ࡱ>  /1,-.34t` u|bjbjss %Fp !   ,   TTT8HTDToZTU(|U|U|UUUa^ilƚȚȚȚȚȚȚ$ɝh1& ;n`|Ua;n;n^ ^ |UUG 2ggg;n>^ 8|U Uƚg;nƚgg6h  NUHU 6dTy 3<oW~W NW N\g;n;n;n ^;n;n;no;n;n;n;n$C R R   < P ^ ^ ^ ^   How deliberate, spontaneous and unwanted memories emerge in a computational model of consciousness Bernard J. Baars The Neurosciences Institute San Diego, CA Uma Ramamurthy Institute for Intelligent Systems University of Memphis Memphis, TN  CONTACT _Con-42F0D5BA2 \c \s \l Stan Franklin Institute for Intelligent Systems University of Memphis Memphis, TN And as soon as I had recognized the taste of the piece of madeleine soaked in her decoction of lime-blossom which my aunt used to give me ... immediately the old grey house upon the street, where her room was, rose up like a stage set to attach itself to the little pavilion opening on to the garden which had been built out behind it for my parents ...; and with the house the town, from morning to night and in all weathers, the Square where I used to be sent before lunch, the streets along which I used to run errands, the country roads we took when it was fine ... ---Marcel Proust, Remembrance of Times Past () Introduction In these words the novelist Marcel Proust described a flood of unbidden memories evoked by the taste of what must be the most famous cookie in the world, Prousts madeleine soaked in lime-blossom tea. It is of course an experience of spontaneous recall. Judging by numerous thought-monitoring studies, spontaneous recall is the norm in everyday thought. But because it is more difficult to study experimentally than deliberate recall, we know much less about it. In this chapter we describe how a current theory of conscious cognition, global workspace theory, leads naturally to a model of both deliberate and spontaneous recall. Deliberate recall is intended; spontaneous memories are not. They can be divided into two categories: acceptable spontaneous recall (ASR), like Prousts famous rush of memories evoked by the taste of the madeleine. Such memories are interesting or pleasant or at least tolerable; unwanted spontaneous recall (USR), such as painful traumatic events, an annoying recurrent melody, or a the memory of an unresolved argument with a loved one. We therefore have three categories altogether, deliberate recall (DR), spontaneous recall that is acceptable (ASR) and unwanted spontaneous recall (USR). A large-scale computational model of global workspace theory called IDA has been developed by Franklin and co-authors (Franklin et al, 2005). IDA allows the detailed modeling of GW theory, together with other well-studied cognitive mechanisms, in challenging real-world tasks (Franklin et al, 1998; Franklin and Grasser 2001; Franklin 2001a; Ramamurthy et al, 2003, 2004; Franklin et al, 2005). This chapter will only focus on the question of consciousness and voluntary control as they apply to recall. Because IDA is able to simulate human functioning in at least one type of highly trained expertise, our approach here is to furnish a working proof of principle, showing that the basic computational mechanisms are adequate to generate human-like cognitive functioning in a real-world task. No added theoretical constructs are needed to show three kinds of recall we discuss here: deliberate, spontaneous and unwanted. They emerge directly from the original model. Unwanted memories are important in post-traumatic flashbacks, as reported in the clinical literature. While there is controversy about the accuracy of claimed memories, for example, there is little debate that repetitive thoughts and fragments of memories can occur. Wegner has been able to evoke unwanted words in an ironic recall paradigm, that is, an experimental method in which subjects are asked not to think of some category of ideas, such as white bears or pink elephants (1994). Unwanted memories can be annoying, or in the case of obsessional thinking, they may become disabling. In everyday life, one can simply ask people to bring to mind an intensely embarrassing personal memory, which can be quite uncomfortable. A number of clinical categories (the Axis I disorders) involve unwanted thoughts, feelings, actions, or memories. These conditions are at the more dysfunctional pole of unwanted mental events, and the study of unwanted memories may help provide some insight into them. Global Workspace Theory Global Workspace Theory (GWT) attempts to integrate a large body of evidence, much of which has been known for decades, into a single conceptual framework focused on the role of consciousness in human cognition (Baars 1988, 1997, 2002; Baars and Franklin 2003). Like other theories, GWT postulates that human cognition is implemented by a multitude of relatively small, special purpose Figure 1: Contexts in Global Workspace Theory [Baars 1988] processors, almost always unconscious (Minsky 1985, Ornstein 1986, Edelman 1987). Processors are comparatively simple, and communication between them is relatively rare, occurring over a narrow signal bandwidth. A coalition of such processors is a collection that works together to perform a specific task. Coalitions normally perform routine actions, in pursuit of sensory, motor or other problem-solving tasks. GWT suggests that the brain supports a global workspace capacity which allows for the integration and distribution of separate processors (for brain evidence, see Dehaene, S. et al, 2003; Schneider and Chein 2003; Baars 2002). A coalition of processors that gains access to the global workspace can broadcast a message to all the unconscious processors, in order to recruit new components to join in interpreting a novel situation, or in solving a current problem. In GWT, consciousness allows the brain to deal with novel or problematic situations that cant be dealt with efficiently, or at all, by habituated unconscious processes. In particular, it enables access to informational or memorial resources whose relevance cannot be predicted ahead of time, a problem known as the relevance problem in computational theories of cognition (Newell, 1990). GWT suggests an answer to the paradox of cognitive limited capacity associated with conscious experience, immediate memory, and immediate goals. Although the brain seen from the outside has tens of billions of neurons, with trillions of connections, this massively parallel and distributed architecture has remarkable capacity limits under non-routine task conditions. Consciousness and other limited-capacity processes are very expensive biologically -- if an animal is distracted while fleeing a predator, it may well die. Evolutionary pressures would therefore be expected to trend toward massive parallelism rather than a very narrow bottle neck of information processing. GWT suggests that the compensating advantage is the ability to mobilize many unconscious resources in a non-routine way to address novel challenges. This theory offers an explanation for consciousness being serial in nature rather than parallel as is common in the rest of the nervous system. Messages broadcast in parallel would tend to overwrite one another making understanding difficult. It similarly explains the limited capacity of consciousness as opposed to the huge capacity typical of long-term memory and other parts of the nervous system. Large messages would be overwhelming to small, special-purpose processors. Figure 2: Consciousness creates access [Baars 1997] Functions of Consciousness Global Workspace Theory postulates several functional roles for consciousness (Baars 1988). Consciousness is a supremely functional adaptation, (Baars 1997). Amongst the several functions, the following seem relevant in the context of memory: prioritizing, aiding to, recruiting and controlling actions, error detection, learning and adaptation, and the access function. The access function is crucial in the context of memory: all functions of consciousness involve novel access between separate elements of the mental theatre. Hence it seems that the most prominent function of consciousness is to increase access between separate sources of information. Figure 2 [Baars 1997] illustrates this universal access function of consciousness to different sources of information, including the various memory systems. Everything in Figure 2 is connected to every other element through the spotlight of consciousness. Memory systems are unconscious. This theory suggests consciousness is needed to recruit unconscious specialized networks that carry out detailed working memory functions (Baars and Franklin 2003, p.166). One principal function of consciousness is therefore to recruit the relevant resources needed for dealing with novel or problematic situations. These resources may include both knowledge and procedures. They are recruited internally, but may be partly driven by stimulus input. GWT therefore has only a few constructs: unconscious processors and a global workspace whose activity corresponds to conscious experience (under additional conditions; see Baars, 1988, Chapter 4). The third basic construct is called a context, defined as a set of unconscious constraints on conscious experiences that are reportable in the usual fashion (Figure 1). Constructs may involve different data types: there are goal contexts, perceptual contexts, conceptual contexts, and even cultural contexts that are shared by members of a group. Each context may be considered to be a stable coalition of processors. Contexts are very similar to mental representations, semantic networks, schemas, scripts, plans various kinds of knowledge representations. They only differ in that contexts are explicitly defined as unconscious representations which act to influence a conscious one. Contexts develop over time in a process of coalition-formation and competition. Currently active contexts are called Dominant Contexts --- such as the readers intention to finish this chapter, his or her semantic assumptions about non-voluntary memories, and a host of other unconscious factors that shape the experience of this sentence and its meaning. At any point in time, therefore, the current Dominant Context influences what will come to consciousness. In this chapter, we use the term 'non-voluntary memory' instead of 'involuntary memory' as we find the term 'involuntary' to be ambiguous. It could mean 'counter-voluntary' (unwanted) or 'automatic' (not under voluntary or conscious control, but consistent with one's dominant goals). We see this to be a crucial distinction as examples can be seen with slips and errors (unwanted), symptoms of obsessive compulsive disorders (unwanted), or Parkinson's tremors (unwanted). A large category of 'counter-voluntary' (unwanted) phenomena exists, which is fundamentally different from the category of automatic but acceptable actions. In contrast, 'non-voluntary' processes are NOT the result of conscious, volitional actions, even though they come to consciousness, but they arise from unconscious processes. William James (1890) reflects more than a century of scholarly discussion and informal experimentation on the topic of volitional control. One well-known phenomenon to students of psychology in the 19th century was ideomotor control -- the tendency of people to behave according some mental image of a goal. Hypnotic arm-raising -- simply by imagining ones arm floating upward --- was a particularly well-known example, but there were many others, such as the Chevreul Pendulum, in which subjects were instructed to will a small pendulum to swing a North-South direction, while at the same time visualizing the object moving in an East-West direction. In the Chevreul Pendulum demonstration ones intended goal is commonly overcome by the visualized direction of motion, a fact many people find astonishing. Experiments on errors of agency in the last decade show similar results (Wegner, 1994). A number of established phenomena also suggest a strong influence of conscious goal imagery in the control of voluntary action. Goal imagery is commonly used to improve athletic or musical performance, and has been found in some cases to be as effective as overt practice (Beauchamp, Bray and Albinson, 2002). On the other hand, frontal lobe damage is often associated with uncontrolled imitation of perceived others (Lhermitte, 1983), or an absence of impulse control in the case of violent or socially inappropriate actions. Phenomena like these were well-known to medical practitioners and students of hypnosis (e.g. Discovery of the Unconscious). For James, the relationship between conscious experience and the variety of unconscious brain processes posed a great philosophical problem. James was well aware of what we call automaticity today, which he called habit, and indeed had written the definitive chapter on Habit that was read throughout introductory psychology courses in the United States and elsewhere, in his Briefer Psychology (1892). Because the mind, for James, must be conscious by definition, it was difficult to conceive how a conscious thought could evoke a largely unconscious motor action. The answer, to James, was the ideomotor theory of voluntary control. James suggests that any conscious goal image tends to trigger a habitual action unless the goal evokes some opposing idea. In a classic passage of the Principles of Psychology (1890), he explores the example of making a voluntary decision contrary to ones own desire: deciding to get up from a warm bed in an unheated room in the dead of winter, not an unusual event in Boston in the 19th century. Now how do we ever get up under such circumstances? If I may generalize from my own experience, we more often than not get up without any struggle at all. (Baars, 1988) The essence of voluntary control, therefore, was to keep a goal image in consciousness long enough, for unconscious habits to trigger the appropriate action. As long as opposing thoughts were kept away from consciousness, the willed action would tend to take place with no need for a great mental struggle. Human beings do what they allow themselves to imagine they will do. This case, wrote James, seems to me to contain in miniature form the data for an entire psychology of volition. Quite surprisingly, James ideomotor hypothesis fits hand in glove with the theoretical framework of GWT. Conscious goals can activate several unconscious action plans and motor routines. If conscious contents are broadcast widely amongst specialized unconscious processors, the goals that need to recruit, organize and execute the plans and motor routines would be conscious. Global Workspace Theory says that detailed intelligence resides in specialized members of the processor-population who can interpret global messages as they relate to local conditions. Once a goal context is chosen, conscious goals tend to execute automatically. Further, conscious feedback about the results of an action is required for correcting errors. When we become conscious of a speech error, we repair it as quickly as we can, without being conscious of the details of the repair. Consciousness of errors go along with the ability to fix the errors unconsciously, thus creating effective access to unconscious resources. Global Workspace Theory adopts James ideomotor theory as is, and provides a functional architecture for it (Baars 1997, Chapter 6), which is implemented in the IDA model of GW theory (Franklin 2000b). The ideomotor hypothesis explains the phenomenology of voluntary control, the fact that we are often conscious of goals, but not of the means by which we carry out those goals in muscular actions. The intelligence of the GWT architectures highly distributed, just as it appears to be in the brain. The essential role of consciousness, therefore, is not to compute syntactic structures or the degrees of freedom of a moving arm. Rather, it is to trigger existing unconscious habits -- processors or automatisms -- to carry out a sufficiently long-lasting conscious goal (assuming there is a fit between the goal and the effector mechanisms, of course). What if there are no specialized habits to carry out the goal? Here GWT suggests an essential role for consciousness in learning -- of actions, of cognitive routines, and even of perceptual entities like phonemes and faces. And of course, the question of learning brings us back to memory --- the lifelong archive of learned experiences, perceptual units, concepts, linguistic rules and regularities, vocabulary items, action components, common associations, coping strategies, cognitive automatisms, and the like. Thus GWT makes a strong claim for the necessary role of conscious experience in evoking memorial processes in the brain. Voluntary and Non-voluntary Memories Humans encounter both voluntary and non-voluntary memories. Consider an episode of yourself being at the drive-in window of the local pharmacy to pick-up your prescription medication. You are looking through the window and see a man in a blue blazer walking inside the pharmacy who looks familiar. You only get a fleeting glance of this man. Though you are unable to identify and place this person, you do have a strong feeling of knowing that person. As you drive out of that place and other events take over your attention, the memory of this person you saw through the drive-in window keeps coming back to you non-voluntarily. There are two types of non-voluntary memories: wanted and unwanted. Wanted non-voluntary memories have a positive or neutral emotional content and affect associated with them, while unwanted non-voluntary memories have a negative emotional content and affect. We also encounter voluntary memories. These are episodes that we consciously recall. For example, consider your volitional act of finding out who is the person you saw through that drive-in window at the pharmacy. As a volitional act, recalling that episode of seeing that person in a blue blazer is a voluntary memory. We hypothesize that future non-voluntary memories may be in the service of this volitional act. We will return to these voluntary and non-voluntary memories later in this chapter after we see the IDA model, its Cognitive Cycle, and the mechanisms by which volitional actions happen in that model. Memory Systems In this section, we will briefly discuss the various human memory systems that will play a role in our model and analyses. It will be helpful to the reader for us to specify here how we plan to use the various terms, as there isnt always agreement in the literature. Figure 3 displays some of the relations between the memory systems we describe below.  Figure 3: Human Memory Systems (Franklin, et al, 2003) Sensory memory holds incoming sensory data in sensory buffers and is relatively unprocessed. It provides a workspace for integrating the features from which representations of objects and their relations are constructed. There are different sensory memory registers for different senses, iconic (visual), echoic, haptic, and likely a separate sensory memory for integrating multimodal information. Sensory memory has the fastest decay rate, measured in tens of milliseconds. Working memory is the manipulable scratchpad of the mind (Miyake and Shah 1999). It holds sensory data, both endogenous (for example, visual images and inner speech) and exogenous (sensory), together with their interpretations. Its decay rate is measured in tens of seconds. Again, there are separate working memory components associated with the different senses, the visuo-spatial sketchpad and the phonological loop for example (Baddeley 1993; Baars and Franklin 2003). Also, there are long-term processing components of working memory (Ericsson andKintsch 1995). Baars and Franklin (2003) have suggested that conscious input, rehearsal, and retrieval are necessary for the normal functions of working memory. Episodic or autobiographical memory is memory for events having features of a particular time and place (Baddeley, Conway, and Aggleton 2001). This memory system is associative and content-addressable. An unusual aspect in our memory model is the transient episodic memory (TEM), an episodic memory with a decay rate measured in hours. Though often assumed (e.g., Panksepp 1998, p.129 assumes a transient memory store), the existence of such a memory has rarely been explicitly asserted (Donald 2001; Conway 2002; Baars and Franklin 2003; Franklin, et al, 2003). Humans are blessed with a variety of long-term memory types that may decay exceedingly slowly, if at all. Memory researchers typically distinguish between procedural memory, the memory for motor skills including verbal skills, and declarative memory. Declarative memory (DM) is composed of autobiographical memory and semantic memory, memories of fact or belief typically lacking a particular source with a time and place of acquisition. Semantic memories have lost their association with their original autobiographical source. These declarative memory systems are accessed by means of specific cues from working memory. Though perceptual memory is often used synonymously with sensory memory, we follow Taylor (1999) and use the term differently (p. 29). Somewhat like semantic memory, perceptual memory is a memory for individuals, categories, and their relations. Our model distinguishes between semantic memory and perceptual memory (PM) and hypothesizes distinct mechanisms for each (Franklin, et al, 2003). According to this model, PM plays the major role in recognition, categorization, and more generally the assignment of interpretations. Upon presentation of features of an incoming stimulus, PM returns interpretations, the beginnings of meaning. The content of semantic memory is hypothesized to be a superset of that of PM. We speculate that perceptual memory is evolutionarily older than TEM or declarative memory. The functions of perceptual memory, the recognition of food items, nest-mates, prey, predators, potential mates, etc. seems almost universal among animals including insects (Beekman et al 2002), fish (Kelley and Magurran 2003) and crustaceans (Zulandt Schneider et al 2001). Even mollusks learn to recognize odors (Watanabe et al 1998). While common (perhaps universal) in mammals (Chrobak and Napier 1992) and birds (Clayton et al 2000), and conjectured for all vertebrates (Morris 2001), the functions of episodic memory, memories of events, seem beyond the reach of most invertebrates (Heinrich 1984). This suggests that PM in humans may be evolutionarily older than TEM in humans, making it likely, though not at all certain, that they have different neural mechanisms. Since the contents of TEM consolidate into DM, which contains semantic memory, these facts suggest the possibility of separate mechanisms for PM and semantic memory. One can also argue from the results of developmental studies. Infants who have not yet developed object permanence (TEM) are quite able to recognize and categorize. This argues, though not conclusively, for distinct systems for PM and semantic memory. In this same direction, Mandler (2000) distinguishes between perceptual and conceptual categorization in infants, the latter being based upon what objects