Uploaded by viyogo4758

Expert Systems (1)

advertisement
UNIT I
Introduction to AI Programming Languages
Artificial Intelligence is a branch of engineering, which basically aims for making the computers which can
think intelligently, in the similar manner the intelligent humans think. Artificial intelligence is the field of
computer science associated with making the machines that are programmed to be capable of thinking and
solving problems like the human brain. These machines can perform human-like tasks and can also learn from
past experiences like human beings. Artificial intelligence involves advanced algorithms and theories of
computer science. It is used in robotics and gaming extensively.
Here are the top languages that are most commonly used for making the AI projects:
Python - Python is considered to be in the first place in the list of all AI development languages due to the
simplicity. The syntaxes belonging to python are very simple and can be easily learnt. Therefore, many AI
algorithms can be easily implemented in it. Python takes short development time in comparison to other
languages like Java, C++ or Ruby. Python supports object oriented, functional as well as procedure-oriented
styles of programming. There are plenty of libraries in python, which make our tasks easier. For example:
NumPy is a library for python that helps us to solve many scientific computations. Also, we have Pybrain,
which is for using machine learning in Python.
Advantages
 Python has a rich and extensive variety of library and tools.
 Supports algorithm testing without having to implement them.
 Python supporting object-oriented design increases a programmer’s productivity.
 Compared to Java and C++, Python is faster in development.
Drawbacks
 Developers accustomed to using Python face difficulty in adjusting to completely different syntax
when they try using other languages for AI programming.
 Unlike C++ and Java, python works with the help of an interpreter which makes compilation and
execution slower in AI development.
 Not suitable for mobile computing. For AI meant for mobile applications, Python unsuitable due to its
weak language for mobile computing.
C++ - C++ is the fastest computer language, its speed is appreciated for AI programming projects that are
time sensitive. It provides faster execution and has less response time which is applied in search engines and
development of computer games. In addition, C++ allows extensive use of algorithms and is efficient in using
statistical AI techniques. Another important factor is that C++ supports re-use of programs in development
due to inheritance and data-hiding thus efficient in time and cost saving.
Advantages
 Good for finding solutions for complex AI problems.
 Rich in library functions and programming tools collection.
 C++ is a multi-paradigm programming that supports object-oriented principles thus useful in achieving
organized data.
Drawbacks
 Poor in multitasking; C++ is suitable only for implementing core or the base of specific systems or
algorithms.
 It follows the bottom-up approach thus, highly complex making it hard for newbies developers at using
it for writing AI programs.
R - R is one of the most effective language and environment for analyzing and manipulating the data for
statistical purposes. Using R, we can easily produce well-designed publication-quality plot, including
mathematical symbols and formulae where needed. Apart from being a general purpose language, R has
numerous of packages like RODBC, Gmodels, Class and Tm which are used in the field of machine learning.
These packages make the implementation of machine learning algorithms easy, for cracking the business
associated problems.
Lisp - Lisp is one of the oldest and the most suited languages for the development in AI. It was invented by
John McCarthy, the father of Artificial Intelligence in 1958. It has the capability of processing the symbolic
information
effectively.
It is also known for its excellent prototyping capabilities and easy dynamic creation of new objects, with
automatic garbage collection. Its development cycle allows interactive evaluation of expressions and
recompilation of functions or file while the program is still running. Over the years, due to advancement, many
of these features have migrated into many other languages thereby affecting the uniqueness of Lisp.
Advantages
 Fast and efficient in coding as it is supported by compilers instead of interpreters.
 Automatic memory manager was invented for LISP, therefore, it has a garbage collection.
 LISP offers specific control over systems resulting to their maximum use.
Drawbacks
 Few developers are well acquainted with Lisp programming.
 Being a vintage programming language artificial intelligence, LISP requires configuration of new
software and hardware to accommodate it use.
Prolog - This language stays alongside Lisp when we talk about development in AI field. The features
provided by it include efficient pattern matching, tree-based data structuring and automatic backtracking. All
these features provide a surprisingly powerful and flexible programming framework. Prolog is widely used
for working on medical projects and also for designing expert AI systems.
Advantages
 Prolog has a built-in list handling essential in representing tree-based data structures.
 Efficient for fast prototyping for AI programs to be released modules frequently.
 Allows database creation simultaneous with running of the program.
Drawbacks
 Despite prolog old age, it has not been fully standardized in that some features differ in implementation
making the work of the developer cumbersome.
Java - Java can also be considered as a good choice for AI development. Artificial intelligence has lot to do
with search algorithms, artificial neural networks and genetic programming. Java provides many benefits:
easy use, debugging ease, package services, simplified work with large-scale projects, graphical representation
of data and better user interaction. It also has the incorporation of Swing and SWT (the Standard Widget
Toolkit). These tools make graphics and interfaces look appealing and sophisticated.
Advantages
 Very portable; it is easy to implement on different platforms because of Virtual Machine Technology.
 Unlike C++, Java is simple to use and even debug.
 Has an automatic memory manager which eases the work of the developer.
Disadvantages
 Java is, however, slower than C++, it has less speed in execution and more response time.
 Though highly portable, on older platforms, java would require dramatic changes on software and
hardware to facilitate.
 Java is also a generally immature programming AI language as there are still some developments
ongoing such as JDK 1.1 in beta.
Blind/Uninformed Search Strategies
Uninformed search is a class of general-purpose search algorithms which operates in brute force-way.
Uninformed search algorithms do not have additional information about state or search space other than how
to traverse the tree, so it is also called blind search.
Following are the various types of uninformed search algorithms:
1. Breadth-first Search
2. Depth-first Search
3. Depth-limited Search
4. Iterative deepening depth-first search
5. Uniform cost search
6. Bidirectional Search
1. Breadth-first Search:
 Breadth-first search is the most common search strategy for traversing a tree or graph. This algorithm
searches breadthwise in a tree or graph, so it is called breadth-first search.
 BFS algorithm starts searching from the root node of the tree and expands all successor node at the
current level before moving to nodes of next level.
 The breadth-first search algorithm is an example of a general-graph search algorithm.
 Breadth-first search implemented using FIFO queue data structure.
Advantages:
 BFS will provide a solution if any solution exists.
 If there are more than one solution for a given problem, then BFS will provide the minimal solution
which requires the least number of steps.
Disadvantages:
 It requires lots of memory since each level of the tree must be saved into memory to expand the next
level.
 BFS needs lots of time if the solution is far away from the root node.
Example:
In the below tree structure, we have shown the traversing of the tree using BFS algorithm from the root node
S to goal node K. BFS search algorithm traverse in layers, so it will follow the path which is shown by the
dotted arrow, and the traversed path will be:
1. S---> A--->B---->C--->D---->G--->H--->E---->F---->I---->K
2. Time Complexity: Time Complexity of BFS algorithm can be obtained by the number of nodes
traversed in BFS until the shallowest Node. Where the d= depth of shallowest solution and b is a
node at every state.
3. T (b) = 1+b2+b3+.......+ bd= O (bd)
4. Space Complexity: Space complexity of BFS algorithm is given by the Memory size of frontier
which is O(bd).
5. Completeness: BFS is complete, which means if the shallowest goal node is at some finite depth,
then BFS will find a solution.
6. Optimality: BFS is optimal if path cost is a non-decreasing function of the depth of the node.
2. Depth-first Search
 Depth-first search is a recursive algorithm for traversing a tree or graph data structure.
 It is called the depth-first search because it starts from the root node and follows each path to its greatest
depth node before moving to the next path.
 DFS uses a stack data structure for its implementation.
 The process of the DFS algorithm is similar to the BFS algorithm.
Advantage:
 DFS requires very less memory as it only needs to store a stack of the nodes on the path from root
node to the current node.
 It takes less time to reach to the goal node than BFS algorithm (if it traverses in the right path).
Disadvantage:
 There is the possibility that many states keep re-occurring, and there is no guarantee of finding the
solution.
 DFS algorithm goes for deep down searching and sometime it may go to the infinite loop.
Example:
In the below search tree, we have shown the flow of depth-first search, and it will follow the order as:
Root node--->Left node ----> right node.
It will start searching from root node S, and traverse A, then B, then D and E, after traversing E, it will
backtrack the tree as E has no other successor and still goal node is not found. After backtracking it will
traverse node C and then G, and here it will terminate as it found goal node.
Completeness: DFS search algorithm is complete within finite state space as it will expand every node within
a limited search tree.
Time Complexity: Time complexity of DFS will be equivalent to the node traversed by the algorithm. It is
given by:
T(n)= 1+ n2+ n3 +.........+ nm=O(nm)
Where, m= maximum depth of any node and this can be much larger than d (Shallowest solution depth)
Space Complexity: DFS algorithm needs to store only single path from the root node, hence space complexity
of DFS is equivalent to the size of the fringe set, which is O(bm).
Optimal: DFS search algorithm is non-optimal, as it may generate a large number of steps or high cost to
reach to the goal node.
3. Depth-Limited Search Algorithm:
A depth-limited search algorithm is similar to depth-first search with a predetermined limit. Depth-limited
search can solve the drawback of the infinite path in the Depth-first search. In this algorithm, the node at the
depth limit will treat as it has no successor nodes further.
Depth-limited search can be terminated with two Conditions of failure:
 Standard failure value: It indicates that problem does not have any solution.
 Cutoff failure value: It defines no solution for the problem within a given depth limit.
Advantages:
 Depth-limited search is Memory efficient.
Disadvantages:
 Depth-limited search also has a disadvantage of incompleteness.
 It may not be optimal if the problem has more than one solution.
Example:
Completeness: DLS search algorithm is complete if the solution is above the depth-limit.
Time Complexity: Time complexity of DLS algorithm is O(bℓ).
Space Complexity: Space complexity of DLS algorithm is O(b×ℓ).
Optimal: Depth-limited search can be viewed as a special case of DFS, and it is also not optimal even if ℓ>d.
4. Uniform-cost Search Algorithm:
Uniform-cost search is a searching algorithm used for traversing a weighted tree or graph. This algorithm
comes into play when a different cost is available for each edge. The primary goal of the uniform-cost search
is to find a path to the goal node which has the lowest cumulative cost. Uniform-cost search expands nodes
according to their path costs form the root node. It can be used to solve any graph/tree where the optimal cost
is in demand. A uniform-cost search algorithm is implemented by the priority queue. It gives maximum
priority to the lowest cumulative cost. Uniform cost search is equivalent to BFS algorithm if the path cost of
all edges is the same.
Advantages:
 Uniform cost search is optimal because at every state the path with the least cost is chosen.
Disadvantages:
 It does not care about the number of steps involve in searching and only concerned about path cost.
Due to which this algorithm may be stuck in an infinite loop.
Example:
Completeness:
Uniform-cost search is complete, such as if there is a solution, UCS will find it.
Time Complexity:
Let C* is Cost of the optimal solution, and ε is each step to get closer to the goal node. Then the number of
steps is = C*/ε+1. Here we have taken +1, as we start from state 0 and end to C*/ε.
Hence, the worst-case time complexity of Uniform-cost search isO(b1 + [C*/ε])/.
Space Complexity:
The same logic is for space complexity so, the worst-case space complexity of Uniform-cost search is O(b1 +
[C*/ε]).
Optimal:
Uniform-cost search is always optimal as it only selects a path with the lowest path cost.
5. Iterative deepening depth-first Search:
The iterative deepening algorithm is a combination of DFS and BFS algorithms. This search algorithm finds
out the best depth limit and does it by gradually increasing the limit until a goal is found.
This algorithm performs depth-first search up to a certain "depth limit", and it keeps increasing the depth limit
after each iteration until the goal node is found.
This Search algorithm combines the benefits of Breadth-first search's fast search and depth-first search's
memory efficiency.
The iterative search algorithm is useful uninformed search when search space is large, and depth of goal node
is unknown.
Advantages:
 Itcombines the benefits of BFS and DFS search algorithm in terms of fast search and memory
efficiency.
Disadvantages:
 The main drawback of IDDFS is that it repeats all the work of the previous phase.
Example:
Following tree structure is showing the iterative deepening depth-first search. IDDFS algorithm performs
various iterations until it does not find the goal node. The iteration performed by the algorithm is given as:
1'st Iteration-----> A
2'nd Iteration----> A, B, C
3'rd Iteration------>A, B, D, E, C, F, G
4'th Iteration------>A, B, D, H, I, E, C, F, K, G
In the fourth iteration, the algorithm will find the goal node.
Completeness:
This algorithm is complete is ifthe branching factor is finite.
Time Complexity:
Let's suppose b is the branching factor and depth is d then the worst-case time complexity is O(bd).
Space Complexity:
The space complexity of IDDFS will be O(bd).
Optimal:
IDDFS algorithm is optimal if path cost is a non- decreasing function of the depth of the node.
6. Bidirectional Search Algorithm:
Bidirectional search algorithm runs two simultaneous searches, one form initial state called as forward-search
and other from goal node called as backward-search, to find the goal node. Bidirectional search replaces one
single search graph with two small subgraphs in which one starts the search from an initial vertex and other
starts from goal vertex. The search stops when these two graphs intersect each other.
Bidirectional search can use search techniques such as BFS, DFS, DLS, etc.
Advantages:
 Bidirectional search is fast.
 Bidirectional search requires less memory
Disadvantages:
 Implementation of the bidirectional search tree is difficult.
 In bidirectional search, one should know the goal state in advance.
Example:
In the below search tree, bidirectional search algorithm is applied. This algorithm divides one graph/tree into
two sub-graphs. It starts traversing from node 1 in the forward direction and starts from goal node 16 in the
backward direction.
The algorithm terminates at node 9 where two searches meet.
Completeness: Bidirectional Search is complete if we use BFS in both searches.
Time Complexity: Time complexity of bidirectional search using BFS is O(bd).
Space Complexity: Space complexity of bidirectional search is O(bd).
Optimal: Bidirectional search is Optimal.
Breadth First Search
Breadth First Search (BFS) searches breadth-wise in the problem space. Breadth-First search is like
traversing a tree where each node is a state which may a be a potential candidate for solution. It expands nodes
from the root of the tree and then generates one level of the tree at a time until a solution is found. It is very
easily implemented by maintaining a queue of nodes. Initially the queue contains just the root. In each
iteration, node at the head of the queue is removed and then expanded. The generated child nodes are then
added to the tail of the queue.
Algorithm: Breadth-First Search
1. Create a variable called NODE-LIST and set it to the initial state.
2. Loop until the goal state is found or NODE-LIST is empty.
a. Remove the first element, say E, from the NODE-LIST. If NODE-LIST was empty then quit.
b. For each way that each rule can match the state described in E do:
i) Apply the rule to generate a new state.
ii) If the new state is the goal state, quit and return this state.
iii) Otherwise add this state to the end of NODE-LIST
Since it never generates a node in the tree until all the nodes at shallower levels have been generated, breadthfirst search always finds a shortest path to a goal. Since each node can be generated in constant time, the
amount of time used by Breadth first search is proportional to the number of nodes generated, which is a
function of the branching factor b and the solution d. Since the number of nodes at level d is bd, the total
number of nodes generated in the worst case is b + b2 + b3 +… + bd i.e. O(bd) , the asymptotic time complexity
of breadth first search.
Breadth First Search
Look at the above tree with nodes starting from root node, R at the first level, A and B at the second level and
C, D, E and F at the third level. If we want to search for node E then BFS will search level by level. First it
will check if E exists at the root. Then it will check nodes at the second level. Finally, it will find E the third
level.
Advantages of Breadth-First Search
1. Breadth first search will never get trapped exploring the useless path forever.
2. If there is a solution, BFS will definitely find it out.
3. If there is more than one solution then BFS can find the minimal one that requires less number of steps.
Disadvantages of Breadth-First Search
1. The main drawback of Breadth first search is its memory requirement. Since each level of the tree
must be saved in order to generate the next level, and the amount of memory is proportional to the
number of nodes stored, the space complexity of BFS is O(bd). As a result, BFS is severely spacebound in practice so will exhaust the memory available on typical computers in a matter of minutes.
2. If the solution is farther away from the root, breath first search will consume lot of time.
Depth First Search
In depth-first search, the frontier acts like a last-in first-out stack. The elements are added to the stack one at
a time. The one selected and taken off the frontier at any time is the last element that was added.
Figure 1: The order nodes are expanded in depth-first search
Example: Consider the tree-shaped graph in Figure 1. Suppose the start node is the root of the tree (the node
at the top) and the nodes are ordered from left to right so that the leftmost neighbour is added to the stack last.
In depth-first search, the order in which the nodes are expanded does not depend on the location of the goals.
The first sixteen nodes expanded are numbered in order of expansion in Figure 1. The shaded nodes are the
nodes at the ends of the paths on the frontier after the first sixteen steps.
Notice how the first six nodes expanded are all in a single path. The sixth node has no neighbours. Thus, the
next node that is expanded is a child of the lowest ancestor of this node that has unexpanded children.
Implementing the frontier as a stack results in paths being pursued in a depth-first manner - searching one path
to its completion before trying an alternative path. This method is said to involve backtracking: The algorithm
selects a first alternative at each node, and it backtracks to the next alternative when it has pursued all of the
paths from the first selection. Some paths may be infinite when the graph has cycles or infinitely many nodes,
in which case a depth-first search may never stop.
This algorithm does not specify the order in which the neighbours are added to the stack that represents the
frontier. The efficiency of the algorithm is sensitive to this ordering.
Because depth-first search is sensitive to the order in which the neighbours are added to the frontier, care must
be taken to do it sensibly. This ordering can be done statically (so that the order of the neighbours is fixed) or
dynamically (where the ordering of the neighbours depends on the goal).
Advantages
 space is restricted;
 many solutions exist, perhaps with long path lengths, particularly for the case where nearly all paths
lead to a solution; or
 the order of the neighbours of a node are added to the stack can be tuned so that solutions are found
on the first try.
Disadvantages
 it is possible to get caught in infinite paths; this occurs when the graph is infinite or when there are
cycles in the graph; or
 solutions exist at shallow depth, because in this case the search may look at many long paths before
finding the short solutions.
Heuristic Search Techniques
Informed search algorithm contains an array of knowledge such as how far we are from the goal, path cost,
how to reach to goal node, etc. This knowledge help agents to explore less to the search space and find more
efficiently the goal node.
The informed search algorithm is more useful for large search space. Informed search algorithm uses the idea
of heuristic, so it is also called Heuristic search.
Heuristics function: Heuristic is a function which is used in Informed Search, and it finds the most promising
path. It takes the current state of the agent as its input and produces the estimation of how close agent is from
the goal. The heuristic method, however, might not always give the best solution, but it guaranteed to find a
good solution in reasonable time. Heuristic function estimates how close a state is to the goal. It is represented
by h(n), and it calculates the cost of an optimal path between the pair of states. The value of the heuristic
function is always positive.
Admissibility of the heuristic function is given as:
1. h(n) <= h*(n)
Here h(n) is heuristic cost, and h*(n) is the estimated cost. Hence heuristic cost should be less than or
equal to the estimated cost.
Pure Heuristic Search:
Pure heuristic search is the simplest form of heuristic search algorithms. It expands nodes based on their
heuristic value h(n). It maintains two lists, OPEN and CLOSED list. In the CLOSED list, it places those nodes
which have already expanded and in the OPEN list, it places nodes which have yet not been expanded.
On each iteration, each node n with the lowest heuristic value is expanded and generates all its successors and
n is placed to the closed list. The algorithm continues unit a goal state is found.
In the informed search we will discuss two main algorithms which are given below:
 Hill Climbing
 Best First Search Algorithm (Greedy search)
 A* Search Algorithm
Hill Climbing






Hill climbing algorithm is a local search algorithm which continuously moves in the direction of
increasing elevation/value to find the peak of the mountain or best solution to the problem. It terminates
when it reaches a peak value where no neighbour has a higher value.
Hill climbing algorithm is a technique which is used for optimizing the mathematical problems. One
of the widely discussed examples of Hill climbing algorithm is Traveling-salesman Problem in which
we need to minimize the distance travelled by the salesman.
It is also called greedy local search as it only looks to its good immediate neighbour state and not
beyond that.
A node of hill climbing algorithm has two components which are state and value.
Hill Climbing is mostly used when a good heuristic is available.
In this algorithm, we don't need to maintain and handle the search tree or graph as it only keeps a single
current state.
Features of Hill Climbing:
Following are some main features of Hill Climbing Algorithm:
 Generate and Test variant: Hill Climbing is the variant of Generate and Test method. The Generate
and Test method produce feedback which helps to decide which direction to move in the search space.
 Greedy approach: Hill-climbing algorithm search moves in the direction which optimizes the cost.
 No backtracking: It does not backtrack the search space, as it does not remember the previous states.
State-space Diagram for Hill Climbing:
The state-space landscape is a graphical representation of the hill-climbing algorithm which is showing a
graph between various states of algorithm and Objective function/Cost.
On Y-axis we have taken the function which can be an objective function or cost function, and state-space on
the x-axis. If the function on Y-axis is cost then, the goal of search is to find the global minimum and local
minimum. If the function of Y-axis is Objective function, then the goal of the search is to find the global
maximum and local maximum.
Different regions in the state space landscape:
Local Maximum: Local maximum is a state which is better than its neighbour states, but there is also another
state which is higher than it.
Global Maximum: Global maximum is the best possible state of state space landscape. It has the highest
value of objective function.
Current state: It is a state in a landscape diagram where an agent is currently present.
Flat local maximum: It is a flat space in the landscape where all the neighbour states of current states have
the same value.
Shoulder: It is a plateau region which has an uphill edge.
Types of Hill Climbing Algorithm:
 Simple hill Climbing:
 Steepest-Ascent hill-climbing:
 Stochastic hill Climbing:
1. Simple Hill Climbing:
Simple hill climbing is the simplest way to implement a hill climbing algorithm. It only evaluates the
neighbour node state at a time and selects the first one which optimizes current cost and set it as a
current state. It only checks it's one successor state, and if it finds better than the current state, then move
else be in the same state. This algorithm has the following features:
 Less time consuming
 Less optimal solution and the solution is not guaranteed
Algorithm for Simple Hill Climbing:
 Step 1: Evaluate the initial state, if it is goal state then return success and Stop.
 Step 2: Loop Until a solution is found or there is no new operator left to apply.
 Step 3: Select and apply an operator to the current state.
 Step 4: Check new state:
1. If it is goal state, then return success and quit.
2. Else if it is better than the current state then assign new state as a current state.
3. Else if not better than the current state, then return to step2.
 Step 5: Exit.
2. Steepest-Ascent hill climbing:
The steepest-Ascent algorithm is a variation of simple hill climbing algorithm. This algorithm examines all
the neighbouring nodes of the current state and selects one neighbour node which is closest to the goal state.
This algorithm consumes more time as it searches for multiple neighbours
Algorithm for Steepest-Ascent hill climbing:
 Step 1: Evaluate the initial state, if it is goal state then return success and stop, else make current state
as initial state.
 Step 2: Loop until a solution is found or the current state does not change.
1. Let SUCC be a state such that any successor of the current state will be better than it.
2. For each operator that applies to the current state:
I.
Apply the new operator and generate a new state.
II.
Evaluate the new state.
III.
If it is goal state, then return it and quit, else compare it to the SUCC.
IV.
If it is better than SUCC, then set new state as SUCC.
V.
If the SUCC is better than the current state, then set current state to SUCC.
 Step 5: Exit.
3. Stochastic hill climbing:
Stochastic hill climbing does not examine for all its neighbour before moving. Rather, this search algorithm
selects one neighbor node at random and decides whether to choose it as a current state or examine another
state.
Problems in Hill Climbing Algorithm:
1. Local Maximum: A local maximum is a peak state in the landscape which is better than each of its
neighbouring states, but there is another state also present which is higher than the local maximum.
Solution: Backtracking technique can be a solution of the local maximum in state space landscape. Create a
list of the promising path so that the algorithm can backtrack the search space and explore other paths as well.
2. Plateau: A plateau is the flat area of the search space in which all the neighbour states of the current state
contains the same value, because of this algorithm does not find any best direction to move. A hill-climbing
search might be lost in the plateau area.
Solution: The solution for the plateau is to take big steps or very little steps while searching, to solve the
problem. Randomly select a state which is far away from the current state so it is possible that the algorithm
could find non-plateau region.
3. Ridges: A ridge is a special form of the local maximum. It has an area which is higher than its surrounding
areas, but itself has a slope, and cannot be reached in a single move.
Solution: With the use of bidirectional search, or by moving in different directions, we can improve this
problem.
Simulated Annealing:
A hill-climbing algorithm which never makes a move towards a lower value guaranteed to be incomplete
because it can get stuck on a local maximum. And if algorithm applies a random walk, by moving a successor,
then it may complete but not efficient. Simulated Annealing is an algorithm which yields both efficiency and
completeness.
In mechanical term Annealing is a process of hardening a metal or glass to a high temperature then cooling
gradually, so this allows the metal to reach a low-energy crystalline state. The same process is used in
simulated annealing in which the algorithm picks a random move, instead of picking the best move. If the
random move improves the state, then it follows the same path. Otherwise, the algorithm follows the path
which has a probability of less than 1 or it moves downhill and chooses another path.
Best-first Search Algorithm (Greedy Search)
Greedy best-first search algorithm always selects the path which appears best at that moment. It is the
combination of depth-first search and breadth-first search algorithms. It uses the heuristic function and search.
Best-first search allows us to take the advantages of both algorithms. With the help of best-first search, at each
step, we can choose the most promising node. In the best first search algorithm, we expand the node which is
closest to the goal node and the closest cost is estimated by heuristic function, i.e.
1. f(n)= g(n).
Where, h(n)= estimated cost from node n to the goal.
The greedy best first algorithm is implemented by the priority queue.
Best first search algorithm:
 Step 1: Place the starting node into the OPEN list.
 Step 2: If the OPEN list is empty, Stop and return failure.
 Step 3: Remove the node n, from the OPEN list which has the lowest value of h(n), and places it in
the CLOSED list.
 Step 4: Expand the node n, and generate the successors of node n.
 Step 5: Check each successor of node n, and find whether any node is a goal node or not. If any
successor node is goal node, then return success and terminate the search, else proceed to Step 6.
 Step 6: For each successor node, algorithm checks for evaluation function f(n), and then check if the
node has been in either OPEN or CLOSED list. If the node has not been in both list, then add it to the
OPEN list.
 Step 7: Return to Step 2.
Advantages:
 Best first search can switch between BFS and DFS by gaining the advantages of both the algorithms.
 This algorithm is more efficient than BFS and DFS algorithms.
Disadvantages:
 It can behave as an unguided depth-first search in the worst case scenario.
 It can get stuck in a loop as DFS.
 This algorithm is not optimal.
Example:
Consider the below search problem, and we will traverse it using greedy best-first search. At each iteration,
each node is expanded using evaluation function f(n)=h(n) , which is given in the below table.
In this search example, we are using two lists which are OPEN and CLOSED Lists. Following are the iteration
for traversing the above example.
Expand the nodes of S and put in the CLOSED list
Initialization: Open [A, B], Closed [S]
Iteration 1: Open [A], Closed [S, B]
Iteration 2: Open [E, F, A], Closed [S, B]
: Open [E, A], Closed [S, B, F]
Iteration 3: Open [I, G, E, A], Closed [S, B, F]
: Open [I, E, A], Closed [S, B, F, G]
Hence the final solution path will be: S----> B----->F----> G
Time Complexity: The worst-case time complexity of Greedy best first search is O(bm).
Space Complexity: The worst case space complexity of Greedy best first search is O(bm). Where, m is the
maximum depth of the search space.
Complete: Greedy best-first search is also incomplete, even if the given state space is finite.
Optimal: Greedy best first search algorithm is not optimal.
A* Search Algorithm
A* search is the most commonly known form of best-first search. It uses heuristic function h(n), and cost to
reach the node n from the start state g(n). It has combined features of UCS and greedy best-first search, by
which it solve the problem efficiently. A* search algorithm finds the shortest path through the search space
using the heuristic function. This search algorithm expands less search tree and provides optimal result faster.
A* algorithm is similar to UCS except that it uses g(n)+h(n) instead of g(n).
In A* search algorithm, we use search heuristic as well as the cost to reach the node. Hence we can combine
both costs as following, and this sum is called as a fitness number.
At each point in the search space, only that node is expanded which have the lowest value of f(n), and the
algorithm terminates when the goal node is found.
Algorithm of A* search:
 Step1: Place the starting node in the OPEN list.
 Step 2: Check if the OPEN list is empty or not, if the list is empty then return failure and stops.
 Step 3: Select the node from the OPEN list which has the smallest value of evaluation function (g+h),
if node n is goal node then return success and stop, otherwise
 Step 4: Expand node n and generate all of its successors, and put n into the closed list. For each
successor n', check whether n' is already in the OPEN or CLOSED list, if not then compute evaluation
function for n' and place into Open list.
