OPTICAL IMAGE SCANNERS AND CHARACTER RECOGNITION DEVICES: Amar Gupta

advertisement
OPTICAL IMAGE SCANNERS AND CHARACTER
RECOGNITION DEVICES:
A SURVEY AND NEW TAXONOMY
Amar Gupta
Sanjay Hazarika
Maher Kallel
Pankaj Srivastava
Working Paper #3081-89
Massachusetts Institute of Technology
Cambridge, MA
02139
ABSTRACT
Image scanning and character recognition technologies have matured
to the point where these technologies deserve serious consideration
for significant improvements in a diverse range of traditionally
paper-oriented applications, in areas ranging from banking and
insurance to engineering and manufacturing.
Because of the rapid
evolution of various underlying technologies, existing techniques
for classifying and evaluating alternative concepts and products
have become largely irrelevant.
A new taxonomy for classifying
image scanners and optical recognition devices is presented in this
paper.
This taxonomy is based on the characteristics of the input
material, rather than on speed, technology or application domain.
2
1.
INTRODUCTION
The concept of automated transfer of information from paper
documents to computer-accessible media dates back to 1954 when
the first Optical Character Recognition (OCR) device was
introduced by Intelligent Machines Research Corporation [1].
By
1970, approximately 1000 readers were in use and the volume of
sales had grown to one hundred million dollars per annum [3].
In
spite of these early developments, through the seventies and
early eighties scanning technology was utilized only in highly
specialized applications.
The lack of popularity of automated reading systems stemmed
from the fact that commercially available systems were unable to
handle documents as prepared for human use.
The constraints
placed by such systems served as barriers, severely limiting
their applicability.
In 1982, Ullmann [2] observed:
"A more plausible view is that in the area of character
recognition some vital computational principles have not yet
been discovered or at least have not been fully mastered.
If this view is correct, then research into the basic
principles is still needed in this area."
However, ongoing research in the area of automated
reading (conducted as part of the wider field of pattern
recognition) is leading to new products, and the market for
scanning devices has expanded dramatically.
Concomitantly,
there has been tremendous growth in the market for third-
llI
3
party scanning software, as well as software and peripherals
for specialized tasks such as handwriting recognition and
data indexing, storage and retrieval [3].
This paper analyzes the technology used in the image
scanning and character recognition industry and presents a
taxonomy for evaluating the capabilities of current systems.
Although the main focus is on optical scanning and character
recognition technologies, an attempt is made to identify
auxiliary technologies and products as well.
In addition,
the paper discusses future trends and characteristics of
systems which are likely to become available in the next ten
years.
Inclusive of this introductory section, there are nine
sections in the paper.
Section Two presents a discussion of
the principal recognition approaches and technologies.
The
third and fourth sections classify the scanning industry by
market segment and function respectively.
Section Five
discusses ancillary technologies such as scanning software,
data storage, indexing and retrieval products and
handwriting recognition software.
In Section Six, future
trends in products and technologies are discussed.
In
Section Seven, a new taxonomy is developed for evaluating
the capabilities of current scanning systems.
Section Eight
describes a set of representative scanners and applies the
4
taxonomy to judge their performance.
Finally, the
conclusions of the paper are presented in Section Nine.
III
2.
RECOGNITION TECHNIOUES
The recognition of text, the scanning of images, and
the raster to vector conversion of technical drawings have
usually been considered independently of each other.
The
technologies corresponding to these three areas must be
integrated in order to accurately scan and process complex
technical documentation.
In the case of most non -
technical applications, only the first two areas need to be
considered.
A framework that allows recognition of both
text and images is presented in this section.
The three major stages in the processing of a document
are preprocessing, recognition, and post-processing.
These
are discussed in the following subsections.
2.1
Preprocessing
Preprocessing is the conversion of the optical image of
characters, pictures, and graphs from the document into an
analog or digital form that can be analyzed by the
recognition unit.
This preparation of the document for
analysis consists of two parts: image analysis and filtering
[4].
The significance of these parts is described in the
following paragraphs.
(a) Image Analysis -
The first stage of image analysis is scanning [5,9,25].
Scanning provides a raster image of the document with
sufficient spatial resolution and gray scale level for
subsequent processing.
In the case of a picture or a graph,
the issue of gray scale level is more important that in the
case of text.
For text, this phase consists of locating
character images.
With the exception of high end scanners,
which employ contextual analysis as well, reading machines
are character-oriented.
Each character is treated as a
unique event and is recognized independently of other
characters.
This implies that the document must first be
segmented into distinct characters, and then the identity of
each character recognized separately.
The process begins with the optical system taking a
raster image of the area that is supposed to enclose the
character.
Alternatively, the raster image representing the
character is "cut out" of the image of the document.
In
either case, the image is transmitted sequentially to a
single-character recognition subsystem.
If the image, or
the information on the features of the character
constituting the image, possesses characteristics which are
significantly different from the characteristics maintained
by the character recognition subsystem, then the particular
area is deemed to be either an unrecognized character or
ill
noise.
Depending on the system, the output is
a flag or a blank.
expressed as
In some systems, any graphic or
character input which is outside the size limitations is not
flagged but skipped.
The formatted output, in such a case,
contains a blank zone corresponding to the input of the
improper size.
(b) Filtering
After the image is analyzed, filtering takes place.
Filtering minimizes the level of noise.
The latter may be
caused either in the source document or by the optoelectrical transformation mechanism.
The process of
filtering also enhances the image for easier recognition.
One filtering process that eases the extraction of the
features of the character in the recognition phase was
proposed independently by Lashas [5] and Baird, et al. [6].
They presented two OCR readers in which black marks
constituting the character are transformed into quantized
strokes.
Their approach is depicted in Figure 1.
Preprocessing:
New Approaches
The preprocessing phase consists of deriving a high
level representation of the contents of the image.
The
scanned document is seen as a set of blocks corresponding to
independent ways of representing information such as text,
line drawings, graphs, tables, and photographs.
t,-
u-~~~
At4
1a
ot-,;
a.
Is tr
A,
t .*
,
..Oa
w,44 f wltv
_#4*1
4I
w"O+RI
"NO&
.PP
- --- *--dB
ALM
CCR-A font numerals and horizontal and vertical
quantized stroke segments
-"
.C
. or
11111
_
=il
r-
i
11111t- d--
CCR-B font numerals and four detected directions of
quantized strokes
FIGURE 1: QUANTIZED STROKES
Lashas, A., et. al. "Optical Recognition Based On
Analog Preprocessing and Automatic Feature
Extraction". Computer Visin, Graphics and
Image Processinq.vol. 32. pp. 191 - 207.
III
understanding of this document involves the following:
(a) Identification of the major blocks of
information.
(b) Identification of the spatial relationships between the
different blocks (for example, the reading order must be
recognized so that the logical connections between different
blocks of text or graphics can be easily derived).
(c) Identification of the layout features such as the number
of columns, margins and justification.
(d) In the case of text, further identification of
headlines, footnotes and other similar characteristics.
Typically, the textual portion is first distinguished
from other information, and then columns of text are
recognized.
Next, these columns are split into lines of
text which are in turn segmented into single character
images.
A reader which is able to accept a free format document
was described by Masuda et al. [7].
Their scheme of area-
segmentation uses projection profiles obtained by projecting
a document image on specific axes.
Each profile shows the
9
structure of the document image from a particular angle.
The projection profile is very sensitive to the direction of
projection.
In order to check for skew normalization, the
image of the document is incrementally rotated and the
horizontal and vertical projection values are noted.
Through an analysis of the intensity of these values and an
examination of different areas, general text and headlines
are separated (Fig. 2).
Another reading system based on
this approach is described by Kida, et al.
8].
Commercial system today require areas to be manually
segmented [2,5,7].
While segmentation methods are fairly
rudimentary in low-end scanners, methods that permit the
operator to define several text and graphics "windows"
within a page are available on high-end products.
These
methods include the use of a mouse or a light pen to define
text, graphic, or numerical zones.
2.2
Recognition
Recognition occurs at the level of characters in most
commercial page readers.
However, high-end scanners are now
complementing character recognition with sophisticated
contextual analysis.
Techniques used for character
recognition and contextual analysis are discussed in the
following paragraphs.
I
I
I
II
__.·._ __
"a
_
_--
_
_~
_w=
__i__
==
_ - ==
nm
_-
~mWmm~
_
-_ dS
-
.r__ --,
Lw
-
.
_ .4mg
-r~·a
mmi iIii
__-J. ii--a
_
-
-
5-
m am
-
__
'" N
~--
cs,~~_
-
3E3
._
-.
_
'~
- ,.mm
¢ws-_mm,^-
, E_* ps
W
Projection Profiles
Text
line areas extraction
FIGURE
Ma suda,
Read,--
and
':
'
? ~
r--n
SEPARATION OF TEXT
-I.
"Approach to a Smart Document
F? Conference on Computer Vision
Recognition. 1985. pp. 550 - 557.
S0
10
Character Recognition
The character recognition problem is essentially one of
defining and encoding a sequence of primitives that can
represent a character as accurately as possible.
The most
common approaches to character recognition are:
(a) template matching, and (b) feature extraction [9].
(a) Template Matching Technique
Among the oldest techniques for character recognition,
template matching involves comparing the bitmap that
constitutes the image of the character with a stored
template [9].
The amounts of overlap between the unknown
shape and the various stored templates are computed, and the
input with the highest degree of overlap is assigned the
label of the template.
The primitive in this case is a very simple function
that assigns one value to a point of the bitmap if it is
black, and another if it is white
5,9,25].
The performance
of different readers using this technique depends on the
decision algorithms.
This method offers high-speed
processing especially for monofont pages.
Even in the case
of documents containing several fonts which are extracted
from a limited set of fonts of a given size, this technique
can be very effective.
Moreover, this method is relatively
immune to the noise generated during the opto-electrical
Ill
11
transformation.
However, this method is less effective in the case o
unknown fonts, multiple fonts and multisize characters.
Further, it imposes constraints on the format of the page in
areas such as the spacing of the letters and the position of
the text.
If these constraints are relaxed, template
matching becomes slow and costly, because of the need to
translate, scale, and rotate input images.
(b) Feature Extraction
In contrast to the template matching technique which
emphasizes the importance of the overall shape, the feature
extraction approach focuses on the detection of specific
components of the character [5].
This approach assumes that
local properties and partial features are sufficient to
define every character.
Feature extraction techniques identify local aspects
such as pronounced angles, junctions and crossing, and
define properties such as slope and inflection points.
In
one method of recognition, a boolean or a numerical function
that characterizes each feature is calculated and then
applied to the given image [5,7].
Another method involves
defining a partial mask that can be systematically
positioned on the pattern [7].
In a more recent strategy,
12
recognition is based on the analysis of the direction and
connective relationships of the strokes of the character
[7].
Structural Analysis Methods
The use of structural analysis methods is a recurrent
theme in the literature
[1,4,5,6,7,10].
These methods
frequently utilized in commercial reading machines.
are
Each
character is defined as a set of topological primitives such
as strokes, segments, holes, and arcs, and these machines
analyze the characteristics of the scanned inputs to detect
such primitives.
Isolated, unbroken characters are first recognized
using a structural description
9].
These descriptions are
independent of the position and the size of the character.
The shape is then parameterized so that the results of the
structural analysis can be compared with a stored list of
shapes.
Next, the shapes are clustered to discriminate
between characters and to classify them.
The power of
structural analysis depends of the number of features of
each character used by
he system.
An example of the
structural analysis -f a character is shown in Figure 3.
I*
II[
C4
]
lm
C
'O
4
Lu.
0
C
0;
Co
+
)
-i
f4n
a
(A
I
oL
K
a-
0z
4n
xI-.
0
m
I)
U,
0
rr
(3
U)
U.
0i
LU
0
0
I)
O
0
0_
LI I
La
(n
13
Character Classification
So far, the discussion has centered on single
characters in a single font.
Most documents contain
multiple characters with considerable variation across
fonts.
A statistical approach is used for dealing with
these variations.
In reading machines equipped to handle
multiple fonts, tests of character recognition are based on
statistical data constituted by a training set and a test
set.
When the term "omnifont" is applied to a reader, the
implication is that the reader has been trained on a large
set of fonts [6].
Feature extraction is generally complemented by
classification. In order to be classified, characters have
to be discriminated from each other.
The classifier is
designed to construct a discriminant function underlying a
complex probability distribution, taking into account the
non-linear variations in the characters [26].
The two essential steps in recognition - feature
extraction and classification - have different optimization
criteria.
It is felt that feature extraction should be
optimized with respect to the reconstruction of the
character, while classification should be optimized with
respect to recognition
4].
Consequently, feature
extraction should not be directed towards recognition
14
through definition of features that minimize the
classification process.
Classifiers are usually adapted to different fonts by
the manufacturer.
However, some machines provide a
classifier which allows for the adaptation of new fonts by
the operator.
An on-line training capability for multifont
recognition can also be provided
4].
This concept of
trainability is similar to that employed in modern speech
recognition systems, which overcome the variability of voice
between speakers by requiring that adaptation be performed
during a training phase prior to regular operation.
The
main disadvantage of trainable systems lies in their slow
training speed, as the training set contains several
thousands of characters.
Limitations of Current Recognition Techniques
Ideally, feature extraction techniques should be able
to generate a set of characters that are independent of font
and size.
However, the wide variety of fonts encountered in
office environments results in a huge number of possible
characteristics.
Furthermore, ambiguities occur due to the
similarity in the features of different characters across
fonts.
For example, the distinction between 1 (one
, I
(capital I) and 1 (el) across and even within fonts is not
obvious.
Moreover, there are a number of characters which
15
cannot be correctly identified without further information
about their size or position.
For example, the character
"O" (capital o) in one size corresponds to the lower case
"o" in a larger size;
further, this character is the same as
0 (zero) in several fonts [11].
The user can control the accuracy of the system by
adjusting the error and reject rates [12,25].
The error
rate is the percentage of the characters in a document that
are incorrectly identified by the system.
The reject rate
is the probability that the system cannot identify a
character at the desired level of confidence (i.e.,
if the
reject rate is 5%, the system will flag 5% of all
characters, on the average, as being unrecognizable).
Clearly, there is a tradeoff between the error rate and the
reject rate - if a lower reject rate is selected, the error
rate will increase and vice versa [12,25].
Consequently, a
reader may possess a very low error rate, but it may flag or
reject every character that does not offer a high
probability of correctness as defined by the decision
algorithm (13].
There is naother aspect to accuracy.
For example, a
reader may recognize the characters in "F16" correctly, but
then flag them as rejects because the word is not in its
built-in dictionary.
Also, the inability of readers to
16
distinguish between ambiguous characters such as "I"
(capital ai),
"1" (el) and "1" may or may not be considered
to be an error.
The error rate of the entire recognition process is
dependent not only on the functioning of the single
character recognition subsystem but also on the level of
preprocessing [12].
For example, different kinds of
segmentation errors may occur, and lines of text may be
missed or misaligned in the case of a document containing
several columns.
Situations involving such missed or
misaligned lines can be minimized by preprocessing
(described in Section 2.1).
With respect to performance evaluation, character
recognition is sometimes deemed to be a branch of empirical
statistics [4].
There is no reliable way of modelling the
accuracy of a reading machine except by comparison with a
standard set of norms.
The impracticability of statistical
modelling is due to the fact that the pattern generating
process and its multivariate statistics are influenced by a
number of barely controllable, application-dependent
parameters.
Recognition techniques are prone to ambiguities, apart
from involving heavy computation.