are used for (see also Glenberg 1997). Our model would suggest PM involvement in perceptual categorization, while semantic memory would play the more significant role in conceptual categorization. Yet another line of empirical evidence comes from experiments with amnesiacs such as H.M. Pattern priming effects involving recognition of letters, words, shapes and objects have been demonstrated that are comparable to the capabilities of unimpaired subjects (Gabrieli et al 1990). These studies suggest that H.M. can encode into PM (recognition) but not into DM (no memory of having seen the original patterns), including semantic memory. These results are consistent with, and even suggest, distinct mechanisms. Additional support for the dissociation of PM and semantic memory come from another study of human amnesics (Fahle and Daum. 2002). A half-dozen amnesic patients learned a visual hyperacuity task as well as did control groups though their declarative memory was significantly impaired. Our final, and quite similar, line of argument for distinct PM and semantic memory mechanisms come from studies of rats in a radial arm maze (Olton, Becker, and Handelman 1979). With four arms baited and four not (with none restocked), normal rats learn to recognize which arms to search (PM) and remember which arms they have already fed in (TEM) so as not to search there a second time. Rats with their hippocampal systems excised lose their TEM but retain PM, again suggesting distinct mechanisms. In the recognition memory literature, dual-process models have been put forward proposing that two distinct memory processes, referred to as familiarity and recollection, support recognition (Mandler 1980; Jacoby and Dallas 1981). Familiarity allows one to recognize the butcher in the subway acontextually as someone who is known, but not to recollect the context of the butcher shop. In the IDA model, PM alone provides the mechanism for such a familiarity judgment, while both PM and DM are typically required for recollection. Recent brain imaging results from cognitive neuroscience also support a dual-process model (Rugg and Yonelinas 2003). Transient episodic and declarative memories have distributed representations in our model. There is evidence that this is also the case in the nervous system. In our model, these two memories are implemented computationally using a modified version of Kanervas Sparse Distributed Memory (SDM) architecture [Kanerva 1988; Ramamurthy, D'Mello, and Franklin 2004]. The SDM architecture has several similarities to human memory [Kanerva 1988] and provides for reconstructed memory in its retrieval process. Conscious Software Agents An autonomous agent is a system situated within and part of an environment. The agent senses that environment and acts on it, over time, in pursuit of its own agenda, effecting what it senses in the future [Franklin and Graesser 1997]. The agent is structurally coupled to its environment [Maturana 1975; Maturana & Varela 1980; Varela, Thompson, and Rosch 1991]. An autonomous software agent is one which lives in computer systems, and connects to the networks and email systems. When an autonomous software agent is equipped with computational versions of cognitive features, such as multiple senses, perception, various forms of memory including transient episodic memory and declarative memory, learning, emotions, multiple drives, it is called a cognitive software agent [Franklin, 1997]. Such cognitive software agents promise to be more flexible, more adaptive, more human-like than the classical, existing software because of their ability to learn, and to deal with novel input and unexpected situations. One way to design and implement cognitive software agents is to do it within the constraints of the Global Workspace Theory, discussed earlier in this chapter. Agents built within the constraints of Global Workspace Theory are called conscious software agents. No claim of sentience or phenomenal consciousness is being made. IDA is such a conscious software agent; her architecture is described in the next section. The IDA Architecture IDA (Intelligent Distribution Agent) is a conscious software agent that was developed for the U.S. Navy (Franklin et al., 1998). At the end of each sailors tour of duty, he or she is assigned to a new billet. This assignment process is called distribution. The Navy employs some 280 people, called detailers, full time, to effect these new assignments. IDAs task is to facilitate this process by automating the entire role of a detailer. IDAs task presents both communication problems and action selection problems involving constraint satisfaction. She must communicate with sailors via e-mail and in natural language, understanding the content and producing lifelike responses. Sometimes IDA will initiate conversations. She must access a number of databases, again understanding the content. She must see that the Navys needs are satisfied, for example, the required number of sonar technicians on a destroyer with the required types of training. In doing so, IDA must adhere to a number of Navy policies. She must hold down moving costs. And, IDA must cater to the needs and desires of the sailors as well as is possible. This includes negotiating with the sailor via an e-mail correspondence in natural language. IDA employs deliberative reasoning in the service of action selection. Before going further, it is important that we distinguish between IDA as a computational model and as a conceptual model. The computational IDA is a running piece of Java code, an actual software agent. The conceptual IDA model includes everything in the computational model with relatively minor changes. It also includes, however, additional functionality that has been designed but not yet implemented. As we hypothesize that humans also do, the IDA model runs in a rapidly continuing sequence of partially overlapping cycles, called cognitive cycles (Baars & Franklin, 2003). These cycles will be discussed in detail below, after the IDA architecture and its mechanisms are described. Conscious Software Architecture and Mechanisms The IDA architecture is partly symbolic and partly connectionist, at least in spirit. Although there are no artificial neural networks as such, spreading activation abounds. The mechanisms used in implementing the several modules have been inspired by a number of different new AI techniques (Hofstadter & Mitchell, 1994; Holland, 1986; Jackson, 1987; Kanerva, 1988; Maes, 1989; Minsky, 1985). The architecture is partly composed of entities at a relatively high level of abstraction, such as behaviors, message-type nodes, emotions, etc., and partly of low-level codelets. Each codelet is a small piece of code performing a simple, specialized task. They correspond to Baars processors in global workspace theory (1988). Most codelets are, like demons in an operating system, always watching for a situation to arise, making it appropriate to act. Codelets come in many varieties: perceptual codelets, information codelets, attention codelets, behavior codelets, expectation codelets, etc. Though most codelets subserve some high-level entity, many codelets work independently. Codelets do almost all the work. IDA can almost be viewed as a multiagent system, though not in the usual sense of the term. As noted above, most of IDAs various entities, both high-level entities and codelets, carry and spread some activation. Such activation typically hopes to measure some sort of strength or relevance. Unless told otherwise, it is safe to assume that every activation decays over time. Finally, note that though the IDA architecture is conveniently described in terms of modules, it is, in fact, tightly connected. Like the brain, the IDA architecture is both modular and highly interconnected. Perception IDA perceives both exogenously and endogenously (Zhang et al., 1998). (In humans, the concept of endogenous perception includes visual imagery, inner speech, and memory-based percept-like experiences.) The stimuli of IDAs single sense are strings of characters. We use Barsalous perceptual symbol systems as a guide (1999). The perceptual knowledge base of this agent, called perceptual memory, takes the form of a semantic net with activation called the slipnet. The name is taken from the Copycat architecture that employs a similar construct (Hofstadter & Mitchell, 1994). Nodes of the slipnet constitute the agents perceptual symbols, representing individuals, categories, and higher-level ideas and concepts. A link of the slipnet represents a relation between its source node and its sink node. An incoming stimulus, say an e-mail message, is descended upon by a hoard of perceptual codelets. Each of these codelets is looking for some particular string or strings of characters, say one of the various forms of the name of the city of Norfolk. Upon finding an appropriate character string, the codelet will activate an appropriate node or node in the slipnet. The slipnet will eventually settle down. Nodes with activations over threshold and their links are taken to be the constructed meaning of the stimulus. Pieces of the slipnet containing nodes and links, together with perceptual codelets with the task of copying the piece to working memory constitute Barsalous perceptual symbol simulators. Perceptual Learning As described above, IDAs perceptual memory, including the slipnet and the perceptual codelets, is a fully implemented part of the running IDA computational model. The IDA conceptual model adds learning to this perceptual memory with updating during the broadcast (Step 5) of each cognitive cycle (Franklin et al., 2005). New nodes and links are added to the slipnet as needed, while existing node and links have their base-level activations and weights updated, respectively. Memory IDA employs sparse distributed memory (SDM) for the major associative, episodic memories (Anwar, Dasgupta, & Franklin, 1999; Anwar & Franklin, 2003; Ramamurthy, D'Mello and Franklin. 2004). SDM is a content addressable memory that, in many ways, is an ideal computational mechanism for use as a long-term associative memory (Kanerva, 1988). Content addressable means that items in memory can be retrieved by using part of their contents as a cue, rather than having to know the items address in memory. The inner workings of SDM rely on large binary spaces, that is, spaces of vectors containing only zeros and ones, called bits. These binary vectors, called words, serve as both the addresses and the contents of the memory. The dimension of the space determines the richness of each word. These spaces are typically far too large to implement in any conceivable computer. Approximating the space uniformly with some manageable number of actually implemented, hard locations surmounts this difficulty. The number of such hard locations determines the carrying capacity of the memory. Features are represented as one or more bits. Groups of features are concatenated to form a word. When writing a word to memory, a copy of the word is placed in all close enough hard locations. When reading a word, a close enough cue would reach all close enough hard locations and get some sort of aggregate or average out of them. As mentioned above, reading is not always successful. Depending on the cue and the previously written information, among other factors, convergence or divergence during a reading operation may occur. If convergence occurs, the pooled word will be the closest match (with abstraction) of the input reading cue. On the other hand, when divergence occurs, there is no relation, in general, between the input cue and what is retrieved from memory. SDM is much like human long-term declarative memory. A human often knows what he or she does or does not know. If asked for a telephone number you have once known, you may search for it. When asked for one you have never known, an immediate I dont know response ensues. SDM makes such decisions based on the speed of initial convergence. The reading of memory in SDM is an iterative process. The cue is used as an address. The content at that address is read as a second cue, and so on, until convergence, that is, until subsequent contents look alike. If it does not quickly converge, an I dont know is the response. The on the tip of my tongue phenomenon corresponds to the cue having content just at the threshold of convergence. Yet another similarity is the power of rehearsal, during which an item would be written many times and, at each of these, to a thousand locationsthat is the distributed part of sparse distributed memory. A well-rehearsed item can be retrieved with smaller cues. Another similarity is interference, which would tend to increase over time as a result of other similar writes to memory. The IDA conceptual model uses variants of SDM to implement both transient episodic memory and declarative memory (Franklin et al., 2005; Ramamurthy, DMello, & Franklin, 2004). Transient Episodic Memory Transient episodic memory is an unusual aspect of the IDA conceptual model. It is an episodic memory with a decay rate measured in hours. Though a transient memory store is often assumed (Panksepp, 1998, p. 129), the existence of such a memory has rarely been explicitly asserted (Donald, 2001; Conway, 2001; Baars & Franklin, 2003, Franklin et al., 2005). In the IDA conceptual model, transient episodic memory is updated during Step 5 of each cognitive cycle with the contents of consciousness. We have expanded and tested our implementation of an experimental transient episodic memory using a ternary revision of sparse distributed memory allowing for an I dont care symbol (Ramamurthy, DMello, & Franklin, 2004). Consciousness In IDA, the processors postulated by global workspace theory are implemented by codelets, small pieces of code. These are specialized for some simple task and often play the role of a demon waiting for an appropriate condition under which to act. The apparatus for producing consciousness consists of a coalition manager, a spotlight controller, a broadcast manager, and a collection of attention codelets that recognize novel or problematic situations (Bogner, 1999; Bogner et al., 2000). Each attention codelet keeps a watchful eye out for some particular situation to occur that might call for conscious intervention. Upon encountering such a situation, the appropriate attention codelet will be associated with the small number of information codelets that carry the information describing the situation. This association should lead to the collection of this small number of codelets, together with the attention codelet that collected them, becoming a coalition. Codelets also have activations. Upon noting a suitable situation, an attention codelet will increase its activation as a function of the match between the situation and its preferences. This allows the coalition, if one is formed, to compete for consciousness. The coalition manager is responsible for forming and tracking coalitions of codelets. Such coalitions are initiated on the basis of the mutual associations between the member codelets. During any given cognitive cycle, one of these coalitions finds its way to consciousness, chosen by the spotlight controller, who picks the coalition with the highest average activation among its member codelets. Global workspace theory calls for the contents of consciousness to be broadcast to each of the codelets. The broadcast manager accomplishes this. Action Selection IDA depends on an enhancement of Maes behavior net (1989) for high-level action selection in the service of built-in drives (Song & Franklin, 2000; Negatu & Franklin, 2002). Each has several distinct drives operating in parallel and implemented in the IDA conceptual model by feelings and emotions. These drives vary in urgency as time passes and the environment changes. The goal contexts of global workspace theory are implemented as behaviors in the IDA model. Behaviors are typically mid-level actions, many depending on several behavior codelets for their execution. A behavior net is composed of behaviors and their various links. A behavior looks very much like a production rule, having preconditions as well as additions and deletions. A behavior is distinguished from a production rule by the presence of an activation, which is a number indicating some kind of strength level. Each behavior occupies a node in a digraph (directed graph). The three types of links of the digraph are completely determined by the behaviors. If a behavior X will add a proposition b, which is on behavior Ys precondition list, then put a successor link from X to Y. There may be several such propositions, resulting in several links between the same nodes. Next, whenever you put in a successor going one way, put in a predecessor link going the other. Finally, suppose you have a proposition m on behavior Ys delete list that is also a precondition for behavior X. In such a case, draw a conflictor link from X to Y, which is to be inhibitory rather than excitatory. As in connectionist models, this digraph spreads activation. The activation comes from four sources: from activation stored in the behaviors, from the environment, from drives (through feelings and emotions in the IDA conceptual model), and from internal states. The environment awards activation to a behavior for each of its true preconditions. The more relevant it is to the current situation, the more activation it is going to receive from the environment. This source of activation tends to make the system opportunistic. Each drive awards activation to every behavior that, by being active, will satisfy that drive. This source of activation tends to make the system goal directed. Certain internal states of the agent can also send activation to the behavior net. This activation, for example, might come from a coalition of behavior codelets responding to a conscious broadcast. Finally, activation spreads from behavior to behavior along links. Along successor links, one behavior strengthens those behaviors with preconditions that it can help fulfill by sending them activation. Along predecessor links, one behavior strengthens any other behavior with an add list that fulfills one of its own preconditions. A behavior sends inhibition along a conflictor link to any other behavior that can delete one of its true preconditions, thereby weakening it. Every conflictor link is inhibitory. A behavior is executable if all of its preconditions are satisfied. To be acted upon, a behavior must be executable, must have activation over threshold, and must have the highest such activation. Behavior nets produce flexible, tunable action selection for these agents. Behaviors in these agents almost always operate as part of behavior streams, which correspond to goal context hierarchies in global workspace theory. Visualize a behavior stream as a subgraph of the behavior net, with its nodes connected by predecessor links. A behavior stream is sometimes a sequence, but not always. It can fork in either a forward or backward direction. A behavior stream can be usefully thought of as a partial plan of action. Deliberation IDAs complex domain requires deliberation in the sense of creating possible scenarios and partial plans of actions and then choosing between them. For example, suppose IDA is considering a ranked list of several possible jobs for a given sailor produced by her constraint satisfaction module, all seemingly suitable. IDA must construct a scenario for at least one of these possible billets. In each scenario, the sailor leaves his or her current position during a certain time interval, spends a specified length of time on leave, possibly reports to a training facility on a certain date, and arrives at the new billet within a given time window. Such scenarios are judged on how well they fit the temporal constraints and on moving and training costs. As in humans, deliberation is mediated by the consciousness mechanism. Imagine IDA in the context of a behavior stream with a goal to construct a scenario to help evaluate a particular job for a particular sailor. She must first decide on a departure date within an allowable window, the first event of the scenario. Then, events for travel time (often in more than one segment), leave time (occasionally in several segments), training time (with specified dates), and arrival date must be decided upon, again within an appropriate window. If the first try does not work, IDA typically starts over with a suitably adjusted departure date. If still unsuccessful after several tries, IDA will give up on that particular job and go on to another. When successful, the job in question is so marked in working memory and becomes a candidate for voluntary selection (see below) to be offered to the sailor. Each step in this process will require several cognitive cycles, as described below. Thus, IDA is capable of temporal deliberation. Voluntary Action Deliberation is also used in IDA to implement voluntary action in the form of William James ideomotor theory as prescribed by global workspace theory (Baars, 1988, Chapter VII). Suppose scenarios have been constructed for several of the more suitable jobs. An attention codelet spots one that it likes, possibly due to this codelets predilection for, say, low moving costs. The act of an attention codelets bringing one of these candidates to consciousness serves to propose it. This is James idea popping into mind. If no other attention codelet brings an objection to consciousness or proposes a different job, a timekeeper codelet assigned the particular task of deciding will conclude, after a suitable time having passed, that the proposed job will be offered, and starts the process by which it will be so marked in working memory. Objections and proposals can continue to come to consciousness, but the patience of the timekeeper codelet dampens as time passes. Also, the activation of a given attention codelet tends to diminish after winning a competition for consciousness in any given cognitive cycle. This lessening makes it less likely that this particular attention codelet will be successful in proposing, objecting, or supporting in the near future. This diminishing of patience and activation serve to prevent continuing oscillations in the voluntary action selection process. Learning The learning extension of the IDA model is the LIDA (Learning IDA) architecture. With the help of feelings and emotions as primary motivators and learning facilitators, the LIDA architecture adds three fundamental, continuously active, learning mechanisms that underlie much of human learning: 1) perceptual learning, the learning of new objects, categories, relations, etc., 2) episodic learning of events, the what, where, and when, 3) procedural learning, the learning of new actions and action sequences with which to accomplish tasks new to our existing IDA system. Perceptual learning in the LIDA model occurs with consciousness. This learning is of two forms, the strengthening or weakening of the base-level activation of existing nodes, as well as the creation of new nodes and links. Any existing concept or relation that appears in the conscious broadcast (Step 5 of the cognitive cycle) has the base-level activation of its corresponding node strengthened as a function of the arousal of the agent at the time of the broadcast. Episodic learning in the LIDA architecture results from events taken from the contents of consciousness being encoded in our modified sparse distributed memory (SDM) representing TEM. In addition to the encoding of the sensory perceptual details of each episode manifested through the contents of consciousness, this episodic learning includes the encoding of feelings and emotions, and of actions taken by the agent. Periodically, and offline, the not yet decayed contents of TEM are consolidated into declarative memory (DM) (autobiographical memory plus semantic memory) which is also implemented as a modified SDM system. Conway stipulates that as an aftermath of the consolidation process, previously volatile events acquire high stability and durability (2001). This scenario mirrors our view of the still controversial question of how human episodic memory works. Procedural learning in LIDA is a combination of both instructionalist as well as selectionist motivated agendas, with consciousness providing reinforcement to actions. Reinforcement is provided via a sigmoid function such that initial reinforcement becomes very rapid but tends to saturate. The inverse of the sigmoid function that produces the reinforcement curve, serves as the decay curve. With such procedural learning, the agent is capable of learning new ways to accomplish new tasks by creating new actions and action sequences. With feelings and emotions serving as primary motivators and learning facilitators, every action, exogenous and endogenous taken by an agent controlled with the LIDA architecture is self-motivated. The IDA Cognitive Cycle IDA functions by means of flexible, serial but cascading cycles of activity that we refer to as cognitive cycles. We will next explore the cognitive cycle in detail (as shown in Figure 4) in order to facilitate the readers understanding of the later material on non-voluntary memory. Perception. Sensory stimuli, external or internal, are received and interpreted by perception creating meaning. Note that this stage is unconscious.  