 Step 5: Else if node n' is already in OPEN and CLOSED, then it should be attached to the back pointer
which reflects the lowest g(n') value.
 Step 6: Return to Step 2.
Advantages:
 A* search algorithm is the best algorithm than other search algorithms.
 A* search algorithm is optimal and complete.
 This algorithm can solve very complex problems.
Disadvantages:
 It does not always produce the shortest path as it mostly based on heuristics and approximation.
 A* search algorithm has some complexity issues.
 The main drawback of A* is memory requirement as it keeps all generated nodes in the memory, so it
is not practical for various large-scale problems.
Example:
In this example, we will traverse the given graph using the A* algorithm. The heuristic value of all states is
given in the below table so we will calculate the f(n) of each state using the formula f(n)= g(n) + h(n), where
g(n) is the cost to reach any node from start state.
Here we will use OPEN and CLOSED list.
Solution:
Initialization: {(S, 5)}
Iteration1: {(S--> A, 4), (S-->G, 10)}
Iteration2: {(S--> A-->C, 4), (S--> A-->B, 7), (S-->G, 10)}
Iteration3: {(S--> A-->C--->G, 6), (S--> A-->C--->D, 11), (S--> A-->B, 7), (S-->G, 10)}
Iteration 4 will give the final result, as S--->A--->C--->G it provides the optimal path with cost 6.
Points to remember:
 A* algorithm returns the path which occurred first, and it does not search for all remaining paths.
 The efficiency of A* algorithm depends on the quality of heuristic.
 A* algorithm expands all nodes which satisfy the condition f(n) <="" li="">
Complete: A* algorithm is complete as long as:
 Branching factor is finite.
 Cost at every action is fixed.
Optimal: A* search algorithm is optimal if it follows below two conditions:
 Admissible: the first condition requires for optimality is that h(n) should be an admissible heuristic
for A* tree search. An admissible heuristic is optimistic in nature.
 Consistency: Second required condition is consistency for only A* graph-search.
If the heuristic function is admissible, then A* tree search will always find the least cost path.
Time Complexity: The time complexity of A* search algorithm depends on heuristic function, and the
number of nodes expanded is exponential to the depth of solution d. So, the time complexity is O(b^d), where
b is the branching factor.
Space Complexity: The space complexity of A* search algorithm is O(b^d)
AO* Algorithm
AO* Algorithm basically based on problem decomposition (Breakdown problem into small pieces)
When a problem can be divided into a set of sub problems, where each sub problem can be solved separately
and a combination of these will be a solution, AND-OR graphs or AND - OR trees are used for representing
the solution.
The decomposition of the problem or problem reduction generates AND arcs.
AND-OR Graph
The figure shows an AND-OR graph
1. To pass any exam, we have two options, either cheating or hard work.
2. In this graph we are given two choices, first do cheating or (The red line) work hard and (The arc)
pass.
3. When we have more than one choice and we have to pick one, we apply OR condition to choose
one.(That's what we did here).
4. Basically the ARC here denote AND condition.
5. Here we have replicated the arc between the work hard and the pass because by doing the hard work
possibility of passing an exam is more than cheating.
A* Vs AO*
1. Both are part of informed search technique and use heuristic values to solve the problem.
2. The solution is guaranteed in both algorithms.
3. A* always gives an optimal solution (shortest path with low cost) But It is not guaranteed to that AO*
always provide an optimal solution.
4. Reason: Because AO* does not explore all the solution path once it got solution.
How AO* works
Let's try to understand it with the following diagram
The algorithm always moves towards a lower cost value.
Basically, we will calculate the cost function here (F(n)= G (n) + H (n))
H: heuristic/ estimated value of the nodes. and G: actual cost or edge value (here unit value).
Here we have taken the edges value 1, meaning we have to focus solely on the heuristic value.
1. The Purple colour values are edge values (here all are same that is one).
2. The Red colour values are Heuristic values for nodes.
3. The Green colour values are New Heuristic values for nodes.
Procedure:
1. In the above diagram we have two ways from A to D or A to B-C (because of and condition). calculate
cost to select a path
2. F(A-D) = 1+10 = 11
and
F(A-BC) = 1 + 1 + 6 +12 = 20
3. As we can see F(A-D) is less than F(A-BC) then the algorithm chooses the path F(A-D).
4. Form D we have one choice that is F-E.
5. F(A-D-FE) = 1+1+ 4 +4 =10
6. Basically 10 is the cost of reaching FE from D. And Heuristic value of node D also denote the cost
of reaching FE from D. So, the new Heuristic value of D is 10.
7. And the Cost from A-D remain same that is 11.
Suppose we have searched this path and we have got the Goal State, then we will never explore the other
path. (this is what AO* says but here we are going to explore another path as well to see what happen)
Let's Explore the other path:
1. In the above diagram we have two ways from A to D or A to B-C (because of and condition). calculate
cost to select a path
2. F(A-D) = 1+10 = 11
and
F(A-BC) = 1 + 1 + 6 +12 = 20
3. As we know the cost is more of F(A-BC) but let's take a look
4. Now from B we have two path G and H , let's calculate the cost
5. F(B-G) = 5+1 =6 and F(B-H)= 7 + 1 = 8
6. So, cost from F(B-H) is more than F(B-G) we will take the path B-G.
7. The Heuristic value from G to I is 1 but let's calculate the cost form G to I.
8. F(G-I) = 1 +1 = 2. which is less than Heuristic value 5. So, the new Heuristic value form G to I is
2.
9. If it is a new value, then the cost from G to B must also have changed. Let's see the new cost form (B
to G)
10. F(B-G) = 1+2 =3. Mean the New Heuristic value of B is 3.
11. But A is associated with both B and C.
12. As we can see from the diagram C only have one choice or one node to explore that is J. The
Heuristic value of C is 12.
13. Cost form C to J= F(C-J) = 1+1= 2 Which is less than Heuristic value
14. Now the New Heuristic value of C is 2.
15. And the New Cost from A- BC that is F(A-BC) = 1+1+2+3 = 7 which is less than F(A-D)=11.
16. In this case Choosing path A-BC is more cost effective and good than that of A-D.
But this will only happen when the algorithm explores this path as well. But according to the algorithm,
algorithm will not accelerate this path (here we have just did it to see how the other path can also be
correct).
But it is not the case in all the cases that it will happen in some cases that the algorithm will get optimal
solution.
Advantages:
 It is an optimal algorithm.
 If traverse according to the ordering of nodes. It can be used for both OR and AND graph.
Disadvantages:
 Sometimes for unsolvable nodes, it can’t find the optimal path. Its complexity is than other algorithms.
Mini-Max Algorithm








Mini-max algorithm is a recursive or backtracking algorithm which is used in decision-making and
game theory. It provides an optimal move for the player assuming that opponent is also playing
optimally.
Mini-Max algorithm uses recursion to search through the game-tree.
Min-Max algorithm is mostly used for game playing in AI. Such as Chess, Checkers, tic-tac-toe, go,
and various tow-players game. This Algorithm computes the minimax decision for the current state.
In this algorithm two players play the game, one is called MAX and other is called MIN.
Both the players fight it as the opponent player gets the minimum benefit while they get the maximum
benefit.
Both Players of the game are opponent of each other, where MAX will select the maximized value and
MIN will select the minimized value.
The minimax algorithm performs a depth-first search algorithm for the exploration of the complete
game tree.
The minimax algorithm proceeds all the way down to the terminal node of the tree, then backtrack the
tree as the recursion.
Pseudo-code for MinMax Algorithm:
function minimax(node, depth, maximizingPlayer) is
if depth ==0 or node is a terminal node then
return static evaluation of node
if MaximizingPlayer then
// for Maximizer Player
maxEva= -infinity
for each child of node do
eva= minimax(child, depth-1, false)
maxEva= max(maxEva,eva)
//gives Maximum of the values
return maxEva
else
// for Minimizer player
minEva= +infinity
for each child of node do
eva= minimax(child, depth-1, true)
minEva= min(minEva, eva)
return minEva
//gives minimum of the values
Initial call:
Minimax(node, 3, true)
Working of Min-Max Algorithm:
 The working of the minimax algorithm can be easily described using an example. Below we have
taken an example of game-tree which is representing the two-player game.
 In this example, there are two players one is called Maximizer and other is called Minimizer.
 Maximizer will try to get the Maximum possible score, and Minimizer will try to get the minimum
possible score.
 This algorithm applies DFS, so in this game-tree, we have to go all the way through the leaves to reach
the terminal nodes.
 At the terminal node, the terminal values are given so we will compare those value and backtrack the
tree until the initial state occurs. Following are the main steps involved in solving the two-player game
tree:
Step-1: In the first step, the algorithm generates the entire game-tree and apply the utility function to get the
utility values for the terminal states. In the below tree diagram, let's take A is the initial state of the tree.
Suppose maximizer takes first turn which has worst-case initial value =- infinity, and minimizer will take next
turn which has worst-case initial value = +infinity.
Step 2: Now, first we find the utilities value for the Maximizer, its initial value is -∞, so we will compare each
value in terminal state with initial value of Maximizer and determines the higher nodes values. It will find the
maximum among the all.
max(-1,- -∞) => max(-1,4)= 4
 For node D
max(2, -∞) => max(2, 6)= 6
 For Node E
max(-3, -∞) => max(-3,-5) = -3
 For Node F
max(0, -∞) = max(0, 7) = 7
 For node G
Step 3: In the next step, it's a turn for minimizer, so it will compare all nodes value with +∞, and will find the
3rd layer node values.
 For node B= min(4,6) = 4
 For node C= min (-3, 7) = -3
Step 4: Now it's a turn for Maximizer, and it will again choose the maximum of all nodes value and find the
maximum value for the root node. In this game tree, there are only 4 layers, hence we reach immediately to
the root node, but in real games, there will be more than 4 layers.
 For node A max(4, -3)= 4
That was the complete workflow of the minimax two player game.
Properties of Mini-Max algorithm:
 Complete- Min-Max algorithm is Complete. It will definitely find a solution (if exist), in the finite
search tree.
 Optimal- Min-Max algorithm is optimal if both opponents are playing optimally.
 Time complexity- As it performs DFS for the game-tree, so the time complexity of Min-Max
algorithm is O(bm), where b is branching factor of the game-tree, and m is the maximum depth of the
tree.
 Space Complexity- Space complexity of Mini-max algorithm is also similar to DFS which is O(bm).
Limitation of the minimax Algorithm:
The main drawback of the minimax algorithm is that it gets really slow for complex games such as Chess, go,
etc. This type of games has a huge branching factor, and the player has lots of choices to decide. This limitation
of the minimax algorithm can be improved from alpha-beta pruning which we have discussed in the next
topic.
Alpha-Beta Pruning





Alpha-beta pruning is a modified version of the minimax algorithm. It is an optimization technique for
the minimax algorithm.
As we have seen in the minimax search algorithm that the number of game states it has to examine are
exponential in depth of the tree. Since we cannot eliminate the exponent, but we can cut it to half.
Hence there is a technique by which without checking each node of the game tree we can compute the
correct minimax decision, and this technique is called pruning. This involves two threshold parameter
Alpha and beta for future expansion, so it is called alpha-beta pruning. It is also called as AlphaBeta Algorithm.
Alpha-beta pruning can be applied at any depth of a tree, and sometimes it not only prune the tree
leaves but also entire sub-tree.
The two-parameter can be defined as:
1. Alpha: The best (highest-value) choice we have found so far at any point along the path of
Maximizer. The initial value of alpha is -∞.
2. Beta: The best (lowest-value) choice we have found so far at any point along the path of
Minimizer. The initial value of beta is +∞.
The Alpha-beta pruning to a standard minimax algorithm returns the same move as the standard
algorithm does, but it removes all the nodes which are not really affecting the final decision but making
algorithm slow. Hence by pruning these nodes, it makes the algorithm fast.
Condition for Alpha-beta pruning:
The main condition which required for alpha-beta pruning is:
1. α>=β
Key points about alpha-beta pruning:
 The Max player will only update the value of alpha.
 The Min player will only update the value of beta.
 While backtracking the tree, the node values will be passed to upper nodes instead of values of alpha
and beta.
 We will only pass the alpha, beta values to the child nodes.
Pseudo-code for Alpha-beta Pruning:
function minimax(node, depth, alpha, beta, maximizingPlayer) is
if depth ==0 or node is a terminal node then
return static evaluation of node
if MaximizingPlayer then
// for Maximizer Player
maxEva= -infinity
for each child of node do
eva= minimax(child, depth-1, alpha, beta, False)
maxEva= max(maxEva, eva)
alpha= max(alpha, maxEva)
if beta<=alpha
break
return maxEva
else
// for Minimizer player
minEva= +infinity
for each child of node do
eva= minimax(child, depth-1, alpha, beta, true)
minEva= min(minEva, eva)
beta= min(beta, eva)
if beta<=alpha
break
return minEva
Working of Alpha-Beta Pruning:
Let's take an example of two-player search tree to understand the working of Alpha-beta pruning
Step 1: At the first step the, Max player will start first move from node A where α= -∞ and β= +∞, these value
of alpha and beta passed down to node B where again α= -∞ and β= +∞, and Node B passes the same value
to its child D.
Step 2: At Node D, the value of α will be calculated as its turn for Max. The value of α is compared with
firstly 2 and then 3, and the max (2, 3) = 3 will be the value of α at node D and node value will also 3.
Step 3: Now algorithm backtrack to node B, where the value of β will change as this is a turn of Min, Now
β= +∞, will compare with the available subsequent nodes value, i.e. min (∞, 3) = 3, hence at node B now α=
-∞, and β= 3.
In the next step, algorithm traverse the next successor of Node B which is node E, and the values of α= -∞,
and β= 3 will also be passed.
Step 4: At node E, Max will take its turn, and the value of alpha will change. The current value of alpha will
be compared with 5, so max (-∞, 5) = 5, hence at node E α= 5 and β= 3, where α>=β, so the right successor
of E will be pruned, and algorithm will not traverse it, and the value at node E will be 5.
Step 5: At next step, algorithm again backtrack the tree, from node B to node A. At node A, the value of alpha
will be changed the maximum available value is 3 as max (-∞, 3)= 3, and β= +∞, these two values now passes
to right successor of A which is Node C.
At node C, α=3 and β= +∞, and the same values will be passed on to node F.
Step 6: At node F, again the value of α will be compared with left child which is 0, and max(3,0)= 3, and then
compared with right child which is 1, and max(3,1)= 3 still α remains 3, but the node value of F will become
1.
Step 7: Node F returns the node value 1 to node C, at C α= 3 and β= +∞, here the value of beta will be changed,
it will compare with 1 so min (∞, 1) = 1. Now at C, α=3 and β= 1, and again it satisfies the condition α>=β,
so the next child of C which is G will be pruned, and the algorithm will not compute the entire sub-tree G.
Step 8: C now returns the value of 1 to A here the best value for A is max (3, 1) = 3. Following is the final
game tree which is the showing the nodes which are computed and nodes which has never computed. Hence
the optimal value for the maximiser is 3 for this example.
Move Ordering in Alpha-Beta pruning:
The effectiveness of alpha-beta pruning is highly dependent on the order in which each node is examined.
Move order is an important aspect of alpha-beta pruning.
It can be of two types:
 Worst ordering: In some cases, alpha-beta pruning algorithm does not prune any of the leaves of the
tree, and works exactly as minimax algorithm. In this case, it also consumes more time because of
alpha-beta factors, such a move of pruning is called worst ordering. In this case, the best move occurs
on the right side of the tree. The time complexity for such an order is O(b m).
 Ideal ordering: The ideal ordering for alpha-beta pruning occurs when lots of pruning happens in the
tree, and best moves occur at the left side of the tree. We apply DFS hence it first search left of the tree
and go deep twice as minimax algorithm in the same amount of time. Complexity in ideal ordering is
O(bm/2).
Rules to find good ordering:
Following are some rules to find good ordering in alpha-beta pruning:
 Occur the best move from the shallowest node.
 Order the nodes in the tree such that the best nodes are checked first.
 Use domain knowledge while finding the best move. Ex: for Chess, try order: captures first, then
threats, then forward moves, backward moves.
 We can bookkeep the states, as there is a possibility that states may repeat.
UNIT II
Introduction to Expert Systems


An expert system is a computer program that is designed to solve complex problems and to provide
decision-making ability like a human expert. It performs this by extracting knowledge from its
knowledge base using the reasoning and inference rules according to the user queries.
The performance of an expert system is based on the expert's knowledge stored in its knowledge base.
The more knowledge stored in the KB, the more that system improves its performance. One of the
common examples of an ES is a suggestion of spelling errors while typing in the Google search box.
Capabilities of the Expert System
Below are some capabilities of an Expert System:
 Advising: It is capable of advising the human being for the query of any domain from the particular
ES.
 Provide decision-making capabilities: It provides the capability of decision making in any domain,
such as for making any financial decision, decisions in medical science, etc.
 Demonstrate a device: It is capable of demonstrating any new products such as its features,
specifications, how to use that product, etc.
 Problem-solving: It has problem-solving capabilities.
 Explaining a problem: It is also capable of providing a detailed description of an input problem.
 Interpreting the input: It is capable of interpreting the input given by the user.
 Predicting results: It can be used for the prediction of a result.
 Diagnosis: An ES designed for the medical field is capable of diagnosing a disease without using
multiple components as it already contains various inbuilt medical tools.
Advantages of Expert System
 These systems are highly reproducible.
 They can be used for risky places where the human presence is not safe.
 Error possibilities are less if the KB contains correct knowledge.
 The performance of these systems remains steady as it is not affected by emotions, tension, or fatigue.
 They provide a very high speed to respond to a particular query.
Limitations of Expert System
 The response of the expert system may get wrong if the knowledge base contains the wrong
information.
 Like a human being, it cannot produce a creative output for different scenarios.
 Its maintenance and development costs are very high.
 Knowledge acquisition for designing is much difficult.
 For each domain, we require a specific ES, which is one of the big limitations.
 It cannot learn from itself and hence requires manual updates.
Applications of Expert System
 In designing and manufacturing domain - It can be broadly used for designing and manufacturing
physical devices such as camera lenses and automobiles.
 In the knowledge domain - These systems are primarily used for publishing the relevant knowledge
to the users. The two popular ES used for this domain is an advisor and a tax advisor.
 In the finance domain - In the finance industries, it is used to detect any type of possible fraud,
suspicious activity, and advise bankers that if they should provide loans for business or not.
 In the diagnosis and troubleshooting of devices - In medical diagnosis, the ES system is used, and
it was the first area where these systems were used.
 Planning and Scheduling - The expert systems can also be used for planning and scheduling some
particular tasks for achieving the goal of that task.
Architecture of Expert System
Below is the block diagram that represents the working of an expert system:
Components of Expert System
An expert system mainly consists of three components:
 User Interface
 Inference Engine
 Knowledge Base
1. User Interface
With the help of a user interface, the expert system interacts with the user, takes queries as an input in a
readable format, and passes it to the inference engine. After getting the response from the inference engine, it
displays the output to the user. In other words, it is an interface that helps a non-expert user to communicate
with the expert system to find a solution.
2. Inference Engine (Rules of Engine)
 The inference engine is known as the brain of the expert system as it is the main processing unit of the
system. It applies inference rules to the knowledge base to derive a conclusion or deduce new
information. It helps in deriving an error-free solution of queries asked by the user.
 With the help of an inference engine, the system extracts the knowledge from the knowledge base.
There are two types of inference engine:
 Deterministic Inference engine: The conclusions drawn from this type of inference engine are
assumed to be true. It is based on facts and rules.
 Probabilistic Inference engine: This type of inference engine contains uncertainty in conclusions,
and based on the probability.
Inference engine uses the below modes to derive the solutions:
 Forward Chaining: It starts from the known facts and rules, and applies the inference rules to add
their conclusion to the known facts.
 Backward Chaining: It is a backward reasoning method that starts from the goal and works backward
to prove the known facts.
3. Knowledge Base
 The knowledgebase is a type of storage that stores knowledge acquired from the different experts of
the particular domain. It is considered as big storage of knowledge. The more the knowledge base, the
more precise will be the Expert System.
 It is similar to a database that contains information and rules of a particular domain or subject.
 One can also view the knowledge base as collections of objects and their attributes. Such as a Lion is
an object and its attributes are it is a mammal, it is not a domestic animal, etc.
Components of Knowledge Base:
 Factual Knowledge: The knowledge which is based on facts and accepted by knowledge engineers
comes under factual knowledge.
 Heuristic Knowledge: This knowledge is based on practice, the ability to guess, evaluation, and
experiences.
Representation and organization of knowledge
An Artificial intelligence system has the following components for displaying intelligent behavior:
 Perception
 Learning
 Knowledge Representation and Reasoning
 Planning
 Execution
The above diagram is showing how an AI system can interact with the real world and what components help
it to show intelligence. AI system has Perception component by which it retrieves information from its
environment. It can be visual, audio or another form of sensory input. The learning component is responsible
for learning from data captured by Perception comportment. In the complete cycle, the main components are
knowledge representation and Reasoning. These two components are involved in showing the intelligence in
machine-like humans. These two components are independent with each other but also coupled together. The
planning and execution depend on analysis of Knowledge representation and reasoning.
Approaches to knowledge representation:
There are mainly four approaches to knowledge representation, which are given below:
1. Simple relational knowledge:
 It is the simplest way of storing facts which uses the relational method, and each fact about a set of the
object is set out systematically in columns.



This approach of knowledge representation is famous in database systems where the relationship
between different entities is represented.
This approach has little opportunity for inference.
Example: The following is the simple relational knowledge representation.
Player Weight Age
Player1 65
23
Player2 58
18
Player3 75
24
2. Inheritable knowledge:
 In the inheritable knowledge approach, all data must be stored into a hierarchy of classes.
 All classes should be arranged in a generalized form or a hierarchal manner.
 In this approach, we apply inheritance property.
 Elements inherit values from other members of a class.
 This approach contains inheritable knowledge which shows a relation between instance and class, and
it is called instance relation.
 Every individual frame can represent the collection of attributes and its value.
 In this approach, objects and values are represented in Boxed nodes.
 We use Arrows which point from objects to their values.
 Example:
3. Inferential knowledge:
 Inferential knowledge approach represents knowledge in the form of formal logics.
 This approach can be used to derive more facts.
 It guaranteed correctness.
 Example: Let's suppose there are two statements:
1. Marcus is a man
2. All men are mortal
Then it can represent as;
man(Marcus)
∀x = man (x) ----------> mortal (x)s
4. Procedural knowledge:
 Procedural knowledge approach uses small programs and codes which describes how to do specific
things, and how to proceed.
 In this approach, one important rule is used which is If-Then rule.
 In this knowledge, we can use various coding languages such as LISP language and Prolog language.
 We can easily represent heuristic or domain-specific knowledge using this approach.
 But it is not necessary that we can represent all cases in this approach.
Requirements for knowledge Representation system:
A good knowledge representation system must possess the following properties.
1. Representational Accuracy: KR system should have the ability to represent all kind of required
knowledge.
2. Inferential Adequacy: KR system should have ability to manipulate the representational structures to
produce new knowledge corresponding to existing structure.
3. Inferential Efficiency: The ability to direct the inferential knowledge mechanism into the most
productive directions by storing appropriate guides.
4. Acquisitional efficiency- The ability to acquire the new knowledge easily using automatic methods.
Characteristics of Expert System
An expert system is usually designed to have the following general characteristics.
 High level Performance: The system must be capable of responding at a level of competency equal
to or better than an expert system in the field. The quality of the advice given by the system should be
in a high-level integrity and for which the performance ratio should be also very high.
 Domain Specificity: Expert systems are typically very domain specific. For ex., a diagnostic expert
system for troubleshooting computers must actually perform all the necessary data manipulation as a
human expert would. The developer of such a system must limit his or her scope of the system to just
what is needed to solve the target problem. Special tools or programming languages are often needed
to accomplish the specific objectives of the system.
 Good Reliability: The expert system must be as reliable as a human expert.
 Understandable: The system should be understandable i.e. be able to explain the steps of reasoning
while executing. The expert system should have an explanation capability similar to the reasoning
ability of human experts.
 Adequate Response time: The system should be designed in such a way that it is able to perform
within a small amount of time, comparable to or better than the time taken by a human expert to reach
at a decision point. An expert system that takes a year to reach a decision compared to a human expert’s
time of one hour would not be useful.
 Use symbolic representations: Expert system use symbolic representations for knowledge (rules,
networks or frames) and perform their inference through symbolic computations that closely resemble
manipulations of natural language.
 Linked with Metaknowledge: Expert systems often reason with metaknowledge i.e. they reason with
knowledge about themselves and their own knowledge limits and capabilities. The use of
metaknowledge is quite interactive and simple for various data representations.
 Expertise knowledge: Real experts not only produce good solutions but also find them quickly. So,
an expert system must be skilful in applying its knowledge to produce solutions both efficiently and
effectively by using the intelligence human experts.
 Justified Reasoning: This allows the users to ask the expert system to justify the solution or advice
provided by it. Normally, expert systems justify their answers or advice by explaining their reasoning.
If a system is a rule-based system, it provides to the user all the rules and facts it has used to achieve
its answer.
 Explaining capability: Expert systems are capable of explaining how a particular conclusion was
reached and why requested information is needed during a consultation. This is very important as it
gives the user a chance to access and understand the system’s reasoning ability, thereby improving the
user’s confidence in the system.
 Special Programming Languages: Expert systems are typically written in special programming
languages. The use of languages like LISP and PROLOG in the development of an expert system
simplifies the coding process. The major advantage of these languages, as compared to conventional
programming languages is the simplicity of the addition, elimination or substitution of new rules and
memory management capabilities.
Some of the distinguishing characteristics of programming languages needed for expert system work
are as follows:







Efficient mix of integer and real variables.
Good memory management procedures.
Extensive data manipulation routines.
Incremental compilation.
Tagged memory architecture.
Efficient search procedures.
Optimization of the systems environment.
Types of problems handled by Expert system
An ES is no substitute for a knowledge worker's overall performance of the problem-solving task. But these
systems can dramatically reduce the amount of work the individual must do to solve a problem, and they do
leave people with the creative and innovative aspects of problem solving. Below are some capabilities of an
Expert System:
 Advising: It is capable of advising the human being for the query of any domain from the particular
ES.
 Provide decision-making capabilities: It provides the capability of decision making in any domain,
such as for making any financial decision, decisions in medical science, etc.
 Demonstrate a device: It is capable of demonstrating any new products such as its features,
specifications, how to use that product, etc.
 Problem-solving: It has problem-solving capabilities.
 Explaining a problem: It is also capable of providing a detailed description of an input problem.
 Interpreting the input: It is capable of interpreting the input given by the user.
 Predicting results: It can be used for the prediction of a result.
 Diagnosis: An ES designed for the medical field is capable of diagnosing a disease without using
multiple components as it already contains various inbuilt medical tools.
 An Es can complete its part of the tasks much faster than a human expert.
 The error rate of successful systems is low, sometimes much lower than the human error rate for the
same task.
 ESs make consistent recommendations
 ESs are a convenient vehicle for bringing to the point of application difficult-to-use sources of
knowledge.
 ESs can capture the scarce expertise of a uniquely qualified expert.
 ESs can become a vehicle for building up organizational knowledge, as opposed to the knowledge of
individuals in the organization.
 When use as training vehicles, ESs result in a faster learning curve for novices.
 The company can operate an ES in environments hazardous for humans.
Expert System Tools
Techniques of Knowledge representation
There are mainly four ways of knowledge representation which are given as follows:
1. Logical Representation
2. Semantic Network Representation
3. Frame Representation
4. Production Rules
1. Logical Representation
Logical representation is a language with some concrete rules which deals with propositions and has no
ambiguity in representation. Logical representation means drawing a conclusion based on various conditions.
This representation lays down some important communication rules. It consists of precisely defined syntax
and semantics which supports the sound inference. Each sentence can be translated into logics using syntax
and semantics.
Syntax:
 Syntaxes are the rules which decide how we can construct legal sentences in the logic.
 It determines which symbol we can use in knowledge representation.
 How to write those symbols.
Semantics:
 Semantics are the rules by which we can interpret the sentence in the logic.
 Semantic also involves assigning a meaning to each sentence.
Logical representation can be categorised into mainly two logics:
1. Propositional Logics
2. Predicate logics
Advantages of logical representation:
1. Logical representation enables us to do logical reasoning.
2. Logical representation is the basis for the programming languages.
Disadvantages of logical Representation:
1. Logical representations have some restrictions and are challenging to work with.
2. Logical representation technique may not be very natural, and inference may not be so efficient.
2. Semantic Network Representation
Semantic networks are alternative of predicate logic for knowledge representation. In Semantic networks, we
can represent our knowledge in the form of graphical networks. This network consists of nodes representing
objects and arcs which describe the relationship between those objects. Semantic networks can categorize the
object in different forms and can also link those objects. Semantic networks are easy to understand and can be
easily extended.
