęŹD+†œę‡’ÓhG劁ĽËlóŚóŰUő“n›óKő“§LůÚAŁ °AĹrׯj:Śő¨)ľFäćtő<łźŕF…ő}ƒ(1'’qů|NÓ<­ ŠŔ€ś(úş9 éuĂ°ńQĂí`˝mOžOş[WSąŞžR›ýbíŮŽĽ˙s×Ún;4‡փAö. šĄ†jô•ý&˙ێąďđýƒŐ$ˆZ(Ĺź‘ôřJÍŐr‰^Ԍş…˙“¤ Şj{÷8ŢţÄ̙ŚŠ?şnÝ\ˇ_1Ť”$ŹŞ=¸dĂűg÷l40†*w-íĹ{ŞÔ–­j>&ŃĺÓúŽâÉżß°ó•K÷űŐÂűşĐľĄŽ;!J–ŃíçÚ0‡Ľ!˙eäĂÂĂљ;u|nן>¸sLɘłžöB—ŠIZ5JŠ‰xa˘ŕň#:÷1fý@ca•u łÔ?čŰ­…Ř°u\ †×ónE‹x>*–4lG/¨•v´Oíw•“ Ť+I›ćťÝjK­żö™cĆ|a×ŃŸáhĄuďşŢ5ecĎRnj^[ŃH–”ą?8Ą-:lşşąË…Š8t<2Śbă…3„í“:dűA†íÁç30•|Ý ľđÎĹq.ŃNÝuÜnăďœbżwŠ=j7-ńp•gs.U,EJ.ÎYÉUGçGˇiëjŠc‘ËG™TędV^Đűźh•[˝ç…lOq¨ÖŃišŠšě6q€~ĄüŠ#§–ýţĂ;Ö÷ÂŹ\üÔƙćűǡě1!>mçś}Fľ-ŻG÷mčS÷óűOŔÉöúĹ8D´Äf0:°k†ŠGy4^#xÍ BŹçčQˇ›K˙ÚמśwVM‰ŠŻkčyxÝ@˝ş×$gzŠe}Ľü‡Ĺ•ýńÚş¨îźľľű–VfX…ŽůœŠĹ]GZ/ŽŠ|hďL}gkaů@ߍ˝ykăÖןě"ö* jVĄ¤ZvňŁy=k-(ě2˘x@ŤšÔsé¨Öôśź˙9ŐJ`î˝s[‡Ş>[őî\VďŠDkť”F'ďÔjyęÍËşçőÔVöčXçozŽž8ęí3[c´l_:’…FlVŰ yŘ´O쿪ľŞŻňĐş†ĺ›ťO˛wďTvçg÷Ô& OŒ+=zŠXŽÚ păwČ獼Ż šĎmPvŸ:Âłƒlh”|ޛç)ť÷ßžl]e iŤ”ű§Ž-ŽďO4{ ×ËíÓćě;Éꎯ깒\OdZVOčŞoŮĄmšž{v°:ż+rňIĂ×Ǐ ŽjËE†óČ@ăá…}kCkR1ŢŤ˝c—ąęx4檧JńZbé9ߎh;šśl8úHŤFJ‹…vÚöŹšéHîn6Aî<1÷ib7Tş(őF-#š$HÔNŞîŠh$# Ś@1Š)=bsECűě˝Ën_Yeĺ늣kV{[ýˇí:ľ5 H#j)!éE1_%őşiŮItŒß–Z!KXD +őćg—@^ěä1‰÷mÂ$OÖ”šÝńmŘ@üN^Üo&íiřľaĄŇ!ČŻŕaŚăĘ ¨v޸Tçt™¸Eě7Ö ź°Ť7œ?Xťo}ýŚEĺ Ř4ľŻ$2Ę’Üť÷ąUŘ­˝uF{PĚG=Uݴ̑šëkŐDoM@ÄuÍ0 FŠÇý+ÄoăÍŕkça{Ąe0 Šĺ›ě ŰOHçv€ šßPsĹ0qC6|ź™˝¨áÔ |ă^ÁoŔĹs2rúkןäţńž™íĺ/ě3aöb˙†˝dôp–Â&Jú—$d2UËĹS!.‡zg“'YűM}çŞn+.\tXçÎ#l!ZOÛ%¨¨IÁÓ̔qŘܕZQôšT­Gč“šäŠ_–üSiţ–Už`ƒŽŤőZ¸"1;ő`ôăZUKrŘ^aV´8úăKőoÍŤ<˝ąjš‰Ú’čmaԋšŘŔ >IyâÇŚŢćGxV&8;řzE5ŠiŠČ lXĽž$ŹOksÎzóřSŚ;­–Jt/QNŽ íćAÝď‡ĎŹŻ5Ą„ýŇľt űť­YžO@ߖÍÍżţŤí@IjĎőąőó‡_r"„7ľŚŤE<^_™5ÇöśĽƒOŻP–ug¨Bż›p+Ň~%ĄĄ¨5h‰’—:ňżEŽŇ°akŘŽăČ6J01Î/š3ŻŚœ}ßźËć­ĹÖ@¤?şKĎ Ř9B Ž4ŁĐFÁ˝çWť8q’e*1Í0ĹcťQ60„íĚ(ůœ+ú㑬Ń@ˇbœľżĚÁːŽŘ;tś@DP#hžąÝ&Žěn -1&E÷óEďŔ)úűgęgěVÚg‚3ł„q /Yޘ &č!˘Žƒ]Ă´lěU}źÚLΨXYśîE‹{žx{/–E,fl'80˜ÁؖüĎ™tě¤<™ĺ]šĎŔ!6 Ą‹ö˜d K Ć\XzŚŻň‘Ů]sWÖłáť#qŽP*>ŒÄ‡fŒ˝řȑzRÖ­˘3ĂPŤŽłwoX[ćřúE}¸cýŰŚ–~ón ç qľ× kˇZ¨"ü ٸB’B@\1x؍k5/Ý{¤ÝF‘ךŒbŰ #š ŃԇzG“.=ˆoĹç>]^Q€¸KěV0ęvĘŰéřtyi$âPÉjĚY5pѢőż]ÎíąԀy"ŞúĆ(Őżš¸˙t׍ş§î¤ťçŽ÷ŹůžŮkŽşaýoW˘Ÿb?wŐ`I¨|{öÚwüąüů;X+ő–*ncT[ëďŢ5~LGŃ9H&ą›Żz;÷ńŃžűW˘Łě +š@§l|`°Œę8LhhÄ7VçÎé \Śˇ!˙M:´ ő-5@<ÓRÍ[–üţů>MľÉăßâŠ,CR‰ăR Š÷ˆn3lœp„ )§ć°Í‡ŽQuýĐšęÄI'ĚjiřrţLęž°wíęwŒ:pf낾ąřÓĆŽŸ˙ťęćTűՒsçşs7†ŠšáłJ÷ýűLŤĂÍŮNŠÝ×ď:eôNžâm†fÇEúQÁ öÇO.[WOl\lŇ´iX¨fŚý2čĚľ€ÍHŽŠîݸ|અ¸P˙™›mö4”m’]žĎ)dˆëŤ”óžęG°Oˆˇ×Œ8ŮŘWG|OO#ŮźˇfA*ž\ßw犲•đ.q‰Ł‚÷ĐŐsŽœzđ”zÁŁG´ÖV˝mGŮ­%úÉŢă~{”säŒI]V§gvUľ%~<2 ŢťÇČç>°ăŮűŰc:ăQeÓJG‰ČO6ĚsNeŚ1žm&!)xĆÜżŹoö˛rÖKpV˘âύB´ŤF‹Ż5˝;ÍŁ‡@T#†#ĹG?ŐŘ5^,ĽŸÇ,ĺŮ_ňJäě?-üS°_6ö7ĐR0'ćŕ<ą†GĹVĎąüďěf^v̸wqČ÷ԝ;nx˙řďîßšÖ¨ÍjéT+J/ćs˝•“𺍊ëÔżMm}÷NúŻ BâŽúŃV9ĹąĎö‡ŽĂ™7!XÄS ĐńŔǧÁľ5ÄHĄcŽső yéĺlă6‹Ż6 łĹĚěéŘ&ŮtţSUŚ­obc-ňě§×W/xzY`ś3Š¤ŕIâ†7§—^˜•I!^Ń5Đ˙‡DČ'ž^|ó$KőjVdâďžÓőłwWĺ#2nŔ9ĆN*ž5ŘhěԜ”o8cŤÝô6”ë]jřŢ)Łżž_ŽƒićěCę˛Ý´Ă?Úú(˲—“CPűÜ[ÚÚ´ŰŢő*`ƒçjśI&xR5ÚĄÉjňC%gxóîąţšÇ6`VýŢ(€,ÔHŢš¸×ĺ œSçÔ$pâ]ÎŢĐýŘĆ IžÝWKQŘkBá¸I˜:qŠFBŐÇۢĆĆՊľĄˇŮZC­LĄëDđU­Şą¸‚š˘}L‡Ś9Ă;GMЕţ ‹eƒ5)kƒZ ˘2vśG|fŃ6áWJŁfF˝A|÷ŇJ>@˛ľpœĐbS3í$*¸^ŽC?˘#)§ŰĆΘŹá?şj}­ŽÄ#-ô`‹MźŽz“2ŰŢő*`ƒ–sPăkž5ČshUO!•p´Â‹úfŻŔĆh:82ëاSŚL[ԟô6PCŕŽÄšuxż“dĽlDćŤížJN#6˘ŢŻá)“‹#Eał•ÁiíyÍóüŞÁZÍ뎖ôŞRw– ɨ‚…ƒDĽRŽŮşšóŞäáX´ĄďŮ^ ƒ‘ţÂ@ŘĺUŒ g$†o›nš(ˇČ/†*IŽ[Y&ţš<jGA:ąhU]]Ţç*xŃŕz ă0V ş6w°ň“'R–gčĚ,‡ˆڊmďz°ÁMŇ\ čďU ƒf7L3ip^քů=ŃwžčKm@> &róĽ >“Ü(QźŞ<ÓE@:FÜÓ8iƒ“F=ŢŐ­ÚŃyËWĚłCŽf:fPca,ŇUrČ2ł@ÍŤbŰ´ě _Š‚ š†•ŻŒjtî= 9Dš§Ż°˛\é ;ęýulçF˝MőZŒçfŚÚZm׎⁓qąŃmüYÂŕUƒ‡báJÇ.Ǎbaűóę™=Ř 8E‘ž§)+AÉ4z_ťr~ďkzu2Ą/S#(ŕ"ľí!ĂŤaSÉC ғeĐ(x˜Ÿ†|̑×+Jh~ď™UŤűaH Żáƒ¨ŘQš¸Ů‰ "gî_ ˝ĹxHX–ĽJ†5ĄşślpxŤĹńÎ-ڌ‘đŕţnś”$?A÷č,.íî>v‚Wö•Ž¤čUTĽR4ŰÂ9ÝŐ=ƒ;čޟÖ'mޝĆ+ZJŞKţ˜v{ź Yh“ô›ă§ĽŽVŘş-WŠXĎŽňI-ƒ—Ž˘Wy^ňí[őiîĹä ašđžŘěkN5pżůLyý@Ź>ŠŁ@„Tăşí]Ż†˛vˆp‚fâ§Fv/Ԋaě˜~ňťçoZZs4łĹŁlA UÉť`sƛ,š˝Śźžfs¨­%úâG–UË5ƒšÇ!ŞŚűŽz…\€'ŤúÎ9łˇË{Šć~஁uUuEˇJ;OjĚéNÖ§Š˝umd.ˇ„lpnńŘŃ-=Až–Ô÷čЊy§+ŠVŤ}ěRčžb-_Q˘Ý:ČۀyŒĺ˜fńżçuÝ°ÎŻ+%ěežáŽîi<ˇÁ/4ŐXRP›Ść7Ň âBK˛Ň9+ŁË^ę3⟥:.ž\!šĂśšëUŔ8qVUş‹8 7{(“Ö„-çĎíö}ś\ß!ĺ;L§ÖY‰ná Č9ŽŹúŕz/M›˜Ý ÷ÍżŰpÚ}ŤW6ňVÍđŞĹ¤~ŕXD,~œIłĆƸĚ>Ť%Ş÷}ęî%ŸźÝŸ˝zG–ŒtÚÇ畵‰‚+äc}ƒ'Œšcn˙ŕăK*§ý~㲆wř”â8U=dĘřĄ\=¸|ăƒKúj^Űąwk)ŢźŚ˙‘•Ü˝ö+÷­>yŞsţA#/8pÜq3L kŃ A˝0‹äĚľäƍ,…Şo%¸]aÁԊ&šdČeVŐëV٤™MĎ_MSƒ5Ŕ5!!I‰ú-,iĽřç<ś‘€8YOŮź‹ďŤK.^l(ú„;TŮY‰Śö‰‹ň ˝.ÔâZ‘ä ĺ#iľ0A°Áwą\Ä ]­`äćŐŻu/ĚłřŹČOBŐtŤÎŠőQU•œMŤťłí¤OŐ .Ž(F˙q€~óń#ż}TëĚI…Ľj?şťňŕšh¤ÓBXŐEsúžxoĎetíŃQüÍťfýňؑÇOÁŠľáŐú|šő-ćL$"żýˆ=ČǗÎ$w˜ďäâ n“cҨ߸rpőş„ŒĎRk ‘žô_óŃŠ¤Š=’Ż uśďÁîđGU#ŰwĐ=l{׍€ >‚DTä˙0Ož’~+ߘ˝¸VEpp‘ßń1ĆżAˇ5B¤`čIęg}éurî9Šă7KV5"ŚßVŞXŽ0[¨~ ™â‘Ýü@5Md>ľJ|ů8L˜@â*ÂdJ‡ůůFßtŘřože¤Ý1X7]'ŽËQ|ő‹kg´Ä—˝{âŢŮůŢY%ŐČťZ”PYóŐ°hjU7Ź Ćf‘ä¨9,ɲ#Ąn ňí‰Zôű7ĎpźbjŻH@âX\éq™ľÓŒbłŽA5ŠŁ“ˆe@ůéܗXçÇÁś˜ęU°h#ĄG¸qԜŠą§ĄÚY÷÷ŕěh°4‚<ŽĆ)ät˘ 6NaŒś UďH”AÜę!‘Ţ13ZČÚ÷\uM)Ű ĺ5qÁŒ>ś÷¸ şÚ0˝;7Šî”ĺ(L\Y¤DÖ'.)(—nˆnX֏Z€¤äcŠĹŚäÚ $őÂČđ ĚDŠ Ť–N‚Ž8ĺ éFęlĄô&WŽčîŽô¸á2Ґ+Ʉ6ĺÂcG’`ëż ÚćhÖSŤšŘ P‡bˆ/“†Đ*‘ń”Ëkԏš–?bJ›˝íQ‡Wđ0Ĺ7$GÖFÎ.Z ?‡Ä„˝†Ů‰ź€[“ƒC PÇ4PĆŽGž…ŞFB§Ş’¤!.Xę! `HPŔ”¤×ěF!ÉWŐŔĆŰ)Â"Žt?čăD' dK.Q*işyÜMľW ËëŁ:[,ŐEĎA.ˇ\Źš'x;$_l%>‚€ÚˆP˜â,ىrXÍ7ÉâĆšąFL‡Pŕ+GlĄV†âú ^QÍĂ'[oIĂ,­Č"@‡ô˛¤nň<–ťĂŃhĚ&źƒMIt ´ÂOŽFCł˜8Šń5F˛”;„ŚĎ8Ě6˙˘Ě°„#giƒjÁ$°Şź Šr*‚a‹pĐ%#:\´ {éšŘó‚şĺkŠSGłKç‰lÖ=_‹ˆ}"W"Ýś_Ďli!Zž€$Ś¤Š|˘ŮŕňŘ 8ŐĚ\ŚÔ$(ňŽĄŘޚ˛úí'—œ:cęţc ,JŚqđÂĆyĆĹk‚lć>ŽŻĘ5 {ܐ „uGmźsâČvęĐÍ ĆŃ@mM)‰ƒČ5‡kźbÝş¤źŹŸľĚ SZĐë~ˆ*„HĎž‚ %(@a>jś'3ŹĄ’ 8'!š¨7ę8nc˙ÜÖřČW‹LŐI&FĽhň…O Üą˘ŤXʝ8śclťßÓ[3~ŇŻžXŇíŰýŇKˇ.ŹüdAyżÎ҅GŒťg͆Ż<î3/xkîąľšŤćż´ck§c¸O­Œóë3‡´3ş”cˇąëUČí†Eţ,Ž D˗jĄ’߯¸syĎőóŤ×ź¸aćHçŇ9垸ÁáCĎő’ĹŮźl~ßŢ3GÝš`힝­/ö‡ä™~zmBşÝF´<žÚkń’-öŢ:Ę[Ń%ĎU§v(óV[víw+Ă%ݍƒZŰďŮ8xřř‘—,ŽŹZŻL,Ş8F;Žűç’S§k×,čď°Í÷LoA–˝ëĽŢ?­ŒŽ{Ńűő‹ ŒÚ‹űn~1˜^ÔY§6=˙ńť–í>ŮyĄ‡4Ä~[˜z Ÿ,ł—/œŢaߡžë¸ÉŸ}`ÍÄâŘǖőŤç󺍒ŮÓU[^+TƒĆíĎ{ăÇ׿ŕě>ŢďŞDŚ“֎|›*^…‚ƒ˘T=‡“ŁéĂŐՈjŞxƛÚŰ>ľ÷§íÜ9łEoÓÔOîRüÚ!