Figure 4: IDAs Cognitive Cycle Early perception: Input arrives through senses. Specialized perception codelets descend on the input. Those that find features relevant to their specialty activate appropriate nodes in IDAs slipnet (a semantic net with activation). Chunk perception: Activation passes from node to node in the slipnet. The slipnet stabilizes bringing about the convergence of streams from different senses and chunking bits of meaning into larger chunks. These larger chunks, represented by meaning nodes in the slipnet, constitute the percept. Percept to Preconscious Buffer. The percept, including some of the data plus the meaning, is stored in preconscious buffers of IDAs working memory. Local Associations. Using the incoming percept and the residual contents of the preconscious buffers as cues, local associations are automatically retrieved from transient episodic memory and from declarative memory. The contents of the preconscious buffers, along with the local associations retrieved from transient episodic memory and declarative memory, together constitute long-term working memory (Ericsson and Kintsch,1995; Baddeley, A. D. 2000) Competition for consciousness. Attention codelets, whose job it is to bring relevant, urgent, or insistent events to consciousness, view long-term working memory. Some of them gather information, form coalitions and actively compete for access to consciousness. The competition may also include attention codelets from a recent previous cycle. The activation of unsuccessful attention codelets decays, making it more difficult for them to compete with newer arrivals. However, the contents of unsuccessful coalitions remain in the preconscious buffer and can serve to prime ambiguous future incoming percepts. The same is true of contents of long-term working memory that arent picked up by any attention codelet. Conscious Broadcast. A coalition of codelets, typically an attention codelet and its covey of related information codelets carrying content, gains access to the global workspace and has its contents broadcast. The current contents of consciousness are also stored in transient episodic memory. At recurring times not part of a cognitive cycle, the contents of transient episodic memory are consolidated into long-term associative memory. Recruitment of Resources. Relevant behavior codelets respond to the conscious broadcast. These are typically codelets whose variables can be bound from information in the conscious broadcast. If the successful attention codelet was an expectation codelet calling attention to an unexpected result from a previous action, the responding codelets may be those that can help to rectify the unexpected situation. Thus consciousness solves the relevancy problem in recruiting resources. Setting Goal Context Hierarchy. Some responding behavior codelets instantiate an appropriate behavior stream, if a suitable one is not already in place. They also bind variables, and send activation to behaviors. Here we assume that there is such a behavior codelet and behavior stream. If not, then non-routine problem solving using additional mechanisms is called for. Action Chosen. The behavior net chooses a single behavior (goal context) and executes it. This choice may come from the just instantiated behavior stream or from a previously active stream. The choice is affected by internal motivation (activation from drives), by the current situation, external and internal conditions, by the relationship between the behaviors, and by the activation values of various behaviors. Action Taken. The execution of a behavior (goal context) results in the behavior codelets performing their specialized tasks, which may have external or internal consequences. This is IDA taking an action. The acting codelets also include an expectation codelet (see Step 6) whose task it is to monitor the action, and to try and bring to consciousness any failure in the expected results. Ideomotor Theory and its Implementation as Volition in IDA Long ago, William James proposed the ideomotor theory of voluntary action (James 1890). James suggests that any idea (internal proposal) for an action that comes to mind (to consciousness) is acted upon unless it provokes some opposing idea or some counter proposal. He speaks at length of the case of deciding to get out of a warm bed into an unheated room in the dead of a New England winter. The act of standing up occurs when a goal image, namely the thought of standing, comes to consciousness and remains long enough to trigger unconscious effectors. If a conscious inner debate occurs for and against rising out of bed, the action would be inhibited. This case seems to me to contain in miniature form the data for an entire psychology of volition. Global workspace theory adopts James ideomotor theory as is, and provides a functional architecture for it (Baars 1997, Chapter 6; Franklin, S. 2000b). We humans most often select actions subconsciously, that is without conscious thought about which action to take. Sometimes when we speak, we are surprised at what we say. But we humans also make voluntary choices of action, often as a result of deliberation. Baars argues that voluntary choice is the same as conscious choice (1997, p. 131). We must carefully distinguish between being conscious of the results of an action, and consciously deciding to take that action, that is, being conscious of the decision. We are typically conscious of our speech (the results of actions) but not typically conscious of the decision to speak. However, sometimes, as in a formal meeting, we may consciously decide to speak and then do so. The decision itself becomes conscious. Its the latter case that constitutes voluntary action. Here we provide an underlying mechanism that implements that theory of volition and its architecture in IDA. Though voluntary action is often deliberative, it can also be reactive in the sense of Sloman (1999), who allows for the possibility or the action selection mechanism being quite complex. Suppose that, while sitting on the couch in your living room, you decide youd like a cup of coffee and thereafter head for the kitchen to get it. The decision may well have been taken voluntarily, that is, consciously, without your having deliberated about it by considering alternatives and choosing among them. Voluntary actions may also be taken metacognitively (by Slomans meta-management processes). For example, you may consciously decide to be more patient in the future with your child. That would be a voluntary metacognitive decision. What about action selection decisions in IDA? Are they voluntary or not? Both kinds occur. When IDA reads as sailors projected rotation date from the personnel database, she formulates and transmits a query to the database and accepts its response. The decision to make the query, as well as its formulation and transmission, is done unconsciously. The results of the query, the date itself, do come to consciousness. This situation is analogous to that of almost all human actions. On the other hand, IDA performs at least one voluntary action, that of choosing a job or two or occasionally three to offer a sailor. How is this done? In the situation in which this voluntary action occurs, at least one scenario has been successfully constructed in the workspace as described in the previous section. The players in this decision making process include several proposing attention codelets and a timekeeper codelet. A proposing attention codelets task is to propose that a certain job be offered to the sailor. This is accomplished by it bringing information about itself and about the proposed job to consciousness so that the timekeeper codelet can know of it. This proposing attention codelet (and its brethren) choose a job to propose on the basis of its particular pattern of preferences. The preferences include several different issues with differing weights assigned to each. The issues typically include priority (stated on the job requisition list), gap (how well the departing and arriving time intervals are respected), cost of the move, fitness value, and others. For example, our proposing attention codelet may place great weight on low moving cost, some weight on fitness value, and little weight on the others. This codelet may propose the second job on the scenario list because of its low cost and high fitness, in spite of low priority and a sizable gap. What happens then? There are several possibilities. If no other proposing attention codelet objects (by bringing itself to consciousness with an objecting message) and no other such codelet proposes a different job within a span of time kept by the timekeeper codelet, the timekeeper codelet will mark the proposed job as being one to be offered. If an objection or a new proposal is made in a timely fashion, it will not do so. Two proposing attention codelets may alternatively propose the same two jobs several times. What keeps IDA from oscillating between them forever? There are three possibilities. The second time a codelet proposes the same job it carries less activation and so has less chance of being selected for the spotlight of consciousness. Also, the timekeeper loses patience as the process continues, thereby diminishing the time span required for a decision. Finally, the metacognitive module watches the whole process and intervenes if things get too bad. A job proposal may also alternate with an objection, rather than with another proposal, with the same kinds of consequences. These occurrences may also be interspersed with the creation of new scenarios. If a job is proposed but objected to, and no other is proposed, the scenario building may be expected to continue yielding the possibility of finding a job that can be agreed upon. We hypothesize that this procedure mimics the way humans make such decisions. It provides a mechanism for voluntary action. Voluntary vs Non-voluntary Episodic Memories in Humans and in IDA Non-voluntary memories Let us consider that episode of you seeing a man in a blue blazer through the drive-in window at the local pharmacy. Suppose you recognize the person as your optometrist. That recognition is an example of non-voluntary perceptual memory. If you also remember an incident from your last check up, thats non-voluntary episodic memory. Such memories are non-voluntary since they were not the result of any conscious volitional action. Though the memories came to consciousness, they arose through unconscious processes. Suppose you do not recognize the person right away, yet there is a strong feeling of knowing who he is. Global Workspace Theory postulates that such strong feelings of knowing are due to fringe consciousness (a la William James) (Baars 1997; Mangan 2001). From the spotlight of global workspace, we get immediate and detailed experiences. The spotlight has a hazy penumbra to represent the fringe consciousness. From this fringe, we have reliable access to information, without being able to experience the sensory events explicitly in detail. Such fringe consciousness is also non-voluntary since it arises from unconscious processes (Ball, Mace and Corona, Chapter 6, this volume). Now suppose that in response to the feeling that you should know who he is, you begin to consciously try to remember him. Should you succeed, this would be an example of a voluntary memory, in the sense that it arose from a consciously taken decision to try to remember. Let us analyze these example episodes through IDAs cognitive cycle. Suppose you see the person in the blue blazer for a fleeting moment through the drive-in window of the local pharmacy and recognize him. In step 1 of the cognitive cycle, the stimuli from this person in the blue blazer come through the senses. The specialized perception codelets process these stimuli. Those codelets that find relevant features in the stimuli activate the appropriate nodes in IDAs slipnet. In step 2, a percept containing these nodes comes to IDAs preconscious working memory buffers. Step 3 cues episodic memories resulting in local association of some explicit incident during your last check up visit. If all these items survive the competition for consciousness (step 4), you will become conscious of who the person is and of the previous incident concerning him, both in step 5, the conscious broadcast. Now suppose you dont recognize the person, but experience the I know that person feeling. In this case the node in the slipnet for that man in the blue blazer will not be activated sufficiently (step 2) for it to become part of the percept (step 3). Instead, a fringe consciousness attention codelet notices something in long-term working memory (step 4) that allows it to bring to consciousness (step 5) the I should know him idea. The IDA model predicts that this something would arise from the local associations produced in step 3. I know that person is a specialization of a fringe consciousness feeling of familiarity to a stimulus which is clearly from a person (Mangan, 2001). In the IDA model, episodic memory is implemented with sparse distributed memory (Kanerva, 1988), which is able to distinguish between likely knowing something but not being able to find it, and not knowing it at all. This is an example of a testable cognitive hypothesis coming from the IDA model. A corollary to this hypothesis is that an animal without episodic memory will not experience such a feeling of familiarity. Voluntary memories Suppose the non-voluntary memory of that man in the blue blazer keeps coming back to you, and you make a volitional decision to remember who this man is. When you go about that volitional act, we hypothesize that you go through multiple cognitive cycles, both to make the volitional decision and to get as many detailed features as you can from the percept. The former was described above in the section on ideomotor theory and volition. In particular, an intention codelet, a particular kind of attention codelet, will be generated whose task is to bring to consciousness any information likely to help with the recognition of the man in the blue blazer. For the latter, those precepts in the multiple cycles bring out local associations from the transient episodic memory and the declarative memory. The persistence of these percepts and local associations make them likely to succeed in the competition for consciousness in step 4 of each of the cognitive cycles. Hence they will likely be in the conscious broadcasts of step 5. Those local associations and conscious broadcasts over multiple cognitive cycles finally bring about the recognition of who this person in the blue blazer is or, perhaps, they will fail. Until the intention codelet decays away, it will continue to watch long-term working memory for information perhaps useful to the goal (step 4). This is how, according to the IDA model, recognition of the man in the blue blazer suddenly pops into mind after some time of thinking of something else. Thus the voluntary memory is complete. Non-voluntary memories support Voluntary memories We hypothesize that non-voluntary memories occur in service of volitional acts of retrieving voluntary memories. Further, we argue that the fine-grained analysis using IDAs cognitive cycles, allows us to see how these non-voluntary memories arise through the action of particular unconscious processes. As weve seen, these include perceptual associative memory (step 2), working memory (step 3), long-term working memory (step 4) and the competition for consciousness (step 5). Even the latter steps in a cognitive cycle may contribute when we select the internal action (steps 6, 7 and 8) of following a particular line of thought (internal dialog). This internal dialogue is produced by the deliberation process described above. In contrast to this fine-grained analysis provided by the IDA model, traditional models analyze in a coarse-grained fashion, and such high-level abstractions cause these non-voluntary memories to be subsumed by the voluntary memories, missing an important aspect of the cognitive structure (Mace, Chapter 3, this volume). Consider again the example of your fleeting sight of the man in the blue blazer at the drive-in window of the local pharmacy. For the rest of the day, that fleeing sight of the man in the blue blazer keeps coming back to you as non-voluntary memory. You finally decide to find out who that person is. This volitional act follows William James Ideomotor theory as we discussed earlier. Our hypothesis says that all the future non-voluntary memories, which are produced in single cognitive cycles, may be in the service of this volitional act of wanting to figure out who this person in the blue blazer is. Wanted vs Unwanted Non-voluntary Memories in Humans and in IDA Non-voluntary memories are of two types, namely wanted and unwanted. Let us look at our example of the man in the blue blazer that you got a fleeting sight of through the drive-in window of the local pharmacy. In IDAs perceptual memory, the slipnet nodes have links to emotion-nodes. If the recognition of this person has positive emotional content and/or effect, then this non-voluntary memory will recur with that positive emotional effect. So, while you go through the rest of the day, this non-voluntary memory coming back to you has a positive effect. Hence it becomes a wanted non-voluntary memory (Berntsen, Chapter 2, this volume). On the other hand, if this persons features in the slipnet has associations with negative emotion-nodes (for example, fear or anger), then when this non-voluntary memory comes back to you through the day, it has a negative affect. Even if you make a meta-cognitive, volitional decision not to think about this person in the blue blazer, the non-voluntary memory may keep coming back. Thus it becomes an unwanted non-voluntary memory (Berntsen, Chapter 2, this volume). How can such a situation occur? The volitional decision to suppress the memory will produce an intention codelet (see above) that will attempt to bring to consciousness strategies for such suppression, for example, occupy yourself with a task that requires attention, or think of something pleasant when such unwanted memories occur. Though such strategies may be successful to some extent, unwanted, non-voluntary memories can continue to occur as a result of random stimuli producing local associations from episodic memory. Heres a possible scenario. The appearance of a woman in a blue skirt results in slipnet nodes for Person, Blue, Article-of-Clothing being part of the percept produced in a particular cognitive cycle (step 2). This percept cueing episodic (declarative or transient episodic) memory (step 3) produces as a local association (step 3) a record of the emotionally laden event of encountering the man in the blue blazer. Some attention codelet (step 4), intent on bringing say fearful situations to consciousness, succeeds in winning the competition (step 4), resulting in the unwanted memory coming to consciousness (step 5). All these mostly unconscious processes occur independently of the volitional (conscious) decision to suppress such memories. That decision only produced an intention codelet that may not be able to continually compete successfully with highly emotionally charged local local associations for access to consciousness. Do note that the situation described in the previous paragraph can well recur over time. In the short run, the unwanted memory itself, via internal sensing (step 1), can result, by the same processes described above, in the elaboration via local association of details of the current incident and/or of details of an earlier incident which led to the original say fear. Over a longer time span, different random stimuli can trigger, with varying frequency, the same emotionally charged unwanted non-voluntary memory and its short-term elaboration. With each recurrence, the voluntary decision to suppress the unwanted memory is likely to be renewed, renewing or extending the life of the resulting intention codelet and that of the only partially effective strategies it espouses. These strategies are most effective in reducing the elaboration phase of the unwanted memory by competing with it for access to consciousness. As weve seen, they are not always effective in preventing the unwanted memories. Conclusion We have presented the IDA model which includes a large-scale computational model of Global Workspace Theory. The cognitive cycle of the IDA model provides an important tool for fine-grained analysis of cognitive processes. Using this tool, we have presented two types of memories: voluntary and non-voluntary memories. We hypothesize that the fine-grained analyses provide us with the ability to see the non-voluntary memory recalls which may be in the service of voluntary memories through volitional actions. We have classified non-voluntary memories into two types (wanted and unwanted) based on emotional content and effect. References Alain, C., D. L. Woods, and R. T. Knight. (1998) A distributed cortical network for auditory sensory memory in humans. Brain Res. 812:23-37. Allen,J.J. (1995) Natural Language Understanding, Redwood City CA: Benjamin/Cummings; Benjamin; Cummings. Anderson,J.R. (1990) The Adaptive Character of Thought. Hillsdale, NJ: Erlbaum Anwar,A., D.Dasgupta, and S.Franklin. (1999) Using Genetic Algorithms for Sparse Distributed Memory Initialization. International Conference Genetic and Evolutionary Computation(GECCO). July, 1999. Anwar, A., and S. Franklin. (2003) Sparse Distributed Memory for "Conscious" Software Agents. Cognitive Systems Research 4:339-354. Baars, B. J. (1983) Conscious contents provide the nervous system with coherent, global information. in R.J. Davidson, G.E. Schwartz & D. Shapiro, Consciousness & Self-regulation. P. 41 NY: Plenum Press. Baars,B.J. (1988) A Cognitive Theory of Consciousness. Cambridge: Cambridge University Press. Baars, B. J. (1993) How does a serial, integrated and very limited stream of consciousness emerge from a nervous system that is mostly unconscious, distributed, and of enormous capacity? In CIBA Symposium on Experimental and Theoretical Studies of Consciousness, ed. G. R. Bock, and J. Marsh. London: John Wiley and Sons. Baars,B.J. (1997) In the Theater of Consciousness. Oxford: Oxford University Press. Baars,B.J. (2002) The conscious access hypothesis: origins and recent evidence. Trends in Cognitive Science 6:4752. Baars, B. J., and S. Franklin. (2003) How conscious experience and working memory interact. Trends in Cognitive Science 7:166-172. Baddeley,A.D. (1993) Working memory and conscious awareness. In Theories of memory, ed. A.Collins, S.Gathercole, M.Conway, and P.Morris. Howe: Erlbaum. Baddeley, A. D. (2000) The episodic buffer: a new component of working memory? Trends in Cognitive Science 4:417-423. Baddeley, A. D. (2001) The concept of episodic memory. In Episodic Memory, ed. A. D. Baddeley, M. A. Conway, and A. Aggleton. Oxford: Oxford University Press. Baddeley, A., M. Conway, and J. Aggleton. (2001) Episodic Memory. Oxford: Oxford University Press. Baeza-Yates, R. and G. Navarro. (1999) Faster approximate string matching. Algorithmica, 23(2):127-158, 1999. Bahrick, H. P. (1984) Semantic memory content in permastore: fifty years of memory for Spanish learned in school. J. Exp. Psychol. Gen. 113:1-29. Barsalou,L.W. (1999) Perceptual symbol systems. Behavioral and Brain Sciences 22:577609. Bartlett, F.C. (1932) Remembering, Cambridge University Press. Beauchamp, M. R., S. R. Bray, and J. G. Albinson. 