This representation consist of mainly two types of relations:
1. IS-A relation (Inheritance)
2. Kind-of-relation
Example: Following are some statements which we need to represent in the form of nodes and arcs.
Statements:
1. Jerry is a cat.
2. Jerry is a mammal
3. Jerry is owned by Priya.
4. Jerry is brown coloured.
5. All Mammals are animal.
In the above diagram, we have represented the different type of knowledge in the form of nodes and arcs.
Each object is connected with another object by some relation.
Drawbacks in Semantic representation:
1. Semantic networks take more computational time at runtime as we need to traverse the complete
network tree to answer some questions. It might be possible in the worst case scenario that after
traversing the entire tree, we find that the solution does not exist in this network.
2. Semantic networks try to model human-like memory (Which has 1015 neurons and links) to store the
information, but in practice, it is not possible to build such a vast semantic network.
3. These types of representations are inadequate as they do not have any equivalent quantifier, e.g., for
all, for some, none, etc.
4. Semantic networks do not have any standard definition for the link names.
5. These networks are not intelligent and depend on the creator of the system.
Advantages of Semantic network:
1. Semantic networks are a natural representation of knowledge.
2. Semantic networks convey meaning in a transparent manner.
3. These networks are simple and easily understandable.
3. Frame Representation
A frame is a record like structure which consists of a collection of attributes and its values to describe an entity
in the world. Frames are the AI data structure which divides knowledge into substructures by representing
stereotypes situations. It consists of a collection of slots and slot values. These slots may be of any type and
sizes. Slots have names and values which are called facets.
Facets: The various aspects of a slot is known as Facets. Facets are features of frames which enable us to put
constraints on the frames. Example: IF-NEEDED facts are called when data of any particular slot is needed.
A frame may consist of any number of slots, and a slot may include any number of facets and facets may have
any number of values. A frame is also known as slot-filter knowledge representation in artificial
intelligence.
Frames are derived from semantic networks and later evolved into our modern-day classes and objects. A
single frame is not much useful. Frames system consist of a collection of frames which are connected. In the
frame, knowledge about an object or event can be stored together in the knowledge base. The frame is a type
of technology which is widely used in various applications including Natural language processing and
machine visions.
Example: 1
Let's take an example of a frame for a book
Slots
Title
Filters
Artificial Intelligence
Genre
Author
Edition
Year
Page
Computer Science
Peter Norvig
Third Edition
1996
1152
Advantages of frame representation:
1. The frame knowledge representation makes the programming easier by grouping the related data.
2. The frame representation is comparably flexible and used by many applications in AI.
3. It is very easy to add slots for new attribute and relations.
4. It is easy to include default data and to search for missing values.
5. Frame representation is easy to understand and visualize.
Disadvantages of frame representation:
1. In frame system inference mechanism is not be easily processed.
2. Inference mechanism cannot be smoothly proceeded by frame representation.
3. Frame representation has a much generalized approach.
4. Production Rules
Production rules system consist of (condition, action) pairs which mean, "If condition then action". It has
mainly three parts:
 The set of production rules
 Working Memory
 The recognize-act-cycle
In production rules agent checks for the condition and if the condition exists then production rule fires and
corresponding action is carried out. The condition part of the rule determines which rule may be applied to a
problem. And the action part carries out the associated problem-solving steps. This complete process is called
a recognize-act cycle.
The working memory contains the description of the current state of problems-solving and rule can write
knowledge to the working memory. This knowledge match and may fire other rules.
If there is a new situation (state) generates, then multiple production rules will be fired together, this is called
conflict set. In this situation, the agent needs to select a rule from these sets, and it is called a conflict resolution.
Example:
 IF (at bus stop AND bus arrives) THEN action (get into the bus)
 IF (on the bus AND paid AND empty seat) THEN action (sit down).
 IF (on bus AND unpaid) THEN action (pay charges).
 IF (bus arrives at destination) THEN action (get down from the bus).
Advantages of Production rule:
1. The production rules are expressed in natural language.
2. The production rules are highly modular, so we can easily remove, add or modify an individual rule.
Disadvantages of Production rule:
1. Production rule system does not exhibit any learning capabilities, as it does not store the result of the
problem for the future uses.
2. During the execution of the program, many rules may be active hence rule-based production systems
are inefficient.
Knowledge Engineering










Knowledge engineering is a field of artificial intelligence (AI) that tries to emulate the judgment and
behaviour of a human expert in a given field.
It looks at the metadata (information about a data object that describes characteristics such as content,
quality, and format), structure and processes that are the basis of how a decision is made or conclusion
reached.
Knowledge engineering is the technology behind the creation of expert systems to assist with issues
related to their programmed field of knowledge.
Expert systems involve a large and expandable knowledge base integrated with a rules engine that
specifies how to apply information in the knowledge base to each particular situation. The systems
may also incorporate machine learning so that they can learn from experience in the same way that
humans do.
Expert systems are used in various fields including healthcare, customer service, financial services,
manufacturing and the law.
Using algorithms to emulate the thought patterns of a subject matter expert, knowledge engineering
tries to take on questions and issues as a human expert would. Looking at the structure of a task or
decision, knowledge engineering studies how the conclusion is reached.
A library of problem-solving methods and a body of collateral knowledge are used to approach the
issue or question. The amount of collateral knowledge can be very large. Depending on the task and
the knowledge that is drawn on, the virtual expert may assist with troubleshooting, solving issues,
assisting a human or acting as a virtual agent.
Scientists originally attempted knowledge engineering by trying to emulate real experts. Using the
virtual expert was supposed to get you the same answer as you would get from a human expert. This
approach was called the transfer approach. However, the expertise that a specialist required to answer
questions or respond to issues posed to it needed too much collateral knowledge: information that is
not central to the given issue but still applied to make judgments.
A surprising amount of collateral knowledge is required to enable analogous reasoning and nonlinear
thought. Currently, a modelling approach is used where the same knowledge and process need not
necessarily be used to reach the same conclusion for a given question or issue. Eventually, it is
expected that knowledge engineering will produce a specialist that surpasses the abilities of its human
counterparts.
Knowledge engineering attempts to take on challenges and solve problems that would usually require
a high level of human expertise to solve. Figure 1 illustrates the knowledge engineering pipeline.
Knowledge Engineering Processes
The knowledge engineering process includes:
 Knowledge acquisition
 Knowledge representation
 Knowledge validation
 Inferencing
 Explanation and justification
The interaction between these stages and sources of knowledge is shown in Figure 2.
Figure 2: Knowledge engineering processes
The amount of collateral knowledge can be very large depending on the task. A number of advances in
technology and technology standards have assisted in integrating data and making it accessible. These include
the semantic web (an extension of the current web in which information is given a well-defined meaning),
cloud computing (enables access to large amounts of computational resources), and open datasets (freely
available datasets for anyone to use and republish). These advances are crucial to knowledge engineering as
they expedite data integration and evaluation.
System – building aids
The system-building aids consist of programs which help acquire and represent the domain expert’s
knowledge and programs which help design the expert system under construction. These programs address
very difficult tasks; many are research tools just beginning to evolve into practical and useful aids, although a
few are offered as full-blown commercial systems.
Compared with programming and knowledge engineering languages, relatively few system-building aids have
been developed. Those which exist fall into two major categories; design aids and knowledge acquisition aids.
The AGE system exemplifies design aids, while TEIRSIAS, MOLE and SALT exemplify knowledge
acquisition, TIMM system construction and SEEK knowledge refinement aids.
A few of these are discussed below:
a. AGE: This software tool helps the knowledge engineer design and build an expert system. AGE
provides the user with a set of components which, like building blocks, can be assembled to form
portions of an expert system. Each component, a collection of INTERLISP functions, supports an expert
system framework, such as forward chaining, backward chaining, or a blackboard architecture.
The term blackboard refers to a central data base used by systems, to coordinate and, control the
operation of independent groups of rules called knowledge sources. The knowledge sources
communicate by writing messages on the blackboard and reading messages from other knowledge
sources.
b. MOLE: This is a knowledge acquisition system for heuristic classification problem, such as diagnosing
diseases. In particular, it is used in conjunction with the cover-and- differentiate problem solving
method. The expert-system-produced by MOLE accepts input data, comes up with a set of candidate
explanations or classifications which cover the data, then uses differentiating knowledge to determine
which one is best. The process is iterative, since explanations must themselves be justified, until
ultimate causes are ascertained.
MOLE interacts with a domain expert to produce a knowledge base which a system, called MOLE-p
(for mole performance) uses to solve problems.
c. TEIRESIAS: TEIRESIAS was developed by Davis in the mid-1970s as a vehicle for exploring new
ideas in knowledge acquisition and data base maintenance rather than as a tool for building expert
systems, at the university of Stanford (USA).
TEIRESIAS acquires knowledge interactively from an expert. If a wrong diagnosis has been made by
MYCIN, then TEIRESIAS will lead the expert back through the chain of incorrect reasoning until the
expert states where the incorrect reasoning started. While going back through the reasoning chain,
TEIRESIAS will also interact with the expert to modify incorrect rules or acquire new rules.
Support facilities
It includes a number of tools for aiding the programming. These tools generally should be considered in the
knowledge engineering language. There are four major kinds of support facilities as follows:




I/O facilities
Explanation facilities
Knowledge-base creation
Debugging tools
Hardware support – refers to the computer on which the tools run. Naturally, the size of a tool plays major
role in choosing the appropriate machine. A very vital aspect of selecting the relevant machine is its cost. The
type of computers that a tool can be run on are for example: PC Workstations, Mainframes and others.
Capabilities of expert system building tools vary from one tool to another. Therefore, it is very job to select
an appropriate tool. There is no agreement about how one chooses a shell to use for a given application. The
successful use of expert systems building tool lies in choosing the right tool for a problem. The field also
needs further research. It requires a practical search of different tools in use and analysis of both tools
characteristics and problem domain features.
Stages in the development of Expert System
The following points highlight the five main stages to develop an expert system. The stages are:
1. Identification
2. Conceptualisation
3. Formalisation (Designing)
4. Implementation
5. Testing (Validation, Verification and Maintenance).
Stage # 1. Identification:
Before we can begin to develop an expert system, it is important to describe, with as much precision as
possible, the problem which the system is intended to solve. It is not enough simply to feel that an expert
system would be helpful in a certain situation; we must determine the exact nature of the problem and state
the precise goals which indicate exactly how the expert system is expected to contribute to the solution.
Stage # 2. Conceptualisation:
Once it has been identified for the problem an expert system is to solve, the next stage involves analysing the
problem further to ensure that its specifics, as well as generalities, are understood.
In the conceptualisation stage, the knowledge engineer frequently creates a diagram of the problem to depict
graphically the relationships between the objects and processes in the problem domain. It is often helpful at
this stage to divide the problem into a series of sub-problems and to diagram both the relationships among the
pieces of each sub-problem and the relationships among the various sub-problems.
Stage # 3. Formalisation (Designing):
In the preceding stages, no effort has been made to relate the domain problem to the artificial intelligence
technology which may solve it. During the identification and formalization stages, the focus is entirely on
understanding the problem. Now, during the formalization stage, the problem is connected to its proposed
solution, an expert system is supplied by analysing the relationships depicted in the conceptualization stage.
The knowledge engineer begins to select the techniques which are appropriate for developing this particular
expert system.
Stage # 4. Implementation:
During the implementation stage the formalised concepts are programmed into the computer which has been
chosen for system development, using the predetermined techniques and tools to implement a ‘first-pass’
(prototype) of the expert system.
Theoretically, if the methods of the previous stages have been followed with diligence and care, the
implementation of the prototype should proceed smoothly.
Stage # 5. Testing (Validation, Verification and Maintenance):
The chance of prototype expert system executing flawlessly the first time it is tested are so slim as to be
virtually non-existent. A knowledge engineer does not expect the testing process to verify that the system has
been constructed entirely correctly. Rather, testing provides an opportunity to identify the weaknesses in the
structure and implementation of the system and to make the appropriate corrections.
Ler', u*e
Le.t*"
Alo
I'
"
(Exren
P." <
Con
STsreus Cse-qq)
t e^li
fqatu,Les
"/
€xf e*
S7sf"m
L CV^*ize-CL f {"owtel5.
Basic ch^.oct"rirrJ; $ €xfa-t
Itrf* "d f^11",,, \onli"L td Up* t/tu
8+*
2.
9,
+.
C,.s
S,
e-nl:ahtn
*
sf"h "d ?'" sf'.W
6.
Jo
+
161-*i7ued
R_*l*
tr*
"d
Knr;l.J-S*
R"P'<z'^rthon
-
-
ba,sd"
'F'tamzt
^ontJ" zls ,
8.
Sn
1
?:r"^,-,"d
N
uu*T
Lno,rrv
o*f.*V
t5';14 N"d s
I
S"1+* Fauul - D'.t *,
Srtt",.-
lo.
t t.
n
trq";l;L"
T
/
*/^"yb^,h;
F^c*'l
i ']i
IL'
u,
Nd',
Ln'n &-)V L oz'
eJjtont
f3.
SrW
;* "tt"')fnt"t ol E^fy
tta^'
(1'rk-'*--
?--utnt
, S"n^ 't." 'Vzfs ,
?'I* fu"^-' oi"'t'd mztknds
Attus'
*f'-b^zJ
,
'o't'*c"t'L
t
OhrrI
,J*'* qft.olr
'
tq
t5.
Frf* t1ril l,.vel'1nu-t b^*L9' €t'Yu"L' t/tU
rc.
Sf"f "\
t+'
5,1*a;"
x''fe-rt
dtr
7*(.
Taafr
't'41
b'e-wJ"7"*'*t
7t*b^;l'/;U
6-"
"t{
,
Le.rut,.€
No'
Cor-.t
t8.
tq.
*^'
rer-lts
Kno,,rr
|TrTn_";k
'::| ?y,,k* T en d,
';,Y ff#,,;H'^n*#n:,
sG,*
cuss
bt
(
voL oLot _*.
Sv
I
il.
&tf* - sIsG** F'U'l"n ? uor,uo
JA,
?r"blu^ ' gta^or^r^;u"',* tJ"'
Cuc^fb' n*'LL & 7A* o'
kno.>ldflp
*.-9"
)^y&*^t*
lq
ls"
1"6,
D;gp"en'J
;
'+"lt
dun.J
1'il,
'
"JA
s,,l'-h'^',
'atr-;
f**l ^
a- l"x'fu
Vil;{t-L*rt "tto
Q"^blen*
c,'L 5x/r€"f
o[ RusL^^."-, , I-t."",fr
a p,i
L'
'$
^,
Cf* tli- ror- [ ,V t;66;u
?i tf*lt
t ^ ?l,. ",,,r^, 'b s
- c-L.,as;"J
' *'?nn:;'\
-"
S;j*
Lt"f
La.c-K
ry5J<a^s
^'1^'
*ffA*o
,t+
As'
"91"
P-*"^-r""
Lx,rt y
?cE*tt, /,u,
C-l+ros"y
30"
gl.
9^t.
u:)fu^
Dt-;
tL*-^t"-t
Drroo"-' nnf*
*"rT
u-tkq*a_
S7stc"*-
s&.
P bL'*Ld'Z fl^- 7rtM
th. %f* sTst** bu;/a;'6 t.'{
w.c!tf-
a^n
<l^- \fofi
}<,".,1
ry wY*-t-xtt^
Sft""- -Wft a-,/' 5^t
f"','s^r
e
^nl.,"r--
-
€xYa,t-
E,-r^t
/
D"'Ptt
Glulh"<
'UNrT
[,) Ex ,-n-t Slste-s:-lh7a,te
*r.U ;y,
'
c
S6ku^5
- I
sE-
q!6
- l:t )
rrT=T3,'. 4u? ,r*T*
d-", 'rt'ly,'{'
a- /y\'A.^'n;yud.
t,",^," aht-a'. An Lty,^r
,^; 'utrL
f/.'L
*ttU
1a|o^n^n^ea "uu*
-/ 1--N"n-^^^J 'd
s"rsf-e-".. arhr'
k tiLLnne'
oL Lt3
I
t L .^sorrc'
"
b"t
'tt'o
"h
f" rrn aKe-
K"-'o.^''
|*VL
L
LD k","t"AF
u"fd
':
:ry:?:e,^'.1:,,
s6tt'n"
b.t*ru,*
^ffn*
h
nnb
u'-,.r-"'"*rr.r^- L'"tJ'ner'f'-Ltl^" 1.*
lsfa"^-
one o.{- ,'no,Le-
q^J
o''Ltg'
!"^,
[s)
K"^"*\.r6"
E^ffi
t^' "tT,
B'F*
/- ."
*'^
':^'!3r,:
K*o,^r. o-t k^"'^'l$e
So vns
"^l*
^'-"
'
I
,
f;:\
1",
3
l*
,'t'fi
Tho-
tp
u\'so'1\
r''*1,---
p*p^xfi
o,lt*
)^^t*n^
/w&t,-o"w
iI'L
I
,*'Y^ ^
st^^t7
,
f,L; l'*"r.*
A"^", ^^-*
{". ,p',Au
fn.*f*
Hr.t^^^-
Dd!*^; 5
t\)
b;;^r
*
e"tr,r^r$
14',*
drr";
1O*l-"-
'
)t
! '-ld"
,:):,ry'ry':1"*u
u*
aie ^.t"
*
r^o*Mt' l ofo.
'fu;
,^,"t/,,
h-
a^]
A
E
t-ai
^^1"
',P^Lln'^I
,tr^
"nr
*nct
&lu;^t
6u-tow nG
'I
)'*
;^-
LP-ct't-..'P-
Qweair't
,
Pt*bl"^s
Dor.n a i4
Ex
eRT
Kxlowuppti
PaRT
S|-ute1.,u
$-r.l<r r.l66.g
R,^[u-
K^r-l.J,f
u
ex
f^
l-Enr.rRes
7
OF
ca
5x peer
--l^L
w
l,
R"wt
'
f^tdt* Y *
: :'*'*'1
€*fr/'
t,
hr^,l
.Solu.f'o"S
,
,{'t\!,
Do*n,;
'nSr( J,
', 'xP
sysTeM
?'*Y\e"*
'
SYstnv :
f
- L',1
u,
Lt.bu,h'st
CoRpuJ
?*L;ch".
OF
p61gt^.lL?D(f
Q
"*J
k^ffiv
'b
a'"'"
tA
bxf-*
*''*'
orl,
eU
Tu., Cl,fM of
v
tt{: tYG U tb w+1"'t
t '
d""'7
bt*
fdtcr.rwtr.[ ntu" d.^T
tyfu
6 S;'^+l*fu' f*t' rivnbl,',;l a"^il o*"^*"uL'
;r^,3,r,W,.,'si'r
&'^'|\' tr'f
i"
k*dl,'
ff;'"
l;:
-ft
I
".
r^^
P'Ki\ '
$4' o,ut
ov<*
*-"'b
k
i-
aA- erfd
V''^
(.,) Hi/.- 1^*'l '*f'-bt:- E*p'^i ]lt'*
ble*'
o*L
krrl t*y*fi^ 6
nnf ,^'t's.- Lo'^' \*
^*
*
^-^-€-
.
pr'.'ictc; Lf-so
fn"
lu,'7 ' Tk;s
b'rt W
,
kL-4
tt",
Lv"
$*{i
f^t *t*
M
a^'t'
"""'"frr* '^
ttl"'f'^'*' f,)t'*'
$
tAtr
fe^"
*:ffi*
,th*, r*'P,^{tt*
:&*
,,
(,
h^
L\
,;
Sl"",t
n^**^^^.r:b:f*
A*J
to*?
ut-J
ry.
*^rt Nw
TJ-,,f; ,;,tr
l&oi
ff*;*
l^-_
i)*L'.t ',
r4o'J"'tt',n
u
Lt!
so\v.^6
-*r'"':*u]6asv:L'\4
;-;
w
s'*
u
-e ^#*"** il*;b To--
7
*"" ,,*
oL
'4,r*blr,r^- (li[uut'*
\
f:
I ^
ryLr.r.r-F
tr-:
8^-
{-^" 1\-c.^^-r
+^rf." 04- dtf-
b il,- '^o{'c''''
1.ry- ,'K'o;6 ^^^^1,
evia-rvuv,tu ft, "6,t
sW ^o^-*"'I**Aun't**
,1^-{-^,t ,''u\'
W
f,l'*
t&
's"|"rt'* +
edJF
- -it-1'*to,^"4$- z
tt**1'^'"tL
&',J*1.I
a^uI'+"'J^r^J \\'''^'nA
t* a,h- ol,ko s -
c/"f"
.v\'aL^Y
NL/""a'
ot';st, ew)'
nl'*
t3)
^',,a,mp^^,,*,t
?o*^: r'.l^r f"- u nt
,
t* o"f i on,, iu-- ,ty:
*
ar
*"il 4-rp ku*ry^t:"^X
d..in"tr
|
^^L
t-
!n'*
Y il^L
hf:'^:
*'**E ryn""U
f*"
-T
\
r'Jy_j :.
,H*rt^;;:f'.{'-;fi
J' V'-tJ
*h'
6^'L
Sl^-Xy-'
u
'wl)'t
,:o("ls*
:'k
a
T4u ''r-'Lau'**''1
'(
Tr^- e* f u,,f,u" ^ uk *,
\
tl^n,
A^*.
'';7-^""^rJ*'
uit*--.- L\
td 4l.,['"
oa.
F-[
ku*j Frl
o,^l t:-t#
c*I;,
tt^'-{
*T*'"', t"
L
t}''
<rJ \o'"'^
l'
dttr
,,1,"t*
,
f *"
,". ;,
v"'t'^;L L'
Purtlatl f*
\/\/\r-t/v\
oo
(c,
r!,l"wra;u- ^rv.wrt '
# dj,
g. \, f^':,"' t
t"pp
itct't
L
'"\*t
n(
"-q-^'L t}'t
Si
tiit* fu'*3
,k^o
t
"U'J
.1,* a
fl'"viott"
:,^Fo^Lunn
i^t enfac" f,grw-a{-r.-
,
u,L)
-tJ^"
I
;f* -U* *.:*,-,J4*
&t"'t
Fxretr Slsraur Btrrtpt^{(l
"6r-t
a-)"^[sL/fs
B"-i)'c
E
Tr.t^.e"rs
*eet1
S''t
S
"t
Ur.
€r1
Br.l tu9"1g
*[oou
rep_1
s1s?Ev1
B turlls
5r,
t--L
'E
^d- ri
-iL w\a-in- ?t'7"., i'.- tl"" .ofd
6* p^t S7<rrr^"
Do
tr, ^
ff"*
aa-r_
(L
i
-o,"r " exf -*
K.
Fx
,
t
o.n)
I
€vrp'vrtrr,,
"L?"
y'"t ''
ttr*" Butu, rool
Usgr,
t,)
is 6- c' \\"k^- "k I"*Y'*
€*["-t
:]rYV
',^\|",v^,i^th'e"^",oA..--tvr{^s-frbi^:*,tru^ji.S'lveJ,, ol-''-:
c'4' !""t
c7 P*
!'fi"
'
3#
c';tru'r
;.'d'-at
o\
Ex ,J:'
f
a'r^,J-
tt*
t
-,^
a-
:
c*'"rf
,.so,\-'tlt.,t,
rw"'t'- Thi' s*7P"{:
'i-,ft-r.^.F ,ifl"
ods ,r t.r- hdf"
tl*
dl''y
",*f "^t
tL
n-no-r-
- ,t1tt*
:1ll?
#*
^
)<!1s
eLavl n'o
J"fnn"l
J;f^ f:f
'oJ-;\,
v K"Y- hid"
ct^d m^"
1-o6ra^!'.t*d"ol",. f*h
r.
^.ilkil
": fu*
I 11^"
et *t slsfc-r
L^
f
* : Dl' kyL c.*^/- e"t r,*- rs a/w a^*t' "J^t- |
ev,-l*are.
lL)
f
o
)
)o ,,,arn E*f
I
w l;''?r*"f+,
I**
ffi
*,rffiro"ir
r;
j:1,^
j;
sur,.il,u
T"^[c-u^r
+*
L o^L fu etfa^t
a"l"* vee't L^rcrz
-:;
Eot"t"^
f,tf
.)n4. <t"otV''u'
sc.qr,.[^, {1t]Jr*'
|i}tt^{54
YLI**'" "ld,
f,
"I-stn^ oJnt'
t'-- ''fe*n"'"(
"s.stn,,^s
f^A''^^-* i K^*'ldtr ' ff*
',1"
K^r.^,r#
(3)
"0'-,rr\^,ffi*J
:^Y^", u""*J
,
,r-^llLr.e'rs
tr'*
,^u;,,r,
er'fa'r'r
,
^T-"-{(
Y:: a^L Aq f*tr*'^^'n^ t'"\
n*- L*o r\"V
c"J"
^^:tY t{Y B'^'L6'*V Too\ I 9r Ls -tt'" *ryu^^ru
Exfe'*
L+)
!
ry
uu
t* unf* *trfu
K-rno^r
t*T**-
L L-;il'
(-t t9 6nI- urn"' , Tt^" "^A' [t-sea Ls A- 7 ^,^, b"- nl't*'*'
ttrfu w.r
&.q"d''
.,
[u] t^ : n-t,
er.f,raf ttrO
.e^Ar- usra,
\^'^
weoa,
0 nr.t-
hr
w
is ttt
f ut
o"'
;r L' lqO
d^'""0"^'
et
l*
,LnrJ- sbffi
h,o U,s<l fi*
S ud,- a-t A/1'l-
r^,
, L,
k-nout'+
cvv\t/w\blL'
Dr
0Rf,'Ad,zATlonl
h W-vtn'w" fw'd't
I
{t";
lh rS 't'r'fion'rn'
ot;
sLw
r..to
il
L€Dct
€
:
)t is tl* ,tn!o.+n,.t'or* f[^t N c-*f "te-,.
A"* 6o cu ilo L.Lo,- i"J,i.l-ff-flA '
Kv, or.l I zJTe I
t0
/{
Lu
b,*
fr*
i^,
&t,^- 't
k"fs
a'l\ 'Vlo
:
"w
t^Lt'l*,J,c- ac*L'
cJa'*s
2z
F Acrs : Tq'^^K +
,.' /*ul' f**
w^a
't
ll^- ?{*d"t{
'Yt
L"'r^- tuL a
Jk
W
'?':'t'\:'^
s*Lyvi"it'q,,J.*
Lr
'-cu:cJ-'
Ru re s :
t sfi rl ^,&r;,L
eu'"
gbfr,*7lc.,wl''ffiwu^"('ft^"^LLTI-_t{y't't"ct:',
w e*T "i
T
P..,ol, i,.-
oJ, LJ
-1,.
t*u o^- tD""h6
F a..h :
ffi',
a^-*r.
c^o*ta,i
r*% *ff*
tfG*
en "rf
rf
-f:'"
,
,:!
*+
;"ry
J|
Su
a
c^o-{--{r"f
''o^,
<
h
arnJ,u_*n,
TH€ \t
U^;;U.*
IF
k "".[ *sit'*
Lt ot[-* h";'Vtt
c^*r^s,"nr
sq/f
o"A'
,tta,.4<r4<.u4
or- **l1*'ic'
R"ln'
r^,*sl;Z
"/\",
H
rq
A-
p*Pluse"L
^l-o ^
o
o|^ra,n iU4-
,rl LL',
:f.'-!{'T*:*"";ffi't^('o
r-t I
-'\ t'y|i..
.l-,
- tr
rtAt*t
!
fftu''
Heu,,*slr"
:
Ll a
[*[
r'vr''sfi' t-' L
s'\-
f,b'^r
u*L""tto'L
rv<r^t
{.' ^J*
fuJ- lj- tr'-^L
u*'ffi*f^^L
i*'u
^ ' e't &7'tt 'f'^' '"'"
G: v^h.*
:Y
T; f
'k'ftu*U"*'
"v
t,*y,-
L'^;glies
** ^t^*L tt^.1" t)t''
*^., o,'f,''! ':'*:
4 p u"u sl ic
*
tb)
An.-
A
L i*
Itntanr
6^J'
o
tXLy;thu' "^&L"/- u
'7Zrx"^"V
eo
Ll c- k ^*
,t^"u U.no"& 'N
,-ln*t*W*
f '""c-/^"^ta
t'''"^"
'"J
t'h
'" c^nu**
e xft^st'uu
A
I
pJ LL',^-'. v s
he*'nosht
Metf.r'ncls
rL€v€NiT sf1 rnq<r*i
0F C-o M ueKci ALA r R- tr^l eg(
I
Pt€veq1 SKysR.