Łú#㶗zěH~sXiŻÉ#Ą˛Ěw\‹ă‡&Nűö[:°J˙a}CąÇŰJ‡Ý¸lążŽŰŰâmmĹF'_ą>źSÇWł8&×%%“]ţŕ>­_8=´öđzc—ÖęšM:lĆŽ‰5XR 7•­ł÷hýĎ˝Z§{ ýý{ľ^öś1‰ľńżçŻžVqÇá;źmB!Ż5*,qć ÉĽ_‘ߥ͟ö9Ż'ÂüîľóWĎďÓŚśŞĽ’ś˘o}˘yGL×~wĚÄĆšł_ˆÍ˘qř𵒳Ń…´;Ż6 Ęuśpv˛8˘@b$‚e÷m}hŸŕœÚÇ[ş ƒ•—ď}„ÁĐX޼ԃrŔ1 ËŹ÷VF’sŰKYŒ¤U‰ŤË‚d|!?Ëě7ŒUľÜ$§2ś3˛[ęŁÚpo.zgz°DK "Śfľ†(¤˘nÍ~qcW•ř)łŚ‡8á!úÎęh9mçŃœ9bďťžŒÔ ô<ĂĚOŢÚŔ‹n\{}#—uźÁ˘ACÍŰyT¨f0čöU‚IIi/ô 9}őzĽĹQ't–đěgDy˙Ľcwlß°žńƒÇ×Ç]ۢ[ýŤ€ ŠŃ0#’сŽÄËs˜@xÝBďЛťťmíľ ťÝrÚ+Â&úĘÖűvł0pžeĹÂ~XK˙Ç „Ŕ¨Ő*šţ֊?8mtżž>kÎjď흎ߊTŹ×Źg84_“śI Z4Ř­‡cdʤü‰ÝŽšwԎZ_9|ű˝+Ź4Â|)É9ČŚ űŽ—*ożő…o÷ő'ĘĄ˝Ţđ;‚Ŕ)—ľ˝ĆT ĘŢżY|ăRO/j?ˆż›”‰Í rToBÁ›\j]Ś¸+zźĂgL>xDŘÝP^ěS:Z”b‚ SŽóÍçV÷ů.´ˆÜ ]8wm{׍Ŕ7(z]GóOČlz<%žmf]žĺŘ1÷Ý2šXÜ{l<şŞĄě6.>ÜľßĐpwa=NŰRg*ťśÚeœYö”ÓfľĐÍ/Ťď›š?e—Î#´ĽýëŰzöŽŁc?ŘkŒ=Şd×BýĐÉ&Iˆ?r§6NŞ1“¨´ě5ŠÓ­4ÚƄÇěÇ˘§ľP° –žKąpČe‚ŁL›•*-ö­ zöAăóƒf ąř„)ĆÔVkÇśÜŘźwŘhN&я™4갉Ęň^㐉ůOěćŒ•#ĎŘAíí§îDJcÇVećs†3nžWžX,|mŻÎi8ëf›óqxd ÉĐé x0 ~‚Ÿ‡Akku‘žžjŹÄç7˝X=÷Ď}SŰFĚŢ°ţœĂ§|~WtB9•źßř$FžoŘvŘŕœ)΢Âl[UL ‘_â\ËH-FnH6§4ŮŹGě&iŞńš UTłtßÂţ˙œ˝qvcö€˙ýŠgí҆†Şc“ěKUҔ¸ňúić0eFĂxޏš~ůÎEÜ3ľíŇúŐZ ´ О“ Ö ô‚ ‡ ‘é‰0bŇŔĄöŔNőI8FÖiL°dkDi(…(D@mqžŰ֨Í@p=0qL#Ł[ěc…Lˆš6LŤśĎŞÂëyÄ}W娪ԭdL›Ú‘˙ŽíŸŮąŐĚš ŐÎၖyΖ_ŐĚRH֗<~Š¸Ć‘­a¤ę)&ÜÂčLŚĽJ@>ŠS'ĄŹ6Ş”ĂÉz0tŽ™ şď¤|Ö<Ç!Ż0G”B~ˆ"NÝFAŠ(-¸WĆJŸ8ŠpÖŽmíE’áŁKŻ‡‡¤¤ FLeœŤJDŚž¤á—…žČ3@ĺMŹXL‚dCxŽ˘# *cŤx5śéżŠ€ŻmŽtľZŐÉšŹÝ:ÎDˇYuź¨qxÄR€5Ú!­npv\Vľöj5fŃdÓ°R’Ń€ĂHXQɏg”ĺb§riěU‚Éí¤RňzC˝•CÇĘŞG¤žĐTČ Î7JĹseÍ É/ÎvŐŻ&íxćSE˛I×xÂu{ĂpDlř™â–4Ú:Íá}oYŠŤI Nś&œŽw5o9ąn‘0 ľ(€8Ăŕ*CÎ ÍÇj¤>‘8|bŠŃ}¨ËśF^ lŘÖ`0ĚţHÜÜ&a×đ‹_&„šh|"•6‹ ]k—Ż¸řwŤž},t|+ŒŰëöúb0" ;ö|Ëţßů/WEÜU#MÚ­GkďýóŇîězö“óŤJ¤â4âFŘňŚ˝g}ňßş~qˆž÷ůš„öסH@ŒA&€Bäę“Ţ7lk?č쏻ů’îťË˜=p˙Ă]Ď>œŚ„KýŔŢ}ňčq{ěůĽ˙ĚüÎ?VŸ}ÉëYMâ¨'_öŞĽĽěčNę"]ˇNM Š¤¨?ćĐÖŔ2?rƞӔşÓĐ çÂ6–#?ŠŤŞŠÍ+`–<>qńvŸĽĘœ„C g~úÝŔłöűě9‚đčĄm¤Gśn>ĐŚô $ßnÔŢĎ]sýŔmłßzZöąÓ§´Mؙ™ť=Uťžçă?fÂ{NÎGöM§žşóG>:éȡX@‡ŸŽn+`~ @ ŽŐ=czˈŽ“žgX(ďąGm7ĄÓ¸Ž>wÝŻ?ýŽŠĎŠ6šNŘaŘ&ŽźäçÓĎ8 ďv˛rŒ nŚ,SVîň¸ţäýž‰ďyç!—|Żľmšďłę*¸Ëţö´3ş3ą,%Ĺęcď0­ÎűögŮĐ ŽaDőĐ(hRCĆĆşyÝwÔÉa˙Œ~ú‹żĹɉ]€r¤ ĂGŢ˙ąĽ7ÝÄůÉŠVI’˝Î8u≇ĘK’ž§ZtŮŐĺľkě`dMˇ§Í:ôâďO|ëŰÉiœw’Ś™ vŠœ0AziB0R>ÖËĂöT6ü|§G˜üî§5ě\č,`VÔZžŕŒŚëŮ 2 iź›#ŻÁÂ[ŽsÎ7Ş+V`›ô–#÷?ç‹-‡b˛ń@ ˝Ţ]pţňëď)´˜Î”s;鞻Ko9šŔ–Sš1m˜×V°aűœ÷ËŤVÝrc­żoäď´KÄ&ć)Ŗ̌–D{⎝@Í{ř´MÓSíbt=đpÇ[é3Ňčhě éŔ‰—šĂ„Ęłsű_xáċ//LßEsąFa JłÎržÝsż˝–emgú‰Ń9áś{pˆ6°¤AÔ ¨q“עöŽ6._Đť`ŢżüuąsŒ˝UI,˘łĚu’Ĺ´ë‹Żť—8×Q0Ą=ĺÄÝ?tŞ9i\çř™#ßrŘ´3?čŻđžzŚŽťEĽźňęŐ]Fuěśş‰ă5eâŠAfژ@<ü0‘ă˜,|éW˙úWŤŽżĽÚˇąs§YťíWACďŘR2Öá˙hŻą°a–ˇžý…ů_üŠďöŔÍú虇^wMqÂ,’ŽĽšđ B}Ôü¸ ;Ÿ|rq\Űú‡fť+–öëɎď˙ŕˆń3 úBÔç𽍜éÁ FÁÜ_”fuT”.˝4ŔËü•ăĘô¤T4}Ěžť“e<"z!ô[áCĹ-÷=ůžÓŤköFN•!,ĆMĎ´ Ô¸tŕîxWŰî—ć&"Ę #¨Žb’]>O@ ;H hŇ1AORƒ"Ń ‘Ő¨Ůý™cěœÉ¤™{7|ĽmÖ´Čç”ŐäüásI݊uˁ-i#œˇšT ůˇľFœi¸zLfŔBĄsď ÎŃFv0Bßő[Üg>yŽ˝n#Źb•…˝’e˜ż‡Î 9Ě1Á~„‚ĺ˝ęŁç]`ࡼE/ýęš:š(0šŞi&šf.˛Y …Ă…/yôě/Ž¸âgř ÂpŘß#~rńąVWmźt=Nn1Ť–ęCŞv:ó{\rQ#QZ`!HĂţÓŔ×oŘL=ß Ř`jĆăżžŇ[˛ ‡âW<üH¸ň…ä•Ďˆ%łKĘĘř”A Łu4n A–óާé}Ëßuʇca‘‘4tTƒ hPťqęĚâdkMsĘ ďÎŚ×H€ ”—œ%I¨’ř’‘ËwZ˘v"ŕČ2.‰e‰čÂí:ĺ8U'ĆŠ"ĹŇ %–8i4]¨ŰśŢ¨aXŔ›%H8@5ďű5Umí˜<ú# ą™3 œH*}O_{¨ë¤ÓłŁÔVî›XĺŮ(ą˝Çî‚_\Ž[ÎŃťšŻ,šçž`ْôô˝sňĐ3ş^+GM~߇ؼČÂ1N֋ČTq|)@6'“*kʝö‰ł; PdDĚÉ.>ţ5 ÚŔl#DWŻ!LĐPž+DéeŢ˝ńŢÇëĐž|G0Tîş+_č t=Í̞ŠţÉu "d§ůăóŹň(.Ĺř*+^~Ň.'ýîćF`xiˆ"T’Ů­>xÎ××Ţp'bQâJšćWjn4ßąÖ‡Ô[¤ďDä'“QV8ዒz´i–˜7’Ç+•ć ąŇ('ÂÜH3čë„yąËÓD谗@M“Z¸iX”t5Mż +…bš´–‰MH:Ťç]gĆ4u ˆ˘Ř/Šršl2@ĚôT_Çɉ˜Ý˜5Œ#_˘ŹťűÁĺÝ3ŃšýfP3”/ťÄŤvŁˇ`ŽŇŔź47˜ˇL•Š$Ą0 ~x@ Ú b™ćŘœ%<˛lľJ2€4’SŻ“2ŸKTš’ÚĚN{Ú˙Ď!ĽDĚbÁĄçŸLN BŸňc >tš,`ÇCZ7˜Á4d•ƒImĂäGÝÎíyö'v<ů˝x´˛ř8‡ľŁă•gŸyvP`ţ †Ć ‘si|]#(ŰĂOŞö?>KéŹ43ó„3ÉŇdR$jňPć–¤ŽPą4bŢĐ,Va‹ŐÚ܇î(çⰌhPčÜq7 żZ–vš–Ňi`p’Ş’ŐkŸżâŞ]˙ă?&żóÝhŁŕę >Q={ĺĺFŞ#>82s—5#AMJ ř}éžűó8őp”Ousăö݇Ź2 ,{œÍANQ@YPň ŰPL–`=)ŒӚďL^;œýö5Œ"tŮŘaž!ctzEŢďҋĄÖ3?}ĆřcŽ*íľÜKŢ:Xž|ÉW‘´fšE ë LyöXVNźbŠťô•I$Ptky żNF!˙~⤊ę@(č0§:Cgňşë9öĺ_ôĐ#}bšc¸iΓÜ5ö ,qÂĺă ˝+/żzçÓÎđ:ZęIřŚOv Mńfs˜­ňü/Žĺœ”QPáИáHľ9ŤNAÁ€Ş™EÇćÇO´ĆNš2-‰GÚ˙’ V&šśBýůŤ.›óýď(NŽíuí/ńĐD }óŠź-žîęů:Ű=§Ú$#đpĹAöčzK]ÉٕúŇ?\ýťSOúÓ׿•W’‹ÜQČýÖw\{%ź;‡Ű2ŐŠ 2U1] gr˛â`ď˘k~1ýc3XýşĎégĽ!äœĆpŠ)O_ő34’CÇ]!}°°Sć1M’‡=˗V¨źwU'ŃŞz<őˆÁUp&Œ€4´ÉBč”ŔˇpL0Hş L69Ť†B—†{ ƒ6fÝ18$dű‡"=őË_%}ƒű}öshž ‘ÓO9Ľ0}’ch•€Í_ďy⊼şÍŔI˜â싩@‹Öń.ĺŘóĄ‡ü b7Ŕ„{í{Č÷Î×ęVňZŇź.iĘ˙§żń5wý e”ĆƒŸdđ!ěĆpGú—ň€}7W7Áů]i¤~Ďj=ŻôL‘(łż|ŃĎ:̟ŤęĺŁ:˙ôžŢpg§UyęqźńÚSď¸^ďMÚŽTŽ=ÎÖ30ľq45łĆ9Łű鍯Aéyđ§>‹B‘23Îü°9u ™X|U~fŢşűîCő…’*$ŕ4@šÂ`–hkÖ­iŠĺň&ę“ô4f¸¤â8Χ§ťq–TˆÄQ+—Ź3DŔmÁ{äÄ!!>¤ůmś@ĂŔ†ôČ 6˛H˜+ĂŽ”ţöę‡ćŚMkŮŮŠv˙ř'ź Nsl°×+Ţúëo#ĺ&dVŘ"éŸßIęX˛šť:IÝÂĄ&ÁK&Źr›ă&Ó?z֞_ůlIąŇ´li¨+ćĄ}|ÝŇyD°äź¤ŽŞÇ"¨ć/Éýăź${–ĹŮ׎ŤßJ:P_­ĘßýÔ§Ü=>uÓŔž‹ÎţŢĐöüÔ×Gźí8ěAČě€X–HޢŁŃ ŐüPŠX$Gq_şüęÎĂ/ΘÁ–§šŕ´ľ×GÎLťL'đˆ•7ţ^… WƒŇ3BT5PCŐÜaˇY00j;\*/tŻ^™ŇđtgL\ÎČ0Ň4ůËî}`ÝýŹŸ}ߒŮw,}׺ťníúÓí˟źoŐ÷,}đţÚ3ϧĂż†ńMŠ˙ě2Šž‰XQć_˙;˙ůű|ů3°_ŕzsLƒł>üď˜| ŕŔTžýůľk׏b5“d  [Š@I6-” 1‘5NŠÂW‹œ4dô őŔo~a›EyƒţՆvëJWďŇuW_ÇÉ؈ţ$ŮarLˆăđŻ˙ëtň—ďăôŔ<ŸěÄŠźcéU˜Ř@)‘!ĘÔwúĆçGaä$ý˝WüŔűËPdŸĂŤH ĺ4â\˜Ě&‡Ÿ…œśÉ׋.ůmźd雾ô™*ŮP&1Aźë™§W‡ä!ŚŐPs Ž¸zĂęŐŹ.š0Ӓo(=¸­ĽŮłČBý$Ą’,Y§ťŠÇᚨ˘'nzä9áŔęe÷ńÜ{>őţˇ~řÖ>đÇcßyŰQÇ˙éý˙Ţóěc&úľágx|LҐrČĽ ÷{éţ'Î?˙ö㎻ĺm'Ţ}䥿9ĺŕŮď=ĽŘŃ1ˆ(ŒĚĹn§4ć_qiĚ1ÇCySüFœ‡&€)„ĺ’Í™Jˆý7U` m%Ĺ0ô´âŃ7üBmČb-Ĺć‘%t€ŽKŚ[/†RŇ7Á¤Ł]ŔËŔdi\SIîĆ|š! €ÁYůKŞ%ňHrOÓiŞRŚ'Í “:4I2žô9ń]ĚaDćo’׌ŮYŔ›XŻÚŚzéN(JŤHOĚYżzÉSçü'žV’G}Až˛łÚćb˝@#MNá2gđ-ţĺϑĄŸřŢ=ţđO<ö–Žşýřoůŕ:::RÝ_é ôç+.ż ujßÖ-ĆOV06‘űěCbˆú/vCö5J×,K!,e˝Ašé‡łăi}ďmˇbŻ¨Ř=¤?ŽŰH@ńžß?oŸOštŔv˛%šc†AXŒ(^đ0 ˆléýˇŻžűÔč˝ĘGíhéŔ°Z\˛÷çňű쓇2)ˇœô_ńہŽ.dŇ4š g,.(/1ö¤ Šv’‚ĄťR‘şŻřJÝCŔdšĚ|ëIw_CBŚ<¸7ž2¤‡ęŽg źA—hqä•Jć%ÍA#›‹ÉOżŔ¨Š¨–ćň%Ď<œ ÉŹ ŚKˇlTWƒ łŁvŠcŁvŮŁâ4S8zt“p”Ü |gŇÄYĘź PĂÖ˝~óˇžŰWBĄ¤xfÄÇó~qĹبöĘPo Úż’”Hjn1Š†Ň )ˆ8şaΉ 1şđôL‹ĺO>:rďÝů8=H=H*Ô)žÍƖŚ°ĺô’BŁrJůA/€ ZlqţnŸýĚǝ‚ăůŒĂ¤…˝ęĄ/|Žëů'Su)WË)‰ŻkZəwŮό‰;źëąŮďžîŚwÜs×ɡ^÷žŰî=öż=ůžŰžóćQo?f$°+ƒKŽźÉťÁů1ž6u݊¨°×—žAşCË0Í<U˙źˆm—Cť ű#b(ĆQ˛ `şRH8ÖMNj&óyš.