2002. Pre-competition imagery, self-efficacy and performance in collegiate golfers. Journal of Sports Sciences 20:697-705. Beekman, M., J. N. M. Calis, B. P. Oldroyd, and F. L. W. Ratnieks. (2002) When do honeybee guards reject their former nestmates after swarming? Insectes Sociau 49:56-61. Bogner, M., U. Ramamurthy, and S. Franklin. (2000) Consciousness" and Conceptual Learning in a Socially Situated Agent. In Human Cognition and Social Agent Technology, ed. K. Dautenhahn. Amsterdam: John Benjamins. 113-135. Broadbent, D. E. (1958) Perception and Communication. New York: Pergamon Press. Brown, J. (1958) Some tests of the decay theory of immediate memory. Quarterly Journal of Experimental Psychology,10:12-21. Carruthers,P. (1998) Natural theories of consciousness. European Journal of Philosophy 6:203222. Chandler, C. C. (1991) How memory for an event is influenced by related events: Interference in modified recognition tests. Journal of Experimental Psychology: Learning, Memory, and Cognition 17:115-125. Chrobak, J. J., and T. C. Napier. (1992) Intraseptal bicuculline produces dose-and delay dependent working/episodic memory deficits in the rat. Neuroscience 47:833-841. Clayton, N. S., D. P. Griffiths, and A. Dickinson. (2000) Declarative and episodic-like memory in animals: Personal musings of a scrub jay or When did I hide that worm over there? In The Evolution of Cognition, ed. C. M. Heyes, and L. Huber. Cambridge, MA: MIT Press. Colston, H., and D. Walter. (2001) walter@uwp.edu. The Common Thinking Errors Page. http://www.uwp.edu/academic/psychology/demos/UTICdemo/UTICdemo.html. 17 Jun 2001. 8 Jun 2003. Conway,M.A. (2002) Sensory-perceptual episodic memory and its context: autobiographical memory. In Episodic Memory, ed. A.Baddeley, M.Conway, and J.Aggleton. Oxford: Oxford University Press. Cooney, J. W., and M. S. Gazzaniga. (2003) Neurological disorders and the structure of human consciousness. Trends in Cognitive Sciences 7:161-165. Cotterill, R. M. J. (2003) CyberChild: A Simulation Test-Bed for Consciousness Studies. Journal of Consciousness Studies 10:31-45. Cox,K.J.A., and P.R.Adams. (2000) Implications of synaptic digitization and error for neocortical function. Neurocomputing 32:673678. Damasio, A. R. (1989) Time-locked multiregional retroactivation: a systems-level proposal for the neural substrates of recall and recognition. Cognition 33:25.62. Davachi, L., J. P. Mitchell, and A. D. Wagner. (2003) Multiple routes to memory: Distinct medial temporal lobe processes build item and source memories. Proc. Natl. Acad. Sci. USA, 100:2157-2162. Dehaene,S. (2001) The Cognitive Neuroscience of Consciousness. Cambridge, MA; Amsterdam: MIT Press; Elsevier. Dehaene, S., and L. Naccache. (2001) Towards a cognitive neuroscience of consciousness: basic evidence and a workspace framework. Cognition 79:1-37. Dehaene, S., C. Sergent, and J.P. Changeux. (2003) A neuronal network model linking subjective reports and objective physiological data during conscious perception. Proc. Natl. Acad. Sci. USA, 1001:8520-8525. Dennett,D.C. (1991) Consciousness explained. Boston: Little, Brown & Co. Dennett, D. C. (2001) Are we explaining consciousness yet? Cognition 79:221-237. Donald, M. (2001) A Mind So Rare. New York: Norton.Edelman,G.M. 1987. Neural Darwinism. New York: Basic Books. Drescher, G. L. (1988) "Learning from Experience Without Prior Knowledge in a Complicated World." Proceedings of the AAAI Symposium on Parallel Models. AAAI Press. Ebbinghaus, H. (1885/1964) Memory: A contribution to experimental psychology. New York: Dover. Edelman, G. M. (1987) Neural Darwinism. New York: Basic Books. Edelman, G. M., and G. Tononi. (2000) A Universe of Consciousness. New York: Basic Books. Eichenbaum, H. (2002) The Cognitive Neuroscience of Memory. Oxford: Oxford University Press. Elliott, R., and R. J. Dolan. (1998) Neural response during preference and memory judgments for subliminally presented stimuli: a functional neuroimaging study. J. Neurosci. 18:4697-4704. Ericsson,K.A., and W.Kintsch. (1995) Long-term working memory. Psychological Review 102:21245. Fahle, M., and I. Daum. (2002) Perceptual learning in amnesia. Neuropsychologia 40:1167-1172. Fillmore, C. (1968) The case for case, Universals in Linguistic Theory, ed. E. Bach and R. T. Harms. New York: Holt, Rinehart and Wilson. Fiske, S. T., and S. E. Taylor. (1991) Social Cognition, 2nd ed. New York: McGraw-Hill. Franklin, Stan (1997) Autonomous Agents as Embodied AI, Cybernetics and Systems' Special issue on Epistemological Aspects of Embodied AI, 28:6 499-520. Franklin,S. (2000a) Modeling Consciousness and Cognition in Software Agents. In Proceedings of the Third International Conference on Cognitive Modeling, Groeningen, NL, March 2000, ed. N.Taatgen. Veenendal, NL: Universal Press. Franklin, S. (2000b) Deliberation and Voluntary Action in Conscious Software Agents. Neural Network World 10:505-521. Franklin, S. (2001a) Automating Human Information Agents. In Practical Applications of Intelligent Agents, ed. Z. Chen, and L. C. Jain. Berlin: Springer-Verlag. Franklin,S. (2001b) Conscious Software: A Computational View of Mind. In Soft Computing Agents: New Trends for Designing Autonomous Systems, ed. V.Loia, and S.Sessa. Berlin: Springer (Physica-Verlag). Franklin,S. (2002) ed. IDA on Will: It's no Illusion. Science and Consciousness Review. 2002.  HYPERLINK "http://psych.pomona.edu/scr/ED_Sep02_IDAFreeWill.htm" http://psych.pomona.edu/scr/ED_Sep02_IDAFreeWill.htm. Franklin, S., and A. C. Graesser. (1997) Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents. In Intelligent Agents III. Berlin: Springer Verlag. 21-35. Franklin,S., and A.Graesser. (2001) Modeling Cognition with Software Agents. In CogSci2001: Proceedings of the 23rd Annual Conference of the Cognitive Science Society, ed. J.D.Moore, and K.Stenning. Mahwah, NJ: Lawrence Erlbaum Associates; August 1-4, 2001. Franklin, Stan, Arpad Kelemen, and Lee McCauley (1998) IDA: A Cognitive Agent Architecture, Proceedings of the IEEE Conference on Systems, Man and Cybernetics, 2646-2651. Franklin, S., Baars, B.J., Ramamurthy.U., and Ventura, M. (2005) The Role of Consciousness in Memory, in Brains, Minds and Media, Vol.1, (urn:nbn:de:0009-3-1505). Freeman, W. J. (1999) Consciousness, Intentionality and Causality. In Reclaiming Cognition, ed. R. Nez, and W. J. Freeman. Exeter: Imprint Academic. Freeman, W. J. (2003a) High resolution EEG brings us another step closer to the NCC?. Plenary. ASSC7: Seventh Conference of the Association for the Scientific Study of Consciousness; Association for the Scientific Study of Consciousness; Memphis, TN, USA; May 30th to June 2nd, 2003. Freeman, W. J. (2003b) Evidence from human scalp electroencephalograms of global chaotic itinerancy. Chaos 13:1067-1077. Freeman, W. J. in press. The Wave Packet: An Action Potential for the 21st Century. Biological Cybernetics. Freeman, W. J., and R. Kozma. (2000) Local-global interactions and the role of mesoscopic (intermediate-range) elements in brain dynamics. Behavioral and Brain Sciences 23. Freeman, W. J., and C. Skarda. (1990) Representations: Who Needs Them? In Brain Organization and Memory Cells, Systems, and Circuits, ed. J. L. McGaugh. New York: Oxford University Press. 375-380. Fuster, J. M., M. Bodner, and J. K. Kroger. (2000) Cross-modal and cross-temporal association in neurons of frontal cortex. Nature 405:347-351. Gabrieli, J. D., W. Milberg, M. M. Keane, and S. Corkin. (1990) Intact priming of patterns despite impaired memory. Neuropsychologia 28:417-427. Gardiner, J. M., C. Ramponi, and A. Richardson-Klavehn. (1998) Experiences of remembering, knowing, and guessing. Consciousness and Cognition 7:1-26. Gerevin, A., and L. Schuber. (1996) Accelerating partial-order planners: Some techniques for effective search control and pruning. Journal of Artificial Intelligence Research 5:95-137. Gilbert, C. D., M. Sigman, and R. E. Crist. (2001) The neural basis of perceptual learning. Neuron 31:681-697. Glenberg,A.M. (1997) What memory is for. Behavioral and Brain Sciences 20:119. Gray,J. (2002) The Sound Of One Hand Clapping. Psyche 8:811. Gray,J.A. (1995) The contents of consciousness: a neuropsychological conjecture. Behavioral and Brain Sciences 18:659676. Greenwald, A. G., S. C. Draine, and R. L. Abrams. (1996) Three cognitive markers of unconscious semantic activation. Science and Consciousness Review 273:1699-1702. Halgren, E., C. Boujon, J. Clarke, C. Wang, and P. Chauvel. (2002) Rapid distributed fronto-parieto-occipital processing stages during working memory in humans. Cerebral Cortex 12:710-728. Heinrich, B. (1984) Learning in Invertebrates. In The Biology of Learning, ed. P. Marler, and H. S. Terrace. Berlin: Springer-Verlag. Hely, Tim A., David J. Willshaw and Gillian M. Hayes (1999) A New Approach to Kanervas Sparse Distributed Memory, IEEE Transactions on Neural Networks. Hobson,J.A., and R.Stickgold. (1994) A neurocognitive approach to dreaming. Consciousness and Cognition 3:1629. Hofstadter, D. R., and M. Mitchell. (1994) The Copycat Project: A model of mental fluidity and analogy-making. In Advances in connectionist and neural computation theory, Vol. 2: logical connections, ed. K. J. Holyoak, and J. A. Barnden. Norwood N.J.: Ablex. Holland,J.H. (1986) A Mathematical Framework for Studying Learning in Classifier Systems, Physica 22 D:307317. Jackson,J.V. (1987) Idea for a Mind. Siggart Newsletter, 181:2326. Jacoby, L. L. (1991) A process dissociation framework: Separating automatic from intentional uses of memory. Journal of Memory and Language 30:513-541. Jacoby, L. L., and M. Dallas. (1981) On the relationship between autobiographical memory and perceptual learning. J. Exp. Psychol. Gen. 110:306-350. James, Michael (2002) Modeling Working Memory Decay in Soar. Online Proceedings of the 22nd North American Soar Workshop, Ann Arbor, MI (http://www.eecs.umich.edu/~soar/sitemaker/workshop/22/James-S22.PDF) James, W. (1890) The Principles of Psychology. Cambridge, MA: Harvard University Press. James, W. (1892) Psychology - Briefer course. New York: Henry Holt. New edition, New York: Harper & Row, 1961. John, E. R. (2001) A Field Theory of Consciousness. Consciousness and Cognition 10:184-213. John, E. R., L. S. Prichep, W. Kox., P. Valdes-Sosa, J. Bosch-Bayard, E. Aubert, M. Tom, F. diMichele, and L. D. Gugino. (2001) Invariant reversible QEEG effects of anesthetics. Consciousness and Cognition 10:165-183. Kahneman, D., P. Slovic, and A. Tversky. (1982) Judgement under uncertainty: heuristics and biases. Cambridge: Cambridge University Press. Kanerva,P. (1988) Sparse Distributed Memory. Cambridge MA: The MIT Press. Kanwisher, N. (2001) Neural events and perceptual awareness. Cognition 79:89-113. Kelley, J. L., and A. E. Magurran. (2003) Learned predator recognition and antipredator responses in fishes. Fish and Fisheries 4:216. Keppel, G. and Underwood, B. J. (1962) Proactive inhibition in short-term retention of single items. Journal of Verbal Learning and Verbal Behavior,1:153-161. Knuth D.E., J. H. Morris and V. R. Pratt (1977) Fast pattern matching in strings. SIAM Journal on Computing 6 (June 1977), pp. 323-350. Koenig, T., K. Kochi, and D. Lehmann. (1998) Event-related electric microstates of the brain differ between words with visual and abstract meaning. Electroencephalogr. Clin. Neurophysiol. 106:535-546. Kondadadi, R., and S. Franklin. (2001) A Framework of Deliberative Decision Making in "Conscious" Software Agents. In Proceedings Of Sixth International Symposium on Artificial Life and Robotics (AROB-01). Laird, E.J., A.Newell, and RosenbloomP.S. (1987) SOAR: An Architecture for General Intelligence. Artificial Intelligence 33:164. Lavond, D. G., J. J. Kim, and R. F. Thompson. (1993) Mammalian brain subsrates of aversive classical conditioning. Ann. Rev. Psych. 44:317-342. Lehmann, D., W. K. Strik, B. Henggeler, T. Koenig, and M. Koukkou. (1998) Brain electric microstates and momentary conscious mind states as building blocks of spontaneous thinking: I. Visual imagery and abstract thoughts. Int. J. Psychophysiol. 29:1-11. Lenhart, M. D., and W. J. Freeman (1995) A Neurophysiological Explanation of the Retroactive Inhibition Memory Effect. Computation and Neural Systems. Monterey CA; July 11 through July 14, 1995. Lhermitte F. (1983) Utilization Behavior and its relation to lesions of the frontal lobes. Brain: 106: 237-55. Lindsay, D. S., and J. D. Read. (1995) Memory, Remembering, and Misremembering. Ptsd Research Quarterly 6:1-4. Llinas, R. R. (2001) I of the Vortex: from Neurons to Self. Cambridge MA: MIT Press. Llinas, R., U. Ribary, D. Contreras, and C. Pedroarena. (1998) The neuronal basis for consciousness. Philos Trans R Soc Lond B Biol Sci 353:1841-1849. Logan, G. D. (1992) Attention and preattention in theories of automaticity. American Journal of Psychology 105:317-339. Lyvers,M. (1999) Who Has Subjectivity? Psyche 5:31. Maes,P. (1989) How to do the right thing, Connection Science 1:291323. Mandler, G. (1980) Recognizing: the judgement of previous occurrence. Psychological Review 87:252-271. Mandler, J. (2000) Perceptual and Conceptual Processes in Infancy. Journal of Cognition and Development 1:3-36. Mangan, B. (2001) Sensation's Ghost: The Non-Sensory "Fringe" of Consciousness. Psyche 7:http://psyche.cs.monash.edu.au/v7/psyche-7-18-mangan.html. Marsden, C. D., J. C. Rothwell, and B. L. Day. (1984) The use of peripheral feedback in the control of movement. Trends Neurosci. 7:253-257. Maturana, H. R. (1975) The Organization of the Living: A Theory of the Living Organization, International Journal of Man-Machine Studies. 7:313-32. Maturana, H. R. and Varela, F. (1980) Autopoiesis and Cognition: The Realization of the Living, Dordrecht, Netherlands: Reidel. McGeoch, J.A. (1932) Forgetting and the law of disuse. Psychological Review, 39:352-370. Minsky,M. (1985) The Society of Mind. New York: Simon and Schuster. Mitchell,M. (1993) Analogy-Making as Perception, Cambridge MA: The MIT Press. Miyake, A., and P. Shah. (1999) Models of Working Memory. Cambridge: Cambridge University Press. Morris, R. G. M. (2001) Episodic-like memory in animals. Philos Trans R Soc Lond B Biol Sci 356:1453-1465. Mller G.E. and Pilzecker A. (1900) Z. Psychol. 1, 1. Negatu,A., and S.Franklin. (2002) An action selection mechanism for 'conscious' software agents. Cognitive Science Quarterly 2:363-386. Negatu, A., T. L. McCauley, and S. Franklin. in preparation. Automatization for Software Agents. Newell, A. (1990) Unified Theories of Cognition. Cambridge, MA: Harvard University Press. Nyberg, L., et al. (2000) Reactivation of encoding-related brain activity during memory retrieval, Proceedings of the National Academy of Sciences, U.S.A. 97:11120-11124. Olton, D. S., J. T. Becker, and G. H. Handelman. (1979) Hippocampus, space and memory. Behavioral and Brain Sciences 2:313-365. Panksepp, J. (1998) Affective Neuroscience. Oxford: Oxford University Press. Peterson, L. R. and Peterson, M. J. (1959) Short-term retention of individual verbal items. Journal of Experimental Psychology, 58:193-198. Posner, M. I. (1982) Cumulative Development of Attentional Theory. American Psychologist 37:168-179. Prager, R. and Fallside, F. (1989) The modified Kanerval model for automatic speech recognition, Computer Speech and Language, 3, 61-81. Ramamurthy, U., S. D'Mello, and S. Franklin. (2004) Modified Sparse Distributed Memory as Transient Episodic Memory for Cognitive Software Agents, IEEE International Conference on Systems, Man and Cybernetics (SMC2004), The Hague, Netherlands, October 2004. Ramamurthy, U., S. DMello, and S. Franklin (2003) Modeling Memory Systems with Global Workspace Theory, Seventh Conference of the Association for the Scientific Study of Consciousness (ASSC7), Memphis, May 30 June 2, 2003. Ramamurthy, U., A. Negatu, and S. Franklin (2001) "Learning Mechanisms for Intelligent Systems", Proceedings of SSGRR-2001: International Conference on Advances in Infrastructure for e-Business, e-Education and e-Science on the Internet (L'Aquila, Italy). Ramamurthy, U., M. Bogner, and S. Franklin (1998) "Conscious Learning In An Adaptive Software Agent", Proceedings of The Second Asia Pacific Conference on Simulated Evolution and Learning (Canberra, Australia). Ramamurthy, U., S. Franklin and A. Negatu (1998) "Learning Concepts in Software Agents", From Animals to Animat 5: Proceedings of The Fifth International Conference on Simulation of Adaptive Behavior, p 372-377, MIT Press. Rao, Rajesh P.N. and Ballard, Dana H. (1995) Natural Basis Functions and Topographic Memory for Face Recognition, Proceedings of International Joint Conference on Artificial Intelligence (IJCAI), p 10-17. Rao, Rajesh P.N. and Fuentes, Olac (1996) Learning Navigational Behaviors using a Predictive Sparse Distributed Memory, Proceedings of From Animals to Animats: The Fourth International Conference on Simulation of Adaptive Behavior, MIT Press. Reber, A. S., F. F. Walkenfeld, and R. Hernstadt. (1991) Implicit and explicit learning: individual differences and IQ. Journal of Experimental Psychology: Learning, Memory, and Cognition 17:888-896. Rugg, M. D., and A. P. Yonelinas. (2003) Human recognition memory: a cognitive neuroscience perspective. Trends in Cognitive Science 7:313-319. Schacter, D.L., (1996) Searching for Memory: The Brain, the Mind and the Past, Basic Books. Schneider, Walter and Chein, Jason M. (2003) Controlled & automatic processing: behavior, theory, and biological mechanisms. Cognitive Science, 27:525-559. Seashore, C. (1967) The Psychology of Music. New York: Dover. Shastri, L. (2001) A computational model of episodic memory formation in the hippocampal system. Neurocomputing 38-40:889-897. Shastri,L. (2002) Episodic memory and cortico-hippocampal interactions. Trends in Cognitive Sciences 6:162168. Shulman, R. G., F. Hyder, and D. L. Rothman. (2003) Cerebral metabolism and consciousness. CR BIOL. 326:253-273. Skarda, C., and W. J. Freeman. (1987) How Brains Make Chaos in Order to Make Sense of the World. Behavioral and Brain Sciences 10:161-195. Sloman,A. (1999) What Sort of Architecture is Required for a Human-like Agent? In Foundations of Rational Agency, ed. M.Wooldridge, and A.Rao. Dordrecht, Netherlands: Kluwer Academic Publishers. Standing, L. (1973) Learning 10,000 pictures. Quaterly Journal of Experimental Psychology 25:207-222. Steinman, R. M., E. Kowler, and H. Collewijn. (1990) New directions for oculomotor research. Vision Research 30:1845-1864. Tanaka, Y., and D. Sagi. (1998) A perceptual memory for low-contrast visual signals. Proc. Natl. Acad. Sci. USA, 95:12729-12733. Taylor, J. G. (1999) The Race for Consciousness. Cambridge, MA: MIT Press. Thompson, K. G., D. P. Hanes, N. P. Bichot, and J. D. Schall. (1996) Perceptual and motor processing stages identified in the activity of macaque frontal eye field neurons during visual search. Journal of Neurophysiology 76:4040-4055. Tulving, E. (1968) Theoretical issues in free recall. In T.R. Dixon & D.L. Horton (eds.) Verbal Behaviour and General Behaviour Theory, Prentice Hall, Englewood Cliffs, N.J. Tulving, E. (1985) Memory and consciousness. Canadian Psychology 26:1-12. Tulving, E. and Craik, I.M. Fergus (2000) The Oxford Handbook of Memory. Editors. Oxford University Press. VanRullen, R., and C. Koch (2003) Is perception discrete or continuous? Trends in Cognitive Science 7:207-213. Varela, F., J.P. Lachaux, E. Rodriguez, and J. Martinerie. (2001) The brainweb: Phase synchronization and large-scale integration. Nature Reviews Neuroscience 2:229-239. Varela, F. J., Thompson, E., and Rosch, E. (1991) The Embodied Mind, Cambridge, MA: MIT Press. Warrington, E. K., and L. Weisdrantz. (1968) New method for testing long-term retention with special reference to amnesic patients. Nature 217:972-974. Watanabe, S., S. Kawahara, and Y. .Kirino. (1998) Morphological characterization of the bursting and nonbursting neurones in the olfactory centre of the terrestrial slug Limax marginatus. J. Exp. Biol. 201:1851-1861. Waugh, N. C. and Norman, D. A. (1965) Primary Memory. Psychological Review, 72:89-104. Wegner, D.M. (1994) Ironic Processes of mental control, Psychological Review, 101: 32-54. Wheeler, M.E., et al. (2000) Memorys echo: Vivid remembering reactivates sensory-specific cortex, Proceedings of the National Academy of Sciences, U.S.A. 97:11125-11139. Wixted, John T. (2004) The Psychology and Neuroscience of Forgetting, Annu. Rev. Psychol. 