FRo
Tne
rq
Bo n&nrxg
A rRurteAs
Ht u Kisrtc
AL( ofurar.r
t
S
b;p
F*tr *l{ f "t'^T- T
{wr '*'
SuuL ff,
t?,',.J-
Ll q;no-- r :ct:)r k
M5*-- e"A
o^ltr il'a"
<ht'
"k-,*&
y*r,^f fr-rt s'*+,"^ru'
a^^c/' "l{
ill
" 'Tkit t'racl*de,
r
^-,)rorJ*-
dsnr&w te/L tt*t
*'ri"cKt^- l^'h'L
F url,t wr,**r,L
o!^- u^L";", 6 [narac,.+^*sh'ct
l't b*&
L
u'',
tf
,
f"i:,^+*
vvt rckq_n,c4
*t
^Jd.,
v'ltJ^nl' tonid
"
1V*- ^I*I'-eLJ fL'k
fL,k
r uiu"h^J
.u , li..
ttr
4l*sr\'o"M-L
^ru^^-J-ua
u''"*J
;I
*q*'
c-L"|-o';^l'l
6.'r^'
,.
'
pl',.n'-a r^t i bL
k'-
I|
L
/lv\t-w\L>rru
,,o
*lI
,
n,,oxort-*-t
k"lr
*
T*
/Y\p
/Y\P
,
(n^'
(n^&
l*'
Y ,
t\
,
'-l'-ou1
skyira *y -e h ,e
c-*lL L oat,L 1 !-
&,P
,h y,-nst
-U" 'hr
frL"*
ar5
,tl.f,J"rUy
occ^u'
nru,^,[jL*t
"
Exf""r t #^
a^e
J- tf
K",c lr J.6<- -
K*o,lln,[ ?<-'- ba s.oL
s]<t<.^s.
u o'^t
u.r
d.o"^a;-, k^o' f+
e*fl;,ut
wd*- tlc"+'t,
L
A
tL*
tln
rrL
fr*- Jo,t
" k^o *rr#, pn)_ u
'
fru*
*f-*s
K^;*Utr
f
Xp**L
,ln*- t ,s,1" f "^bt"'^t sl- k^rIl$
o
i,,lt*aL tai{6 fL'' A'aeL ' a I7 )""'* h'
t'rt,'J t*^;^,"1''
a,k tr
Sr K. {cru
R.€
AKcurce
4u(€
e'[ I
>o
on
tl'^xs'J:ut
9y sTtu :
tLr-t|re4
LFto'd teoc,
f
€t.f e*T
4^'e
nrr't
€
gn9€
KN,$teoclQ
a*le&ran-rg<
9 e Ueo ttte&
3A F.c.-e,'t ce Erl. cr N €,
P B-oB Le''t - Ia w r4f
fr; e"la<-n,
r-: ,tO Cte)
r
knio
Lr IY'U,*L
,1M, fr'u tr"uJl.l*, ,*n+^kv fu^'
flJ- sYt"*t ott'*n k^,"*l*
-[-1"- K*, ^tl./'rp 't* ft-,' etlsk tft
{
w01/ fr*,k
#.-
h*
L'+^ /\-
f*W
tft-,
E^f.-t
(,)
L"r*J*)"t'
L
Lu;u!.f7 u,"/uL
*" : TL ulLJ;
; tm-e""Y
tu^- exf r,.t
^,
* fr* WV,
,k
,n** ,n'0'
tfU
d..,^;
\
k,ru,.tlotrr.
'K**L+, a*Lo,.t
t*in
nJ
f*ff
-"
h:
d*
h^i "t
an^,'
en"fr,l: tfil
T1^., Kr"o*{*f - Loo. ;
u^fy-,^r
a^.L l,ulu ( o^ sf"^ "-f"-7fh^) il^^*
^ce (Lq
t
f
krt
tlt"
st W
TU ,qe
Kr^o*r
,.
Ls t*
d" +v\atb
K*,
&fast
L** ft' d'eusfn- *^a-l<^'7 '
n^&"t ;t u'6i' - fu 1L*
%
t'
h'f
b+ ,ry*'*
, f'\au&"^'l h- ^^^pl*
tl,)s V-{*-df -tk' <!r,^t$ - Lut t^*t o't*
,tAt t ,t-yf - 1o"ruuL k^'"'l"J,n .t b,t 'buLle'-',,"tr6
d6*o"rt*
(L) W:
Tw
uJl"L
to!-unfi l{^"*.t+
f*Ll**-NTU LY-'-*t--,
"c-*tri^z
W' b *^".1<.^Wu h;*,
ktc
lft"t^.
^.L"-k
k'W
n
n+
1k-,
a|-r:
k^n"
u^^,ttsli
d,r*a;
$-h^L'
^r
'
d";'1".
fr*
rft+
,L"*
f*
L^) L*Y'4^t,- J^-v,4*Ja
^t,
K^,* ,^y
bW
^u)*
I-,.o*'t
ry"
(t) g "fufu- '" ( LkJ^J'r* d-al.- tr' *J* .i* 'L;"L tA'
sl'tJl b" ryk'L
^;-
0f
RgPR-esExtrRrlor.l
K(ou, wDqe
o
:
rk *ru,r7^7 k 0.rn,fi.
fr^" tn"Lhu*
qfl'*
i'-"+I n sh^J*d set tl L"o"'l"tge
wba-t- ru I*,o^
"'.oKsol're ThLct oAe
py
Qatt-c-t
n
t"
?,..s*tr,
n,.15
:*r{
w,u- c^d;6,*..^^J's stou&
f : ,:
n*.ld
''
--;x*f "[, q:ffi
,^yv.o,Lo-
.*lh
:"_ :;,^,- *^:*
*Yh
t1^^., t.t"^i*, tr"
: d*r' --'*^
u*'r Y'th!'
t*t. -
aF
*,
tI,.'
"i
i^
.,nY,nl 0
l.o't
e
ry*^'ati-
ooL,"^^. s'^r,,"n'l
',i,u
b4* 116-i/
t"'t^\ofon
u,vt
t)
"k v)a)
A*J;"L atL';r*
nI
t-)
c,^Ji,b',"^.
' th"'* a^,-
o
K,.i",Lt.r
l{'no'^r tJ,,e
$^olLr
t,)
i-"t'y"r
il :"';';*
^*ru
t'fo*'
Lt)9hv*,,Tfuil*'r:''L*jtao-tL'i'',a',^L
'-P
taM '#"*
t
tI, Y'r-:* y**e
a- aL{t L €-tfostlr'e
hA
fr** fr'
A"t'P
ilfu't^r*
o"f^*
10"^- f)* f)]A'Q^f' +hnl'k-'a- h'Jf
u&'t- Y f#^ 't
t/'|.v
'
t^J
;[,ff,
bw
"frft
u',,'Ay"r[#f
Latn,- '*.'t [*
J^i'*' t*fT
l'fff"
eft
*7
t
',J-Lt t.: ,{ tr;^^L) ,
),^r, b
fh"
Luw
0^I'-t ('fr'
u)'1't1'
0v
+ ,t
T**"-"- ' ' -t'z *^"h**
&t
I
F'
^^j"
rt"ff"j
)*
^T
( t 1 ^rL a- '|v{ril
\f
W,,
I*i,';
/
1; 3t*ur**tt* *^tu"pn,*lJ,l^: t ^,,T
h-i***F^*.u
r^ ^cLxrsivt
Lutj'
iu
v
,
r ,
h*,",ut
tk
'
:
rF
'v
Q
/'ecL(ih*
'
qo^._'t\r*lJ-ot
b4o^- t t ds-
(ta q o*.^h&,
d^ar.+tl ku,,rdl
c.-'L
nlhs
Tru-
O
ati..d
L^L o
tx0
Tt^- 1'^-|.'**
wr\4 'cy sr[ i
. l
- lr
' tp*
c"-[-U
Fo
I
S
5,,4.,\rQ-
av-(At*
Fnn- ti tu K*o^L+
d^^rfil^f /Ck^f'
a'6 so
w
^P;
S
f
n,ll"L
LuJi"L
"li,h
t':*, *
/rr"
or\L
r
lr;&,
,'t"t"t
d'tv
.^n'",-ry** A.lffi
,^;br*
1v k^f'^A'"'
U
/att"<tufith*
fl-r;
Altu) ^^L
v al,u.ca
.
u^'"rrtL'
/!)iluf"f^*
.r' ^nlu,t
rt,-{X,,tts*
, lW
v; +l
L,h-tb
A
o+
t,l-,
P ,*^"lh
^t'f*'
hl^' tultfrbt
br,t or\xl A*t'l
M4-
U
t3
Rs
rc
Ln*r
.nxeill:tcs 0r Ail Expetr sy sre,q
9
Ed P a{LT
St SIevl
Must
H
ftve
S
tvF
K^io,l,EDqt
1a
t')
L
E*?
ui.
L-->
I
E-x^ruru
k
Exfw^
k tf^f^
CftA^^ctwestfu aft a^^-
auot'-
'"**7
*!* t(u
^-,
fry::^^:
rti'" A^- *t^f 'tr*,/*L
Tl
^,
/rt,,ut-- -t
L,,u-
'V.
o,Jiru,
^-:,-"-'l
1,,* f)'-
frk' Aalnv-
^,tuunu*
4 k't,*t
fu^
h
"
ty*frrqk p^.*
I,
fr'ql
U
/&'ws,
*u aJ.i*tl
ot;t!-\"!",}ft
,w,t
k
n7t*
-k(;^14"*'*f,o''
"le
f*fu'
nto
3t
.tfut
,h"fu
bofl'
!f'4
y:,
,i"
sLrt
':
';:,*,, u*"ff
,srb,J''a^,
Ar.fu
n^*.L /,*^,. ,r,/*tnts
oT-M M^.YY
w'l'"-t ,u:^ f*u
tr-
EoLr** Pe
ioLu.*
fry*"
^L W*
lw
w^rtlw
^tl)-,,t
tntfl
tb #" A^fr
r-
t-';
(
:
(L)
S1*loL' L*r*^il
^t^,
Aol-,,t,..,y Lur'l, 0w tt* offL""h'* %
7W'"
'
*1't' tf*'L
- sf^tny a^;, A*^*o h* ff
^**
tfr*
l'lo"*
'
n''l't''^^h
f&
t rt
f "^
^Yh
K^'u'v
'r*"#*^":'hk
I
Ex
u
4**'
sl*J,b tk"k /G"/ ["-
|
fr^*
t)^^"''G''s(*'/a
tW
t
P
oyd'
A'4;
u,ond"
k
l
^
'f'-t'L
,.t'
'
t
^*f'
t
f"
c-b* b,
lLuo t wJoL
'
c*',^"b*qJ"
t"
zx
U,l&'*"t*7t
f'k'tt
(Lq''
:uL"h'dilt'
fl^ut
+r rI"**!
a-q-- k+0""'
l,*
t^-f^sf'to1t^'l a4L''
s'y^u,tl
nI
P"L^-
tJh,,. -
t^"t
{
(terir,,ui yJ^{)
Ite*sry-fi f*k& Wl*
[tf J-*']- ) o' s)
t
[6au Ar I ''ts,''rt
'r*n
,r'
,'*J'l
sf
w'|'y
t^-e-o"4'j1'5
t'/) /'*""t
u
r*
'{
b*
b* f{**',r,
'V
t;
wd"'t
^t:uh
"t
w
r
fi*
'o.t &g*l^v a
ruJnt-,*'Il;:*
" th*
P* fu'{- v
"'i'{^^u
,'tU
0"6
^^4
lw uf* ,tr* P*^*
v^t-*^d
l"i'&-
^-"*V :E
Aul^')';u-"
''0
uu'
P+'Lh"-
f*,t''^-
e^^*7
:
ry
iT
<Yfr,.] ^,*
r;"t Xwt+ ifu'l* t. L Pr ' "(&'*
t)
/o'wt-
/
(3)
3)
S4- K^o;t*e' "
A* uP*,
tfi* /'*
K^o'"tle'(y
euY- 'fY
a';""h
w^t'
t'wa'3*"0
f1't, lrf, it
fl^'
u
*"-'ft*f
I
,rt*6^- tj''fi
:
?; *o^ u
t* tu o'tffu'"*'"L a-t
a^\
/1'xe'6
1*
ft.
'fr1
N
, lf
^t'e
k'm*":*,,fi!
; t';
in'- 3t
Dk
rJtt'v+* 'lftuo
fffi"*
"fuL. an.klp^* u{nau^l ,
J-o
,tt ^A* ;'f,l fr** 7G r'lq'k- h; ^'*V'ik t-e'+- "*'t.
s^llusit's a^d"
'&
Low' ufuV
,-'ob
f':''ii"rO ' "thnt
&'t
u^ Jt'
C4^^ (vt'r-
re ^f
d'''ri
"^":fr"
f+tt
"n/**
!
Lk-e AL'ar*^t Tkis o^^',^dr
"ry?
'
ia c'-!,t"-t aTnk",&ttr
h* lt tu-*lov-t
K
,i"ff
^u
a,t
h- *fft
k^o)l+
sfu
*' h* J*;*
tY^
*1
Us<xt
\nn Orrr.
bt
t
"18-
^l
c-^*fd'^-
't'trvw'
'^"*,
;
*v*xt
dr-bY'
*1 ftr' n-'* 'h'-b*'
Y'vL''t
tfu
0^ e*Y ow
k,,,f
exf(a.-oh
*,
a"^L
A*("
uoo"{
s ,t't--fv{a* L,1^ et,f"^r
"L";1"
*-) -Tu ^rr..^ff,a^s *J^fV
nl.u {oPl''dt ;A^
I
c
uril"
t"th'
uJ'
baL""'L
tt"rr'l'l*
ft h^*'
orw" ^
eA^*
rn^tu :
de*l^p*t^^r
t
h^-
,/,,-* tA- ty6
t""f-,*^*
fr^L 'AektL
S
L*y'^"fu
,l'^*
^Y*^"n"fldffi* t tw.
r^* lnt- d-PW fi'*
tr.[*^f,
L)ol'-
au^J t^ta)
ot, ' 'h
*.r'*7(*
u
k-rnarrta*
kh''k
i',
T[r^s
A*.L"$
,
e"' tr'- n*a"l/; '
tr*
s7;fr'*
u
tn-'[ol*
t- , of"t^l""tl*^''
^ h.rn ^A,
td,
L+
,.'*'V*ltf,,^yt''r'
ct
e^4'
ofe't-"-h^u'
*
r
Uses
€-tPtel Jysr.*s:
aF
Uses
''
,/
/
Ttp- "l P."*Ll ,*s
io1*riJ tt Etf"-t
Bctstl- ficl-''nrli+
th E*l,z>,'t SV"fu^s
I3^sic Act,,,,+'*
i3f*'"s
tr^y*v 4'''nl
L
aA.
,f ilt{
Solve
L,
R4
5a6.'lin;'*,'r,, G'+a
hionft*Ia(*vn
I
(,
?r.,l..i .lion
't)
Di a6 noss
,
t
C,W ttrf,t
l*^Lu-"-
?nublr^
C^te qot"
(,
?_l1ll
SXsl''"-s
*
f
and.
n"Llnrns
)t
Ln(
'
Add,r-ass.J
I"Ne-u^-^y s, *z.h'^ dt s cn;f h' ^s
Jn$".*"V Ll<'tU
fr,*-
c.tws<'7r-.,"nud Otr
le
u
sot
ff "'*"
daf"
Ei hnoL'^
t';J.':^"'bii
;*ffi;:x,
i:!.ru ;tk^L tit1l' ;to'{f
c
\^orrr..le^i sh,'c:
0
C
Kvro,:
"'^fo
ne"t
dtg ign'
q
rt h:"q;
(e)
Mo*i *'T
Con
t,
Deb"66.*g
R-.p*'
O,r'(fY.6
Ud*^U
6 e* yh t
anEtnutt-io'l
obs '^*''fr'^o 0
$'J"o.ul
'-
rr at1a"L sV*e*- b'L"'
'
)rrw.*,fl
'
u
I^\
arcuA,:rl
Alv" rlit-l
(,
co^st^"''t
f,U^V
u
acti'ns b"b*" n't;V'
'
(,,
o"Jt't
ub^n.1i
lo'r'rs'1.o
'
M"oru
a'^L
".Y**t stuJ,"l
b
L,'
Co
^t".1
Go u
ot-
'
no''T
z
I oLuiou.r.
9
^)*"'k;'^t
oJ'i',;Jr"'.,.- ? ^{ J'*rb'
*'*3
ovo,r,al\
atrk^ bth^'io^-
fo
C,)
^.^
]t;^u
p
-Tl.^.iF*,1^61.YI,",g,r;
i:
ff:."i'";ff-y*^'''
on, ty^aat.';ifrJ
S'6lamns Ltre x-
"#
fr'"
u'L
"''t
-ff
F^f,*
*kF &; A^h
^T* ^,f*o
&^" % u4*,
n;'-ae'*
f"*
,rr*Lrr,
Pto"
d,^f* f'
s yb*t
M nJ, c,t tilr.1*%t'.-*
,*o
' )""J't lrtL , bM
syh-,' e'1oiwo'
+r;I;tA" .n^{r,"i W
ru^t
YI
*t* h
i
(,) ?-{&i, :
t"'utont
Lx**
'ry.*W#:rH'
tl " s'{r^*hon'
woilf
fffu S*:^**
0
.^^lJ;.k
'o*P''
.1^.
ffi'5
ffiro
Z4 i"*-rt- t ,,- ./^
drreaser
--l ru.*
--, :;:\J
I
l9
D"sid*
coc(,r...*,ru-ncr
:
;[;[:
rH.;
t*"*.
d.e&- a[
i
ll
=
^
r*
"
c"u\odf trtu'"h
th"
i",
eor^nfo^.c.r^rs
Ex'41'r
J*.t*ft
,l-o
crrrtt*h
l
-,
$vt
s5*f'^' a's^"I t^
1
Gn
bar*f
c,
rr.-*t
-Q.o r o
Wry *"f,f"':il':"*'r"il*
.'b
@
?
&
I^","i?
S
ot
T4'
ei<t
d*
t
eL^"J
'{
S
iz"
r--Lac-f,
o-
;rnfl"s
t
,rt
,o4Lx
or6.ar'ic
.
Moniht
(()
*'^'f
0^r,;durk ct"fif^"
6La
't
iv,gf^ wv)'\
/Lugl^r't
*i fr4^'vtA
'-,'"r--'*
M
-)
o
dttfr
f'
h-t^
h
e'/^v
ffit' ,lt,'Y
1x;rA
"'^!o*, [""n
Ev*7"^t"*t
"^"*t
^r^',y6N)AA eY*7
;ti'
Alr o.-
Acu b'{
,w
tvtttcLll
A-o_ats-\=t"
*Jl*il
d"b'
f*
^
L,
"-+
*7
,
.';":d
:# *,il*:*.,
-ser,,sill;\ ryilf
Cnngtn
of
fn^*
a-^lios *^A
S[,o-yu"
\
,t- -r-'-. :
4
4
.-;.rty
Aor"PV
sla&'ti
1^rt*,t,^p
r'tsi
l.,rdi (a*
tX^"tn'
&ction'
s
:^ffi"::;-'';p' I
\v\ \r*
t'\^u[ 'f --L/ v\ v'l(r
""f
f'E)wtl'^6
r
,
L^
oh''",. ul, o3rro.,,-
^, :
,
.
r
('9
:
Cs*f,J
T
\
b.x ,."^Pler :
ffi^
: w, ji;*ff.v f*S*''ll'
no^06
->
^
Co
^lruo
*frp*
t\r7 .^
L'\t
M
b
?,.obl""^s tlv^blt
I
LI UTI tfY"
oJ\eaa
fu* + ttt Lr ^1
(t n
t'
Ltsea
L{JeJ
G-\a
(
5*f .-n-'t Slsi<'"ns
U
L'
A7^^ ,-tr:
,
0
U
(M'^*stV
(4*L'u tf^'
,
'fftu
.,\ t
6,&u[ ,uW
,
W*V
Ele't:no;u
'
\in,,n^^,.^.+
.-t*'
:
vanTp^*'
Larr
, w,
'
**t^J*n ^"f^{u,:*;;"JY%;^'
*%
.
Sc,.*-rcr"
{-"
'
*Tttl*A1U
'
(')
E,.fe't sfrfu ,
t,,; tt
--+-
sY"*;
Vf
te
(L'oisV
^*
Dr
Ex1""t
t
r.Nn A
s'\ DR-A
Sb^P
t
L
I
f
U*^
AIJ
lll tt
t\.
/a-
U*'"t^t'\
t
w^/?.,-
xL
Lu d*;"t,
wk&
Try*
'
vrtsrRl
CRlsAirs
"I*rfep
R_etrrror{
w'ln'J^n
T-^W o- c"$a-nLi o!:+""
De*pgs; {i}^^.r"^.
\q^) "fi['"
Sf i^.f*.' {*J
+t"'" w\qM
aryL n*clrJL
q:tJ
;:*
Aazl'asa
ctLALo-'
t::'f'*
H*: a-rJ
T"l'.Ji
c^kfu ""{''"'
!*,,n
n"le?Js.
t1^*
Punt*tu(
l-{eJpr . Lo,-.-ist sfr"^tf.as',ze
c.,,,I-pl.^ o16eui. X'ole.,^le,
'
b€au ((r'.14
Ke
pnrr
TQ*,t STU^lr
h*: li:r* "#flf- JT'frP'
:"
-d^ta'
u*Iz,,y.L\ Tqnts si6*.1
5
t, ei',* sfL^^- ;
(r-'Pa;
[xb."f, sulI,*
I0
3't""^'
xcotrl N
S Fa,^..l-i-t rd i iL-/
4^
IV
A^").
^"o
-La/rrtaTt
-
vr- ^t
M..d,-
i
Drv tJ
0
L) "*vaAA 14
a
uea.k
l*1"^*'1.
q;r*u
o4rt;*
""7
d*fi|"v
,n^4sfwu'
'
co h41 u TE(
51s f?r.,r
<
?
He.los '^
g-e> tcrrox\
*;*,J;"
"^f
.,-x
Pun*
c0N
NuNq
P"rp'**s
*W*'
VAx- ll/1Ao
,L,
t
, ^*Y"lun"
)rc
Ti,TJ*,,*
d6g{*,,*
tt
Ptn n*s
VdL.ps
a|'^t
y"*,Y
?rRnxls
*t
va'n'$ac+-l*
d4t"l't'tt"'*
,,*f
e-oxlrRoU
ry
rr.an\L ^**J;*
9ec
.^t A^s'*b,J!*,.
+
U
U't e-tL s.ts(t'""s'
rl,,
C".,,^JPd,a \:tot^s
-DAgu({rN6
;
lltps
'
o3'^
Mo F.lmoRi{q
s'y{o'''*s
!T',"
A*a\^* slsh*''
ry
Desr4{
PLc
k*W
ttls
Dr hQ Nlosu
o{
t[ ]c
v
"LL 1S'*'^
*'ta*4a!:
Hri*Ps wA/^W
;[ d*sY,'bJJ*'- * bFc
ct^^lruli^ c1t'ns
tl
t5) Fxl"*
9t5.--
;-
wifr-
El"tfr-;"
hcf'
il
:
er*
4 rt',,- ;
uit,tn;,
/-*k^^lV;u.
Ir*
d'Aq v
ii
fl
ri
'j
Euecrfun'ltcs
j
Dl Af<
osts
b
aea'osa
t&^
PAu-*>ro
DEst4r.t
Tq Lr3
Pt_Rsixtxtg
H
rJfr l^,n*
ry:rt.l,r VLJL
ar^L
t-t
Cnrcr.n[!
\.'fi'ut'ut ^nW
e;ntit /"""',h
F
ctLlt. A
*-Mos
Su,*l*iua L^ti-uel
L*;t
cr!,!"-
Wgu
;
o
^nb-'w'
J^''"lfu
a^n*a
U
r&^ W
l>, a.+r.*su
44 t"tg
i*
ry..-Mal
4,w
'\€f,^l otks'
fusrR-u Lr tor
!
L
'T<acLo?urc
,t^,
W
e,L"t.'Ac-!-
tT,'u
U"tt".rls'
epo slra'^' /* 'Y*ry :
D6LTA
S{:^,rlU x|PfJ*
txfe^r
A9O
T
tl'*
Gr*,^"!-
"ltu
eALil"\42'ur.1-
00
€1"t^;"'
Ex ( rilcEKlN(
TilrEgpg6p1,ou
Hli-Dt o,urnlet"s
Re Rcroq
*
d^'at''*sz
'ruJ<o* 'g*15"
"J
Nu;Lt,rt'
Huf' ,Mb ^^L urn&
; lc,u^o'h""u'
"r^Nllya*ns
,ilT*
'Y^"t"
Rta.rrg Hil+st;'r'a-1aide^-tt^l
Alo
KtA.rok
fiw
a,cdfu"^ts"
t
hr-l-ps
""JL ofret-fanu T^ot'
ale
'nt^Jzon-u tuuoto-
orrcriol*nh'
Jr..tSt At/Cr1aq
>
,6AME(
Teqc.l'o fr* VPQ^ah; *
a- st!s^- i t'p'"lt'r* f(U
'
t5)
A4r"- w*tj0
?
Kos?
ExYa*
tl'^
eCrr<- ,lrr<l*rS
'r
I
J^rl,l,k
'1r.
ru-\
Sra*Pd. ?,u"^rL
Geawdl
L lrHo
:tr'"rww"
Huy:
oiL
PKosp6sTrB
ptg
r_tr{{
l\)vtsoR.
F.
gr-
i
n'T*
^^4 ta,,td
" ,l;rt sf,rr"'r"
f^bl,^,.
HrJ-lt XkGy'lL r^^l"rt,
t\- ^J"^-i foto'.<h^L "t
q- AlTr^n".
HUlt
orl
V
a,vL cr.urt
" du;q ,t'&U,,
?""t(r
.
f
J
let
E^1,*
v^tdiu*
^;tfu
'fu
dr',U^f*
M YC lr.l
sfi o^N
Ut*.rc-.I
a
l'4Fotcrnl6
T*
re*-e(-6rATr0r.f
M
VU
Dtaq
^{
oru
P
Mo(
vrT-
o^rfia;
Py
* U)u_ k;t
r"r{..r's,'"e
J"t^+""t^- d^f,*
T
u
Fr* I-ctt t"ot '
1r!y*
D,.'oV,-'r,
d&ro"-
h,
3
Tffiry ffi,Fr*"
lTop1n14
r\o^iliu wte-aiy<- - Ce,'L V^X
yA^;""n V d,X,^P^<fi,)" J^i-
VM
W uJ t.^t' ydf*e^t"
DtAlniosrs
MYCrry
5tbrAil
VM
Ult d-af*s. G^L t"r^t
bo-d.r;"l u
4.t"^,
H
f4aril|,u,'-tO^ait'
qhi^^L L"* ef*Z
yt;^L
+ pd
u/\L- U*^t
d*f*
dA*
ki E*'
t"t ,i*,^"*"
k-r"- *,!
w
A" d'i^*"*t-
-TL^cI*"r
Ir.lSTRucTr o"l
6u t nor.t
t^-r"b,^r,'t
b
CoNrRoL
V t'a
n"r
t'/\toru
*;*
h-
f.."
ol
Pt"A"'
Tcu
t^:"tL
&b*,
tttlfr^^.l,yr-
,r
ft
*^L
'
C--Q)L.
"rk
*f*
(,
y-;I"fttX
SC
e,nc. Sl'a^frL L.i{t
st4d
)
1.4
u'd"'
rib q"l
Htse
s1;6,^.
1
s'^/
C",t,r*l-
lsf'^s
T<
;
\
M,t'o
cl"""lVf
tUr*f{.1
a*rc<qRrtRrro
a^^Jtnl
h*tr
Pruee cTror.l
'IL',Hfu pt" t
A5r*
I st W
H
D,<t&
nnd*,O trf**&
"^t
X:f T^f\%
df
t 7t**
yo-i/'u
au;LL o nn xb
brs
tq
^l
PuRxlrrl rnt{
)J,.u,,t,1"',
ulv
oLu,u-.
.
g.t,na_
son'o*
a^/_ *l__,.
Wct
'#*vW
hut' Ad, 6^*
,"*q
^rh
yb^^a
fa+Srta^"
y. ec*'t
*-f d/'"
.
