diff options
| author | 蒋维 <[email protected]> | 2021-02-20 14:57:37 +0800 |
|---|---|---|
| committer | 蒋维 <[email protected]> | 2021-02-20 14:57:37 +0800 |
| commit | 358d9f0f4562cc6b68ac31d8efe9cff21d24029c (patch) | |
| tree | 76663be68bb25c4628b01ca5967f6bf75df90d23 | |
| parent | 0cbbab5c3ca17501a966570e89aa77a4f79deee5 (diff) | |
init
49 files changed, 13196 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..c4af295 --- /dev/null +++ b/.gitignore @@ -0,0 +1,17 @@ +*blx.bib +*.aux +*.bbl +*.blg +*.lof +*.log +*.lot +*.out +*.run.xml +*.synctex.gz +*.toc +*.bcf +*.fdb_latexmk +*.fls +*.lol +example-thesis/cleanthesis.sty +dist
\ No newline at end of file diff --git a/CHANGELOG.md b/CHANGELOG.md new file mode 100644 index 0000000..6d750d6 --- /dev/null +++ b/CHANGELOG.md @@ -0,0 +1,87 @@ +--- + +CHANGELOG.md +Copyright 2020 R. Langner + +This work may be distributed and/or modified under the +conditions of the LaTeX Project Public License, either version 1.3 +of this license or (at your option) any later version. +The latest version of this license is in + http://www.latex-project.org/lppl.txt +and version 1.3 or later is part of all distributions of LaTeX +version 2005/12/01 or later. + +This work has the LPPL maintenance status `maintained'. + +The Current Maintainer of this work is R. Langner. + +This work consists of all files listed in MANIFEST.md. + +--- + +# Clean Thesis changelog + +The latest version of this file can be found at the master branch of the +*Clean Thesis* [repository](https://github.com/derric/cleanthesis). + +## Latest Dev +- ... + +## v0.4.1 +- Updated copyright year + +## v0.4.0 +- Fixed compatibility to new version of KOMA script +- Fixed code for headline/title styles (e.g., removed use of package titlesec) +- Fixed code for footer style (e.g., removed use of package fancyhdr) +- Fixed compatibility to new version of biblatex (e.g., obsolete options) +- Fixed an issue with page breaks at headings (thanks @guillerodriguez) +- Added style for part sections (often used for books) +- Added new package options: quotation style, bibliography sorting, +- Changed alignment of titles from justified to left aligned +- Changed the documentation according the updates +- Changed file structure of the repository in order to improve the development and release process +- Example: several improvements, such as location of appendix, use of subsubsections and paragraphs, long section titles, listings, pdf bookmark for toc, or separate config file + +## v0.3.1 +- re-licensed cleanthesis using the LPPL 1.3, http://www.latex-project.org/lppl.txt +- moved documentation into a separate subfolder (doc/) +- Example: change specific version number to a more general value (My First Draft). + +## v0.3 +- Created this changelog text file +- Switched to markdown files (README, CHANGELOG) +- Added a sub-section in the example thesis +- Fixed README. Corrected copyright statement (year), wording and link to classicthesis (moschlar) +- Fixed broken package option/parameter colorize (hrzbrg) +- Fixed changing font size of the document to small caused by a bug in the titlepage (matthieu-lapeyre) +- Fixed documentation. Added missing descriptions for package options: hangfigurecaption, hangsection, hangsubsection, colorize, and colortheme +- Fixed line height for the title on the very first title page (Riin) +- Fixed colored title on title page, even if color mode is bw +- New package option bibfile: allows you to link/use arbitrary bibtex files +- New package option bibstyle: allows you to set a citation and bibliography style + +## v0.2.3 +- Fixed line breaks for long chapter headlines (caused text overlapping) +- Fixed wrong file names to the main latex file for the example document + +## v0.2.2 +- Fix: added address for postcards +- Doc: improved acknowledgments, added André Miede + +## v0.2.1 +- Fix: make horizontal line longer (just a bit) +- Fix: update my address (new) +- Change: add my name to the colophon +- Change: copyright years +- Feature: new package option for citation management tool (bib engine), biber or bibtex +- Doc: add first people to acknowledgments + +## v0.2 +- Fix: label widths in the lof and lot (list of figures, list of tables) +- Feature: more flexible/new package options +- Feature: improved color management, introduction of color themes (currently two) +- Doc: Initial documentation (package options) + +## v0.1 +- Initial public beta version diff --git a/MANIFEST.md b/MANIFEST.md new file mode 100644 index 0000000..c9070f4 --- /dev/null +++ b/MANIFEST.md @@ -0,0 +1,34 @@ +--- + +MANIFEST.md +Copyright 2020 R. Langner + +This work may be distributed and/or modified under the +conditions of the LaTeX Project Public License, either version 1.3 +of this license or (at your option) any later version. +The latest version of this license is in + http://www.latex-project.org/lppl.txt +and version 1.3 or later is part of all distributions of LaTeX +version 2005/12/01 or later. + +This work has the LPPL maintenance status `maintained'. + +The Current Maintainer of this work is R. Langner. + +This work consists of all files listed in MANIFEST.md. + +--- + +# CONTENTS OF THE CLEANTHESIS STYLE + +``` +cleanthesis/ +|-- CHANGELOG.md - changelog file +|-- cleanthesis.sty - the cleanthesis style +|-- MANIFEST.md - this file +|-- README.md - readme file +|-- VERSION - the version of the style +|-- doc/ + |-- cleanthesis-doc.tex - documentation source + |-- cleanthesis-doc.pdf - generated documentation +``` diff --git a/TSG_Administrator's_Guide/Guide_Setup.tex b/TSG_Administrator's_Guide/Guide_Setup.tex new file mode 100644 index 0000000..fcb08a9 --- /dev/null +++ b/TSG_Administrator's_Guide/Guide_Setup.tex @@ -0,0 +1,244 @@ +% !TEX root = TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex + + +% ************************************************** +% Files' Character Encoding +% ************************************************** +\PassOptionsToPackage{utf8}{inputenc} +\usepackage{inputenc} + + +% ************************************************** +% Information and Commands for Reuse +% ************************************************** +\newcommand{\thesisTitle}{TSG Administrator’s Guide} +\newcommand{\thesisName}{JW} +\newcommand{\thesisSubject}{Documentation} +\newcommand{\thesisDate}{January 21, 2021} +\newcommand{\thesisVersion}{20.11} + +%下面的新命令暂时没有用。 +\newcommand{\thesisFirstReviewer}{Jane Doe} +\newcommand{\thesisFirstReviewerUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisFirstReviewerDepartment}{Department of Clean Thesis Style} + +\newcommand{\thesisSecondReviewer}{John Doe} +\newcommand{\thesisSecondReviewerUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisSecondReviewerDepartment}{Department of Clean Thesis Style} + +\newcommand{\thesisFirstSupervisor}{Jane Doe} +\newcommand{\thesisSecondSupervisor}{John Smith} + +\newcommand{\thesisUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisUniversityDepartment}{Department of Clean Thesis Style} +\newcommand{\thesisUniversityInstitute}{Institute for Clean Thesis Dev} +\newcommand{\thesisUniversityGroup}{Clean Thesis Group (CTG)} +\newcommand{\thesisUniversityCity}{City} +\newcommand{\thesisUniversityStreetAddress}{Street address} +\newcommand{\thesisUniversityPostalCode}{Postal Code} + +%新增的自定义的命令 +\newcommand{\tabincell}[2]{\begin{tabular}{@{}#1@{}}#2\end{tabular}} + +% ************************************************** +% Debug LaTeX Information +% ************************************************** +%\listfiles + + +% ************************************************** +% Load and Configure Packages +% ************************************************** +\usepackage[english]{babel} % babel system, adjust the language of the content +\PassOptionsToPackage{% setup administrator's guide style + figuresep=colon,% + hangfigurecaption=false,% + hangsection=true,% + hangsubsection=true,% + sansserif=false,% + configurelistings=true,% + colorize=full,% + colortheme=bluemagenta,% + configurebiblatex=true,% + bibsys=biber,% + bibfile=bib-refs,% + bibstyle=alphabetic,% + bibsorting=nty,% +}{cleanthesis} +\usepackage{cleanthesis} + +\hypersetup{% setup the hyperref-package options + pdftitle={\thesisTitle}, % - title (PDF meta) + pdfsubject={\thesisSubject},% - subject (PDF meta) + pdfauthor={\thesisName}, % - author (PDF meta) + plainpages=false, % - + colorlinks=false, % - colorize links? + pdfborder={0 0 0}, % - + breaklinks=true, % - allow line break inside links + bookmarksnumbered=true, % + bookmarksopen=true % +} + +% ************************************************** +% Other Packages +% ************************************************** +\usepackage{scrhack} +\usepackage{color} +\definecolor{gold}{RGB}{205,153,16} +\definecolor{linkblue}{RGB}{2,112,172} +\definecolor{darkblue}{RGB}{47,84,150} + + +\usepackage{amssymb}% http://ctan.org/pkg/amssymb +\usepackage{pifont}% http://ctan.org/pkg/pifont +\usepackage{wasysym} +\newcommand{\cmark}{\ding{51}}% +\newcommand{\xmark}{\ding{55}}% +\newcommand{\arrowmarkr}{\ding{224}} +\newcommand{\notemark}{\textcolor{linkblue}{\ding{46}}}% +\newcommand{\warnmark}{\textcolor{linkblue}{\ding{45}}}% +\newcommand{\sixsnow}{\ding{100}} +\usepackage{enumerate} +\usepackage{enumitem} + +\setenumerate[1]{itemsep=0pt,partopsep=0pt,parsep=0pt,topsep=0pt} +\setitemize[1]{itemsep=0pt,partopsep=0pt,parsep=0pt,topsep=0pt} +\setdescription{itemsep=0pt,partopsep=0pt,parsep=0pt,topsep=0pt} + +%\setlist[enumerate,1]{labelsep=1.5mm,topsep=0mm,itemsep=-0.8mm} +%\setlist[enumerate,2]{labelsep=1.5mm,topsep=-0.8mm,itemsep=-0.8mm} + +%\setlist[description,1]{labelsep=1.5mm,topsep=0mm,itemsep=-0.8mm} +%\setlist[description,2]{labelsep=1.5mm,topsep=-0.8mm,itemsep=-0.8mm} + +%\setlist[itemize,1]{labelsep=1.5mm,topsep=0mm,itemsep=-0.8mm} +%\setlist[itemize,2]{labelsep=1.5mm,topsep=-0.8mm,itemsep=-0.8mm} + +%\setlist[enumerate,2]{label=(\alph*).,font=\textup, leftmargin=7mm,labelsep=1.5mm,topsep=-0.8mm,itemsep=-0.8mm} +% \setenumerate[1]{itemsep=0pt,partopsep=0pt,parsep=\parskip,topsep=5pt} +% \setitemize[1]{itemsep=0pt,partopsep=0pt,parsep=\parskip,topsep=5pt} +% \setdescription{itemsep=0pt,partopsep=0pt,parsep=\parskip,topsep=5pt} + + +% \usepackage[table,xcdraw]{xcolor} +% If you use beamer only pass "xcolor=table" option, i.e. \documentclass[xcolor=table]{beamer} +% \usepackage[normalem]{ulem} +\usepackage{tabularx} +\usepackage{longtable} +\usepackage{booktabs} +%\usepackage[table]{xcolor} +\usepackage{color} +\usepackage{colortbl} +\usepackage{multirow} +\usepackage{array} +\usepackage{shortvrb} +\usepackage{graphicx} + +\newcommand{\vlinewhite}{\color{white}\vrule width 0.5pt} +\newcommand{\vlineblack}{\color{black}\vrule width 0.5pt} +%\newcommand{\thickhline}{% +% \noalign {\ifnum 0=`}\fi \hrule height 1pt +% \futurelet \reserved@a \@xhline +%} + +\usepackage{scrlayer-scrpage} + +%% Page number for odd (right) pages +\renewcommand{\ctfooterrightpagenumber}{% +%\sectionmark + \ctfooterline% + \hspace*{10pt}% + \begin{minipage}[b]{1.5cm}% + \pagemark % + \end{minipage}% +} + +%% Page number for even (left) pages +\renewcommand{\ctfooterleftpagenumber}{% + \begin{minipage}[b]{1.5cm}% + \raggedleft\pagemark% + \end{minipage}% + \hspace*{10pt}% + \ctfooterline% + \hspace*{0.75cm}% + TSG Administrator's Guide +} +\renewcommand{\chaptermark}[1]{% + \markboth{% + \ctfontfootertext + % use \@chapapp instead of \chaptername to avoid + % 'Chapter A Appendix ...', thanks to @farbverlust (issue #47) + {\color{ctcolorfootermark}\textbf{\@chapapp \thechapter}}% + \hspace{.25cm}% + \protect\begin{minipage}[t]{.65\textwidth}% + #1% + \protect\end{minipage}% + }{}% +} + +\lefoot[% > plain + \ctfooterleftpagenumber% +]{% > srcheadings + \ctfooterleftpagenumber% + %\chaptermark +} +\rofoot[% > plain + \ctfooterrightpagenumber% +]{% > srcheadings + TSG Administrator's Guide + \hspace*{0.75cm}% + \ctfooterrightpagenumber% +} + +%---------------------------------------------------------------------------------------- +% TOC, LOF & LOT +%---------------------------------------------------------------------------------------- + +\RequirePackage{tocbasic}% +\usepackage{tocbasic} +% Show an entry for the TOC in the TOC +\setuptoc{toc}{totoc}% + +% Choose the levels in table of contents +\setcounter{tocdepth}{\subsectiontocdepth} + +% Define the style for toc entries +\DeclareTOCStyleEntries[indent=0em,numwidth=2em,dynnumwidth=yes,pagenumberwidth=2.1em]{tocline}{figure,table} +\DeclareTOCStyleEntries[dynnumwidth=yes]{tocline}{subsubsection,subsection,section,chapter,part} +\DeclareTOCStyleEntries[pagenumberwidth=2.5em]{tocline}{chapter,part} +\DeclareTOCStyleEntries[pagenumberwidth=2.1em]{tocline}{subsubsection,subsection,section} + + +\RequirePackage{etoc} % Required to insert local tables of contents +\usepackage{etoc} +\newcounter{margintocdepth} % Set the depth of the margintoc +\setcounter{margintocdepth}{\subsectiontocdepth} + +\newlength{\mtocshift} % Length of the vertical offset used for margin tocs +%\setlength{\mtocshift}{-52\vscale} + +% Command to print a table of contents in the margin +\newcommand{\margintoc}[1][\mtocshift]{ % The first parameter is the vertical offset; by default it is \mtocshift + \begingroup% + % Set the style for section entries + \etocsetstyle{section}% + {\parindent -5pt \parskip 3pt}% + {\leftskip 20pt \rightskip 12pt} % + {\hspace{0.01cm}\llap{\etocnumber\hspace{0.1cm}}\etocname\nobreak\leaders\hbox{\hbox to 1.5ex {\hss.\hss}}\hfill\makebox[-0.1cm][l]{\etocpage}\par}% + {}% + % Set the style for subsection entries + \etocsetstyle{subsection}% + {\parindent -5pt \parskip 0pt}% + {\leftskip 20pt \rightskip 12pt}% + {\hspace{0.01cm}\llap{\hspace{0.1cm}}\etocname\nobreak\leaders\hbox{\hbox to 1.5ex {\hss.\hss}}\hfill\makebox[-0.1cm][l]{\etocpage}\par}% + {}% + % Set the global style of the toc + %\etocsettocstyle{}{} + %\etocsettocstyle{\normalfont\sffamily\normalsize}{} + \etocsettocstyle{\usekomafont{section}\small}{}% + \etocsetnexttocdepth{\themargintocdepth}% + % Print the table of contents in the margin + \marginnote[#1]{\localtableofcontents}% + \endgroup% +} + diff --git a/TSG_Administrator's_Guide/TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex b/TSG_Administrator's_Guide/TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex new file mode 100644 index 0000000..db5481b --- /dev/null +++ b/TSG_Administrator's_Guide/TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex @@ -0,0 +1,134 @@ +% ************************************************** +% Document Class Definition +% ************************************************** +\documentclass[% + paper=A4, % paper size --> A4 is default in Germany + twoside=true, % onesite or twoside printing + openright, % doublepage cleaning ends up right side + parskip=half, % spacing value / method for paragraphs + chapterprefix=true, % prefix for chapter marks + 11pt, % font size + headings=normal, % size of headings + bibliography=totoc, % include bib in toc + listof=totoc, % include listof entries in toc + titlepage=on, % own page for each title page + captions=tableabove, % display table captions above the float env + chapterprefix=false, % do not display a prefix for chapters + appendixprefix=false, % but display a prefix for appendix chapter + draft=false, % value for draft version +]{scrreprt}% + + +% ************************************************** +% Setup YOUR thesis document in this file ! +% ************************************************** +\input{Guide_Setup} +%\input TABLES + +% ************************************************** +% Document CONTENT +% ************************************************** +\begin{document} + +% uncomment the following command to fill up pages with +% whitespace instead of aligning the first and last lines +% of a page (see \raggedbottom vs. \flushbottom) +%\raggedbottom + +% -------------------------- +% rename document parts +% -------------------------- + +% > set short label names for floating environments figure and table +%\renewcaptionname{ngerman}{\figurename}{Abb.} +%\renewcaptionname{ngerman}{\tablename}{Tab.} +\renewcaptionname{english}{\figurename}{Fig.} +\renewcaptionname{english}{\tablename}{Tab.} + +% > rename the title of the LOL, i.e. list of listings (default is "Listings") +\renewcommand*{\lstlistlistingname}{List of Listings} + +% -------------------------- +% Front matter +% -------------------------- +\pagestyle{empty} % no header or footers +\input{content/titlepage} % INCLUDE: all titlepages +\clearpage +% +\pagenumbering{roman} +\setcounter{page}{1} +\currentpdfbookmark{\contentsname}{toc} +\begingroup % Local scope for the following commands + +% Define the style for the TOC, LOF, and LOT +%\setstretch{1} % Uncomment to modify line spacing in the ToC +%\hypersetup{linkcolor=blue} % Uncomment to set the colour of links in the ToC + + + +\setcounter{tocdepth}{2} % define depth of toc +\tableofcontents % display table of contents + +\endgroup +\cleardoublepage + +% -------------------------- +% Body matter +% -------------------------- +\pagenumbering{arabic} % arabic page numbering +\setcounter{page}{7} % set page counter +\pagestyle{scrheadings} % header and footer style + +%% Uncomment the following lines using the \part command +%% to add part sections +%\part{Chapter Part} +\input{content/Getting_Started} % INCLUDE: Getting_Started +\cleardoublepage +\input{content/Policies} % INCLUDE: Policies +\cleardoublepage +\input{content/Objects} % INCLUDE: Objects +\cleardoublepage +\input{content/Decryption} % INCLUDE: Decryption +\cleardoublepage +\input{content/Monitoring} % INCLUDE: Monitoring +\cleardoublepage +\input{content/Advanced_Setting} % INCLUDE: Advanced_Setting +\cleardoublepage + +%\part{Appendix Part} +\input{content/Appendix_A} % INCLUDE: Appendix_A +\cleardoublepage +\input{content/Appendix_B} % INCLUDE: Appendix_B +\cleardoublepage +\input{content/Appendix_C} % INCLUDE: Appendix_C +\cleardoublepage +\input{content/Appendix_D} % INCLUDE: Appendix_D +\cleardoublepage +\input{content/Appendix_E} % INCLUDE: Appendix_E +\cleardoublepage +\input{content/Appendix_F} % INCLUDE: Appendix_F +\cleardoublepage + +% -------------------------- +% Back matter +% -------------------------- +% +{% +\setstretch{1.1} +\renewcommand{\bibfont}{\normalfont\small} +\setlength{\biblabelsep}{0pt} +%\setlength{\bibitemsep}{0.5\baselineskip plus 0.5\baselineskip} +\setlength{\bibitemsep}{0pt} +\printbibliography[nottype=online] +\newrefcontext[labelprefix={@}] +\printbibliography[heading=subbibliography,title={Webpages},type=online] +} +\cleardoublepage + +\input{../example-thesis/content/colophon} +\cleardoublepage + +% ************************************************** +% End of Document CONTENT +% ************************************************** +\end{document} diff --git a/TSG_Administrator's_Guide/content/Advanced_Setting.tex b/TSG_Administrator's_Guide/content/Advanced_Setting.tex new file mode 100644 index 0000000..73abaca --- /dev/null +++ b/TSG_Administrator's_Guide/content/Advanced_Setting.tex @@ -0,0 +1,107 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Advanced Setting}{Advanced Setting} +\chapter*{\hypertarget{link:Advanced Setting}{Advanced Setting}} +\label{sec:setting} + +This section contains information about configuring TSG advanced features, including: + +{ +\color{linkblue} +\hyperlink{link:Proxy TCP Options}{> Proxy TCP Options} \\ +\hyperlink{link:System Usage }{> System Usage } \\ +} +\clearpage + +\pdfbookmark[1]{Proxy TCP Options}{Proxy TCP Options} +\section*{\hypertarget{link:Proxy TCP Options}{Proxy TCP Options}} +\label{sec:setting:tcp} + +TSG provides TCP default option which keeps the Enable TCP Passthrough and Bypass Duplicated Packet off. However, you can Create your own Proxy TCP Options for special situations. Under certain boundary conditions of network transmission, some network parameters need to be renegotiated during network transmission, such as MTU. The network equipment will renegotiate network parameters through some mechanisms, and the negotiation process may not under precise monitor of TSG. And it may affect related policies. In this case, the affected network parameters need to be preset through the PROXY TCP OPTION. + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Advanced} > \textbf{Proxy TCP Options}, and click \textbf{Create}. + \item[STEP 2.] Specify Proxy TCP Options name and effective scope. + \begin{enumerate} + \item Enter a descriptive \textbf{Name}. + \item Specify single or multiple \textbf{Source} IP Addresses/ Subscriber IDs or leave the value set to any. + \item Specify one or multiple \textbf{Destination} IP Addresses or leave the value set to any. + \item (\textcolor{gold}{Optional}) Specify a \textbf{Filter}. For example, add \textbf{SNI} and select a \textbf{Category} or an \textbf{FQDN}. If you select a category, only traffic is destined for that specified category will be effective. + \end{enumerate} + \item[STEP 3.] Enable Proxy TCP Options. + \begin{enumerate} + \item (\textcolor{gold}{Optional})\textbf{Enable TCP Passthrough}. When enabled, traffic will bypass TSG proxy system but will not be decrypted. You can enable it, when troubleshooting. + \item (\textcolor{gold}{Optional})Enable \textbf{bypass Duplicated Packet}. + \item Specify Client-side Parameters and Server-side Parameters respectively. They have the same options. + \begin{enumerate} + \item (\textcolor{gold}{Optional})Enable \textbf{Override MSS}. The MSS range: 536-1460. + \item (\textcolor{gold}{Optional})Enable \textbf{No Delay}. + \item Specify \textbf{TTL}. The TTL range: 1-255. + \item (\textcolor{gold}{Optional})Enable \textbf{Keepalive}. Specify \textbf{Probe Number}, \textbf{Idle Time} and \textbf{Interval}. Probe Number is the maximum number of keepalive probes TCP should send before dropping the connection. Idle Time is the time (in seconds) the connection needs to remain idle before TCP starts sending keepalive probes, if the socket option SO\_KEEPALIVE has been set on this socket. Interval is the time (in seconds) between individual keepalive probes. These three options should not be used in code intended to be portable. + \item Define \textbf{User Timeout}. The User Timeout range: 200\-60000. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +You can \textbf{Edit} or \textbf{Delete} your customized Proxy TCP Options. + +\pdfbookmark[1]{System Usage}{System Usage} +\section*{\hypertarget{link:System Usage}{System Usage}} +\label{sec:setting:usage} + +System usage displays policy and object usage in bar chart and also shows storage usage of files, traffic logs, reports and metrics. Files are unstructured logs carried by session records and will store at least one month by default. Traffic Logs include all four types of logs and will also store at least one month by default. Reports and Metrics are the predefined or customized data aggregated based on multiple dimensions and will store at least one year by default. + + +TSG automatically deletes logs and reports that exceed the expiration period. When TSG reaches the storage quota, it automatically deletes older data. Deleting operates every day at 24:00. + + +You can estimate server storage space and configure storage parameters. For your convenience, provide the following formula to calculate your required server count. + + +\textbf{Server Count} = Logs/sec*Storage Days *86400*Log Size *0.4*RF/ (Disk storage per server*0.7) + + +• Logs/sec: log rate, the log records count generated per second. + + +• Log Size: the average size of each log, and 1KB will be used in storage calculating as average size. + + +• Compression Rate: For TSG logs storage, it is 0.4. + + +• RF: Replication Factor, it is the count of copies on your server. E.g., setting RF=2 means the storage usage will be double of the real size of logs, files, reports and metrics. + + +• Interval in seconds: 86400, Seconds of a day. + + +• Disk Safety Factor: it is normally 0.7. It means 70\% of the storage will be used for runtime data of TSG, including logs, files, reports and metrics. The others will occupy the remaining 30\%, such as OS, Raid5 and temporary data. + + +Following are