2004. 55:235-69. Wu, S. and U. Manber (1992) Fast text searching allowing errors. Comm. of the ACM, 35(10):83-91, 1992. Zadeh,L.A. (1965) Fuzzy sets, Inf. Control 8:338353. Zhang, Z., S. Franklin, B. Olde, Y. Wan, and A. Graesser. (1998) Natural Language Sensing for Autonomous Agents. In Proceedings of IEEE International Joint Symposia on Intellgence Systems 98. Zulandt Schneider, R. A., R. Huber, and P. A. Moore. (2001) Individual and status recognition in the crayfish, Orconectes rusticus: The effects of urine release on fight dynamics. Behaviour 138:137-154.  IDA (Intelligent Distribution Agent) is a conscious software agent that was developed for the US Navy (Franklin et al, 1998). At the end of each sailor's tour of duty, the sailor is assigned to a new billet. This assignment process is called distribution. The Navy employs some 280 people, called detailers, to effect these new assignments. IDA's task is to facilitate this process by completely automating the role of detailer.  Note that implicit learning fits this description, in that subjects are always asked to be conscious of a stimulus set, which triggers unconscious memorial and interpretive processes in the brain. What is implicit in implicit learning is not the process of learning, but rather the unconscious acquisition of knowledge triggered by conscious access to a set of stimuli. Along the same lines, GWT defines selective attention simply as the set of mechanisms that enable access to consciousness.      EMBED PowerPoint.Show.8  du  $ % & j xLMpq ľo\$jhm5B*CJOJQJUph333(jh)Hj0JB*CJOJQJUph333!h)Hj6>*B*CJOJQJph333h)FB*CJOJQJph333h)HjB*CJOJQJph333h)Hj56CJOJQJ h)HjCJh)FCJOJQJh)HjCJOJQJjh)HjOJQJUh)HjCJOJQJh)HjOJQJh)HjCJ OJQJdj xzzr"$a$gd)Hj" & F""$a$U$ddEƀ&[$\$]^a$$dd[$\$]^a$dd[$\$]gd)Hj xF|S|t|op   HAB|"[$\$$$D')@&7$8$H$@&gdm5`"$a$"  Hc{"|"}"[$t$|$$$D')k....r/شذؕ~l^M<!hVLh)HjB*CJOJQJph!hVLhP7B*CJOJQJphhP7B*CJOJQJph333"h)Hj5B*CJKHOJQJph333h)HjCJOJQJh)Hj56CJOJQJh)Hj5CJOJQJjh)Hj5CJOJQJUh)Hj%hm5h)Hj0J.B*CJOJQJph333!hh)HjB*CJOJQJph333h)HjB*CJOJQJph333hm55CJOJQJhm5B*CJOJQJph333)(*-r/2q+FEƀDfgdCEƀDfGEƀDfr/2b3d3<<ICJCII"IGI9OIOPPPPPPUUWWm*m+m.m>mp5pr+rrrrttyy{tdddh)Hj6B*CJOJQJph333 h)Hj6CJh)HjB*OJQJphh)Hj5B*CJOJQJph333h)Hj5CJOJQJjh)HjUh)Hj(jh)Hj0JB*CJOJQJUph333h)Hj56CJOJQJh)HjB*CJH*OJQJph333h)HjB*CJOJQJph333!hVQhB*CJOJQJph'2#6880;1;k=X?ICJCF"IGILLNN9O:OPPPPPRRUd@&`UUZV[VWW6Z7Z] ]aaocpcseteffhhkkm+m$q%qrr]`drttyyzzz}}~vhpiҕӕĘ՘d$a$@&d]yzzz}}~vhpҕӕĘ՘џN\]o,?lLd=R~h)HjB*CJOJQJph333/jh$WB*CJOJQJUmHnHph333uh)Hj56CJOJQJh)Hj6B*CJOJQJph333!h)Hj56B*CJOJQJph333h)Hj5CJOJQJh)Hj5B*CJOJQJph333h)Hjh)HjB*CJOJQJph3331՘ПџM\P]o+,klKL`"$a$xd@&<='()QR>& & F hhx^h#^ & F 88^8 $@&^a$$^a$$a$ & F hh^hRp>V'E<HMi}+,DMO[\]Qd.?ƶykhVQB*CJOJQJphhoGB*CJOJQJph!hVQhVQB*CJOJQJphhVQB*CJOJQJph333h)Hj6B*CJOJQJph333h)Hj5B*CJOJQJph333h)Hj56CJOJQJh)Hj56CJOJQJh)HjB*CJOJQJph333!h)Hj56B*CJOJQJph333'&';<9M'NM^nQ4 "$a$ dd[$\$] & F hh^h4 s           { $$P2Q299-:.:/:ǺǩǩǺǺǎ~ǎkUk*jh)HjB*CJOJQJUph333$jh)HjB*CJOJQJUph333h)Hj6B*CJOJQJph333h)HjB*CJOJPJQJph333h)Hj56OJQJ!h)Hj56B*CJOJQJph333h)Hj56CJOJQJh)HjB*CJOJQJph333h%VB*CJOJQJphhVLB*CJOJQJphhVLB*CJOJQJph333 4   { Z[%&}~$%|} &@&^` &^` dd[$\$]z { !!!!1"2"""######9$:$$$%%u&v&&&E' &@&^` &^`E'F'''x(y(")#)0*1***++@,A,,,S-T---..//0///0 &^`000091:111Q2R22222O3P333l4m44415255566 &@&^` &^`66677888899f:g:;;<<<<q=r= > >)?*???@7$8$H$ &^`/:c:d:KK2X~X=\\c,dd3eeejj?ppuwxxxyyQzͽ͉͉ͭͭ͛xfͭ\XNCNh)F6CJOJQJh)FCJOJQJh)Fjh)F0JU#h)HjB*CJOJQJmH ph333sH !hh)HjB*CJOJQJph333"h)Hj0J)6B*CJOJQJph333"h)Hj0J(5B*CJOJQJph333h)HjB*CJOJPJQJph333h)HjB*CJH*OJQJph333h)HjB*CJOJQJph333$jh)HjB*CJOJQJUph333"h)Hj0J'>*B*CJOJQJph333@@@@AABBBBDCECCDpDqDDDEEEE+F,FFFsGtG &@&^` &^`tGHHHHIIJJKJJJ|K}KLLMLLLMMsMtMONPNNN)O*O& &@&^` &^`*O}O~OPPPP1Q2QQQRRVSWSSSTTUUV VVVVVW &^` &@&^`WWWW1X2X~XXXXYYZYYY~ZZ[[[[[[<\=\\\\@& &@&^` &^`\\_]`]]]#^$^^^^^__``^`_```TaUaaabbcc &@&^` &^`cddeeffRgSgIhJhiiiijjjjjjakbkkkGl&C$^`gd)Hj &@&^` &^`GlHlllmmnnnnooQoRo>p?ppp9q:qqqrrrr$s%s &@&^` &^`%sssttttPuQuuulvmvvvwwwwxRzE|F|H|I|K|d@& &@&^` &^`QzRzSzTzD|E|F|G|I|J|L|M|O|P|S|T|n|o|p|q|s|t|u|̱̽h)HjB*CJOJQJph333h^B7jIh$WUjaH h$WCJUVaJh$Wjh$WUjh?Uh?h)FB*CJOJQJph333jh)F0JUh)FK|L|N|O|Q|R|S|r|s|t|u| &^` (/ =!"#$% @=28j͝xjor~وFqE>4 x\PTwwqp/Ш bHBGIT88~+)iMIiڄ&p֪tR[IJgQ)MiҘbZ;~x|3w~ow?{q/Q6;!O+NȢ kW‘gg!F2:}w)6ͫLilA/QжB9MM$7I U|>)kw{Vx"L‚5 k;xa1VB%nc]ao@7fMDdeP+DZXRBT.T#š=XM2b诅F'CD-ڗH0Q^UnO:~Zc}Lgq 9#B^ b޶ͳr?<{02w=vNl. Cov'!OcZ?a3s~b gu_;P'|?x&2Qm<en웘ȟ_R5T`:VPF"7Hu8ٸ1ǭU {|(e㊛TSTAR"e)mT ĸea)+_S'/鰹f3J9K.LfhQA堏J$ǜ@ɰ1/Xzlq)*>:=)U#ELu2a1:ׅ!썣bb=J{!L?}Y宲p VgQ1:yR~)Lbh2J؟_:cgq_ Ȥşq}}D Mʘ*>!`41_>J/U{ {/w/Q< J;5[B>Z3W[ >hR>Z Џ~D΢sW;.}L[%g[ec{7?;0\aSx{[jb`|G`+co CM6yo{bii+ }\!0oopb/cؿG_JZp"ȕ3`cb f''1@稌_f+VIxA*' C*G7y 08u͆oT$M dr\Wa ^ߠ}nTm3ʬ PpBeYt{$>Yc>R8HSԍxЫ"ɅÈH{ ҢGj|d#a{IwT ᶠ'}s~Q .%7Ͽ~2ɾ!?p=~s/|Cp{CkX H8Q~ڷq!'Xݯs!u~r?Z9;,ĀG9mGO~d1t*}דe KJpR G@>)suUpr:| 4)_6|<+S+ܻHߕfbjnཉӚtȩΕƘ;Uq;xN+ +^取lYWx+)[[ſW|5ί\9ɹdEuįo^5J2o1[d=;;W{,z-پ*\g焹ϞӀ: ]$߸yg]il5zSeGv+g`;q0V8gH@[ $VnmTNCԯ^*P{/5J'G(1?CyRĨ\{=a_ߣBy;<ڟ{s*_'bYS<~s0j05P(ߟZ}fMjEg<ϋʝh+y0Dd{`؛T&KULƚhIk.5mQOcr0._=<.j*,:zܝEOwIRR*i)6ȶ)|<9{*z*|wTzcsvx:< .uǝ򹲫z>XDoOiNSɏCpЦ͐Y]<~7* =+ xN*To hkt.P=JGQIiƴR[Sou;]}ϩc5\kF X]I}u >ytF68ŔFⅿ;WtNUZ9;KDm|M5Kl;+}9Y쬍egmbY㜵Agmx'㛏`}g}u6֙v@ |𷖞)ca j6oeG J\`v[(YhLAƚ s?j͚CbVEw"}1YE>4xXsSe-A/CsNh)MB[.m "xZ´II Z}gWg|/h}EơKqA~o۞4HxWe'色b-|ݠW"E}Ӧ5O}OoR}_HTQ4Nƫ^H&ak{(5rUFX4/:Z;whR!э-}a}䳰}Ltc,}rrVq]m*!g jݢq>K㐢tTC^RT[|.qF8%VL E?+ş\UŊ瓴Tf '>Ot~@'~RyGpkbʋ~ߢ늷xl8o .#=Ë|pb?O] Wm))Lfr zJ{ʷg([:CW3d؋]ZGz\EA[*p o@,l]ϩJp5qȏSYƻCj'/H71*&.qɉGԀ3d~F]o˻. I9U |*Xg ىL333L>]k7T\Ǻ_wF_xٗlT<_ҟ =_\;y AnE7tvp5!FdNaU1ڄ38sN`OL2zsawTB,PEߜk8#'0u엯YϯLaE#S 5C_r| 'Ʃȯ!U.k =FSXJ8)+sܛ܃aIIN"I6ILb0!'^OM-~ۀ{U1`qV:`,Lb;;~a:7ӯmC:m;_{wknEMšf"E5~f %>8m QbQ^[61tUVy wWyG'Uy$)/1Hٳ 5 >baK_ ˳#db`7k?IV k Qqvqz{{%yÀ%ط7i ^6-nSK}Ghڛ[ށ|&Ne%&=ˊvS_TUûuqal٦'0 kC _Ѳ\l9 ;;6 V{4!8 iaMDQ^xxγ R )9lQmhm z S) V z ;+ &oe9 .n gÊr\]QlO߷r0 &Q_߰!`blX@ `sJ Zf_}KAOh8ߧRG u@F>% 6Û8ᆔޫ)a/r#u1q- מվ׾[ Ӳ֣!Oy?vp0>'C}Q{Pa1]ۉ5 fuB@JG׸n B?B֌j)~k)&n 1Í>py ){fGvc틋ckߥԾ'9si$S9,9Y{靖 !hB<MxʧqKiS"7$pIs֖Sj`ϋSNQVr畋8W gN޽j/\.R)1|v+SKOf&f2o]j˦|n2](7(x@=Ly^W鱴ImKvqE>4x] tEG教HxM`HщI2@21"$I2ErPU $>vA~va}Rhzl2G,m@F6CA0fGEHaeܳ1 \e"!߳{=9hD1rp(8æ%/g3}LEbH=8=.p/zbE ߡIZegq/IuQ@%d-3 `~li2B9'/;y˖E'&:8L<π{/\0{[G *8r ⽃uv xo[ՃȕU'q{w! \$q„bc@k6ǵ$Gوp}G*:M:}sj854z_E?|*C7%I*(|& 8fMޔ!t8c:D82Bp,c9(f<+on%qlV#pm!S>r.# h8W"?rJ~<4Hat<4 Cu3j\f.Uq!K'L' 9̭7ǚneikъ")g7FۏB8WQWi:hy(nځi?HL!cl*!5>|2dJtj-؄6CHTGr} d|0CX׿L$ A?CP/@ظ&Ze^rٗ@ 8u?]OݦRi8o?+B&4#O3Dfc*E?}yzف_QjZmGm&L$ /v&Z8rӾN}m m׵i/-66\WCTCOK *[ AdCYl,OL]Yg}|3I"U3[|кaT43gK|O=zcNIjsN #AnvCLw&$7F&$a0ld ڽR`yg1]5 t(PBtUoI"|K[ oC7<| |-ʟoo{=h{p7ܫt>~gnz_^e3])f(/]zSƚs]s4ĚsLל#inMԧZzSq,gl ק Iѧ0+og@w>} >yytnOϻFם$˜t #%{Hfۤs8/6fӢ]Uvpcx=z 5.:hX]g1#&uH6xIL3Q\~ dER蕟 2 p#+/Lpio[q->\ۖuE-溜֖meTeNۻmp$,bh}pb3I6iYfWn,2bR̳p5ĈM֮M[k~:wmr{m6O܂WWS5qK˽ZS rO68  *7d:'9NNW~RdlFZοw~L?vU#eO?Zaނsv6ฐS3/8ҳ0 6 Ե>c.b^Oq3i"3c|`EACwl+솏*AW+ƭKHhp=u|: i7quV\M)Wxr54s5;Lڛkv5~5M7r7TcJ+m Ñ;_A=&2(<xm҆:/?f#[KgL+f8 e٩ȏ$ajN$)cBg7<-;R:c9"{c1-{ձӉ;b&4X]2> R(C%p&"ӋpO/}=x&@xa>;u]-k޾8A]w{RtaAg_V/^WDm5w^ذ,7cB?B dOfuеuAд|TM7r"s\flь"0o\CGNY(x]$yQ@z)9<6vC~?o0̽QxFLV4 c$<%?D"+{vOJv㚕M+#o|AG>}b n\߂/fGZ`C0ņ9?Iuam/A-}^8O&񜚐uC$!bCD&1Ic=wާy'Θ~8&YM,qÑD#o~'ߎW+d&?g c\1?w.9-?7s%12zr(Z`\gmGtBrkZc)?¹R.Hį./MA_LΡ:տ/[ CkLʩ)=hyQ(K: $>9a46ڀKɭ<yq{m@ Bxv=h4G(@uꭨ04[=y^,DqWqs'TXeEdP\aa` ChAa9>m+dߢ s[?GL2ιu+k&74eVCjz9h;|9YE>4^ x[{lW?ljcǏh6g]|Bn@3_Ak5KZ3D=CٌUZ z>ٌUZǨ~L6cI_&e'e3V3:c> fb8 Bc>&":Tdvu=[kFL-_ꉦh*&KwxP*ȷOR3S-zw9ZQ:Nz|勾il&C4(&ʧoYARk'k_-h+M̟0kqSp37xǃ8̐)$#7M9ySIO~VNϩ/,32UnݦXfy\ocq2f[Kk2I)&k)#p,>kZv ?g4$i&M0qD3PTйP/ I % ˘O{(*3p`PǥoA",lv?&}قI5Wq )`fys-A8* 2w GU`a`aR;fuLjZn A8/Ak31IF$wQڷ({PI%c0uE,"LR]p _*|ε HÏ^V^LP/lS/h$L&T'nN2DZ9&ɨIGFR&+ b1(Z̾dWk>>8Nw?q?{ hNP1a1{0D{_d äeIuީxPR_j)GVMhݶ<xkڔCFkG# B#F)nRF'JD#/2TS*VGO-/+E- ! |i}_҂_I#)imUc1Z)z:q%:mtcY1pf3vΜfʋ L1 jb% E0+Y;UIxxfVWRx( i&dBdMnti:~1 rR=upuM8 9yxgws|ߠgڟ2dy9$|ySxro8^%(N9kmG5gZ9ђX*M)i GUkw:QFaFpW6N(UnDXK6&~%a|MwwsŊ:?1Vff$VWr0a:u@Xs0^_EuŦa%=}y4\`s_Ŭf 5K 2qG:(&28gMOM}!v;Gz?vE1pԚCO䕘 _ws'I:_'m)Ln_eNy%8T'vtf0Zњ,HEC{ u)Uǫg~r5Wb|1^lN=I?- Z"1kEfgЋ'L-h +4TLQ;CI!y/R-{I6O-iWxmbSt -w4~Xaq;:O;]ە92}Vήٓc{T礍ٷL5Y=+5W1LMa _Y#E[96;>ϳ&O9/IZ+sd<9uzpגK/:Nj> Nqws;;ECDy0L z= "ޒz2zNm?yh0+^];'Z'jQ 4K2j X‚}s <TGGZ"0orza1wS0io|U(,X*T,,p DT[E++=LA V@ϲ5%)K-Te`l@pA0([]םiiumdkIDAT2̦Da[cp׵U~Y ^!Pvo{uygݵXtgSUgq\8 %o'h.(?>KDpD&A׮ik\xン`]=jLAr7C .Z঻h{c~9dnK2bpq=7̦U]2ɵ<Gr<ЄŵgÊFs73;1VE;M+}8M0ME,0E›`z3.ᬍֵaeEFp{|Si.u6Bcg.nj|ziVI YH1\rwH.(·s-} Jn5&./ e-}\rwkLt·[n~ah_pmjM[$ ߅OW4; c6mLՈ'v>಺>!ض}eWe`l@pA0([\v{ V>?E C[sV 4yz_sX&a TU%P'&*(DU  Dɀ b d@@p@1QU@pa2 8* 80PPLT@@t (&JN :LTU%P'&*(DU  Dɀ b d@@p@1QU@pa2 8* 8AM~'QFe1cPL[ooqhl?75Y\kG]+W߸ }Zy}qkMV9fW75?EB6V1XVAqkMV9fW75?EB6VY"Ǎq%5YךrͮJo\k~D-XIDAT> m(`YE#K5`YךrͮJo\k~> m(`YE#K5`YךrͮJo\k~> m(`YE#K5`YךrͮJo\k~> m(`YE#K5`YךrͮJo\k~> m(`YE#K5`YךrͮJo\k~> mhM^kA/d pY|)O[͒` "۹F=Uu=kw͛8p >'kS]GLO.bԸcNL\6UP?g9^H<}5mD )uR]XFV-1GiYQJE) R5k: Xf9ݶ:WlV|[IY~)+E> p}rOܯ|2ђ4z|'%L.LwxakhOuQwe޼9. ]JN0iݏE8\u'P A0i["4G!x)Q h1UWEE{ k"ȓ2"h:k{K)J`(*_EYfKNkJ[+Eq-\Y^M\*5l0)Z>;S**Jo&W H(` O{MLu|;^mXMJQ[zLSB9t3ఌh`AJK ʺݴ/3śnѶ2#.QKbwDKzl!CjKO>^J{Q.+&ئ -=Mʺ-3Exga vG F/KߤB>dJu[*J*M1)1psoBXf##~*Eo`FdzGnZIDATILxL G]8:];Q14@0YbiZ;\gf=}H!%xb5HQg1Ռ@ @p aCN,-j2l)E11T 9@9 8ʰ!5PP6rڢ *Æ XN[CCeؐSic(c r `9mQs @p aCN,-j2l)E11T 9@ G wӺlb_6]Ca.lCla -pqK3l0ڲ'G@4sala -pqK3l0ڲ'G@4sala -pqK3l0ڲ'G@4sala -pqK3l0ڲ'G@4sala -pqK3l0ڲ'G@4salQ/I( 88%83p y#9Qs'G]ApĄk!aJ>~Ƒa&YDPgN6"/ˎ`O+/m6d}L&ju>ds,yM?e$ 0@6d)řـ#c"?`sـ# x-CiNoᏴ]xtys,GUtmCA i Xu>F?U)S|< {4~RM揧?-~χ|< Gɇ|b0!޵WW X |zB^{<{nUZ @\Qyܪsם+yhnm!PxbS6["v3lj/~n8=_nBk pIDATB\GnK4,E9Ȏm*7"Ӆձ{uzRY5Qgu >h/ fٵa;hq"3&Qc6rʕsu;bGZ 9@.VU Gs쯕>u׾< WMJ*b mS64_,};7*YY`Xfsd|1D!X_ <6ymFo SQxOp>'Z ATcL 3K:/C͉0=pໆ%IDATCWUCXw@QO+|sNNtMm>e\;^\;'|z2[|x5͟== Ñ` 8 B +5iYcW0e"(!V3Nё<1R)7br'lj'"J)z~5+ g/ꦰAlYW}*`Gpߔ1w篾ށLHSU"lK|<Ѳ ;e+&0)m& _ X%fFE&OɈ{PcW[(ٗ1'wJl:%x-Y.q=_|07z VfLy`&1 ZbKE)s6 c|23R5jgfMnϳ._`ΩLtnb^|}Y|fFxNTQ;72f?xR8̑O?Iecֲ$Xs^a]%zAbtAQ\|S㿣 שw>ޢ^2Ag/@lē&"i' Y*R[>~ђ$ ma:OܞW Q({1}}Bo xk6&Ij,"QJw]߾?W-@ CLN{G"o!7 ?: ;#7ɿ 7u2Ə Z ohaMIDAT1;q8od,~7}R;tRz|qs7yA.vҌ0W4}⳹c!w'np'm]9& |g_?,9=?w'npg=w70n0GM\!{t'Se̖.s_inCM͝au>(@S!]a҇WGo7yA.e &og7;q?obNu+0W5}c2XyPps7yX_R%$#oOLn0{%6x}s|Ϧa41"W5oտȥGCOLS~ '?b@oCoQ^bvbʛOMPj p7JNMPj> s7(}4;GtրUSr orjRLطoQ65AhsrR 5AGIS_Rھf8''R~N}_|HMPj>᜜HMPj9|Q 5AhsrR 5Ae x(X!M|5C(C:))aHMPjaTD-HMPj锇@ $Lӎ$j*HL0@U 5A~ӓ'5q՟7ۮusmç4][cCz`߃ֵWџ.+^@ V"{|IDAT4[ͥ#8N|:)$2AuSL]pf݆ܞM2ddB^׻}*#FLt6Jm&Ni귌oA$ /R~VJv ivW|"@A|Rճ)FW+iu xdY F0T DP| dP 7G߆j?3)*'?pQj #.eǧ>z;g  |e~B(N(1uc-%3a^̼ۀ?EhRiE{::&J3[$q5'6gRe #UBSΨadե!i8c/G 3Ԑ@ERT&v*"`㵉pmU!1F0YQG)R--vp[p n\KT\cPwM?h!EN ¥txskhF>sx+b;qKPKԟBC" ;SbTDRJqB z=/}qrZ0b*ԟ)[Ji?F.bǎn?݁1oݤY4QW+)ş٩EǷڇs'秌OOc?y*1n]=rO+7&0N>M(ŸU1),Y^j́m7[J)j5@zUA' N`9ϷZ29xHџ{ChF^eɴ3݉\6JZ%+5ǎ, ۖ1 m糔OSaQ$o_9Jީ?p%Ncf Ҙ!6" <$qD6yѡ-inyΚ0!y[+3 E1϶ =VY3ʶ'LE}wՖGQVƢcw(~tr`P|U'3ȣWd.->vJϐ(֟9s3bȼΦZ岼Z <0d1T'#9}F,QV`"ur$Ya|c79eJKRE7EFli"$к{cڐcQ?9Ӭɼ-XkXZ}wd6>7(X=ͤ\{^g7?<|1N sj#w#9};1;w;=#_a2M?? ?bR >~Bļ' 8:=RƦ ѧCLk/~ ў8-ܪ` v3yih!yF!ձU*)u[I#Bg&p)G+Ֆ"gm>9n=W@h1UL6? zdRmqfsӣkr\r&ZaD{fcYA oc%qf,}<;poO'דt]y8;Z Wsǘ}'s%{obIGg< VG<&'H8lX'W*ן~}yFm# -W~Ŧ1)W9| 3F`!NJG2R8L d#z8{НӪ̸+V]:Ug@ȑEg{@l6IiK7:^1UUGOC 6Tl-3&ҥMKXAGLpofv( v|!!9fry_Lݢ\2DqTWJ 22AMyf+n5>g"yQ/)dcr2Cnf4.eĶDBIr8Fy9w $ob eT r8kEnܕ!)1ğa'x4]{Ȏ|q9:3l(Gx FvqǛnlb1K?ۆJMxq9jNŘez[;pŗ)^–(7x( b4w{*O/h{|7w\w |~T2_rcNOE8Ӷ蠳oM={iK8&U[:|?Wb4U]ܾR5{Nnn{Jϝw>t.x 3: 4a._Xd{1f~i0z +Z6Xi|NViuWws}`.Ât85+vb)%YͰmyڋ3N#aIO&3?1{@S2QpZ3HGհchuտzT`K%.qK\%.VO; _%N.D_ wj&M, [ G-H[u 0&Dd í yaȣlD0'wyS:=[6WωK0~wW%9oq~Mo$R=ֶַoq~sXƜs' D0<Ǡu0?Mןx[;7\/_NJ]w*C_LOc͎ǟH8\P{Zk gH*l.\"8SI4-1]}Mkmwm]Y$9M|5,*vEs n]eermv~Qd}CCGǚ5V; s/\ݰ6Vwa:vL\gKsrTNѬQJfP;24p%8yRkv2+cY++_V Օ]wܱi-f~j&sOܯҞ%l]X-cYwꥉ9DG97 d3Vkv87%Qik *]`ˡϵ8C}h^HtvږxM *{ڣOh%;&X'۵&ek [w[93XADӔ M&7 .G-P,ntgYNeZϭ_Xym˔kq''jIKaI>)?5;~4o`%)ZWΗ޵ ~dbexU9rkiο+֥7ݹR;I+q^=Yeb5;xNoP$-'ֲZyg{ڂC_ďTw<.`< +ި59=!o,/NlkY=$w?^ۋvk7={k!|^}{T?~zsGu xV7; og8G煻TҾf]WR\x]kcə͙̄cɹt,O|JSP&8྄->pĽW"qu+0=-!|0qkpө>/v8##)%+N*Csߌ؎xu⊨w~=ΤX,u9sʽ@{Q5~hMZҹIK$.A>'E}>/ZAh=|s_xʋ^L!{W_h_(H&}-P=D*Gi+7mYICğvx.k ڿ!<[/]v=.9z23J'7gahxmFy 'oP}^h[3!A|H ^!p\͚O0(o%nsRF98loiorҫ絧iw뿦g O=^$yϘ|mm) qrWϖV-}@Q|5YLxsDP^m 9߬ߠIp3CyYԤ^{~횕7^b-赤>Y dq3|5/ƴW,ڝx e&C$)1#9RQۍ+O^npLsĕ}Y;kH"1?k5گiKVkլxpiVݢ~A^~Mٯb4oIL3KLii%0!{%;}׏Rpއ{Caܣ_ŻOi~IZWAaXKGjkGY +/0Ix ^ Pgxxz~hy/._<><ߜ{&복au rVϭ,7-8m/#okJ}< wI9+˄cq@{>+2;kn[֟:s ieY-:a~5v_o[e޺6`MWmz*_i|Gt{59z.s!C5vU* &6׶- 74X`nu92ӞI3vfEbIFm JDUQZg*wR*Ӑʃ-7j ~7@ x= Dz@pm O*5hc*v1p? ܊6K!ࢂCG .7\_Y\& xgn@å1p? h EϠ~hc~~xIH4*1p? \6K!<ࢂCXB"%Se'AcKk$|<=e>?ࢂChs.|-I2& />6K!|ࢂC>\",KpQIh3K| Aǀ?Bå 1p? |m B(Ep6K!GpQpw4}~K$0Iϭ 팈f$yӱNܢ?]kkŸj(-?n>_i $Jƞ+^GFjhnr CXd%;"u&Obt';C{InoӇ1K{{ |ڟiuFn!x?'h|Jq)=z;ŇϓXwLKLӈ_[ʓ7;[Nφ_;彈tjs6q17ɇ~mu5k)᜚ɬR{Zi 8Wߝ=O/aVgVCn[4/?'F]-п+>Yc'^q+.1+W\bz%WLKL^q5W^'؎,14rRiѨZ^+鵽NQqIZZB e^s]\ϯW$=0jfL [~F4 *^Y/^^FZ.aF׋5kWDb}Wu۶czii|`A~Mfg7<" v2Ym6* mI23-Rmqv\' Wo5&$v3fӪhB6[)I@r/(;FaZm7a^ɗKU$hJj$ɥmXh b/Ph^6fMh0HlYP'D1Ʊ7FH;*fM6l=3Z&Uwq^b e[{ kTj3ݴ)iQmԏ_;!RɁ'[֚͝25t]ɤtIw%hElt::r 9*)ۭ+W)vLjkPGH9|~:)fut;4/du2D,ԬH%x;hsK/ZOdE}m!jیG"bI/bQh6OѫׄȶGQŦ+ ɕhQ/;zd z9&u\fB"GlZVWa5$Jv:Mjk/zaE{GQ4ƏV14J .zŢ M"z8И~*!^~I5%TzA]~nmj0`0~7t>-3s۝N݆tJ%Vm3#w^#^&4 HMdLƬѨy&k4M8njнU.֪e͚i4*a L652A|[ fYq[hLi R(A,C"T*`t ~J;ayW#|{4qXN^!$Hf2K|UT*#kYjЇe6%bM2hЋP&ܥ]F"z-6&D!\Ѭљ^.:[+ f>_}î/DM~ۆV쥌I' 9v;\. ۲/+"_^SOpp4*@d koaG/|=%Tny|yEn/#oPj 2&K*nwx|S4S. /-hIJt,b$_ЇT|d*X4; ؅,Gd X[D'U DtwJzQ*q.~>} 29z‚Dc̘qc@8ZL'X`$@$>Q,!A +aɘ,w0XʭX,b eKsAqfTl㣝`n_4 bWVDzyRōlK@ suyc]V"P@B#ouX|P\A}dPr@,FqA 6K0Z`|._y|+w-yWRZRƤBFقq%ʜׯ6$c;Җv<j9F0=N)>УxU? N}B{ۏM2p!_H,g!FHFC=;aLȘE&38mbX*'_q ؇ߔWRDdrه4aW->P, b9/hb< ˸ԢRn3 aX>}@|nXN|  !R Pn^p\ݦJ*d@$diSc(ɀI^Xّ(5M&b#ד{%:1dAQY-)_.m "_Q8\5KJZƵKRH V R#D&Mn,0E 'Ea(' n' EvHt ke .9ɧmx ˲'^ZkPv"+A G8 ASM,<;%mP}p077b|~,%_6/! -D9C =:wYykk_ȶ!\m!Fq#N<G7_'7`7pl١ixH HowPّ@m5M=\('9mk6{.G`Q®,^(brO@ rW:);)436(-.>g%_RCzdNyL]Xu@2M6qdD+cEOؼAd2ɛr+Gۣyg$_B2xC.La-H@|cBqM8U9Np8 fD)##NChӕѕj<.ׯ[pC0OWo [EҙA`lOa 2nGVR id0L0(Ѣd|.=nX5(І>WÖ9_{[h29 yiȌ |E_NpEU(o]X"8*GKF/y䭓ݽZTދ}2x"`lYyIjj2HmrJ-J¡jQ 2K)ơq7ygL힓xJ7e8{%eYC4AjLC3]ɥB;#;Z6ǖwI*JݟbŃgO/݉ {sUohr?m#tKz\/xgs{eZ^tT蚋Cr9܏| +W>]#d"Ӗ!6GvϮSl; ݟyPӔb9򊎺*c DWogɲ{AolQ+{Oj8nO)|*i~p˔K+M 1c#VΟWH% µFx3+%VZMIVQr/HT8<:oCJz_ȇ >&X> ;ZO.<~#u3EI ]P]x-}Q+UߨOywsb4"ޗ$5+q~/Pۍ+O^n&oYYy8y|;9J[7Vn];VZ;+0Epڒ9.LfXӴ1qv%嵍sjVK;f;=< Io_{7W$N,9˅jv/"Y(? oYY`mI7IvMs8qcgF?Rx-ĕ]m["ׅp4z-Wg:,ǽDBff,"M4x%TN^)׫0SݺaY]{w<=!\n)OWfOL7GM2ddB^׻}*#FLt6Jm&Ni귌oA$ /R~VJv ivW|"@A|Rճ)FW+iu xdY F0T DP| dP 7G߆j?3)*'?pQj #.eǧ>z;g  |e~B(N(1uc-%3a^̼ۀ?EhRiE{::&J3[$q5'6gRe #UBSΨadե!i8c/G 3Ԑ@ERT&v*"`㵉pmU!1F0YQG)R--vp[p n\KT\cPwM?h!EN ¥txskhF>sx+b;qKPKԟBC" ;SbTDRJqB z=/}qrZ0b*ԟ)[Ji?F.bǎn?݁1oݤY4QW+)ş٩EǷڇs'秌OOc?y*1n]=rO+7&0N>M(ŸU1),Y^j́m7[J)j5@zUA' N`9ϷZ29xHџ{ChF^eɴ3݉\6JZ%+5ǎ, ۖ1 m糔OSaQ$o_9Jީ?p%Ncf Ҙ!6" <$qD6yѡ-inyΚ0!y[+3 E1϶ =VY3ʶ'LE}wՖGQVƢcw(~tr`P|U'3ȣWd.->vJϐ(֟9s3bȼΦZ岼Z <0d1T'#9}F,QV`"ur$Ya|c79eJKRE7EFli"$к{cڐcQ?9Ӭɼ-XkXZ}wd6>7(X=ͤ\{^g7?<|1N sj#w#9};1;w;=#_a2M?? ?bR >~Bļ' 8:=RƦ ѧCLk/~ ў8-ܪ` v3yih!yF!ձU*)u[I#Bg&p)G+Ֆ"gm>9n=W@h1UL6? zdRmqfsӣkr\r&ZaD{fcYA oc%qf,}<;poO'דt]y8;Z Wsǘ}'s%{obIGg< VG<&'H8lX'W*ן~}yFm# -W~Ŧ1)W9| 3F`!NJG2R8L d#z8{НӪ̸+V]:Ug@ȑEg{@l6IiK7:^1UUGOC 6Tl-3&ҥMKXAGLpofv( v|!!9fry_Lݢ\2DqTWJ 22AMyf+n5>g"yQ/)dc  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#%&'()*+u086789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F`9od2Data $@3WordDocument%FObjectPool6d`9od_1214318564dO)6d6dOle PRINT5EPRINTK  dO)"Microsoft PowerPoint PresentationMSPresentationPowerPoint.Show.89q&_sUma RamamurthyUma RamamurthyOh+'0T hp   (      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~55% Uc  /--$..--'QA |pt(p|ބΥksZ919ksc)111J!ks9Zc!1111!)ޥk!RkcJRck!)1RJ9191J!BJZ9191R9ssJ!)B!!JZc!1111Z!R1111J1J1919c)R{!ZRZJcRcR焜Z1111119c{BZ{sssޜ1JBZBZBZBZBZBZBZ1119111k)Jk!!))B1cc{kc{cc{kc{)1!)))JZc!111119c{޽9RcJ!J)!19191919)R!Bc!)s{B1919)ZZ{1!9191111111119111)R!!J11!!sJ1R19111911191919191919)9))ޥJ1!!))ֽR1111191111111911111119111焜Z1)1919191119191919111111191)!!s{1J9R1J9R1J9R1J9R{s!)191911111119111111191119111))))!!!)Bcckccccc1!)))ccތ{JJ919111919191919191919191119191JJJ!19191119JJJk!){R111111111111111111111111111111111111111111111111))BsssR91919191919191919191919191919191919191919191919111919{{kJ)1111111111111111111111111111111111111111111111111119)9B1!1919191919191919191919191919191919191919191919111919191cBR!9111111111111111111111111111111111111111111111111111111))))!19191919191919191919191919191919191919191919191911191919)΄B)111111111111111111111111111111111111111111111191119191111!B911111919191919191919191919191919191919191919191919111911191s{Rk11111111111111111111111111111111111111111111111111111111111)Bssޜ!911191919191919191919191919191919191919191919191919191919191)!)Rk1111111111111111111111111111111111111111111111111111111111111B)J1919191919191919191919191919191919191919191919191919191919191)cRcsB)11111111111111111111111111111111111111111111111111111111919191k1J{B1111191919191919191919191919191919191919191919191919191911191119c{1R{B11191111111111111111111111111111111111111111111111111111111119111JB1{B1119191919191919191919191919191919191919191919191919191919191111111kBRs9)1111111111911111111191911191911111111111111111119111111191111111111cJc{B)11919191919111911111119191911191919191919191119111911111919111911191kJZRk1191919191111111111111111111119111111111111)1111191111111111111111119cRc{111)!)!)11)11)1919)111))1)1911!{)111191)19)111)91)191)!!)9)111)911!111kJc!!9119BJ1911!!11)11cs1!))9!!s9111)9)!!1!11!1!!{sZ)91)11B9s111cRc֌J191!19191!J919!91{!{19s{19)9)!)91!)J9)!1)1)1!1119)!91111B!1)!9)!)9191kBZRR1111!11911J1911)1)B)1{s91)1)119)J1)!1)9)99111!)BJBZ!J1!!1)1)111JB1cJ1191!BcZ!1!J9199!J1{s9s{1!)9)!)9)!)J!9)!111)1!19191!!)))B!1)!9)9!919c{9RZR1111!)!)1!!!)19!1)9){11Js)sJ!Js1B9!ZB1)!Z!J9!!)1{J)sZ1J1!ZJ1!Z91c1J1191!)9111)))Z!91!119!)))1!)))9c91)){s)11))s{1)Z)111)Z!19)){)1!s)19B1R{1111!csZ!111)9111919111!91119111919111911111111191119111119111111Z)11Rcc9191)!)19191919111911))19191919191919191119191919191919111919191)111J){1911111111111111111111111111191119111111111919111111191111191911191111B)!1191119111919191111191919191))91)))19199119191911!119191911191911191919cBZ{11111911191111Z!19B9!)1!)J1c1!ZB{)9!11c1)!)1JJZ9s1B!111911111111111c1J91919191911191991919ZcZc1)111)!111111)19Z{11!9!19sc19!911191119111911JJ9cc!111111111111111!111111!!11!9)9sss!)9!91Zs1)!1)1ZZZ91!1111111111111111JRc{111919199119111JJ{s!11)99)1)911)!{s{)1)11Z!11!111{Jc19!9191919191919191)!B1cc)1111111111911BJ!1)!!!)!!))J!1J1!B)Z1)!!)1!))J!11)111111111111111119kkcJ9111919191119199111)11!!!{1){J{11))!!sJ)91!ZZ119!91919191919191919))JJ11111111111111Z!!!1111111!J1111191111191111191119111)1!1111111111111111)1)RR1919191919111!s{s!19191111)11119191119191911111919191c)9191919191919191911J19111111191911111111111111111111111111111111111111111911111111111111111111!քJ1191119191911191119191911111919)119111919191919191919191919191919191911cRcJ1111911111111111111191!Z9)c)11!19B11Z)1!Z11s!11111111111111111111111111c1RcR)J91119191919191119111991)11119!){!Z11)1!!91991919191919191919191919191)Rss{{{s91191119111111111911111!19!911!11)!!J!9!911J!1111111111111111111111111111Rs{RR11919111919191919191919J1)111!1111!1J)1)911J!91919191919191919191919191911ZZ)1111919111111111111111{1)!!s))!1sZ1!s1s!)1!19111111111111111111111111111k9RքJ91911111919191911191119J!)s!s1)JBc11s{Z9{!BJ1919191919191919191919191919191cJcZc19111111111111111111111!111111191)111111)1)))91111111111111111111111111119111cJZ{{919191119191919191919191JJ!11191911199119111919191919191919191919191919191111k9RZ!91111111111111111191911191))91111111111111119111111111111111119111111111111111JB1J1919191911191919191111191119191919111911191919191919111911191119191919191119111kRcޜ1111111111119)1!ZZZZ11)ZZ))1)1)11!!1)ZZs11!)1Js!)1!JZs11191911111111191911cRZRk1191919191919191{s)!cZ9ZJ!1s91!!9911B{!1{1!s)9!!)!!!!{9!)B!1919191919191919191RJcRk1111111111111119)111)!1J91sB91)1!B11Zs1B1)1)19)!11c119!Js9111911111111191111)JksRk119191919191919191)JJ1B!19sJ19)9!J)9Z{1J!9)9)91)!!19Z!1)!J1191919191919191911191s{Rk1911111111111111)9!9s119s)1{B1!1!11Js91s1))19!!11J11Z11)111111111111111191119ksZk11919191919111919Z9191)!9s1{1JZ{1Jsc1)1c9)J)99))J11s!1!B{Z)191919191919191119111s{ޜ1111111111111111{11)!)!s)1)!1)1!1))11!111)111!1)111)11)!1111111111111111111119ksB1919191919191111Z919s9)11{191911191919111919!!111919191119191919191919111119191s{Z!91119111111111111)))11111111111111911111911191))1111111111911111111111111191111cRc919191911111919191919111919191119191919111119191911191919111919191919191919191ZJZZc111911111119111119111111111911111119191919191119111911111111111911111111191119cRc焜B919191919191119111911191919191919191919111911191111191919191919191919191119111kޜZZ!111111911111119111119111911111911)911111911111119111111191111191111111111111JB1RJ91919191911191119191919191119111919191119191919191119191919191119191919191119c{kkJ)11)91119111911111111111119111111111119111111111111111111111111111111191119!JRsJ!1919111911191919191919191119))1919191919191919191919191919191919191911191{!kJ19111111111111111111111111c)9111111111111111111111111111111111191111111{!s9Zk19191919191919191919111kc!{B9191919191919191919191919191919111919191{!ޜ1111111111111191111111{!B111111111111111111111111111111111111111{!11111191919191911111{!ZR91111191919191919191919191919191919191{!cJcJsR!)1119111111))sRcR{s9191111111111111111111111111111191)sJcR{s{scZ))1919))!ZRތ{{sƵ{R19111919191919191919191919191919cRccs9BBB91Z)!1191119191111111119B9111111BZ)ޜZR9191919191119111cZތsk{!ZkRkZkRk1{sZR91119111111111JRskތ{Z1Z991191919191JRބ{cRZRJ!s9cRބs{sss{{{s{s{s'--$pSpSpS---- $pSpS--'@Arial-. 2 wCompetition for   . "SystemP:-@Arial-. 2  Consciousnesso  .---$qq..q---- $qq..--'@Arial-.  2 Long .-@Arial-.  2 -.-@Arial-. 2 term s  .-@Arial-. 2 Working Memory   .---$]B]B]B---- $]B]B--'@Arial-. "2 aiDeclarative Memory   .-@Arial-. %2 ti(Sparse Distributed      .-@Arial-. 2 Memory)l .---$`n`n`n---- $`n`n--'@Arial-. "2 mTransient Episodic     .-@Arial-. 2 Memory .-@Arial-. %2 i(Sparse Distributed      .-@Arial-. 2 Memory)l .---$,,---- $,,--'@Arial-. 2 Working Memory   .-@Arial-. %2 Preconscious Buffers      .-@Arial-. 2 % (Workspace)o    .---$NN  N---- $NN  --'@Arial-. 2 V Attention   .-@Arial-. 2 YCodelets  .---$fff---- $ff--'@Arial-. 2 B Perceptual o   .-@Arial-. "2 !Associative Memory   .-@Arial-. 2 I (Slip Net)   .---$""UU"---- $""UU--'@Arial-. !2 ,,Procedural Memoryy    .-@Arial-. 2 ?B (Scheme Net)   .---${Q{Q{Q---- ${Q{Q--'@Arial-. 2 lAction s  .-@Arial-. 2 ~ Selectione   .-@Arial-. 2 (Behavior Net)    .---&8 [[a[bZbZbYaYZZ[[[^^ZfV^^^--'--&8 --'@Arial-.  2 82.-@Arial-. 2 KPercepts  .---&8 effeeee--'--&8 x+ijjjjw,w+w+x+x+x+dnid--'@Arial-.  2 a3.-@Arial-.  2 WCue .-@Arial-.  2 Gr3.-@Arial-.  2 ZiCue .---&8 kllkkkk--'--&8 ..../-,4---'@Arial-.  2 3.-@Arial-. 2 sLocal  .-@Arial-. 2 \ Associations .-@Arial-.  2 8)3.-@Arial-. 2 KLocal  .-@Arial-. 2 ] Associations .---&8 lmmmliqii--'@Arial-.  2 3.-@Arial-. 2  Copy Over   .---&8 444446096--'@Arial-.  2 4.-@Arial-. 2 Look Ats  .---&8 0OOOOO0///00KSKK--'@Arial-.  2 4.-@Arial-. 2  Coalitions   .---&8 n|~}}||nzozo{o{n|n|}y--'@Arial-.  2 84.-@Arial-. 2 Winning  .-@Arial-. 2  Coalition   .---8t0,vt5**5--'@Arial-.  2 5.-@Arial-. 2 , Conscious  .-@Arial-. 2 > Broadcast  .---&8 {Vxxxww{U{U{U{V{V{V{ys{--'@Arial-.  2 x66,7.-@Arial-. $2 Instantiate, bind, s   .-@Arial-. 2 activate schemes .-@Arial-. 2 8 & 9n .-@Arial-. 2 |Action Selecteds   .-@Arial-. 2  And Takenl   .-@Arial-. 2 p (behavior   .-@Arial-. 2 codelets  .-@Arial-.  2 ).---&8 ``aaa``--'--&8 za{`{`{azazaza--'--&8 zXWWWVz{{{zz\UT\--'--&8 `IJJKJaaa```ENJE--'@Arial-. 2 , Attentional   .-@Arial-. 2 >Learning   .-@Arial-. 2  Episodic a  .-@Arial-. 2 Learning   .