The sole reliance on the
17
physical features of the characters results in a high rate
of errors and rejects.
To combat this problem, recognition
methods are complemented by contextual and syntactical
analysis aided by customizable lexicons, especially in highend systems [9,11,13].
In the case of low quality documents with different
kinds of noise and broken and touching characters, the error
rate is high.
Contextual analysis becomes a necessary
condition for reducing the rate of errors and rejects in
such situations.
Separation of Merged Characters
The breaking of images into character blocks is based
on the assumption that each character is separated by
horizontal or sloped line of blank spaces.
However, in the
case of tight kerning, inadequate resolution of the scanner,
poor quality of the document, or high brightness threshold,
adjacent characters spread into each other.
Separating
merged characters involves the following three processes:
(a) Discriminating multiple characters from single character
"blobs";
(b) Breaking the blobs into components that are identified
as single character blobs;
(c) Classifying the different characters and deciding
18
whether to accept or reject the classification.
Defining a set of criteria for distinguishing between
adjacent characters is difficult because of the many ways in
which characters merge together and the fact that merged
characters contain misleading strokes.
Separation of
characters is a computationally intensive task that
significantly slows down the overall recognition process
[2,4,8,121.
Separation is usually possible in a limited
number of cases and for pairs of characters only.
Contextual Analysis Techniques
Contextual analysis is of two types: layout context
analysis and linguistic content analysis
9].
The former
covers baseline information on the location of one character
with respect to its neighbors.
For example, it generates
formatting information and is usually language-independent.
Linguistic analysis on the other hand involves the use of
spelling, grammar and punctuation rules.
For example, a
capital letter in the middle of a word (with lower case
neighbors) is not accepted.
Layout context analysis
capabilities are available on several systems available
today.
However, only the high-end systems offer some degree
of linguistic analysis capabilities.
19
Dictionary Lookup Methods
Several contextual methods for word recognition are
based on the analysis or comparison of a word or string of
characters with stored data for type and error correction.
Spelling checkers are commonly used to complement character
recognition devices [13].
Such checkers may be part of the
recognition software, or they may be part of the text
composition software that the operator uses for correcting
the processed document.
In either scenario, when the size
of the dictionary is large, the search time can be very
long.
Furthermore, if the contextual information is not
considered, the scanned word may be incorrectly converted
into some other word (13].
Several high speed correction
methods use the concept of "similarity measures", which are
based on the fact that most errors are due to character
substitution, insertion, or deletion [22].
The similarity
between two words (the correct word and the garbled word) of
equal length is measured using the Hamming distance.
The
Modified Levenstein distance [9] generalizes the similarity
measure for substitution, insertion and deletion.
The
minimization of this distance forms the optimization
criterion.
Tanaka [14] proposed two methods that yield 10 -
35% and 35 - 40% higher correction rates than a typical
dictionary method and reduce computing time by factors of 45
and 50 respectively.
One of these methods is based on the
assumption that different characters can be classified into
III
20
classes or groups that are independent of each other, so
that a character in one class is never misrecognized as a
character in another class.
This categorization helps to
significantly reduce the probability of errors.
Use of Statistical Information
The frequency of occurrence of different characters
varies widely.
For example, the letter "e" has the highest
frequency of appearance in an English document.
Also, the
letter "t" is the most frequent first letter of a word, and
the letter "q" is always followed by a "u."
Further,
several sequences of character combinations are more likely
to appear than others.
The frequency of occurrence of a
character within a given string of text can be efficiently
modeled by a finite-state, discrete-time Markov random
process [22].
The use of statistical distributions of
different combinations of N characters (N-grams) allows the
implementation of error corr
Viterbi algorithm.
tion algorithms such as the
According to Hou
9], this algorithm can
reduce the error rate by one half.
Linguistic Context Analysis
Characters are primitives of strings constrained by
grammatical rules.
These rules define legitimate and non-
legitimate strings of characters.
Based on the recognition
of some words, the class (noun, verb, etc.) to which they
21
belong can be identified along with the applicable syntactic
analysis to identify misspellings, misplacements, and other
syntactic errors.
A string of words or a sentence can be
decomposed using a parsing tree.
There are several
efficient parsing trees for different types of grammatical
structures [9,12,15].
Syntactic analysis assumes that the text is constrained
by one type of grammar.
all cases.
This assumption need not hold in
Several technical documents contain uncommon
words: serial numbers, technical words, and abbreviations.
Such situations require interaction between the technical
operator and the system, or the use of dictionary lookup
methods.
Except in such special situations, linguistic
context analysis techniques are well suited to the task of
identifying and correcting reading errors [15].
Future of Recognition Technology
Conventional techniques for character recognition based
solely on geometric or analytical properties are not
sufficient to accurately process complex documents at high
speed [22,25].
While the use of contextual analysis
improves accuracy, it does not increase processing speed.
To improve speed, i- becomes necessary to simultaneously
analyze the document from several points of view.
For
example, one unit can analyze the image, another can
III
22
recognize characters, and a third can perform contextual
analysis of the text.
The use of a single recognition technique is
insufficient to solve all ambiguities encountered during the
recognition process.
As such, general algorithms must be
complemented with customized rules for special cases, such
as distinguishing letters that are easily confused (e.g.,
"o" and "0" and "6" and "b"), or recognizing characters
printed in pieces (such as "i",
"jn",
and ";").
Ideally, a
single process control unit should collect all the pieces of
information from the subsystems, order them, and then make
appropriate final decisions [4].
Such a strategy
(functionally depicted in Figure 4) allows the recognition
of different parts to be done in parallel.
2.3
Postprocessing
After the text and graphics are recognized, they must
be encoded for transmission to, and processing by, a word
processor, a graphic editor or a desktop publishing program
(5].
In the case of text, the image is most commonly
converted into the ASCII format.
In the case of graphics,
the storage requirements for the document vary greatly,
depending on the extent of compression.
The storage
capacity may pose a major constraint in some cases.
For
example, in systems which scan at 300 dots per inch (dpi),
one single 8.5" x 11" page requires over one megabyte of
Ia c
LU
I-
I
C;
C
,a-S
SW
GS.
*r
LI
C
S_ ,"
z
I
AFq
Iw
op*,r
O
v
CC
LU n CC
mC
,;0,
.2.
_ __S.
E
C
C
S
)
0
m
-0
O3
LI.
0
Co
3c
C
h.
0.
a
0
'I;
a 0
b.
P cc
0 _
U'.S
L
0
ar)
0
S
o
O
IOL
L
_4
IS, \1
i
=
--
0
_)
;.
LU,,
*
S
&6
C
<LU
U)
I-
O
0
o'a
rC
W
0
co
cn
gC
a
t
._J
r-'---'t
!
U
o
c
x
:
-
uJm
_
w
C
K
U0o
P
E
-)1
o
0
Q
23
memory if stored in raw bitmap format.
While the advent of
optical disks with storage capacities in gigabytes tends to
mitigate the storage problem to some extent, it is usually
desirable to use more efficient storage strategies.
24
3.
CLASSIFICATION OF SYSTEMS
For analytical purposes, the scanning industry can be
divided into four segments: (a) Low-end scanners; (b) Highend scanners; (c) Integrated systems; and (d) Software.
The
characteristics of each segment are explained in the
following paragraphs.
(a)
Low-end scanners
These are small scale systems, usually desktop-based
with relatively low sophistication in dealing with page
scanning and image processing applications (1].
They are
dependent on a host computer system for processing and
storage (commonly an IBM personal computer or a Macintosh).
The capabilities of these systems are enhanced by third
party image and text processing software that is generally
executed on the host computer.
Low-end scanners are either automatic feed or flatbed,
and can handle between 20-100 documents per minute (or 20-50
pages per minute).
The recognition technology tends to be
simple - generally the matrix matching technique is used.
Costs are low, ranging from $1,800 to $7,000.
cost averages around $2,000 [3].
The software
These scanners are geared
towards low volumes (10 - 100 pages or documents at a time),
and relatively low accuracy (1 - 10 letters per page misread
II1
25
or flagged for error on the average).
The Scan-Optics Easy-
Reader 1720 and the Datacopy 730 are examples of popular
low-end scanners.
Most of these machines can scan a page or a portion of
a page as an image or as characters of text, depending on
the intent of the user.
In some cases, the user can specify
which zones within the input page contain text and which
zones include graphic images.
Some of the systems use
separate phases for scanning text and images respectively.
Hand held scanners have entered as the lowest end
products in the scanner market
3].
These usually offer
limited page and text reading capabilities without requiring
any additional software.
They are either plugged directly
into the personal computer like a keyboard or linked by a
simple interface (such as a parallel card).
They are
transparent to the host computer, its operating system,
its application software.
and
The volume handled is very low,
because of the need to physically move the scanner with the
hand.
The scanning speed
ranges from about 50 to 200
characters per second, and the number of
limited to 5 or 10.
$1000) [161.
onts recognized is
Their costs are quite low ($200 -
The Caere Corp OCReader is an example of a
widely used hand-held scanner.
26
(b)
High-end scanners
These are large, sophisticated image/page/document
processors with stand-alone or host based capabilities [1).
They offer mature hardware and software devoted to the tasks
of text recognition and image scanning.
These systems
include sophisticated dedicated processors, editing and
correction workstations, as well as customized recognition
software that uses sophisticated techniques like feature
extraction [30).
They support their own storage systems and
can be readily integrated with other common systems.
High-end scanners feature multi-font and multi-size
flexibility to handle multiple fonts and multiple sizes
along with automatic feeding capability that can cope with
high volumes.
Large numbers of documents (1,000-10,000) can
be accurately processed at high speeds (200 or more pages
per minute or 750 or more documents per minute).
Costs
range from $15,000 upwards with the median falling between
$25,000 - $30,000 [16].
Examples of high-end scanners
include the Calera CDP Series and the Kurzweil family of
scanners.
(c)
Integrated Systems
These systems serve as automated image processing
facilities for the office, and are designed to network with
-
III
27
the existing computer and communications facilities.
A
typical system, controlled by a common operating system such
as UNIX, consists of an enhanced office network that
provides multi-media, multi-user, and multi-tasking access
to its diverse resources
171.
An integrated image system offers various data entry
facilities such as optical character recognition devices
(both low and high end), image scanners, keyboard
workstations and facsimile equipment.
The system is usually
managed by a dedicated processor (a mainframe or a
minicomputer), although LAN-based systems are becoming
increasingly popular.
The processor is procured from a
vendor, or the system is configured to operate within the
existing computational facilities.
Data storage is
centralized and is accessible from all the workstations.
Software is executed either on the processor or on a
decentralized basis [17].
Typically, an integrated system will support a variety
of software packages, including "off the shelf" word
processors, database and statistics programs, and other
professional software tools.
Similarly, at the output level
there is support for a variety of printers, monitors, and
facsimile equipment.
28
Several integrated imaging systems are available,
including the Scan Optics ScanEdit 3200, the Wang Integrated
Image Processing System, and the DRS 4000.
IBM has
announced its own system, the Image Plus, which is expected
to be released in 1990.
Figure 5 provides a schematic
representation of a typical integrated imaging system.
This
paper does not offer a detailed treatment of integrated
systems, as they represent an amalgamation of new imaging
technology with conventional computing and communications
power, rather than a new technological innovation.
(d)
Software
Third party software tools offer powerful scanning and
processing capabilities for both images and text.
As
mentioned earlier, they are substantially enhancing the
capabilities of low-end scanners.
In addition, software
packages utilizing new approaches from areas such as
database management, expert systems and neural networks are
being developed for specialized applications [1].
Most
packages are compatible with the popular desktop scanners as
well as with Macintosh and IBM personal computers.
The orientation of this paper precludes a detailed analysis
of software products.
However, Section Seven provides a
brief treatment of currently available products.
III
0n
(00
* 0
44
41
D-4A
a:'
Z c
zo
UA X
X
L <K
0
0e
az
tit
C
0 a
z
Ul
a" a
(jo
co
.
I
I0
o
cc
0
(.
zLU
z
I-
C
L-
I
0.
0
0
P
4II-
-]
0O
LL
0OC
to-0,
o
z
o
CC"
0
0 0
Q
00
a-
c
40
0
0
O
=
I0 0
cc
(L
:I
z
I
0
4c
Ibe
o
3.
29
4.
FUNCTIONAL CLASSIFICATION OF MACHINES
Apart from classifying products by market segment, it
is feasible to classify the image and character recognition
industry by function.
Thus, "reading machines" can be
divided into four major categories: (a) Document Readers;
(b) "Process Automation" Readers; (c) Page Readers; and (d)
Image Readers.
These groups are described in the following
paragraphs.
(a)
Document Readers
This category of readers was the first to be
introduced.
Developed during the sixties and seventies,
these machines are oriented towards transaction processing
applications such as billing and form processing [4,8,251.
In earlier machines, the source document was prepared in a
rigid format using a stylized type font and the character
set was limited to numeric characters plus a few special
symbols and sometimes alphabetic letters.
Contemporary
machines have greater flexibility in font recognition and in
coping with material of poor quality generated by high speed
printers.
The speed of processing is very high, typically
between 400 and 4000 characters per second.
An important
feature is on-line correction with the help of bitmaps of
unrecognized characters.
30
(b)
Process Automation' Readers
The main goal of these readers is to control a
particular physical process
sorting of postal letters.
4,8,9,25], such as automatic
Since the objective is to direct
each piece of mail into the appropriate sorting bin, whether
or not the recognition process results in the correct
decision for every single character is not critical in this
case.
Since a reader of this type is
designed with specific
applications in view, it is not explicitly considered in
this paper.
However, the class of integrated systems
discussed in Section Three above is capable of performing
"process automation" functions.
(c)
Page Readers
These reading machines were originally developed to
handle documents containing normal typewritten fonts and
sizes (4,8,9,25].
Initially intended for use in the
newspaper and publishing industries, these machines were
designed with the capability to read all alphanumeric
characters.
Until the late seventies, devices of this type
were quite restrictive in terms of their requirements for
large margins, constrained spacing, and very high quality of
printing.
Further, they accepted only a small number of
specially designed fonts such as OCR-A and OCR-B.
The
reading speed for a monofont page was several hundred
characters per second and the price of the machine itself
31
was around one hundred thousand dollars per unit.
The above
situation was significantly altered by the introduction of
the Kurzweil Omnifont Reader in 1978.
As its name implies,
this machine was able to read virtually any font.
Since
then, several other machines belonging to this category have
been introduced, and their capabilities have been
substantially enhanced. For example, in many cases the user
can specify the particular zones on the page to be read, and
the format of each zone.
another common feature.
On-line error correction is
In addition, prices have fallen
steeply to under twenty-five thousand per system.
(d)
Image Readers
These machines were originally designed to meet
Computer Aided Design (CAD) needs, and subsequently came
into more generalized use.
They capture items such as
drawings in the form of their mapped image and then
reprocess that image to generate an equivalent vector
graphics file.
The functional classification described above is fast
becoming obsolete.
As the matrix in Figure 6 indicates, one
of the main trends in the scanning industry is the
convergence of separate functions within a single system
[1,3].
One machine can now perform functions that
previously required multiple machines.
An equally important
II'
AL
LU
W
I- U)
ot
2
0
x
I-
z
0
LU
ICo
z
X
X
X
X
U)
Cz
Z w
LU Z
Zi
zZ
o
(0
U.
z
(I
Zr
z
U)
ot
n./
-J~n
Cl)
LU
I...
z
u.