°%=ů]´]Ăź† 1‡ ĄQfY-]šč–[÷|Çé‰ŢBfՔrq˜ ˘‚G_ËŹ‡Égž›Ł=JCŚ ÄÉÇĎ˙"ĽGZOŤ-ľrYxŹHä\ÉM SRfćˆEę“ 0M*Ź`lÜéĚß匏bŻa5q–`ŞlՕ˛'•:á BFČŇ^;NȍötˇAġŠ ,Ży1‰\źečVŒy /6džˆ="Ž,x&7c = Œœ4AP°ë¤ěmŞJ0—ń‘ĆYœ,â;h”¸ä‡vG;/ k†ËYÉĺ'Ďü8Œ 콯⃉چÓďZůŇK7Ţşű™ŸÔŁöŔ*ůä×w8łÇr•"ů<ĺc-¤ƒSMˆŠoŸżâDź4HCËI˝¤š n{ÚżŸ5sˇƒ o!ç›ęŞ[ďlt”pŠó,W-&Śez¨÷Đôáhƒb.==ŒąˆčŇ@“] •1bŽRĂĄ!öĺď˙& ‰dU'yôß*řÁŽg}JŮo¸ţ„{pP35›Ž†ę”“OęŘa:ŰJ˝’–ď_˛|ĂÝł!z{k!ˆrHŞI\6ę˜G0˛ş 1´\ NŽőÁnÎ@ăń„Ř÷ÜoŒÜóMUŽ×Ć`ű(-œ^kDœ=‰AŔ Œ.ěôö÷€/vš‡šäăfíąůŽK…<ŇÓä šĄD›őOźÁúÎÇż‡´Ĺđččhč0Ií!Ż“&qŽ¤b7Œ+L|ćŘrřăD6؅śˇýň¤†˘‹ŕU sÍÜgçœ{Ž‡š•CÔnđ/íUßüAXĐŚŸvRęW vŁa]‚‹ń„ HŒo(“?đŢdň$NQI­šŇťôĹľ?€ŻWžĎ3H{ËţZhďŘĺâľľŒĆŸĚh觺č×?q‰f˝iI9ĺ˝ŮÜLO [Ţ~œ\t˛Đ‘  7D´„,–żfł’ĂŔK晴ĺqé Ë~ů{ď™úČ\OKZ—ĂĄîŠo‹Š~ˆ@d"ă'žă$/‡ƒ‰ľÉ1'Î˙6Â!9źkô7Ÿ#Ć9fBWôāšfŮŇjĘ@ň|@Ó+ő>Օ|ŻEŰ9îřk~ÖŃ1¤ŇpTRŕ‘’Á:uuĂĎů%„Î7×m /ŚŸ^2XîÁ_§Ć!ˇjÜŽ¨ÝĎ<őčWž<ţďwĉCÇśű`$ög:!WĄ…;öN(l›In™.a4Đ>nPdwČIZ:â­ű|çG萘ܜ„DĹÚ˘o~oů/oÚĽ•Ęë–jŮÂGď™]-w!—Ž>âđŃo{Ű>Ç•ě¸'׋R ěđ]á6 âąš‰ˇ™îl94l’4œRuŽšž{4çۗďú•3Kř##u¤çV J—`záA‚V*7Ž[ßxbÎúĺ+7RnŔЧ|Ŕ¸ý÷+kdŸ†˛VjŢl7‡Ü“°âÔ!bČF/?_)>b8cMËí–ZęŠ6óŞ×ëƒO<´|á"rá‘?|&Żî¸]gŮ#::÷:p¸MźRůżAţ PśVţf=ŠK: ĂêĖ‰ˇíifďÔIĺ/ćŠtJŕ=3ńƒşÎŠ…Šž—ÓÎđ CnL­˙*ddKԗł{[˝@ꃝ˘wŠd‚‘éńáÎYVŕa"†eO1łƒqý `_Á7} :6Œb jß*Ÿŕű‚ÖZqÝrÁ Ÿ<.U¸Ă# ÁŠ&Y”\87Ľ‡Đą^áLŕńÍI…Y60 ËôđsÄüíáĘžŒ„›Tƒ€_hŞhIžjŚ@˜TśŠ­t ƒ‹Ü*-n9M×|X!ψ'”Ł˛ĺBREś—Ľ =ő\ ’4:-cčČ\lzŠ'ć–xl•!ˇ’Ô\2䏓 pHŇb/„]g|qAsQ1˜ęŠ‡[˙_)˙ŻŚ [´ő¤*ÚtRaG˝—5l:äŞG=”aCJ!q‡öďżÄ(˛íŮ~ĄŤŠO$ž¤CŕŰö/aښ˙ĘĎĄHË!ßłô¸X¤J‚_Sˇý­xęÉżś`2p”Š-źœ9iŠo¸BąŠďź,ŁÔĂ ‰ôčÁj„”ËBaI *qÔ1„Ś6ăŃN‘Ńż-öŮĚ6‹˙K˙RG^˛\Šą]t¸[éúkŘ čš•Úňj°O†(4rđAƒF+=˛"Ľ”ŘÓ †dH?QĐŚ•^§g„¤gŒá‚›z٤!O,Şí 2x‰X‘×MčlBz<3işąK ß‡7Ţjăúؐm`› yóĎ6ƤŢđŠ\é'zv"7ŇcŞ™bHƒ™bż‡HD śĄđűtCĹxÍţB|X’˘uĘvm•ŽRI&U ejć˙b2—[L2 _„ ŞbÁ”Ŕ^áB‡uv â-_iinD҅öb0ô}ß"şœ|Ş:00đ§?ýińâĹ<Ů}÷ݏ9ć˜%K–L›6M 3Ô9Aˆż2€űďż_ŕrřá‡/X° ŤŤ‹Ÿ{íľf~)LľÍ‚ť€ ež ÔHĚÓő-¤RJĘsl RX@“q$”ô°>ŕƒEĎ>ű,Ý Ř{Ţóžv؁2===Ď=÷\6ĆlťáŐQGEU2đ”ýO'3rÝźËŹKŽťîşĺ˗ţ󟗾el t,ĺ˙8T+ľŞ˙ZŰ ˇćO¤ٸ†věÝĆ÷ż˙ýŠS§ž÷˝ď•˘íN2MüÍž˘óü\Ëx˙6vňĺ&3ĘţŇß7 ŞűŮĎ~ÖŢŢţÎwž“aťŽ;gÎŕKç(I1*sŔ_~ʇżűÝďŽ|ž~ýúÔ­(wÝuWęőÇTÂWŇ´´Č%5d?ĽrJňPîĽXö!őp/]ÍJžşě˛Ëhńˇżý-÷ŮgŠÂ˝˝˝3fĚŕážűî{÷Ýwßyçgžy&ýä— $=zŻľĄŸŇ(?ĺ9ů+7<¤N‰‘bhÍß ¤`˜Ő#Ł@I+ŇaŽŹ~y( I=ˇß~{Ę" !şt&›  ěY=”¤)ÍÔË&ü¤[ň&—ŒSž§"žä’K€KGžÓ?nܸqúôéŇžgs–}{ď˝÷fÎ'˛˜îšçIóře" CŚAŕ.đmž˛Â@\ŕ›=iiiĄQşâ~ç;ߑVdn 9ňČ#Ľ*žôŁ•›[iFľ G›G*u~ń‹_|םŢńË&&Ť6ĂŃlimҊô™3DĚpEŕ,łÓäGŢ @ä•ĚHö\Z8d R2ëĎfqbóŘĐ …_|Q°ň7żů€2ĂnFśž€3ýüóĎK_yΚ ÎÉ^ĹZĚ E'žx" CZşt)“÷ /d뉪¸úűűYyôDpEFž‡yuß}÷uwwÓ=žËŞZJ‹Źć…r衇ňęˆ#Ž Ř 7Ü@ľt>[C2@f­ úJl”l=4'?3ř+Ô¸™~p˙ä“Of%ŠnĐCFýŇK/e$áčhKćXŚż”ŠŐjDЅżB§ą¤Qž2 Á'V)=|üńÇĺIó¨3čmx¸lJQŒ ÄżűÝďĘD2é‡Ěw_nÎ=÷\öĐeżýö;ůä“űúú¨„^ 6Ȃ:ÁCFőÔSOMž<™í–˝ć°Ă„8돳(Ŕţ"źSu饗R98ˇçž{R˜ˇçwžŕ°Îđ—Ľ/蛍ô˙-oy ĺٞŕTh.[g|H Çwoa}čۇ?üaŠĚP6^Ú˘{cé L?ň‘ĐąkŻ˝V6H ›4\ĐîŽ;î`ËžÎtÚi§uvvʈu~ôŁíż˙ţô“J€˜,nFÇ.&Łƒ€ńÉ <)Ďóď ]ÂPx/3=ŁҜŕ“Ęß÷ž÷Éó/|á ‚Ü2„aÓž”}N‘Ů’}‘ç˛Jš‰9A^é÷żţőŻ)ɔpžsĎ+Á÷Œ6€Îmmm€€‡@œçßţöˇ 7o}ë[’Œœ9ŕ^*ůҗžD„ËcąĘĚ *P˜îjűÜç>Gaú#Č*řÇOAYyň¨Ć[0’VřDĐKF-¸3+L0ěxËvÉC /+„ĎůVȉ S6AĆÂ=xŔâav)&ű‘Ě1¤žOd ,_Ú˘ÎĎ~öł|ŻMR@°,!¨ ÖGJRN^žśč9=”aB‡/łQ°22à υLžŇľÍ4ý %Á\ZrđÚţ2Č ýEm>Ä؋믿ž‡SŚLáůčŃŁyrĹWđ$Ă!Ą<¨QČ2Śúx€˝@NŘo>óĚ3tƒ…Ĺç`#gáůŸ˙ügÁ˔˛)ĘĎţsî!'|%Ň ëŒžˆÜŃ,ţ‰ˆ$;ˆ<‡ď9ýôÓé9_!ƒ0ĺYÁ`指‚yÜ RÉ(ř)`ĽP<‘i 0Ł ’ÝvŰmĈ˛˘]nşé&n R˙ýß˙ÍvCyÂčř|ţüůŕôÚľk)0{ölú)M°AĎťßýnĄTEŮ/8ŕYëÔĆß+Vd}“ŒH%…Ô)źü+]›ˇSHیŠ*vŮeAUXȤf€f’x"âŘÇ O‘LT%5H_+• ؉sÎ9Œć+ˆ-ÆÎË|ÓßBŔůpŐŞUšś?BĹÜšs™9 pƒBaö.YÁŮŇbЌź•ądMK+|a¨AkhžŹ4 ĂöW°a32˙™1 4#υČG ˛‹ą“ü5jťŕ{ěÁyűIĄo,úŒOć!ÝúéO*ÔĘ˝ek‚K&€żďxÇ;xNgD5ÄCÁzE&;qĂ>‚nô÷ż˙= $—ˇ|Eg¤BP–ţˆ AŻ`îxĹŚÎ+‚ĺ‡r-" 4Ëô9“/ŘфYÎÖ.÷,¸Ș “˝ŸĘÁuîĄXĚëI'DľÜĂßŃmméűĐąä!čBs<źňä?řđŒôü[ßú–€…ˇYlVXĘ yűB7dűŁžż)anF3-´”şčK‚˜´ąhŃ"´Š<)•JŇ$…)ÉâŚaD/QPfô3cze奢,ľ‡~xěŘąôX–”|+dˇ,#ŕË.Ë+6B XEť,íJ+Ü .‚”Ң4' öPŐ˛ž˛AeűhF¨Š-ccâ\ÔAhB"Âd NŐXŽBN¸„¤ š’ ťžź˘K0 hS¨„Kć ĐÁčŔIŒ7nÖŹY˛ÄĽŤÜgŒ°ô'Â+dŞnŠ\&‹‡lëĚS#ü/<)ŘÉ:‘Sö‹l\›šá›M.YF"¤ ZńˇYfÍÖĽŒ\„éL Ga!* ŠJęĚJ…B„䞉GВÂňx€ÜHŠ<#TҐüeVD˙#MdT{˛Ž EÉ´Rƒ´•ő_şGÉŹNy+ýa5Cx¤ ţRť=Ěڕ:e)g72pY”\ÍPâgFç˛j3X ehg),`şyPÔvBkłňÜ@ŃÁůV†&_éÚLöPa7dŃ €„ą˘ÂśÂĘ"ăd[•u/”J>œ•Ďł:Ľ!­ŮFäXśžŔ°Đُ ăl"B˛íCȕ°ër/”IXŌBr/\˝ôGú,÷ٔ‹`"ĽźŤy‡ć§ÔĎ Ěéücn‰nţđ‡?đɧ?ý錁Ľ+Rˆ…e‘Ď7ĄF˛ 3:—­Za¤Űź#“óWYŤŇsĆU,oťí6ř0č0„O‡–Cş Bäóżrý5‹6UˆŒ$ÓůŔeX"”_öé˝ ˆüĚ°ç2[Íâ'’&dFŃ+ ŠŕŰ˝÷Ţ[DƒŒ/b(ň˝ ‘LCYÁů)łžĄ‘ ŻQ>‘N2.QĆ^e›‚0n2ÁŇIžđî^ŻŢôŚ7!eű‚`ŒK†Ÿ^@!ˆ `eŒÍČ!}kžlYBRLƒ=űPÖ$ĎŮ1EDŸ4i›/T„ÎgÔQźBlޢÁT°2ۙ6‘Ś¤ÇměÉđ@F› Z\ŮĽNŠŒ!›!zĎ˝ AVRˇ!Qzńyfs<ȁÜHůćĺI†âY?ĽKŮ-Ĺä =Ďvhé­ KÖ+iZzś‚2ԔˇňWČ[ó4K'łO€ôRVż Šű!ŠœvI&HڒŽÉ%ŕ¸I™ůPú,ÝŰěľyÚ Đ(ȘłŐӌďŻTŻÉFş˝třě–}ťyŠc„žaËxăŤíŻhÔÝ!Ű&śŁ!˝ŃŐ-†Ŕ_‹Dn–Đś¸×އ[KĆŮZőź„ˇ ţż Ż˝š|cD[[ŮüąđÍH'Ůĺ—_§zöŮg7sj˘iţ›é3.¤ů-ő4˙Ěڒ3A†Œ{řqHa”ĸNá#pŚĘ>Ét 8Şŕ€„ăŠK7"|…÷ šf$Š÷ż˙ýâÇ0oŢŁšŻÍşÂLóš1ÓĐń‰<Ä!QŘ cÄS´u› oĽ˜ôTŔ섿‰4‡'DîÁfc4žhT™Hџ‚âTA%Lsć “ŠDłI˜ ´Ć°ÂW|‚Mi7ÓŮółů^j–ŃI—@q™`*?ŢM>0Hň\J ü)#úć ˘ŽŢlř‹S çßźs3łž 0ááÉZÁӕ'Ř0üŸrĘ)8/á9ČĚůâÝËHřÉHđčĽ<ľá[ŔsÖqîq{Ąąôóö‡?ü!> XáÄŃřň+Cđ@:ƒąŸ5A[xŞ1Ář.ŕŁËsh>ˇ“Nň˙ ˆ …ů'ŁEîĹeY̛Ź9F!5óVź1/Ó#î*źmąÔ)Oä/Š ?ńícÔÜ`_f°ŒŇdÄݗ’Řlš;éł;ř)s/ŐB0ăqCŸůœQăĽ=Ł˘ç `Ż0Üąh¨šWs*7[`´![ŁbS‘~sĂËdÜ|ó͔Á5ő‡Ťf§O~ň“<÷ b ‰ń DQˆÂŔ^Œčâ‹/Ś$fb ˜PZ,™8ƒŹo|ă|(–m(˛„<Đ,řAárh WôŠčYžŮž Áq[Ą%˛RŸ~úiŞÓftZ”šemŃUĆË[ěĹ .s|ěąÇň‰@@–fś ?ń‰O pH\‹eÓ7ę¤o˛@„Ŕ`@žââ ɲÎ(™ °6 ë`ĄXĽyEĚŚ€ÂŒîřăÇjé„YF*Ÿo aŃnÁ%냋!Q sŔ˜šĚfËHpEŒCܳ€&3ÁúÇé1X/‹O€2n’řވw$vmń;’áń!(EAA°t€Şx+őË>"a˜ďÄßZ¨4—F^ń—{žăŢG!%O(Î =ăbů ™áb­3FúI˙i‘̀& ŕ[qŁ‚Ą ž•ŢŠIS†Ą‚ ô #-­ c!8-ă’ž0÷Trá… řŞ„_É&N@Á+0,뉌:ëáß3 Ú ‹É‘{(T ĂšašÓoś7Ŕ íÂâ.ć.ˆdľZeC0¤ŠŃ{dšÇ1’0M'žx"ä@1V$ˆĎłŠß|ź†đ-á2&TĆÉŚNgŕű˜~B™!l.BH%¤‚~Br Ô Ť lö…ˇ´Â•^ąˆáˆ3’ cäÂfM™`ˆ6óĘôť‚ë G`żIë‚g|Č@$Z‹ŠĹł  })ŮĹ T(m s#˝ĺ†}H2ÇX2éUŁâO*Í5/}Ą+4‘1•Ţ-!?âÎJynÄÇ4n€ąů çE?¸a‰ĄZP~|Őá'() ć ŔŤ“Ž3xž —X3|ŔŠí“9_.