-@Arial-. 2 ' Perceptual   .-@Arial-. 2 0Learning   .-@Arial-. 2  Procedural   .-@Arial-. 2 Learning   .-33-33-&8 ```````--'33--&8 ]lgcfcfcfbfb\k]k]k]l]l]llccff]lc--'@Arial-. 332  Interpretl .-@Arial-. 332  Interpretl .-@Arial-. 33 2 %Re .-@Arial-. 33 2 8-.-@Arial-. 332 = afference.---L8 uqpppquuvuuukgfffgklllkka]]]]]abbbaaXSSSSSXXXXXXNJIIIJNNONNND@@?@@DEEEDD:66666:;;;::1-,,,-111111'#"""#'(((''       --'@Arial-. 2  Consolidation   .-33-33-&8 Q44555RRRRQQ/66/--'@Arial-.  2 1.-@Arial-. 2 _ Perception  .-@Arial-. 2 gCodelets  .---$O_O_O_---- $O_O_--'@Arial-. 2 z Consciousn  .-@Arial-. 2 | Broadcastn    .---&8 QRRRRQQ--'--$626262---- $6262--'--$=7=7=7--'@Arial-. 2 LH Sensors &n    .-@Arial-. 2 ^H Primitiven   .-@Arial-. 2 qHFeatures   .-@Arial-. 2 H Detectorsn   .-cA v+(v {{{!!{91RBss{!!֭ƌ{!cc{!έ!cZƥRJJ1s{1)s{έ1191s{ﭭΥB91)s{ތsss{sss{sss{sss{sss{sssssss{s{kR99))J9s{s{ƌZRRRZcJZJ911919)911)9191911)9191911)919191111)J9J1ZckkR9RBR9RBR9{ZcJ9!!!!!ss΄{!J1)ccRJ{ƥƥ1J1޽{Z)1έƔJ1{)){sΥJ1{s!!έ!ZZJ1ssZR!!ZZ{ZZZ֭絽{Z)1!)))19)11)kޜJJJ1))ƜskZk99)֭ޜ{!!!RRR!!!BBBƜ)!!ޭ11)Υޥ99999)ޥ!RRRRZRRRR999{Υ!!!ccR11)RRR{J9ޔ{RRR11!քkkssZc11!֭֭!!֭Υ!)!9BBƜ!!!֥11)ƥޜs99911!֭)!!֭BBJ{ƥ!!!֭!!!֭R9JJkJ!!ޜ{RRR99)999ƽBB9ƜkkZs99)֭ス!!))JJJƜ)))ޭ11)Υ֜{99999)ΥccJZZJccRk֭BBBΥ!!!֭19)ΥRBRRccJkkRssZޜ{ccJ11)眜{999ZZJkssZk))!֭Υ!!!ΥBBBΥ!!!֭11)֭甔{99911)֭k{sJJJΥ!!!֭11)ΥJ9RRJB!!!k{Ɯޜ{!!Ɯ11)Ɯ)))kkRk!))JJJ{֭ccRZcJޭZZJssZ91)999ޭskZBBBccJƥZZZ!!!ƽΥZZJssZƜ{99911)B9B֭ssZ999ޭksZRBRRRR֭{BJB{|{Ɯ{絽Ɯ{Υ{֭dkJJJkέkkRccJ֭・ccRkkR֭{JBJ{ƄkJJJkkRƵksZZZJ֥֭ccJ{91ks{s!!k{k֥֭B99Μ91s{!!ΜkkssZνƜ91ssƵ91s{RR91ksccքks絵skZބk19)11)ccR֭ZZJތsskZBJBƜssZ)))1))ޭcZJssZkBBB11){猌s11)JJR!!!ccJccRƜ޽ccR֭999JBJcZJJJJZZJ91ss{ccJZZJ{JBBޭ99)֥ZZJs֭11)kkZRJJƜRRRkkR99)JJJssZ眜{999֥)1)Ɯ11)11)祥)))ZZJBJB11!{֭91)91sscccZJccJ眜{JJJccRZZJޭ11!999ssZZcJ)!)ƜZZJs絵999JJRkkR{ccRZcJBBB罽B9B99)ﭭ99))))ƜJBJ{޵11)91s{ccssZkkR{JJJcZJccJﭭ91)ƜBBBkkRccJ!))ƜccJk筭JJJZZJksZ眜{ZZJccJ!!!ccJZZJ)))11)19911!Υ罽)!)筵JJJccJ!!!{19)91kscc999BBB֭s{֭!!!֭BBBk֭{JBB!!!޵֭֭ccJs筵1))kkkZBBBﵽBBBZZJssZ֭kkZΥΥ!!ZcJkkZ19)֭ƥ))!֭11)91sscc!!!{k{kュ9BBBBB{kssZkBBBZZJkkR91)kccJk֥ksZk99BZZJBJBccJ眜JJJJJJssZkkZ{kƜkkZZJ999ksZJJJJJJ{kƜ91)91ssccZZJJJJޭBBBJJJބkJJJƜ11){cRRcc֭199999Μ{ccJBBB֭ƜBBBR9ZRcc֭RBRRccR9RRccνBBBBBBBBBccRƥRRRccJ֭{քsƽ{֥ޭRRRRRZkkZsބkքk999ssZkΥ֜999RJJkkZRBRRcckkRkƽƜZZJZcJBBBZZJΥssZ199Υ焄k11)BBBkkRZZJJJJƥk֭ƜƜk֭ƜBBBkR9RZccƜ!!!999ssZJRJ)))ƥ{JJJcZJs9B9{֭91)֭!!!֭1))JJJ{Ɯ999ksJBcc罽k91)ccJB99ksZJJJ!))֭祥JJJccJc999{Υ11)֭!)!֭11)ccJs眔{RRR{{Z)1cc޽!!!!!!99911)skkZJJJ{k!֭999s19)kƜ))!֭!!!֭!!)BBB{99)skZ{)9ZZ!!!kkZ֥11)skZ・{kJBBccJkkR11)ZZJkZZJ99)ZZJ֭ZZJ!!!֭JJJksZﭭBBBZZJJJJZZέƵBB9kkZޭ!!!k֭ƥƵ絵!!!Ɯ֭Υ{!RZ֥ccJ)!)11)11!k焄kƜޜ{c!!!!ZZֽΥcR{έZcRRέέccΥss{s{s{{c{R9{s919191{c9191{sccZcccssZcccccccZcccZc{s{sckccccccccccccccckccccccckccccccckccccccckccccccck'--&8 bbbbbf^ff--'--%LKU--'--%{L--'@Arial-. 2 ;8 & 9r .-@Arial-. 2 Action Selected   .-@Arial-. 2 3( And Takenl   .-@Arial-. 2 E (behavior   .-@Arial-. 2 EOcodelets  .-@Arial-.  2 E).---%LL--'--&8 LLLLL--'--%Q--'--&8 2```___2_2_3_2`2`2`.[7_.d.[--'@Arial-.  2 61.-@Arial-. 2 HInternal .-@Arial-. 2 [Senses .---&8 33444.65.--'@Arial-.  2 '1.-@Arial-. 2 Senses .-      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~7l.5'% EMFKz\KhCF, EMF+@F\PEMF+"@ @ $@ 0@?!@ @ F(GDIC/FXLEMF+*@$?? @$qąD;D!b $$=='% % V0..B.B% % $$AA" FEMF+@ FGDICF(GDICO0FGDICF(GDICmFGDICF(GDIC-F(GDICsF<0EMF+*@$??@JFIFHHExifMM*bj(1r2iGGAdobe Photoshop CS Windows2006:01:23 13:24:44p|&(.HHJFIFHH Adobe_CMAdobed            |p"?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$2q0e\[1%Stӷ*1>nA %:>/ʀE?c_7:YmxXel>~YOZ?95 >KXq50I\<68uf׶Ovzoc[?,a>euL{w'bp凹$e ~Nv qsx2C9#_:*}K8sl#7[w+JVpA $I%TYYr=sȌq"G=`dj#Y1[9FR;D\lmE`ÝƏ;?,r痾^č%~'Cqu82}'=\5̈18`Oɼ1%&ˎ?/L;{j0z_Ona鹿ɧ-eED꘏ۘsU9441Ŏ.C湞V@z?9\{uuZK]J!2a|.ɦT 25wI.IZ!3^#))#I*I6&DDϒf=hsBn׷V7>o{psѳT4nt1K\ԟeX&q\#p{mZ_ 2cϏ 8rc1nr<刿Ȉ'~ Zrx F];?UoƜ+l#eoS~(0{x]ݳk7&$'#,w܏b?~&//öHmt;͒ Oiе=;.(cRB%2b3ZlSMV5 6g{]WY OEX*/-k6on-da-  lS#P,k-ۻn[Ǔ$d bGWwmcɒq$ďO~[1S[ZRǴ:7U۝o:P^_^ZA/f>6Yka i2\ozu?EYsf@es@`{=:G0 O?BG( >/Tx*fuƬ*as[scZOTS!Zֆ' E~$d)imigE*}Yz}M6~Oܮ*uUv \*~n? 奛kxeNˋ9,͚1h]lf[$vgI1iSSj0ꞥU[<ks`6 jalHoa)+n5\@2{ʧYɻ[}Z7s_w,qnTnnk(d˙,׆ݛA:Fq9#q3/Ҕ򑌸9Dke/WnVX+s~ n~U>5 Xvwb5t@\omv?cmMkc?7C:l2]c{Kmߢ[Rb 9{GꒁxI<Dq-Waml.5 wm;c*3+?~Cj}+uc"]mU]V!i6`gp8_Quv6Iɥ۳jBF q n}ELQ{4?~Flq*kݏxع߉9iG&2pwyNZQ0??&'gFߗxun 4e7Ҷ}e~^kkQϦ[} ǺM=[WOZ^M5ں~U][?61;%쮆lS3q~%8j}/ e$~Mv~⊾ZEnȾ܆7][恲9}OeD(d1eNu$499}uusܶHs9@Hs@AUҧ1p0;kj-;}=]G\_z:XI+ WZ'sXvmqo.~5m\" lٷzÚrS!>?+?ٝI$TI%)q]C 9RǺxsQ/vRFJkv~c9ʎgO 8Kgj1pR'/~U!@mܠ?DzOj T-q)B&P'Ls& 8/ȶTU.5NMʽ<Ιs+Zn!>Iֹ߾V_sN>~﷊\m3g;pC4~lhNwQvt1}V]Ƃ8k oѭ//%W1ާcwoJ~G'5}C1?7$ ]e<%-xc|f(fsCƣPpkkB{=EjmU`F5bX?"*ǎx *#ZN0Ìc?$ITI%)$IKpe_ahlH#M,Np)hIG7}u$SGnA %:>/ʀE?c_7:YmxXel>~YOZ?95 >KXq50I\<68uf׶Ovzoc[?,a>euL{w'bp凹$e ~Nv qsx2C9#_:*}K8sl#7[w+JVpA $I%TYYr=sȌq"G=`dj#Y1[9FR;D\lmE`ÝƏ;?,r痾^č%~'Cqu82}'=\5̈18`Oɼ1%&ˎ?/L;{j0z_Ona鹿ɧ-eED꘏ۘsU9441Ŏ.C湞V@z?9\{uuZK]J!2a|.ɦT 25wI.IZ!3^#))#I*I6&DDϒf=hsBn׷V7>o{psѳT4nt1K\ԟeX&q\#p{mZ_ 2cϏ 8rc1nr<刿Ȉ'~ Zrx F];?UoƜ+l#eoS~(0{x]ݳk7&$'#,w܏b?~&//öHmt;͒ Oiе=;.(cRB%2b3ZlSMV5 6g{]WY OEX*/-k6on-da-  lS#P,k-ۻn[Ǔ$d bGWwmcɒq$ďO~[1S[ZRǴ:7U۝o:P^_^ZA/f>6Yka i2\ozu?EYsf@es@`{=:G0 O?BG( >/Tx*fuƬ*as[scZOTS!Zֆ' E~$d)imigE*}Yz}M6~Oܮ*uUv \*~n? 奛kxeNˋ9,͚1h]lf[$vgI1iSSj0ꞥU[<ks`6 jalHoa)+n5\@2{ʧYɻ[}Z7s_w,qnTnnk(d˙,׆ݛA:Fq9#q3/Ҕ򑌸9Dke/WnVX+s~ n~U>5 Xvwb5t@\omv?cmMkc?7C:l2]c{Kmߢ[Rb 9{GꒁxI<Dq-Waml.5 wm;c*3+?~Cj}+uc"]mU]V!i6`gp8_Quv6Iɥ۳jBF q n}ELQ{4?~Flq*kݏxع߉9iG&2pwyNZQ0??&'gFߗxun 4e7Ҷ}e~^kkQϦ[} ǺM=[WOZ^M5ں~U][?61;%쮆lS3q~%8j}/ e$~Mv~⊾ZEnȾ܆7][恲9}OeD(d1eNu$499}uusܶHs9@Hs@AUҧ1p0;kj-;}=]G\_z:XI+ WZ'sXvmqo.~5m\" lٷzÚrS!>?+?ٝI$TI%)q]C 9RǺxsQ/vRFJkv~c9ʎgO 8Kgj1pR'/~U!@mܠ?DzOj T-q)B&P'Ls& 8/ȶTU.5NMʽ<Ιs+Zn!>Iֹ߾V_sN>~﷊\m3g;pC4~lhNwQvt1}V]Ƃ8k oѭ//%W1ާcwoJ~G'5}C1?7$ ]e<%-xc|f(fsCƣPpkkB{=EjmU`F5bX?"*ǎx *#ZN0Ìc?$ITI%)$IKpe_ahlH#M,Np)hIG7}u$SG 1 112 124 1 71/1 71/1 2 2006-01-23T13:24:44-06:00 2006-01-23T13:24:44-06:00 2006-01-23T13:24:44-06:00 Adobe Photoshop CS Windows adobe:docid:photoshop:e8e9a317-8c45-11da-90f2-b4e9b3782723 image/jpeg XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Km&Adobed@ |p   0@P"!1"A 2#Qa30@BRb$qS4D%  !1AQ"aq2 BRbr#3S0@P%Cc$4&!1A Qaq0@P Ztu^=qkutіx "zk88 zܮndL7\扬c$i(h_^/:&_=~XCOAњܾ<%KO[Wetc7|?ۏHj˖( x E6هbAM(=juu?OK_8~)/U$b ֚>ޫB XctZ*!Ӹ5F-hs<" I}/"ia,z'a֎hXF4 @+vr<vdݦ Mw:]\.gKBJ27LvmțA_2F Kwk!yYF`Zc֗lY%m*gf㦛[xID YG| "g3Nc~^ԵGuٷú2!Fu]5|{}fr@5ڇȋ\Iž#맷lA#yjEn.btW @=o?U)2ȷ>㔋q8Ns@M8so´.#[UXee+qpyOܗJ}[ue$g?0ꗖ|ׇ] D]:uGS+H-¨7ǾuՋƱ\* Y92j<굾HUʪs)O:ʪh|wztǻb_NhFkw/a"nwO hG~L>ϰ7 6Ӕa?0();V=Vu ] |VYuMo6󣯤Wx)Խ_pŎ#O3PU |?,PnCbM$~ƌy PW۳n&2Dp!cB{ #Oc.mUچUFC/C c4ՃK,Z= FinЃ3!8W_?d;v4]2Zs 4xFT<ȕ韧QW9fa16ir,z> Gi]umЦ"JEhGÅ횔t!<23ҵ~?R^6yWdhS*cSK,u4J5-#AT }4z?U\yw%:9)=c]YQV  |1WtH4KTo;iG\+lē$~_Q:13A"}F9ڌi*}KZ5-*AYJToZ-T3<IRՍ@ 'yyu,3>,-P糷kq?f}S<u!}9orZݲ9J"K=IpUC(2r \H>:j_GxG8aGq%D(SS1UGpżp6`H癊|l ZH kb(#ɢ˨JU I:iwMivIm*Ȓ>ͪqVtе$~|xjpk* ɥ@}yP)o-%)C|,%<^\RM?[C<^ե/CMmWSATuSmMj yPwFoFs_K}g׸ ؖ릈>If+z•QLu?"cxMRMLP7o̟Q+2ȪUJ|֦8GzcɢkAE [3WJ9*=(9TnP-':xQn};n uUW.vT`4 G NCdD6R >3T$cV(3R ,r5plivf6cZ:=dZe6Pt9b5ëQggF ;kr:EX7ʫ SXhqo9h+Ѵō"u5|QkDϻ-6Tj̬!:M2 Iq|,FWy f_*l~#CEzj%9|;Gi|@u+AcR4N ȓ2TU ʡG* :I:uCiOvX#iǽY}Y:oR]z]wdfS:T-"jUhNݧ=+D)UtSyXg]9*п1h[حV0\\%?g]72Ni"O閭5܆ITmgbEY?"I׮9S#RȱegUV6(\%Of$}*aԆgc7ܱ֬ t]?Wae@d?]|OqQ5cSTCcyg=~%B'X,1ܤYQ.o鎑j^I rkv].braDFh]Wkރ-ԟy5gُ+(,Ubxl>\%U" /SU7_S_ZnҍnFM,=ücUr ُ2fI8 [NKG\>{GlpzuG'g :c> >#ݖMeC>+` [O*Yky{;S&hQP]HoGNɥ|')XV ʡSU=8asO$$q\ʔ㑩UÆ HetE44eƹb+EtHphZU&;JK^ѶWGٵN5̺EI,sߧW6tA?Ը">LMkpދ]kTFnrKmg)]pnnzxbsjjra=L)^m5Pmr߆8)*q;=IgDRM{1qu/G'AΛn}[3ϢVLPmŚ]kvdt43nI/P*-{ iL\XtIUHbNGÅzibFt~ fm5Sߖ2zWWmJ$_}rgoً;sSJ+YYɡDnc .%7+o/ qƂIt7f?& hN #.24 "eB+V ..[k0n8獵gUd!:5Σ3#a ̗e]^lx9tS6iLE,q4ײ ?eTerʑ0#'YcLjcot-/șN"1#N'*s[Va>63tXٚ>a̐tpɊq뷠Ăk%/Mې^׎=!K#k__EyOYB"t RT|~Qbp7Тb;Iq*7r"$i[898We\d1Y|vx;5XQ;yܛ=v,,e, 16XLst_>};u_]&F:Yk%^ NzxF'amẊ}:,&HvK툎ߐ2kz VEl$`'IzN6؜>rv\%U;" t~9%̿ LvOųJDtk}LDy^"%-{n!Xđ8H";0ӵ3k^Z[bay o]cc8kX*'\yC]`Lt!fg@S*(̬M;IvD_hǔUl\dC(S=n;vݺ4_M}zrF, YJ}alnD㬮 )LYGr߬vMq0׶Qmz[gBt~1PCfy r9C;}5vc-XLJmh@Zrw,hcץ9XLfO#*Mkd/m\jkdUnPX/Ox{2ǯ\TUSg8vTBliڅH _߷V.>ͯZcp܄HW/ϷL.¿±_㧙6\7iCk%Opkת.ѩHMDL~|&umXkd(ePN[6-$B{J}bCC1Iɘ@ig]PIOQ2 jZMyL;anfIWʫZS! \2!R%LU+nQDcې6bA1%` ua{H*@+5egu l |k}\uf}w[ Dwa&Ȅnuan=H{LWKf=i_T Ak;"}ON Mۗqh%UA[|b~un[ vbyHelv:¾1kµ߭M!^fWj-ݩD% 22{EFfwf2X+C r8/աcU]'^!63f%Mgb9+Ǩr=Q,NFϳIrY[4a}#to㛁Gy/Xz1~BAm: 㦠s0XEtv}5F9e+;nQ C5oJңHHqeS!ѓ_ 2)UoMdWo3Ɠ߭d+$ݖN*jIׯYh^NCD/tlmش8Wul5UkڞP bطEdv )`Ó: &5 +awӷL iL0YWĵ_!ҦsTJnlSz?ÓlbӯqEzLG25QqLePб/FNJ!Kc'VK,0a0a2:^ج]K;mc}cQuZUř2y˯⃱5 vZh9UYۏ]frr}ե((UC'2&dLB]NJUs㴱6ͺ{jqz|3;Vhӆ^1u⬵؄-eScV1sV?o7\k*z:~H.ٜv^vE fpEnO"LY۬ka N21B^˷n̰=gXHږ17)uvl{-:lJ$7ėXŴ&&7Oό:vpk | 1He[/>#&/v-RRH X19 &S"gbC"Q8 fԬ !k(OKWߪ\w)4s&pJfgHW1^EG YBEgtL0b /Т&5XgIIQ=|{%#5qb/!vɶWVۘщk\(ۡҽz5R(xF=`;"4·!C_*sb۱e:TB(I ]ϛYv2tؼV &| [iNMuT^=ȧ`n2? 1Q(Oo^b%3^,6LIc>~ߌ@qΩ9#t"tSҼ>76l mIcC0(hĺ[#$Ís7i^5sA?WG &-A9h$Ô+h0C%\U]x&Kym$% |qTj [o2ۑ] ^$]m:Zi'ZVxyGaꣴ&J h-ڣ7#-qAƎr)Xjl0No1j:ڡk?!=Mߥ;CN}5%XS!٭2MHXjiPWO1ЋQTsCgЦצ6ՋQD)Ǎgr)\T=&KNiۭT + rJ(a8WdwD)}cL6;n"h} t jMXIGTy@Ctt{>̰U\_Ri~?X D? R938B4;8ŧ5^Un; I.cHqBG?WQR[lC:(, Tf&OioLɞOŠM+Y9 XiÏ qD /7Mq.1keѴHmF;@`Y~&LBePcuX'(LdtHh_jѱnU"vV,3J):4aqsK?<ӳvPs>JOlKM)r;_*%5ȟg晐{0Cmˆ79!np,Mx &N@ʛFr&߱5Ō=!l!XῄP1xe'EbP3 vJ*90NyC_` AAmWj+wؔl_D$4PH}d@xg gEd+Xb;~ *~4SSַdwx_R*]Z!`G{ˮ!6UGdوM;=̥O5G߬i]$8`E1O?W^ך&S5ƴ:ZD"IQ^3;L խ.&D: e:b3MoEuGYI{5\"{i眠 A #M'O,a&.Q "(ˁ.`j A>ϱ]6ʸbUǃqʰUgUI˻Y!^̮{!X{4cӲXqy곢,1\\ۇ E™Js^ Z Sʭrb. ҂ AGMeuӍ~ v,b"/[ ,|. ""tRn ^JvQs &#V'ųdzX)4va BG)3@SAӁM#ƳpzɝfOBO5R5C*i0j SjU|hl8q} nK<2U"`*FRבP{O )AX석ِ{EQArc0: y hԭ|b+cj(mˎx2R ƭo>g`=ǧNMH6"jU9CO)Pviu,> @:D/.CDyXvx hܶFPmmȔ |T?NSB8ͣ9/q:ϪhET[1p h5M-F/ !jOMfآR `͹nDŽ ~/ґXV^RUV\MyPVjx94cm[LN5n9w4 46VC0!P(*Uyi `ÇO YD| @@S~>L㵷*~A(@@v1xGq|)0&*I h/O-kSc&2L0#Gtֆ,w6ȵ#$KmCN 'gvD*Q({&:?@ee&Z Y$Yv__RQə@E` Di^p\֤l:f^1jpAw@x旗fRa(W&## sOO]N]VXzaJqʘFp~:AU P#c6?-<'~ Qm(؝ Knte61B1fnc o9S$UlJ"m +3`R'e(n&s @Ũڎ_gtט1Pt^,]u8^W gExKWlW1TFԵ0!f&\S|ȇWox4VZ&8"jLu \^uj=Hdr~TY$m=>E n+,>3 i ^M;g C# NS`c)jY㐴hI؋.# 7vy%kO_&?@2L HDtE1뾟e9niqx':u1\ILDTkԊ1wNȾ07v98(*[pƈ-B+8\\h4`{(`Az0@ uFF?lTb3O6,%hAhʉb$mA@ʑ$hp^0 tX2Aj) Ho%glbShh28v,lK Pei.â`m#`Ed洚!!hp֮‘UP| T"i&)nn,丣R-+i㟷&D0U*[/ˀBG>Y6FntB2⤦/hѴ{Aն4(*WK(ec<+;,QYn*FɔJ^BPF_ 5D@/ ac:umW"e2berXVr(yvY 'N}%-,P_Mc`V誳P 70LL0P%NjW خr9%m8{N34#¼Z'~2 B ?[r {  P3\aCZɡо*Ƙ@%dF)VôuD@Yu>QC: +F a"`hƱcj-a%%6krPjRSUY3Iۣ,H͸IT9BhD(H@% Ya2NvN/ > 4"‚z;8ؒZ+⊣#tPppl18#UZ =(nc k"Á;gnD+ġDb^jHη >.QdzUdge+ h6rb5T H_r\!< GPܟ`F .2`PYnʔ2 .!.rW1tce!a!{g?Bb[i E.E+rҼJk$>N¦SR66@Ux@0 R)1D"tlv5 RFj .BU.Gިb@ 0K l@kD^(9$Oǚ;ЈLiNMCksa @ADEuS"U,)AhY]sDOy?7 3-<eSV ـ BM79䢅@h71,Z >Ֆp%CPPQ@U」'۵JJ2/ ek("tI^Z0rɕR-nA]<* 3*BR Ahq.$P@;0 L\H| Տ EM%t 9ϳW(erok.C@$@@4BB6BXCΎCXC6BC!b  Qlttp|P(xl (p|{{{oBZk{o{g9qN2F{o{oRw9N2Fzk{w{o[kYk{R69qN9gs^,c{{0FpNRF2F1F9g{]zo{J 4)ss5(VqN2F|o0%xY9&7-R1Fw{_NW8{|oswswsw{s1 (RRJssOCCK+V{%)){oszo{spNNpNqNpNqN1F{osw-zo{o99VszoSJ$-------3JVRRR:g{ ${szsA    7-VqNRR{ow ^^( =RRJ1FQJ:gw>ghV|-S JSFPJQJZkw#g~s%+4JQJRF{osw|o{otN8 {}kWCz 4JpNRF{o{o{kozospNRqNVRqJPJ{oZo{ozo^w% 5JRVR=$($($($(QJVVR2FSJ9g{o<>.  , , 1VPJ2FZkw{;>i'CC>PJrN1FZkw{W 92FqNQJQJZkw)=4JQNQJs%RJQJ{os?NC)VRFzos?NFQNQJZg?N%C2FSJ2F|og"C PJSJ{o{o^H=qNRJ[kg 9PJ{o{F<V2F|os]RSJ{os1X1pNw{!- $N{o{!(RQJs{!5J1Fss! )qNs71QJs!7-qNssX1PJww  `` ` ` ``@@ ` `@`71{o{ @@@@  @ @@ `@`@@ ` @  W1zo_k&` @    ``  @ `@@ ` -s[)@ @``   `` @ `@@` `  @` SJs% ` `@ @@    `` @ `@@A  ` `(sw?JK+`@`@@@ `` @   ` ``  @@    `  ` ` @,${s?BC`` `   ``@ @      ` ` @ @ ` H(zo>C ` @@@` BS 1{o?BC @@@   <V2F{o>B\R2F{o?BC    -qN{o{>B`@`@  @``   @`  `   $V1Fs?BB@` `  ``  62JRFZk{1@ ` ``` @` `0W1pNQJs  @    ` @@  5JQNB{1 @@@`@`@@ @@ @` `@`` @5qNB%@@``` @`  @@@ @` ` @2F1FVi'` @ `4JZk[) `  \o8|okp&` W1{o{o9` ` `   (pNqN1F{o)'@``` @@S 9QNRF=@@`  @R =QJqNZk\)@  @    @V2FSFZk}- ` @ `   `@(V2FRJ{okp& @ @ a    ` @ 71VRFw}1@ `` 7-N{o=C @ (RRJs?N `SJ1Fw^iW1qNs{{F"` ` ` ` `` ` ` @@` @`` ` @@`@ @  ` W-pN1Fw?k  ` `  @   @ @ `T 71R1F{f @  @` @` ` @ 5 9QF{k @ `   `  @   ` @ @=1F{g  ` @@`   ` ` @` 91Fw?k` ` @  `    @` `    ` ` =zo{BC `  `@`@```` @9w^h`  @ @ =w^ `W11Fw?BCs 7-s{}1W1zosp"{R}-c[%A%:)%Og%\GOf w!COgoOgs?JhOgOg_NK+Og%%++)?k9`&)_k_k99L/K+;>9[V+BL+1V?J_NhHHG?J?NVCGHGH{F?J^^^b^VK+L/;:^^Z^^9K+i+5sssss;>wxi+>){)&"C"C"C):s99=999" FEMF+@ FGDICF(GDICoSFXLEMF+*@$?? @$\ \DUDh"C*B( !b $$=='% % V0oS66%6*A*A6%66%% % $$AAFEMF+@@4X?A@<0\ \DUD\ \D:(DED:(DEDUD@: $$==_888 % % V,cG66%6*A*A6%% % $$AA( : " FEMF+@ FGDICRp@Arial{D<c0,\e0<J0<c0  E00ݍcG 0  G 0r<(<O0<t dv%    TizKKKAJAwLlCompetition for    % ( Rp@ArialvD<c0,\e0<J0 <c0  E00ݍcG 0  G 0s <(< O0< t dv%    T|KKKAJA LhConsciousness   % ( F(GDICq/FXLEMF+*@$?? @$Dd\DaCh"C*B!b $$==% % V0q.772A2A7% % $$AAFEMF+@@4X?A@<0Dd\DaCDd\D COrD COrDaC@: $$==_888 % % V,e :772A2A% % $$AA( : " FEMF+@ FGDICRp@ArialUD@pial8 <s@ArialArial0  <@0ݍxݍߍ<ȍ< (u0u dv%    TdKKKAJALTLong  % ( Rp@ArialUDs@ArialAr|JtQ|Hm| wJJݍxݍߍȍ< 0ލ  dv<ȍTP %H Hh!dv%    TTKKKAJALP- % ( Rp@ArialUDQ|Hm| wJJݍxݍߍ|JtQ|Hm| xJJލ  dvȍTP 0$ߍh !dv<ȍTx %H Hh!dv%    TlKKKAJALXterm    % ( Rp@ArialD<c0,\e0<J0 <c0  E00ݍcG 0  G 0y <(< O0< t dv%    T KKKAJALhWorking Memory    % ( F(GDIC\BFXLEMF+*@$?? @$HDUUB4(CUժB!b $$==% % V0\B%#%z L0z L0#%#% % $$AAFEMF+@@4X?A@<0HDUUBHDUCMADUCMADUUB@: $$==_888 % % V,P6%#%z L0z L0#% % $$AA( : " FEMF+@ FGDICRp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0y<(<O0<t[ dv%    TiSdKKKAJAiaLpDeclarative Memory    % ( Rp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0d<(<O0<t` dv%    TifwKKKAJAitLt(Sparse Distributed       % ( Rp@ArialED@pial0 <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    TxxKKKAJAL\Memory)  % ( F(GDIC_mFXLEMF+*@$?? @$mDrCd"C8B!b $$==% % V0_m%%:0:0%% % $$AAFEMF+@@4X?A@ <0mDrCmD Cƅ@D Cƅ@DrC@ : $$==_888 % % V,Sa%%:0:0% % $$AA( : " FEMF+@ FGDICRp@ArialD@pial <s@ArialArial0 (<@0ݍxݍލ(<ȍ u0u0 dv%    TmvKKKAJAmLpTransient Episodic      % ( Rp@Arial@D@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0un dv%    TpKKKAJALXMemory  % ( Rp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0d<(<O0<t` dv%    TiKKKAJAiLt(Sparse Distributed       % ( Rp@ArialED@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    TxKKKAJAL\Memory)  % ( F(GDIC-FXLEMF+*@$?? @$ C^Cs5C*B!b $$==% % V0,z z** z % % $$AAFEMF+@ @4X?A@ <0 C^C CCa+DCa+D^C@  : $$==_888 % % V,8z z** % % $$AA( : " FEMF+@ FGDICRp@ArialD@pialH <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    TKKKAJALhWorking Memory    % ( Rp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0s<(<O0<t dv%    TKKKAJA LtPreconscious Buffers       % ( Rp@ArialaD@pialH <s@ArialArial0  <@0ݍxݍލ <ȍ u0u- dv%    T%!KKKAJA% Ld(Workspace)     % ( F(GDICM FXLEMF+*@$?? @$~SDC0`B*B!b $$==% % V0M 44 S: S:4% % $$AAFEMF+@ @4X?A@ <0~SDC~SDD$jiDD$jiDC@  : $$==_888 % % V,A44 S: S:% % $$AA( : " FEMF+@ FGDICRp@ArialLD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0n<(<O0<t dv%    TVKKKAJAV L`Attention    % ( Rp@ArialFD@pial| <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    T|YKKKAJAYL\Codelets   % ( F(GDICeFXLEMF+*@$?? @$C*C,`/C*B!b $$==% % V0e,^,/"/"^,^% % $$AAFEMF+@@4X?A@<0C*CCVCLCVCLC*C@: $$==_888 % % V,Y,^,/"/"^% % $$AA( : " FEMF+@ FGDICRp@ArialWD@pial  <s@ArialArial0  <@0ݍxݍލ <ȍ u0u dv%    TBsKKKAJAB LdPerceptual    % ( Rp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0y<(<O0<to dv%    T!KKKAJA!LpAssociative Memory    % ( Rp@ArialHD@pial  <s@ArialArial0  <@0ݍxݍލ<ȍ u0u dv%    TIKKKAJAI L`(Slip Net)    % ( F(GDIC!WFXLEMF+*@$?? @$\CU5Df"C*B!b $$==% % V0!V W%;W%;  % % $$AAFEMF+@@4X?A@<0\CU5D\CzDCzDCU5D@: $$==_888 % % V,b W%;W%; % % $$AA( : " FEMF+@ FGDICRp@ArialD<c0,\e0<J0<c0  E00ݍcG 0  G 0y<(<O0<tR dv%    T,/KKKAJA,,LpProcedural Memory     % ( Rp@ArialgD@pial <s@ArialArial0  <@0ݍxݍލ<ȍ u0uO dv%    TB1BKKKAJAB? Ld(Scheme Net)    % ( F(GDIC{QFXLEMF+*@$?? @$(CBpDjB*B!b $$==% % V0{Q%))%%% % $$AAFEMF+@@4X?A@<0(CBpD(CBU'DIoCU'DIoCpD@: $$==_888 % % V,oE%))%% % $$AA( : " FEMF+@ FGDICRp@Arial9D@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uG dv%    Tx^oKKKAJAlL\Action   % ( Rp@ArialID@pial <s@ArialArial0  <@0ݍxݍލ<ȍ u0u dv%    TpKKKAJA~ L`Selection    % ( Rp@ArialmD<c0,\e0<J0 <c0  E00ݍcG 0  G 0) <(< O0< tv dv%    TKKKAJALh(Behavior Net)     % ( F(GDICTaiFEMF+*@$??@ʱ?Ad=^@ A?( X@XXX5@, JC CJC*C@( !b $$==_888% '%  ;6X46X4=Y$^_=<?T`h % % $$AA( " FEMF+@ FGDICF(GDICFEMF+*@$??@ʱ?Ad=^@ A?( X@XXX@, LCU5CC*~C@!b $$==_888% %  ;6o X4qw}"(6,X4*$='CY$o=<? % % $$AA( " FEMF+@ FGDICF(GDIC#TFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT*:KKKAJA8LP2 % ( Rp@Arial:D<c0,\e0<J0<c0  E00ݍcG 0  G 0t<(<O0<tL dv%    Tx=MKKKAJAKL\Percept   % ( F(GDICeFEMF+*@$??@ʱ?Ad=^@ A?( X@XXX@, `DaC#&DUC?@!b $$==_888% %  ;R&6d) X4g) n) s) x) z) v) 6d&X4a&Z&U&P&N&R&=) Y$)z ) =<?c % % $$AA( " FEMF+@ FGDICF(GDICw+sFEMF+*@$??@ʱ?Ad=^@ A?( X@XXXC@, DC@*DrC@!b $$==_888% %  ;'6c*X4g*f*a*\*U*R*6n'X4j'k'p'u'|''=n*EY$**=<?u)o % % $$AA( " FEMF+@ FGDICF(GDICL~FGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTahKKKAJAaLP3 % ( Rp@Arial!D<c0,\e0<J0<c0  E00ݍcG 0  G 0e<(<O0<t dv%    T`WqKKKAJAWLTCue  % ( F(GDIC^2cFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTr9yIKKKAJArGLP3 % ( Rp@Arial!D<c0,\e0<J0<c0  E00ݍcG 0  G 0e<(<O0<t dv%    T`iL\KKKAJAiZLTCue  % ( F(GDICkFEMF+*@$??@ʱ?Ad=^@ A?( X@XXX @, ADB iD^C@!b $$==_888% %  ;i06: X4: : : : 9 9 6\0X4W0V0Y0]0d0i0=9c Y$:: 9 =<?i % % $$AA( " FEMF+@ FGDICF(GDIC&FEMF+*@$??@ʱ?Ad=^@ A?( X@XXXC@, @DUUC'iDC@!b $$==_888% %  ;,06':X4,:3:6:::9:4:690 X440-0*0 &0'0,0=9Y$l:&:<=<?* % % $$AA( " FEMF+@ FGDICF(GDICQkFGDICRp@ArialD@pial$ <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTsKKKAJALP3 % ( Rp@Arial.D@pial$ <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    TpsKKKAJAsLXLocal   % ( Rp@Arial[D<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0s <(< O0< t  dv%    T\KKKAJA\ LdAssociations  % ( F(GDIC#cfFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT)*0:KKKAJA)8LP3 % ( Rp@Arial.D@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    Tp=@MKKKAJAKLXLocal   % ( Rp@Arial[D<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0s <(< O0< t  dv%    TOV_KKKAJA] LdAssociations  % ( F(GDICt FEMF+*@$??@ ʱ?Ad=^@ A?( X@XXX@!, a+D*CDd\D*C@! !b $$==_888% %  ;*66X46666$6)6)6*)X4*)*$****=6Y$76`=<?s % % $$AA( " FEMF+@ FGDICF(GDICKFGDICRp@ArialD@pial\ <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTKKKAJALP3 % ( Rp@ArialND<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0r<(<O0<t dv%    T>KKKAJA L`Copy Over    % ( F(GDIC,FEMF+*@$??@"ʱ?Ad=^@ A?( X@XXX@#, #jiDUCvDUC@#"!b $$==_888% %  ;I:6=@X4=:=7=9=;=B=G6]:X4[:U:O:I:F:I:=>=aY$===<?. % % $$AA( " FEMF+@ FGDICF(GDICunFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTuKKKAJALP4 % ( Rp@Arial9D<c0,\e0<J0<c0  E00ݍcG 0  G 0t<(<O0<tG dv%    TxKKKAJAL\Look At   % ( F(GDIC/VFEMF+*@$??@$ʱ?Ad=^@ A?( X@XXX@%, vDUC,wDUD@%$!b $$==_888% %  ;=6=$X4=$=$=$=$=$=$6=X4=======>$Y$=6%=$=<?-U % % $$AA( " FEMF+@ FGDICF(GDIC.FGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TTKKKAJALP4 % ( Rp@ArialHD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0s <(< O0< t dv%    T!KKKAJA L`Coalitions    % ( F(GDICwpFEMF+*@$??@&ʱ?Ad=^@ A?( X@XXXE@', X[DD;DTD@'&!b $$==_888% %  ;6'6+/'X4$/'/'/'/'$/'*/'66'X46'6'6'6'6'6'=d/(Y$.'b/'=<?wq % % $$AA( " FEMF+@ FGDICF(GDICzeFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT8?KKKAJA8LP4 % ( Rp@ArialAD<c0,\e0<J0<c0  E0 0ݍcG 0  G 0g<(<O0<tt dv%    T|XKKKAJAL\Winning   % ( Rp@ArialAD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0n<(<O0<tu dv%    TXKKKAJA L`Coalition    % ( F(GDIC!xFEMF+*@$??@(X@Ad @ A?( ?@@@), rDU DLC D@)(( !b $$==_888% '%  [L(x F'B(#"d'(F'B(M#"""M# % % $$AA( " FEMF+@ FGDICF(GDICAGFGDICRp@ArialD@pial <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT KKKAJALP5 % ( Rp@ArialMD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0s<(<O0<t dv%    T4.KKKAJA, L`Conscious   % ( Rp@ArialJD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0t<(<O0<t dv%    T03@KKKAJA> L`Broadcast   % ( F(GDICU|FEMF+*@$??@*ʱ?Ad=^@ A?( X@XXXn@+, 5CzD8nCVUD@+*( !b $$==_888% '%  ;b%6''X4!''~'x'r'"p'6L%X4K%N%T%Z%`%b%=k'Y$'K-'=<?S}} % % $$AA( " FEMF+@ FGDICF(GDICbFGDICRp@ArialD@pial! <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    T`6jIzKKKAJA6xLT6,7 % ( Rp@ArialtDd<X0dgV00ݍ2`0D , dv%    T|{KKKAJALtInstantiate, bind,     % ( Rp@Arial{D@pial! <s@ArialArial0  <@0ݍxݍލ <ȍ u0u dv%    TyKKKAJALlactivate schemes  % ( F(GDICeFGDICRp@Arial)D@pial' <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    TlKKKAJALX8 & 9  % ( Rp@ArialoD@pial' <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    T|KKKAJA|LlAction Selected    % ( Rp@ArialOD@pial' <s@ArialArial0  <@0ݍxݍލ<ȍ u0u dv%    TKKKAJA L`And Taken    % ( Rp@ArialD<c0,(e0(<J0<c0  E00ݍcG 0  G 0)<(<(O0<t  dv%    TpKKKAJAp L`(behavior    % ( Rp@ArialDJ0<c0 |@tQ|Hm| EHHݍcG 0  G 0)<(<(0ލ  dv<(T"%H Hh!dv%    T|KKKAJAL\codelets   % ( Rp@ArialDQ|Hm| EHHݍcG 0  G 0|@tQ|Hm| FHHލ  dv<(T"0$ߍh !dv<(TT"%H Hh!dv%    TTKKKAJALP) % ( F(GDICbFEMF+*@$??@,ʱ?Ad=^@ A?( X@XXX@-, %D+D%D Cz@-,( !b $$==_888% '%  ;h)&6R)X4R)W)|])|c)|h)h)6~)&X4~) &y)&s)&m)&h) &h)&=)Y$]):)=<?c % % $$AA( " FEMF+@ FGDICF(GDIC|bFEMF+*@$??@.ʱ?Ad=^@ A?( X@XXX@/, D+DLCUUC@/.!b $$==_888% %  ;' &6OCX4K>K7P3T/[/_36'%X4'&'&' &'&'&' &=NY$"5=<?}c % % $$AA( " FEMF+@ FGDICF(GDICP|FEMF+*@$??@0ʱ?Ad=^@ A?( X@XXX@1, D*DNCzD@10!b $$==_888% %  ;'*6>|%X48z%5t%8n%:h%@e%Fg%6'*X4'*'*'*'*'*'*=`%Y$W%F%=<?R} % % $$AA( " FEMF+@ FGDICF(GDICSbFEMF+*@$??@2ʱ?Ad=^@ A?( X@XXX@3, '1D+D~SD[C@32!b $$==_888% %  ;;,%64X44444446J, &X4E,&>,&:, &6,&6,%;,%=H4Y$44=<?Oc % % $$AA( " FEMF+@ FGDICF(GDICfGFGDICRp@ArialQD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0l <(< O0< t dv%    TX.KKKAJA, LdAttentional    % ( Rp@ArialAD@pial( <s@ArialArial0 <@0ݍxݍލ<ȍ u0ut dv%    T|0P@KKKAJA>L\Learning    % ( F(GDICFGDICRp@ArialCD<c0,\e0<J0<c0  E0 0ݍcG 0  G 0c<(<O0<t dv%    TKKKAJA L`Episodic   % ( Rp@ArialAD<c0,\e0<J0<c0  E0 0ݍcG 0  G 0g<(<O0<tt dv%    T|KKKAJAL\Learning    % ( F(GDICFGDICRp@ArialRD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0l <(< O0< t dv%    T'rKKKAJA' LdPerceptual    % ( Rp@ArialAD@pial, <s@ArialArial0 <@0ݍxݍލ<ȍ u0ut dv%    T|0j KKKAJA0 L\Learning    % ( F(GDICxFGDICRp@ArialSD<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0l <(< O0< t dv%    TKKKAJA LdProcedural    % ( Rp@ArialAD@pial. <s@ArialArial0 <@0ݍxݍލ<ȍ u0ut dv%    T|KKKAJAL\Learning    % ( F(GDICaFEMF+*@$??@4ʱ?Ad=^@ A?( X@XXX33@5, mDU5CLCU5C@54( !b $$==_88833% '33%  ;%6oX4idddio6%X4&&&&&%=Y$"\=<?b % % $$AA( " FEMF+@ FGDICF(GDIC^k^lFEMF+*@$??@6ʱ?Ad=^@ A?( X@XXX33@7, HDBDC*C@76!b $$==_88833% %  ;%6n/X4j3c3^/Z+Z$^6%X4%%%%%%=/Y$0^_=<?ai_h % % $$AA( " FEMF+@ FGDICF(GDICFGDICRp@Arial>D<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0t<(<O0<tc dv%    33T KKKAJA L`Interpret  % ( F(GDIC~@FGDICRp@Arial>D<c0,\e0<J0 <c0  E0 0ݍcG 0  G 0t<(<O0<tc dv%    33T3KKKAJA L`Interpret  % ( F(GDICFGDICRp@Arial]D<c0,(e0(<J0 <c0  E0 0ݍcG 0  G 0e <(<( O0< t dv%    33TX%7KKKAJA%LPRe  % ( Rp@Arial]DJ0 <c0 |@tQ|Hm| HHݍcG 0  G 0e<(<( 0ލ  dv <(T} %H Hh!dv%    33TT8<KKKAJA8LP- % ( Rp@Arial]DQ|Hm| HHݍcG 0  G 0|@tQ|Hm| HHލ  dv<(T} 0$ߍh !dv <(T,} %H Hh!dv%    33T={KKKAJA= L`afference % ( F(GDICvF(EMF+*@$??@8ʱ?A@@@d=^@ A?( X@XXXO@9, '1DǡC'1DUCb@98( !b $$==_888% '%  ;7,M67, X47,<,B,I,N,N, 6N,MX4N,SI,XB,X<,X7,S7,M=7,67,nX47,h<,cB,cI,cN,hN,n6N,X4N,I,B,<,7,7,=7,67,X47,<,B,I,N,N,6N,X4N,I,!B,!