some calculation for a typical scenario: + + +Suppose there is a data center which is configured to handle the traffic of mainstream website and applications by TSG. The log rate of session records is 2000/s; the log rate of event logs is 1500/s; the planed storage days is 30 for event logs with files, so does the storage of session records. The RF of event logs storage is set to 2 since event logs, which is raised by hit policies, require more attention. While the RF of session records is set to 1. + + +• Storage of session records: 2000*30*86400*1KB*0.4*1 = 1.93TB + + +• Storage of event logs: 1500*30*86400*1KB*0.4*2 = 2.9TB + + +In this scenario, the storage space for Files is generally smaller than 150\% of storage of session records. The storage space for metrics, which is the data of calculation to set up Mainboard and Live Chart, is less than 100MB every day while the storage space required for reports depends on their complexity and quantity. + + +To configure Storage Usage and expiration period: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Advanced} > \textbf{System Usage}. It displays Storage Usage percentage for Reports and Metrics, Files and Traffic Logs. You can view History Log Storage by time. + + +\warnmark\textit{Warning: Please take caution when performing STEP 2 and STEP 3, because this operation is not recoverable.} + \item[STEP 2.] (\textcolor{gold}{Optional})Click \textbf{Setting}. Check \CheckedBox I understand the risks. Enter the Max Days for each type and Click \textbf{OK}. TSG will delete logs and reports that exceed the expiration period. It may take a long time, during which the maximum sustainable log rate will degrade. + \item[STEP 3.] (\textcolor{gold}{Optional})To clear data once, click \textbf{Clear} to Clear Traffic Logs, Clear Reports and Metrics, Clear Files or Clear All Data. +\end{description}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Appendix_A.tex b/TSG_Administrator's_Guide/content/Appendix_A.tex new file mode 100644 index 0000000..22fd428 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_A.tex @@ -0,0 +1,80 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix A Built-in Category}{Appendix A Built-in Category} +\chapter*{\hypertarget{link:Appendix A Built-in Category}{Appendix A Built-in Category}} +\label{sec:appendix_a} + +Built-in Category +\begin{longtable}{p{0.14\textwidth}|p{0.2\textwidth}|p{0.62\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Dimension}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Label}} & \textcolor{white}{Description} \\\hline + \multirow{22}{*}{Function} & adv & All about advertising: This includes sites offering banners and banner creation as well as sites delivering banners to be shown in webpages. Advertising companies are listed, too. \\ \cline{2-3} + & anonvpn & This category covers sites providing VPN services to the public. The focus is on VPN sites used to hide the origin of the traffic like tor nodes. \\ \cline{2-3} + & audio-video & Some audio and video sites. \\ \cline{2-3} + & bitcoin & Sites for bitcoin mining. \\ \cline{2-3} + & cleaning & Sites to disinfect, update and protect computers.\\ \cline{2-3} + & downloads & This covers mostly filesharing, p2p and torrent sites. Other download sites (for software, wallpapers...) are included as well. \\ \cline{2-3} + & filehosting & Websites which host files (pictures, video, ...) \\ \cline{2-3} + & forums & Discussion sites. Covered explicit forum sites and some blogs. Sites where people can discuss and share information in a non-interactive/real-time way. Realtime discussions are covered with -> chat.\\ \cline{2-3} + & jobsearch & Site to looking for job.\\ \cline{2-3} + & redirector & Sites that actively help to bypass URL filters by accepting URLs via webform and play a proxying and redirecting role. \\ \cline{2-3} + & remotecontrol & Sites offering the service to remotely access computers, especially (but not limited to going) through firewalls. This includes using a third-party computer. Traditional VPN is not covered.\\ \cline{2-3} + & social networks & Sites bringing people together (social networking) be it for friendship or for business. \\ \cline{2-3} + & searchengines & Collection of search engines and directory sites.\\ \cline{2-3} + & tracker & Site keeping an eye on where you surf and what you do in a passive. Covers web bugs, counters and other tracking mechanism in web pages that do not interfere with the local computer yet collecting information about the surfing person for later analysis. Sites actively spying out the surfer by installing software or calling home sites are not covered with tracker but with -> spyware.\\ \cline{2-3} + & translation & Sites for translation\\ \cline{2-3} + & url shortener & Domains that can be used to shorten long URLs. The original (long) URL will be accessed after the short URL has been requested from the shortener. This distinguishes this category from redirector where the original URL is never accessed directly.\\ \cline{2-3} + & webmail & Webmail sites (hot mail like...)\\ \cline{2-3} + & webphone & Sites that enable user to phone via Internet/WWW. Any site where users can voice-chat with each other (normal chat sites, where users type their messages are part of chat, not web phone).\\ \cline{2-3} + & webradio & Sites that offer listening live radio streams.\\ \cline{2-3} + & CDN & Content Delivery Networks\\ \cline{2-3} + & blog & Some blog sites.\\ \cline{2-3} + & chat & Sites for real-time chatting and instant messaging. Everything that is not real-time is included in -> forum. \\\hline + \multirow{8}{*}{\begin{tabular}{l}\tabincell{l}{National\\ Security}\end{tabular}} & aggressive & Sites of obvious aggressive content. This covers hate speech and all kinds of racism.\\ \cline{2-3} + & Alcohol \& Tobacco & Sites which legally promote or sell alcohol/tobacco products and accessories.