Z
w
o
L
Z
Z
4
(n
Ji
cn
3
X
X
,=,~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Zr
Zc0~
I
Z3
z
LU
Ou
O w
Z
o-cn
un 2
E:
00
a
0
i .
mQtu~
LLDZOI--
WtLU
ja
LUW0c
wa
.ee
3U
OZ<(.
32
trend is the growth in the market for ancillary products
such as third party scanning software, storage-end devices
and data indexing and retrieval software
next section explores this trend.
3,17,18].
The
III
33
5.
ANCILLARY PRODUCTS
The rapid growth of the scanning market has been
accompanied by a proliferation of ancillary products.
These
fall into two broad groups:
(a) Low-nd Enhancement Products
This group consists of low-cost products which are
designed to augment the capabilities of low-end scanning
systems.
They interface with the scanner to perform one or
more functions of a high-end system.
Third party scanner
enhancement software and low-end interfacing devices fall
into this group.
(b) Complementary Products
This group consists of products which complement and
support the capabilities of scanning systems.
Storage-end
devices and software for specialized scanning applications
are examples of complementary products.
The following paragraphs briefly describe the trends
and products within each group.
5.1
Low-End Enhancement Products
These products emerged in response to the substantial
costs of high-end systems.
By performing one or more
34
functions of a high-end system, they enable relatively basic
systems to emulate high-end systems at lower costs.
Scanner
enhancement software and peripheral interfacing devices are
typical examples of this phenomenon, and are discussed in
the following paragraphs.
(a)
Third Party Scanner Enhancement Software
These are page recognition packages like OmniPage,
Advantex, OCR ReadRight and SPOT. They perform tasks such as
creating scanning templates, specifying key fields, spelling
and grammar checking, and separating columns, graphics and
text. Ranging in price from $600 to $4000
3],
these
relatively user friendly packages are compatible with most
popular scanners and support the more widely used word
processing, spreadsheet and image compression formats.
Although scanner enhancement programs enable users to
perform functions beyond the capability of low-end systems,
the claims of some vendors that these programs can replace
high-end scanners are only partially true.
In comparison to
high-end systems, such programs are slower and less
versatile in the number of fonts they can recognize.
They
are also less acurate, and are not very good at separating
columns, graphics and text.
However, they represent a
serious alternative for many users who do not need or cannot
afford a high-end system [16]. A good example is the desktop
III
-
35
publishing industry, where user friendliness is a primary
concern.
High-end system vendors have had relatively little
success in accessing this market, but third party packages
used with low-end scanners have been extremely popular.
According to International Data Corporation [18], overall
sales for these products have grown by 215% in the period
between 1986 and mid 1989.
(b)
Low-End Interfacing Devices
This group of scanner ancillaries is the hardware
equivalent of scanner enhancement software.
These products
are usually plug-in boards for personal computers, and they
interface with the host system and its low-end scanner to
perform high-end scanning functions.
Like scanner
enhancement programs, these devices enable users to
recognize text and graphics and "read" them into word
processing and other formats.
Specification of key fields
and template creation are also supported.
from $1000 to $5000
Ranging in price
[16], low-end interfacing devices suffer
from the same drawbacks as their software counterparts, such
as slower speeds and limited recognition of fonts.
5.2
Com1lementary Products
This group of products complement and support the
overall capabilities
f scanning systems.
Storage-end
hardware and data indexing and retrieval software are
36
included in this group. In addition, there are a number of
products which combine scanning technology with technology
from other areas to perform specialized scanning
applications.
One example of this trend is the advent of
neural network based programs for handwritten character
recognition
(a)
191.
Storage-End Devices
Scanning systems require much more storage space than
is available with traditional magnetic storage media [28].
Using an optical disk system with several gigabytes of
storage space is one way of meeting this need.
A survey by
Frost and Sullivan in 1989 [3] found that between 1986 and
1988, sales of optical disk systems grew by over 150%.
These systems consist of one or more optical disk drives
(usually Write Once Read Many or WORM drives) and sometimes
a "jukebox" to perform disk storage, retrieval, loading and
operating tasks [21].
However, these systems are very
expensive and a typical system with two disk drives and a
five platter jukebox costs between $27,000 and $33,000 [18].
In addition, one must pay for sophisticated software
packages which store, index and retrieve data on CD-ROM's.
One alternative to optical disk technology is being
marketed by Scan Optics, Inc.
This is the Image EasyFile
System, which uses 8mm cassette tapes (on up to 28
37
concurrent drives) as the storage medium.
capacity of 2.3 gigabytes.
Each tape has a
As data on cassette tapes have
to be accessed in a serial manner, this system is much
slower than an optical disk system.
However, at $ 17,000
for a 28 drive unit, Image Easyrile is considerably cheaper
than an equivalent optical disk storage system.
A cassette
based system is a viable alternative to an optical disk
system in situations where the access frequency per data
point is low.
(b)
Software for Specialized Applications
An interesting development in the scanning industry has
been the joint application of scanning technology and
technology from other fields to handle specialized scanning
tasks.
A good example is the development of neural network
based scanning software for handwritten character
recognition.
Neural network computer models are based on
models of the functioning of the human brain.
They emulate
thought processes such as learning, and can be taught to
perform complex tasks [19]. The handwriting recognition
application emerged as a result of the use of neural
networks in the wider area of pattern recognition.
A number of packages are currently available, either
off-the-shelf or as part of a customized service that
configures handwriting recognition solutions to customer
38
needs.
NestorWriter of Nestor Inc., Providence, Rhode
Island is an example of the former, and Inscript of
Neurogen, Inc., Brookline, Massachusetts is an example of
The main attraction of these packages is that
the latter.
they can be trained to recognize a much wider range of
handwritten characters than is possible with conventional
scanning software.
Most products in this area are designed for DOS, OS/2
and Macintosh environments.
Data are entered through a
scanner or a digitizing tablet, and recognition speeds range
from 1 to 3 characters per second.
As in the case of
conventional scanning software, there is a tradeoff between
the accuracy rate and the rate of rejection.
The accuracy
rate can be made arbitrarily high if tolerance for error is
low, and vice versa.
The main problem with these packages is that it takes a
very long time to train them.
In addition, they scan at
much slower speeds than conventional systems do.
these problems are resolved,
used.
Until
they are unlikely to be widely
However, they have excellent long term potential, and
should eventually c me
industry.
nto widespread use by the scanning
Short term :rospects are brightest in areas such
as scanning numeriJai
verification.
-cmunts on checks and signature
39
The next section discusses broad trends in the optical image
scanning and character recognition industry.
40
6.
TRENDS AND PROJECTIONS
Rapid advances in hardware and software have created
a major demand for scanning technology in diverse industries
ranging from banking to defense and from engineering to medicine
171.
Instead of focusing on each application
separately, this section focuses on broad trends.
Figure 7
presents a schematic representation of the evolution of the
capabilities of scanning technology.
6.1
Falling Costs
one of the primary reasons for the growing demand for
scanning technology is the fall in the cost of products. As
technology improves, costs will continue to decline.
Figure
8 depicts this trend of falling costs in terms of the system
costs per font.
6.2
Coalescence of Text, Image and Graphics Processing
Graphical information can be stored either as simple
bitmaps or as a set of standard geometric entities.
The
latter option allows for easy editing and storage in a
library of symbols.
Currently available scanners do not
offer these capabilities.
However, developments are taking
place in the area of Computer Aided Design (CAD) for
converting raster images of line drawings into vector
graphics files, which can be easily modified with graphic
C
I
C O
C c
*
tL :
c,..
.5;
I0a).
LU
Q
Bu
a
Im
0
CL
__
~
.
2..
o- o -
C,)
,-a
0
zZ
Z
*
x
as
E;.
_o
O
olo
o
-
-
0
_,
a
0
.:
C
z
LU
s
E.
LU
_ DE
_
0a
It
~~~~~~~~~~~~~~
~
-~~1
O0~~~~~~~~~~~~~~~~~~~~~~~
OCI~~~~~~~
CC
z~~ ~
:s
_ "o
0Ul
- -... C
5
.EEc
'"E
.
a
@0
0O
"O
iv
0a
a
CI-
LU
z
0
0
ao
Wa
Zo
u(
m
-
a
LLU
- aN
Z
C O
O
U0
Z -
0
Z
LL
r
E
*
a
_m
m
-
0
i
_
c
o
o
a-*)
*
a
c
S
C
3
co
U
w
0
c
w
CC
XUl
a
a
1n
-LIE
-
0r
°
-o
rr
~
0
III
41
line editors.
Raster-to-vector conversion systems are now
available from several companies including Houston
Instruments and Autodesk Inc.
However, at present only
approximate solutions are supported.
For example, all
curves are decomposed into line segments.
It is expected
that ideas from the area of raster to vector conversion will
be combined with scanning technologies to enable text,
images, and line graphics to be edited and processed through
a composite package.
6.3
Integration and Networking
one of the most significant trends in the information
processing sector as a whole is the increasing integration
of disparate data processing equipment into a single
composite system (17]. This trend is reflected in the
scanning industry by the emergence of the integrated imaging
system (described in Section Three).
The trend towards integration can be observed in other
areas of the scanning industry.
For example, optical
character recognition capabilities are being increasingly
integrated into facsimile equipment
29].
At the same time,
facsimile capabilities are also becoming available on
document readers such as the Datacopy 730.
42
6.4
Impact of Artificial Intelligence Techniques
Advances in Artificial Intelligence techniques in areas
related to character recognition and image analysis will
lead to faster, more accurate and versatile reading machines
[231.
Semantic analysis and natural language parsing aids
for contextual analysis will improve the process of
identifying letters and words, reducing the error rates, the
reject rates and the need for operator intervention [24].
Eventually, reading machines will be able to handle
virtually all printed material [18,271.
6.5
Use of Secial Purpose Hardware
A highly accurate omnifont reader requires
sophisticated algorithms for vectorization and
classification, separation of merged characters, contextual
analysis, and syntactical analysis.
These algorithms can
benefit from microprogramming and special purpose hardware
which is optimized for specific applications.
Sophisticated
readers such as the Calera CDP 9000 and Kurzweil 5100 use
special purpose hardware.
6.6
Limiting Factors
Although it appears that ongoing research will enhance
the capabilities of scanning systems, several factors
continue to impede a wider acceptance of the technology.
These are as follows:
III
43
(a) The accuracy provided by current systems is still
inadequate for several applications.
The editing of errors
and the presence of unrecognized characters continue to be
major bottlenecks.
The time taken by the operator to
overcome these bottlenecks limits the throughput of the
overall system.
(b)
Wide acceptance of the new technology will occur only
after it becomes possible to automatically handle complex
documents containing both text and graphics [13,17,20].
The
need to hire and train expert operators continues to inhibit
the widespread adoption of scanning systems.
(c)
Broken strings and touching characters in a document
still constitute a major hurdle for even the most
sophisticated machines.
Scanning systems remain highly
sensitive to variables such as paper quality and thickness,
clarity and font.
Major developments in syntactical and
semantic analysis are needed before reading machines realize
their full potential.
The major trends and projections are summarized in Table 1.
1111111
g11
'S~~~~i
I I fI1
Qe
*-
I
I
I
I
is
aiii
i, t1
If
'11
II
j'
a
E
iLX
itI
III
44
7.
A TAXONOMY FOR PERFORMANCE EVALUATION
The conventional criteria for evaluation of a reader
are speed and accuracy.
However, by expressing the speed
simply in characters per second and the accuracy in a single
figure, one is
overlooking the fact that the performance of
a scanning system is heavily dependent on the
characteristics of the input.
For example, it takes longer
to process a document with multiple fonts and multiple
character sizes than it does to process a monofont, monosize
document [9].
The presence of graphics and the formatting
of the document also affects the reading speed.
Further,
the quality of the print is a major factor affecting the
accuracy of the system; broken and touching characters, low
contrast, and skewed text result in high error rates and
reject rates as well as in a significant reduction in the
speed of reading.
The speed and the error rate presented in
the technical documentation supplied by the vendors consider
the characteristics in only one case - usually the perfect
one.
In order to assess the capabilities of a system, one
must consider not only the scanning speed but also factors
such as time spent in editing and correcting, time spent in
training the operators and time spent in training the system
itself where applicable [13].
In the case of a document
45
containing several graphs and multiple columns, the time
spent in editing the document can be significantly greater
than the scanning time [12,13].
Consequently, it is
difficult to obtain an accurate estimate of the overall
speed by simply observing the elapsed time for the scan
operation.
With rapid evolution in the technologies used in the
new generation of products and their broad functionality, it
becomes necessary to use a larger repertoire of evaluation
criteria that gives appropriate weightage to the major
factors that determine the efficiency of the scanning
process, such as: complexity of document; quality of
document; recognition technology used; and man - machine
interface.
Unfortunately, there is no framework that
currently meets this need.
In order to fill this void, a
new taxonomy for the evaluation of scanning systems is
developed in this section.
7.1
Document Complexity
The above facts highlight the need for a measure of
document complexity that takes into account the diversity of
fonts utilized, the sze of characters, and the proportion
of images in the docment.
a five-part document
Since no measure exists,
:mplexity classification scheme is
proposed to facilitate systematic analysis.
This
III
46
classification groups documents into the following classes
(in increasing order of complexity):
(a) Class 1:
Basic Text - Only Documents:
All material is
in a single font, with a single pitch and uniform spacing.
An example of this class is a typewritten document, as shown
in Figure 9 (a).
(b) Class 2:
Single Column Documents with Multiple Fonts
and Mixed Sacing:
This covers text-only documents with
proportional spacing, as well as typeset and laser printed
documents with multiple formats (such as bold or
hyphenated).
A sample Class 2 document is shown in Figure
9 (b).
(c) Class 3:
Single Column Documents with Segregated Text
and Images: Such documents contain all material in a single
column format.
The text is justified or hyphenated and
there are some images.
These images can be easily separated
from the text (separate zones for text and images), as in
the case of the example in Figure 9 (c).
(d) Class 4:
Multicolumn Documents:
two or more columns on a page.
Such documents contain
Although they have mostly
text, there are some images and tabular material.
A printed
page from a newspaper will fall under this category.
A
-2-
Dr. A. Gupta
May/86
- Figure references are not consistent (some with, some without
parentheses).
- The references quoted on page 6 are nowhere indicated in the text,
except for the * on page 5, line 14.
- The figures are of poor quality. Figs. 2 and 3 are unnecessarily
complicated, Fig. 4 lacks one legend in.the ordinate.
All the above could be corrected by a complete rewrite. The idea is
interesting, having a minimum configuration microprocessor display
current, power and maximum demand by a TLU method on current values
obtained safely by a non-invasive current transformer. I would still
question the following:
- Only current ismeasured and the data that are displayed are based
upon, previous, actual current and power measurements, stored inthe
table. As power is still a function of current and voltage (and phase
angle if the load is not purely resistive), the results will be in error
ifthe line voltage changes. Inaddition, unless it is the intention to
use this only on one particular load, the type of load will influence ^
the results, making this system not quite general purpose.
- No mention ismade of the actual hardware used. From the references
I presume it is an Intel machine. The type of ADC (speed, number of
bits) and the method of display (printer, 7-segment displays) are alsonot mentioned.
- Page 3: "for every possible digital value, the current and power are
determined and stored ... ".
In what format? The description on page 4
and the flowcharts of Figs. 2 and 3, leave much to the imagination, unless
the reader knows exactly the configuration of their microcomputer. The
references to the "status", "addresses" and "data" field suggest to me
that some type of single board computer, that has these fields as displays,
was used. Can it be assumed that all readers are familiar with this?