<,!7,7,=7,z67,7X47,1<,,B,,I,,N,1N,76N,zX4N,I,B,<,7,7,z=7,67,X47,<,B,I,N,N,6N,X4N,I,B,<,7,7,=7,C67,X47,<,B,I,N,N,6N,CX4N,II,NB,N<,N7,I7,C=7,67,eX47,^<,YB,YI,YN,^N,e6N,X4N,I,B,<,7,7,=7, 67,X47,<,B,I,N,N,6N, X4N,I,B,<,7,7, =7,p67,-X47,'<,"B,"I,"N,'N,-6N,pX4N,vI,{B,{<,{7,v7,p=7,67,X47,<,B,I,N,N,6N,X4N,I,B,<,7,7,=7,967,X47,<,B,I,N,N,6N,9X4N,?I,DB,D<,D7,?7,9=7,67,[X47,U<,PB,PI,PN,UN,[6N,X4N,I,B,<,7,7,=7,67,X47,<,B,I,N,N,6N,X4N,I, B, <, 7,7,=7,f67,$X47,<,B,I,N,N,$6N,fX4N,lI,qB,q<,q7,l7,f=7,67,X47,<,}B,}I,}N,N,6N,X4N,I,B,<,7,7,=7,/67, X47, <, B, I, N, N, 6N,/X4N,5I,:B,:<,:7,57,/=7, 67,Q X47,K <,F B,F I,F N,K N,Q 6N, X4N, I, B, <, 7, 7, =7, 67, X47, <, B, I, N, N, 6N, X4N, I, B, <, 7, 7, =7,\ 67, X47, <, B, I, N, N, 6N,\ X4N,c I,h B,h <,h 7,c 7,\ =7, 67,~ X47,x <,s B,s I,s N,x N,~ 6N, X4N, I, B, <, 7, 7, =7,% 67, X47, <, B, I, N, N, 6N,% X4N,+ I,0 B,0 <,0 7,+ 7,% =7, 67,G X47,A <,< B,< I,< N,A N,G 6N, X4N, I, B, <, 7, 7, =7, 67, X47, <, B, I, N, N, 6N, X4N, I, B, <, 7, 7, =, Y$B,z , =<?w % % $$AA( " FEMF+@ FGDICF(GDIC0FGDICRp@ArialbD<c0,\e0<J0 <c0  E00ݍcG 0  G 0n <(< O0< t4 dv%    T#KKKAJA LhConsolidation    % ( F(GDIC=SFEMF+*@$??@:ʱ?Ad=^@ A?( X@XXXC33@;, ͗fCpDʱ?Ad=^@ A?( X@XXX@?, >KCpDt CUCC@?>( !b $$==_888% '%  ; %6oX4igjmty6 %X4 % !% % % % %=BY$/=<?T % % $$AA( " FEMF+@ FGDICF(GDIC61F(GDIC61FXLEMF+*@$?? @$;hCHBXEBTUB( !b $$=='% % V061eee% % $$AAFEMF+@@4X?A@<0;hCHB;hC CC CCHB@: $$==_888 % % V,*%ee% % $$AA( : " FEMF+@ FGDICF(GDIC=7FXLEMF+*@$?? @$~C8^BBr\B!b $$==% % V0=7qqq% % $$AA" FEMF+@ FGDICRp@Arial,B 0,\, :  0-0- wS0ލg0-u0S0I00-_0ȍ 0ݍ0@pial& : sdv%    TH>OKKKAJAHL L`Sensors &     % ( Rp@Arial ,B0,\, : 0-0- wS0ލg0-u0S0I00-_0ȍ 0ݍ0@piale : sdv%    THPaKKKAJAH^ L`Primitive    % ( Rp@Arial,B0,\, : 0-0- wS0ލg0-u0S0I00-_0ȍ 0ݍ0@piale : sdv%    TxHc~tKKKAJAHqL\Feature    % ( Rp@Arial,B&0,\, : &0-0- wS0ލg0-u0S0I00-_0ȍ 0ݍ0@pials : sdv%    THuKKKAJAH L`Detectors    % ( FGDICF(GDIC*FpidiEMF+*@$??@hhJFIFHH ExifMM*bj(1r2iGGAdobe Photoshop CS Windows2006:01:23 13:15:36v&(. HHJFIFHH Adobe_CMAdobed            v" ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RI$I%)$IJI$RI$I%?TI%)$IJI$RPn\=׭䶌l^ߤK,-O؝JZkOHoݙYVwCmf=keMέq(؇"w??yIg}J?!Ȥ3a9=cvIv{R`H7TGV {L96ub;&ꕜ|loǵaL$kv6$MJI$TI%)$IJT.}eqcZkWVfO\@">Y&05[x te ClαN7Z]]U]nCNCqsC.=͖?zq;jjNIqnɦqq-vmՒk-xKK?Jrq,sm:1[6okX>Mzė'9XA<\C3.>=FZ֯( ݸ}Ogхݧ_F헨@כXM@zo~gLPqE.fn ]{ccZ9&,la">oo"D #Qս^WrKCjZ]Yc̚\ n5:ѾU kg4]nCdes3g ̆I$eTI%)$IJY};Oj,CD6͹8zw__sj\{HyK8y6EdcٳVUr:Yk67M&-94X'U:dw~U~6E=/u kɿ.rs;~~ [mMgfWQz_Շӡ:DclwJuKrku5r YukޫϠO]W' :q/%I ~?6v4]/wkukS*DΧ 2ݏW)ciki*ŃM+f ]NCqJp/n=W>eMĶ`)k@vC7vbVӺT^rz~i{f ~Oۻ{]BF+,."ErRu.͛?Cg%n>,XlQl[.}x5+)dioEj]o =b;;oT+xߤk=ޝ,qe,fm>ԏM+Һ-אs}mv]OSulpڞS}/fͥ='{ltާ`ٱ(q<>wQ)XaF{-:7Fdb2[+s^}Rz>ޟF_އ&5I%aTI%)$IJT:{n'ets6ڟدMyEuV%\%NdMỎ wy޹3z&[1ʫ}V_f9cs,mWv9Wr2Nee,$ϲ[s}_OkV]"hݳ%V4&Q=s"}]n%$nVK= ,}{??#%kLEɲ[Y33~%lo~=t9lTUV}65On?l{pE̢]o?" jWevVn yt>^ SCklg&؝ h_N&1}bvV%̬5k/g{TYbca?s6YwzKKGf^.qws7jqL1\~~-}֙s 2~e{I($6ORʤI?TI%)$IJI$RI$I%)bԀ4+cCKIԶ}'?-#c}"bljIm,m`HhڊIRI$I$Tʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$Photoshop 3.08BIM%8BIMGG8BIM&?8BIM x8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM8BIM8BIM@@8BIM8BIMIv Untitled-1vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlongslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlongurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM v JFIFHH Adobe_CMAdobed            v" ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RI$I%)$IJI$RI$I%?TI%)$IJI$RPn\=׭䶌l^ߤK,-O؝JZkOHoݙYVwCmf=keMέq(؇"w??yIg}J?!Ȥ3a9=cvIv{R`H7TGV {L96ub;&ꕜ|loǵaL$kv6$MJI$TI%)$IJT.}eqcZkWVfO\@">Y&05[x te ClαN7Z]]U]nCNCqsC.=͖?zq;jjNIqnɦqq-vmՒk-xKK?Jrq,sm:1[6okX>Mzė'9XA<\C3.>=FZ֯( ݸ}Ogхݧ_F헨@כXM@zo~gLPqE.fn ]{ccZ9&,la">oo"D #Qս^WrKCjZ]Yc̚\ n5:ѾU kg4]nCdes3g ̆I$eTI%)$IJY};Oj,CD6͹8zw__sj\{HyK8y6EdcٳVUr:Yk67M&-94X'U:dw~U~6E=/u kɿ.rs;~~ [mMgfWQz_Շӡ:DclwJuKrku5r YukޫϠO]W' :q/%I ~?6v4]/wkukS*DΧ 2ݏW)ciki*ŃM+f ]NCqJp/n=W>eMĶ`)k@vC7vbVӺT^rz~i{f ~Oۻ{]BF+,."ErRu.͛?Cg%n>,XlQl[.}x5+)dioEj]o =b;;oT+xߤk=ޝ,qe,fm>ԏM+Һ-אs}mv]OSulpڞS}/fͥ='{ltާ`ٱ(q<>wQ)XaF{-:7Fdb2[+s^}Rz>ޟF_އ&5I%aTI%)$IJT:{n'ets6ڟدMyEuV%\%NdMỎ wy޹3z&[1ʫ}V_f9cs,mWv9Wr2Nee,$ϲ[s}_OkV]"hݳ%V4&Q=s"}]n%$nVK= ,}{??#%kLEɲ[Y33~%lo~=t9lTUV}65On?l{pE̢]o?" jWevVn yt>^ SCklg&؝ h_N&1}bvV%̬5k/g{TYbca?s6YwzKKGf^.qws7jqL1\~~-}֙s 2~e{I($6ORʤI?TI%)$IJI$RI$I%)bԀ4+cCKIԶ}'?-#c}"bljIm,m`HhڊIRI$I$Tʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$8BIM!SAdobe PhotoshopAdobe Photoshop CS8BIMhttp://ns.adobe.com/xap/1.0/ 1 143 118 1 71/1 71/1 2 2006-01-23T13:15:36-06:00 2006-01-23T13:15:36-06:00 2006-01-23T13:15:36-06:00 Adobe Photoshop CS Windows adobe:docid:photoshop:fc061859-8c43-11da-bf09-84bce6b9046d image/jpeg XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Km&Adobed@ v  0P@!1#34"$6 !"01A2#QP @qBR6vC$% !10AQa"q2BPR#3 @rc5b$t!1AQ0aq P@ so8VxOO۴,` JmYiaarM}Ca{\c4iћ ptO{?>jN8M-S>iv%@o.~^OlZ DcF2d?9Qw׿l;6~?:>ە/ldĖ{Wv|l|uq1y&%26އt\~}}r||yeՎ.3OseLy6xZ-h$fre$HWsVگ"Gz#jfҟٖq7$y(<ЗLi뿴'mMv)ZiH%nt cknk8hXNKTʑvU4?ҟiXXURYJaDgYٰ V)eRNKpM_.; ~Aoo9,K=sasi2S1V9pǎfEgKqǸͺJ/Y&T##>~1##'Qc{JgË/C(lpCZH'ě FAy÷sX`p"+y7\L75j.u&keEI3}0J?KK Ap285"b=s:tlz3hwn]+(e!)Ӓ o#ޗĎW= zC!:l*0tչ͈]$|vwh *%IS@v*S&5xEg8CML"*~2e3vΉSFi`Iȃ&nϡQndk8g:E H@ kWX9_JTqOZ "e+yE@_0ҹGWU";iqul̀ja?$)x1\հ1D0"e:K(>ȁ?L%:5u|f?ڝw kxRrU4+A!_[oǩ F=w#T*LE7< ֊wo/b+q!&Q !H(vHD86*Rt Eڧu虶O>*Wô+\CBd0tAn}6Oۨ/Th׻7]ڐe1XG*Ө[0FnC5 [!.",(2Y18pʣSj1,@*'}u4Q9k& 8e3Yģ,c0NxB  '0F9" mΚyc)7rg*X&!؜)9ަ+\S!==QPlfhPd[Va829qߧNΧy$D,?hi굵Bk`C:4_s>fSg]éamF ȃ qlAݕ/x0 ZK TX7Kuu\\ p_RDk@kZ=Iڦ)Tގn}m4Y8KklkD' +Zch ./5 x?#iDzt{'BDdv\'ZNE6CtК8Hk9QvIhn8z*z8_Qȼ9#{Rχ?$='.c.xi}4VR@EXi=$R2$ak? 3CX)Jj.S7vU5닆4=47ːr[k"Ԛ/a >EYØ)ky4oyX zzK+T9m A/ H[ DppEN$Ґ/ܽ0-'򩋭4?9(ڊGi*ߘr7['a;B3)Z֢U엔% )ݺ*^I^!N3w'u/Pgĺ/PgĺO39;D16[cDi\^|魲BoSeT`3u!jꯖ5S]jtIVܑ3klwr]?_d5DxZX@/9f6X'5\tnebc*U6iNn_$Ēި cNhxUE!rQQ[u H+#ؓ+ @UyHօ}MUw5ݶF3_z5~-m07_k[%G 66ϙЖ;)wSڪiS1K18Kess"[Κ9Ml@ィ[ Cm2I&؎]蘉(0" or;5}Cafc I!$|b]ȩcc3D"_ mstz/Qzm$Ē!ly|LbMmX9SeMW0i|77__U*a#ysgJ}Wi }NU^Ү]u`Y2}J)r ȣi6hܣW"u3/5u#*͒019wy66#:I]Ѩ&¹s#YF <5ףBh{7qËxI gTd 3,G#0Ս(7Ufc%cS),vkT@7/GAȌW$:U=\+5VRetVh+r+UMӷROSN;:LlӹC,d){"^$ _ՙ f?'HGjp'g"^(䙥&=^Sz4Z:p!TWwuj0R=vb,iP3>*Ai%=3r1<Ȫc@oy JI9OGŠLUGɅ,`4vn9`cGFT[}J5zA<,ӌO:[? ̤ŴSc4ؑ,$pcXҚѵf۵{U:3 mݭm|`QK5q[R.Q}r&Q%d7#@TGdP8qma̓&bY|:该C ժߧN o˧fx# \ݑUSK>Xnx#aFo5jáڢyƎx{WAKF7y.-}ƛ$ݐH@<{uU2͖ $/r9{ۤ:"'zsQEcX+htibBgz"4s)|zFO9QhkZXh?e)o:&R.:z)UI E2xK }(2_|^+8T0}>*GFV&9* j${9PM_q]~\>>`Z| :2P S>;uj`n(MWϚ:y<~AQ3cmuk**ߢRihP2gq?*BbKƈ[iʫ.;p@(+Ύ ! 5M'a`4bD=ъa)>P1@.=!@0f.OB2g%}`vˤDr'cf"Tr4ԯq/S9Xa `*>\-oTjM_.@@ "Rio?!p0ZQq/'xy>P>8$AzMzH~5٫Eu "9bϟ/?Gճf~M5f:=A |$L KQb!%>00n?Þ'YI~N~9`,oԊg#G,F'TFq}lIElsif0~iYl}-I0@om!T N x_T>bD0 x!4%B4^i A2nma_ A"KYy:*cUyu%(<yKt!3Q/iBW!\P нNBH>J.W.':Tȸ0EG Sb-E\]j//2Qt ǡ@v-IQ Jq @(Bq“~w`vh=B4L]fů"ߌ"0#cx YKpwqPP"DkH¸50 ec(XR7] W KE$?r\ǝ0Wl%{4ӉF?2g3ҊT T ([H.A9+M\U)!"`4L"vs>r )`8eL9b$LOk!3Z`(7%`P1Җ1Yp"y[BJ ]Z\͢ ·|2 0cRUx(@a8J$KC_gbA@lR 0X`sL l369D@΅" )RWl!XH^R{SEQvf0DwlQDa-RB+aH"RRQ@) + fJT+$D2#~>DTȤUTE` B2=%‰LivO#<5:tMY%@|l d2( "g$41*)@I: x.@M/cIRdD Dr(*ddH H ڛ1!a>g0^W2Dr:61Ѵ&(Q72JtԸTRp#Ŝ,LقDAFD7r0#@W(VY:‹b* %8L]eUzI1E&οK@$@@4CB-BVUArCVUA-B6C!b  Q8++vP(x (vwzo{oo|o=ZSF2FRF{o^>QJ1FB?cs_!9qNBw^>sgqRBZFscz qN1F{8F>wc QJqN9g1>sg qJPJZkVBwo?WxRzo{s-wgkS6RSJ{k{o{]%skgk8=VRF{ooJNogkok=qNSJZk{o{{o9g9g9gw{Zkkgksk=QJqNZkw{{s{w{{wVZZZRsN1FRJ1FRJsN^s{9gRkgkgkgkkk=QJqJ0F1F{ow{zoqNQJQJ9=9=9=9=9=999==B6FR)gokgkkkgkgg>==SJqNqN1F{o{>g8Ft)T)t17->Fsogkgkgkgkgggk?8u11FQNQJ{o{o{ozkw5^_!__!^>sswswswswswswswswokgkgkkgkkgkgkgwsN~16PJVVVQJSJ2F:kw{oZkxBssswskgkgggkgkgkgkgkgkgggkgkgggkgkgkgggkkoBxXxx9RQF1FQJF:g{s>ZFsgkgkkkgkkkgkkkgkkkgkgkgkgkgkkkgkgkgkgkkkkkgwNFBR9x1FqNQJqNpJo{1[%_>SogkgkgggggkgkgkgkgggkgkgggkgkgkgkgkgkgkgkgkgkgoookcS | 9qNRF[o{^_Fcgkkgkgkgkgkgkgkgkgkkkgkkkgkgkgkgkgkkkgkgkgkgkkkgkgkkkgkco-VSFZk{Z?BkkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkoRW 1FQJRJZkwXJ?BokgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkwR8qNQJqN9g>>BkkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkN2F1Fw9ksggkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkkk?SF9qNqJYk9kkkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgok1F1F{ow{_Fwkgkgkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkgkgk?WxRSJ{o}-kkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgk89QJ{o})ggkkkgkgkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkksRxV2F{o_k_ggkgkgkgkgkgkgkgkgkgkgkgkkggkgkgggkgkgkgkgkgkgkgkgkgggkgkgkgkgggkgggkgoBxRSJs~-cogkkkkkgkgkgkgkgkgkgkgkgkkkgkgkkkkkgkkggkgkgkkkgkkkgkkkgkgkgkgkgkkggkgk-u-N{o{R_gogkgk__[__gccgk_ggggcgkgccgckgggZWF[gkccgk_kgcckccgk_ggk[NJ_gcckgcgk_NJks-V1FsRRokgk[d 16osB)%ogBooOFsg-6[ZWoos>J)Nc!tBwOs{W9SotBwsBotB J)j)J)cs>s9Soo)J)cw_>61FRJwVZsgggg_c cswkoR>J)okBsk6B6gg-2_ZWkZWZW9S_!BsOsYSSoS:ssFZWZWoc%>wSsZWZWskg^4%PJ{k%wgkkk_ cwsoos>J)ogsBw[NOo-:[ZWwJckkkF)%BwOszW9Sks>wwF9S%k%)6[W!Fw9SwZW8Sogks_!T)qNzoRckkggg[B %)-FoS>%soBss>k%6g-6_ZWs9Sc ckc9S!Fs9SwZWZWsR>ssFZWc 6s>R:J)%Bs9SsZW9Sskgw?T)QJ1Fws>!kgkgk_6sBr>Oos>c FF OoBwO_)16_)%s>ZW)%zWk%-c{W-!s_c %Sk-BNB8Sgk%-cs>c ZW-oFB-Bgkw_!T)qN0B{s])sgkgkg[c _kkgkZWBR>(!R>g_s>ckcs>[JNcs>9SR>[W_6)%6cgFB)%ZWo_BF))ZWr> %r>kgc6)%)_cFB-k%ZWkB"%r>ggko91J{9wkkgkkk[ 6s>6NgkgkgkgkkggkgkBJokgkgkgkgkgkkkgkgkgkgkgkgkgkgkgkgkkkkkgoZW8Ookkgw=1FsggkggggsB66-BkgggkgkgkgkgggNJogkgkgkgkgkggkggkgkgkgkgkgkgkgkgkgkgkgkgcOcgkgks9QJw[Fogkkkkkkwswswgkkkgkgkgkgkgkookkgkgkkkgkkkgkgkgkgkgkgkgkgkgkgkgkkggkgkgokggkkw=1F{])sgkgkgokkgogkgo__kkgooggogkkkgkgkkokooogkkokgg[_gkc[gkokkgkkogkoggg[okokogkgks91F{1okgkgk61:sF-kgo6)gZWk%_o1:-wo(!Okgkg-FzWl%cg-6w[!s>s1:))J[%_o_)OoN)s[W %l%)%F_k%_gkgw91F>ogggkg%k%wS> !goBZSck%:ZW[o-*%skc Ogkgk_J)){F_o)%-ss>ckB[k__O_k_JsBk%(!gcs>ZW[ogks9RJ{1gkkgkkkl%%ss>)%ks)k%koFN_k-%woOkgkkkk%:sFco)))wr>)ow%!FFF_J [o[JwFsBBO %s>{[_okgw=1Fw1ckgkgkg-)R>)%swl%%kwFO!cs)%sOgkggc%6sF)%gok%-ss>k%ws%%k%Ngs_9SsNssF)%%s>[[oggs9sw1ggkkkgc!ZW:c s>ZWJNZW!6ZWBs>[ !z[ZWBZWkgkgg%1:sFBF[6s-!J[N!_ok%-ZWB-9S9Sd%c-s_ZWkSFZW_okgw9{1ckgkgk[c s>B6S>6_F!!6o[-6!k%F)6kgggkg%6sYS-6 k%cc(!b %FssB)%)%-c[-s>6O606k%Jo[-)%)%6oO[oggs9{1ggkgkkkk%)%ccgkckg_[kgkgg[coc[kkkgkgzW!)%_kgc[coo6)%_coo[_cogkkcckk_[kgkc_[ksO_oks1T)RJ{1ckgkgko[WJkgkgkgggkgkgkgkgkgggkggS>%!FskgkgggZWJogkgkgkgkgggkgkgkgkgkgkgoO![kgs^u)PJ{1ggkkkgkgkZWcgkgkgkgkgkgkgkgkkkgkkkgoookkkggkkkgogkgkkkgkkkgkgkgkkkgkgkgkgg[kgks_!T)qNs1ckgkgkgkgkgkgkgkgggkkocgsogokggkoksogokogsskoocsskgwkokcoskkso_sgkgkgkgggkgkgw^T)zo1ggkgkkkgkgkkkgkgkkkgN!!!)coSJ)%ZWJs>k0:[oNs>ckBNszWJ)J--1:[o6_k06-69SksB*%-ggkgkkkkkgkgks_!T)w1cggkgggkgkgkgkgkgkgc)6NOk%%s!k%9Sc-kB9Ss6cg!)k%)%S06!ZWsBOOc FJc 6kFFO!6ogggkgkgkgkgs^T-zo1gkkgkgkkkgkkkgkkkgkkcoosOcBow-I%oSws>)%ckl%0:s>wZWZWw[WsBoo)%s>oo_O06okgkgkgkgkgw_:6!zow1ckgggkgkgkgkgkgggkgkg_J6%sBos-)%oZWsB)%gg%2s>o9SZWsZWBkk%R:sS>c J)s>gkgkgkgkgkgks-{o1ggkgkkkgkkkgkkkgkgkoNsBco1:_o-)%oBs>w6 ZWc1:6oOZWwZWBgo!s>o-w[_gkgkkkgkkkgw_>zo}-kkgkgggkgkgkgkgkgkgg-kwssZSB-_B6o !%)k%6k%[sk%BoZWk%_sZWN)%kg-FwF!k%)%Fogkgkgkgggkg}-Zs[kkgkgkkkgkkkgkgkgko-wszWBc16ZWgSNgccJNo[J[oocckg_coOc_gkcckoZWB8Sgkkkkgkkgkko>Xs]-ogkgkgkgkgkgkgkgkgoZS%16s6Ooos>2kkoookooogggkgggkkNokkgkgkgokogggkkkgkgkgoBxzo}-skgkkkgkkkgkkkgkgkgkc_[_ckgkgkccgkgkgkkkgkkkkkgkkkNckkgkgkgkkkgkkkgkkkgkkk?S){o>kokgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgggkgkgkgks?W}1])okgkkkgkkkkkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkgkgkkkgkkkgkgkgkgksFZoZR?WskgkgggkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgksgR_k_kR?WkkgkgkgkgkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkgkgkgkgkgkgkkksoR?B?cogkgggkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgggkgkgks_gRV1{?SgoogkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkgkgoooggR99VRBookgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgkgggkgkswcFk9R?>?BVFwkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkkkgkgkgksws1BRRV^Rgwswskgkgkgggggkgkgkgkgkgkgkgkgkgkgkgkgkgkggsw_>^_FZbZ91wooogkgkkkgkkkgkkkgkkkgkkkgkgkkoooooooo9_kss{o1}119cgcgcgcgcgcgcgcgcgcgcgcgkZ}1111}11}19{95111111151115111511151115s" FEMF+@ FGDICF(GDIC\FEMF+*@$??@ʱ?Ad=^@ A?( X@XXXC@, 0CC0CC@( !b $$==_888% '%  ; 6 &X4      &6 X4      = ^Y$ G ^=<?\ % % $$AA( " FEMF+@ FGDICF(GDICJUNFEMF+*@$??@D8X?A@, DBj D<BVժC@!b $$==_888% % W$ISN(S% % $$AA( " FEMF+@ FGDICF(GDICL}FEMF+*@$??@D8X?A@ , (CBj DCBj D@ !b $$==_888% % W$J}((% % $$AA( " FEMF+@ FGDICF(GDICNFGDICRp@Arial)D@pial; <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    Tl;]KKKAJA;LX8 & 9  % ( Rp@ArialoD@pial; <s@ArialArial0 <@0ݍxݍލ<ȍ u0u dv%    T"KKKAJA LlAction Selected    % ( Rp@ArialOD@pial; <s@ArialArial0  <@0ݍxݍލ<ȍ u0u dv%    T(%p5KKKAJA(3 L`And Taken    % ( Rp@ArialD<c0,(e0(<J0<c0  E00ݍcG 0  G 0)<(<(O0<t  dv%    T 7NGKKKAJA E L`(behavior    % ( Rp@ArialDJ0<c0 |@tQ|Hm| RHHݍcG 0  G 0)<(<(0ލ  dv<(T("%H Hh!dv%    T|O7GKKKAJAOEL\codelets   % ( Rp@ArialDQ|Hm| RHHݍcG 0  G 0|@tQ|Hm| SHHލ  dv<(T("0$ߍh !dv<(Tt"%H Hh!dv%    TT7GKKKAJAELP) % ( F(GDICLNFEMF+*@$??@ D8X?A@ , DBzCDBC@  !b $$==_888% % W$JNX % % $$AA( " FEMF+@ FGDICF(GDICLFEMF+*@$??@ ʱ?Ad=^@ A?( X@XXX @ , 0CCCBCIE@  !b $$==_888% %  ; d 6d X4d _ X R M M 6 M X4 M R X _ d d =  Y$ X  =<?J % % $$AA( " FEMF+@ FGDICF(GDICSFEMF+*@$??@D8X?A@, 0CpD0CUD@!b $$==_888% % W$ S % % % $$AA( " FEMF+@ FGDICF(GDICY9fFEMF+*@$??@ʱ?Ad=^@ A?( X@XXX)@, CBcCB@!b $$==_888% %  ;66X4/***/66X4$)))$=Y$k8=<?Y9e % % $$AA( " FEMF+@ FGDICF(GDIC ,dFGDICRp@ArialD@pial< <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT( 8KKKAJA6LP1 % ( Rp@Arial8D<c0,\e0<J0<c0  E0 0ݍcG 0  G 0l<(<O0<tB dv%    T|:JKKKAJAHL\Internal  % ( Rp@Arial8D<c0,\e0<J0<c0  E00ݍcG 0  G 0s<(<O0<tC dv%    TpM]KKKAJA[LXSenses  % ( F(GDIC<FEMF+*@$??@ʱ?Ad=^@ A?( X@XXX]@, {CqCTC C@!b $$==_888% %  ;6* X4- 4 9 > @ = 6X4 =% Y$ZQh =<?8 % % $$AA( " FEMF+@ FGDICF(GDICPFGDICRp@ArialD@pialB <s@ArialArial0 <@0ݍxݍލ<ȍ u0uN dv%    TT'.KKKAJA'LP1 % ( Rp@Arial8D<c0,\e0<J0<c0  E00ݍcG 0  G 0s<(<O0<tC dv%    TpCKKKAJALXSenses  % ( FGDICF4(EMF+*@$??!b Ld-.)??" FEMF+@ CompObj {ObjInfoPictures ]Current UserJ      !"#$%&'()*+,-./0123456s:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrvwxyz{|}~Fh8Va?NJFIFHH ExifMM*bj(1r2iGGAdobe Photoshop CS Windows2006:01:23 13:15:36v&(. HHJFIFHH Adobe_CMAdobed            v" ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RI$I%)$IJI$RI$I%?TI%)$IJI$RPn\=׭䶌l^ߤK,-O؝JZkOHoݙYVwCmf=keMέq(؇"w??yIg}J?!Ȥ3a9=cvIv{R`H7TGV {L96ub;&ꕜ|loǵaL$kv6$MJI$TI%)$IJT.}eqcZkWVfO\@">Y&05[x te ClαN7Z]]U]nCNCqsC.=͖?zq;jjNIqnɦqq-vmՒk-xKK?Jrq,sm:1[6okX>Mzė'9XA<\C3.>=FZ֯( ݸ}Ogхݧ_F헨@כXM@zo~gLPqE.fn ]{ccZ9&,la">oo"D #Qս^WrKCjZ]Yc̚\ n5:ѾU kg4]nCdes3g ̆I$eTI%)$IJY};Oj,CD6͹8zw__sj\{HyK8y6EdcٳVUr:Yk67M&-94X'U:dw~U~6E=/u kɿ.rs;~~ [mMgfWQz_Շӡ:DclwJuKrku5r YukޫϠO]W' :q/%I ~?6v4]/wkukS*DΧ 2ݏW)ciki*ŃM+f ]NCqJp/n=W>eMĶ`)k@vC7vbVӺT^rz~i{f ~Oۻ{]BF+,."ErRu.͛?Cg%n>,XlQl[.}x5+)dioEj]o =b;;oT+xߤk=ޝ,qe,fm>ԏM+Һ-אs}mv]OSulpڞS}/fͥ='{ltާ`ٱ(q<>wQ)XaF{-:7Fdb2[+s^}Rz>ޟF_އ&5I%aTI%)$IJT:{n'ets6ڟدMyEuV%\%NdMỎ wy޹3z&[1ʫ}V_f9cs,mWv9Wr2Nee,$ϲ[s}_OkV]"hݳ%V4&Q=s"}]n%$nVK= ,}{??#%kLEɲ[Y33~%lo~=t9lTUV}65On?l{pE̢]o?" jWevVn yt>^ SCklg&؝ h_N&1}bvV%̬5k/g{TYbca?s6YwzKKGf^.qws7jqL1\~~-}֙s 2~e{I($6ORʤI?TI%)$IJI$RI$I%)bԀ4+cCKIԶ}'?-#c}"bljIm,m`HhڊIRI$I$Tʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$Photoshop 3.08BIM%8BIMGG8BIM&?8BIM x8BIM8BIM 8BIM 8BIM' 8BIMH/fflff/ff2Z5-8BIMp8BIM8BIM8BIM@@8BIM8BIMIv Untitled-1vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlongslicesVlLsObjcslicesliceIDlonggroupIDlongoriginenum ESliceOrigin autoGeneratedTypeenum ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlongurlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT horzAlignenumESliceHorzAligndefault vertAlignenumESliceVertAligndefault bgColorTypeenumESliceBGColorTypeNone topOutsetlong leftOutsetlong bottomOutsetlong rightOutsetlong8BIM( ?8BIM8BIM v JFIFHH Adobe_CMAdobed            v" ?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$IJI$RI$I%)$IJI$RI$I%?TI%)$IJI$RPn\=׭䶌l^ߤK,-O؝JZkOHoݙYVwCmf=keMέq(؇"w??yIg}J?!Ȥ3a9=cvIv{R`H7TGV {L96ub;&ꕜ|loǵaL$kv6$MJI$TI%)$IJT.}eqcZkWVfO\@">Y&05[x te ClαN7Z]]U]nCNCqsC.=͖?zq;jjNIqnɦqq-vmՒk-xKK?Jrq,sm:1[6okX>Mzė'9XA<\C3.>=FZ֯( ݸ}Ogхݧ_F헨@כXM@zo~gLPqE.fn ]{ccZ9&,la">oo"D #Qս^WrKCjZ]Yc̚\ n5:ѾU kg4]nCdes3g ̆I$eTI%)$IJY};Oj,CD6͹8zw__sj\{HyK8y6EdcٳVUr:Yk67M&-94X'U:dw~U~6E=/u kɿ.rs;~~ [mMgfWQz_Շӡ:DclwJuKrku5r YukޫϠO]W' :q/%I ~?6v4]/wkukS*DΧ 2ݏW)ciki*ŃM+f ]NCqJp/n=W>eMĶ`)k@vC7vbVӺT^rz~i{f ~Oۻ{]BF+,."ErRu.͛?Cg%n>,XlQl[.}x5+)dioEj]o =b;;oT+xߤk=ޝ,qe,fm>ԏM+Һ-אs}mv]OSulpڞS}/fͥ='{ltާ`ٱ(q<>wQ)XaF{-:7Fdb2[+s^}Rz>ޟF_އ&5I%aTI%)$IJT:{n'ets6ڟدMyEuV%\%NdMỎ wy޹3z&[1ʫ}V_f9cs,mWv9Wr2Nee,$ϲ[s}_OkV]"hݳ%V4&Q=s"}]n%$nVK= ,}{??#%kLEɲ[Y33~%lo~=t9lTUV}65On?l{pE̢]o?" jWevVn yt>^ SCklg&؝ h_N&1}bvV%̬5k/g{TYbca?s6YwzKKGf^.qws7jqL1\~~-}֙s 2~e{I($6ORʤI?TI%)$IJI$RI$I%)bԀ4+cCKIԶ}'?-#c}"bljIm,m`HhڊIRI$I$Tʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$ꤗʩ$8BIM!SAdobe PhotoshopAdobe Photoshop CS8BIMhttp://ns.adobe.com/xap/1.0/ 1 143 118 1 71/1 71/1 2 2006-01-23T13:15:36-06:00 2006-01-23T13:15:36-06:00 2006-01-23T13:15:36-06:00 Adobe Photoshop CS Windows adobe:docid:photoshop:fc061859-8c43-11da-bf09-84bce6b9046d image/jpeg XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Km&Adobed@ v  0P@!1#34"$6 !"01A2#QP @qBR6vC$% !10AQa"q2BPR#3 @rc5b$t!1AQ0aq P@ so8VxOO۴,` JmYiaarM}Ca{\c4iћ ptO{?>jN8M-S>iv%@o.~^OlZ DcF2d?9Qw׿l;6~?:>ە/ldĖ{Wv|l|uq1y&%26އt\~}}r||yeՎ.3OseLy6xZ-h$fre$HWsVگ"Gz#jfҟٖq7$y(<ЗLi뿴'mMv)ZiH%nt cknk8hXNKTʑvU4?ҟiXXURYJaDgYٰ V)eRNKpM_.; ~Aoo9,K=sasi2S1V9pǎfEgKqǸͺJ/Y&T##>~1##'Qc{JgË/C(lpCZH'ě FAy÷sX`p"+y7\L75j.u&keEI3}0J?KK Ap285"b=s:tlz3hwn]+(e!)Ӓ o#ޗĎW= zC!:l*0tչ͈]$|vwh *%IS@v*S&5xEg8CML"*~2e3vΉSFi`Iȃ&nϡQndk8g:E H@ kWX9_JTqOZ "e+yE@_0ҹGWU";iqul̀ja?$)x1\հ1D0"e:K(>ȁ?L%:5u|f?ڝw kxRrU4+A!_[oǩ F=w#T*LE7< ֊wo/b+q!&Q !H(vHD86*Rt Eڧu虶O>*Wô+\CBd0tAn}6Oۨ/Th׻7]ڐe1XG*Ө[0FnC5 [!.",(2Y18pʣSj1,@*'}u4Q9k& 8e3Yģ,c0NxB  '0F9" mΚyc)7rg*X&!؜)9ަ+\S!==QPlfhPd[Va829qߧNΧy$D,?hi굵Bk`C:4_s>fSg]éamF ȃ qlAݕ/x0 ZK TX7Kuu\\ p_RDk@kZ=Iڦ)Tގn}m4Y8KklkD' +Zch ./5 x?#iDzt{'BDdv\'ZNE6CtК8Hk9QvIhn8z*z8_Qȼ9#{Rχ?$='.c.xi}4VR@EXi=$R2$ak? 3CX)Jj.S7vU5닆4=47ːr[k"Ԛ/a >EYØ)ky4oyX zzK+T9m A/ H[ DppEN$Ґ/ܽ0-'򩋭4?9(ڊGi*ߘr7['a;B3)Z֢U엔% )ݺ*^I^!N3w'u/Pgĺ/PgĺO39;D16[cDi\^|魲BoSeT`3u!jꯖ5S]jtIVܑ3klwr]?_d5DxZX@/9f6X'5\tnebc*U6iNn_$Ēި cNhxUE!rQQ[u H+#ؓ+ @UyHօ}MUw5ݶF3_z5~-m07_k[%G 66ϙЖ;)wSڪiS1K18Kess"[Κ9Ml@ィ[ Cm2I&؎]蘉(0" or;5}Cafc I!$|b]ȩcc3D"_ mstz/Qzm$Ē!ly|LbMmX9SeMW0i|77__U*a#ysgJ}Wi }NU^Ү]u`Y2}J)r ȣi6hܣW"u3/5u#*͒019wy66#:I]Ѩ&¹s#YF <5ףBh{7qËxI gTd 3,G#0Ս(7Ufc%cS),vkT@7/GAȌW$:U=\+5VRetVh+r+UMӷROSN;:LlӹC,d){"^$ _ՙ f?'HGjp'g"^(䙥&=^Sz4Z:p!TWwuj0R=vb,iP3>*Ai%=3r1<Ȫc@oy JI9OGŠLUGɅ,`4vn9`cGFT[}J5zA<,ӌO:[? ̤ŴSc4ؑ,$pcXҚѵf۵{U:3 mݭm|`QK5q[R.Q}r&Q%d7#@TGdP8qma̓&bY|:该C ժߧN o˧fx# \ݑUSK>Xnx#aFo5jáڢyƎx{WAKF7y.-}ƛ$ݐH@<{uU2͖ $/r9{ۤ:"'zsQEcX+htibBgz"4s)|zFO9QhkZXh?e)o:&R.:z)UI E2xK }(2_|^+8T0}>*GFV&9* j${9PM_q]~\>>`Z| :2P S>;uj`n(MWϚ:y<~AQ3cmuk**ߢRihP2gq?*BbKƈ[iʫ.;p@(+Ύ ! 5M'a`4bD=ъa)>P1@.=!@0f.OB2g%}`vˤDr'cf"Tr4ԯq/S9Xa `*>\-oTjM_.@@ "Rio?!p0ZQq/'xy>P>8$AzMzH~5٫Eu "9bϟ/?Gճf~M5f:=A |$L KQb!%>00n?Þ'YI~N~9`,oԊg#G,F'TFq}lIElsif0~iYl}-I0@om!T N x_T>bD0 x!4%B4^i A2nma_ A"KYy:*cUyu%(<yKt!3Q/iBW!\P нNBH>J.W.':Tȸ0EG Sb-E\]j//2Qt ǡ@v-IQ Jq @(Bq“~w`vh=B4L]fů"ߌ"0#cx YKpwqPP"DkH¸50 ec(XR7] W KE$?r\ǝ0Wl%{4ӉF?2g3ҊT T ([H.A9+M\U)!"`4L"vs>r )`8eL9b$LOk!3Z`(7%`P1Җ1Yp"y[BJ ]Z\͢ ·|2 0cRUx(@a8J$KC_gbA@lR 0X`sL l369D@΅" )RWl!XH^R{SEQvf0DwlQDa-RB+aH"RRQ@) + fJT+$D2#~>DTȤUTE` B2=%‰LivO#<5:tMY%@|l d2( "g$41*)@I: x.@M/cIRdD Dr(*ddH H ڛ1!a>g0^W2Dr:61Ѵ&(Q72JtԸTRp#Ŝ,LقDAFD7r0#@W(VY:‹b* %8L]eUzI1E&οK٠FqqG|qJFIFHHExifMM*bj(1r2iGGAdobe Photoshop CS Windows2006:01:23 13:24:44p|&(.HHJFIFHH Adobe_CMAdobed            |p"?   3!1AQa"q2B#$Rb34rC%Scs5&DTdE£t6UeuF'Vfv7GWgw5!1AQaq"2B#R3$brCScs4%&5DTdEU6teuFVfv'7GWgw ?TI%)$2q0e\[1%Stӷ*1>nA %:>/ʀE?c_7:YmxXel>~YOZ?95 >KXq50I\<68uf׶Ovzoc[?,a>euL{w'bp凹$e ~Nv qsx2C9#_:*}K8sl#7[w+JVpA $I%TYYr=sȌq"G=`dj#Y1[9FR;D\lmE`ÝƏ;?,r痾^č%~'Cqu82}'=\5̈18`Oɼ1%&ˎ?/L;{j0z_Ona鹿ɧ-eED꘏ۘsU9441Ŏ.C湞V@z?9\{uuZK]J!2a|.ɦT 25wI.IZ!3^#))#I*I6&DDϒf=hsBn׷V7>o{psѳT4nt1K\ԟeX&q\#p{mZ_ 2cϏ 8rc1nr<刿Ȉ'~ Zrx F];?UoƜ+l#eoS~(0{x]ݳk7&$'#,w܏b?~&//öHmt;͒ Oiе=;.(cRB%2b3ZlSMV5 6g{]WY OEX*/-k6on-da-  lS#P,k-ۻn[Ǔ$d bGWwmcɒq$ďO~[1S[ZRǴ:7U۝o:P^_^ZA/f>6Yka i2\ozu?EYsf@es@`{=:G0 O?BG( >/Tx*fuƬ*as[scZOTS!Zֆ' E~$d)imigE*}Yz}M6~Oܮ*uUv \*~n? 奛kxeNˋ9,͚1h]lf[$vgI1iSSj0ꞥU[<ks`6 jalHoa)+n5\@2{ʧYɻ[}Z7s_w,qnTnnk(d˙,׆ݛA:Fq9#q3/Ҕ򑌸9Dke/WnVX+s~ n~U>5 Xvwb5t@\omv?cmMkc?7C:l2]c{Kmߢ[Rb 9{GꒁxI<Dq-Waml.5 wm;c*3+?~Cj}+uc"]mU]V!i6`gp8_Quv6Iɥ۳jBF q n}ELQ{4?~Flq*kݏxع߉9iG&2pwyNZQ0??&'gFߗxun 4e7Ҷ}e~^kkQϦ[} ǺM=[WOZ^M5ں~U][?61;%쮆lS3q~%8j}/ e$~Mv~⊾ZEnȾ܆7][恲9}OeD(d1eNu$499}uusܶHs9@Hs@AUҧ1p0;kj-;}=]G\_z:XI+ WZ'sXvmqo.~5m\" lٷzÚrS!>?+?ٝI$TI%)q]C 9RǺxsQ/vRFJkv~c9ʎgO 8Kgj1pR'/~U!@mܠ?DzOj T-q)B&P'Ls& 8/ȶTU.5NMʽ<Ιs+Zn!>Iֹ߾V_sN>~﷊\m3g;pC4~lhNwQvt1}V]Ƃ8k oѭ//%W1ާcwoJ~G'5}C1?7$ ]e<%-xc|f(fsCƣPpkkB{=EjmU`F5bX?"*ǎx *#ZN0Ìc?$ITI%)$IKpe_ahlH#M,Np)hIG7}u$SGnA %:>/ʀE?c_7:YmxXel>~YOZ?95 >KXq50I\<68uf׶Ovzoc[?,a>euL{w'bp凹$e ~Nv qsx2C9#_:*}K8sl#7[w+JVpA $I%TYYr=sȌq"G=`dj#Y1[9FR;D\lmE`ÝƏ;?,r痾^č%~'Cqu82}'=\5̈18`Oɼ1%&ˎ?/L;{j0z_Ona鹿ɧ-eED꘏ۘsU9441Ŏ.C湞V@z?9\{uuZK]J!2a|.ɦT 25wI.IZ!3^#))#I*I6&DDϒf=hsBn׷V7>o{psѳT4nt1K\ԟeX&q\#p{mZ_ 2cϏ 8rc1nr<刿Ȉ'~ Zrx F];?UoƜ+l#eoS~(0{x]ݳk7&$'#,w܏b?~&//öHmt;͒ Oiе=;.(cRB%2b3ZlSMV5 6g{]WY OEX*/-k6on-da-  lS#P,k-ۻn[Ǔ$d bGWwmcɒq$ďO~[1S[ZRǴ:7U۝o:P^_^ZA/f>6Yka i2\ozu?EYsf@es@`{=:G0 O?BG( >/Tx*fuƬ*as[scZOTS!Zֆ' E~$d)imigE*}Yz}M6~Oܮ*uUv \*~n? 奛kxeNˋ9,͚1h]lf[$vgI1iSSj0ꞥU[<ks`6 jalHoa)+n5\@2{ʧYɻ[}Z7s_w,qnTnnk(d˙,׆ݛA:Fq9#q3/Ҕ򑌸9Dke/WnVX+s~ n~U>5 Xvwb5t@\omv?cmMkc?7C:l2]c{Kmߢ[Rb 9{GꒁxI<Dq-Waml.5 wm;c*3+?~Cj}+uc"]mU]V!i6`gp8_Quv6Iɥ۳jBF q n}ELQ{4?~Flq*kݏxع߉9iG&2pwyNZQ0??&'gFߗxun 4e7Ҷ}e~^kkQϦ[} ǺM=[WOZ^M5ں~U][?61;%쮆lS3q~%8j}/ e$~Mv~⊾ZEnȾ܆7][恲9}OeD(d1eNu$499}uusܶHs9@Hs@AUҧ1p0;kj-;}=]G\_z:XI+ WZ'sXvmqo.~5m\" lٷzÚrS!>?+?ٝI$TI%)q]C 9RǺxsQ/vRFJkv~c9ʎgO 8Kgj1pR'/~U!@mܠ?DzOj T-q)B&P'Ls& 8/ȶTU.5NMʽ<Ιs+Zn!>Iֹ߾V_sN>~﷊\m3g;pC4~lhNwQvt1}V]Ƃ8k oѭ//%W1ާcwoJ~G'5}C1?7$ ]e<%-xc|f(fsCƣPpkkB{=EjmU`F5bX?"*ǎx *#ZN0Ìc?$ITI%)$IKpe_ahlH#M,Np)hIG7}u$SG 1 112 124 1 71/1 71/1 2 2006-01-23T13:24:44-06:00 2006-01-23T13:24:44-06:00 2006-01-23T13:24:44-06:00 Adobe Photoshop CS Windows adobe:docid:photoshop:e8e9a317-8c45-11da-90f2-b4e9b3782723 image/jpeg XICC_PROFILE HLinomntrRGB XYZ  1acspMSFTIEC sRGB-HP cprtP3desclwtptbkptrXYZgXYZ,bXYZ@dmndTpdmddvuedLview$lumimeas $tech0 rTRC< gTRC< bTRC< textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ QXYZ XYZ o8XYZ bXYZ $descIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view_. \XYZ L VPWmeassig CRT curv #(-27;@EJOTY^chmrw| %+28>ELRY`gnu| &/8AKT]gqz !-8COZfr~ -;HUcq~ +:IXgw'7HYj{+=Oat 2FZn  % : O d y  ' = T j " 9 Q i  * C \ u & @ Z t .Id %A^z &Ca~1Om&Ed#Cc'Ij4Vx&IlAe@e Ek*Qw;c*R{Gp@j>i  A l !!H!u!!!"'"U"""# #8#f###$$M$|$$% %8%h%%%&'&W&&&''I'z''( (?(q(())8)k))**5*h**++6+i++,,9,n,,- -A-v--..L.../$/Z///050l0011J1112*2c223 3F3334+4e4455M555676r667$7`7788P8899B999:6:t::;-;k;;<' >`>>?!?a??@#@d@@A)AjAAB0BrBBC:C}CDDGDDEEUEEF"FgFFG5G{GHHKHHIIcIIJ7J}JK KSKKL*LrLMMJMMN%NnNOOIOOP'PqPQQPQQR1R|RSS_SSTBTTU(UuUVV\VVWDWWX/X}XYYiYZZVZZ[E[[\5\\]']x]^^l^__a_``W``aOaabIbbcCccd@dde=eef=ffg=ggh?hhiCiijHjjkOkklWlmm`mnnknooxop+ppq:qqrKrss]sttptu(uuv>vvwVwxxnxy*yyzFz{{c{|!||}A}~~b~#G k͂0WGrׇ;iΉ3dʋ0cʍ1fΏ6n֑?zM _ɖ4 uL$h՛BdҞ@iءG&vVǥ8nRĩ7u\ЭD-u`ֲK³8%yhYѹJº;.! zpg_XQKFAǿ=ȼ:ɹ8ʷ6˶5̵5͵6ζ7ϸ9к<Ѿ?DINU\dlvۀ܊ݖޢ)߯6DScs 2F[p(@Xr4Pm8Ww)Km&Adobed@ |p   0@P"!1"A 2#Qa30@BRb$qS4D%  !1AQ"aq2 BRbr#3S0@P%Cc$4&!1A Qaq0@P Ztu^=qkutіx "zk88 zܮndL7\扬c$i(h_^/:&_=~XCOAњܾ<%KO[Wetc7|?ۏHj˖( x E6هbAM(=juu?OK_8~)/U$b ֚>ޫB XctZ*!Ӹ5F-hs<" I}/"ia,z'a֎hXF4 @+vr<vdݦ Mw:]\.gKBJ27LvmțA_2F Kwk!yYF`Zc֗lY%m*gf㦛[xID YG| "g3Nc~^ԵGuٷú2!Fu]5|{}fr@5ڇȋ\Iž#맷lA#yjEn.btW @=o?U)2ȷ>㔋q8Ns@M8so´.#[UXee+qpyOܗJ}[ue$g?0ꗖ|ׇ] D]:uGS+H-¨7ǾuՋƱ\* Y92j<굾HUʪs)O:ʪh|wztǻb_NhFkw/a"nwO hG~L>ϰ7 6Ӕa?0();V=Vu ] |VYuMo6󣯤Wx)Խ_pŎ#O3PU |?,PnCbM$~ƌy PW۳n&2Dp!cB{ #Oc.mUچUFC/C c4ՃK,Z= FinЃ3!8W_?d;v4]2Zs 4xFT<ȕ韧QW9fa16ir,z> Gi]umЦ"JEhGÅ횔t!<23ҵ~?R^6yWdhS*cSK,u4J5-#AT }4z?U\yw%:9)=c]YQV  |1WtH4KTo;iG\+lē$~_Q:13A"}F9ڌi*}KZ5-*AYJToZ-T3<IRՍ@ 'yyu,3>,-P糷kq?f}S<u!}9orZݲ9J"K=IpUC(2r \H>:j_GxG8aGq%D(SS1UGpżp6`H癊|l ZH kb(#ɢ˨JU I:iwMivIm*Ȓ>ͪqVtе$~|xjpk* ɥ@}yP)o-%)C|,%<^\RM?[C<^ե/CMmWSATuSmMj yPwFoFs_K}g׸ ؖ릈>If+z•QLu?"cxMRMLP7o̟Q+2ȪUJ|֦8GzcɢkAE [3WJ9*=(9TnP-':xQn};n uUW.vT`4 G NCdD6R >3T$cV(3R ,r5plivf6cZ:=dZe6Pt9b5ëQggF ;kr:EX7ʫ SXhqo9h+Ѵō"u5|QkDϻ-6Tj̬!:M2 Iq|,FWy f_*l~#CEzj%9|;Gi|@u+AcR4N ȓ2TU ʡG* :I:uCiOvX#iǽY}Y:oR]z]wdfS:T-"jUhNݧ=+D)UtSyXg]9*п1h[حV0\\%?g]72Ni"O閭5܆ITmgbEY?"I׮9S#RȱegUV6(\%Of$}*aԆgc7ܱ֬ t]?Wae@d?]