\\ \cline{2-3} + & science & Sites of institutions as well as of amateurs about all topics of astronomy, chemistry and science related\\ \cline{2-3} + & astrology & Sites to provide daily horoscopes, online tarot readings, psychic readings\\ \cline{2-3} + & bank & Online bank; Websites that feature banking and/or financial services.\\ \cline{2-3} + & celebrity & Famous people, actors, and magazine which talk about them \\ \cline{2-3} + & child & Any website allowed to child \\ \cline{2-3} + & cooking & Sites concerning food and food preparation. \\ \cline{2-3} + & drugs & Sites offering drugs or explain how to make drugs (legal and non-legal). Covers tabaco as well as viagra and similar substances. \\ \cline{2-3} + & humor & Humorous pages, comic strips, funny stories, everything which makes people laugh. \\ \cline{2-3} + & lingerie & Sites selling and presenting sexy lingerie or lingerie in a sexy manner. \\ \cline{2-3} + & gambling & Gambling and games sites, casino, etc.; Sites offering the possibility to win money. Poker, Casino, Bingo and other chance games as well as betting sites. Differs from ->games in the aspect of winning or losing money or being lured to do so. \\ \cline{2-3} + & games & Sites about online games (all kinds of browser-based games). The games are for fun only (no gamble).\\ \cline{2-3} + & mixed adult & Websites which contain adult sections unstructured\\ \cline{2-3} + & movies & Sites offering cinema programs, information about movies and actors. Sites for downloading video clips/movies (as long it is legal) are included as well.\\ \cline{2-3} + & music & Sites that offer the download of music, information about music groups or music in general.\\ \cline{2-3} + & news & Sites presenting news. Homepages from newspapers, magazines and journals as well as some blogs.\\ \cline{2-3} + & politics & Sites of political parties, political organizations and associations; sites with political discussions.\\ \cline{2-3} + & porn & Sites about all kinds of sexual content ranging from bare bosoms to hardcore porn and sm.\\ \cline{2-3} + & press & Any press (informational) site \\ \cline{2-3} + & sexualeducation & Websites which talk about sexual education, and can be mis-detected as porn; Sites explaining the biological functions of the body concerning sexuality as well as sexual health; this, too, covers sites for teenagers with questions about first love, first sex, and subjects related to these topics. This category does not cover porn. \\ \cline{2-3} + & shopping & Sites offering online shopping and price comparisons. \\ \cline{2-3} + & sports & All about sports: sports teams, sport discussions as well as information about sports people and the various sports themselves.\\ \cline{2-3} + & travel & Sites with information about foreign countries, travel companies, travel fares, accommodations and everything else that has to do with travel including travel blogs.\\ \cline{2-3} + & traffic & Sites concerning the business of commercial transportation by land, sea or air. \\ \cline{2-3} + & violence & Sites about killing and harming people. Covers anything about brutality and bestiality. \\ \cline{2-3} + & Real Estate & Websites that promote the sale or renting of real estate properties.\\ \cline{2-3} + & religion & Sites with religious content: all kind of churches, sects, religious interpretations and so on. \\ \cline{2-3} + & weapons & Sites offering all kinds of weapons or accessories for weapons: Firearms, knifes, swords, bows... Armory shops are included as well as sites holding general information about arms (manufacturing, usage).\\ \cline{2-3} + & Government and Legal Organizations & Government: Sites sponsored by branches, bureaus, or agencies of any level of government, except for the armed forces, including courts, police institutions, city-level government institutions. Legal Organizations: Sites that discuss or explain laws of various government entities.\\ \cline{2-3} + & financial & Sites relative financial information. \\ \cline{2-3} + & dating & Dating, matching site for single person; Sites to contact people for love and live together. He seeks her, she seeks him and so on.\\ \cline{2-3} + & health & Sites about treatments for feeling internally and externally healthy \\ \cline{2-3} + & art & Sites that cater to fine arts, cultural behaviors and backgrounds including conventions, artwork and paintings, music, languages, customs, etc. \\ \cline{2-3} + & computers & Sites for computers \\ \cline{2-3} + & reference & Sites for reference \\ \cline{2-3} + & Business & Sites for business \\ \cline{2-3} + & Home & Sites about everything required to create a cozy home \\ \cline{2-3} + & Recreation & Sites for recreation \\ \hline + \tabincell{l}{Regional\\ Related} & Justice Ministry's federal list & A list of works that were banned in Russia, primarily based on the Russian Internet Restriction Bill. \\ \hline + \multirow{6}{*}{\tabincell{l}{Network\\ Security}} & warez & Collection of sites offering programs to break license keys, license keys themselves, cracked software and other copyrighted material. \\ \cline{2-3} + & Phishing & Counterfeit web pages that duplicate legitimate business web pages for the purpose of eliciting financial, personal or other private information from the users. \\ \cline{2-3} + & Malicious Websites & Sites that host software that is covertly downloaded to a user's machine to collect information and monitor user activity, and sites that are infected with destructive or malicious software, specifically designed to damage, disrupt, attack or manipulate computer systems without the user's consent, such as virus or trojan horse. \\ \cline{2-3} + & malware & Any website which delivers malware \\ \cline{2-3} + & hacking & Sites that depict illicit activities surrounding the unauthorized modification or access to programs, computers, equipment and sites. \\ \cline{2-3} + & Domain Parking & Sites that simply are place holders of domains without meaningful content. \\ \hline + \multirow{2}{*}{\tabincell{l}{Minority\\ Language}} & Arabic & Arabic sites \\ \cline{2-3} + & Uyghur & Uyghur sites \\ \hline +\end{longtable}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Appendix_B.tex