`‡đ ú‹“ ”€&XšÉĆźÉW/ďń&čźI ^ž ]šŮűlÇĽ9?7u3°6éOsÉÍBłůĄ4Ę_ś•żR8k˘yhŮýfÇŰźńoRłü܄h./Íe6Š˙ďĆáiŸ6ťŃRśQ K‘ń8ŮNFšož‘3?+^ńSĎĚĎQF•Ő)ˆ%›˘´ŐÜbśYĘCńů‘OD:—ż<ÉDóŹQŠ6+#űws÷¤@sąŹ'ň•ŒZ>‘dĎĺUsçÍeÔ/ďĆ&@ËĆŰüœ‡ŮHˇcŞn+`C6*Oßlw—‡›€cHemĚ&/Ţ<—YĚż2k]<ĺdl‚:҇l¤ćÍNŰ&ƒ’Nf­orß<´MĐŤůCůź š×U3ZHýélýoHľüĚPp hîŘ&Čô×CŚř+˝|Šes Ψ2’ÍöRśAmŽ|+S(Ă΄)&ľÉ‡ŠĚÇ0ƒ‘ ‚|žMó&vyŃHUYÍň‰Źň ™˛jłOŞ•~fóÄŰć9š”=Éć,›ZžÍ–Js?łO2‚š !ĂźMÍŢbň°u°Ahr35Α 8›ŸăeOŕűC[˜¤ł%qĆŇ4Ś/j#jbęĐmÁTLů<ǝ @I(JţüĘhüŘqÇiťšpcđĹ`eŰĘؚá˘BZ^˙źž.–ş ¨Dűľ˜by.śW B,ńÝ <łŮ`qś^śF Ĺj`§`éó"I1ɧ!ź˝d•ś˛°ěýě )OŻ @ D›ú™-R¨‘—ˇ’í6ÓůÓ (˜NÚůK@âýh—ţ€R>Ăxś Čť˜ľh‚%θ蕀ř€XxÄ`ŤhH&9=_‰I“΋))Ćq>¤<—Œ… ƒâŻ$ý>HŁ[<›[¤ &‚ŢđP–)‹az‘Íž2<„—dšq1í€:X7(öđœŞ­¤ŘäĄfř–:)ĽĹ˜$ůĎ2;…äÇ㠔VĘKŻä†ÖłÔ#Ó/h7sn o’ř-ƒŚ˜Šč°4$i˲vé?ÝË’WXŃ@>ńD’‹m‹ąd†+^‰Oz p¤îi‹:AşD1đ‘SŒŻč! uRR rÍ㕚e#îľ°Ą|5AUšä­ )ű)˝ož°l<™Şšpó¨¤rŠ˝ź]ɕ‘ĄŁÔšÉĎfHeýܤ'͟4wZ%¨“U˛IIžłXĄ‘Ů((ő3k.ƒÉ&c̐ťš šoŽPždCk†÷Íl†[vOWşśŽB̢†˘CPňMTR˛™5[dWŁpóN,ß E›ą&r/Ś÷EjłŇI*—bÍĺeËĎ’ňysO˛Ę›[—‡RƒT›qyňJF˝IąM:đň ĽNa,˛ˇŇCů™Á-{+O¤Ď™Č“íĺk†•lj›˝ś6dnCex3Ž4OÉËá.c΀ţrŕnňÉ&ČŃüó嘔=Én6ihłxĐ w)=‘zšgQ~žœ›k.ůrômîꡰ –4#ĺ&ŘöJ3=˙W`ĂßěÄśülŘ ć62Č7şńC`;8ĺěä5üř˙ˇP,ŹČě܇IENDŽB`‚$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l4”É t  6P”đ ”´Ö0öˆ6”´+Ö+Ö+Ö+Ö+Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö  yt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l4” t  6P”đ ”´Ö0öˆ6”´+Ö+Ö+Ö+Ö+Ö,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l”f t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l”# t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oű$$If–!vh5Öđ5ց5ÖŒ5Öj5Ö#vđ#v#vŒ#vj#v:V –l” t  6P”đ ”´Ö0öˆ6”´,Ö5Ö”5Ö/ 5Ö`5ÖN5Ö/Ö BÖyt—Oűý$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”g t  6`”Ž”´Ö0öˆ6”´5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”g t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”“ t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l” t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”k t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”g t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”g t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”; t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű $$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”a t  6`”Ž”´Ö0öˆ6”´,Ö,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű$$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”w t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖe4yt—Oű $$If–!vh5Öß5Ör5֐5Öƒ5Ö#vß#vr#v#vƒ#v:V –l”M t  6`”Ž”´Ö0öˆ6”´,Ö5Ö‹5Ö' 5Öb5Ö[5Ö/Ö BÖBÖe4yt—Oű$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l4” t Ö0öˆ6+Ö+Ö+Ö+Ö+Ö5ÖU5Öv 5ÖĚ5ÖR5Ö•/Ö BÖyt—Oű $$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l4” t Ö0öˆ6+Ö+Ö+Ö+Ö+Ö,Ö5ÖU5Öv 5ÖĚ5ÖR5Ö•/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”< t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l” t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”÷ t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”f t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”[ t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”‘ t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”÷ t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oűö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l”‚ t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖytŤRřö$$If–!vh5Öí5Öm5ÖU5Öé5ÖĐ#ví#vm#vU#vé#vĐ:V –l” t Ö0öˆ6ö,Ö5ÖU5Öv 5ÖĚ5ÖK5Öœ/Ö BÖyt—Oű$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l4”v t Ö0öˆ6+Ö+Ö+Ö+Ö+Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oű $$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l4” t Ö0öˆ6+Ö+Ö+Ö+Ö+Ö,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”S t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”ĺ t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”˜ t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”ť t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”S t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”  t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűń$$If–!vh5Ö‹5ÖË5ÖU5Öí5ÖĐ#v‹#vË#vU#ví#vĐ:V –l”: t Ö0öˆ6,Ö5Ö˛5Ö. 5ÖĽ5Ö_5Ö¤/Ö BÖyt—Oűj, žžžžžžžž666666666vvvvvvvvv666666>666666666666666666666666666¨666666666¸66666666666hH66666666666666666666666666666666666666666666666666666666666666666°62ŔĐŕđ 0@P`p€ŔĐŕđ2(Řč 0@P`p€ŔĐŕđ 0@P`p€ŔĐŕđ 0@P`p€ŔĐŕđ 0@P`p€ŔĐŕđ 0@P`p€ŔĐŕđ 0@P`p€8XřV~ OJPJQJ_HmH nH sH tH N`ń˙N BkäNormal d¤ČCJPJ_HaJmH sH tH b`b ě*, Heading 1$dđ¤@&a$5CJOJQJaJmHsHtHl`l ě*, Heading 3$$¤Č¤@&+5B*CJOJQJ\aJmHphO˝sHtHDA`ň˙ĄD Default Paragraph FontRi@ó˙łR 0 Table Normalö4Ö l4Öaö (k ô˙Á( 0No List Pţ/ň˙ńP ě*,Heading 1 Char5CJOJPJQJ^JaJTţ/ň˙T ě*,Heading 3 Char5B*OJPJQJ\^JphO˝fţoń˙f BkäDefault 7$8$H$1B*CJOJPJQJ^J_HaJmH phsH tH Pł@"P ě*, List Paragraph ^„Đm$OJPJQJ^JH`ń˙2H ě*, No SpacingCJ_HaJmH sH tH BţO˘AB ě*,apple-converted-space.X ň˙Q. ě*,@Emphasis6]XB`bX ě*, Body Textdđ¤a$CJOJQJaJmH sH tHTţ/ň˙qT ě*,Body Text Char CJOJPJQJ^JaJmH sH Rţ/ň˙R ě*,0Balloon Text CharCJOJPJQJ^JaJZ™ ’Z ě*,0 Balloon Text dđ¤CJOJQJaJmHsHtHd^`˘d ě*,0 Normal (Web)dđ¤d¤d[$\$CJOJQJaJmHsHtHRţ/ň˙ąR ě*,0Normal (Web) CharCJOJPJQJ^JaJ*W`ň˙Á* ě*,`Strong5\6U ň˙Ń6 ě*, Hyperlink >*B*ph˙`ţ/ň˙á` ě*,Normal + Verdana CharB*CJOJQJ^JaJphfţ/Ąňf ě*,Normal + Verdana ]„Xa$!B*OJPJQJmHphsHtHR R !