Cnse
lnJ
n
'Y
h^t
?Ros pucraK
OF
STU DY
?osPFc-roR
tcToR h^
U ass,s[: Wh
? r os P
b
g
"
no-- tl^t
t
b*f
*
'x,Lt
\st'-*
' lu
-b ,'rotK
*;A^A
FL'\'t^)
'* ?'u"",''l'' u"*"'^s;Lf
^'
sv**,e'
&'
oy.- ?R.ospecroR. Ar*'fuA
{L4r
| 193"
u^fr'--tA
L
'''^k'L
'^/'/v n1q
(s r' t)
s K' lls
b L{td" LL*^^
k'f*
e*7'i'
i^'o^l'
N; &$t'f ^^
ruLt'L
wo-K;7
::'T
at^L e.l'-"tLt'
a^
t
t*1AA/6w\2A)
a''^!L I [
,^T*
,b
,O.":*
-o
t", f"*J^r- tJ*
cn<nru"'^'t'
th**
'h
3o In-'* - Y*
w'clwd';'v fi^ W "'-L
?RosP6c{or. 'l*il
exbn"sic tr*'*
;*
-T*
J"'*i"f
,ft
uL,^,t.,*
&^- s,uutL
-
D
PRosPscroK
hrcJu^t i
,
,
rt
+t
v.rar At'*#X. ^*1" b*"',f";
Wb
-t
A.'-IAl'\
T,*^tJ
A ,ul,r, h'*t"t' '-lty i:'Y
l'Ir
I'A '\"^fT
NA4 hq* #
"+yX^^d'*
hJ^-A*;
fl*^f
'xcYwsih'^- $^*ti'"
,
n*deL er&r"t' 't-
s1str"'-
1L
_er
t
6"^L
?p-'rsPccroK
KwoaLfiz
d'z't^;
K"r
o."^:
f+'
^^bffi*:r^_*r3^*ff
",fl':t,,,,'l
/tz'x"va
'ilL^'UT'r"i-
-L-
t'.a txlT#.LlSP
)-*
wIALil
o
}nn
r^r
v arcsr
bn
?Ros
t
pecroR A*
i,f,t*ai,^ Nbu,d tir.,'
itt
Kno
* t"*
L
;";g6-^^t U J,uN*
oo.
't*^'
o,{e
*tuJ.n]t
0^s
0v.r
0ru,
E^JOPe,t
c-r^fr;il fulU
I0
{vr^0ovt-\
rL^. c
,ryt
?rkser cro(
N'\ou'uJt^^sl'u $
Y:-'X-'
tL
c-r,'^-|,,*L t.tLtL
i
\
tutLv
f"^k"*J"* l*r7'o
#
le.-v^
"^f.;
&f
tt^-
a-dt
e.,tlfr,^-.
Itr"#
,l
|
,u&,.t
^*"t:\,,,f',;-;^
^o
t#' rX
fY*u*f^^"',2*obl"nvo}i^3w)*l-^*{e]s"dwe.-\c'61"-14
't* |*yo'i| -&V tA' sinoi l*;€' ' &tF"'*
fuJ, t
o^L _;",,,i
,%*l^-;A
0c
'
_;W;
th't
t;X mrffru*
the i'f"m't""- t'
ktt-t
4^L
4^L
y::; ,
,'')aa,v*tL^'
;r:.ss*a,*b ,[ ttu ,"i^'nJ T'l:bh;t t
'o^ka-
a'4*,,,0,
f -7
,6 f^-o ktn n"f'tI o vuwiu u-f"*J^L
TJ q ,t-lf*-t
'oirr"
turi
rr:^
rt"
n-LU)t
.fulo$'* -
.TL.<-
I
nn
,Lo 1""- a
K-;*L '*
&^'-
'l*y0'ttt
"
P P,o
sPL crok
ae
t"i o-t-K
fr^-
?B-o'Pec"ioRt
:
PRos
tre
PecroK
T";K"-E
tu
''t!fhW"tq
-h{- wi'*
w tlr.*,,s t^ritL
tr* * 4l*o tub'"k T^l
d,yoit wtu*{*y*
'[A'
,Ju"
"; -'
,
.)
tt
t""-
1-*o* *
sL*;^a^ t**
Un-
+-
*
utu^
\T"tr"
'
w<.N
tt*^Lo,.,Jc
d,..^*x tL-
-e vol*'d''''"
'4*-
u *v
Jt' t
* ^^L ol'"r*t
T'LL A,
,^JnL'r'"
f**'*L
.tru*J O,A'J La"L Qv\-
&r 1'v t' rt'
tL*
i"* T
t*yt
u-J*d"s
u.itt N o*^:ry,
r
hrptevti ^i /''") n"
I
,*^*,
A
tff
ofi
lrna"u
"th'
i nu,st's'l-'
c.,t
u
('n'
I
l
aa ,
s
/
'*ff'
,
l""h
4*
''^a'
hstL
f o^,nts
,.^L fu"
a'^)
t)ur
,
?P-osf e c-l0R*
,
6A
r^s,;slaV
fl"'os+ 1'^4aao^,
tar uno^4 %
P
^'e'J o
lnlu^I LnJt
Fanv
+*
,,
'su't<^4
tl'e* 0& , a'l
uko-"' U&'
6*tior,ts h^* w2'\- tr
a*'fo;
&ngd.t
7*r5-tt"
t^:'^-
*i-t"t**
uoLt^'
t-f,o
1'*sl^t
[n,ron/-,
xuC
il-;;
L'
r,oL'cr-
KrrYu
t
J-
/,!-A-'/t\
KJrne-.i/s
"a
/46
t€-Ls'
Ho
,^r d o*
'-J-LL
? (osPe eroR. d u
?p-osprcroF. s1st","*
Tk
\,,
c
d
C-o""-tl,i.
s
Au-l,w
k*U*,
obs"x, eL
Arrv-
:
*,-*L 'lryta'*
rt "b.:m';
**tr0
i'*1U<I
^ffof_ d*
Lvir'--gq
\
l'F E
-[kl,
-TuEr.t
'th&t
vvre-ahs
a*iA*-ca
"7#
-S* c!'J*;$
e''lJ''-te f ^^t''*
tl*
u
tu
f
-f ,1,"P^ V
'Ls, ;# .tw A"^*
^yT]
h,^J' ti^"
Ls, L"t
t{ W
'
H
,
fd*
.*
Aa 6
q,i"Le.-,u NLs*^t
lu t) fr *
-U^..
'f"-*
esaL- h-Tf;t;-'$ t-*:;'
"*rt
-b''
, il% q
F;
I^"&
f
n - I
u
o^-
Ls' a^L
' &,rt
'1"^ ift
-f[.*-
n- L,'-jf, --
I o^L €z a''tl
El otu Ez
nl
€3
b
a'
LN
P".4_ "f
e'"J'-'cz
e4^r^-
U*[
rL"
e-h-cz
? to sP€ cToK
eutdo'^ul ) *
,
' 11
)t'6u"srs t
t)"'
f:*'J*Y
-\Y'fr"^'
t*
E
t-Af"fr^"^i"
c-^a"A'
41e<g) o{- <vtut/v^-'L ,
L'
' ,{
t
,
Et a-"L lE' o^' 8)
Tr^. V*^:,(u)
- \V L'^*
a)
"7',\L,*Le!
W6fl^'r'
"i"
^-1+
s,"Vry,L
t,
Hl (ls'' u*z)
sl"o^'n'
:
Hz-----+
l[. MJ- b
^ 'Uf
f"*
*-Lftt't ^!"1- tk' t"'^ 't'"*z b*t**n'"
*i&
,;1.*-- ^{-t ,
q/^L
g-;Jn-*
?r<osEcro(
-JS' '1"6'n"ts*
c-*^1' Lt
fr* tul-'
F*
cj,.o,'',s fut^*
ry
i-',W^*
a-J Sl"outt
s1,*' )
-Fl .
\)
I
<r',*.b(, 1'^!n4lu }"
tt a-r
th&{
l",unrrrt !'-'fi
"*
t)
tL
'*k tr
Ru
ue
s:
I
hI
TNFeReqcs
N
ET
a'\LdL
llz ( Lst , LN,
Hz -----+ Hl (r-sz t LilL)
Ez ----) Ht (i,s: , Lt-t3)
ez
:
l'P)
lnhr'-'n' nat t"^ ? Ro s rEcro(
?Ko s?vt-ta1 L's ^t'w
u^a'Jtb
fi^^'EorL ok tl&-
c*
'L^'ftA'"
of-,*fu'"f'u^luth^kfl,'"a'A'hY**/'vt'
\
Ls o^L LN
o
l--r t-
TL "Jr*
'
tl*
*{**"14;^^-rL ^
P thl
l^ol-
l
'1 r^;^Ji b---, c'
*^L
L'^;u
"^^L
t*'
v--'d"L
-T}^r
.
slrt- '
l, - tt, o*;A,^u
L^^Jt^* W
c'rt^;U ^ #ff*
- uzr-LotL
rt f,,,^[
\r^4'
u L";l*
0
J,.
ry\-elt ;h',^
'i
l\€th;
du'L
'
hpv'tct'^-"''
rLpvaar
uJ*' "b '?" tt"*-
"^t
uwoJrL,
L
A'U4;a's-
W 'fuT d*T
'
:::
?/*'A V "t'*
LLaw
'
Q-'f '
tTr-- w
o";r^t eidt-rc,
53:
'E
l'
,^f^u.
\
I*,t*h fi
b'tto-t?
;
+)*
sl.r,,^-
f6*
&\-
EL'*,{*, L* ?^'^e ,'* 1l^- ^T^
uYi*' '( *5
EI
;j" a- sul' ti^h *^f" h"^ - f
^h"^* if, d-bse"A) t +5 ( u,'f^; tU ?:fu ) J'
Lv^k^"-
?(orPrcroK
wwfs tl".L
t..rs c-a4e- , 'U"*, rr\o"
st^f"e"4'uc
r.L.u'u"u
*f
tt," z
f *^","l'-t
cu't^;
iuY,&)TI*,1,-tl"{"-"**e"*.lu*.-ha*2t
;
^A4bL
I("L;Ltr
l'' 'S"Ce
'€
0
uritt tnid-n-rt
t,uoJJ* b'- e;'fhl
'
,*-, ry
L' u
-Soorn
- )We-
'f * '^-J-
,f L'^:w",H,r^
r**ru
,b 'V:L' L'^t vJ
uu
;b d-*]ia + tW
L^
e^r
J&
N
C-0,*lu
f
o' ?+
4' ?+ ' l&TJ"a'*
'
ht;*;!
"& 'T
*"o|cr'*
-"*.-
w f**rt
nr,oil,'o
^s[
^tsot*t:J-
/U.- f ,'*"t;1;[ "* E t'
tL-
,,r^f
,^"-
t
fr^'
' H2'
fu,Uf
at tYM\ I\*
,v\^tebv P*
,#
k-*^
c-eu&
wl"*ot-
t*
,t ' H,' .
a--
t""^.^
TL,,
;r
ff*
1^+"'*r1
-h;htia ,t fu- ,,* d.*o
**T
lAA
,^d, " t; ectouul
a,v^;y"^r,
f tI' "ff& t
;
*, Wo
rnud, ,J
"
;
-it
*:u tl^' +*Luu1g" * o'f"'"*Le^"l"*
o0rr^^o a^+-w\*1.^c.Uy
l^^.1"-r*
llr*^
f
K wLt,^-ilr'^-'
?Lo sPe c4'o
-Tt"
b-
u44/1,
,,.,^+
^b
+\4/t_
c""-*;&,,' ht
14
ry*'-.'
r_ffi
r
q^.1ln'w,t-g"+*,
; f.\*^ktr**rr #
Z"J
E
t i., t^"r.'rtL
"fu ;{"* *"1:L"}f"r*
\
tr."
0", ?n _^- 4*,!,^' sqoLJo*
oh s*rf.r€"
?-^4,^h.Lr
'
d
,tiy,ru.,"
7*lu"l6
fO/,
oL t\^- c*-u*k ^W fi""t
D
D
)t aa, A ^,, lt ol (brr^b"h;l^k'
u
^ -. I
h"^
y,L
otr^,'u""trt "& 1**fr
n1
Y-ruK( ' oL
uh €^u*,
"t fo*
!/
'0'- \\{''). ..4r-
, ** ly,
rt
_
?ec,aK, t,:,:*
IU
\qfttu,
lu:,
'
s,*Ut-tt
rh,
v;Lt;
!"-L"wl" 5
n-
o
f"L , PM^tr
rffi
*
I*,q.* 1*,Y;'offi
,
L
.
tr)
,ha^$ ^4-.Jt
-1
R.u-l* ;^, ?RosPrcroK fr-t t l*^'L a- /'-'* "tr
e*ifu*a P'\' tL-
f'*
4
ft'-"Li
"[luuti* 't
a- s't ti ':t** w^
8 ,r 3t slrops
-T
p(o specrop. tlfu
sfi^.fr^* w,.r.L *
('
^,
0a
o^I* f^
f,J^'
;^ f't'*' eT:
**
(,) lF :
?f \. b '""uJ*'"'*' f**'tL<
/^**-U"Y
rttt'tw"t ( t)
*L
)^o*.
"'
TY.
,
fryVfu
N
Tpre
*Itu-
9
rF
,tl,L""-T\ *'t :#-W
t*
6_
N
Tue
Li)
siz,
+
z T\ '[-,: ^- 'G"f**^ ,:^Wu
kyf*f'* *fe '^t^'!^^'* i;
6-
o'uoonoD
F,W'#_*:#ffi"
s^gyt;" $
tut*
,**
ff
'THCN'. '
o o'oon)
*f^J
'^;j:"*x 1tin,
lvf*rtr*
t'"t**
&-
6-
d
t; n- ry
i[*'*
1t
lh:
Lq
al^drtk
$ 'tr\"t
'TJo
a-
TI)-f*g, o"n)
W*f- ,*y"f; &; }.^* a- " ^i/flt
r^e^{ ,
5
tu
(f)
rF
-Trlenr
fl:*
'.
yr+,^u,*
tnV")*
, ?*
W^
Qi'\^''1no^"JJ
H:[- **r;A ,*':^::(3"a''a"
'b 4rr
',1-,,
c
, ,,^r,
*{*
rr
r
t6)-[re'*'
rjY$^"l
T''e- *t*
rF
.;:- ?3 #";:f;,!rfr
a"^,.'i"*o*'s*f
{ '^4.-*P'.'.,u0
#'-w'
t
FAv
OU&
A4L€
LEvtL oF
Rosro"l
2oo,
(,
9oa,l
L+)
H,t ? *B,l ss*t-
lfrEv AV
voLtAr.ltc
o,ooo?-
f-a6toxlkl-
f,oclCJ
6Nvr AohlM6^.|1
65
300 |
, o.ol
6" oool
)
(
SvQa Esl s
PA 8'lssAL P'Ecto"lat-
,A;ffirrtqt
H;
mr,,^J"a;{;#^,
Er.."tv lP'o"'|MFIJT
f,*vlAonlq€"lT'
I
0o,
o'
ooAaol
(,
2,0'oooool
Po u1 Pt1'tg-tTlc
F{,.hle- To-M@lut4
6 R*A'isl stze
i
I
l
i
I
I
1*rvLE
Nh^t 1'.* ?gosPectuA
'l.llr+
M 't
s ysQ,^*
by rb-
o
u^/^-b
ALcow'
cr\u '^*
o
J
[^
sl"rJ"
n,
*\-ffi
** r&n*"*o
fa, *"y
. ".r: t
tT
tr
tlt*
Tq;*i'-y*
fLsL'd' tL"r'
tLt
I
Aw't/'PL-tor*-
tf*
n,lr^,' ;*rl*r
)uv\-vtv
fudfu+
t'fuf
e ?Losyt.to{'f ,;;fiJ
{
sk^ tl
th"
/-uI"'^'
"d
/v^L
1^t^-4rL uor"6
I
^
,
^,^"t
"k
).'t,,^.r,u
diu^'r'uu't
T';*-h T*n
'
'^^ry#
- frt- N"A:"t
a^,h'l
J""*'v ,ri^-- ^tr*ffi
ffi*
l-r"*
H
u" ^- f
T^;
"& ^#stu**
fu,
s,t.,r'* An% t"y:;3^**#
r#w*T
u': -;
'1r*a;a),* M
*^^ti
?e.ospecroR.
-"-
.
.xi,*to^"a
i
tt^,
"r*;-'-'^i;z^t;
\o fl*'
we''trL
bL
Y
^^J'
k
u:hxu:kn"t-'*
t''tul't
'v'nt
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Scanned by CamScanner
Ur..l
Tg
c H r'i lQue
Kxloxl lrD4€
OF
s
lr * lT
?.gt
R€
sg*\T Rrr oxl :
g519rrt.€D( €
KNo^, LeDq€
Kr..t'oD LeD(l€
(EP
?-ePR'tst*lzRrto^l
R-€
ss*rR-rto*l
0sr-16
ual",q
R-ut-gs
rS
se naRn{rrt Ne
RgpR€sEFlTATto"{
K'.ro"lue>46
P
\!y- ?"',r,
o)" rWT'"
Lt''
(3)
sYitt
T
R.,.1,
t*^
g,r"
o^-a-
I
txa^' 6
'
tuN a"il'
*^;;.;, (sLP"
ur*l^,
,
acet'c aud
,-
"
t
^
ot*L TggrJ
^ .t_ ttr ot*L
,^*u
T*rr",,:
,^:*
,fry
Lr^L
"6-
:tr
sftue/"
J"'^^" o',:,
-:**:r;
tf)',r,,,
9L
*^L T^.- '['t .,
{J
^l- e
rwpfp'^ta'L
syitt
tt-
,*^
'
sh^Y*:
lr'Tne*
k1;"t
a{o'*'^^bb
(') -)fi
Llut''^'""r
t?'
fL'M
(z)
e*f
^'^L
*
sYoJiuw'ila'
9k t^,. 7n "k'
Usr^16' Rules:
*fr
'k ry-Ya't'zsecr
.",.,'':*Jo/i^'
"f"r-
o-
d^^"6*,
7-e? P-e se^l7A-Tlo h{
USt Ft6 trR\^^€S
-
?
*)
't
,,1,,*.3 ;r''
t^' pi tL 'notu**'
tr"'
"P":, o'uL
'f
&. tuJ'- bood **1, ^'l''^ '
n ,\,n-:
"+dr*i
c^^N^f
L
<
fu L'"^^;
's
Knot>)'f
*ry^^;'X
--;nrl rY
stl^oh'o^
@
lF f *t:;,^s ^t
A A^L @^'f,'t
*'F tF /'s\t;*
w^J" s traa''J-* fu- /.J* 'Ln
ut."t^^l)
N
tuJ-
r-fL il'- Lrb''fr
rr^otuL'
SA'o-n :
M
il^t- [ocft
f,I'-
U
F acrs
rrrlon
M Rr
cr-t
Ex ecoTe
)
lr r-?q
D
Rulrs
Tt."
w^a"tled6*
L* t^*
--t-
)*l.J
7*;
^
a-cA'L$*
I a-s<-
A (.^*"^tl:
h)M Sf i tt2'l
b
n'
U
lF,,*r$,"
tk"".
6
.tt
tk
A<L % b^tr"
i
d^ct o't 5l-o^'n
(nb.'t
^-
0
SFitt sr".lls
Ca u*d'n
71'u-
gp;
ll
t"ofJ'*t
i5
a,r"- a.dct
'
F,i
*r
€*ecurc
9L
Gi!
n""J
6rCtL'
TU *sn L^,It
I
b<'
utJD
^JJ"L
t f^
t" t*
ft^-atd's'
a'tz cA/^-'
,,L1'jL ' fr" lF ffu
Kr^oo t,."LtL
b
ot sLo":
ol
ilI
x-p;"ll'
Loo"i
s
?\
1,1i,*'l
tld
53lt sta{ls
ff-j"tr
(;v.u*d*
TL sfill
l.,,&i"t
er
7l..
sp;tt
'rnotJ,J tt
a^ ac..cl a-c-lic
acid-
Ne-.^"
ffi
tr
f,,. ?tl '( t", s1;tt
{u* 6, fi^, ipitt
hlu,^-r"i',''
^J.J^L
L at<,
*'-
'r'it,i
ts a*v a-crd r
Sr-le ilr
t l<c nry* ,
eAL
€*EcoT€
L"tf
?*:L-
aA
L+
Tt
atfe
4
tL* ArrX
A
'6tt'^"
Tsz pu
^ftl-
coTe
,
F
L^* a"y**u"tt
rr
cJlzJ-
kG*,^Jl-
fl*
L
lF
-Tx, v^"td-Z
t'\*;''"r
$ ^^1"' TL ;"-t^L^cL
'.:;,:
sho';ns
^;tr--'
"'f-'
exlwd
At-t,,J^,L i lS
leat lh^^ (,
C"u.cl
s's
t ms
(a'.^' Au J"|GT'L
Alvu
Is
^.^d
rr+m6
rr
Lr*
sh-"*
spi tl
,-"+rtLL
il
d7
^
It-
s1;
tu't'
a''"-d' 3
,;c'V^'xf&*
/L"'-'' fr'-
G t^o' **n' E )-'t
1L^-
,r: ,f#
,!-",- n^* ,Ttu ,^,.t t^-d tA' s7;U "n^tn*;"tr-^
cil a"'b Z
gn
;**i^rh
/t^1^ fr ^^Y tj^' ^n
tYffi i*'*^c'
l[ !f,,,'#
@
(rlr. -ry*
t1^- sPiU
Ere
1r,^J'^^rrV**- S hc cpzs ivt-
A^
r^%
6
sfi{lol , c^Ll-
[,
#*' ^v
Spill snalts
%
"(-*, tj*^-
'
3h a-
Y
w oa-{-l
sbitlal
CA.*
"Y,*,
abtr;4* t^X.^-
nra"lls
'*t"*
a.c*Ai
a5l
TL,.-A^n-
L
e^ted",
A-!-
w l^^il-
1'$v
@
L4,r*. L
1,., ,5"
g"llf.r,'*- '
t
,t.
\
Lq
Po
^,t
"/\
fur*A{_D
bfi
C*lhl h-tt'\iq
CtlarN
^"L
At^L
h*^',,7
3rL
:
"tu
'a,\,(- *n^tu&*PL
N\til,)- Lnrtt
trAcrs
0
ct<-r^,
n-<l
rNq
l^hn^r-
atu
th^4fr^sL n:l,qru
0
d^*' t'
LdbLk"L
0
3:L
--TFncts
trftcts
F ACTS
AE
A
E
6c
rh
(n
b
..f,4
?H
9 LF
cB
D
'b
T
e.tc,A,
Fug
F Lts-+
--*-+7
Z
Cs.b-)F
n--+)
Cr D *1 F
A--+ D
eLD-+p
A-+ ?
Bv
Tt.,-
\
qcB H
,,3
I t*r* ;
Tl*-
/")- w+ ltffi'trf B --) 7 v^z-^/vr
6erti^, 3; +*- ^1.'^- tr
Sil.^^-tr'o*- Z
Krro
c^-t'u
h sfu*"L k"
D
a'"L Si*"J^' 6
tEs
sifi^ nh'^s
w
'"^1rt
'qnish
ex i<fs
toh sat "l j"'U
k"ro.,.,h
ar
,l^li'b
a,n--
'
"
E"oL
&"t*
ot"
&- seh ,fi
l-.
V+^t,
A^i& i)
tL"t
AA
fr"-
J-
-t^
lul,al
w
-1,vqafekt
!
@
t*-
,Lr
t,*r ) is
e\ec*t1-d on
ruI,
Th" "--l* A->
€X e c"Jad.
0
if ,J.T ,r""ttk tL &*tuL *u"
h^L th"t f* L A --> b b e.*^z' A
Tt *.- f*, t
0
n- aexiglc'x{'u- ewitL,
Ail"Jrt ft
4<rI
b
^,v
t
o
ce-
ry
8,,v-
L"r
'-,,/i+ '
th- d-of- L*" ' As
L'w
\'
^i^; ,0,
t ! a*L -D ' .r' fl^-c'J- ;
i'^k^t*J"'
Lr
d D
DI
TLUs LaAlrLJ tf.,
0r N Ara*lt
J'tt* L atz
TU, L* f'""^'
,' ]*
l-1.)*
.tL^*;^,
'
D
{
u
I
I
Szt-u.',-o1
'
th-
aLal"J^^1.
k
-1
t *,.1- C l' b F
F-
q'^L
F' u *f
/"tl
.7-'* tt"'
:'^
,Y^,,,*
Lat'"
Z
t1^-
tre E*+ 7
+
tn
L 6re-'
''r^
L
):t'l*.^-7*'
1L;s
;
a'^/-
tt
L"au:-
ft\.]t "T:,*
seonJ
+-'
bur,^^A. b^AiKf;-' tj^*
; f**4 ' L'1"' tl*u a'*L P' "is ok,'u L^i-'^
't'
L" H'('
t)*'
,I*.
t'H s' t d'ni'n-Y*
vtLr
-itr::
cw ff*d*''L
tvLt- -s1stor^'
oYt'vut'R.t{ s.
TLL
TLL
,'
t,
'R
"'P*'-'
lt[,,.
f^, 't
,"Y
5c tu"t'-" 7
I
;*YT*
+I,*
L
0
.",.1 t
Jt*
^*WtD'
L^*
u
" P^-
a) ska*n '
a
l.
e4 u"L'l- ar
)*,'rf
'F' a,^^L
AJ )-_l--n
.-l--"'1--=
Bl
ai't{x"fr)t
@
frr.^:^ d,
t, "t^v witi' 'Z''
'
^"-A- 0,
A
4-f
/'/\'a'
't
t'fe^*
fr-k^*'
a^il, st to-^t"" cA+dj' L+ oln:": a
'Z' S"
u.w'*l-at*J
fu
Ltt
uJ;e*
4 *
L,oe*t'Z'
@
0v*- p-,r,t )^-* t" b+ f"l^'-"/ Lft
'
a-J
L^^tJ w otfr btt'- t;-^)o ;^'-L
ck";-
0
e
: 3l: no .v\^-,v\'L Cns( - tf"tr^ tA'*
Lq
C-k^";** , 3f ,<-s 0,"- l-^l-t^- *"'fr"r{",
{"""",,^l_
DOU,-f
k o';u*'h tt f*n'
t\t s1st",^' sf^A'd wkL "utr'nt'
ueu't*
f
,,o*'* z z*isb a'^L \
e L. fAfr
--T
b o:tfu: ,;rJ" (Aa***",A
wl",t
A^')-
*t"n}t% 'f q:
1s1""* 'lLA tA^ t-
l-J^"t' a^'- l'L'ru'X h
I
,qr sW
f
uL.bhrL 'fr
tt.
iil^-r''* l'z e^is1s )t' Pn
c't'z'k'*
Pl*'* Lh-f tT' '
a^L
Z
bua
tr't,
",1-* z
t*
fL,J (,sn cl.,Je Z' i.e- t"L,
seo._Jo.,
t*
oJ h^' ah^'&lp- )' tr"'-'L
EiL
g\. f,r., fuq*z a-J !*tU Pt''"r trt "L'f e"tJl;'t
BL
n
'z'
/-,L'd'ile
,
'
','
,
^
'
F, a^L B'
L,w
p^l'* t
t^tlnL"
s1fi** k*" G
'
uztobtisL o'
a-
'
g, tff*-L ' t)'' l'frh ,***. *J frk* fu
^"^!'
v'
c.l,rck'ry
'
cLE-;l: 'fu
{ t;t F",^'* '"oi^t/'L
fru
It^_t
'W
'* 'ffi "^L'c" ar t
TW
i
S quS
F+crs
Sttf
sn1'
I
SGf
L-,*
Nur€
q.[r-
N*i6
s
Gic
q*
Lc-
)P,
D
trL B-'' Z
C&)-t F
tr
-)
-l
.a-+ D
RUL€s
Rut-es
{v t*s
Fac-a
F*<-ts
Fnus
tYt
sv+\
,
ef:*
qc
B
l*"r
h^.*
t^J^-A D
N&i 6
qlr'o'
g*
tr
gxL-+Z
C ('D+
D-->F
6
A-4)
h-4 >
A-t )
P.u
res
P-V L€S
R-ut-as
T-14
Facrs
Ffi(75
C(S
56+ +
l.
brecn*-
f{a*
l-{a.,e
Fs6--+z
c R)-+{"
A-+D
( ur,es
A
€rea*
8" E --> '.Z
FLb-+z
c&D-4
t
LJ^-
LJa'A Z
(,-=*
@
{:y1crs
B-+2
c4 b-+ F
F- &
A-+D
Ru t-€s
FL t3-->z
LL>"4F
A'--+
)
R..r..g5
9'
fr*
d-Jub
sGhs
L^
I
U^rw'
I
au b"r dp;,l@
(-,^/v-
"k
s
C^^J
,
,"*,
9r
D
^*
tu 'lr* p, 'c, P
'rnqat e-ata-LlisL A'
{
tk^ W
uA' ; tL
b uLon,
o(A^r^
6 tLv'n' 8, tl^t Sy;fir.- ex"c*&t fl--tl':'J
fr'' etfod ;sL
e^e otu f,L 4r"^l' ')'
t'h^'
^"1,
hrL t- utnLlisL
-to e"t^Ll';t L ft"L.
J'-^tt
n*b
tu
tr a",tl- f -'h exec'du
*f^J
, z'
3t' qt
I
,
t-,
t
0
fJ
K
ilo vJl-E,y're Kg
Pqts€N-rArlon'l
ir NN
**^nf,"'wI 'wI iJ
U
srx4 9"t*"l rrc
m*v*F
V'*o"cle'ficV'*a"clt*c-
\*"n,1'tat"''e'"
,",Y :{nl*y
"b
^nf^^x
^L"- a/la
,
,f^ ).