- If I follow the flowchart in Fig. 3 (maximum demand display) correctly,
when a subsequent current value is determined to be less than the previous
one, a search through the complete table is made, using the same, old,
input data before displaying the, same, results. I don't know how much
memory is included in their system, but surely the previous value could be
stored somewhere to avoid this unneeded search.
- Similarly, if the next value is determined to be higher than the previous
one, again a complete table search is made instead of starting at the
address of the last (lower) value.
- In the three phase measurement system, a simple two comparison schedule
should be added to indicate the highest load, rather than leaving this up
to the human operator.
FIGURE-9
(a):
SAMPLE DOCUMENT -
CLASS 1
III
HIGHLIGHTS OF
KNOWLEDGE-BASED INTEGRATED INFORMATION SYSTEMS ENGINEERING
AMAR GUPTA AND STUART E MADNICK
Large organizations must necessarily rely on multiple computer systems for a number of reasons, such as
the increasing size of the organization and the growing reliance on computerized data. In virtually all
cases, dissimilar and incompatible hardware and software systems are operating on a concurrent basis.
While these systems may meet the objectives for which each was designed, their heterogeneity presents a
major obstacle to ready access and assimilation of the information they contain.
The objective of Integrated Information Systems, or Composite Information Systems (CIS), is to mitigate
the problem described above. Such systems must be geared to span applications, functional areas,
organizational boundaries, and geographic separations in order to present a unified picture to the user.
While designing such systems, it is necessary to look at a number of inter-related strategic, technical, and
organizational issues. The goal of the Knowledge-Based Integrated Information Systems Engineering
(KBIISE) effort, highlighted in this report, is to survey the state-of-the-art of methodologies for
addressing these needs and identify areas needing increased research focus.
Strategic issues include motivating cooperation between multiple organizations, each with its own glis
priorities, and security needs. One critical success factor for such cooperation is participantconsensus on
the issue of access to each others' technical and non-technical information. There is an urgent need to
clearly define the domains of shared information, the potential benefit to each group that participates,
and the role and the responsibility of each constituent.
Under technical issues, the evolution of distributed heterogeneous information systems is studied. Being
inherently more complex than conventional databases, such systems require powerful semantics and
update capabilities, as well as sophisticated concurrency control and recovery mechanisms. Both the
semantics and the syntax of individual queries and updates must be mapped across systems. In addition
to physical connectivity issues, it becomes essential to develop new techniques for incorporating logical
connectivity across systems. Such techniques combine ideas from the fields of database technology,
communication technology and expert systems technology.
Organizational issues cover the process of making controlled changes in complex organizational environments. The prevailing theory of inter-organizational networks explains the multiple forces that modulate
behavior of individuals, groups, and organizations. There is a need to develop focused standards to serve
as the foundations for neutral representation as well as for the development of more elaborate standards.
The problem of distributed heterogeneous inform; tion systems occurs in many disciplines ranging from
manufacturing to banking and from maintenance to logistics. A number of government organizations
including NASA, NBS, and different agencies of the Department of Defense are faced with this problem.
Within the U.S. Air Force, several efforts are directed at finding solutions in this area. In order to attain
success, it is necessary that government, industry, and academia work together to develop common
standards and to fill major voids that exist. A plan for concerted action is developed in this report.
FI~GURE
9 (b)-:
SAMPLE DOCUMENT -
CLASS 2
ATTACHMNT C
eeting (May2 4 ,1985,Toronto)
Materials for IES AdCom
Suggestion
For IE
M aterial--A
Society
Enhancement
Objective
To promote enhancement activities for the purposes of increasing IES metership and improving and strengthening IES functions, image, and effectiveness.
Overall Plan
. .1.
…aw
plan
1
i..
t1e overual
.. _
o
;__
…
….....
..
;..:
1
_.._
nnance our soc3le;y InVOIveaS
IES EMBERSHIP
addressing four areas as follovs:
8,000
By 1990
1. Method of Promotion and Scope
2. Goal
3. Enhancement Activities
4. Assessment of IES (status of IES)
Each of the above areas will be addressed
.
in the following sections.
1.Method of Promotion and Scope
The enhancement activities are aimed at invigorating
our society. These activities encompass all aspects
A!
-.
-
wnlcn are
I1
1
I-
-1…,.
L
-
-
-…
- -
,-
&E
-
-
i
- - __
lkely Co improve cne managemenc ezfciency
of the IES AdCom and they extend over a wide range.
The IES's GOAL is a membership of 8,000 by 1000.
This barometer will track
progress toward that goal.
To promote enhancement activities,
there are 3 promotional methods to be used singly
or in combination, depending on the nature of what we are doing;
(1)Top-down managerial activities from IES AdCom
(2)Technical Committee activities which extend horizontally
(3) Section/Chapter activities which have a bottom-up effect
...
§ Society activities with team work and cooperation;
FIGURB A
(c):
SAMPLE DOCUMENT -
CLASS 3
see
Fig.l-1
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. IE-31, NO. 12,MAY 1964
112
TABLE VI
MICROPROCESSOR OPERATING SYSTEM SUPPORT BNCHMARKS--STACK
EXEA!SER [81
Ta
I
2
3
I0
laO
200
Tia
pb
N d
Pu
tablu
vim-
h
(ds(c)
(e
2
I
2
Il
2715
343
13
2U 1
3440
12427
Total
(1)+(2)+(3)
4
O
44
p
TA
hWE$&
r
(ddU
=0
434
3332
4236
13
5336
7938
10320
23S9
971
1.00
Ptrfenanow nuum Ho
3
3.4
,.
TABLE VI
GENERAL CHARACTERI OF 32-Btr MICROPROC!MO
Mt ago CM
MLOW-.h
TICnoLO
I.as
1OMWO
CMOs
4.lIIS
O.OP1F
uASON
SIZ OFC
i05l 0.SIPAI
T
PICOMIT
W4ASI
C X C
o
1O00.
Qf IlOIt
nSU
4.3
219.0.0 O
MAI n
4.4
./@
WATT
A I IMS
U ACTIM
,4 TOTAL
1II r1INC
4 WATo
.rm
I
,l$ L
2.5 IAVAoIW
Po4
83
l mII
zSM
t4 ,
GIOINSf
h0 0F 0
NSITnCTO4S
moOF ACOOMs S
t. sm.r,
10.003 MII
6r
([1
II
LL
A
l"lmuA
IN
V156
u.IAI0o
16
GEIP
2
TOvUs"
2
i1
10
S
VW
vlSIIM
'Curnteuy for iteral use only.
TABLE VMI
[61, [171
EXECuTm N TM S(21,1
inMAC14
LANGUAi4
TIM( I
IWN
SIZI
S*nCN
S4EvlE
ILLISICOIO
PLZI.
ACs
4
70
C
PASCAL
tUNIX)
PBSC(VMS1
32
32
32
14
I4
14
20
220
20
9400
11 w
1 .53
C
PASCAL
PASCAL
32
14
I2
47
53
50
?4
10
960
37.100
32.47
32.320
61000 itS6MI)
PASCi
PASCHAL
5
32
3
15
Itg
244
910
9200
80*60C MWl
PASCAL
14
73
7?4
44 000
111
"s
4700
47t 00
l~.11t710
I6
Is tMM)
'32'4EL 3 II Mtl )
502346 NltM ,
02"r IC UNlt)
NP32-'
CPU,
DA
16
*
PASCAL
IS
1
PASCAL
1
11
at
PASCAL
32
Na
"A
SCA.
32
NA
NA
710
11 0
12.323
27t0
200O
91138
2213
7311
1774
t35
7
259
24
"ot
(Is MNHt
NIsI1Q3 (?7mtNl
prolowpe.
'Indicates expcrimento
"Indicates vendor-pro'ided nfortiatio.
be monitored. Consider, for example, the machine tool application shown in Fig. 1. There are several independent variables
to be controlled and monitored as follows:
a) rotation speed of parts,
b) lateral movement of parts,
c) lateral position and angle of each of the cutting tools.
To increase productivity, it
must operate concurrently;
tool interfere with another
variables can be monitored
but the overall concurrency
is essential that multiple tools
also, at no instant should any
tool. Each of the independent
by a separate microprocessor,
of tool operation will be deter-
mined by the ability to maintain noninterfering profiles. The
latter aspect is dependent on the communication bandwidth
between the computing elements. The overall performance
of such multiprocessor configurations is affected by the
number of processors, the communication mechanism among
the computing resources, the characteristics of the computational workload, and the control program. Whereas the major
constraint in single processor systems is the speed of the
processor itself, the major constraint in multiprocessor systems
is usually the speed of the interconnection mechanism used
for communicating between the computing elements.
Fig. 2 shows an example of a multiple microprocessor-
SAMPLZ DOCUIMENT - CLASS 4
GUPTA AND TOONG: MICROCOMPUTERS IN INDUSTRIAL CONTROL APPLICATIONS
113
Fi. 1. A typical machs tool pplicaoa with mudi_ too,.
LOGIC OUTPUt TO
CaT ON PANEL
TO MACHINE
Fig. 2. Computer system configuration for machine tool application.
based multi-axis machine tool control that ses a shared
common data bus. Machine tool throughput s imited not so
much by the number of microprocessors attachable to the
shared bus, but more by the utilization under load of the
shared data bus and data memory. The memory utilization
for two typical functions executed under the multi-axis
machine tool control environment is summarized in Table IX.
The total utilization figures have been broken up by principal
P'IGURS.9- ():
microprocessor tasks. In each case, the program code resident
in each microprocessor subsystem has been optimized to make
minimum use of shared memory. For nonoptimized programs
in which flags and status registers are maintained in shared
memory, frequent accesses to shared memory are essential.
This often has the undesirable result of driving up memory
and bus utilizations to 70-90 percent. At this level, queuing
contention will have a severe adverse impact upon system
SAMPLE DOCUMENT
-
CLASS
5
III
47
sample Class 4 document is shown in Figure 9 (d).
(e) Class 5:
Integrated Documents:
both text and images.
Such documents contain
A typical document of this class
contains multiple columns, with several charts or
illustrations within each column, as shown in the example in
Figure 9 (e).
The above five - tier complexity classification scheme is
utilized to evaluate a broad range of products in Section
Six.
The five sample documents shown in Figure 9
were
selected after extensive study; they are used for the
purposes of evaluating products and validating the taxonomy.
7.2
Document Ouality
Since the performance of a scanner is highly dependent
on the quality of the input documents, it became necessary
to carefully control the variations in the quality of the
documents used in the benchmark tests.
Although it is
difficult to establish rigorous measures, documents can be
broadly grouped into three classes, based on their quality:
(a) Low noise documents:
This category comprises original
typewritten and typeset documents, with normal leading and
clearly separated characters.
negligible.
Skewing is absent or
In addition, these documents have no
48
hyphenation or kerning.
(b) Medium noise documents:
This category comprises
original laser printed documents or high quality dot matrix
printed documents, as well as good photocopies of such
documents.
2%).
The contrast is good and skewing is low (under
Further, the characters do not touch each other.
There may, however, be some instances of kerning,
hyphenation, and uneven leading.
(c) High noise documents:
This category comprises second or
later generation photocopies with broken segments of text
and characters touching each other.
Usually, there is low
contrast and skewed text.
The above three - tier scale represents one measure for
defining quality.
Strictly speaking, quality is a
continuous variable with multiple dimensions (e.g., quality
of characters, quality of background, contrast ratio and
amount of skewing).
Consequently, this scale represents a
first level quantization of this variable.
7.3
Recognition Techniques
Recognition technique is a qualitative variable that
tries to capture the sophistication of the technique used in
the recognition process.
Various recognition techniques
__11___1______________________
III
49
such as matrix-matching and feature extraction offer
different capabilities for reading.
The implications of
using different recognition techniques were examined in
Section Two.
7.4
Man - Machine Interface
In order to minimize the total cost of scanning and
editing documents, one important factor to consider is the
interface with the reading machine.
A higher-speed system
that requires special skills and training of dedicated
operators may, at times, be less desirable than a lowerspeed system with a very user friendly interface.
Two of
the evaluation criteria that represent this variable are
trainability and document handling.
In addition, it is also
important to examine the interface between the reader and
other computational equipment.
The concepts outlined in subsections 7.1 and 7.2 above are
independent of the equipment utilized.
Also, they do not
require an understanding of technical terms.
Document
complexity and document quality are therefore good variables
for an evaluation exercise.
Such an evaluation is
documented in the next section.
50
8. EVALUATION OF PRODUCTS
The number of scanners available today runs into the
hundreds, and it is very difficult to generate an accurate
and exhaustive comparison; even if it could be generated, it
would soon become obsolete.
Consequently, in this paper
only a few representative products have been analyzed.
The
list is as follows:
(a) Datacopy 730
Low-end scanner
(b) Caere Corp OCReader 500 Series
Hand-held scanner
(c) Scan Optics EasyReader 1720
Low-end scanner
(d) DestScanners PCScan 1000/2000
Low-end scanner
(e) Sharp JX-450 Color Scanner
Low-end scanner
(f) Truvel Truscan TZ-3BWC
Low-end scanner
(g) Kurzweil Discover Model 30
Low-end scanner
(h) Calera CDP 9000
High-end scanner
(i)
Scan Optics ReliaReader
High-end scanner
(j)
Kurzweil 5100
High-end scanner
8.1
Results of the Evaluation
The results of
Phetests on these products are
presented in Figures 1-12.
Figure 10 depicts the relative
performance of the systems in terms of a document complexity
III
AL
0o
LL
0~~~0
UF
y~~~~~~
0
0
o0
I-
U
*
*
.2
-
I.->.
z;
*
a:
0g
z
- ~~~0
C
0
00
LU X~
CL~·C
U
t
~
0
-
0
E
u~~~~~x
~
COI
a:
- o
X
_
t
a
0
o
0.
C
V'"
1*
*t O
*
Z
<:~~~~~~
C~~
-
V~~~~~~~z~0
LLI~~~~~~~
00~
~
r
~
Co
2w
0
0
~~~~~~~~~~~~~~~~
*
* 20*
0
0c
0
a,
I
L
LUI
u >E
=0
00
z_
zE
I
zo
"e
·
,
o
-E
0
E
51
versus document quality graph.
In Figure 11, relative
performance is measured by graphing document complexity
against scanning speed.
Finally, Figure 12 maps the
performance of the systems on a column and graphics handling matrix.
A more comprehensive comparison appears in
the Appendix.
At the low end, all the scanners were able to read
Class 1 and Class 2 documents without much difficulty.
Class 3 documents were read most successfully by the Scan
Optics EasyReader and the Kurzweil Discover Model 30.
None
of the low-end scanners was very successful with Class 4 and
Class 5 documents.
All the high-end scanners were able to handle Class 1,
2 and 3 documents.
The Scan Optics ReliaReader was not as
accurate as the Calera CDP 9000 and the Kurzweil 5100 in the
case of the Class 4 document.
The Class 5 document, with no
clear separation between text and graphics, was handled most
effectively by the Calera CDP 9000 system.
In the case of
such complex documents, the process of editing and
reconstituting the original format is time consuming,
exceeding ten minutes for the sample used in the benchmark
study.
Characters that touch each other and those with broken
L
to
a
U
IZ
z
01
:
Z
O
:
_
iAS...
_CE
C
,,
0
O
6
Q
_
o
0
U
0
0
a
OCLC
0F
anow
0
'
C4
cJu
y
r
0
Q
0
a
Z
*
.~0
00
O
(3U
-
0~~~~~~~~~~~
I
LU
.
c
eO
U.