ě*,0Header dđ¤ĆH$CJaJmHsHtH>ţ/ň˙> ě*,0 Header CharOJPJQJ^JR "R #ě*,0Footer"dđ¤ĆH$CJaJmHsHtH>ţ/ň˙1> "ě*,0 Footer CharOJPJQJ^J8ţoň˙A8 ě*,apple-style-span4ţ/ň˙Q4 ě*,apple-tab-spanţoň˙a ě*,aţoň˙q ě*,l6ţ/ň˙ ě*,l7"ţoň˙‘" ě*,Date10ţoň˙Ą0 ě*, a-size-largeF!ň˙ąF ě*,0Subtle Emphasis6B*]ph€€€PK!‚Šźú[Content_Types].xmlŹ‘ËjĂ0E÷…ţƒĐśŘrş(ĽŘ΢Iw},Ňäą-j„4 Éßwě¸Pş-t#bΙ{UŽă “óTéU^h…d}㨍ôűî)ť×*1Pƒ'Źô “^××Wĺî0)™ŚTéž9<“l#¤Ü$yi}ĺ;Ŕ~@‡ćś(îŒőÄHœńÄĐuů* D× zƒČ/0ŠÇ° đűů $€˜ XŤÇ3aZ˘ŇÂŕ,°D0j~č3ßśÎbăí~i>ƒŘÍ3ż\`ő?ę/ç[ŘŹśGéâ\Ä!ý-ŰRk.“sţÔť..—ˇ´aćż­?˙˙PK!ĽÖ§çŔ6 _rels/.rels„ĎjĂ0 ‡ď…˝ƒŃ}QŇĂ%v/ĽC/Ł}á(h"ŰëŰOÇ ť„¤ď÷Š=ţŽ‹ůá”ç šŞĂâC?Ëháv=ż‚É…¤§%[xp†Ł{Űľ_źPŃŁ<Í1ĽHś0•ˆŮOźRŽBdŃÉŇJEŰ4b$§‘q_טžŕ6LÓőR×7`Ž¨É˙łĂ0̞OÁŻ,ĺEn7”LiäbĄ¨/ăS˝¨eŞÔĐľ¸ůÖý˙˙PK!ky–ƒŠtheme/theme/themeManager.xml ĚM Ă @á}ĄwŮ7cť(Eb˛ËŽťöCœAǠҟŰ×ĺăƒ7Îß՛K Y,œ ŠeÍ.ˆˇđ|,§¨ÚHĹ,láÇćéxÉ´ßIČsQ}#Ր…­ľÝ Öľ+Ő!ď,Ý^š$j=‹GWčÓ÷)âEë+& 8ý˙˙PK!–ľ­â–Ptheme/theme/theme1.xmlěYOoŰ6żŘw toc'vuŠŘą›-MÄn‡i‰–ŘP˘@ŇI}Úă€Ăşa‡Řm‡a[ŘĽű4Ů:lĐŻ°GR’ĹX^’6؊­>$ůăű˙ŠŤ×îÇ !)OÚ^ýrÍC$ńy@“°íÝö/­yH*œ˜ń„´˝)‘Ţľ÷ßťŠ×UDb‚`}"×qۋ”Jח–¤ĂX^ć)I`nĚEŒźŠp)řčĆlišV[]Š1M<”ŕČޏŠOĐP“ô6râ=Ż‰’zŔgb Ig…ÁuSŮebÖö€OŔ†äžňĂRÁDŰŤ™Ÿˇ´qu Żg‹˜Z°ś´Žo~ŮşlAp°lxŠpT0­÷­+[}`j×ëőş˝zAϰV–2ÍF­ŢÉi–@öqžvˇÖŹ5\|‰ţʜ̭N§Óle˛X˘dsřľÚjcsŮÁĹ7çđÎfˇťęŕ ČâWçđý+­Ő†‹7 ˆŃä`­ÚďgÔ Č˜łíJřŔ×j|†‚h(˘KłóD-Šľß㢠dXŃŠiJĆ؇(îâx$(Ö đ:ÁĽ;äËš!Í I_ĐTľ˝S 1Ł÷ęů÷Żž?EÇž?řéřáĂă?ZBÎŞmœ„ĺU/żýěĎÇŁ?ž~óňŃŐxYĆ˙úĂ'żüüy5Ňg&΋/ŸüöěɋŻ>ýýťGđMGeřĆD˘›äíó3Vq%'#qžĂÓňŠÍ$”8ÁšKýžŠôÍ)f™w9:ÄľŕĺŁ x}rĎx‰‰˘œw˘ŘîrÎ:\TZaGó*™y8IÂjćbRĆíc|XĹť‹Çż˝I u3KGńnD1÷NIBŇsü€ íîRęŘu—ú‚K>Vč.EL+M2¤#'šf‹śi ~™Vé ţvlł{u8ŤŇz‹şHČ Ě*„ć˜ń:ž(W‘☕ ~Ť¨JČÁTře\O*đtHG˝€HYľć–}KNßÁPą*ݞˌą‹ŠTŃź9/#ˇřA7ÂqZ…Đ$*c?˘íqUßĺn†čwđNşű%ŽťOŻˇičˆ4 =3ڗPޝ ÓäďĘ1ŁPm \\9†řâëÇ‘őśâMؓŞ2aűDů]„;Ytť\ôíŻš[x’ěóůç]É}Wr˝˙|É]”Ďg-´łÚ eW÷ ś)6-rź°CSĆjĘČ išd űDЇA˝ÎœIqbJ#xĚ꺃 6kŕę#Ş˘A„Sh°ëž&ʌt(QĘ%ěĚp%m‡&]ŮcaSl=XíňŔŻčáü\P1ťMhŸ9ŁMŕŹĚVŽdDAí×aV×B™[݈fJĂ­P|8Ż քAŰV^…óšf ĚH ín÷ŢÜ-Ć é"á€d>ŇzĎű¨nœ”ÇŠš €ŘŠđ‘>äbľˇ–&űÜÎâ¤2ťĆvš÷ŢÄKyĎź¤óöD:˛¤œœ,AGmŻŐ\nzČÇiŰÙăź.uχYCž6ěOMf“ĺ3ośrĹÜ$¨Ă5…ľűœÂNH…T[XF64ĚT,ќŹüËM0ëE)`#ý5¤XYƒ`řפ;şŽ%ă1ńUŮŮĽm;űš•R>QD ˘ŕŘDěcpżUĐ' Ž&LEĐ/pŚ­mŚÜâœ%]ůöĘŕě8fi„łrŤS4Ďd 7y\Č`ŢJân•˛ĺÎŻŠIů RĽĆ˙3Uô~7+ö€׸#Żm q¨BiDýž€ĆÁÔˆ¸‹…i*¸L6˙9Ô˙mÎY&­áŔ§öiˆ…ýHE‚=(K&úN!VĎö.K’e„LD•Ä•Š{D 긪÷vEꦚdeŔŕNƟűžeĐ(ÔMN9ߜRě˝6ţéÎÇ&3(ĺÖaÓĐäö/DŹŘUízł<ß{ˊč‰Y›ŐČł˜•ś‚V–öŻ)Â9ˇZ[ąć4^nćç5†Á˘!Jážé?°˙Qá3űeBo¨CžľÁ‡M ¢ú’m<.vp“´Á¤IYÓf­“śZžY_p§[đ=al-ŮYü}Nc͙ËÎÉŋ4vfaÇÖvlĄŠÁł'S†ĆůAĆ8Ć|Ň*uâŁ{ŕč-¸ßŸ0%M0Á7%Ąő˜<€äˇÍҍż˙˙PK! ѐŸś'theme/theme/_rels/themeManager.xml.rels„M Â0„÷‚wooÓş‘&݈ЭÔ„ä5 6?$Qěí Ž,.‡až™iť—Éc2Ţ1hŞ:é•qšÁm¸ěŽ@RN‰Ů;d°`‚Žo7íg‘K(M&$R(.1˜r'J“œĐŠTů€Ž8ŁVä"ŁŚAČťĐH÷u} ń›|Ĺ$˝b{Ő–Pš˙łý8‰g/]ţQAsم(˘ĆĚŕ#›ŞLĘ[şşÄß˙˙PK-!‚Šźú[Content_Types].xmlPK-!ĽÖ§çŔ6 +_rels/.relsPK-!ky–ƒŠtheme/theme/themeManager.xmlPK-!–ľ­â–PŃtheme/theme/theme1.xmlPK-! ѐŸś'› theme/theme/_rels/themeManager.xml.relsPK]– $Ďž˙˙˙˙˙˙˙˙$'˙˙Ďž 0˙˙˙˙)  ö nÍPö×­…Ö)é*. /1Á3m;+>E§FŁS_'hŽnrČrutƒxÓz—B€#…@Š.‹”˜Đ›Q…žX¤Č§ě°…ś÷ˇ4˝›żÁyǞĚÔϢŮCŰ^Ý1áYă¤ć÷ęëëeěŒńĎó€˙\ C¤!%,2/­5:ŒB„JőLkPSËUkX ^`_`fôjŢlŹr[s:wW|÷~hŠqĽ’ăšȝe§€ŹZ˛ž´É˝ˆž$):+äçý$.468:?@BCFILNPRUY\`cdfhjkmprtwxz|~€ƒ†ˆŠŒ‘“•˜šŸĄŁĽŚ¨ŠŹŽ˛´ˇş˝žŔÄĆÉËÎĐŇÔŐ×ÚÝßâăĺéëíńó÷ůű˙   Q V _ ‡  Ś Ž Ć Î ć î  < D _ g š ˘ Ř ă  v ~ Ÿ § Î Ö ě ü ] e  — š Á ď ÷ " * a l s Ő Ű ö  6l…ÖíRw˘ąä=QśÍ 2>\s„œ“ÝŚÝ$•)Ö)—,70×0~13A9;Ń<+@zEäFˇNpTZ^A`”d(hj˝n×p qrđwľy€„€&„’ˆ“Šg‹”Š—ž‹ 'Ś–§u¨âŤ˛´őś,š¨ż”ŔÁśÄIÉŹĚĘÎ;ÔÚۀÜ`ß âćëăîńBňŽőľýU˙QâS 4 h Ł*š O%Ô&˙+°. /ś28U:=ŸHăJöLşSËU WvX—]Ý^Wa]fšl m&prşrŇtçz|6|]}׃8‡Љ RŽ¨’F˜šăšŒœEĽ6§ř¨8­ŢąȲůˇN˝‰žRŔcÇ+:+ĺćčéęëěíîďđńňóôőö÷řůúűüţ˙      !"#%&'()*+,-/0123579;<=>ADEGHJKMOQSTVWXZ[]^_abegilnoqsuvy{}‚„…‡‰‹Ž’”–—™›œž ˘¤§ŞŤ­Ż°ąłľś¸šťźżÁÂĂĹÇČĘĚÍĎŃÓÖŘŮŰÜŢŕáäćçčęěîďđňôőöřúüýţ   [Š°ŠžŠŘŠ1‹S‹Ž‹Œ.ŒTŒ˘Œ˝ŒI¤ČŽ”ŽŁŽČŽ1ÚsÚ¤ÚĎžX˙•ŒX˙•ŒX˙•ŒX˙•ŒX˙•ŒX˙•ŒX˙•ŒX˙•ŒđLđ# đ †ÁĹÁ@ń˙˙˙€€€÷đđđśđ( đ đđ~" đ ł đB€Šp0 ŔňňňËԔ€œ1dÎ˙˙?đđ đđB đS đżË˙ ?đSĎžšt"ht˙˙page44ş|Đžş|Đžú˙  1>×âçó"03PS`ožÇÉŇÔÝâőISěďÔŢ­˛  œ Ľ ­ ł đ!ó!Ď'Ö'Ů'á'D(M(()+)B,E,Ś1ą1!2+2|2…2š2Ŕ2Ä2Ô2Ř2ß2ý23c3f3ć<é<4=;=‡=Œ=›=Ą=Ú=ă=2>5>XJ[J•LžLÇMÍM×MŢM3NCJOTYœŁťŔĘÎŮĺ*1UZűţ‹ĂÇÔĺí ó h!t!ý"# ,,,1,ź,Ĺ,Ç,Ü,!-3-k--œ-Ą-÷-ú-Ä1Î1D2W2b2s2ć2ö23%3{5˜5 66z6†6Ď6ĺ6˙677*7}7Ž7™7Ź7˛7É78888ŕ;ç;ň;< <*<B<R<{<‚<ˇ<ż<=2=ƒ=•=^>a>–?›?ÚCćC¨E­E„F‘FŸFŹFÇFĎFG G"G'G`GxGÓGăGěGH8H=HDHJH H¨HÔHęH¨IŤIżOÁOýPQQQ>QOQkQtQ—Q¤QßQćQ'R9RşR˝R÷UViVxVŢWäWŽX”XdYmY[[˜^Ż^5_A_t_Š_Š_Ż_Ü_ě_``e`t`aaÖbâbHcYcadjd´d˝d$e3e…e‹eťeÁeöeüe0f6fhfnfüfgœjŞjźjČjĽnŤn8oAoFoToşoŔo|ppńsősústtt2t;t@tGtvtztt…t1uFu vvvvĂwĘw$x+xJxNxUxYx€x„x‹xxÂxĆxÍxŃxxzzĚzÓzďzózúzţz!{%{,{0{^|d|Ś|Ź|ş|Ă|Ě|Ó|Ü|ß|}}m}q}Ř}ß}5~I~Á~Đ~• ĽŽ€!€1€8€e€k€œ€Ś€ű€LQ‡!‡˛ˆżˆűˆ‰v‹x‹‘‹¤‹؋ć‹QŒTŒVŒ^ŒqŒ{ŒٌěŒfm€†‘•˝ōˍŽ!ŽťŽŔŽV[ą‘ś‘8”?”<—I—Ť—¸—˗ؗU˜Z˜t˜y˜˜˘˜™ ™M™R™T™]™d™t™Š™Ľ™ą™řň™ü™VšdšĚΚӚښĺšęš››{›€›ŕăžžž!ž‹žŽž´žˇž̞ϞăžćžčžëžŸŸNŸRŸϟҟ   " . 1 Ÿ ˘ ΠŃ ř ű OĄRĄ>˘V˘x˘{˘Ś˘Š˘ň˘ŁVŁYŁzŁ‡Ł’Ł¤ŁťŁĐŁW¤`¤y¤„¤Ô¤ć¤TĽ[ĽbĽiĽtĽƒĽ-Ś0Ś°ŠťŠŞ ŞŞŞĂŞÉŞŤŤąŤ—­ž­\ądąuą}ą˛˛őľ ś&¸9¸ą¸ȸĽ˝ż˝ú˝žYžažŠžĐžö    ‚  ĂÇÔݡżˆŠÝähočőÓăěď+4ĎÖksäíđ‘˜Ł§×!ç!đ!ó!Ô"ŕ"0$5$§%ł% &&+'n'Ů'ă'Ź(ż())()+)..ú.ˆ/§/ä/Ú0@1Ě2Ô2J3Z3c3f38&8}:„:Ű<ă<€=†=Ú=ă=>)>2>5>XJ[JśN˝NŢOäO›QŁQORdRR­RśRšRÇWXZZčZîZ>[A[(\8\A\D\ÔbŮbŐeĺeîeńeĽg¨gîhřhtiiÍi%j+j/j7j?jŻj˛j˝jÉjńkl llÍnĐn;qDqŠqłqrrárërksvs˙stBtRt\t_tCwUwxxxy y3yËäÍćÍĚÎŐÎCĎSĎ]Ď`ϞҡŇâŇĺŇgÓjÓďÔ˙Ô Ő ŐPŰ\ŰÖŰÜŰ!Ü4Ü#ß3ß=ß@ßáá ááĄá§ámâťâźâââéâîâvăˆăšă¤ăÄĺÓĺÜĺßĺé–étë|ë}ě~ěĹěÎě{îƒîŇďŮďÖńâń.