Aiers
"
U
v
b;;\"L.^r*.
uffi"
1 ' ou*t^ . TI-,
T-J ;ry*'*;*'";;o ;,,,^!*:' :f :rr-ff*
"
"
r.,re.L
Tl.r
f"n^'I't*
sl
L*s.i.r^.
t
fi*
t"?
a-t"tt
^
ry,X;:*
^,^
Th. &*-1t
d'-ottx*nu^{
sL'^':
tt't*o'n""
sYd6
r^"""J;
Mn^"4 1l
A-^'
OLanzw
t"9^ Lc" ,Lf
k'n",t'
t/
ct-s s[tou,-t
i
I '"r r-K]
fl* ^"L
sI't'^"r'
0'- fL^L 't h*
I
t^rt- cA,v\. ;k*
b a'
" Th" *-,*ffi*6
(
,
.-
nl""t
,*LrLr*
i"r
y'er -
Ye
rJy.'
a,^L &1,"^"
ry, .,,. tr* fr* *"t
;
'
e'**l'%',
,'w
'rv'otnto'l-
S"^'frn M"*) 't^"*' L'"^!-fT' x'"u--t'- f- 4**, or
a^L ft<;f;a"t
ofe
't* '
U*, a,,e u4L ^'\^)' ^Jb&.<u. t^" ly:*'
.^A^t**
t^Ja^^l' fuy
,a
Tr,
a.J- (trt) A','so
-a
rur,1
a4
(s^L
(Grve) a^L il-- ^*ft"
m-Y*u'i:se
a.
Krqor^rle
D{e
F,o-o*,
kepg'esur'trA-rtoxl
Sil-,^^d'.ns
"
ot1wiueL i* a- ,I;tt*^t\"
u^*Yf" o-'d'
*
W
\**
,?"rf" t"l*t,,^,- $
u,n
Fzu^'res
i,
.fr .\*t#ft
-f" t* a- ,sfe;J)t ry
Ls G-
er*-1ls o*J.
,t l"-t
Us'*q
,tt1crk
tb*
C-^^*
tt^os"
c-r"".'nc.
o"'rl
t _, ,1 o"d"r
f,"y"^ost
,
)ou"o 'w^JTh- c"^'"ft *
"nn-|*o"'K
6[cte *"
t;
'^4 cjLi+sLt'w i
L* \*U
Ke a uruT
TE.rtn tr rRu
(e P o<r
Reeoq-i
R.e PoR.-r
4
uli;U J.-' (u A rrrav,!
tn - s.,"n-ti : ;aL, S- "iJ)
3
*\.tr
. o'"L sl"*
E
2l-.
a.f-;a^*."
* fl,ns.
, wl,'';. dI" afu;br*:" a^-L ct-l.M
, su)" w^L
co'w A^"t y't^ctA^""' ( ^*'ry
t" i*' rul-& ahCs-lb,&,\" t^de) ctl^cLJ-
e- *Y^,^*
irw
E^.L l"t
i^*
^- ,(""*b *L . 'Tt*. +\,". fuf* t
L^) gl - "aA"L ?*"J** : A eu^fa
s
tk
uuluu t& tL
fr^- il't [ fl'
cc
-t ; t.Jd- sl"t'
(^n
.
Jl
6-
.rLn,-
f^^
(y:u)e
t'rct
e*(c^^hL
'h
wl'u'^'
afu';b'"b)
rtJ^^^"r &aJ*-L
aJ*^rL"l"
6 s i.t
^ I
-J-'
/Ly\*v\*A^)-a4^/J
A
U
d&-
:
tb)
(",
9b'
J*'L't'* t-* *r*
9L
h
r:
a**^"<L ?'x^d.
slot
E
alrr'tu
Er.
[o-I
,b ^Y** t" f'r^'
"*rcqn"L o'l*"* b
"t"
^^'-
ffa.t.-,* oLu* tl*
;'"fY\kA"
1%
A
noJe
#.
s
CoilcerT
v ALU€
I
lob
, ^n"^t
tNKu^- ,r;
,"J"#
fi
Y ;.*
?*fu
a^)"
AA-
/'s
,wrh.r;Ly^ rtA-
'v;od<
Y^*^
,L)
@
L4
*^^n'* L
U
U"f-r^L
t^'+14**
sleu-L
L^/11lt^t
;^r&t
':l,r__
b&
c-A,1^-
?^*cd^^'r
F*^, tltfu
L,"^. i^-h"*r^h"*
U
tt'l-
*^" ilr+' ,
attT''
ro
'
- ^JlArL Q'r^*j-.:
vruA"^L
"rt
5L "'- l
"^f
|tl
a-t*6*-rtw-.u*
l.L/.^L- fl^"*
v*J,tet ,,*7-
'
ol-oy,to,.trt *'L"^-
frg-
ol.tu
s"1u**,6
SueL
$
a,s
0f
NrruR€
E^Penr SYs-re,q
t-s :
sysl-cr- Guls a^i- *T'^'"^'"1
f
r*
;oruyo-fu.,'I
+ c."sl't^&i
e^p
-l-oo
ctn' n* "t
s1sle
(Y^'*1 r*rf
.bal,t ;,
' Jk" e*faf
Jst,"^
t
uol'
'u^w '*-f*:
0
Expe Rr
Slsrev
T ooLJ
PlLo cKAMur,rlq
LA*q,ro q tt
S.,
"*l* -
"nl.^^P,,.,| ^+,
r*,
k-r.towU?o(6
Ei..l(
r
L*"lq
{Ce(ril9
clnq es
Kvto,^tl*)-62
\r*stli*
( uPPoRt
?n^F^r^dZ
"'
sirfr-. fl,"* st' fUfu fi'Tu.tr
*f
fu j-,u
" ^
"-
ail- "L";&L
",tr
h^
*Jl" z^y*
,
;^t* f*
n*
T',\
t*"h''t
a^d
Bn,ft";^i" M-tr r;^, brr-','*
tL
Lb)
il;u
I Th" ti fu - L'" Qd"-A
G)
y^, :1'--: tr
@{^il
;' J^r
?"":'':[
#*TY#,r^(f
U;T fL' ""Y* 'f*
Lo,,,s,a,
,fr
t-
Ail+
uld'*n '+
d* t'^'v *-fft ;
"TI^r" a^'"6
1ko"
Lq
t
Dzz"i.*
LWe
t"^Ku'
- ;"Ls : TL..: so/ h'r ^'r' "fA 'Llf' fu" /'"u*hly
ffir;6^Ac',e
n
i
a*,1
sy(e+"-
' built n*f* ,syfo-""
I Acg f'na;Ju fi* &z+ '-'fx
N
:P
*' ^4,
".;::
*ff*
r^rL"L ,b o.' e,LL"Ji,^, I t $r.i^L.SP f" 'rt*t
cl'")^g
';";l W
a,'-
exl
e,tr
sysf-,.-t*
;-
1",^
-f^.L ;
,
Th.
!-ur.r,- b.l-ncLboonL "rUY"a t,
rtse"L
,f
T
a, pr',rfr'L oit* bo, @
*! ,,!: ,f^-^
A^1"Ir L^LL"s" Lnovr't',.ag- eu*r
c,,;J;^^L a,^r-
"f*f'
4 'J'4"^J"*
t
'i1. Y-^'ra*LLorc .su^M) k""'',n*:h b *'3 v<'ay
t*t
*'T^,.ryr*"T,,
a'^j"
Liotv-bu^J
o- fr^D
(no':l'V
'
r" )T, j- j;:_'".::^*^,u^Y,r^/Y+
L^r,,';"tqL
lvr'<A'tt"d'
t\'"* P*r"
€n'Lrnv Atf'
Lt)
^"
^
^Tf:
ts'^r,.o*ic^h|* lff*'
rL^o,u1w ol*r;ho*
)*i_t/ n**g& @
a*du
i
-rLs
f*
yt-- - t,^-rr,^6 u
o
a- lt""*i^' e*f'* 'G
a-
s!\,t
b*
llt\Estas
K*o,uv
%
ry*)|**
^.Lur*il\a'urA'}.!'*uL"dtt*'fM^&'e}v\a^/ra'
*
n^Y:o^*T*uff;':::ft'
*r,,*un ;;', :^Y* ^"Mr': ^9#'7
tri"^'^*tj"t'u^ztt"^Lt'n'aiafr'7a'v/tAttftL
a- t"*4 r ".P^7
fr^-"*- . ..'l KEE rnE
t a<,1
*iv
^a
*cu.r;Aeol.;,*Lnool"-yat1ws,ii*CrnL'"dJ.ab*"
YrV-inteunA'"/lCQ''
Flctt-irr€s ;
Su P PoR'T
t+)
t*rs
t'*Jo
7h" *^y7o*
tk *f!:":
'
ton
d"c,
f-,.,'.
I
S
@
Tr tf&","-"*^":::
Q'ha
kr
Ptn'/.r**wk
t-oolJ
n:h
Mcnu-g
-*-
l;
L'v,s;st
usLt]tgT
T*f":V
f"
''W
{",,
PLh
o'nL Lns*l''{"
^:;''
e,,A^u
.oi
tePe
;*7'*
,*
I
a) b;t& -
'l
{-*;*U t
/r^uY
U
)
YJ I e-l.*
^L'ui,*r5
rripur
l0,neur
FAciuitr<
?'-"n- t;,'^"
A"J;^+'J
tra-d"e.
Kn.ol.f-
To ou
Su P PoRT
altc"siii"",
FtttvrRoNuEnlT
A.n-+o*J<:
boorrcql;7
?))Yrvut"v
-
Jt r,7
Expt_A"r ATronl
FAO LrTieS
k*NonttE)QE
BnSe E>rroR-S
K;"*lrl7^
Ct*islr^"*^
c!*.4
€xtra
r-h'a,-
U
,*fto* t l;ti' c-s dfo t'i q f*
f I Th"s* c"nsst t{ ?
bet^,W* hZd.s
ti )
a
^* k^dfrla
0A-
aul%
i
1 n,n-T
Ag.')owr*
*r*t7
-T1^-
Lt
C^^-t-t "tt*^L
H64'1rdc"l
fa^v;d':
Wu + t'nL'"
th*
tlrS ' "i-^^lt'* \'
y'^aL- @ith' a-
Lt'3
t tF a'L A^]f^t "-t
[ot ^^^\^bu,t
o[
sulln"iinpt
/'^LX]d"
tt^'
f,^u
/v\-J^/tv\4)
sl"o**'U fr^" 'v\-o'w'Pr
tfu'-n tA'
r.necl-^ruir*
(ii) Ba"-* far*'d* t 3"t L
P
^fu*r
sty 9u
e., fu"f
wl'*n* t" st-Y
?"-l+*
t*t"
va-+;-a-Llet
va-'"La-Llet of tLJ
vulnu '*
pxn+^)rtzfr*' vuluu
7*"^t
€xa+*)Ye fl'i
i) hu+o,^tz,t TutiV i 3t l,fu tt-- wu, o^k, t;J-\- Grt oU
@
"
ow
t*f'*
h
tr-
tu
&
!^^A"
.n*^j", t
'',a,'.L f*t l. * s
bA- i"".*sis|,euuu /'h- fr"- sslutt'^s'
trr'ucrv<'t
DLW^'* t*4' d,!-l- uitj- fla;
-rty
f*vile
Lb) afo Fa";L,h-:
*6^"^* *T
^. K"'*l'Jf Pfli*'tiko' i
t-tL ,fu,lt Itt fk- A*t<*
eA!
MT "^f"'e 7t'*'
'
"
f .'u,-- t
lrLha-.\-
t,)
H
eno
v,*e 1 l.qr,\Lgv,N;
/-r* fr^frh-
C-s^-v<AJL
EM1c11..1
ry"eJ'A ut-;"o*^'t';
to'
frL- knoat"/AA bet"'
;b ^^^
M tntts ;
f*r"*
wh.4ayr,,
alK fr^'
ry*h
t;"r"
t* A''12'*' (-*
tt'
ftt^vilz'
)^Y,*^t| ''^"1 "U^*
ltty"ate|
t
i+4
urkr,a*1* vo lt,-n tQa*J *^[ot^"t) e4 u'- zr,pe'tk
t^sa^. L
s7
(iiD
0
nncL
b
sft'*
I|e,^us
A'*^f
'
: k olLo, tA- erful s7st^
t'' ft^a;tsv a^/ u't^,(. tA** fr" wlJL iL ; A,<w,*V.
e'A .ik
w'tiffi* ; ^^rt""L
L""ff t'"
Ros tE /'cn
sf ,tt"l^,-n*Js rtf^t Ltk A- Kasle etf"-t* t/t^
f,",1x
;k
(.)
R-A,'u
t-
L
^ arLhL
fr"- X,"^!-
Nuu" L
&Pi"n't
Ak
LLt e'\
f*
ow tl*
'7s6'.-
lyto-",
I
tru l;li*.: Al^"lt ei-!,
6 ure^r ,k^- t\"r
A*n.l-
ztf a,k
r^J"^
t*
d-t
4
systt^t c-^ efl;
'c-hclwivns
' Tt^"* a'v
eat;"t it-"to^i^t t9t "r I l-^-;' ,1"".* fr,*- s1st"'.* @
/"r.
-rkr- L*ilL
rL t"
' 3+
ef"f"
A-rAui"aJ- & 1"*"'1"*
,^T
f,L- a-uL^{.)L a "bnu
TeL ansf
Lno,,
,
t\ tk* tlfr*
- 6;5bA
iL ft
Hrt,Mt! @7":
Af,M
b
U
ii)
fr^- sfr"* Uq;';'n'L
s7
/"".*
e^-
1".*t
o&&
tu^tl$l'*"
U^It**
t'i)
^-ul.ttL'
L*'
U^L}'^ru** BaJ ^"*
I t r-
+ y*""t'*' P&
,
uoawLL
+qla*ns u'Lot
I
a-
&{F'"^r'
*,*
9, {n-
Tt"-'
A{
04'
Tk- sTst ^, €+u*
/,"-.
L"!* ,!^tL
*V
aA^' e*f e<'t"A
1"'a^i*nl'
fuA
t[) f*-[r*" M* Ee'* 2 t4 ost uF. h
s1sf***
?.*"'b
l'^'*l,"LX*.' baae' Tfu""' /r
tk
N *'h'-oir,* ** .fit;ft
u
J''h
f,tn ,it* fu '*LWb /'^!"""/^-@-J
tL';
i,.1ud'
rk{
tA
g";'Lt''
A-"^J"
by
f*
(L st.*t^^J,
tf
)
(,i)
Su-fJ"
aL
q'awi A-ot'Y*t'fr :
Aot"-
*t"
booKK*f?
: Th* ""LitA, ,w.";t44' t]^-- %"
'r^t[t \ tl^- v4w 0'^L Ar-c^s L fuAhNif ^^f^*
u,h*rt tb* o)'<,nf ' q' Euvc inl eLt *r'
S)*t^x
re
clecU^fr
: Tl.{ eLt.n vsez (nou.L-{aa
aL"rd"
fu-
-U^* etie"'X tlh-^ /J"r*
.*
f-T
tr^*,^^t.,-{.
"
I o fr'*
ba!)v /'l'k
/*+'k Aol- 'rl^tf fi"-' fr-e\Ni. .eb.!.X/;
^ tra'uu
tti A"U
^r'%
stru^
n0
(ifi)
0.
+1^
A^L J"^"^e '
L^a;fi^^V c,l*.f-
:
*l*h-
s1
|fi,,*
cl* rlz fr'u
s'eanor,lr'-
I
d."L n*T a,^t"^"L
"&
^"*A
*"*tL* wifr- erisL", K-,^""/"-b"_
t' Au- '4 fua
t-- t)* s'1st".^' , k) k4"r- e- c-r"#e oCc.LtyJ tl^.
ot
<-d*tn".
Qnfbl
L^^I-
A*ts t-k"
I
L.L.se,*
wl,,& cn*rd
y',uoiv* tI* rr,ilLcf
*
it e^A eletr,t bf^+
tiu)
oa
L'j,fi' e*t^^LI;* : 1A e6tn fuf, fr*- u-)uv@
QAJQ-
sv{tt'^, JL tan''Li"eo
fu'/;tl=woh4
'*t^t
| * ulL sk a,t.^0
,,
I ur
Jt
'
cl'-p
ck-/^t
u^si'b'^iU
a^^L
Q
1^f^n
-{*
Sjstt
"k;"u
O:l tv^r^t
o
tn', '^tL
d
^^[
/-* t*
nt*+Y
use"\a'
^-
ueslT
Dev EtoQ
THE
S rRq es
D
F;l>ePJ (1sreM
f
CoumeKoat
(YsrEna
R.Esen<cit
E^PERTH€N-TA
S1s
I
Toot-s
e-+'t
51sreu
U v.tesYzf
n*y d" t+P^,*,j:
,
vrsu,ffli".tr,
sfecr"!- ?311:
,ltot, in"Kt"O
\u
Ev"\*r.i""
E-r^;,-,{^r 1sr"-
Lt
*_*ell"t
L-oYwwtr'u"
t1"*
du'"1"1
'::f.,r'j:ff*=l*
b 'r;
tS:F *^r,r"ffi^'
-
f,err- tJ
Lt
slo*
^^y'i." t"orr a.,\L-
;-;
:,
Ct"it on
?ill*t
v)
'
S'r*"-*
,l.t
-Tl.,
t"rt,
svsfn.^
'h'xt s)'
" - f"l'
,
efttu<'tr
I
?"lu"r'.L
E^p.rr-.r;f"1
,
Stat"r,L*-1",
*,!".U"r'^"t"
lA-1 :
t^^, U? sl.,o , 'i.^t6;C*t
U
tt)
Pol)sL',nt,
S,*ypr^t.L
1u+t,
^.,
s*'r'L' '
t-fi
use
o"'l
;'W"'rt
,
-*:
;:
. ^W*L\*fTJ"I-tu
lf.r.,!ru,:'.,il**u
*r
ri "[$ TTi,#:, :#Try
.'^,i5.ql::iJ
G",.*".""".* >'1sK^.
T\ue
"'--
s1 yt-o-+*- I
toois
R.Pn .^t,.t,o'u
Ex?^".r.t
rt
R.u_[.
a-J
siz-*
l
?t
Mefi^^& ('^1f ",*,L
^o
To \s :
"
* .,t^t * t*
?if .'^ {" -"^' 04- bacr-,t"'L
* busr$
Us<t lF-
EMyci^l
Tne
u.K**Z.
(r)
r"*-
F
a,(d' 1,*
a'd'
ffiJ'-,*$
Ca) ?**Auu"-
0t
i
-
"cr
Jer^a"t*- n'cr'
onrcdt
*6*:
o,'d
L"tr"
(rt,*L
't+--'s c^llul
L}.-,
oat-<,Jcd"
tLd
-
&'f""^*'
L rs?
Yff'*
"
(;'wv..vtt-<'t
n "L
o'v\.l- o"-otJno^
tt
SRL
,
Us"r nt.ztJ soi,.tnt^-'h
€ Xec-**r aw
t',)
f
*j""J
L"-^"rJ"",
f-""
j-l".t,Ja^u
i*u
Us"z
bou,.J
vi^-
SVIALL.TAL K
"\'ls
witt
YY\4SST
l*l* t
ffisLo
u
slu^tL f,^, 1*f^^_
cf^".LtS"
Us
bas'L
6^
z*"t ho-"a^L f,
Usu 1&- ld"e' t^'61*
r*Atv k"J,,t"L,fu *L"e^'
&,t"- "'* W
6
'
t)
A..ur"
-
o Me"f,eJ,
LOo?s
Aj-L"
, S'*^'t'i
R."1q2
.B
G)
.["
t-*a
?
*A^t^I-
^"
p""f
u:
0-,.^-d F,.ot r-
NI€-ts
bV ry* '",f-fi'; ar\''
t
${etkoJr
onrr-^fc'L
-l ,'.- f)^^rt
Att*
|
*6.*-'? T ^A*;"
pAt
fh'
c+lL
l,*,*),^^D)
TK
Q/tolno.-rt rw-ru
^4
s
Ln*ry"tw
1.'!fjL^AJ
u*-a'"t'-L *"b a^d-
: Tl..et" ,^.a&*d-r
'Clt.l-l
/,vtctt-L--il eJ
la
:
use
S*Ln:,t*r'-
a^,+n"X; A'* lJu,_
I*T** t, %**
f^^
J"1","" a- st q )^yL
-f .-" /"'J'h'
b
-tr^ jbA.otr,o^^- "sh*lf, t"k tu^d. w ntha&.o"1
CA/'u
tL
T*T*,*
d&^i
!;
6-
uil;$
t-*
/*rak,"t
A
Juu"oo*
MBsnqe
--J
b't^lt\*L'
lfu*'l"ru
*7
t-fi\e$-L
^,1"-"- t
B
e
6
? .t,"c*'L"ut
lf la"na'tr'a-
/vY\ e4)-
4^o'iL
'*kfo
-.R.
c"'r"^^,-* ,
uW
fr,
f"rrr,,rl^fe
**'' a* ,"a41 t'
*'T
,.f a'*L
h
' 'y'i-A'^'^
n"tr^f:* f*'3
'f.a[
ob6.1s o'uJ-
^^t
trwtrlrf,eJ-
v\<fl'*)'t'
Lu'L
GE"'
L5)
tt r^'d^'lEocL d^*
ry'
o^*u,
Jo^'l'*
fl'"'
'
;uu;T "t' il- su*** t" *'
/'r-lfr^'b /^44- f^'J-"f- ry'
ctJsu
I""
@
oLc'
tlo'"''
[t"l*k"'
t*
t
"b ^:
X?1-'^-
Lsnso,*t:*o"*"*s'*-t'^^ln')'ot-zao*"*J"^t-n
*t
u,3"*Le.t'
,* f*o*
ffir"^f rt'* W
* {"**":f3*r.:tr'
*'ffi ffi,,:ff^::J;WqY
,*;b-t i
[-Tr(f:
"'f:"i
H
tuffn ^tr
^t
o-L,.-
%.q
v- '*'fa"
'
dn*tt
/*
9'^-
b 'F^o
a^
^*^Jt
ff*t) ,iq;lty *r)* V \'*,1*^
b, fi'L , P"
elo^"t''''
Se"'to[l2n-ouq , fu
Mk'
b"d ^W ,{f-'"i''
A,r*-.ko.is,*
'"^xo, '
,fr^,
s'yu'r','*'lJ*
'o'-d- uK-* 4L'*'
?,.ouoG 1^^.'u
il'e';-L &'t* Lot" f:r'u|st. l.'*"-"il ,l*&
*afr^fu
fka.
1
[6)
hct,o.
ottlo',,fi)-
r^tr]^^uA,-,'
y
r''"^
o{ &, 'f"
;t"t f*T' ^
-/*btu^z r',,,,u&.L
/jK*
J*',*o , 7u J":.on^L-*' 1i*" /w.fu^'A)
tnt,',*,L
s^6i*
orrrzd
{t
v
oai
vorutt
(i'*"r- a"PIv
f"
r, ,p^,&rJ^-
,(rrrro
acL
h;;* "F[ 1'"'l
*t";
&
^;
*J:'
M
ffi
#tr:W^-{:::'ftW:#;
^l*T*
tt*
0
-
;!.ilI,I;
"
OA
v
aajoLlca
,fr
Loo?J
YW \
(D
Ex
S
f*l ^,,.f^f )st-t
;
E^1"-
^r-f..[
s.sfn*^s exisf
@
aa
-tr*ry W 'b,.*tl,
1'f*:,t^,9
_*t'
+
"n,u
t"
,l"Ap
y
Tt, # ,.y,-&^"*"t" ff;-
K,,uoor
L**frwt ;e *Y
L^)
f
e*1'f, tyf'*"
a,J's
^A-L
^7o6er e^ L Srrr'
Rocer :
'ex|'-t d"si6^- a- K^o- I(JV* baz"
F
9t )"il+s
d^o*''l*iu W' erf-r ltr'-*
tj*t ;Al^i,tr
^ 'U
tfu
i^f* MKi
d'"
'o- Jn""^;"
,
1,*fu
{}:
-;
7*t;
" t/'y
',
Sol"
1ud*
il''""uzt
tu;
'^ly* A*t
f,yf , "t s*b1^*tt::
fb '
,lrfu
'oo sol..f* tk
,rud'^" '
gL
I
t'. tw.tt,
lJ*
zriau,,tcz otL
,^t 'ut't
'1'*e ,bzt*""*
tL-
a^l Lt^' ""1*n'*l;7'
o*;-;"t't
(-t'tt'
so I
frk
l^h
'
^*t
+""bl"n
o^-
*^
f*
frL
a'J"
^',"!"
.fnfrfr,,,
Y**
A"Ll,,
k
,!P
r"*"-pt" orv fioc'-t *
^
flo
bLLb
.'
bntnl
7';"!;t"*
-<'|w h^L
L*SP|
;'
fr'
f*^^
V-^'*'&J1t
a
o)-
Seer
,"
t"l+, f,L d',*^r^ ,.f & eL K\^"*l+
*y
-Jr
,*ytrt
'*
^^^"U
e''v{yvat^-
fu
fr^,' d'2,"\'*'^t' 1L ufi""'t*- W
s1sft,r^.
a-,\-e- ru1a,-tr',,fuL ^,!\'
cxPeRT ,l-"ry^^fl" L,t <xfau'tJ
Til. *^fl"
il ^- tolfu^n +,^^-* h^-L &'id*"d fu: #^^* 6tssocia't<|
@^L n'i""*efoitL a' p*rJ*")r* i'*t, t,. GheA i t' ^"ret/.'
u
wid- a- <-,^uL,"n^
o^L fl,- /rr& * C4A*n
^rro|;"frl
''ln
{'y-'t" , fe"nL a^^J" I o blz"
f,t^a- c-f'A'^^;h
s
Lo.duL o'w '\t-tt'
<lp
s;
(r)
R.ur.o...L
t^)
rr"t
$sfo-s' Fr*
t\-r;eaa>L
s7
Slr'"-s atr- a) v-,Lt
;
A- tp*'to^'fi
o_ ,*i- - b$rl t1n rft^r** F**a.qr wLfu
ct'^f"Js'
frri- t;^rt
'*; n .-a.tr'u) i***
9t
,
c-kqi *T
+"n--J
'*LI
l o,ucl
o/1^-
N ,t"*J;*'"*,.'*
L"cLwoaJ- fu^L
.f I*^"^;^Js
In^r,,in*ls Lt"t . t- nt,flan
r'"try
VT tr'n''- "'*'L h
a-'^t*^x- shutL*,Lr
tr* q*tt,,-- \ !_"r"16.^ +
r r
.T .+
"00,,.^
oru tlX l*h't;
tb)
L oo0s
)-t 'ftnttau't
*t
,*,,:H
I""*6"*
b"t'L
it i
u.lro * oate*t'L A''Ylr"nf-h'*
^e
o$uttl
(g
AT'*
(.)
,,t.;,&
^''
ik fi-r*
Co
rf.rs
5J
[u
*^*';J
,4
?,^t*^y
&..
1't'
iA.-l
((
(^^ lrltL-
Svrl,^-
r0
LT*r t;#n *TT
7rn
q l*r^-*? Yr'
C
v e't'l i an s
o * *'t^* o0*
ol tt s?
^[
lry-Aoti.r.^_ F*tr^*^A
a-,L P (. oLo( ,{^r.- avo-,' l"l'1"
a'- lJl' arr
f^lreRu sP' D,
8o r LetaLrs?"
SMRt-uTRun-
B ;1L? A; Js :
tb)
C'*""*.'*l- ex f '^f, - 1 t-
5J s6"*
R u ue rvt
nrta(
\-
(]^-e-
o,"'oL Et'p epJ -
b;
GA
orJ,
aA)-
Tr
r'a
lY
t
s€
qL<
rit^'
Jet;6w-;' n-s sisl- ;^ K n o *kJ.oot
t^- Jn^11'** L^ 'fr^-"r "f oJL f os st b lz
Tr^.* L/.s€/L J+*
ci"v\- t.- n^^A* qnl +1^- /\4--'.)vv\u At^]
fl"h
Jacrs,
^s
t' c-$t;AP" b qtivr'u'+ "* a- )ed si"o"
f*
v a-lqu
0
t f-I\N^^AI
J""4 rt*L,n C*,^al;t."")
zxouwllu
*1*
Tt- slslt *
'"s"" 1"ne.^.-)- decisl^'
,A-" G
asTst''*
fro
ex*fil.'
tl,
F*"*
*
f,+^<"-l** J""
-
srl,r.,..,V
tu
u<.t
t'a^<sla'"'
Lq L^'*!-4 €Y'*"'*^0 l*V^"A-:
(-rr*-**,r-*J l-^"a4"Ay *f *,r*-U /--ff
0,,,,/AR.r , K€s, M"L,)Psr,o'cK'
q>Y
tJorT
Th-. a/\L **
+-.