|OqQ5cSTCcyg=~%B'X,1ܤYQ.o鎑j^I rkv].braDFh]Wkރ-ԟy5gُ+(,Ubxl>\%U" /SU7_S_ZnҍnFM,=ücUr ُ2fI8 [NKG\>{GlpzuG'g :c> >#ݖMeC>+` [O*Yky{;S&hQP]HoGNɥ|')XV ʡSU=8asO$$q\ʔ㑩UÆ HetE44eƹb+EtHphZU&;JK^ѶWGٵN5̺EI,sߧW6tA?Ը">LMkpދ]kTFnrKmg)]pnnzxbsjjra=L)^m5Pmr߆8)*q;=IgDRM{1qu/G'AΛn}[3ϢVLPmŚ]kvdt43nI/P*-{ iL\XtIUHbNGÅzibFt~ fm5Sߖ2zWWmJ$_}rgoً;sSJ+YYɡDnc .%7+o/ qƂIt7f?& hN #.24 "eB+V ..[k0n8獵gUd!:5Σ3#a ̗e]^lx9tS6iLE,q4ײ ?eTerʑ0#'YcLjcot-/șN"1#N'*s[Va>63tXٚ>a̐tpɊq뷠Ăk%/Mې^׎=!K#k__EyOYB"t RT|~Qbp7Тb;Iq*7r"$i[898We\d1Y|vx;5XQ;yܛ=v,,e, 16XLst_>};u_]&F:Yk%^ NzxF'amẊ}:,&HvK툎ߐ2kz VEl$`'IzN6؜>rv\%U;" t~9%̿ LvOųJDtk}LDy^"%-{n!Xđ8H";0ӵ3k^Z[bay o]cc8kX*'\yC]`Lt!fg@S*(̬M;IvD_hǔUl\dC(S=n;vݺ4_M}zrF, YJ}alnD㬮 )LYGr߬vMq0׶Qmz[gBt~1PCfy r9C;}5vc-XLJmh@Zrw,hcץ9XLfO#*Mkd/m\jkdUnPX/Ox{2ǯ\TUSg8vTBliڅH _߷V.>ͯZcp܄HW/ϷL.¿±_㧙6\7iCk%Opkת.ѩHMDL~|&umXkd(ePN[6-$B{J}bCC1Iɘ@ig]PIOQ2 jZMyL;anfIWʫZS! \2!R%LU+nQDcې6bA1%` ua{H*@+5egu l |k}\uf}w[ Dwa&Ȅnuan=H{LWKf=i_T Ak;"}ON Mۗqh%UA[|b~un[ vbyHelv:¾1kµ߭M!^fWj-ݩD% 22{EFfwf2X+C r8/աcU]'^!63f%Mgb9+Ǩr=Q,NFϳIrY[4a}#to㛁Gy/Xz1~BAm: 㦠s0XEtv}5F9e+;nQ C5oJңHHqeS!ѓ_ 2)UoMdWo3Ɠ߭d+$ݖN*jIׯYh^NCD/tlmش8Wul5UkڞP bطEdv )`Ó: &5 +awӷL iL0YWĵ_!ҦsTJnlSz?ÓlbӯqEzLG25QqLePб/FNJ!Kc'VK,0a0a2:^ج]K;mc}cQuZUř2y˯⃱5 vZh9UYۏ]frr}ե((UC'2&dLB]NJUs㴱6ͺ{jqz|3;Vhӆ^1u⬵؄-eScV1sV?o7\k*z:~H.ٜv^vE fpEnO"LY۬ka N21B^˷n̰=gXHږ17)uvl{-:lJ$7ėXŴ&&7Oό:vpk | 1He[/>#&/v-RRH X19 &S"gbC"Q8 fԬ !k(OKWߪ\w)4s&pJfgHW1^EG YBEgtL0b /Т&5XgIIQ=|{%#5qb/!vɶWVۘщk\(ۡҽz5R(xF=`;"4·!C_*sb۱e:TB(I ]ϛYv2tؼV &| [iNMuT^=ȧ`n2? 1Q(Oo^b%3^,6LIc>~ߌ@qΩ9#t"tSҼ>76l mIcC0(hĺ[#$Ís7i^5sA?WG &-A9h$Ô+h0C%\U]x&Kym$% |qTj [o2ۑ] ^$]m:Zi'ZVxyGaꣴ&J h-ڣ7#-qAƎr)Xjl0No1j:ڡk?!=Mߥ;CN}5%XS!٭2MHXjiPWO1ЋQTsCgЦצ6ՋQD)Ǎgr)\T=&KNiۭT + rJ(a8WdwD)}cL6;n"h} t jMXIGTy@Ctt{>̰U\_Ri~?X D? R938B4;8ŧ5^Un; I.cHqBG?WQR[lC:(, Tf&OioLɞOŠM+Y9 XiÏ qD /7Mq.1keѴHmF;@`Y~&LBePcuX'(LdtHh_jѱnU"vV,3J):4aqsK?<ӳvPs>JOlKM)r;_*%5ȟg晐{0Cmˆ79!np,Mx &N@ʛFr&߱5Ō=!l!XῄP1xe'EbP3 vJ*90NyC_` AAmWj+wؔl_D$4PH}d@xg gEd+Xb;~ *~4SSַdwx_R*]Z!`G{ˮ!6UGdوM;=̥O5G߬i]$8`E1O?W^ך&S5ƴ:ZD"IQ^3;L խ.&D: e:b3MoEuGYI{5\"{i眠 A #M'O,a&.Q "(ˁ.`j A>ϱ]6ʸbUǃqʰUgUI˻Y!^̮{!X{4cӲXqy곢,1\\ۇ E™Js^ Z Sʭrb. ҂ AGMeuӍ~ v,b"/[ ,|. ""tRn ^JvQs &#V'ųdzX)4va BG)3@SAӁM#ƳpzɝfOBO5R5C*i0j SjU|hl8q} nK<2U"`*FRבP{O )AX석ِ{EQArc0: y hԭ|b+cj(mˎx2R ƭo>g`=ǧNMH6"jU9CO)Pviu,> @:D/.CDyXvx hܶFPmmȔ |T?NSB8ͣ9/q:ϪhET[1p h5M-F/ !jOMfآR `͹nDŽ ~/ґXV^RUV\MyPVjx94cm[LN5n9w4 46VC0!P(*Uyi `ÇO YD| @@S~>L㵷*~A(@@v1xGq|)0&*I h/O-kSc&2L0#Gtֆ,w6ȵ#$KmCN 'gvD*Q({&:?@ee&Z Y$Yv__RQə@E` Di^p\֤l:f^1jpAw@x旗fRa(W&## sOO]N]VXzaJqʘFp~:AU P#c6?-<'~ Qm(؝ Knte61B1fnc o9S$UlJ"m +3`R'e(n&s @Ũڎ_gtט1Pt^,]u8^W gExKWlW1TFԵ0!f&\S|ȇWox4VZ&8"jLu \^uj=Hdr~TY$m=>E n+,>3 i ^M;g C# NS`c)jY㐴hI؋.# 7vy%kO_&?@2L HDtE1뾟e9niqx':u1\ILDTkԊ1wNȾ07v98(*[pƈ-B+8\\h4`{(`Az0@ uFF?lTb3O6,%hAhʉb$mA@ʑ$hp^0 tX2Aj) Ho%glbShh28v,lK Pei.â`m#`Ed洚!!hp֮‘UP| T"i&)nn,丣R-+i㟷&D0U*[/ˀBG>Y6FntB2⤦/hѴ{Aն4(*WK(ec<+;,QYn*FɔJ^BPF_ 5D@/ ac:umW"e2berXVr(yvY 'N}%-,P_Mc`V誳P 70LL0P%NjW خr9%m8{N34#¼Z'~2 B ?[r {  P3\aCZɡо*Ƙ@%dF)VôuD@Yu>QC: +F a"`hƱcj-a%%6krPjRSUY3Iۣ,H͸IT9BhD(H@% Ya2NvN/ > 4"‚z;8ؒZ+⊣#tPppl18#UZ =(nc k"Á;gnD+ġDb^jHη >.QdzUdge+ h6rb5T H_r\!< GPܟ`F .2`PYnʔ2 .!.rW1tce!a!{g?Bb[i E.E+rҼJk$>N¦SR66@Ux@0 R)1D"tlv5 RFj .BU.Gިb@ 0K l@kD^(9$Oǚ;ЈLiNMCksa @ADEuS"U,)AhY]sDOy?7 3-<eSV ـ BM79䢅@h71,Z >Ֆp%CPPQ@U」'۵JJ2/ ek("tI^Z0rɕR-nA]<* 3*BR Ahq.$P@;0 L\H| Տ EM%t 9ϳW(erok.CSummaryInformation( PowerPoint Document(9sDocumentSummaryInformation8 1Tablew 4 @L<PowerPoint Presentation - LIDA Cognitive Cycle with SMAStan FranklinUma Ramamurthy42Microsoft PowerPoint@ d@ʸ @" @pw[ n՜.+,0    ` ( `/ 0DArial00 008r( 0(D-3 00000 008r( 0(@ .  @n?" dd@  @@`` PH(u LuO$$R$8Va?NhR$qqG|qh 0AA @ uʚ;2Nʚ;g4PdPd\@ 0ppp <4!d!dlk 0r<4ddddlk 0r<4BdBdlk 0r h___PPT2001D<4X3___PPTMac11@f   hnamd` Arial&Monotype Typography    hnamd` Arial&Monotype Typography    hnamd` Arial&Monotype Typography    hnamd` Arial&Monotype Typography    hnamd` Arial&Monotype Typography    hnamd` Arial&Monotype Typography 0___PPT10 2___PPT9/ 0? %X     0` 33` Sf3f` 33g` f` www3PP` ZXdbmo` \ғq>9y`Ӣ` 3f3ff` 3f3FKf` hk]wwwfܹ` ff>>\`Y{ff` R>&- {p_/̴>?" dd@,|?" dd@   " @ ` n?" dd@   @@``PR    @ ` ` p>> (    0Í EP  T Click to edit Master title style! !  s *ƍ E  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  s *d͍ `  X*  s *@ҍ `:   Z*  s *׍ `AE  Z*H  0b޽h ? 3380___PPT10.\Xry $Blank Presentation\  0 [[0Ft w[(   ?[8  `  t ` V f  S &Atwoj   6, h r$___PPTMac11 hnamd` Arial&Monotype Typography XCompetition for Consciousness      64 z___PPTMac11 hnamd` Arial&Monotype Typography SLong-term Working Memory      6  el___PPTMac11 hnamd` Arial&Monotype Typography i/Declarative Memory (Sparse Distributed Memory)0  0    6&  <S, ___PPTMac11 hnamd` Arial&Monotype Typography p6Transient Episodic Memory (Sparse Distributed Memory)7  7    6, W l___PPTMac11 hnamd` Arial&Monotype Typography i/Working Memory Preconscious Buffers (Workspace)0  0    61   ___PPTMac11 hnamd` Arial&Monotype Typography MAttention Codelets      66 1# ___PPTMac11 hnamd` Arial&Monotype Typography c)Perceptual Associative Memory (Slip Net)*  *    6<  , t ___PPTMac11 hnamd` Arial&Monotype Typography XProcedural Memory (Scheme Net)      6A \ d___PPTMac11 hnamd` Arial&Monotype Typography Z Action Selection (Behavior Net)!  ! `B  B 0D0`B  0D# ` < )   B|H "`  LD___PPTMac11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ M 2 Percept(     `B  0D l`B   0D7R<   BP @ VLD___PPTMac11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ I3 Cue(       BW  LD___PPTMac11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ I3 Cue(    `B   0Dmp`B  0D\ `    BL !p___PPTMac11 hnamd` Arial&Monotype Typography M3 Local Associations      B0b }___PPTMac11 hnamd` Arial&Monotype Typography M3 Local Associations   `B   0Dl   Bg LZ___PPTMac11 hnamd` Arial&Monotype Typography C 3 Copy Over    `B  0D5    Bm @N ___PPTMac11 hnamd` Arial&Monotype Typography A 4 Look At    `B   0D5>h  !  Bq   ___PPTMac11 hnamd` Arial&Monotype Typography D 4 Coalitions    `B " B 0DLW #  Bhw H___PPTMac11 hnamd` Arial&Monotype Typography L4 Winning Coalition   fB % 6DԔ# x +v &  B|   ___PPTMac11 hnamd` Arial&Monotype Typography M5 Conscious Broadcast   `B ' B 0D[t @ (  6  K :___PPTMac11 hnamd` Arial&Monotype Typography _'6,7 Instantiate, bind, activate schemes(  (  +  B J  ___PPTMac11 hnamd` Arial&Monotype Typography 38 & 9 Action Selected And Taken (behavior codelets)4  4 *`B 2 0D,  `B 3 0D# ` G `B 4 0D t Gc`B 5 0D   6  B| ^  ___PPTMac11 hnamd` Arial&Monotype Typography QAttentional Learning     7  B0 " 0 ___PPTMac11 hnamd` Arial&Monotype Typography NEpisodic Learning     8  B + \ ___PPTMac11 hnamd` Arial&Monotype Typography PPerceptual Learning     9  B䠲  @ N___PPTMac11 hnamd` Arial&Monotype Typography PProcedural Learning    `B : B 0D# < < `B ; B 0Dp  <  B< [  D___PPTMac11 hnamd` Arial&Monotype Typography C Interpret    =  B 5  D ___PPTMac11 hnamd` Arial&Monotype Typography C Interpret    >  B ` T ___PPTMac11 hnamd` Arial&Monotype Typography H Re-afference    fB ? 6Dlf @  B䷲  U___PPTMac11 hnamd` Arial&Monotype Typography C Consolidation  `B A 0D0 \ ( B  B4 P LD___PPTMac11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ Z1 Perception Codelets(     C  6`² Q e___PPTMac11 hnamd` Arial&Monotype Typography MConscious Broadcast   fB P 6D d\ T  ` W #  g 0T V  c $ `U U  04̲ FJ`X___PPTMac11\T   hnamd` Arial&Monotype Typography     hnamd` Arial&Monotype Typography     hnamd` Arial&Monotype Typography     hnamd` Arial&Monotype Typography  L___PPT10,$r___PPT9TL %Sensors & Primitive Feature DetectorsD&      V e  S &Aone`fB ` 6D `B g 0Dp`B h 0Dpp j  BԲ  j___PPTMAC11 hnamd` Arial&Monotype Typography 38 & 9 Action Selected And Taken (behavior codelets)4  4 *`B k 0D`fB l 6D```B m 0D \ fB n 6D ((1 p  B IJ "`!8LD___PPTMAC11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ U1 Internal Senses(    fB q 6D0p( r  B "` .LD___PPTMAC11 hnamd` Arial&Monotype Typography hnamd` Arial&Monotype Typography4___PPT10 B___PPT9$ L1 Senses(    H  0b޽h ? 33___PPT10i.Nq+D='  = @B +r sCustomStan Franklin:^J ArialMS PゴシックBlank PresentationSlide 1  Fonts UsedDesign Template Slide Titles  FMicrosoft Office Word Document MSWordDocWord.Document.89q  (St Jr2Cnf4.eĶDBIr8Fy9w $ob eT r8kEnܕ!)1ğa'x4]{Ȏ|q9:3l(Gx FvqǛnlb1K?ۆJMxq9jNŘez[;pŗ)^–(7x( b4w{*O/h{|7w\w |~T2_rcNOE8Ӷ蠳oM={iK8&U[:|?Wb4U]ܾR5{Nnn{Jϝw>t.x 3: 4a._Xd{1f~i0z +Z6Xi|NViuWws}`.Ât85+vb)%YͰmyڋ3N#aIO&3?1{@S2QpZ3HGհchuտzT`K%.qK\%.VO; _%N.D_ wj&M, [ G-H[u 0&Dd í yaȣlD0'wyS:=[6WωK0~wW%9oq~Mo$R=ֶַoq~sXƜs' D0<Ǡu0?Mןx[;7\/_NJ]w*C_LOc͎ǟH8\P{Zk gH*l.\"8SI4-1]}Mkmwm]Y$9M|5,*vEs n]eermv~Qd}CCGǚ5V; s/\ݰ6Vwa:vL\gKsrTNѬQJfP;24p%8yRkv2+cY++_V Օ]wܱi-f~j&sOܯҞ%l]X-cYwꥉ9DG97 d3Vkv87%Qik *]`ˡϵ8C}h^HtvږxM *{ڣOh%;&X'۵&ek [w[93XADӔ M&7 .G-P,ntgYNeZϭ_Xym˔kq''jIKaI>)?5;~4o`%)ZWΗ޵ ~dbexU9rkiο+֥7ݹR;I+q^=Yeb5;xNoP$-'ֲZyg{ڂC_ďTw<.`< +ި59=!o,/NlkY=$w?^ۋvk7={k!|^}{T?~zsGu xV7; og8G煻TҾf]WR\x]kcə͙̄cɹt,O|JSP&8྄->pĽW"qu+0=-!|0qkpө>/v8##)%+N*Csߌ؎xu⊨w~=ΤX,u9sʽ@{Q5~hMZҹIK$.A>'E}>/ZAh=|s_xʋ^L!{W_h_(H&}-P=D*Gi+7mYICğvx.k ڿ!<[/]v=.9z23J'7gahxmFy 'oP}^h[3!A|H ^!p\͚O0(o%nsRF98loiorҫ絧iw뿦g O=^$yϘ|mm) qrWϖV-}@Q|5YLxsDP^m 9߬ߠIp3CyYԤ^{~횕7^b-赤>Y dq3|5/ƴW,ڝx e&C$)1#9RQۍ+O^npLsĕ}Y;kH"1?k5گiKVkլxpiVݢ~A^~Mٯb4oIL3KLii%0!{%;}׏Rpއ{Caܣ_ŻOi~IZWAaXKGjkGY +/0Ix ^ Pgxxz~hy/._<><ߜ{&복au rVϭ,7-8m/#okJ}< wI9+˄cq@{>+2;kn[֟:s ieY-:a~5v_o[e޺6`MWmz*_i|Gt{59z.s!C5vU* &6׶- 74X`nu92ӞI3vfEbIFm JDUQZg*wR*Ӑʃ-7j ~7@ x= Dz@pm O*5hc*v1p? ܊6K!ࢂCG .7\_Y\& xgn@å1p? h EϠ~hc~~xIH4*1p? \6K!<ࢂCXB"%Se'AcKk$|<=e>?ࢂChs.|-I2& />6K!|ࢂC>\",KpQIh3K| Aǀ?Bå 1p? |m B(Ep6K!GpQpw4}~K$0Iϭ 팈f$yӱNܢ?]kkŸj(-?n>_i $Jƞ+^GFjhnr CXd%;"u&Obt';C{InoӇ1K{{ |ڟiuFn!x?'h|Jq)=z;ŇϓXwLKLӈ_[ʓ7;[Nφ_;彈tjs6q17ɇ~mu5k)᜚ɬR{Zi 8Wߝ=O/aVgVCn[4/?'F]-п+>Yc'^q+.1+W\bz%WLKL^q5W^'؎,14rRiѨZ^+鵽NQqIZZB e^s]\ϯW$=0jfL [~F4 *^Y/^^FZ.aF׋5kWDb}Wu۶czii|`A~Mfg7<" v2Ym6* mI23-Rmqv\' Wo5&$v3fӪhB6[)I@r/(;FaZm7a^ɗKU$hJj$ɥmXh b/Ph^6fMh0HlYP'D1Ʊ7FH;*fM6l=3Z&Uwq^b e[{ kTj3ݴ)iQmԏ_;!RɁ'[֚͝25t]ɤtIw%hElt::r 9*)ۭ+W)vLjkPGH9|~:)fut;4/du2D,ԬH%x;hsK/ZOdE}m!jیG"bI/bQh6OѫׄȶGQŦ+ ɕhQ/;zd z9&u\fB"GlZVWa5$Jv:Mjk/zaE{GQ4ƏV14J .zŢ M"z8И~*!^~I5%TzA]~nmj0`0~7t>-3s۝N݆tJ%Vm3#w^#^&4 HMdLƬѨy&k4M8njнU.֪e͚i4*a L652A|[ fYq[hLi R(A,C"T*`t ~J;ayW#|{4qXN^!$Hf2K|UT*#kYjЇe6%bM2hЋP&ܥ]F"z-6&D!\Ѭљ^.:[+ f>_}î/DM~ۆV쥌I' 9v;\. ۲/+"_^SOpp4*@d koaG/|=%Tny|yEn/#oPj 2&K*nwx|S4S. /-hIJt,b$_ЇT|d*X4; ؅,Gd X[D'U DtwJzQ*q.~>} 29z‚Dc̘qc@8ZL'X`$@$>Q,!A +aɘ,w0XʭX,b eKsAqfTl㣝`n_4 bWVDzyRōlK@ suyc]V"P@B#ouX|P\A}dPr@,FqA 6K0Z`|._y|+w-yWRZRƤBFقq%ʜׯ6$c;Җv<j9F0=N)>УxU? N}B{ۏM2p!_H,g!FHFC=;aLȘE&38mbX*'_q ؇ߔWRDdrه4aW->P, b9/hb< ˸ԢRn3 aX>}@|nXN|  !R Pn^p\ݦJ*d@$diSc(ɀI^Xّ(5M&b#ד{%:1dAQY-)_.m "_Q8\5KJZƵKRH V R#D&Mn,0E 'Ea(' n' EvHt ke .9ɧmx ˲'^ZkPv"+A G8 ASM,<;%mP}p077b|~,%_6/! -D9C =:wYykk_ȶ!\m!Fq#N<G7_'7`7pl١ixH HowPّ@m5M=\('9mk6{.G`Q®,^(brO@ rW:);)436(-.>g%_RCzdNyL]Xu@2M6qdD+cEOؼAd2ɛr+Gۣyg$_B2xC.La-H@|cBqM8U9Np8 fD)##NChӕѕj<.ׯ[pC0OWo [EҙA`lOa 2nGVR id0L0(Ѣd|.=nX5(І>WÖ9_{[h29 yiȌ |E_NpEU(o]X"8*GKF/y䭓ݽZTދ}2x"`lYyIjj2HmrJ-J¡jQ 2K)ơq7ygL힓xJ7e8{%eYC4AjLC3]ɥB;#;Z6ǖwI*JݟbŃgO/݉ {sUohr?m#tKz\/xgs{eZ^tT蚋Cr9܏| +W>]#d"Ӗ!6GvϮSl; ݟyPӔb9򊎺*c DWogɲ{AolQ+{Oj8nO)|*i~p˔K+M 1c#VΟWH% µFx3+%VZMIVQr/HT8<:oCJz_ȇ >&X> ;ZO.<~#u3EI ]P]x-}Q+UߨOywsb4"ޗ$5+q~/Pۍ+O^n&oYYy8y|;9J[7Vn];VZ;+0Epڒ9.LfXӴ1qv%嵍sjVK;f;=< Io_{7W$N,9˅jv/"Y(? oYY`mI7IvMs8qcgF?Rx-ĕ]m["ׅp4z-Wg:,ǽDBff,"M4x%TN^)׫0SݺaY]{w<=!\n)OWfOL7GD Marcel Proust described a flood of unbidden memories evoked by the         ' 3332 O\taste of what must be the most famous cookie in the world, Prousts madeleine soaked in lime                 2 O]-  ' 3332 n]blossom tea. It is of course an experience of spontaneous recall. Judging by numerous thoughto                    2 ng-  ' 333 2 m2 ^onitoring studies, spontaneous recall is the norm in everyday thought. But because it is more                       ' 3332 Udifficult to study experimentally than deliberate recall, we know much less about it.l                2   ' 333 2   ' 333 2   ' 333z2 JIn this chapter we describe how a current theory of conscious cognition, g                  /2 lobal workspace theory,        ' 3332 %eleads naturally to a model of both deliberate and spontaneous recall. Deliberate recall is intended;                            ' 333v2 CGspontaneous memories are not. They can be divided into two categories:               2 Ch  ' 333 2 b  '- 3332 ,1. @"Arial- 2 D @"Verdana-2 ^ acceptable  333- @ !^-  -S2 0 spontaneous recall (ASR), like Prousts famous           :2 #rush of memories evoked by the          ' 3332 ^Xtaste of the madeleine. Such memories are interesting or pleasant or at least tolerable;                    2 p  '- 3332 ,2. - 2 D -2 ^unwanted 333- @ !u^-  -y2 I spontaneous recall (USR), such as painful traumatic events, an annoying g               ' 333^2 ^7recurrent melody, or a the memory of an unresolved argu           .2 ment with a loved one.     2 +  ' 333 2   ' 3332 h We therefore have three categories altogether, deliberate recall (DR), spontaneous recall that is                             ' 333_2 88acceptable (ASR) and unwanted spontaneous recall (USR).              2 8  ' 333 2 V  '-<@< NormalCJaJmH sH tH T@T Heading 1$<@&5CJ KH OJQJaJ R@R Heading 2$<@&56CJOJQJaJP@P Heading 3$<@&5CJOJQJaJJ@J  Heading 4$<@&5CJ\aJDA@D Default Paragraph FontZiZ  Table Normal :V 4 l4a _H(k(No List DD  Balloon TextCJOJQJaJTC@T Body Text Indent `CJaJFP@F Body Text 2 h`h OJQJaJFO"F Figures$da$5OJQJ^JZO1Z Figures Char*5CJOJQJ^J_HaJmH sH tH u2B@B2 Body TextxN@RN  Footnote Text$d1$a$aJ@&@a@ Footnote ReferenceH*`Or` Tables!$ dx`a$5CJOJQJ^JaJXOX Default1$7$8$H$!B*CJ_HaJmH phsH tH 2O2 CM20= B*ph2O2 CM21w B*ph2O2 CM2d  B*ph2O2 CM24F B*ph2O2 CM25 B*ph2O2 CM5d  B*ph2O2 CM22{ B*ph4O4 CM10 d B*ph2O2 CM27!; B*phHO"H .Text"$ d$a$CJOJQJaJTS@2T Body Text Indent 3#hx^hCJaJROBR Numbered list heading $ & F54O4 CM15%d, B*phLObL References&$E^`EPJaJ4U@q4 Hyperlink >*ph*W@* Strong5\.X@. Emphasis6]>'> Comment ReferenceCJ44  Comment Text+:j: Comment Subject,RY@R Document Map--D M OJPJQJBOB "m5 Text CharOJQJ_HmH sH tH L Aut ut #ututdjxpvt!!!!!!!!!!!!!!!!!!!!!!!!!!!!!5 djxop   HAB|[\D!("%r'*#.000313k5X7I;J;>"AGADDFF9G:GHHHHHJJMMZN[NOO6R7RU՜.+,D՜.+,$ hp  (St Jude Children's Research Hospitalo 3dHow deliberate, spontaneous and unwanted memories emerge in a computational model of consciousness;Figure 1: Contexts in Global Workspace Theory [Baars 1988]4Figure 2: Consciousness creates access [Baars 1997]QFigure 2 [Baars 1997] illustrates this universal access function of consciousnes%Voluntary and Non-voluntary Memories7Figure 3: Human Memory Systems (Franklin, et al, 2003)$ Conscious Software Agents1Conscious Software Architecture and Mechanisms Perception Memory Consciousness Action Selection Voluntary Action Learning Figure 4: IDAs Cognitive CycleQAnderson, J. R. (1990) The Adaptive Character of Thought. Hillsdale, NJ: ErlbauQBaars, B. J. (1988) A Cognitive Theory of Consciousness. Cambridge: Cambridge UQBaars, B. J. (1997) In the Theater of Consciousness. Oxford: Oxford University QBarsalou, L. W. (1999) Perceptual symbol systems. Behavioral and Brain Sciences@Bartlett, F.C. (1932) Remembering, Cambridge University Press.QBroadbent, D. E. (1958) Perception and Communication. New York: Pergamon Press.LDennett, D. C. (1991) Consciousness explained. Boston: Little, Brown & Co.QDennett, D. C. (2001) Are we explaining consciousness yet? Cognition 79:221-237@Edelman, G. M. (1987) Neural Darwinism. New York: Basic Books.QEdelman, G. M., and G. Tononi. (2000) A Universe of Consciousness. New York: BaQEichenbaum, H. (2002) The Cognitive Neuroscience of Memory. Oxford: Oxford UnivQFahle, M., and I. Daum. (2002) Perceptual learning in amnesia. NeuropsychologiaQFiske, S. T., and S. E. Taylor. (1991) Social Cognition, 2nd ed. New York: McGrQGlenberg, A. M. (1997) What memory is for. Behavioral and Brain Sciences 20:11@Gray, J. (2002) The Sound Of One Hand Clapping. Psyche 8:811.QJames, W. (1890) The Principles of Psychology. Cambridge, MA: Harvard UniversityQJohn, E. R. (2001) A Field Theory of Consciousness. Consciousness and CognitionLKanerva, P. (1988) Sparse Distributed Memory. Cambridge MA: The MIT Press.QKanwisher, N. (2001) Neural events and perceptual awareness. Cognition 79:89-11QLlinas, R. R. (2001) I of the Vortex: from Neurons to Self. Cambridge MA: MIT P6Lyvers, M. (1999) Who Has Subjectivity? Psyche 5:31.LMaes, P. (1989) How to do the right thing, Connection Science 1:291323.QMcGeoch, J.A. (1932) Forgetting and the law of disuse. Psychological Review, 39FMinsky, M. (1985) The Society of Mind. New York: Simon and Schuster.QMitchell, M. (1993) Analogy-Making as Perception, Cambridge MA: The MIT Press7Mller G.E. and Pilzecker A. (1900) Z. Psychol. 1, 1.QNegatu, A., T. L. McCauley, and S. Franklin. in preparation. Automatization for QNewell, A. (1990) Unified Theories of Cognition. Cambridge, MA: Harvard UniversiNPanksepp, J. (1998) Affective Neuroscience. Oxford: Oxford University Press.QSchacter, D.L., (1996) Searching for Memory: The Brain, the Mind and the Past, ?Seashore, C. (1967) The Psychology of Music. New York: Dover.LTaylor, J. G. (1999) The Race for Consciousness. Cambridge, MA: MIT Press.KTulving, E. (1985) Memory and consciousness. Canadian Psychology 26:1-12.QWaugh, N. C. and Norman, D. A. (1965) Primary Memory. Psychological Review, 72:QWegner, D.M. (1994) Ironic Processes of mental control, Psychological Review,;Zadeh, L. A. (1965) Fuzzy sets, Inf. Control 8:338353. Title Headings2 8@ _PID_HLINKSAQZ5http://psych.pomona.edu/scr/ED_Sep02_IDAFreeWill.htm5 UYYo[p[s]t]^^``cce+e$i%ijjllqqrrruuww~yyy||vhpiҍӍĐՐЗїM\P]o+,klKL<='()QR>&';<9M'NM^nQ4 { Z[%&}~$%|}z{129:uvEFx y "!#!0"1"""##@$A$$$S%T%%%&&/'0'''((((9):)))Q*R*****O+P+++l,m,,,1-2---....//000011f2g2334444q5r5 6 6)7*777888899::::D;E;;<p<q<<<====+>,>>>s?t?@@@@AABBKBBB|C}CLDMDDDEEsEtEOFPFFF)G*G}G~GHHHH1I2IIIJJVKWKKKLLMMN NNNNNOOOO1P2P~PPPPYQZQQQ~RRSSSSSSh?hhh9i:iiijjjj$k%kkkllllPmQmmmlnmnnnoooopRrEtFtHtItKtLtNtOtQtRtStrtstvt0h00"0"0"0"0"0"0 "0 "0"0"0"0"0000000 0 0 0 0 0 0 080\000D0D0D0D0D0D0D0D0D0D0D0D0D0D0D00"A0"A0"A0"A0"A0"A0"A0"A@0@0H@0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H0H(0H0e0e0e0e0e0e0e0e0e0e00r0r0r0r0r0r00y0y0y0y00h0h0h0h0h00Đ0Đ0Đ00ї0ї0ї0ї0ї0ї0ї0ї0ї00]0"0"0"0"0"0"0"0000 000000 000 00 00 00 0#0 0 00 00 00 0000000000000000000"000000&0&00&0&0&0r&0r&0r&0r&0r&0r&0r&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0c&0c&0c&0c&0c&0c&0c&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0&0(&0&0Q(&0Q(&0Q(0Q(&0Q(&0Q(&0Q(&0&0*&0&0^*&0&0*&0*&0*&0*&0*&0&0<,&0<,&0<,&0&0*-0*-0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-0*-&0*-0*-&0*-&0*-0*-0*-0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0*-&0&0;&0&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0/<&0&0C&0C&0C&0&0D&0D&0D&0D&0D&0&0GF&0&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0F&0&0M&0M&0M&0M&0M&0&0eO00O&0O&0O&0O&0O&0O&0O&0O&0O0O0O0O&0O&0&0S&0&0`S0&0S&0S&0S&0S&0S&0&0T&0T&0T&0&0U&0&0U&0U&0U&0U&0U&0&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0zW&0&0a&0a&0a&0&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0 b&0&0of&0of&0of&0of&0of&0&0Xh&0Xh&0Xh&0Xh&0Xh&0Xh&0Xh0Xh0Xh&0Xh&0Xh&0Xh0Xh&0&0l&0&0]l&0]l&0]l0]l0]l0]l0]l00@n&0@n&0@n&0@0@000@0h00@0h00@0h00@0h00h00\0p0HP op   H000313vt{00w{00y000y00y00y00y00y00y00y0 0{0 0 y0 0y0 0{00{00  r/yR/:Qzu|)2Ur՘&4 E'06@tG*OW\cGl%sK|u|t|$1.2c2ut^X#:O"$8j͝xjor~و:*"$Ly^W鱴ImKdb$E.aI=f΁s{6w g#%2$7_T2!O1 0e0e     @  5% 8c8c     ?A)BCD|E||# "0e@@@       @ABC DEEFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `abN E5%  N E5%  N F   5%    !"?N@ABC DEFFGHIJK5%LMNOPQRSTUWYZ[ \]^_ `ab@.( 'Q '    N{;39A? 1? #" `t  0A? 1?#" `  f2bA0o?MemoryDiagramTanBackgrdS"`  pA ? ??.`TT`TT3"`?B S  ?p|Hutu a4@I ]!4Q^"4 $8` OLE_LINK15 _Toc78292798 _Toc78292886 OLE_LINK75 OLE_LINK113 OLE_LINK114 OLE_LINK112 OLE_LINK92 OLE_LINK76 OLE_LINK77 _Toc78292796 OLE_LINK2 OLE_LINK3 OLE_LINK29 OLE_LINK30 OLE_LINK13 OLE_LINK14 OLE_LINK55 OLE_LINK58 OLE_LINK87 OLE_LINK90 OLE_LINK46 OLE_LINK47 OLE_LINK9 OLE_LINK10 OLE_LINK48 OLE_LINK80 OLE_LINK101 OLE_LINK103 OLE_LINK27 OLE_LINK28 OLE_LINK70 OLE_LINK71 OLE_LINK73 OLE_LINK74 OLE_LINK51 OLE_LINK52 OLE_LINK19 OLE_LINK41 OLE_LINK42 OLE_LINK65 OLE_LINK69 OLE_LINK20 OLE_LINK11 OLE_LINK12 OLE_LINK45 OLE_LINK22 OLE_LINK23 OLE_LINK24 OLE_LINK104 OLE_LINK105 OLE_LINK8 OLE_LINK108 OLE_LINK109 OLE_LINK17 OLE_LINK18 OLE_LINK37 OLE_LINK38 OLE_LINK67 OLE_LINK68 OLE_LINK82 OLE_LINK83 OLE_LINK5 OLE_LINK56 OLE_LINK57 OLE_LINK106 OLE_LINK107 OLE_LINK81 OLE_LINK84 OLE_LINK39 OLE_LINK40 OLE_LINK78 OLE_LINK79 OLE_LINK110 OLE_LINK111 OLE_LINK4 OLE_LINK31 OLE_LINK32 OLE_LINK91 OLE_LINK102 OLE_LINK33 OLE_LINK34 OLE_LINK35 OLE_LINK36 OLE_LINK53 OLE_LINK54 OLE_LINK88 OLE_LINK89 OLE_LINK63 OLE_LINK21 OLE_LINK6 OLE_LINK7 OLE_LINK61 OLE_LINK62 OLE_LINK85 OLE_LINK860 M6R6R6R U@aaaex x ##S%S%/'/'''(())O+O+,,,/////g2g2g2 6 6 6)7)7=>>@@KBKBKBKBBBF)G)G}G}G}G}GVKVK1P1PPPQ=T=TTT$V$VXXXX^X^X^Xceeeeoovt   !",-#$%&'()*+120./34567<=89:;>CDAB?@EFGHIJKLMNOPQWXRSUVTY\]Z[^_D M_R```aac*eaa[![!R"R"##-&-&S'S'''J)J)k*k*,,,/////222r5r5?7?75888=>>@@_B_B C C~F~FFGG]I]I"J"JKKPPPPQTT U UWW"X"X_X;a;ascscldffQoQoppvt,5our+{+i,q,2-:-H/P///c1o133t7}7p;y;<!<>>J%JJJ6L;LuL}LLLMNNNNOVV9VAVYV`VVV&Z-ZZZu\}\]]]]]]'^2^4_=_(`3`IaPaaabbc cddHdOdbdidddffMfUf\fdfff7t>tFtJtRtXtvvPwZwzzT{[{{{f|m|~~#~*~~~KUʁρсفx~ZdBJ̭խɺfmsz07%.&hpWYHOqx%8?`g@G.7;=fm.5:A18    [ ` PW[`iq&+{#2:RZ9Cbj !)_hyEOajFPy      ""1"8"c#k#####A$J$]$g$8%F%T%[%%%%&&&&&0'7'D'L'''''''((g)u)))R*\* ++P+Z+=,I,T,\,,,,,,,-"-Q/[/t/{/}//00Q1U1^1c1w11223 3(3033324944455)8.8b8l888R9Y99999:":K:Q:::::::E;L;Y;`;<<%<*<q<y<==,>3><>B>_>f>>>??E?k?q?t?x?????(@1@=@K@[AbAnAuAAAAA,B3BaChCEEEEEEEEEEPFXFaFgFpFwFFFFF*G3GGGGGIIIIIIIJJJWK]KKKKLLL#L*LLLLLM'MMMqNuNNNNNNNOONOTOaOeOhOlOmOpOOOOOOP2P6PPPPPPPZQ`QQQRRiRqRRRSS?SJSSSSSSS-U3U@UDUGUKULUOU`UfUpUyUUUUU$V*VaVoVWWXXY)YUY[YdYlYYYYYZ[[[\\]] ^^^^S_V_q_u___J`O`^`h`q`z`aa+a4aaabbbb/c:cCcQcbcicccccccHdNdddcefeeeeeff(f1fNfXfffffvg|ggg?hFhhh:iAiJiOiii'j.jEjOj]jejjj?kIkkk%l0l1l9ljlolplzlmnGnKnRnYn{nnnn-o1oBoJoooooDpNpOpWppppFtFtHtHtItItKtLtNtOtQtRtStvtxHR6688::^BaB]^bc(dk>F 23#[&ABgm7<  252[\t&z :k*37 Plt:@Zdy  #!U!!"1"L"M"d"e"""#H#####$Z$g$$$$7%h%o%%'&&&0'M'V']''''l(((()J)N)))))*D*E*P*k*t****++7+d+j+++++m,,,,,,,-D-H----...2.../|///+080S00001d111111e2g222222 3331323b3Q4U4445555 6'6b6j6?7J7788/80888888 9Z9~99999::R:[:a::::;E;a;<+<4<7<<<<<<<==Z======,>g>>??*???@2@;@<@@@AABB_BcBBC CCYC{CCC^DaDDD'E+EPFxFFF=GFG~GGGG,H8HHHHHH0I2IWIIIIIIIIJJpJJJJJWKKK+LMMaMMM N N?N@NpNNNNO(O+OOO PP@PDPPPPQjQxQQR'R*RbRrRRR;S?SSST TOTSTTTTT UUUUUUUU$VPVQVSVaVVVWWWWWWX"X.XXXYYvYzYYZ[[]]$^'^^^{__J`{`a5aaabbbbsc~ccd ddHdfdgdddddd&egeeef2f;f>fffffggRgghidigiiiiijPjYj\jjj%kJkSkVkkkk{lllm mlmwmnnnnnnoKoLoooooppFtFtHtHtItItKtLtNtOtQtRtStvt3333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333=' z&&m((--q/}/00/2g233L9[9\uIʨa.h^`.h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH..|.^.`|o(. ^`hH. L^`LhH.   ^ `hH. RR^R`hH. "L"^"`LhH. ^`hH. ^`hH. L^`LhH.h ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.wPO3uIr         X7                 m5P7^B7)FoG$W)Hj%VyJ]9aVQVLK_wh?)vt''@^^$P^^utP@Unknown Bernard Baars Gz Times New Roman5Symbol3& z Arial7&  Verdana3z Times[ Lucida GrandeCourier NewS PalatinoBook Antiqua;" HelveticaK1   MS Gothic-3 0000 1hRuFRuF7979!4doo42qP?2c How deliberate, spontaneous and unwanted memories emerge in a computational model of consciousness Stan FranklinUma Ramamurthy