b/TSG_Administrator's_Guide/content/Appendix_B.tex new file mode 100644 index 0000000..928e0d3 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_B.tex @@ -0,0 +1,436 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix B Predefined Applications}{Appendix B Predefined Applications} +\chapter*{\hypertarget{link:Appendix B Predefined Applications}{Appendix B Predefined Applications}} +\label{sec:appendix_b} + +\begin{longtable}{p{0.12\textwidth}|p{0.03\textwidth}|p{0.16\textwidth}|p{0.16\textwidth}|p{0.45\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{\tabincell{l}{App\\ Name}}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{\tabincell{l}{App\\ ID}}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Category}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Subcategory}} & \textcolor{white}{Description} \\\hline + \tabincell{l}{Unknown\\\_TCP} & 100 & unknown & & \\ \hline + \tabincell{l}{Unknown\\\_UDP} & 101 & unknown & & \\ \hline + \tabincell{l}{Unknown\\\_Other} & 102 & unknown & & \\ \hline + DNS & 103 & networking & infrastructure & (Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. \\ \hline + FTP & 104 & general-internet & file-sharing & (File Transfer Protocol) A protocol used to transfer files over an IP network. \\ \hline + FTPS & 105 & general-internet & file-sharing & (FTP Secure) Transferring files over the secure sockets layer (SSL) protocol. \\ \hline + HTTP & 106 & general-internet & internet-utility & (HyperText Transfer Protocol) The communications protocol used to connect to Web servers on the Internet or on a local network (intranet).\\ \hline + HTTPS & 107 & general-internet & internet-utility & (HyperText Transport Protocol Secure) The protocol used to access a secure Web server.\\ \hline + ICMP & 108 & networking & ip-protocol & (Internet Control Message Protocol) A TCP/IP protocol used to send error and control messages. \\ \hline + IKE & 109 & networking & encrypted-tunnel & (Internet Key Exchange) A method for establishing a security association (SA) in the IPsec protocol. IKE authenticates users, negotiates the encryption method and exchanges the secret key. \\ \hline + MAIL & 110 & collaboration & email & \\ \hline + IMAPS & 111 & collaboration & email & IMAP (Internet Message Access Protocol) Secure \\ \hline + IPSEC & 112 & networking & encrypted-tunnel & (IP SECurity) A security protocol from the IETF that provides authentication and encryption over the Internet.\\ \hline + XMPP & 113 & networking & instant-messaging & Extensible Messaging and Presence Protocol\\ \hline + L2TP & 114 & networking & ip-protocol & \\ \hline + NTP & 115 & networking & infrastructure & \\ \hline + POP3S & 117 & collaboration & email & Pop3 (Post Office Protocol) Secure\\ \hline + PPTP & 118 & networking & infrastructure & \\ \hline + QUIC & 119 & networking & infrastructure & \\ \hline + SIP & 120 & collaboration & voip-video & (Session Initiation Protocol) A very simple text-based application-layer control protocol. It creates, modifies, and terminates sessions with one or more participants. Such sessions include Internet telephony and multimedia conferences.\\ \hline + SMB & 121 & business-systems & storage-backup & (Server Message Block) The file sharing protocol in DOS and Windows.\\ \hline + SMTPS & 123 & collaboration & email & (Simple Mail Transfer Protocol) Secure\\ \hline + SPDY & 124 & networking & encrypted-tunnel & (SPeeDY) A more efficient Web protocol from Google that is the basis of HTTP/2. \\ \hline + SSH & 125 & networking & encrypted-tunnel & (Secure SHell) A security protocol for logging into a remote server. SSH provides an encrypted session for transferring files and executing server programs. Also serving as a secure client/server connection for applications.\\ \hline + SSL & 126 & networking & encrypted-tunnel & (Secure Sockets Layer) An earlier security protocol that was the Internet standard prior to TLS. Developed by Netscape, SSL was widely used to validate the identity of a website and create an encrypted connection. \\ \hline + SOCKS & 127 & networking & proxy & (SOCKetS) A circuit-level proxy server for IP networks from the IETF. SOCKS is a general-purpose proxy that is typically used for non-HTTP traffic such as FTP, Telnet, etc. SOCKS4 handles TCP connections while SOCKS5 added support for UDP, ICMP, user authentication and hostname resolution.\\ \hline + TELNET & 128 & networking & remote-access & The Internet standard protocol for remote login. Runs on top of TCP/IP. Defined in STD 8, RFC 854 and extended with options by many other RFCs.\\ \hline + DHCP & 129 & networking & infrastructure & (Dynamic Host Configuration Protocol) The automatic assigning of IP addresses to client machines logging into an IP network.\\ \hline + RADIUS & 130 & business-systems & auth-service & (Remote Authentication Dial-In User Service) An authentication, authorization and accounting (AAA) protocol developed by Livingston Enterprises (later acquired by Lucent). RADIUS uses a challenge/response method for authentication and has been widely used prior to Diameter.\\ \hline + OPENVPN & 131 & networking & encrypted-tunnel & An open source virtual private network (VPN) protocol that is widely used by VPN services to provide anonymity and privacy to users. OpenVPN uses the OpenSSL library for encryption and authentication.\\ \hline + STUN & 132 & networking & infrastructure & (Session Traversal Utilities for NAT) An IETF protocol for real-time voice, video and messaging in an IP network. STUN provides the mechanism to communicate with users behind a network address translation (NAT) firewall, which keeps their IP addresses private within the local network (LAN).