FU
**+,**,
t^f-f
";e
^^TJW
"Untrl A'o'tt
'*ff*
\
uNt-tExue rr
N\eceSs
nR'l
Stste
r"r
De v ELo? ME Nlr
;
I
J
fr3x.Pre(r
rd troR
)u
usT'rFr(ATtto^l
ReQtrrkeYEhlrs
F,cK exfeRT
[l
slsTEM
s Ys
'ISTEM
T
Devvrewl?rg eNr
DEvELOf M 6NT
Ne c e s-sAKl
Ton-
R€q.lrR.evre{rs
TAs
xlor
K
6Y.rect
CHNKRCTERKTICS TgNT
MATC TNE USE OF
sYsT€r-45
E/.f
eK
APP(OPRIATE
:
Sfstgn'r )evet'o PI46NI1
)oES
ReeurR.E
Co vtMoxl SENISE
?asr
REourGs
0NLJ C04F.llrlv€
SKtrrs
e*rs
c A"l
NRTtctruftT€
THErR- MerhoDs
er.f
Gelur*e
6KPE(TS
ExPen s
Aq(ee o*
so L-uTlD FJS
ls
r..loT Too
DrFr'cuLT
SYsterq
DEvei-n PM€NT
Poss rBL€
E'\\ST
TRsr
Fxf€(T
Lr)
'Tos
K
J
ou, nd
^ot'!r
\r
Co
I Kvrc"
T**U
'f
** a,^^*"t
/ts.a wi\u ou tff
wrwtovr' Sense.
L
o[
D
t-rv'r'r"-r'n- l9*s4
'
L'
dv,:ll
,, :
-T^-v'
, r-. *'X'*
n
t-.
" J"zK
tt s
..a lt
ti"sf'
*iA
l'r t-, * ".dr*t*-.
i^rK /rlL^'hu
\"t'*tr,
Lr) t^rr
dr K^oL'4'')'d'
kn''L\*
A-^*JJ'L
"T*";7
Lz
Lo,^+
SLitls
u<fea-b rvw-.:'t
:
Tu
fr*;
a,.L,-JJ'
"^'iil.,
r"t
\ / e^Aue, cstu
'
z*l|a; L; n*,tt^"L tl'"t f,LV
tt^0r fr\^ "^k d- tte&
'"^k
Y ;' ='il'**;; 1*stt"'^'
I
ba
t^
'
t't- L,"0,. f"f
zl
n-^r*,V
.n-Y:*
f*'-AdU
#
)^o*u ,LLtt' A,.t(tctr 't'i^
il*^*' c'uJ o"u-b"tl7 it i*
t^-''10-
f*
t*)
L5)
rt
;
*Xl
L'
a-t"1, u*f
;*- A*'f
*ltit''tu'"
(9
,tt"tC r-*,Lt-t-J" tLd'
t'
do",rJ
J-u ,
Sol''tt'o"z
Kno,,^r
t
v'ua
It
ouc 't"tu'*
, ,\ e*Y"**Z
'
.LS"
d
^;LL
Fon E*terr SYsrenr DeueioPr'rEqt
TusTrFtcnTto(
TAsK
HA<
i
$e1-iJror{
A
Hi6fl
PAlOFF
HUM A NI
6,rPeRtrse
be ri.t6 LTET
ex?eeJ
s\lsl-e,vt
D€v€t'., Pvlei.rf
HUM A^I
E*pe fTrSE
.JU
Scn8r€
ET IFI
ED
6xPekttse
NCED"D l^l
lviA^lY
t_s cA?oNIS
U?eRrtse
N6€)e-D rxl
Hosrr
'
€
eNiui
ot'f'^- h""
*u
,ll;
*"til'
j& Pvr- J*fos;t,'1,y, h,ffi-f
1,,
i.l& .k
f1"'
n
n*Jo'
T^r",|rJ"n:
{:fr
oi#*to ",<rf"*a
.b 6- 't"xl- t"Au
L ,,uou_ M-tto"eht, i6"r",;;;-t :
,' .uu ^.L:. G?.^
f)a
,',L-,,*
n
tT''"'o\ryi':_,:*ffiyT*.*
Uf'"
J-;';^J-ffi*"^
.\*y, ! t'r..-,*x ' b
lil':h
G,.I{ "['.;ij[:
{rl:{'$
n*|.*''
]o_
d.n,,,^-*tr
o,*'L
;';-
s,h.Jo^.
r0'
' 1,;t ''- ^- .-t-t ^'1'*'
*
-t G
*^@*ia..!
:'u or^
'''-'A
"::T.f
slsb*
o:
^
fr**
,-*.
''*!J
,
t, L^\l^b.
dtK#
^, i^**il, s"cl s'1"'l^b'^
.*1,*o" ^t ,.**3,
N ,\*{ *J okJJ.,. l,,trm^wro,cr: cxf,,f,s7sh'- o,'d^t**,
'1""'*
:, .-
cHn(acTc(rs'116
5 Tnnr l.,1RrE osg oF
"TAsrSYM
trrperr sls"re*rs
A,er<opR-rRre :
R6ourREs
Bou
MRnt lpuu4lrou
NATuR.F
Tnsp
R€ourr<c-s
He erRisllg
SoLr:r
ror..iS
TAs<_
LoMPt.exrl
*Tocr
ts
6xrEc-I spreM
l.lor
A?Ptroncx
€Asy
APPR.o PR TAT6
-hs<
HA<
Pkncrl(AL
{ Avue
e
.r?,
TRsK_ i5 o(_
l.4Ar4q666r"
S|7E
L
at)^.
,/
ffi'^",
v.Juz
f a.-o.ric^(
: Tu
,y.^,at<* sl,.oJ.l
te q
fu,k"l"
Burrurntq
-
A*
ExPeRr
Sysrevr :
Thn evol.^ton o{ (L,n e^fo* 1tu* ?^^unJo P
fo ,k"^S to, KrY bA l^,'rn'"rt^yt i "'7't;7 t;
Kno'rl ",'V
ctn.l. x!u",^t't'--"* "# tL srstt'"!
Thn- u^"^",r,,t h*":l",,rl
cq'* a'rs sr
S1s1-t
^tt"l[
^
I
s'"J'L"
V^*7;tuw-
^
,:'H.Y.*,ffffi
W"
? Ab&-u\^.L'*a,,*Y
* -,!f,ri::!';"*T'r
':"^ff -:""k
A-
a^t
X*, -:,T*u
"'l'll**
7'oo,L- /rt'
"rf
ttn 4W
f*
ir'r".* b'''*il*'t'a
Lt
+*t
'd'ro
htt",i*t u,^':^t^{
sloo'-t- i
Y
.Auo&
'
l.-
'
sL*k,
e-dj\'-
K^ou
a)
G
'
-J-^utt''l'^lJ
-fu'r'u**-il
rf '*a"*
Aau<l,t wu-t
dsntl
€*9
ExQvfl
s'1s'tevt
3151e-'t
PntnL;w*
sr,;F
Ea-1
o
Tr" K'Yt:bdH'
:; ffi
,ffi'";u#
"irtr#'"'aT,fr-*:^,'f
-ri"^f
,7's^ ,,^-v rt'"se^-Lte c'- ?'Ji^".^d
u"*'"kUl&t c" #-*'t*
I L*d^^- "-'^']
t' ff*;* , t L*ffiu o-d
o
b.
hr;'1b^"^F7
tt-
slsf'"-
^T
c-c^stAtul'
-TL K^o'": t'l1" oT*
tu
4 nfll"'*
t.[J'
-[[i'
,(oJ' t"
1u'*
&ud
a-n^d- do
**'''*
t\g,,,sse-rs d l*o
c-,.- /Y\glu-
(i^, t-Jlt-
e
eaf ShoJl
1Lez7'a-'*'*t
' irtfr'* l!
^ut"^t"t.*
Lrh.t-,^-.
f,u-.
xf
a--u.
i*
lL*
/'
Bcrrr-prnl4 E-xqe<f SYsTttls I
f"t
'1h,r^,
&^r
l^^tea
f
Gx.errue
Joe {rl'Rtnr'*
L
iz
FoRqnL
2A-T lot'l
ATrosi
r
L€t4i+\
fMf
'Tfi-Iroq
'tES
rt*(
(
r, ro&*,1erA'Tror15
?e>
Es
rcr
N-s
(6g-i,16"te
Ho r..: (*r..r
bJ HA-T CoNcE?.u
How ca*
AKe t\eeoel
To ??.oDu(t
A 9o LL'1roN
an{roKo*t
AsPrcr< 0f
p AoB ru-vr K€
CHnAAcltrRtz[)
C-c xlc
Tug*rracA-Iro*\
'r
'ryr1
bJ
a^cA
LD t^,r\*,^:
t\^, .;1""t
f-
gl uAL
i
z
€
tO
(A"r
lvtt
?eta
Be v avtp1lp
EM6DDY
ulLfD46
TMPiptqrrrnro*
f:,1;:v'&z*;3,f,!;'ffi
l*t\" )"*
T^* \C".o*L*
d *i;:"rk
a'a*cp;*'uv
f-oq'-y.
t'1-'-l
ti'^d
e'tf',on-t AeIon'"^'i*
oJu-"r;**',,^i)',';i
,*'tJ^. J'tvll"a'* |t*
*"d
Kt
EKttAitz-R-r"*
flTrclt
ILL
1ne
Po KMALLY
{,?*e<€ r.\rel
i,t"-rkfl Iu I
f,'*
hJ
KNO\"JLC'qG
B
how
Xlna.t RdffS
T116
nrrs
(u
*t"'ub)
d^
'
rtrtt-tLa tt 6
'V'T*:',,^
rlr*'*
C"6'
'3"!:,"{J-m-k
:Y:.
"t*')
"^n-1^^'-' 1-f*"
(, ,-,.Pr"* , h:*# |J;":|i:f
-'i;a
url'"J CwQb
'
t)^*i*-
A--r"=-t!;"^
*+-'fr'5-
'\'r
.f',
c-''t-d
t"*'''*"
'
-
j"'":*,
S^If*U-r
r^T u*1l3-u,J
fr:
eoftd TL
{ ?"4yh
rirT-r
t"
/"
-o
\-"
1
i
c
f- fU
a,b
stuort lr",-L lt( A't"^I ( cuono**
*;W'
,
nA.1r,o-t
b
cL-asc-^"'r^t'na-tr*
oL'*'-*t { '.*'(
V^-^) tk,*
f,''L
pr,^ubtr
!a^,'l"t
4^r
tL(
;-#"
*r*'^r!r.1,, ;?:',-;: ry,:"t:#
dL
sk,'*'''
rui.ru* y:*'u*,,'jo,^?rrT,-?
^bo",t "ffJ"y; ba'uA
t":t';
u* ynnpne k & A--1" TI..u K^0,,-l-,7 Ti*n o,
r(n-.'*"s<,!
+ ^:,* .i:;;' W ffi;:Wt,#,'+:; \"'ju'
oT^"*
ryT':, ;;"-- "*"
nu* n):*o"u ' )
K^'0,,1nJ7.
l,_
nA*,*
b'u;LLy
rl,ns,,-f,n1.*
I
4nnt -*
"WUd''"
-.^r,,fr* f*t-*'
'"TT
"'*n*
^'^j^ff
(+)
|J^T,,tr"]*|
yn^u1"
(fr;l*
o
trn*-*
e)
,
,.0
A,rnt,thtt)
^
.rcnto^t
,4!*'^-
Thu
(^Po,d- sptr'"* rtnu'tt
.
t
I ,""i4,**
fr'*
c,.- l-*l
'u, n-* Lw
1
be
^'^"L tt"tJ
Y AoL'ul
L'"
Xt*L
)t ^,
f- exf<c;t th"
exf
u'lc
L^
@
Y
,
L: 'k
t"
'f':
F''i n*C fr
PnLnth^l'
t"
P*z -,\ ,
,
'-d
,rJt";t
,
v ,*."-v
/'^o't- 1
t-'7
Po ,
(^r't'ryD'
rh-si'uc
m+n'ls
X
i""* s"t?,,,
+'U
e
fi,.' ule
1$'"t Jt
u
L'l
it *'''lJf
-T\*
b ct"^t
Lrl-t'^ooc'"-( LLs<-'
Srng1s D'r €x?e*t SlsrE*t Drue.oP^.1rNT :
-Tr.."^ a,\u
De qo,.ls'rcArr*t
P
R-ororlf
U)
r
f
.. tIT .{
Kty.x?cn
Fle
PR-ororye
er,f,ut
t/**
^rrffi:
rr , aM.
tl'
l^q^x.l-
:
CovmERcrA L
ll
Sls re
q
lKororlPc
'^ff
. J*^^,*LnJ' '
Most
lf*
PR.opucrtoxr
?KoToirfE
Do,
dn*
s1d"*^'
L7'
Q) a' A^^'t+"h"'
l*l^-*L"
alln'u"L
t1^"t t^"ll '"&"1h,
1O'*
1** %
exf'* tyh"-t
)t i') t*deL L''1^' t'* -V : F"vt ' f,t"i tl"
0u
't:y tr
tl,;6,".
#y: tr,:r:*f*r';[
o
, t4 "7
"
b"*
*,,'1. yrt uJ&'-
tr
"
tt
oLlr"^*^
"
A A^L - b o,t rt, J't-'r,nr^'st,,r"L'^ IttLy. n*,Lt /.""h;
'att1a"r'LU
aw o\\-a- s4- fr"t
5o t"" oo h^f'. , f 'Y*
Lot crua a^^L t"U o\^-t' t" tl"^,- ,r^^,;tt " 7U J.rc!"t'.
(L) 'k rro,,, ?'"ttt' : Arrt ,l't
",oln J- L f,L 'ry
'r. f^ ,1".
*l*L
tg *r""r
, -"il;,-'*' sixA
I
'
ffi.
l*f"^
oL
{a44
T
.
twiq^f 7*tx'^. ,oo f Ur, *U,
fu*L- Lo,t,) fu-:e^,tcL +ff7f.
' I,ory, *AXn {I trt
4.ospt o,^"L f"k
rntu
*
il.llulur.r,_
r
lff**-; tr* *, I Jo'.t"7
i Sor* ,^T"t syt'-*
o
U
(3) F;u
?Mo,r-tf.
A, ,t"'L-Taa'lr:
i
I r
t-,.Jlu"/'
""0
1*r
, ':
4l
tL*--
jffiHry^
*Lt4*,, $
,I)." ^"'"*"rffi '-3r,* ;:r!i^'^ svno't^ '|
*u^rJr"^r**r",r,,
(swrtn,-,*tr
,T!",^*o^JT#o
v-'t,f'*
f^#"u^ff"7unTn,nr*^
!"y
r' Lu'u'
hub,
l*,
f+)
q.^"-
p*
,1
I"tuw ^4 celu 0'"'r- r;'
t'tu
/c'
".f
^'ijr,&'
ff"A .;'^l'o"
o L\ /u''',*)
t r rtL^ 1'- t*--,.*y
'fT
?drrt,Y f
q.r
l"*"*m'r|**;r
"'TtW):Y
'tj,r,"W_:69#
i,,, r:ob rf'l
llW,
o^J' fu ,*"* ''-*
iu-;! ly"Jm #[.tr; ^-T a*d r'tL ii*t4
'b
e^tt'J$<! l "*
),"* btc,^
^-
:"
fr-
4L,u..i. /-"**i
L'tc,tt,,t
b,u__
sf"'A
rs)
H"'[""#'Wo,?:*J
c^--,*^.;J i,h^''
',*'c'& ,tl'"
rt" tt"* tk c't
o\- o- '7y
yhr: *:'
f#'lr,ili*.fr':'X
.
(aaalaxc,nr-
{"J"1
+
X{or''l
,
a-
", 3ooo /.J- , t*K
"r 'ind"--
;";
{;:"*"1
ffi,,j ,f;
b
uJ,
/tt,^,t-o-t
Cr
5 e uEcrtor-t
51 sT€M
Ex r egr
--
3u
fr\'e
Th. J e.ision ob "f u; 't t"ol is
t^sK co nsisfs t t't'r"'
[.'
o
L
lo oL
A
ool
:'
PA-
tf..J".
Is Besf DevaeF'qr-NT
?"tJ int Besr PRoDticlrorl
Ev ALU A'trN{'
irq
A Toot-
I
Tcrts
!xrLl.,.*-
Seurcr
ilor'.tg
IooL
rNj:11ll h -l?-t t
t"* '
,1** "tLu'
(-') )e rnlofr'^""'f Con:ltft i Erl''* 1'*; ^^Ao,*\,'*^n
u L.tL L.y-.-,,
L,^"L,o|
^xI (
*,*t , 1,-o^,1 -T[''
abo't al,t
*hu;*
.*:' LY*r('d
Lr9
t^'o*
cL;." ,* tu t",t'.'
, ^^.'.'.:::
ou
[.-ut
I"Y^*Z
Ul-ttb;
,?., (',,q,
'*. 0,,,1*'tg- *V"*'A bTf
lssues
Jni.vorve>
,rc,)
0)L o-
um;r;W#
.th'"'* '*Y*
-tt*t
"-q!f^i;W{:
A:ce^tett
olo-^*n'
y "'{ \ \tn^tl.^
trJ*) 4.
." *, oJ-L*ue^v^",'ry*I:[x k-#;-'h',i,*
ff"
,X
ct"'l
i)
D'[11*
o'r'b
'*''u'P^
H":h.:o-*l
L'k fl* 'rn""it fl
ec(<a.
,r*
.
1.1"
u f'
tA fk*'
*\Lo^n"t'" fr"'
'W
.n
ob o!" r^.'l"y 'T*'ru
o{e"'l'1"*;b c'a /,'u"t'
sfe.Jp^r,l;U) , irt* tr-e.ifi*L
s"l\*r
Q)
t lfttsr t'c fL'
V:Y '
rwt'se. '
IL
.u'Anl;^,
tr;"*, n''J'
tL :
fuJ*
fC*
Tl"'t
'/vr'.u{,
P'' t"d
be'o"*z
"lfutt'
Ti,,t*4'*5,t'f!t",
(z) (u l;" v;,1;$
:
A*
exf e,ti
"""fJ o )L
^ztea+r
L fu
Cnu-
ca,6,z
(+)
is)
-irre
EvoLuATrilq
;-
^;
t:+;,
*'
gvsreol- Buruor"\( Toot.
""
t7to:
,
i,!-
as br;sf
)€ve uor r'n er"\T Too
Tu.- r""L
b,ett
h.-
0,,:l
I
Tn
e
Be
s"r ?R'oDuc T ro{ Tool
I
tZ T ;1T^ "Jn:#.
+"b'
"*;::,*
[-?"7J, y":t'':i f"r'
;^*H
Il:/- ryj{Fu#'':'H,ffi
*
,4*r,U ,1":::t
" *]: ffi.t'Ta^L
'T'**""**'
"wk LW
^r
); W $ f;; i,^,. a^^ !ffi*
'4 r4*4
b" (bti,bl"
w
^)',3r.;'ry
h L'Lh' * L 'ttr'"*'
L'
fN
-
A.t'*".U
ctv.J
tt
Frora
KNoxrue D(e
A c o urRr,.t(
$f n""c
:ttt*"U
1"uru
Ex?errs:
(^s,ubly ^u].*L ft
o
V^o"l'f,6' ;t"
fl"^L
t ottl,.,t..L s ," " nf*
Kxlov.rreur;€ AcculslTtor'{
A [^o- LrL*
'Inr
cL
".*, "nl'#
r-tSa. f
ilt1u--
le l-etr* ,tS ot.r
,l*^ 4, *|,1*,t
'
t
?Ro.ess ;
tl.
eogrtr'o'u o bl'";"t
K^o,",
witr a*0 "\"& es Ef'o''n :
DoI^, ?,.JI.,^r,
Icvrz-
rt W
J^-t ;'fr^"fr"*
Quuh ow
Ftt',.o!.a.t
Stl-utcfu'"t!
Klto,.ti
Exff(T
K"lowp9q5
BASf-
T:,:*r'!
u'.1lo
., it,-
#,# :W:::,Ll
+{
X+T"*
'
nol'* 1;;"*
'tt'
fa^$\t-s
r;
Krno-
'u'V
.tr'si1''L to
't
^ry"ilf
rV"3:'tX:.*T","[#*.13.
:t':'d
!:;^fr
/tw
d^.,,..t* obor'-t
L,
;'
)** L'-[-,t
t
,v,'t]a
-
F
solu,,, ^'
t-{hcJ'^
t'.-
nblo
-:{";t I#:.^il"J:,**,1:
*:',:.;:' #t'J .
L.,...^bc hJ7;t+-o,
Pv**to
L*;". o:fd ,
l'nu.:, ^.
^,",:'iff ffu-"':^r:": s{ r*
:"',:,-ry;A
'!*bl'^'
_ffi
er'l ,,.:[.,f;
J.I-.d*
J
lt^'
ti*
de Jo^**
krno'"Ln'4'
hLo-, tt^t l^L oJ
''t6"1'"
T;:l-,,,:^*
cL\-{-
k
bo,.^f
i
-;;
e-r'1u't
@J -^ o1'- e*tul k^o"i.il6
.
e*;('v{tr' a^L $'*t
J!^u^0 ugn't,
J
gov'<tr+z
,ui*."
6 att cJ
tl'."..^-
.4*i
'
@
MArcH
S
n
slTuAtros
vATroN A
? nr',l.*
lr^J
t"r-, (lPu..ts
t^^t"
' ro\ u
*
C".s
&)w
c-u-t- {a c'd
*o'1
HAT
nnpotlC,
co*cuusto^Lq
i'-
J'o'
;hn-
Ei4*^l'"^'
tv
ruitJ- (^L\.f o /t ,^"*L st'{t'..,{io'': I
hrr^,^^Q\t" am& d.J".t*. sf1s fr"x
IJ
,[ a
tntuur^, va-tr'o..s slo
!^/Ll'---L
[^''"k's
slot^
5L"
Se'lkt^ags^,
^,
I
U
z6l
,17-:4e"lecqu
hJ
Srrvffiro* E
-
t-' +(V tr*
4anuiA.
I
a
:
T
F(rxcrPrcr
tenr f
St-tuA-Iro^l
I
9tTutto4
2
? n*lr*" -' solv't'"
6or'lclt'1E16q
S(rtratror.l3
8,1* .ff br^t
b
,^rv"[
(*)
si*ua+,.-
fr.rreRv\6wiNq THe
?7
.1". l"O;
ot"
Ex?eRt i
arrJ, /Yt\kc,\o'42,^.J 9;n""tisfs
0*
"X",f;*'
rU
f,l..t.n.
^tq
!*'"- *'o,,7
a''L
lf*
l"f**t
^n.,t\^oA/
tolu
AL
opS
0 bS e lvnl lsrr
Me fi-r
L')
;"; ;
&J
obsrn'';oh**l- u^d'intu't)u'
)'",^ sfuJ;t
LrnrowL e"f
enf
e^ti*o'
"^"b
'
Is-rut-ttv€
Me
rno'ps
TL' ''r""tL"'L tu'i-;"^ er^ *ff'n:
;"t"i
,:;# ;::"--
r^
t-i;i) : .)#
-*-r;;"r*
il],r'^*^,,T:M, :*^:w ;ulrl#,'#{},.
wtL,'tL'
q\'*wnt
gol--.ttV
'
e*fznt'"
^U,,
,,tw f,,.',t ,
u'L*V
!^"t*"1
3€5s
*';*!*
fl,
;ff
J^-1' *.,rrot
abmJ oT;t'L*" I crvt t^1"*t K^"'"I"LU,.
!,t^r;L.;,.br.",,*J.,tt" t'*tn'L 3[a'L'u
o"id
i-"t*-t
tt
L^o'nl"ty
brutj fu'"tL^J
0
,.
At
, *e r
^
tlA-i
t,sr/. f* trL^L,"t'U flftu p^'ot l/i'"''A'JV ' -tlku,- 'v^,{L^^'b
I clv'
yo,,Y^47
n['"
.
,d a- ^br":*
, _f!*'r
l*t'-L" ttr'oiv h(auaot"
t" T^,,',^,T,'":ll'":
d,,J1"L
.-"h
ltL-*L'U
tn,..,{).^,.,
#o**1
o,^.0
;;.J
----+u--
pnAL.*
TI."
'7,"[";;:
L\s^-rtr
f.,^
Lf
X^ft
pLc[ o?h* o(t,",L i*'
tl"*
- '
/:*^ ;k:"u,oLr:;,f":o;,ff 3t:!
tT3,'-^,"t''(t.+A^fekkf'\fU-{:tL""e
Kn"Arr -"i
rL-
"
n,,e,srw^f:*"f,r"'7,r.{:,*,
7,,}
h
'de'"ion*.
sk- ;k');r^, ;rt'
rl
,1"
n*
+
,
:Xf,o
(I^
-*n "ft'ut
Le t**Lr
h
f,r'
N* )^u
*J**e^l,'L 9i * ^le fu- 'P)th!"*
y'etz'tow
tL '
's'Lu" 6
A-,i) , t"
" ttu''"-^6 '*t e"yl*;
1;* * yr"^usk
<xh,*b ft**h ,**h^i L
h"lL't 'tt^'
*"t
st.
L-*
bef'nviw
T[^*,
^7
^U
A 0^- L
'
nrf^,J
lL"{Ll't*'
- t''l'u'
V
f.t'l';7.'-
WQL'
(r) f v't..^ihu.- Met[oJ, J Ths ,'y,,4fL.rJ, nJ*'
/tL exft.tt *Q)
lowutrv-t' K^t,'L/Un^^tln
rw() n nLrr,, Du,C*t*
t
t
,
6)
\--,/
a-L'J' t/'" S".by,i, Ia-\!.s-.
L-
z*
Qsrd s s ncn't , Qn a'wtLu'^hc o-{- t-*
,.,'otj.J
9* 1o; ,
1e''t
1|
P, b".rLLo-. u+ tLeU o[o,.t l,u oLo.vt lt["-nio't ' Tk{a.ts q,s a+" ''L"''"t.k, L"tL
iy.fi.'
^ft*,,1'E
,r"J*.r.,J,.J W
frti*
0t^rru Y'^o'-W qil' s(i'U q"L fr**
0a
A;"
'iu
1-^
',**4o-J-
s/th'"
tl'*a d";-'LLd i"E c{- "*te'
ok,
a-vv
*fi
o"""'
r'uA,"L
sral
'"^"ut;yt"9'- U) ,
'
'(
,nlu',t"
/;t"^''f'*
fro*^&
e*|.nfi
L'tL
-(f,..ft ^^L ut*n^&o t');tL
w;LL ih ^T
L^, wl-u I' L"rT
f^/'lR*'
0f:*b
S [-,i.,r
t
)rra' q,*-f,LLs' Iu ^^"-1h' 'i"u'l'fo tu /*ft'u't'"^f;-*;*
of d*"
'fu* cL'&/
tL
n
I
eJr+t.
uok.L L4
t'",,,*
Au^F*b a^*L *-v<.t^^!-xv .,,^9"t'*,a ;,1" '-"rfu
T.-,t
-
ks<z t,*-*nfl*fr'r* trl iL. enf.'t' )'* b,"**al.
' les-ki1wt Lre e.l -[ sc,JvtL*"J
tr^.
or?*n^t A
wo{.l.. c^^vl; LL
L4
K^o,i"Ly
TU
tt^. -lAlz",s
e^futf, &(cttlet q-^'L
fr^"
f,tt'
"t
ov<t,-ba-p-rtru
(.*.. t'L
e^l<'$'
f?'
.
(rJ c'r.i.-ct o"^I
n',-*''^lulJf^,
-The
K^u,o!u"
^L
u; ttlt" t,
tu**t,
ff*fr*Y*T;^R*
lcL^r ,"*brk
*"n ;'fi'os?oif t"tiL t.l:'? n, I*[
-TlLe"^1,-'f,
at *t L;o^I
f,^Lr
e^'$utt'l
rcLqz
tt k-v..o,,:
tt&-t:"
Y
El* Lo,(u*%'-Tt^oKYte'"'^fr*ry;^;Y:r
/*i-^""'t 'f""r;'"
""il^ftT-'J'
|*.
*t,,,if
s'v7''L'
I
o*,H*o-"t^'t'
;tr:-T*l^I ^n
e*t.to.