ň9ňĽň˛ňóó™óœóöö{÷÷žűŠű,ü0ü•üŸüˆý—ý ýŁýĐ×ŃŐđř* 9 B E w ~ ¤ Ż E M _äĺîßçkrăňűţ•Ôçĺ"ô"ý"#Ć$Ń$%,1,Ď,Ü,,-3-s--ß-î-÷-ú-đ2ö2ë3ó3Ł6Ź688~9J<R<Ę<Ô<)=2=Œ=•=Ń=ß=F>U>^>a>ŤDťD´EšEŠF‘FúGHÔHěHIŸIÂIĆIkLrLßL”M•MM`NiNĘNŇNsO{OżOÁO{H{K}R}E~I~Ć~Đ~çě6EhlˇˆżˆšŠ‹˛ŒľŒáŒěŒō׍Ž-ŽĽŽ´Ž͑Бç’ë’––Q˜T˜.™0™m™t™˜™Ľ™ů™ü™]šdš››e›t›]ždž)Ÿ1Ÿ>ŸΟt } € 7Ą:ĄBĄn˘u˘?ŁGŁ›Ł¤ŁđŁ˙Łݤ椼ƒĽŚ#Ś-Ś0Śě¨ó¨ŠŠúŤŹŹŹŽ”Ž °‡°öą˛˛˛ęľńľOˇWˇź¸ȸ߸č¸8ş@şcťjť›ť¤ťź}źŠžĐž333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333hqry˝˝ŠžŞžžžĐžqrö63˙˙˙˙˙˙˙˙˙_˙˙˙˙˙˙˙˙˙txž$˙˙˙˙˙˙˙˙˙­ Zń˙˙˙˙˙˙˙˙˙ŠrfÖ^Y˙˙˙˙˙˙˙˙˙¸0N xoB˙˙˙˙˙˙˙˙˙×Jœ řóÚË˙˙˙˙˙˙˙˙˙ŕ]% ňúf˙˙˙˙˙˙˙˙˙ˇ:T T6č:˙˙˙˙˙˙˙˙˙Đ(ˇ źń <˙˙˙˙˙˙˙˙˙Eő ˆŽ†‡˙˙˙˙˙˙˙˙˙Rţ DnŮ˙˙˙˙˙˙˙˙˙  Ą ˛"ě;˙˙˙˙˙˙˙˙˙pŻ–ˆ8˙˙˙˙˙˙˙˙˙śCĎb"ö˙˙˙˙˙˙˙˙˙\Ů”jt9˙˙˙˙˙˙˙˙˙—žäkśÍ˙˙˙˙˙˙˙˙˙âĺ˙˙˙˙˙˙˙˙˙§B~:ÜÎŐ˙˙˙˙˙˙˙˙˙Ž[!ŠŰ(3˙˙˙˙˙˙˙˙˙y%¨8œV˙˙˙˙˙˙˙˙˙źx-üťęŽ˙˙˙˙˙˙˙˙˙ťoŢ:ÍÖ8˙˙˙˙˙˙˙˙˙ĘeÁ]˙˙˙˙˙˙˙˙˙íĆ<ňÎ.˙˙˙˙˙˙˙˙˙mâ`lœj˙˙˙˙˙˙˙˙˙pŠŰ(3˙˙˙˙˙˙˙˙˙Lqh ÄďŠá˙˙˙˙˙˙˙˙˙~TX!đÔ°ç˙˙˙˙˙˙˙˙˙-Ax!0ĎR˙˙˙˙˙˙˙˙˙úž"Š>0˙˙˙˙˙˙˙˙˙p$#H˙˙˙˙˙˙˙˙˙ý5N&¤ČÔ˙˙˙˙˙˙˙˙˙ßQ'B<Ë˙˙˙˙˙˙˙˙˙Ň`)Tá„{˙˙˙˙˙˙˙˙˙÷\Ň+V0lu˙˙˙˙˙˙˙˙˙Šdű,œÜ¨í˙˙˙˙˙˙˙˙˙Ta--’ú^ź˙˙˙˙˙˙˙˙˙Ľ•/üŰ$Ë˙˙˙˙˙˙˙˙˙Jz7ŽźbĄ˙˙˙˙˙˙˙˙˙……8œËšY˙˙˙˙˙˙˙˙˙T9ôaĘm˙˙˙˙˙˙˙˙˙ˇZ?9ŚţBx˙˙˙˙˙˙˙˙˙7";jŹí˙˙˙˙˙˙˙˙˙ÂFc=‚cŸ˙˙˙˙˙˙˙˙˙˙m>ˆ ?˙˙˙˙˙˙˙˙˙ĺUţ>ňúf˙˙˙˙˙˙˙˙˙+6ŕ?rł:}˙˙˙˙˙˙˙˙˙ö}üBÖFÎ˙˙˙˙˙˙˙˙˙5D ťT¤˙˙˙˙˙˙˙˙˙ÁäDô¸î6˙˙˙˙˙˙˙˙˙ľ+čD:ÜÎŐ˙˙˙˙˙˙˙˙˙Ň+FşÜˆ¨˙˙˙˙˙˙˙˙˙ŤFŘęŐ˙˙˙˙˙˙˙˙˙^2!FPN ˙˙˙˙˙˙˙˙˙Šn?G^#Jj˙˙˙˙˙˙˙˙˙˛űH:ëö˙˙˙˙˙˙˙˙˙CRŞID%˙˙˙˙˙˙˙˙˙ÂJ˘Ň˙˙˙˙˙˙˙˙˙q `Jş¤8Ű˙˙˙˙˙˙˙˙˙ŕ3RLÎ2HŞ˙˙˙˙˙˙˙˙˙W+đMČ%žÖ˙˙˙˙˙˙˙˙˙ 4P*šśŸ˙˙˙˙˙˙˙˙˙u;qP➰R˙˙˙˙˙˙˙˙˙Ě{ÂP°‹:‚˙˙˙˙˙˙˙˙˙…/ŽRpZúz˙˙˙˙˙˙˙˙˙řr†SŹŠxd˙˙˙˙˙˙˙˙˙Đ'‚Uö ˙˙˙˙˙˙˙˙˙˜–VDË.Ď˙˙˙˙˙˙˙˙˙pDWŽYÖ˙˙˙˙˙˙˙˙˙s{MWj*b’˙˙˙˙˙˙˙˙˙0B%X°)˙˙˙˙˙˙˙˙˙ĘČYpą˛ž˙˙˙˙˙˙˙˙˙ťw Z¨Ř`Ů˙˙˙˙˙˙˙˙˙7,Z ťT¤˙˙˙˙˙˙˙˙˙ü/×Z@ŠÜ‡˙˙˙˙˙˙˙˙˙ťN“\¨Áhă˙˙˙˙˙˙˙˙˙ěmÄ]ěśY˙˙˙˙˙˙˙˙˙‹bč]šŘi˙˙˙˙˙˙˙˙˙€A^& dŠ˙˙˙˙˙˙˙˙˙ X1^Ä3Œk˙˙˙˙˙˙˙˙˙ĺ[]^$|Ře˙˙˙˙˙˙˙˙˙qÝ_š¤B˙˙˙˙˙˙˙˙˙˘`Ó"˙˙˙˙˙˙˙˙˙&7=a&ý2k˙˙˙˙˙˙˙˙˙Ő-ľa:ÜÎŐ˙˙˙˙˙˙˙˙˙ŚNbîńBö˙˙˙˙˙˙˙˙˙,RŚbŽa P˙˙˙˙˙˙˙˙˙XHeäR/˙˙˙˙˙˙˙˙˙9<čeŔH0˙˙˙˙˙˙˙˙˙ §h˜ŕ˘É˙˙˙˙˙˙˙˙˙W ƒi`•h#˙˙˙˙˙˙˙˙˙ĂW9jü H˙˙˙˙˙˙˙˙˙‹9Ék ”˙˙˙˙˙˙˙˙˙sxmÎŇ^í˙˙˙˙˙˙˙˙˙Ä4zmüWÄ˙˙˙˙˙˙˙˙˙ęNnŚđ’b˙˙˙˙˙˙˙˙˙s,†oy>é˙˙˙˙˙˙˙˙˙˜LsJśä•˙˙˙˙˙˙˙˙˙vP?u„xöĚ˙˙˙˙˙˙˙˙˙J8DwŘhÎ[˙˙˙˙˙˙˙˙˙f˜wŽj¨Ÿ˙˙˙˙˙˙˙˙˙öD°xęőXŽ˙˙˙˙˙˙˙˙˙ ($y@Öé˙˙˙˙˙˙˙˙˙‰ *yŘ=Č.˙˙˙˙˙˙˙˙˙%użyöđÎ˙˙˙˙˙˙˙˙˙EeNz°Oܑ˙˙˙˙˙˙˙˙˙äor|ŕÄľ˙˙˙˙˙˙˙˙˙Xź|JŞś!˙˙˙˙˙˙˙˙˙VdŃÂw˙˙˙˙˙˙˙˙˙„„˜ţĆÂ^„Â`„˜ţ^J.„*„˜ţĆ*^„*`„˜ţOJPJQJ^J.„’„˜ţĆ’^„’`„˜ţ.„ú„˜ţĆú^„ú`„˜ţ.„b„˜ţĆb^„b`„˜ţ.„Ę„˜ţĆĘ^„Ę`„˜ţ.„2 „˜ţĆ2 ^„2 `„˜ţ.„š „˜ţĆš ^„š `„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„Đ„˜ţĆĐ^„Đ`„˜ţ.„p„˜ţĆp^„p`„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„€„˜ţ^„€`„˜ţo(.€„P„˜ţ^„P`„˜ţ.‚„ „L˙^„ `„L˙.€„đ„˜ţ^„đ`„˜ţ.€„Ŕ!„˜ţ^„Ŕ!`„˜ţ.‚„$„L˙^„$`„L˙.€„`'„˜ţ^„`'`„˜ţ.€„0*„˜ţ^„0*`„˜ţ.‚„-„L˙^„-`„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„ „˜ţ^„ `„˜ţ.€„p„˜ţ^„p`„˜ţ.‚„@ „L˙^„@ `„L˙.€„„˜ţ^„`„˜ţ.€„ŕ„˜ţ^„ŕ`„˜ţ.‚„°„L˙^„°`„L˙.€„€„˜ţ^„€`„˜ţ.€„P„˜ţ^„P`„˜ţ.‚„ „L˙^„ `„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„@ „˜ţ^„@ `„˜ţo(.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.€„ „˜ţ^„ `„˜ţ.€„đ„˜ţ^„đ`„˜ţ.‚„Ŕ!„L˙^„Ŕ!`„L˙.„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţĆĐ^„Đ`„˜ţ5o(.„„˜ţĆÂ^„Â`„˜ţ5o(.„p„˜ţ^„p`„˜ţo(„@ „˜ţĆ@ ^„@ `„˜ţ5o(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„8„˜ţ^„8`„˜ţo(.€„„˜ţ^„`„˜ţOJQJ^Jo(o€ „Ř „˜ţ^„Ř `„˜ţOJQJo(§đ€ „¨ „˜ţ^„¨ `„˜ţOJQJo(ˇđ€„x„˜ţ^„x`„˜ţOJQJ^Jo(o€ „H„˜ţ^„H`„˜ţOJQJo(§đ€ „„˜ţ^„`„˜ţOJQJo(ˇđ€„č„˜ţ^„č`„˜ţOJQJ^Jo(o€ „¸„˜ţ^„¸`„˜ţOJQJo(§đ„Đ„˜ţ^„Đ`„˜ţCJOJQJ^JaJo(.„ „˜ţ^„ `„˜ţ.„p„L˙^„p`„L˙.„@ „˜ţ^„@ `„˜ţ.„„˜ţ^„`„˜ţ.„ŕ„L˙^„ŕ`„L˙.„°„˜ţ^„°`„˜ţ.„€„˜ţ^„€`„˜ţ.„P„L˙^„P`„L˙.„8„˜ţ^„8`„˜ţo(.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţĆĐ^„Đ`„˜ţ5o(.„„˜ţĆÂ^„Â`„˜ţ5o(.„p„˜ţ^„p`„˜ţo(„@ „˜ţĆ@ ^„@ `„˜ţ5o(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„:„˜ţ^„:`„˜ţ5o(.€„ „˜ţ^„ `„˜ţ.‚„Ú„L˙^„Ú`„L˙.€„Ş „˜ţ^„Ş `„˜ţ.€„z „˜ţ^„z `„˜ţ.‚„J„L˙^„J`„L˙.€„„˜ţ^„`„˜ţ.€„ę„˜ţ^„ę`„˜ţ.‚„ş„L˙^„ş`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţĆĐ^„Đ`„˜ţ.€„ „˜ţĆ ^„ `„˜ţ.€„p„˜ţĆp^„p`„˜ţ.€„@ „˜ţĆ@ ^„@ `„˜ţ.€„„˜ţĆ^„`„˜ţ.€„ŕ„˜ţĆŕ^„ŕ`„˜ţ.€„°„˜ţĆ°^„°`„˜ţ.€„€„˜ţĆ€^„€`„˜ţ.€„P„˜ţĆP^„P`„˜ţ.„Ă„ĺţĆĂ^„Ă`„ĺţo(.„†„ĺţƆ^„†`„ĺţo(.„I„ĺţĆI^„I`„ĺţo(.„ „ĺţĆ ^„ `„ĺţo(.„Ď „ĺţĆĎ ^„Ď `„ĺţo(.„’„ĺţĆ’^„’`„ĺţo(.„U„ĺţĆU^„U`„ĺţo(.„„ĺţĆ^„`„ĺţo(.„Ű„ĺţĆŰ^„Ű`„ĺţo(.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Ă„ĺţĆĂ^„Ă`„ĺţo(.„†„ĺţƆ^„†`„ĺţo(.„I„ĺţĆI^„I`„ĺţo(.„ „ĺţĆ ^„ `„ĺţo(.„Ď „ĺţĆĎ ^„Ď `„ĺţo(.„’„ĺţĆ’^„’`„ĺţo(.„U„ĺţĆU^„U`„ĺţo(.„„ĺţĆ^„`„ĺţo(.„Ű„ĺţĆŰ^„Ű`„ĺţo(.„Đ„˜ţĆĐ^„Đ`„˜ţ5o(.„„˜ţĆÂ^„Â`„˜ţ5o(.„p„˜ţ^„p`„˜ţo(„@ „˜ţĆ@ ^„@ `„˜ţ5o(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Ă„ĺţĆĂ^„Ă`„ĺţo(.„†„ĺţƆ^„†`„ĺţo(.„I„ĺţĆI^„I`„ĺţo(.„ „ĺţĆ ^„ `„ĺţo(.„Ď „ĺţĆĎ ^„Ď `„ĺţo(.„’„ĺţĆ’^„’`„ĺţo(.„U„ĺţĆU^„U`„ĺţo(.„„ĺţĆ^„`„ĺţo(.„Ű„ĺţĆŰ^„Ű`„ĺţo(.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙. „$ „0ý^„$ `„0ý>*CJo(.€„Œ „˜ţ^„Œ `„˜ţ.‚„\ „L˙^„\ `„L˙.€„,„˜ţ^„,`„˜ţ.€„ü„˜ţ^„ü`„˜ţ.‚„Ě„L˙^„Ě`„L˙.€„œ„˜ţ^„œ`„˜ţ.€„l„˜ţ^„l`„˜ţ.‚„<„L˙^„<`„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţĆĐ^„Đ`„˜ţo(.€„ „˜ţĆ ^„ `„˜ţOJQJ^Jo(o€ „p„˜ţĆp^„p`„˜ţOJQJo(§đ€ „@ „˜ţĆ@ ^„@ `„˜ţOJQJo(ˇđ€„„˜ţĆ^„`„˜ţOJQJ^Jo(o€ „ŕ„˜ţĆŕ^„ŕ`„˜ţOJQJo(§đ€ „°„˜ţĆ°^„°`„˜ţOJQJo(ˇđ€„€„˜ţĆ€^„€`„˜ţOJQJ^Jo(o€ „P„˜ţĆP^„P`„˜ţOJQJo(§đ„Đ„˜ţĆĐ^„Đ`„˜ţ5o(.„„˜ţĆÂ^„Â`„˜ţ5o(.„p„˜ţ^„p`„˜ţo(„@ „˜ţĆ@ ^„@ `„˜ţ5o(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„8„˜ţĆ8^„8`„˜ţ.„*„˜ţĆ*^„*`„˜ţ5o(.„Ř „˜ţ^„Ř `„˜ţo(€„¨ „˜ţƨ ^„¨ `„˜ţ.