;
°
LzoUo
1
E
a
o
0
IQ
0
0
0
0
o
0
mo.
00
O-0_
.
c.OS
z x
o
!Qa
aI
:
z
a. -J
4)
I-
N
Zz
L :
I:
0
~Sd
S
0
Ul
Sd
c a
0
m
-m
U.
w
. o
o
(0
0.
-.i I-
a
=
(0'
-j
cJ
Lu
0
,od
0J
0
0
t-
A
o
a0
_
0 0 C
0
ar
>
I-
am=c
a
e
·
a
o
0
Q
a
O
c
a S aa
.
0. '
a
>0
z
ca
_
C
O
Uwl
P=
mr
0 .I= l
l- C
aC S
52
strokes were the major sources of error for all the systems
tested.
The complexity of the document being scanned
severely impacted the scanning speed and the accuracy.
The
accuracy of all the scanners was found to be highly
sensitive to the quality of the document.
Even a
typewritten document caused a significant number of errors
in cases where the quality of the documents was low.
single handwritten mark or even a speck of dirt is a
potential source of error for the reading mechanisms
employed in most systems.
A
53
9.
CONCLUSION
The image scanning and character recognition industry
is undergoing a period of rapid growth in which different
technologies and concepts are being amalgamated.
The
traditional frameworks for classifying various approaches in
this discipline have lost their relevance.
In this paper, a
new taxonomy was proposed. This taxonomy is based on the
characteristics of the input, rather than on the application
or the price of the product.
Based on the quality and
complexity of the input material, it is feasible to predict
when off-the-shelf technology will attain the maturity
threshold needed to motivate the adoption of these automated
technologies in a particular industry.
III
REFERENCES
[1] All About Optical Readers, Datapro Reports, Datapro Research
Corporation, Delran, NJ, 1989.
[21 Ullman, J. R., "Advances in Character Recognition", in
Applications of Pattern Recognition, Ed. K. S. Fu, C. R. C.
Press, Inc., Boca Raton Florida, 1982, p.2 3 0 .
(31 Market Report on Imaging, Frost & Sullivan, Inc., 1989.
(4] Shurman, J., "Reading Machines", Proceedinas of the
International Conference on Pattern Recognition, 1982, pp. 10311044.
[51 Lashas, A., et. al., "Optical Character Recognition Based:on
Analog Preprocessing and Automatic Feature Extraction", Computer
Vision. Graphics and Image Processing, Vol. 32, May 1985, pp.191207.
([6 Baird, H., Simon, K., and Pavlidas, T., "Components of an
Omnifont Reader", International Symposium on Pattern Recognition,
John Wiley & Sons, 1986, pp. 471-493.
(7] Masuda, I., et al., "Approach to a Smart Document Reader",
Conference on Computer Vision and Pattern Recognition, McGraw
Hill, 1985, pp. 550-557.
[8] Kida, H., et al., "Document Recognition Systems for Office
Automation", Proceedings of the International Symposium on
Pattern Recognition, John Wiley & Sons, 1986, pp. 343-362.
[9] Hou, H. S., Digital Document Processing, John Wiley & Sons,
1983.
[10] Suen, C. Y., Berthod, M. and Mori, S., "Automatic
Recognition of Handprinted Characters - the State of the Art",
Proceedings of the IEEE, Vol. 68, No. 4, April 1987, pp. 469-487.
[11] Harris, B.,
"Characteristics of Imaging Systems", Byte,
March 1988, pp. 76-87.
(121 Mason, J., "Error Rates of Imaging Systems", Imagina,
February 1987, pp. 42-46.
(13] Johnson, R., "What High-End Scanners Offer You", Computer
world, April 1989, pp. 17-29.
(141 Tanaka, Eiichi, Kohasigushi, Takahiro and Kunihoka,
Shiamura, "High Speed String Correction for OCR", Proceedings of
the International Conference on Pattern Recognition, John Wiley &
Sons, 1986, pp. 340-343.
[15] Wilson, P., "Error Correction in Sophisticated Scanners",
Imaging, May 1988, pp. 78-89.
(161
"Survey of Scanning Products", PCWorld, May 1989, pp. 43-49.
[17] "Networked Systems in the Automated Office", Business Week,
August 1989, pp. 45-56.
[18] Report on Scanners, International Data Corporation,
Framingham, Ma., 1989.
[19] Buffa, Michael, G., "Neural Network technology Comes to
Imaging", Advanced Imaging, November/December 1988, pp. 42-50.
[20] Kapoor, Ajit, "Electronic Imaging and Information
Processing", The Office, December 1988, p. 56.
[211 Dollard, Tony and Odorisio, Linda, "State of the Art - State
of the Industry: A Review of Commercially Available Optical Diskbased Engineering Data Systems", Proceedings of the ATI 87
4 5 6 - 4 7 8.
Conference, Monterey, California, February 1987, pp.
[22] K. S. Fu, Syntactic Pattern Recognition and Applications,
Prentice - Hall, Englewood Cliffs, NJ, 1982.
[23] Nandhakumar, N. and Aggarwal, J., "The Artificial
Intelligence Approach to Pattern recognition - A Perspective and
Overview", Pattern Recognition, Vol. 18, No. 6, 1985, pp 383-389.
[24] Rich, E., Artificial Intelligence, McGraw - Hill, New York,
1983.
III
(251 Mantas, J., "An Overview of Character Recognition
Methodologies", Pattern Recognition, Vol. 19, No. 6, 1986, pp.
122-134.
[26] Ward, Jean Renard and Blesser, Barry, "Interactive
Recognition of Handprinted Characters for Computer Input" IEEE
Computer Graphics and Applications, Vol. 23, September 1985, pp.
231-240.
[27] Berman, Ari P., "Image Processing With Embedded Expert
Systems", Advanced Imaging, No. 15, November/December 1988, pp.
51-60.
[28] Jones, Tony and Safdie, Elias, "Scanner Selection - More
Important Than You Think", Proceedings of the International
Electronic Imaging Exposition and Conference, Prentice - Hall,
1987, pp. 341-351.
(29] Brobst, Paul L., "Fax Networking", Proceedings of the
International Electronic Imaging ExPosition and Conference,
Prentice - Hall, 1987, pp. 512-522.
[301 Stern, Randall, "From Intelligent Character Recognition to
Intelligent Document Processing", Proceedings of the
International Electronic Imaging Exoosition and Conference,
Prentice - Hall, 1987, pp. 236-245.
APPBNDIZ
CHARACTERISTICS AND CAPABILITIES OF THE
PRODUCTS EVALUATED IN THE STUDY
III
O
-.
=
a4
I
l
l
I
4)
I
r4
V
Ca
4 0
Q
1.4
>4
4.4
o
00
(U
1D
.,.4
-4
a
02
U
04
4)
.0
1,I
U
a
re
a
(U)
o
0
a
z
z.40
T
1: t
l
I
I
U
SJm
.4
(0
C
c
on
C.)
0
0
0
.4
Ln
w
1 4.
U
o
e
Q4)
w
l .4
C ., -
1.4
4-4
l
c(U
4) -.F4 C
..4
m 01
o
C
m
re *
SU
4.
O
"
C
V
a
.,4
o u
O: · ..:
·
ad
0E,.
0 w
>a
I
4
· ,'
.
0
cJ
cU
o
FO
0
02
u
C)
1.4
C
.,-t
u
41)
0
0
(l
cn
0
m
4)24
O
4) O
UW
4)
.j.)4UQ
0
.p4
4)
4-)
C
-
a'
£
4.1 4.1
4.
.1
1.44)
3
W
a4
3
4)
a
CN
,-p4
1 .i(CU U
C
02
ea
Q
Q
4)
0
E-4
a
z -n n .C'
w
U
;3
z(n
0
H
C
't
=
Z
cX
=
I_
. -4
r~
0a0; W wu
L-
-J
C"
C
-
1
~
m.
_
Q
.1-s
4
U
0)
I
I
m
-,- :-":
.
u-
I
I
CU
E
C
I-
c
-
:
=
M:
=
4a4)
s4
-4
cn
M
-
0
U
"·
N t_
C ,,
.
L.e: M U
>
C, -i
.e
54
0 0
c4.) .
O
E
u0
W
0
Q) C
N
,t
-
)
.-
A 14 . (U
M
a_13 Q1W
Q a
Q4 > )
E-44
C 0
u
4)
02
02
I .,
-,1
X
_
>4
E-4
QJ
E
0) C
0
z
a4
3
o
a
w
4)
U
o
r
cI_
z
04
LP £ O
Ow
Z u
.0
a,.4)
3
U
rn
41)
(U
cn
.
.4fl UN
4-4
O
O
(1,)
,
ul
134
·(U
O
3
a
U
a
4
l
0
0
0
;3
I
.,4
0 4J 0
0] ,
X
w
3
4 (U
O0
4J24
In
- -
0
wt
0
C
02
4
04
1
02
.94
O
P
02
4)
0
arlu) .-
C
m0
N
24
4)
4.)
1.4
1.4
u
o
a
>1
m
C
9
,0
.. i
M
C W
c
02
4)
31
c:
C .-s 4)
U -4
3
z
4:
- --
-,
(U
.4 .,4 ,' 14
43
0
a4
02
02
.0
E4
-
.1
U)
U
m
U
.
w
41
I
4
W cU
I .1
I
E
43J
04
I-s
W
'-4
C4 M
-4C
0
z
O '
1
4:
H
~z
w
mC.
)
u
0 0
14
oU
Ca
w
'-4
E.4
4 )
.
ea
o
>4
-4)
0 3m
O
O
(U
N
0
O
O
-
3
0
z
CU
02
az
I
0
Z
W
$UCC
0
0
Q
2; V
u 4)
W4
4)
3
a
U
o
j k
0
j
C
X
(U
(U
0
4 Us
O
0
X
r
V
4
ol
E-4
0
O
0 m
Q
S -~e
$
~...
O
U
I
Y
U
>4
n
4
4;.
'
0
t
a
4
x
Q
4
E-4
e
1
44 OX1
0
Ln
-
.)
Q4
0
4.,
(
V
U C0
U;
41
44
,.
C(1
*I: 4
o
O
O
04
O
4-)
0
z
Q
J
x
Q.
t
x
C
41
W
I OL
v1
P4
E-I
4
U)
W
c0I,n
-
"
0
II
O
:32
I(U
,.~-4
aj4
u r
r,
m
'
uV.I-co
31
4
I
0
00
'-4
L4
41
j
o
W
*
u
cS
; -H
' S4
3.- U
oc
CD
c
M
o
aQ
Q
a
40
.-
O
v
u
C
"
si
m
a
(
oo
U)
w
1%
CZ
on
o
0
0
m
0II
N
.u. Q c4) Q0
>O
o
.,
C
L
Z
O4]UL3a
U OQ
O
U
44
41
O
U
c
*"
3
0X
e,
X
·Q1
4
~'--0U4C(U v
_4
V
C
QO4
O
o
. *V
E- :
0
U;
>i4 O
o
4
fi
0 ra
(U r- O
0
Q4
0X
-41-4
u4
.)xn4f
co
24
X
41
:
051
. ... X
(.
cQ.
Z4
I4
U
u~
U
11
m
m
0
4
CO
U
S..
E-4
,c
w
a
u
4
0:
4-
u
4
U
C
UI
U
*H0 z:
U
4
X
·-
o
c
~
(0
(
2
UO
X0
v
iE-
m0
(U|
[
>I U
a
X
b ______
r0
mo
a
Xt
5
_
<*
"4
Q-
Q1
,
U
U
Ia 0
O
Z
X
u4
E
>4
I 3c
0O
6
xU tD
tie
H
:
4
3.
c3
:-
0
-
O
x
U*
(
o
,\
m
I
I
I
z
.j
4
'Q..-
N
!1 3
il *
ii n
'
5
n~~0
H
:
W
1
i
-
C
U0
X
1
3 a
O
Q0
La
4
4-
.
4S
W
00;
Wi
41
3
>
i
mrl
)
I
c
3
3
~Ji;|XXEv
Qf
~4
1 3
i U
0
i >
3
U0 4 1
i
i
W
|
V COc |u~ =
3
U
I;
-4
U
X
3
0a
OCi|
I
I
Q
N
0
(
.
I
111
I
l
I
-
--l
w
I
-W-
OCO
43
3
O
s
C
0
I -,H
CO
$4
r. z
$4
w
·- U
4.) 0
4)
O
0
PC
(lo
4)
O C
4-4
4
r.l
0 .-4
0
=.4 43) 43
0
la
c
w
-4
-H
43
CZ
0
cn
C
CN
x 2C-r
0
s 4 OQs
0 0
000
I
Ec43 Q40 $4
0
4.
43
$4
4
E C E P
a
0
$4 -H
04)
..)
*,i ua
m
E
I
-H
O 4
O Q
003
4:04
)C
EOU.
431..
4CO
e1
204
04
N
i
·-
CA
04
o
0
W
4.1 -H
i
.,
0
O
~
.
·- H
C
w
O
C
0
O
9-H
04
0w
u
CO
C
a 0
O
w
W3d
3
a
0
cn
H
ill
4 C
O
31
N
0--a
E-4
H
4
4
zci
U
04
44
CO;
E-4
43
C
C
rU
M
H
C-
4
W
4
.
C
MI C
.,-.I
Q
L4
O4 f
cn
(v
3043
44
r-1
43
$41
C U)
O
CO
u
.F4
,-4
3:
444
m
u
0
uO
0
0
O
0
>4-)
cq
-cH
(u >LI3
0
z
.$4 .q
O >4
04 4.
$4
o
iH
C
J,4
Q
00
-
VO
O
Ez
U
H
I
0-
l
I
_ 0
--0
0
M,
C
0
'C
X
, .C:
EC4
~Cz Oc
j
C O
4(O
OE20M
O
0C
C) M
H -H
OE4;(U
U
.,t
-
O~..
(l
1-H
H 4
>1
-H
4=)
.-H
.-4
04 3
0cu
4
V
(
-4O
C-;
Q
4 4s
4-i
-,.
N .H1
I
1
(U
I
04-40
W4
H
Z(U
.)
H
Sm
o
O
43
.0
C
0
O O
0z
L4 44
C
>4
a4 ~3
-H
- 4CO
U=
0O
u.
H
o C 44
3
o
O I
43
'UO
a0$4
to
l-
L0 L4
>4
m
4.
4
$4
C3 *,4
.r4 u
o43
4-
O C
o
0
0 a4
u .-H
M Co
$4
.
(U
0 .,
0
CO
43
04
-H
EO .
0
0
I
(4
(O
$4
4i
$4
4.)
0 $4
0
U
o-Ho
.,-
0rq
I
CO U w
4.
E-r
03
z
4
OC
u
CO
,)
CO
44
o
o
o
H
C-)
0 4-4
O C
l
2
0
04
w
En
04 0
-H
C
r
O
$4
O -H
It
Q) $.
: 3
'040
4H
MI
4
-
- H
4-n
*,
'U
40
-H O
0U a
-a
-H4
C
-
O
cM
n43
0. 43
. 43
4-4
O m I
Q400
Z b
l
$4
0
I MO
$4
3
3 14
N 4
-P4 Q(
0
Z43$4
E;4
o
43 04
I
0
4-i
a3
4
l
' C 0
a C'
Z
w
I
0
.,.-H
0
0
U
Q
.