(r)
D* - sii.
obse,taf,'o*
ob;'nu'o "i"fr
y^^pi\_*fr'^tr*":W
t
^***1,{ ftrr;I.*--,1" -k
P*;^t P
"J:t,.,
1""tfr *
Slst'w &L il^f
,J"." Y*\t*'
Lb)
do'"^r
o*ns"
n'ff'u'- -bn'Kt tqt +t^:^l:*
K*o''hf
Th'
:
?,*+!",,- {isc,,ssion
t'c^tt^ fi"J''st'*s":J tt^
"J'
tr* tn!'o ,*fff,*
l*\^-'"f"h* I**:', _":J<tn^)n.t ,,1*-'
a*tr,^?t"*tn*
Ir-
Kno.'t"{',
v-^"'L'v
t^..?f'
:T--'-rrfi,,,7-**u,,1,
, r^ol"',;-";- 4*L
*t.^,'^r.lri
^'*, ' n.
nn^bl"^fl*- I*
ko
a*r A; ':"[at7
-lu K''o'i"r6'
a^&
t.)
1L't*"dJat
?,*:.:t:
"';
f
l:'!T)W';
L'*'"T.* ,'lrt*
o* *::'+or*
h
uT*o'-
a11,,^^rL
K^"'11'
^*^,u-*:'::T'
JJj:,ffi{#".ffil
s!
1.Ar,,-
LA)
ov*"u
,,* ";,;.
H
"ti*d *'d :["ttfu'*,,,:"t*..\':L#
"..;
br-
nct-s aJ
*nf
:' Tu K'o*L,]6" 'Ty
',,'
/o!-^t"*'X o
, T*^
rfrT
ew6
Lau"
*oL
-\\^,r a-fftuacL /'b
I a) n^ni"^!. J,,6*rit.
W 1*'"*,
fl
o,'t- ft
i,*Jrtt::
IU
?,t"+t-,^
'L^ff '"'t'-*,
'K'.o
'*f*
t"1"3 ;1
^ h e{t'd
YO'^'
o5
'\,
&t
So\* cL Stxiu
1^'tt"',.dl['^/
cL,LrL
,ftoun[,]
''j*.^!'*
t\,." K*.^ W e-".r,*',"
----F
I"r' #:"{,
I.:'..^',,ju
.tI
^*Jtl:};':Y':n r':;^:\
iffL".
il
^-Y'7
cw
K-u.o,^,
1'-'EY^'
1j'\4 L\ f ' *
L V,
c -ru,
,;
t*"'j*,.i
r;*fl
:lffi- "i[
,<
Ll &^* , *&t^, ,b
'"",Tr,^f^,
d's^1*"*'t'
n,*u
r
J"^t'"t" :"ff
1;J* *
E*pe RT
(')
(t
\"
p,f
f
-
S1s"re
3u tr->rN6' ?B'ocess :
..4
o'*
q't\""i7
4
ar""o
"'
"f'
t"'i'^ : Tu
drto''|'xr
K'no'
t'tu'^ "ff^""'' k'tr- cr^- :tt-
1't"'^
'h b*Wr^l "xf'd
TL
c, .^,,,r*iun
.#
Jr'vnn.r"t"
1n^Ll"*
tT^,J
T'*''
l":'"',V
iX d^u".*.-"
tln'l&'*:
1t",Ir"6r-'{'ffJ***,!n
oJ.*f,b (,-" lk:r*^;F,*^'tosy- ^ru
"
' r*
[:"^J
(3)
hwu'*"rq,!* {;i;;" ;;r:*'*\\.:r*
(4)
1,,)rffi*r'"
N
"^-t*
&;-6
tl'r;
tI^. *
,rn_rxt
,fu*._
t
:F,*
.'f':
b";IJ;Z
I'e'
s,bfnost,^,s
'L* iA;-f; ;' i".*, 'l""-ruL*
W,
'ffi;::Fr;'-{';;{r"t'
, u "fr.^
,,ytr:r:r:m'f'r- -::-#cnftu,I-f^
t,) D^--*4L"*^\:*1
{1"0"
\
A- -*rT
I
a^L
ffi
' L'"\ l*:
'
16\
L-'
Xv*I
*tut
'1';"*;'^'
,
1'"*'- [tno'
fi€^'1'""'J"Ll
-'T'*n''
e'"L"'
Uulr-
F
f-r.t leue i&urc
DtrprcuLriEs
n,t
l
Exte
nr
//\
,/\,/\
Llr.trTnTro*s oF
Ex?rRr
A
//.--\
r'\
SysTEflE
sou'rco
LoN(. TI}AE TO
BU\L}
LtvttTpr-rro.ts 0F
EX?€R.T - s'l3T6''1ButLDt,.,l4
(,'t
(e
:
Ex?eq.r S\sTeMs TAK
TslHensNT L\ilITA-Ilo''lS
Lncr oF R€Sou(CfS
/ r\ LacK oJ\./
l
S:sret
-
TooLs
"
"
R.u so
uRcEs
Nsw
5cn<e
E}?E?.7
SYJT6$4 Too
?ER.<0"\"lE L
ExPeef slsrev
KNoLJL€Dq 6
1e61 guiuDE(S
FuQrl reR(
Lr.cl- ol ?-o*r-
A"
;
Deveo?u
To oL9
sTJe^
50??oKT
EI.I.I IRONTM€NTS
J"*li*
't("'o
+
a"l" de'J1 tL
Jui
t"
c*1et-t
*<o
?
n"'['
1
"
t") ? e-c u,.o".1,
a*f,
a-L( sL^',C( '
t*1,
t"71*"
0"'J"
F.* 'l fu ).-*
slsfe-^^ to"ls :
u te)',.!le Ma7
d
fr**- r"*
E*f
/\-/
b) l
qL #'d J.".11.I av
.nnY"' o^f, t"ttt''ttl
SYJ \e'qs
i
t
I^n'y
I
,-'""-fx"
,^'^J^tt"'^lt
I ii)
/' I \
1i.." (^-)L .t u-Ja;u <^te,'..tr tt" Ar atu,ac- ,L""
e"lzx;e--'L AT o"d "t,*,
W{hL ru) .^*" *"'-y
tr"
'ro*u b"'
r"''i tL erls t':'6 uu
' o-n"L
I
f
syd.* +r4r" f,[o^
k*'
J'u'"I*1-'ut foot' c't'^I'l k*
l'J
Ly
it
ul'
,,\:-,
,0
y''t'v"ratn
u"t-iJ
ft&
*o'o^'l- i ' sl'1"N^s
,.^ 9.",'*1" oT tr
u
u^ Po lisl'.J"
('u)
I
o-'1oL
'
teJ
?d.,Lb*"i
.& L;r
rrT"
"r"
:6t"-
'^-o "r,,-tr,!
.h
rTK'
r#^"tiW;
,.--y"l-^t
st.p1,,^\. ^,,L
t
'^*t
,
o^
-a''S
*f*
,
L*n"
s7st""' 'ltlwtu
.a-
'i
:td i70 ^,u
r"-;
l)
H rr-.n
tI
"A "\a-,r^t
^11*-,
o"me*'
'
(z)
1^) L;"^,]i^\,-, ob ["f
+
SJst"''
:
Ex? eg.r
SJ sT€Ms
AR.e NoT
(ooD A1 :
Re?'R€scNTr'.tq
TE MPO KAL
KAap LeD4 €
f ?{6<6'.lli'rq
57A-rrAL
K''i0,rG9qc
TERcoRv
r,..tq
C oMMoN s€ Nl3
RrRso^U"t6
6
?€coc,l rzr^tct
THe uMfr 0F
TH€ f( ABiLlTy
HAN)LIN
q
JNco^l5,ST€ ^l'lKrow rrgq 5
Th" l,;-,,,r^r*,* o[ u.fL\'L rlsl''-'
(i)
'L,f
*.-^ao t'lf^^l "'-/"fi''
@
tt'e'"
[^f*:
**A
o^rt
ffJ
'tsl-"^'
-*^r**i
W
^r'y
;Y;:rr L'*
*::!*L*,',7*^ ,;.",- t\o 'nu
1')
bnt.,.'^
^t^t)
d'ff"'- (- I
.D
#
^Y'"tY'
^k {.,,\A fra
u' ".rnr s.,{,.^t },,,u
Wffi-?:#;
^
i:'.?"^''{,
ril' """--y;'
,r!
ti
l.;;,; fL" o;"^ i*
,"{
^",'"it
}l*^*
^tr
''^
LJ
.p..c! L
-'r* 'l
(,)
t-"*
W
L*L
g
lru* *'.b^ "
'rr \n';ff;^
il^:,_':;*:6_7fU
)\
**^,^ii.-"^
*ff.frn"S"
,o ^*
wq,
,f*,""
,:;:"J
-^l.lo'l'uu:^
L^
slsT'*
u)
l^':.t#h,- , it*
fl
h;W'::'{rffi^X#r,
T::^ *
*:"'n.,-1^
'+,.,':,1"^;
* :**Tu
i^ua'vr w''Af
V""lt*:*"1-'l',-'or'^*oru.ut*,,
r*
'A)-
("-
,1 .*
6"
€:l*
EX?ERT
gYS T EM
TooLs
AR.C
q00)
NoT
AT:
EFtr.ltrlg
?6RFo(ra
rr{ri
TJLEDqG
KNo
A cqu {slTro'..{
l(
r.t o
H
rJ L6Dq 6
ANIXj,.lq
pi
r
xED
Re?Rr<e'.,l1xlo"t
( Her4es
BAS€g
S
J-
il,t* -
L**tot,^,
r*L
t*'a.
]L L,*tx^, I
:
L"u' '*"^1
o-t
t'L*"
9t
u
(i)
?.+*-, , ,"fu-l:J^r'[:
\
a4\* i^*1t*t' it
* c^'^L
.*P*
'
t
slsle*''-
"i
L^/-f,''
e'fc^t
u"f
,,r"\,lq;,tr
-,1
^"\^c'ryvTl
'il;
'or:'3.,P,,,:
:r
^::
ti'r'^
ffi\*H:f#^"^try'N
fY^*
l*^^)'!- *'"ftat^',"'t*t' ^'^"
1i,i) n^-^,i
*::,T*# ;L;,,,,,'ru-\I, :^'#
'
"W'fi**: {::,-Y;' W*
!ffi \ri'u"4,,,,rT, ('n fu f^-)
u'
u
"'^L
t'"'^'tr
,;ffi{;y1.":i*fi.i1*-;*^r:*,W
*,ff
'+k^:o t'u
^i,!
,\^r^'o
rir.,?,!fr*
r*"^y:'
-a^L
7"1t^tz
A
ry:"
,u^^x* fu* an"n- s''fn"^- *nfi*'t''^'
-ed'
U{**
a-J
t
I
l
4 - 6 ?EalLt
3-s
v
Q€eLe
!L)
-z
11
MoDe(PifeL'.1
blFF\cuLf
)lFFrcuLT
V€1lY
DlFf lcqL-f
?rrrn;L< Is
Co uvro'.l
AN
CHoo(iu\fi
"Xol*.f"rol,
llEcouP'cEs
?RDBL€M
[,)
( hcos.''A n'^
(i) ?rlpt
?r,nnt'.t".i6 Ar.t Ex?eKT
BurLDl''16
?r'al''^
H,-..,
'u
-APPguJ'
. w'fr*11"'^"
(a'^t'':"';t^'ry;
o'-I"jlu
L
b(
Au.,J J'" v'or,
r
:':::
$cttr-)t''J6 TooL
f-':;J*t,| ,
h!-tiw'"cu
^'\
t.,.faue^''tr
f'^l^'^h
r*" 1"W' \sft*^ o
.i)t
c/eri.t. ^#' -i1'';
'I
-
.9]s-rcM
35TeV
-IHf ax?rRT-
;
tl'^t it
aou LPPu'lt
tU
:
( Hoosr"tr,
FoR
tn6
(lttr,a
-#-"
tl*
LMt'"/+,Tt""'^ fuaf "
"
t'noJ-t"
v';tt'
/'
t*'
4N
4
{u(l-utt'^L
:;i:; ::!
.,":^
l*,+^'^r'
!"
7"'u'7^^
T';
ii)
fY;:",ff
-a*, t.,6;q,
"'ri
,-*,Y\,^:i^,-:^*' ;'k-,tT2
*yr,!
-s1{e^'
e^tuf,
^,'il,1;k)n,^\*'T'*"nu
"'*,4*.^f, ,.,}"
y
r;"u1;
,T"
u^.r)"'",*
t4,%
tr*
,*, , 4ta,te,, rfu,(*..'t
,L'*:'
t*o,t*I
ni ft,- ex${ t s1sfi"* wiil'," tl^- ^4'r t*U
"bv"- I
r^^
il
#:
\,;3'u*\tr:
JL
lt'*-'
sl^
Ar
q
\--l\
'
t
*ry^,
d^kh
sL<f
"
rffi
;\,',ffiu
3,ffifr
n* e^t
!
{T;;;;
L'
iL;r
st*f
P
u. tl'L-
L
*ul' il(f
uzat
k
'
'LJ'^
"^,i',ff^
r,Y*-,,T
rY*:
,,f*
y':
(,,,)'M
r'iu"'" ;r
' ' ;"u4r, Y^^o'"[,")*flf^'T\
tk
*,"u'
*e^t
n*
^,jry
il"
oti'
T
'i
o
"^t'
y-T*
#1n"
rf
x :*
: :;'*]":,:!;
l' :*,,*,',,i,
1ry5
"f,,f
:,^,:
D ,,
I*'*"
"
u
*'
{ W: Jr;,*' ;*,-
u'^
i&
'tt
Str
<u#, [r
.h
ttr'
t'^'\'
{- yAL-* t'';*
'il^- ,,r&
L*
'L
'f'*^1
^
J:*^u
Aryu;J
a
ulru
ry6J
'tJ*
^'**L'
^..,..L^
;;: \ {:* r"w !'ff
V,,,,4*,^^:fh ; ,',i,u o"[ :,;" ffi;
t''itl +-"
fr^"
tV'alo't-'-hb
U^Pt'Lt^
'trb'"*
d/,^'"- ' TT, ''*.- '6
U-nf %X* ^fr'u 's'^t
e^J'rut^'/
L'-e;o
bL"'^- tl{^
t* tr,
y'a' t*-
L
n'
iJp U
t
u'i#1:
ti)
^?ilxw#'f;'rfi
-;r c^tr
rr"*
,ffiJ
d"^*
d'"*
fr"l,
fr.l'
.*[')u
,fl'.
't fr'"
l-l'.
n..
il,d^
c),t,^*-^*^";
w,i
^hrT
K
r,
b
kL
-s,^l),t
tL^(-
,r .-.
skn/'l'
; o^r,'ff i*i\*::"'# nn*:
on
Mv\w*:#trtr-tu.
iffiq* f * IUX;;"b"r"\
o
v
'^11 \
t"rt-
,n
,n rLt)^,,
-J'6'^H
tf
rr
*1*
u"h-*
tk
, t- t L^^ bt' JLt
,y*tu# r J:
ywry&ffifoz b""'
;i'qfff:
".W
r
.,,rtu*
Tkii ^iy\*,brv
tJ ^,&L : :y. J'";A
Tr."
A",q.,# P,;
ff
n*^
j*^*#
r;\6:T"{;
f
,l:
'l'r*,
r^"*LM
'^T**
^TJ*
", Tv*
?rri^-[l
ii\
'^P li -l* ,at
ri )
ff "_t,,p ?r" )t Uyy iT*"ffi *
,
d"t ra"
. '
'
rr,y *.x
U_ hyr+l en- Po
k
u.y'",',t
,^.,
v,uJ)2.,
,r@
u"'
;*u+
ff'
' r\*!kn-^t;:
"'l)q * Lnrr(aru] 'z'4'
'-[u# l"
'(^
*:,*J*furffi""'
ob
u
d4
^y,
Yut^
f^*
.*r
':ff-'p
W
"*f"h^#'**"oo.r-n
v, "-T \H
iA,
'#*-u',
#-!u,'!il"
:: 'f*"*r 'r
h
,) ftu # H\i*ffi:u
:,,**
Tt* r^'"4 'ff ^,"*2 b^fV "o*n
l^o11".^ j*t,'rf ,*
tu.:l$o
/X"1*6!,t [Je{,-^t,;(^
'
,J^
ff
I b^- )\","rrt-fr ,'t'o 'r'^
'lt
t"uu^
"m'"*, t
fvLt'"""t"
(\i)vP'
:: t:*,Jr#^Yril:: ff:;"fu
" f*!'u f*f^^j
,*7"(
*'
'l'+\!
PA'(AL '
r^'iL0. L' t\aM
stia!
F^
n-uih^
<'ltaL-{a
t'" 'lo,^o 1o*^'
lo
t;^t t-,
crr*
'o" A^u
eU,t
U
0
)^.,*rnt'l
+ . dun
l-rtrrt
'l il 4-L'^!-
. ^\
un^"-
be
r;tkx
Ttit t'ntttt'er
t@b
'k'*
,#t
<orn-c
a.al
L:
,1r^t*1-
t
t
+
-r ''
A-f w"f A'+^"
tk
'fb'"*
':"^ht-
W ff{,tr *t**,y,,'b?:
f
!"ffi
'ry^'Y#t&'q'W"ffi
'*^),*r*;'
I*,'^*Tu p6 f ,;rt n^,,,*
^\*
'fT*,? rf-tr
,:
*
i
J**'.;r*
f:;,1**'4'"r
o
P
ff*';r*!*k
)M^ ffi"
^,W3,'YW
W{HWW**
'o '
*,^n
:14
7-** \" 'h
t"
----; );
Ao-
4unS
^k
Lt
1""t4*'*
aV."L,"r- ulu
)a .+- .t o^ a^-
; ,,rr,t-\tT
f:,fr*T"^T*,!,:o^il
*
/t*L'
I
rt^.!,,f ^/'--^L
L)\&
lrw
't :
k;^" ''u'tua
.', ."-,^^
f^
,-eL<'
t
ct"ttrsun'
i;'^'
'ry
At-lJ' L^^i[''
't
fr' 'tt"I't Y *
tL''r
?trF,nu,s 1^l DeRq"r6 LJIIH )o,vnil
E||P{KI :
{e
\
oogt*6 I \1 r
r-Qr/Q'.
DoMAr* €^?tk1
tr^'
rt1'
-0""'
J^lT6{A'-rr.6 t^rlr4
-ftlt Et?E'.r
c^IL '\r
(, rl
t'-,,E
'^ trr"*
,'ryyr
'
,-o
N .*wfd il* r\*ry
*^,r
H#,y;_,#WJw
lol***
.
t'
*'*-
.,
N^ e*p*
*I
**'^.:;T^W,1^,fr
'# il,ry*t+
G :,ry"
^'
,
;t
*
#
d^
^d^
;r
'^
'Y,frW:
# ";;'-*y'IPor
rJTi
**or
^
!x,bte,*
ffi*-,f^Y---,
frJ'^l'ft
*"Ln r-L
trfu"V;il
tii)
cLr^
l* J,rt-"f,*.t c**'t tr-^t
e"f,v*f
iY:|""*
p*-n^.
W't^-V*"'
*tu
to
it:'
t4
&r
A"*r
tr
:,",",
*n
t(
,T:;*
t
u l*1,,. Tr*ur,^1ff*'4u' f",'ry
G r"^
tfr.,*;:^ iluf:"tr-A',t'*
V +'
S
'J'[
f^r-H*":,*
m";';:",'i*rff
0-"n*;* **[r.i'srr^u"
k
<r^ru of
F,u t)^,,J
f#'
D
^-*";
av'1"J1"
* l*ff^ ^T ",.!,"i ," ^)L lG i''t'^''t
*hf'"'
Jn*
fr',W*
)^"J*f"""J t'"4k'
o'^/"
^*
#fr
|
@
u&*, ^l*
Ail'
tt'lt'fu
w'"r-:
,i
' tf'^ fu* d"*;d,ft /^r*
'+'ntu.
ti), ry'z BotL fJ'
;**+^kiv|,^
@
r^Y,r:'"n
. oY
,kn
ffie^il "I W
tr,
f
;r'-;"^^'t'"*
-"^^*d
t-M "''-'
D
ab$L tt',
0 't ,t .. 4 ^
L,t^^r ^,tu
^"t
.LLtvt
ALLS
!,
^t*t
h,'od ,&;
4
t
*
a
sL^[J)t,uc/,q-.- sL^trJ,b^no,tsr,
wfw-;L;,y*lw^",^
*
s.l',tt k k#^ ."^l
t*
,,uL
TT
';'f,;l r* fr;- -;rAu*
tu
fr- !. #on
,^T, b< t,;tJ
c'6
/"nAL
*Jo,in^
Jr t t,^,;!,.n.r.{Jl- ir"' +,"qro-'
url'4--
w<-d'
+^,-
enlur sh^^Il
L'' *'t ;k-* N A't' '/6J'
.':*
ryrt5+-,^:".:)olr*",,JyJ""f
,[** e&^J T*
t'
/^^^lt
yo f r\-f-4h
kI\, r,,Lbt'
fr'-
s'lv<
f(l-*'t' ,9
i"fo
'*L
* ".4 'f-'u**T)*Iy,:,0 tt r,,J'*
r,.. -,^'r
ff
n
*,
Fb$'i:
n^!^-'L"
t^'r'^t/
*l!
,nl&,.
fi"
'f*t,)*
il
t
o^J^tt
f"il t'.{ 'U",^ft**l*")*#-4 ,a^[,M
^"P^,^
i3
o'J"^
;
'^,,1.,t-
^
9s*ti 1t*^kd) ,."^t
;: A**tL,Wryd; n^''^oy r"-
r^t,t ;L':l ,^'L,,^ ,-T**ry,':ntr
ff,,
'"nu* ,"-\y"
b.t i^.l^hL "'lr^ u'*!"ln;;r*'+
fu^;;
o,* g^I,J** t"dt P''"" PL \*
'*h^, .*F&
f .T'1--,*^ e*'h,-l- n'"^t )ufi
,,""*
1;ii)'rlrfi"P' ::,.,ff
,7
dnut-f ,nu 'J ,1t.,* i
,* W h"f.'"ff
,.,: ;
r,r*^lint,, ..+,.^ aitL- frk K"""\']d" *f*
av*!"trJc 'F ^^"!6""t
"fr"t\
A'oki")rrft'
#
<lt"U "^*
o^t
e^y*.t,
--,' v..-.,',L,
'^YO
#
rTf#:
^T-Ti:u' #*"
{k
i,, ,fu^\+; w *q,t:"
v-*"*
*"L'*ri"fc"r"*f-l
o-[ru bs-
f*M
,H3'*,
i-l^:Z*ii**ff
t'{*"f' Y
nd,Y.rH%W%e.i:
tw *, 'ff r' h.;Y*
*1fu *'*
oo*j,,J,'
(iu)
?q!, ,\;f
tk"f
o'4^'
:{#"-
wtu,
L^^Lo
'-*'Jil'-*
*^r+b; n^"b*
^il""-\'T-Y
k \u
d*b'
v)e
td '!Y*
'Yr'"- '
t"
a'cob'
il'
sWJ"
L'
Tla
t
*
Tr, e:,poti" h^^L
+^/il,: 'dY. ^^L ^1";
-tk *-y-x 1tr,',
'; q'r'M
\-.../
@
*"f,o't;tr3%:ff
,-\u'"]*no
fr"* "\^
(")
ry
!Ht: lis
rp'ilf
#'T
ryXY#
tr' *ilV 1Y:. r\ "ri,"a a^L a,;"V :'' 'lt' 'ru"s
hMI*
ts - t "W*
yat"^'*
^lry
^)
o,
,^Y
L ,- pl J,i*,
Hu,, to A"il l:
--
J
'W f
b*n-
b*w
Y']1..
'$'
ft
,ub,,rh
-J^r","of
ffr
h,^,^p
)'i'x'*t ^'tt'
a^f,'T' ,4,'', rnhr
*;;A.fi;*;L
f"
^a"*t'rJ*.,olw
fur-. a'd" At'\!r.'v-
Y^*'4
t-
"^
LN 4
rJ^"'
* t;*f'L "-f
tg
t"
u
r'K,,"^*
r) J.,-r.
4,.ji-,Ynr",Y$"^'.::"
u, uoLL'"t
rq4*r
A"^^t* '
'^Y
,#y*il,f*"*o t
5f
n'"YwwN'ry',:'x
.*l*r ; y J:';*[,*, \ y
c'"^t"r"'"
Y,,-,;r:
hTH
ffi%,r:;
,T*
"
l
a^^L
ez'f
ol'^ru'
fr* "^f*
?rrr.nut
s
)u Rinl6 Tue )e
ve LoPrqe
r'tt
??actss
:
/
"!Ljl{t"^,
W r,'L\
;s leztef, c"I
; Wl^-, ,tk. t^T"t
t
ti)Eq
,srst^
;; W it yf"'* a;i^1"&fu "" t"^o 'E b"rr I'"tT
(z)
e\to'\^ot\lL
t)M
J-'-n fJ"
ft,t.-r,,'b
.u*':ob
ev^l*Jl
":':"*-,!:
Sr,d
Hau, G Auoii if :
,rrft
Ir*,",V.,,."'^,.1',,,
tL
*_Le
t,l"P
'k+ n-:i':;
"LL
frrh'#?'{*l'[
*
t','* ^ss"""7 t
d'111"*-tu
n'i
*
d-".; o.d "r'* tu'- e*\'
&*4**
'"tPn"h{
'{
1t-"*'
D*"7
tro
'
i-,J,
V,rL
",'Jl il)^" fri"' 'r^
/YY\^"nr
/Y^rtn1-
**J'T^#'
a-'
I
lwct'tt
E bt c"nA"t'l
a'^
E'/^l^^tL^r
-;;
*r,n*^
*&t ,L*
0
f'T1ii )
i.tpff
--4.o
*.!,^l
I
;f
.^f#
'
a*A L'' e"e^ It
t'
'rsfi'*
l,
i;"^' t^.c') s:'ilL b i^uolu..L
t' sf lft"O
b'* "T
'
'7"*u;tt-L^ tuf'*
^f
: Th. vse^) ^'L rf *W*
51
J-u*
S I
I
t-k'*')'
.!1
d'
fr: d."-t b*A*,$f^^L f,u L\-^L'^- *ooX,
,
/tlr
/tL
t'ts'
A""- t L(r'
K-eip WW
+."^ .! n^& tPir
n"^*!
^'a
A-r
,J:;:,
"r.n
+k
f7,r",^
ry\"\*'
*
"ry :; o.,^*,
{"'i *^t
sh.-rt
ry;
T+#+|,^L-F;r
l:*X'T*^r"i#'
#L
sr"r,r L.
'[^se'^)
"^-fff
'7^"'l'l'"'- )-"^^:u^'f ,'
f,L
ft "'+*:L
;
f;;'r3^,^f)"*
{Ul;,,)
tyt*
'l
v
t*
u
</if"*'
ff
,,'Jo,-'
L4:1"1'*ot
^,'f,*;
tlt
u
c4'*
Vsn,- o.cw1T^'+
T,* wsL^, *Jl- *"t
*f .
L,
o"l" ,
st'*ll fo*1r
1/**
't'-rt
^n'-*k- 0+ Lru^r /^'* ery"^t
l^Y*,ru#*)i
L't"' 1"*V ';J
:J t'b"'"
'71"'*
v
-'3' +"u,
*
^-
";trr|ul;L L ud",-i^t'
1'r'^'
Le
l'T*
k
'l=tr
,-rh o[ J"#-r f/f'
se^nh"
"4
LLsL\r
i'e'
L"^; uf'h'
t
'
t)"*^l fu#
^iu) A^L
u^J.-
@
o
LU;"
k
s.'sl'^'
u*?fr
tLu
At
:
":*
(iiil
f,*
\ '/ ?it4^!l
lvJu
tLk
NJLt""r
, '-nn*'t* aN
aJ alv /'v'*\e t'M't'\'t thA*
AJ
^*tr
t''^'l' l'
'n;'t*ln't
Lu ''^Jl'u'
r'*!' l-""u A'bW'y P"*A td
A'*l*
T-"'*r
tLt,
'"'i
H^u
d'r
To^"^
to
tl," ,yr*
A o"'-i 'l
ffJi'r **
f::;:,
T
'o' o|*, n^0,-: fl
u tot
o^.r
,
;;^": ^^k'
rn niL
t,
?v
vse,{
L"
.1- jr,e
AL-'*tt
r:;
P,#ot, T{ i;',*
**
:..''
tr ^*
'**f \*;
^*
11*
nt^^^l*
,*
,H"'r^u,l
r"
Y;* n '3 r*l
tn^';. 6
,!i^'"-r.*,.
,,..,oJ-p...J^,
unrnsJ tol*
c",iA vL-u'
o^. ,a-
y^|,u,* :",,,"';:u)
ffi
1dn^''
f,V
,u'o^" l'K'-n rt"*fu
i';f*^,;,fu^:",
btr M^d
u;r
tutt^l.ts +o*
g'[' 4.r
IL, F'#1*
b
*o
l*(* r7fr*
"t*"1,
/
/D'LL
*
oZ"
;^'
t" Y,ulV
^',I
I o
] #\.ff:;
I
M*
'**
*
'LJl
)p*''*""
Download