€„x„˜ţĆx^„x`„˜ţ.€„H„˜ţĆH^„H`„˜ţ.€„„˜ţĆ^„`„˜ţ.€„č„˜ţĆč^„č`„˜ţ.€„¸„˜ţƸ^„¸`„˜ţ.„p„˜ţ^„p`„˜ţo(.€„@ „˜ţ^„@ `„˜ţ.‚„„L˙^„`„L˙.€„ŕ„˜ţ^„ŕ`„˜ţ.€„°„˜ţ^„°`„˜ţ.‚„€„L˙^„€`„L˙.€„P„˜ţ^„P`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„đ„L˙^„đ`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„h„˜ţĆh^„h`„˜ţ.„ „˜ţĆ ^„ `„˜ţ. „ü„˜ţ^„ü`„˜ţOJQJo(ˇđ€„Ě„˜ţ^„Ě`„˜ţOJQJ^Jo(o€ „œ „˜ţ^„œ `„˜ţOJQJo(§đ€ „l „˜ţ^„l `„˜ţOJQJo(ˇđ€„<„˜ţ^„<`„˜ţOJQJ^Jo(o€ „ „˜ţ^„ `„˜ţOJQJo(§đ€ „Ü„˜ţ^„Ü`„˜ţOJQJo(ˇđ€„Ź„˜ţ^„Ź`„˜ţOJQJ^Jo(o€ „|„˜ţ^„|`„˜ţOJQJo(§đ„Đ„˜ţĆĐ^„Đ`„˜ţ.€„ „˜ţĆ ^„ `„˜ţ.€„p„˜ţĆp^„p`„˜ţ.€„@ „˜ţĆ@ ^„@ `„˜ţ.€„„˜ţĆ^„`„˜ţ.€„ŕ„˜ţĆŕ^„ŕ`„˜ţ.€„°„˜ţĆ°^„°`„˜ţ.€„€„˜ţĆ€^„€`„˜ţ.€„P„˜ţĆP^„P`„˜ţ.„h„˜ţ^„h`„˜ţo(.„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„„˜ţ^„`„˜ţ.€„Ř „˜ţ^„Ř `„˜ţ.‚„¨ „L˙^„¨ `„L˙.€„x„˜ţ^„x`„˜ţ.€„H„˜ţ^„H`„˜ţ.‚„„L˙^„`„L˙.€„č„˜ţ^„č`„˜ţ.€„¸„˜ţ^„¸`„˜ţ.‚„ˆ„L˙^„ˆ`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„ „˜ţ^„ `„˜ţ5.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţB*CJ^Jo(ph˙.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„8„˜ţ^„8`„˜ţo(. „„˜ţ^„`„˜ţOJQJo(o „Ř „˜ţ^„Ř `„˜ţOJQJo(§đ „¨ „˜ţ^„¨ `„˜ţOJQJo(ˇđ „x„˜ţ^„x`„˜ţOJQJo(o „H„˜ţ^„H`„˜ţOJQJo(§đ „„˜ţ^„`„˜ţOJQJo(ˇđ „č„˜ţ^„č`„˜ţOJQJo(o „¸„˜ţ^„¸`„˜ţOJQJo(§đ„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţOJQJ^Jo(o€ „p„˜ţ^„p`„˜ţOJQJo(§đ€ „@ „˜ţ^„@ `„˜ţOJQJo(ˇđ€„„˜ţ^„`„˜ţOJQJ^Jo(o€ „ŕ„˜ţ^„ŕ`„˜ţOJQJo(§đ€ „°„˜ţ^„°`„˜ţOJQJo(ˇđ€„€„˜ţ^„€`„˜ţOJQJ^Jo(o€ „P„˜ţ^„P`„˜ţOJQJo(§đ„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„h„˜ţ^„h`„˜ţOJPJQJ^J.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţCJOJQJ^J o(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„*„˜ţ^„*`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Ă„ĺţĆĂ^„Ă`„ĺţo(.„†„ĺţƆ^„†`„ĺţo(.„I„ĺţĆI^„I`„ĺţo(.„ „ĺţĆ ^„ `„ĺţo(.„Ď „ĺţĆĎ ^„Ď `„ĺţo(.„’„ĺţĆ’^„’`„ĺţo(.„U„ĺţĆU^„U`„ĺţo(.„„ĺţĆ^„`„ĺţo(.„Ű„ĺţĆŰ^„Ű`„ĺţo(.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„ „˜ţĆ ^„ `„˜ţo(.„’„˜ţĆ’^„’`„˜ţ5o(.„@ „˜ţ^„@ `„˜ţo(„„˜ţĆ^„`„˜ţ5o(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„ „˜ţĆ ^„ `„˜ţo(.„Đ„˜ţ^„Đ`„˜ţ5o(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţĆĐ^„Đ`„˜ţ.€„ „˜ţĆ ^„ `„˜ţ.€„p„˜ţĆp^„p`„˜ţ.€„@ „˜ţĆ@ ^„@ `„˜ţ.€„„˜ţĆ^„`„˜ţ.€„ŕ„˜ţĆŕ^„ŕ`„˜ţ.€„°„˜ţĆ°^„°`„˜ţ.€„€„˜ţĆ€^„€`„˜ţ.€„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„ „˜ţ^„ `„˜ţ.€„p„˜ţ^„p`„˜ţ.‚„@ „L˙^„@ `„L˙.€„„˜ţ^„`„˜ţ.€„ŕ„˜ţ^„ŕ`„˜ţ.‚„°„L˙^„°`„L˙.€„€„˜ţ^„€`„˜ţ.€„P„˜ţ^„P`„˜ţ.‚„ „L˙^„ `„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ5o(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.h „“„˜ţ^„“`„˜ţ‡hˆH.h „c„˜ţ^„c`„˜ţ‡hˆH.’h „3 „L˙^„3 `„L˙‡hˆH.h „„˜ţ^„`„˜ţ‡hˆH.h „Ó„˜ţ^„Ó`„˜ţ‡hˆH.’h „Ł„L˙^„Ł`„L˙‡hˆH.h „s„˜ţ^„s`„˜ţ‡hˆH.h „C„˜ţ^„C`„˜ţ‡hˆH.’h „„L˙^„`„L˙‡hˆH.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„„˜ţ^„`„˜ţ.€„Ř „˜ţ^„Ř `„˜ţ.‚„¨ „L˙^„¨ `„L˙.€„x„˜ţ^„x`„˜ţ.€„H„˜ţ^„H`„˜ţ.‚„„L˙^„`„L˙.€„č„˜ţ^„č`„˜ţ.€„¸„˜ţ^„¸`„˜ţ.‚„ˆ„L˙^„ˆ`„L˙. „8„˜ţ^„8`„˜ţOJQJo(ˇđ€„„˜ţ^„`„˜ţOJQJ^Jo(o€ „Ř „˜ţ^„Ř `„˜ţOJQJo(§đ€ „¨ „˜ţ^„¨ `„˜ţOJQJo(ˇđ€„x„˜ţ^„x`„˜ţOJQJ^Jo(o€ „H„˜ţ^„H`„˜ţOJQJo(§đ€ „„˜ţ^„`„˜ţOJQJo(ˇđ€„č„˜ţ^„č`„˜ţOJQJ^Jo(o€ „¸„˜ţ^„¸`„˜ţOJQJo(§đ„Ţ„˜ţĆŢ^„Ţ`„˜ţCJOJPJQJ^J.€„„˜ţĆ^„`„˜ţCJOJQJo(o€„Ř „˜ţĆŘ ^„Ř `„˜ţCJOJQJo(§đ€„¨ „˜ţƨ ^„¨ `„˜ţCJOJQJo(§đ€„x„˜ţĆx^„x`„˜ţCJOJQJo(§đ€„H„˜ţĆH^„H`„˜ţCJOJQJo(§đ€„„˜ţĆ^„`„˜ţCJOJQJo(§đ€„č„˜ţĆč^„č`„˜ţCJOJQJo(§đ€„¸„˜ţƸ^„¸`„˜ţCJOJQJo(§đ„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ5.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţ^„ `„˜ţOJPJQJ^J.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţĆĐ^„Đ`„˜ţ5o(.„„˜ţĆÂ^„Â`„˜ţ5o(.„p„˜ţ^„p`„˜ţo(„@ „˜ţĆ@ ^„@ `„˜ţ5o(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„Đ„˜ţ^„Đ`„˜ţCJOJQJ^J o(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Ř „˜ţ^„Ř `„˜ţo(.€„¨ „˜ţ^„¨ `„˜ţ.‚„x„L˙^„x`„L˙.€„H„˜ţ^„H`„˜ţ.€„„˜ţ^„`„˜ţ.‚„č„L˙^„č`„L˙.€„¸„˜ţ^„¸`„˜ţ.€„ˆ„˜ţ^„ˆ`„˜ţ.‚„X „L˙^„X `„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ5.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ5.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„ß„ĺţĆß^„ß`„ĺţo(.„˘„ĺţƢ^„˘`„ĺţo(.„e „ĺţĆe ^„e `„ĺţo(.„( „ĺţĆ( ^„( `„ĺţo(.„ë„ĺţĆë^„ë`„ĺţo(.„Ž„ĺţĆŽ^„Ž`„ĺţo(.„q„ĺţĆq^„q`„ĺţo(.„4„ĺţĆ4^„4`„ĺţo(.„÷„ĺţĆ÷^„÷`„ĺţo(.„Đ„˜ţĆĐ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„„˜ţ^„`„˜ţo(.€„Ř „˜ţ^„Ř `„˜ţOJQJ^Jo(o€ „¨ „˜ţ^„¨ `„˜ţOJQJo(§đ€ „x„˜ţ^„x`„˜ţOJQJo(ˇđ€„H„˜ţ^„H`„˜ţOJQJ^Jo(o€ „„˜ţ^„`„˜ţOJQJo(§đ€ „č„˜ţ^„č`„˜ţOJQJo(ˇđ€„¸„˜ţ^„¸`„˜ţOJQJ^Jo(o€ „ˆ„˜ţ^„ˆ`„˜ţOJQJo(§đ„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„8„˜ţĆ8^„8`„˜ţo(.„*„˜ţĆ*^„*`„˜ţ5o(.„Ř „˜ţ^„Ř `„˜ţo(„¨ „˜ţƨ ^„¨ `„˜ţo(.„x„˜ţĆx^„x`„˜ţo(.„H„˜ţĆH^„H`„˜ţo(.„„˜ţĆ^„`„˜ţo(.„č„˜ţĆč^„č`„˜ţo(.„¸„˜ţƸ^„¸`„˜ţo(.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.h „Đ„˜ţ^„Đ`„˜ţ‡hˆH.h „ „˜ţ^„ `„˜ţ‡hˆH.’h „p„L˙^„p`„L˙‡hˆH.h „@ „˜ţ^„@ `„˜ţ‡hˆH.h „„˜ţ^„`„˜ţ‡hˆH.’h „ŕ„L˙^„ŕ`„L˙‡hˆH.h „°„˜ţ^„°`„˜ţ‡hˆH.h „€„˜ţ^„€`„˜ţ‡hˆH.’h „P„L˙^„P`„L˙‡hˆH.„„˜ţ^„`„˜ţ5.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţ^„Đ`„˜ţ5o(. „ „˜ţ^„ `„˜ţOJQJo(o „p„˜ţ^„p`„˜ţOJQJo(§đ „@ „˜ţ^„@ `„˜ţOJQJo(ˇđ „„˜ţ^„`„˜ţOJQJo(o „ŕ„˜ţ^„ŕ`„˜ţOJQJo(§đ „°„˜ţ^„°`„˜ţOJQJo(ˇđ „€„˜ţ^„€`„˜ţOJQJo(o „P„˜ţ^„P`„˜ţOJQJo(§đ„Đ„˜ţĆĐ^„Đ`„˜ţo(.