O
O
$4
(1)
I4H C
.,D
-H
>1
-H
H-
V LJ
u
0
m w
-4-)
m ea W
44
I
0
IC
II
(n 0
__
I
E-4
4
>
0O
4
M 44
3m
O Cci
o
eU
i
43
mv cC
NQ
|
ra
I-,t
Q
0
-
0
<
U
re
cr
-li 4
(t
$4 0
ss
a)
O
0
O
m
lu
-
0
u~ o-
,i
QC-
o
..H
(U
$4
-
.
-
0 a
4
'UQ
k
a.4
O
V
i
14
02
4)
I
-
Q
CZ
0- a44.
~4)
ON
0
03
o
,,-
02
*4
4401
HE-4
0O
0
oO
0
a; a
L)4
I
CO0
4441
O O
C4
I41 u
4P
1 0
4
> 04
E-~4)
¢J
0
4£
0
1I.4
S4
m
4i
4
I- e
0
14
H
0
·n
EE
C
4.
03
z
4-4
3 UIO
X
0
CO u
" U c
H
0
·.
0
4) 02 44
0
o0
E-40d
c i
'-4
IO C
.I
E-4
U
a
0
¢4
3
U
O
0
0
Z
u
4)
uz
C
m f
(0
4n
1
03n03
1.41.
'.04)
Oa
4.a
0
I4)
O
0m 4 si
L 14
c )U4;
cm
N
04
E.
ro-4
.4
04
r-o
*-4
C3
V
cu
l lI
0
N
HU
Cu
4 I
la
4-
J)4
1.
Cd
Ca
H
H
E.
L
4
E-4
a _
E4
'U
9:
C,
u
V
:
4c
I
a
l
m e
Iu
.r;(
Ir
n0
m <
4)
.04.1
05-1.44)
s
c
cNIC)
C. 4.1 X
i
_
w
c)I
ui
.Q1
2
1I
I U0 O1V
4
0a
94
!-
-4
C
=
2:
u
-W
4.1
4)
I
-
4I
C: _
3CO
-i,,
8~2
-3j M
m
0l
L
<
IOS
;4-2.0 n
4:L'-O
.
HH
04
I
4. ,<
Zn
4)
O
I3
U
H 0
3)
a)
a0
Eu .,.3
O =
-
''
i
1i
" W
1Z" C4
"
¥CI]
> =
>
w
;1
'r
zI.,4.1a1-5
'
m O
=
D E-4:
"
I.
0
4
. O
Z
-
.a
C
) 0
3
rd<
z
C IT
_
I~v
=4.1
a) W
4U
)
>
C)
*0
4.1
H
I
_
X,
041
Mr
I. a0
'1-2
(U 0
!;
a7
EH
n O
)
4- .0
t
I -a
3-
u
,J
0
=
Ei
~~Ot
3
C
<
=
w
i¢
I =
L)
(
m
.
L
a t
0(U C
102
C
0 a
1e m 4
III
I
$4~~~~~~
04 **
.-
-¢
U
e 41
^ 411
Q *H
ur
a
.o 0O w 0
Cde zra~~~~u
;r4 a
a
a
pt
A:
O
CA
a
r
iJ aa
.H a
a
a
c
O
m a a a o
O)
OI4Cc
U Q,'rL
c,
zr C
s a
C4
PC
. a
.-- ·^
r- . ra
.0 0.
MU
10
a V
O
a
O
~J·~~.'a
0
3> a Q
; CTe Ca
S.
C0 4i
0 M
"
,.
·
0
a
03
I
L
I _
1 44
C.
a re
rj Pue e.,Oo
31
edO0
uC3
a V
rar
UW
E-4
4
a .H
U
si 4· -J
ffi
o
C tv
DA
ocn
0
1E-4
HI
°
O
a
e re
)., U
0
S
c
0
Il
M
Z
c
Q) a
0o
k
v
v Q
.
4
aa
·*H
o
-W
u
H
r4
· 4~
a
a
X
O.
E
av c
*H o~
F
.
a
r·
k
W
ol
8
Yr
,
rn
3
wc Cn
0
oQ
_~
wo
C
a3
o
H
·c,.C cnI
.H
Q)
- 024~~~~~~~~~~~~~~~~~~~~~,
W-
o
Pcn
~
P1
C
cJ
·I-
*4
HI
go
4
PE4
z
ra
U
u
oou
Q
ru
U
su
I
|
;
Q
or C.
m~~L
x
^4
c
(1i
L
en
a
En
uQ
0O
a
X
fi
H1
E-
O
CT
a)
X
O:
Q3
or
a
Z3
V
Zr
0<
z
C
O~~~~~~
c,
Ed
34: H
:
> C;
Z
E·
~~~~~~~wS:;
a
OmO~
0
n- 32
f
C;
£ crc >4
(
.rl
ao
u .H
-
C
a
n
·4 M a
~~~~~~~~~
·
x o
3- ·c
W 4
-
v'
SE
E
I
u
QaZ
C
zO
V
WWLa
W1
> X1
a4 a,
m
Mw
m
E
Mc
4 -J a
_,
c,
4£i
LI U
O Ez c)
1 X
:
E
a
UX
M
E-4
<: w
s
_a%
Ua
· ti
Q) a a
P
(O
c
a
--H 1~3
r-4
X
X;c x
C
4
ro
a
_
X~~~~S
E-4
w
e
eO
c
0
a
z
4
(s1
o
(1
mm
O
:>4
o
m 37
w
C
O >
O
v>
c
0
44
Q
-4
-
III
-
.
3
' -0'a)
u
·P4
a
I
(4
P-4 n
(U)
-.2
4
02
(U
0
O
(U
"-4
a
m
O C'
0 44
9-co
IV
CV.
'V'Vj
'V
4o
o
'Vi 14 C
(
O
02
m
m
0
V
o
o
> 3
'u o4 "4
'O'
C, 0 4
4_ 'V
02
-(U
-4 (C
0
'V
II
-
0
W
E2
04
0
cn
-
m
4
Ecl
: -4
-i
4)
(U
u)
-4
a
O
ha
-4X 0M
.,W .
sw
4:
4
o
F
0
O
Z
41
m' '
S
m
-C
at
.O
tv
0
w
.V
U
Im
C
0
I
0Z
-4
.i
C
4.,
w
el
02
o
0
N
L4C
U
IV
uu
946
U)
V-.
IV
M
U
:0
a
Zn
'V
4r
--4
la
04
L4
o
0
I
,-4
r-qmr
u-
"C
IC
0t
'V
.I" 4
>4
IJ
'V
C
_r
IC0
i5(U
C
91
04
A
02
'V
I-4.X
4
ru
ra(U
4j4
-11
14
3
. -4 .9-s
'V
14
C
-4
(U
'V
-4
.,Q
2
'V
a,
co
,,,,,
U
wl
E-4
u
u
C
O
:r
_
1: Q
o~~~~~~~~C
r
o~~~~~~~~~~~~~r
+
II*4q
0
0
u
ul4
I
0 ,
la.~
-4
IVO
ro~
la0
m
.,.
U'V
90
X
PC)
cn
2
V
c0
0'
(1
(U
a
w
02
,t
9
0
(1U
m
u
E
ru
5.;
'z
0
o
02
w
C
C
4.
2
.-4
v
IU
C)
w
.4
w
z4
U
C
.r4
1
z
w
u
CZ)
0
I.
II
-
oc
E-4
I-s:
".4
0
.I4
4 0
Z
-
-
V'
1,-4
ol
Im
.9.4
o
m
-4
4
0 ad
m 4.
I
W
4
.C
,4
N
4
(U-I
1-4
3 b
N a
.^
I
Qj
a
'r
$4
N
w 4C
om
0
C
a
L
9-0
m
C
I
1
3 r4
02-".4 m
m4
(a a4
i
L4
m
-
4-)V
tis .-4
m
I
.0
-
.
Io
O
w
4-
va,4
I .-4
2
L4
0
W
Z
s
(
C)
I
!
u
I_
n
z
44
0
.z iC~~~~~~~~~
'
4. 4
,
I
aA
CO
o
14
0
Z
0,c.
,
< C
=
0
u
a
MOZC.) r
_ '
Cm
'n
mN
14 o)
( a 4-4
N
(
·ta
PILI~~
';t
Im
IU
I,,~
Z >.,.4
0
0
U
>C
I u
a)(
4
S< V
I
0
IM
II a
il
I
,,,
ft
V
U0
5-
' PL a , V
-V;,
i
.4
Q.
I_
w
=
z
N
>iz
O1 VO
M
M -
g
!.
O0
-
M3
0
Iz
Z
4
--
III
I
.I
.
c
u
0
.r4
40
m
1.4
CL)
4)
I 0
4.4
at
0
w
*1- 1I
:10
4.)
X
0
0
0
C
q
-4.
0
m
(a
a 3
O
C 0
_4) CP
p
4)x
3.
~4z
(U
4.
0
z
Q MI
-(U
MI 4-4
E
(U
W
Cm
3
z
Q
4)
4-4)
,
ma
D
4)
IQ
(Un
-o A
mo
4.o
41)
4
02
40
co
>4
-
W
1-4
E-4
2
c
.14
S:
0
E4
H
H
c
U
m
U,
-4
W
Pc
W
CD
a
0
cn
H
E
4
H
A
w
X
0,
uU
H
In
0
o
3:4
0
4-)
aU
I
0
024.3)
4O
0
43
z
1:
CU
-
-
-
-
Po
4)
.4
:94
34
0
4-W
a4
a
ec
.r4
(U
.,
4J2
a(U
3
.
lz~
a
a'
.0
:4i
4-)
(U
.--
4)
>4
ow
l
f
41)
N
C.)
0
C0
0;;
4)
UZ
E-4
W
Enr
0
0
la
O
rl
0
X*
E-4
z
-4
ru
02
0
.94
U,
V)
41)
O
0
0
D,
S
4c
.94
V
E-4
VE
X
w
U
o\o
(3O
;
:
1.4
H1-0
a
CU
O
Ln
0(U
CD
1
z
U-,
0
ad
M
3-4
L4
4.)
4)
>4
ro
a
:
Z
5:
-
i!
0
C)
~~~~I
V
4
O
W
'4
v11
.14
0
>4
W-
l
4U
P
!
-
1
~
,
>
.4
O
·H
4 _
'¢
_
-)
<
-
iI
'
O
o
r·
'r
3
(d
5
.
;.<
a
->
r=
H
O
O
O
3- 4_4
:
Et3
C
.~
O
W-
a
Z
O
hr
__
E4
z
4.3
u
at
z
C)
_
-
3
O
v]
.)
H t¢
E-4 H
c- E-4
3 "
> CZ
~
mn
4)
0
>
2
C
Z
:CW
=
m
~!
·c,^
4-:
I
i
a3
z
40
.3
E-4
J-----V
O
:4
X
02
4.3
u5:
2
0c
0
0
aLc0
I tv
U,
04
C)
(U
0
4.10
U
0E
-(
X
O
m
O0
0
s
o
UO
_ a
( C
4 V
V Um
C
a
a
I.A a
L4
0
rQ: Z X
H
H
cn am -W
>4 2 t
= :Z C
0: =:
H
)
14
C
0
I4
(V
a OuS
a4
4-)
x
1.
O
IIN
!
:
_ ,
_
H
_j
1
.
4)
4)
_
:> )0
O
'04 oQ)
>1
. .'
-
a
0
X
II(
4r0
o
im
3
N>4
Cm3 11
N.40.)
.>O
Z0
Q
m
O0
>1
3
4
U:1.~4.)1 P
S
;
1
.4
(0'4
0 0-.
J
¢)
Q4
a
,a
4C
't ' 4
0
*'
C
I 0
(U
0
l a
I
:
.1
4,
, 4
1
U
0
0.
Z
'
.J
0
:::.i0C
(
4-
U
U
4
il
t
.
4
4 0a
w0
.
4:
az
cJ
E4
Cl
0
U)
uz
U
0
Im
YC
a0
;
04
tn
I-4
H
E
:3
O '
I
'-
I
C)
01 ,'0aC a
4-4aU
C
30e4
04
a0 P
, ..
0C
(U
4) 0
O
l4.C
04
0 4
E-4
z
(U
o
N
(U' 00
O ~
,
0
.C
)
c
4:
U
rd
z4Ed
U
0
___
Cl)
U:
U ,
'-4
O
o
r
I
>
E-4
I
: ·
I
oc_Z'
Z
4Q)
H
IQi
La
U
02IU
E
.
9
44
IX~~r
cn
(I
4,U
'V
4>x~
,
x
S
DI
0)I
_4
w0
w
;
E
0n
a) J
:
Z
1.4
Q
o -4
0
z
C
4.
%
-
a
.,,
4CO
t
(U
0o
0.
I 02
U X
e
4:
U
: n: 1 3 V
I .,
=
E4
E
U
__
I
Z
H
(
Q
I(
Nn
_
c
' 0;
O
C
-V 4
UCS4)(
I
4
U
H
OA
VE-44
X£
)
O
* .4O
u4
C
(
.'
*
4-'
O
U
-o
3
-'
-4
1. 4
UZ
3
U
III
I.
Ir~
·o
~
~
I
0
,...~e
c:
.^ I
O Q0
· CO
O
.
.4 >
H
Q,~~*'> U UV
3
O
C
V
M,-I
0
(U
.
'
r
C
Q-
L
0
H
I
02
affid
u4-£
cH
m o
H
m <
0E P002
;
r4
L0
m o o
m
o
.
C
0,
(fi
ol
V
W
.~
o
c
'w
o L
QQ0
,J..0
0
44
QV (
4J
m
C
x/ a
4
·
(
.
O
14
0-4Q &0(V
4) m
i
= O | OQJd
NO
4)
Le
C
CO
0
w
O 0 L.
.i
I. 0,..,
I 41
· rll~~~
'~I
V -i'
3
Qw
o
O C W
r
a0
o
3
X s
k._c
w
E4
w
w
0
C4
U,
W
4
H
H
w
E,,
H
V4
I-..
w
Ic
*
q
a
0
W
0
I -
0
(n
U
0
04
04
o
U
O
04
uZ
0
E-
:
t..~
a) a
00..
~c~
4C
W
4l
-4.(U
~.J
CQUO
m 0S2i
H
m
0
(U
DU
'-4H
4-)
U -)
o
(
I*4-
,-H
0
0
_OXO
I
. (Uo
0V
O
,
0C
.
- °
c £
I M r.O
1
.
I
0
4 ) ar·"
.V
e0
0
Q 0,-0
a)
0
4-
. O,
L
1
0Q
a,
0 ~QQ
.
-
.
H0 .
.S
0 UV
-X
4e
l
<*
4
0
.,_.O
(
0
m
O
4,0 0
0.. C
0V
w;
C4
I-t
I
O
4
E-4
O
I
aU
ct
zU
u
Uw
04
o
E-4
V
u
II 0 o
(U 3
,
H
Z
rtj
0 .4-)I Z
C)0
O0
: aeo
cn4V
V
ae
0 4 - 02
Po
O
4.
m
c~( w
CQ
.Ha)
C:
U
£
O
I
u
(
;cr
O
E-
l
V n
uz
4VC
n
I
a .
u: O m
I1
I_
_
III4
E
Z<
>
H
Eq
_
-
Zn-04
Z
I
,
I
,
0-
H .4-JS4
tD i
uz 0 O
4i
C
4i
h
N
O
0
0>4 -44
o
0>oo
la
u
OL
, ,
0
MIu2N
C
v
0
0
0
V
O
O
C
O
ul
wZ.CO
0sW 4ia
'0
O
W
3
C
V MI =
E
Z
3
0O
O 4
a0
O
-'C
Ul
O 4
Q
1_
a _ s
_
3
n0
C
:D
C 4> uz
EV
W >
'M
WI m
V
; *r
k-4
o
_4
_
T
, o
· , II
ao
.
oil
C:
·
r=~~~~~~~~
;.,
N a
En
MOI
V
Z
wmO, i,
4
4-
4)
~
a
4w
4
o
r0
3
0
PC
a
rn
U] r
a
a
tvH
X
C I 4
t_
a v a C a,
*H C
IC '
V
U
Vo
% Vz 4-)
. 0O
O
=4i
C
O
1 O II a
~~~~4~(
o
v
V
.
> e
0
3
L4 -W
4
04 >
C:
c:
Q$
a=
raCJ
~
1 ,.
43
4c
a.
4
0
.rla ~
.,.. ~
.,4
.
C
.,,
mu
-*4 f-
0o
Oa
OP e
C
c
Y vl 3
Z
E-4
)3
. ·1~
· ~~~~~~~~~~~L
,4
m; CO
X
0
we
0 c EQ
o0
a,
C
o
O)
134
w
=lcn
V)
o
b
a ¢o
C t_
Q
a
Io 0
O
"O
u
X~~~~~~~~~~~~~
4w
riE-
Me
cOc
E
ul
v34
UqX
cn
Ed
ue
w
E
,
. >
Qq
ad 4)
L4 :4 r
0 .,<
LI i
O) 4i
a
u
J
O
1
4·-r
3V
Nf
cn
C
i
a
a
Q
--
c
C
z
0
0
sw
(1
.dn
i
~
~~o
41 L4 1
:.
oO
. 1·
Z
.
V
. r4
mU
>
C
J
L4
f X
m Li
V
0
*
I
3
VUEf0
F O
o=
.~Cn
c 4)
a
X I _-
O
H
£ O
:z
0 3-'
:
0
Q0
>
,
Z
u SC
O
r:a)c
o
3
.
O fi
4O v-
6 U
O f
m
U
>U
(l
4
3
_r az
rl
*H
·-
W
:
C
a
I
3
fi ·^
_)
3
¢@
4C)
.CI a
z
I4
t
0
3
Q
uL
X
3
I
U
V
©
v
Q O
a
V
-P4
a
Q
a a
4>;~~a
L)I
C
>
3 4
v
C
3
-
.z
O _
Q
b
(Y
4;
~ 4.a
4
W
w
a
~
C
>4
-
u
c)
0--·
0>
Q
a
4
C=L
c lo
.
e~~~C
V
iC- Qu C to
a0
v ca
-
I
W 04
E
a
C.
uO
S
E-4 4
4
>
W
t4
) A
;I
Cd
O
>
04
0 E-4
M
aJ
E-1
IV
z
:J
Zx
:
4
C
S
s0
l
3
n
0
a
L4
4-)
o
>
o
U
z :4 (d
III
0
c4
N
O
UO
E-0
·m
I
Cc
m
E-
Vd
1-4
54
-4:
Z
U
0
I
84
0
m
la I
>
ov a I
V
08
O ·· I0,
HI V
e
,1
Um
co
z
z
02
· .
I
Q
0 I
:)
o
.
s
. 4)
0
, 0
Ch~
t:
E
c v
2n.,~
0
0V
0
n
0
Q2O
I
0
00
.
0
O
0
I
4J
0
.4)
O
.,4
0
0
E
C
00
.,,
z4)
0
u00
Q
mO
0
s- Q
m
3
41
u
1
0
W
54
Co
H
5.4
O
wd
rnH
-4:
U
E-4
cO
Co
Ed4
:::;
~o
X
u
cn
01
on 4)
m
I
I
u
u
: 'I
i m
C
4)·.
' 4
(.~ M
3
ct
0
I
a
U -
I
Zo
o
m
m
U
It
o
I
ou
I
,
0
O:
c0
,
x
x4i
c-
,
>1
"a
e
.,q
^
a)e
re
Caoa
uo, -
a
cl
ox
I
a
'4:
-
o
01
-i 0m
.l
44
4-j
0
c
uz
C
(U
O
4
E-4
k
O
4)
5.4
Co
0
H
u
z2
4
04
E4
54
U
C
cn
E-4
Co
l<
I w
cn-
Oc
CI
4-
4..T
4
0 1"
U
a
440
-
s0- 4)
4.0 -Q
01
u
>
O
zuz
0
u
I
m
:zw
Cf)
O
I
-vC e-
30
|1 C
o
4
o
c;
Er
*-
0
P
wE
zr
oO
0 3; c · 0
U
0N
4)
4-
u
I
I
u
accJ
ii
C
_I
I
u
z
z
:;
Uz
0 ;=
U
I
(S C
(o
1 4. 4
m-"
4) _a
. I . *a
, 3t
14
~Ii 4
c,
0 ep
cn
02
v.
u o
m 43
n
E.-1
H
Ac
Ei
I
n I
4>
0
_-t
4J^
>
'ra
a)
a>
C
3 C
I
m
Im
C
al
H
0
n
C121.4sie
E4
f3h
1-4
_
C
>
Z
U4
4
z
1
PC
nC
U)
E-
co
n
-4
u
OI
U ocnI
tCPo4O Crr
a
l
_
C4
(a
4
a
C
Ilr
·a
#¢
U
tO
U
Z
0
~D
0
a
I-I
04
n
r:
I
U
14
Z
a
I
0
E-4
nd
A
0
C.)
'
a
4 4.,
.
>
>
>
r
.
'
0
4,
e
CUt
a
40
4:
4
4i.
C41
E(-
>)
.
0
S
0
0''
0
4.)
X
02
di
tU
ra
0
cn
H
En
c)
4
us
u0
0
OCO
4-)
O
4
4)
14
H
H
C
)
C)
4.)
c
1.
4
4C.)
I=
4
C.)
uHr
14
U)
Z
*a
(n
0
a
C 4w
Q
O
.J
W
=
O
C
410
in
M >
4
m
z
0
H 44
E4 H 44
;
"-_
*-4
.4 3
H
h
3
[3
3:
a
.4 X u
w
O
a
0
a:
0
0
"
4-
*
o3
o
_oO
o
C13
a
)
mi 4
U
E-4r
0.)45
OU
E4
4-
4ZZ
s O
Z
<
E
=
Q4)
14
Po
H'
C
uu u
H
(
m
4CUC
Q1
a4
a
Q-
a
a
.4L
h
Z
-44
>i
3>4
O * 4 U4-W4
40
0
O
O
4-
-4
O
*
Om
.4C
> a
wU
C
>
Uu
4)
E
02
-4
P1
4)
>4
0 O .
am4
)
I V
i
tV.
4)
CL
14
H
C
4
0
ad :n1
u .4
0 a
a
III
klc4l
'1
°
C
m
3=
I,~
cX
I
x
ee^^4
a
0
V
i
w
I _~
U
ca P
O
a
._
21
oc
g
14
U
cx
t
N
E
Vv
av
I .,
I
VJ
e
n
0
P1
m
I
·
fa4 ~
.,-+ "1n^Ca
I
I
a
I
H
m
o
si
oOa
c
O
O
3
-o
a
us
C
0 4. ;
Pa
O
~
r·
c,
C
o
04
c4
o
·
3
Tn
COmo
u
0moa
. , C
Xa
e
c,
all z
vI
C .~
a
.,-
m
a
r
OC
,
m o
so O
'r
CD
C
a
WX s
0
s
e
C
W
Z
is
H
Ed
~
2:
0s:
.~
3 i
W
4= .
.
X -W ) 4
z
w
En
w
m,
,.=
.,. z314
4r4 ·n n3
-I
4)
-r-4
--4
-- 4
a)
04
I4
ra
O
0at,
vc
To
0
w
a
O
_1 . E 4
a
~*<
V --q C
a
E-4 CZ
04
z
w
4
u
Cd
a
V]
c)
U
To
W
a
ii
a
E
W
C
OI
X
I
a
:
cn
U
I XX
14 5 44
E;
r
I
:zZ
45s
v
I0 m
t/co
H
a)4
(U
I9
-
-
3
C
4
u
4
41
In
c
Q
w
H
a
I
)
I
I
0
O
Q
aC
o
0
n
Q
s4
Pc
vt
a
4t
3
H
at
U
v
o
c,
o
4-)
o
V]
H
>
z
|
°
H
;
c4
a
.,
Z
1
.4
Eq
r
<: P;
"
w u
n
34
O
S
£
X
9
5
4i
JW
O
o
o
0Orc
4
m
aS
~~~~
~~~4-
.i
'
a
L3: Pt
3 a4L
4i la
$4
3
Z
ft
ED
3-
E4
0
3
0
O
,
Ef
3
U
a) uS
X
CN
rn
zI|L
~~~
} .~
3 cP
Pi Pi
s4 i
O
ae
(
::
c
Q
-
~~~~~L4Q4-
a a
a(a c,
ql
4 4
M
71
0O
O 0(V
O
44
9
Sk M
o
e3 U
;1 P
a
£ Q
4
1 r
a
I
XI
Y
Q
POq
V
C O2
m
3 0
UC
4>
-
4 4
O
>
r
w
V3
ce
·*
cr I a: I
I:
EV
OW W
0
;
c
w3
=
D H
01
rr
at ra
&
4
--4
w-
4·cm aM
a Q> U
0
ms (U w 4
W4
IV
Oaa
W 0o a)
X
0
4-)
zU;; £
m o
·4
C
11
s=
to
4J
4-)
c,
W
x M -4 0)
x e *H
Q
3
1-4
(1
m
U
S:
E;X
CD
<5
a
O
L4 C
P1 P1 a4) 4i
Q0
m
E-4 -')
O
k- 0
ew
F
tV >
Ora
o
4
O
C
-4
·rr-4
la
a
r4
U
a
c
a
m 41 u
,
0Q H'
a
w 4o
e-Ha
O
.-
0
p,f
Q
P1
ff
I
~
c
H 4) 4Li
U
a
~
'X
m-H ;
ae
Q)
i
O
W $s 4
4
I Im
U
1
~
I
gX
a
Wa
w
| m 4-4
I O
4uz (UA
04.4-
m
3
CT
a*H
-4 Pr
UZ
I
Ev
M
O
W C
I
v)
~o ~
u
cn'r*H
^£
0
-
U ( A>
I
-4
I
-U 40 -'.3 raQ
a
o
I
etao C sS4
a
a
u
U
3,
>
4)
I -4
>c
H
HH
E-4
C)
E~
0
X *9 c
3 *·
m
i.00
(*.E
4;
Q0
O
C
4 43Q `rn
mm
w C
e o
I
:z: tn
in
E~
.
CO 4:O iQ a -4i
H
:
W
Z 1
cw
,,
a CS:rs
X I
4 I
H
Pd
0
E('Oe
Ia
<*
I5
2
a:
4
I3X
q
"01 C
>,
Mt
u
.I
"0
r0
b
E
C
_4
H
io
~
4)
0
tU:
-
*
0X
H
4
-4
0
O
Q
C
.)
C to
X
_
<a
_E
0
0
V
C
a0
02o
>4e t
LI
<QO2
4
V
a
::I2
4 I 0
3
0
w
4-
-i
- .,
V
X4.)4
0
C
r
>'
>1
4
Ix
>
0 O
> ') 0Pi
C
.ad
4
c,-, 0
s
N
C
-J4
PIEt
.
_
,)
2
C
VO
"
t
C1
0
0
0
w
-
C
rj4)
04
4
4J
02
E-,
z
4)
5.
4
rC)
0
a
0
C)
O
P1
-t
4
tuN
C 0
02
-Eu
&4 (aJ
e
C
n
-
C
'U
I
i
I
0
0- P
,'
4)
0
W
C
v0
1
*"m
.i
a
I IH
',~
-I.
0
r0
Eu
e
a
I
C
cn
a
O
eo·o
C)
H
L
.U
'
02~
0
o
0
- c
X
r-
00
c4
C U
' W
0
0
_
o~ o_
______
0:
E-4
z
Ca
U
E-,
rz
Z
0
.3
4
a
.
tCT
i-
4.1
Eq4
Cu
E
E- -4
II
O
X
z
X
:T
a
O
_
_c.e-
C.
)3
02
I3
'4
UC:
St
_,00
.
:.-
>
C
E4
I
U
V
4
a.
tz
I£u
|-4 X o
>
U
4
H
0 -W
EH
02f
Z
0
LI
02*"
N
u
(-
w
>
C
>
_
4
! aM0
OL
W)4
1
I 0O
£I
*- 3
E
to
Ot
4
4>
-_
V
O M --
;-c
.e ..-i
OM
0 -
0
C)
44
C
1H
L4
4j-
V
.
4 .1-4
1
I
V
La
.4
4-1
:.1 C
,'
O
2 CL
W0
0
04
_
V
0
*
0
I
0
O
t
44
o
x
O
I,
"
u 4
0
_
c.
4)
_
I
N
.
a
.
C
£
C
40
4
>4
"4X
co0
.,
a
I
'.4)
O
4
0
E
*
,
40
_
Z
4
UC)
·r_
u3
O
I
-
_.1
(a
4
t0
0
I
.
*
a-
V
0
0
z
Cu
C Q)
V.
O
_4
_
II'
I)x
e
:
Q
1i-
m
I
U-
.
H
0
U C*r~r
3
a
'1
Io
_
0
00
O5
.,.I
u0
0
4)
( . 44J
~)(U
e
0
4-
a
:
_·
4) er
*i
)O
am~(
0
C
O
V
LL
e
EI
2.l.1
,,
o
(o
a
a
H
'4
a
v
E
zu
in
O
-0
.)
Q.
a2
0
)
:4:
a
H
HO
I
'60
Co:°
ao
I · *w-4C
aw
I
9
0
(
| z1
*,£
I
X
O
0
)4.)
ti
0
(aO
0
w) c,
0
4Q
c(
e 00
0 o( >p
C)3
Q
04
£;
sw m )ou
0a
;r
rr
c
2
0c
£
o
u
C
0
O
O
e>
Ps
O
Z
O
0U
1:402
4
(U
I .U
a
#4:
0
0
Z
x
0
Co
E-4
z
w
V)
H
I
c
C
I
C
c
C(
*
O u
(
m
o W
£
J 4.4)
m
4
C0C
VI
02(Um 4
cO2
I4 zZ0
v mY
o
CO
En
3 z
0
v
a
-.
(UO
ci
o
Z3
4L-
H
4J
4
i
4 C
U
C
-
4:
4:
C)
ZiI
a
'-,4
E-4
Z
E H
¢ H
(
I
O=
J
U
0
-4
-
C
SZ4
W
C
J
-
>
z
E-4
0
E U4
v
I
2
0
#
C.)
0
1___
C
O
4.4
4)
__
-
-
III
III
-
ZA
3
4
'44
E
0
w4
4m
4-
.,4
~4-
0
- k
0 01
4)
,4 4
k~
C
-04
vs
cn
E
I
w
e
U
cr4)
Oi
02 m
U
U
41
S
5.4
02
m
a
0
4IE 3 On
O
P,
Cu
'02
4)0
I
II
I
I
4)4.4
Cc,
;
N
4
C
Cu
4)
4) e
4.
'-40
a .
L4
02
C N
a k aCu C1
mC
£4
_- V Q O c
-.i
'"4
C nP ,·
4.2 Cu02
0
Z
02
4)
0
4.)
0mV
L4 4
9
O
CS1
0
CA 0
N 44
,
4.)