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„P„˜ţ^„P`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„đ„L˙^„đ`„L˙.€„Ŕ!„˜ţ^„Ŕ!`„˜ţ.€„$„˜ţ^„$`„˜ţ.‚„`'„L˙^„`'`„L˙.€„0*„˜ţ^„0*`„˜ţ.€„-„˜ţ^„-`„˜ţ.‚„Đ/„L˙^„Đ/`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţ^„ `„˜ţ.„p„L˙^„p`„L˙.„@ „˜ţ^„@ `„˜ţ.„„˜ţ^„`„˜ţ.„ŕ„L˙^„ŕ`„L˙.„°„˜ţ^„°`„˜ţ.„€„˜ţ^„€`„˜ţ.„P„L˙^„P`„L˙.„8„˜ţ^„8`„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„Đ„˜ţ^„Đ`„˜ţo(.„ „˜ţĆ ^„ `„˜ţo(.„p„˜ţĆp^„p`„˜ţo(.„@ „˜ţĆ@ ^„@ `„˜ţo(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(.„@ „˜ţ^„@ `„˜ţo(.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.€„ „˜ţ^„ `„˜ţ.€„đ„˜ţ^„đ`„˜ţ.‚„Ŕ!„L˙^„Ŕ!`„L˙.„Đ„˜ţ^„Đ`„˜ţo(.„ „˜ţĆ ^„ `„˜ţo(.„p„˜ţĆp^„p`„˜ţo(.„@ „˜ţĆ@ ^„@ `„˜ţo(.„„˜ţĆ^„`„˜ţo(.„ŕ„˜ţĆŕ^„ŕ`„˜ţo(.„°„˜ţĆ°^„°`„˜ţo(.„€„˜ţĆ€^„€`„˜ţo(.„P„˜ţĆP^„P`„˜ţo(. „Đ„˜ţ^„Đ`„˜ţB*CJOJQJ^JaJo(ph˙.„ „˜ţ^„ `„˜ţ.„p„L˙^„p`„L˙.„@ „˜ţ^„@ `„˜ţ.„„˜ţ^„`„˜ţ.„ŕ„L˙^„ŕ`„L˙.„°„˜ţ^„°`„˜ţ.„€„˜ţ^„€`„˜ţ.„P„L˙^„P`„L˙. „ „˜ţ^„ `„˜ţOJQJo(ˇđ€„p„˜ţ^„p`„˜ţOJQJ^Jo(o€ „@ „˜ţ^„@ `„˜ţOJQJo(§đ€ „„˜ţ^„`„˜ţOJQJo(ˇđ€„ŕ„˜ţ^„ŕ`„˜ţOJQJ^Jo(o€ „°„˜ţ^„°`„˜ţOJQJo(§đ€ „€„˜ţ^„€`„˜ţOJQJo(ˇđ€„P„˜ţ^„P`„˜ţOJQJ^Jo(o€ „ „˜ţ^„ `„˜ţOJQJo(§đ„8„˜ţ^„8`„˜ţ.€„„˜ţ^„`„˜ţ.‚„Ř „L˙^„Ř `„L˙.€„¨ „˜ţ^„¨ `„˜ţ.€„x„˜ţ^„x`„˜ţ.‚„H„L˙^„H`„L˙.€„„˜ţ^„`„˜ţ.€„č„˜ţ^„č`„˜ţ.‚„¸„L˙^„¸`„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.€„ „˜ţ^„ `„˜ţ.‚„p„L˙^„p`„L˙.€„@ „˜ţ^„@ `„˜ţ.€„„˜ţ^„`„˜ţ.‚„ŕ„L˙^„ŕ`„L˙.€„°„˜ţ^„°`„˜ţ.€„€„˜ţ^„€`„˜ţ.‚„P„L˙^„P`„L˙.„Đ„˜ţ^„Đ`„˜ţ.„ „˜ţĆ ^„ `„˜ţ.„p„˜ţĆp^„p`„˜ţ.„@ „˜ţĆ@ ^„@ `„˜ţ.„„˜ţĆ^„`„˜ţ.„ŕ„˜ţĆŕ^„ŕ`„˜ţ.„°„˜ţĆ°^„°`„˜ţ.„€„˜ţĆ€^„€`„˜ţ.„P„˜ţĆP^„P`„˜ţ.q-Ax!äé Vßé ^2!FŔăé X1^ ăé ÂJű +Eő ÂFc=~TX!úž"ŠrĐ(ˇ pDW&7=aTa--u;qP­ îřr†Sĺ[]^ü/×ZĽ•/7";sxmJ8Dw´é   Ą ‹bč]s{MWäor|+6ŕ?ßQ'ĘeLqh —žŚNb˜Ls,RŚb˘`ŤF ($yf˜wqÝ_EeNz 4P‹9ÉkÄ4zm‰ *yĐâé ŕ]% 5Dmâ×Jœ Šdű,ý5N&˜–V%użyĺUţ>€âé 7,ZXź|ŕ3RLˇZ?9œ2îW ƒi0âé q `Jö}üBŕáé íĆpŻs,†oöD°x€A^ÁäDěmÄ]śCĎ˙m>Ň`)y%¨ťN“\ §hŠn?Gťw ZŇ+F\Ůp0B%XŽ[!Rţ Ě{ÂP˛űHźx-Ő-ľa&uŠťoŢW+đMęNnĘČYT9CRŞIĐ'‚UXHeJz7vP?up$……8z؀                 ÷PŘ                                   °âˆ                                             @ @ @ @ @ @ @ @ @         ž„g˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙         ř™                                                              TŠÜ        h…>                                            L€ŞŹ        "mÔ        ě¤                           @ @ @ @ @ @ @ @ @^,ŔÖ                                   ^ÔŁ                          Rc„                                                      .’ř­         znć       ě¤        š˛I                                   ŽŮˆł        DBO @ @ @ @ @ @ @ @­ś$                                                              TŠÜ                 TŠÜ        ’Ýh                                            ú•Žď                                             @ @ @ @ @ @ @ @ @!ĺŔAŠX$P:k $ ě*,Źs3­E4828GE7BOÝT‚‹‹Z ‘ĺo•ż˜0]˜Kiš_Ľ§(Šłl°>Ŕ˜ Áş#Ěc0ÔBkäePĺAMčŰďŤRřyř—OűŠžŤž˙@€€>1”˙„X@AKLN•ťĎžh@hHh”@hThVh´@hP@˙˙Unknown˙˙˙˙˙˙˙˙˙˙˙˙ G‡* €˙Times New Roman5€Symbol3. ‡* €˙Arial7. ‡ ŸVerdana7.ď { @ŸCalibri7ď K@ŸCambria5. ‡*a€˙Tahoma?= ‡* €˙Courier New;€Wingdings5€MangalAď ë BŸCambria Math"qˆđĐh.˜FśęFgŞB˙{Nä*ŻB|Nä*đ  ´´20Ĺ˝é˝ JƒQđüýHP đ˙ $Pä˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙§2o! xx ˙˙USERADMINĐq                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p ţ˙ŕ…ŸňůOhŤ‘+'łŮ0Tˆœ¨¸ÄÔ äđ   (4<DLäUSERNormalADMIN14Microsoft Office Word@xAË@ٕÉŃ@Ř˙pĆŃŃNŞB˙{ţ˙ŐÍ՜.“—+,ůŽDŐÍ՜.“—+,ůŽ,č hp|„Œ” œ¤Ź´ ź Éä*äĹ˝  Title\ 8@ _PID_HLINKSäA0brKhttp://www.stefanoscerra.it/movie-reviews-classification-weka-data-mining/Gw2@http://authorcentral.amazon.com/gp/landing/ref=ntt_atc_dp_pel_2G-b…http://www.amazon.com/s/ref=ntt_athr_dp_sr_pop_2?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Gerard%20BlokdijkG ) Mhttp://www.amazon.com/Gerard-Blokdijk/e/B002BLL870/ref=ntt_athr_dp_pel_pop_2Gw2 @http://authorcentral.amazon.com/gp/landing/ref=ntt_atc_dp_pel_1GQƒhttp://www.amazon.com/s/ref=ntt_athr_dp_sr_pop_1?_encoding=UTF8&sort=relevancerank&search-alias=books&field-author=Ivanka%20MenkenGm^Khttp://www.amazon.com/Ivanka-Menken/e/B002BOBZ8Y/ref=ntt_athr_dp_pel_pop_1G]^Ghttp://www.amazon.com/Ivanka-Menken/e/B002BOBZ8Y/ref=ntt_athr_dp_pel_1G  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ Ą˘Ł¤ĽŚ§¨ŠŞŤŹ­ŽŻ°ą˛ł´ľśˇ¸šşťź˝žżŔÁÂĂÄĹĆÇČÉĘËĚÍÎĎĐŃŇÓÔŐÖ×ŘŮÚŰÜÝŢßŕáâăäĺćçčéęëěíîďđńňóôőö÷řůúűüýţ˙      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ Ą˘Ł¤ĽŚ§¨ŠŞŤŹ­ŽŻ°ą˛ł´ľśˇ¸šşťź˝žżŔÁÂĂÄĹĆÇČÉĘËĚÍÎĎĐŃŇÓÔŐÖ×ŘŮÚŰÜÝŢßŕáâăäĺćçčéęëěíîďđńňóôőö÷řůúűüýţ˙     ţ˙˙˙ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgţ˙˙˙ijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ Ą˘Ł¤ĽŚ§¨ŠŞŤŹ­ŽŻ°ą˛ł´ľśˇ¸šşťź˝žżŔÁÂĂÄĹĆÇČÉĘËĚÍÎĎĐŃŇÓÔŐÖ×ŘŮÚŰÜÝŢßŕáâăäĺćçčéęëěíîďđńňóôőö÷řůúűüýţ˙     ţ˙˙˙ţ˙˙˙ !"ţ˙˙˙ý˙˙˙ý˙˙˙ý˙˙˙ý˙˙˙ý˙˙˙ý˙˙˙ý˙˙˙+ţ˙˙˙ţ˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙Root Entry˙˙˙˙˙˙˙˙ ŔFpđ}ĆŃŃ-€Data ˙˙˙˙˙˙˙˙˙˙˙˙ĝ1Table˙˙˙˙hTWordDocument˙˙˙˙.0SummaryInformation(˙˙˙˙˙˙˙˙˙˙˙˙DocumentSummaryInformation8˙˙˙˙˙˙˙˙CompObj˙˙˙˙˙˙˙˙˙˙˙˙y˙˙˙˙˙˙˙˙˙˙˙˙ţ˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙˙ţ˙ ˙˙˙˙ ŔF'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.8ô9˛q