.
r
02
4i
C
C. N
=
'4
m
> 014
s ve 0 sm
ad
N N 04
I
4)
O
O)0
P
O
m
4) .)
O
3
3
0'
,-
s.4
4)
14
4
0
0
4
S14
'01Cu
x4a 04
4
4)
4, '..
I,
4)
"4
4.,-
4) .-4
C
4i
a4.200
4)4
o
4)
d
'"4C
cu
:
C1.4
C Q1n 4) C
00
5w
0 e
0
Ill
4)
m
.0 14
PC
VI
tj
II
4
e
1402
I
Cu
I4U
M
14
Q
'
_
'I-N Ct
14
0
E-4
>
|
02 C
03
C
'4
l
'"4
ad
W
0
U
Q
M
02
E1-4
0o
u
.I
1..
0.,4
4J
0O
Z414
Q :> h
4)4)
2
0
00
0%
0
-
4
aO
L4
m
u
l
rn
o
Ct
4)
w
0
4w
Cu
(O(
0
E-4
C
4)0
( Cu
'4
W
al
O
0u
>1
ua
0
Cu
".4
14)
14
0
14
4)
N
0
CP
"4
--
Jll
Cu
41
o
I
'"4
E4
O
o
oo
4.)
0
cn
H
E4
U
u
'"4
C 3
0
0
4)
O
C
)
4
u
.4
0
u
'4
ci
.r4
z
4.)
'"4
C14
14 4.
0
3
4-I
41)
0 0
=
To CD
~4
O4
w
4 4)
.)
To~~~~
Q4 c)14
W
H
E-4
u
:0
so
.,
4)
4.2
4-.
4.)
Iu
4.
02
w
4)
14
0
4.
C
0
z
U,
0
0
0
z
z
z
0
C
0o
0
3
0o
CD 0
0W
i
'4
_
3
Q)
,It
Z
CD0n
O0
1E-3
:D
04
4
I>
i"
z
I J0
0)
I
ou
u:
C)
oC
0
C
0
0
*H-E
C
10
o 0<
cwS
14
>
U 40
v=
ln
· .
-4
_
Q
X,,
4
oi I
e
0)m
m--
N a
>
03
_JC
.-
et
O
0
z
0
C 0
0
4
Z
4-
u
=
V C
=
Le 0
30
02
N
l
04
I
E
U
C
.f-4
E-
02
c
o
4)
Ct 0
4X ,
·- 4 .a
.,4
a
=
a
0
C4 >
4)E-4
14
0
o 0
C.)
O-
M
z
O
4V
A: V 4
.,
a
III
I
l
l
l
C
E,
1-4
L4
0
c
14
O
C4-e
m
I II
.
C
OI
I
4
O-
0w
z
C.)
4
44) OC1.4
)
0
C=
0
.i
"-
o
4
Cm
C
0 44
:C
4
4) 4 4 u )
XL
H H Q
V reSw
E C
U0
0t-La
r
U
1:
4)
co
in
01
)
0
U,
1.
(U
0 O C
C
0
C) ::. O
O
O
Z
o
E-4
I
(
02
>4
;~~~cau4
-
o
0
4
0
03
4.)
I
ad
-
--
:<:
C;
02
C,
C
O
,14
C02
O >
v
H
Ez
.z
c,
.H
O
C
C.)
0
0
43c
0 a04
14
1.4
C"'!
Xl
0
C.
4)
u
.,4
I4)
Cn
.4
4.)
0
cv
5:
-
1e
4J
E-4
2
QU
E-4
c
" C
E-4 'O
C
-4 aOM4)
-H
02
4.)
4)
0
Q)
rC
ai
:3
4.
I
V
ci
c
0
('1
.,
0
CA
rr
4)
>4
u
U
*
0
4)
C4W ) L
'-4
2
Is IC
.*H
coX
4)
Q,
02
-
40
(c
CO
4
-
On
C
U.)
0z
04
I
014
rOr
0
o
a:>r
4)
14
O
4
0
co
4.)
S
C
Q Q
u L
O 4
4. ,
: .
x
4)
4)
Z
.1-4 Q
4-) 44
I
O
u
CI
4.)
X
,4
4.)
1.4
-W
E-4
E-4
C.)
C
-4
CD
C2
4
E-
t_
1.4
O
tZ
-
u
C
m
a.4
l"
ra
0
- -
,
4)
qi
-
J J
a.
4.11.4
4 hi
0
0n
u
1..
0
4.)
z
>4
03
m
H
=
H
W4
u
C
I;
>1
,
V3
2~~~~n
J21.
-
· cl
-
~~~-
---
U. 4
Ec:;
u
0u
I
I IO
a
I .
..
-a
QCf
S< M]
u
ul)
4.
In
4;
co
a4
I =
E-,
i04
0
O.4
I )n
l
14
C
I
>nZ 1
4u
'-4
Z
O -H
: 0
0 04
(a
O Pi
L4
LQ
0
Z C -C
14
w:
>40
0 e.- O
E
a
a)
v
u
(3) C4
O
0
m
C
4
z >
m-44
(I
-.4 *l"
03
.JZ
= >.
N
.,I
-1
a
I 0
I
4
004
IM
Xe
X:
4
-
-
I
M 4
l
U
0
-4 ,
4i ac
e.
.,
I
0
(d O C
4)
4)
I
-4
~;
u
*4O0
3 _
4
.,.
.0
n
cCm
>
1.4
i,
OC
4)
I
U 400
40
.9-4U
0
,-4
49r)'
0 -C
"o o
M-
t
I
4J 0
4
to 04 0
iC
oa
>
04
_4
-
_
X
>-
o
.r.)
la
o
to
I
.4
.4.
ea
0
z
z
I
-
-4
w
2
0
1-4
o
., .
C4
4)
C.)
0
H;
4)
w
--
l-
-
0
O
C
.,4
.9-
E4
14
E
-0-
Q) C)4 _
.,
.4
C
3d
0
0
0
0
0%
U)
E4
a$
Ca
a
u
:U]
00
0
H
W
C4
H
14
ra
ra
lz
C.)
Pe
m
0
4j.) 4)
0 4 544 W4
d4.i i
M
.4
e
0
4)
4)
0
0
0
0 al
0 C'4
o
o1 4.)
C4
4)
00
M
)
4 0- .0
3
4i C
."I .-
0
04
>4 0
%0
0
l
w
Ez
W
'4
C)
pi
Or
C C
,4
w
I=
0
4.
r4 O
u0O
0 0
C C
O
I
|
4
U)
H
%4
0
4.4
C
4.) 4i
1 m
ra
(L
>
'r4)02>4
-I
4) L
o 2
.4
I4 4
C
-
x
9:
14
C.)
H
9-4
cn
E-4
4:
C
4x
u0
C
C) U ,-
-
IIII-
a
-I
+J4.4La
o =
4)
U
.,94
4.
Ifl
4)
0
.94
m
'4
m
m 02
W
-4)4
m
>
_
3
4)
0.
4.
z
4
41)
I
3
E4.
L4
an
)
=(e 02
0.4n
2 042
>1
>4
'IO
E-4
M
4..4Q
O
0
-
4 0
N -4
·4 4.
9
U4
O
-j
.
I4
OE.4
i;1.
1
I
I -W
4i .-4
C:
O
~U
-----
---·------------------
4)
0O
.4
v
,4
=
2
C
O
1.-4
,
>4
w
I
w
C
>1
. 4 4.) .4 $4 "
(J i)
4
UO O
0
tOZ
V
in
lu
4rLd X
I
C
0
.94
-4i
1.-4
O
.4
>
QU
_4
-4
C
I
4E
0"0
w Ci0
Q
.,4
U
I
4
CI
e
0V
H
o0
4.0
0
"44&
2
0
-4
.)
54
C)
.9I
.-
H
X .
4X
Q0 Q
024
4 4)
C)
2
.4.)
0o
-4
w
w*
0 4.
4)
.9-4
--·---------------
C
II
C4.)
,.,-i02X
4
O,M
.9-4
114
I
.9-4
1..
Z0.-
C.
u T
.-.
I2u
---
C
L4
P-
co
4
4)
.-4
eO
-
0
C.)
O
-
4) -4 Il
4.
0
14
u
C4
4
4-4 -
)
*,r
C.
E4
4H
C
. L. 4) -
mI-
cI
a
>
;
-
4.)
4
4vi
e
0
4.
0
4.
I
0
o
-4 C
0
#"4
Vj -
o0
o
.94
3
m 4)
w
co
0
m
0
4) 4)0c
01t
4) ..
4
.,4
4·rl
C
(O4.)
I
H
0
a
C
.4
Q
4)
.J 0
0 0)x
2 I 4 .
S4
4)
1.
4.)
4)
I
4) C
U
m
0i
I
.,-4
4.
H
E-4
II'
-
-
0
a) >,4
S
*
al
0
'0
.4
r'0
4.
E
1..
4)
C
V
(U
Hl
a
H I a
.,q ie
C);
U]-H
g
nlQ
r
0
H
0O 0
0414
(1
1: 0
c
0O
4)
0
I (
0
E
Zd
H
0
0
o
0
C
4)
14
H(U
021
0
1-"
0:I 0
OCOt)
'00
C co
a
4)
4.)
(
u4)
(U
H Oa
C)
0
m
0
Nr
mV
MG
C)
.
H
0
4
s
V _
aH
.4
.
2
CP
I
ea
ea
m (U
.4,
4
Q Q
ra a a
3o
(U,
o
o
O)0
)
-.. D
O
04e
C t
P4)
1.4
m
Q
W
4. *-(
'0
- 4)
4)
4)
C4
o
0
(o4)
C
4)4.)
0
44
4. 1
0
m(U
0
,.4)
m, Q
4.) .p-4 0 0
.9-4
..
00
o
02e 0
0 -0
tv
440
(U
0
=
0
0
o.,-3
4)
I
r.Q
>1
(U
C C
Q) (1
r.
4.
O*H
(Ua
.
j 0-
l
0(UF
41 _,
0
3
04
C.)
04'0
4
0
0
U01.4 I
04)
(a
i
4.-
04
C)
2
.,-I
w
0C) 4.J
u
a
l
U (
U,
l
I
0
I 0
W
wo
1.
0o*..4
o
la
4)
a0(U
3 C
M M
H
02
-
0 e
4)
UZ
E4
4)
-4
'U
4)
0
E4
co
4. )
(1)
la
S4 U
I
*^
Ca
Q
Q)
4.)
4
< UMwq
4
0O
4-4
.- 4 .
.-4
04
43) oQ 0
1 C
0
X ( U0 0Q)
W 0 4-) 4.44.)
0m
(-, .l-Cml . C
IC
.
m
v
04
C)
a
E0
n
ix
0
u
:
E
En
02
00
C.)
0
O
X
30
4)
0.4
.,9-i
0
30
V
0O
.
4-J
4)
04)
4)
04
la
0aQ 0
U
0· 4H4) U0 0.'
0=
41)
4.)
t
4 ))
o-H 4(
u u
o
0
0
4.)
w
0
0n
04
..
0
k9co
m M
Uo
z
t
W
0
-
H
4
4
a%
1.4
Le
.6,Xn
wO
U
Z
a
z
o
4Q)
L
4)
H
E-4C
<
E4
H
di4i
la
0
4)
O
z.4
C '
4C
Q CN
AJ-
C
c2
0- 3U
>
LnI
3
C4
U,
4 A
I
-W
Ca
Q-Q
O
U2
(U
0)
m
M m-4) 1
o
. V 000 3o2 .) -H
S
O~G~.~
.e
~ (U4W ~r
4
4-4
9-4
4) (
Q
£=
Z;
OC)
H
H
Q)
14
Ul2
0m
'1
0 4
-H
04)
0
0
;
r 4)
0
0
0
3
H
04()
X
c
a
3
3
C
0C0
00Q
a4 M
I- 0
04
4i
O~3
= - l
0
. 23(U
Q-
wEn
rr;C
0
C)l -
C%m
4
0.
a
4-
S
I
a
I
95
Le
s
XX
O
I
a
J no
II
H
anx
rd
Z
a,
i-4
D,zco (a
E
u
0
n
La
aQ
X@
4) &
e
s;-X ."
o
X
V
IV
SrlW
c w
o
m
o3
a
,-O
0
a
o
I
Di
w;
O
0
C
Z 4i.
3
C~ -4
.rfI
I
It
a
0
Q
4J -O
z
4-..
>>~ .
0
.
i
Q4
I
1
S V
u
Io
Es4
V
I
I
A;
o
o
(n
C.)
I
I
C
rl
.
*H
....
I
,.
_0-f
M, 04
XXUO
I
O,
Vr4
*,
v
)
>: _
X
X
I_* Q
_
e
~~~~~~
I"
~I
O
.
-3
O
.H
;
a
a
u
(
q
.:4
X
o:
L
3
-q
L(
vu
c
C 1
L rJ c
C
,
tv3
QX
tX
oe
e
C
V
.
m
4
a
0- Z
0
3
0 a4
0 V; cX
C
O
r4(
m C
I
;
o
Z
"
3
a
M
a
4~Z?
4
X
n
4~~~~U
ss
v
C
0
Q;P
i
X;
X 1
O
Z
O
4
4
i ;
~1
DI=~iZ
:
r
uz o 1
>
-W
a
OJ C
s,
i
X
L,
___
4-
*4
u
V
£4
;
Q
-
=
0
ok~~~~~~~(1).0
W4
- _-4 _- X
Z
$C W
E;
Q1
a)
*$^
ct
I
4
a
er
n£ o
z
·c
E
--4
>Q
L
Z_;/
a
0 a 0,
Q W
X
E
I
w4
C)
4j
Q
(1
;4C
Le
*n,
I: s:·~
. :
X
a
a
m
>
,
:>
V
i
E-e
.
.
a
3o o
o si
4m
>i
eD
.
O
ra
a
I *
0
44 W,,,
,
a
X
I1 4;~- re · O; a) · C1
rl {3C
.^ Q~(1= 3
k I .<,
Z
E-4 (z
4 4
aa ft a
I
I
O: :
Q
X 4i
I
a
M
*
a a O *Hr·
a o: sr
H
(J
in
·
a
d ·*-4)O I
X-4Z
0
>1
44
&
Q
,
.,
O
r
~"
C 0
0
a
P
e
C :4
O
1Q
Cm
W
E-4
u
,--
3 C
.
/,,4
Wd
1
4
Xi
*H)
3
C
,,-- O
i
:
.--
.
/
C 0
· ,I
0Ow
Q
:: *'
c --
1
0
G
.
·
ss~ a
a
O.
o3 IO
M,-~,-~.
>
4" 4J
0.>::: .W
C to
a r4
c
.0
O
o0
4i
_~
I)
V:
·
.-4
pqC W<3
.~
I
o
o
Z:
C
a _P · r .~,
:3,
:
Q ad
m
I
V
I
I2_C a
I ,-0
un
z
S 440J
.1
0 4n
wt 4
o
X
-
,
.J
e 0.
.1
J
O
O
C~
to 4,)
O
U
P;
I=:
4
az
I
I
'd
4-J
0 F.
~1
OI
Dm
w
j
* 0
U r·
:z:
>e
EP v
$e
re
W ED
4 7(
4i
aa
;X
i
_
Q 3
oI
Ed
n Pr
W
C4
o0
·c
,
a n
o
I~~~~~~~~~~~~~~~~`
c; 4
,
Q a>4
0so4 Q
c I-~
o,
a
I
~
i
m
Ei
pq
(1
cJ
~
O Q
-
Q
toX
Or
Download