\\ \hline + TEREDO & 133 & networking & routing & \\ \hline + DTLS & 134 & networking & encrypted-tunnel & \\ \hline + DOH & 135 & networking & encrypted-tunnel & \\ \hline + ISAKMP & 136 & networking & encrypted-tunnel & (Internet Security Association and Key Management Protocol) A framework for establishing trusted interactions among entities using TCP/IP. \\ \hline + MDNS & 137 & networking & infrastructure & (Multicast DNS) Using IP multicast with DNS to provide the capabilities of a DNS server for service discovery in a small network that does not have a DNS server. \\ \hline + NETBIOS & 138 & networking & infrastructure & (Network Basic Input/Output System) It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. \\ \hline + NETFLOW & 139 & business-systems & management & Routers and switches that support NetFlow can collect IP traffic statistics on all interfaces where NetFlow is enabled, and later export those statistics as NetFlow records toward at least one NetFlow collector - typically a server that does the actual traffic analysis. \\ \hline + RDP & 140 & networking & encrypted-tunnel & (Remote Desktop Protocol) An input/output presentation protocol from Microsoft that governs the keyboard, mouse and screen formatting between clients and servers in a thin client environment. Based on the T.share protocol, RDP is used by Microsoft's Terminal Services and Remote Desktop Services to provide thin client, centralized architecture for the datacenter. \\ \hline + RTCP & 141 & media & photo-video & RTCP is a companion protocol to RTP that is used to maintain QoS. RTP nodes analyze network conditions and periodically send each other RTCP packets that report on network congestion.\\ \hline + RTP & 142 & media & photo-video & (Realtime Transport Protocol) An IP protocol that supports real-time transmission of voice and video. It is widely used for IP telephony and audio and video streaming.\\ \hline + SLP & 143 & networking & infrastructure & (Service Location Protocol) An IETF standard used to announce and discover services such as printers and file shares on an IP network. Apple used SLP prior to Mac OS 10.2, but migrated to its Bonjour technology. \\ \hline + SNMP & 144 & networking & infrastructure & (Simple Network Management Protocol) A widely used network monitoring and control protocol. Data are passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.).\\ \hline + SSDP & 145 & networking & infrastructure & (Simple Service Discovery Protocol) A standard for advertising services on a TCP/IP network and discovering them. \\ \hline + TFTP & 146 & general-internet & file-sharing & (Trivial File Transfer Protocol) A lightweight version of the FTP protocol that has no directory browsing or password capability.\\ \hline + BJNP & 147 & business-systems & management & \\ \hline + LDAP & 148 & business-systems & auth-service & (Lightweight Directory Access Protocol) A protocol used to access a directory listing in a TCP/IP network. LDAP is used to query network directories, email servers and other information repositories. \\ \hline + RTMP & 149 & media & photo-video & (Real-Time Messaging Protocol) A proprietary streaming protocol from Adobe that is supported in its Flash Media Server/Adobe Media Server platforms. RTMP defines "virtual channels" that operate independently (audio, video, control messages, etc.).\\ \hline + RTSP & 150 & media & photo-video & (RealTime Streaming Protocol) An application layer protocol used to transmit streaming audio, video and 3D animation over the Internet. It enables the user's client software to provide remote control of the server with functions such as pause, rewind and fast forward.\\ \hline +\end{longtable} + +\begin{longtable}{p{0.36\textwidth}|p{0.1\textwidth}|p{0.24\textwidth}|p{0.24\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{App Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{App ID}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Category}} & \textcolor{white}{Subcategory} \\\hline + alipay & 1100 & business-systems & management\\ \hline + baiduhd & 1200 & collaboration & instant-messaging\\ \hline + taobao & 1300 & general-internet & internet-utility\\ \hline + eleme & 1400 & general-internet & marketing \\ \hline + meituan & 1500 & general-internet & marketing \\ \hline + mobileqq & 1600 & collaboration & instant-messaging \\ \hline + MobileQQ & 1700 & general-internet & web-posting \\ \hline + pinduoduo & 1800 & general-internet & internet-utility \\ \hline + qq & 1900 & collaboration & instant-messaging \\ \hline + QQ.VoiceCalls & 1901 & collaboration & voip-video \\ \hline + QQ.VideoCalls & 1902 & collaboration & voip-video \\ \hline + QQ.Message & 1903 & collaboration & instant-messaging \\ \hline + QQ.MessageFile & 1904 & \tabincell{l}{general-internet\\ collaboration} & \tabincell{l}{file-sharing\\ voip-video} \\ \hline + QQ.Login & 1905 & business-systems & auth-service \\ \hline + qqfile & 2500 & general-internet & file-sharing \\ \hline + sougouseries & 2600 & collaboration & instant-messaging \\ \hline + webqq & 2700 & collaboration & instant-messaging \\ \hline + txweiyun & 2800 & general-internet & file-sharing \\ \hline + youdaonote & 2900 & business-systems & office-programs \\ \hline + baiduclouddisk & 3000 & general-internet & file-sharing \\ \hline + applepush & 3100 & general-internet & internet-utility \\ \hline + badoo & 3200 & collaboration & social-networking \\ \hline + Badoo.VideoCalls & 3201 & collaboration & voip-video \\ \hline + Badoo.Message & 3202 & collaboration & instant-messaging \\ \hline + Badoo.Live & 3203 & collaboration & photo-video \\ \hline + Badoo.SurfingWebs & 3204 & collaboration & social-networking \\ \hline + drugvokrug & 3700 & collaboration & instant-messaging \\ \hline + Drugvokrug.Message & 3701 & collaboration & instant-messaging \\ \hline + firechat & 3900 & collaboration & instant-messaging \\ \hline + googlepush & 4000 & general-internet & internet-utility \\ \hline + Mail.ruAgent & 4100 & collaboration & email \\ \hline + Mail.ruAgent.VideoCalls & 4101 & collaboration & email \\ \hline + Mail.ruAgent.Message & 4102 & collaboration & instant-messaging \\ \hline + MicrosoftUpdate & 4400 & business-systems & general-business \\ \hline + Odnoklassniki & 4500 & collaboration & social-networking \\ \hline + Odnoklassniki.VideoCalls & 4501 & collaboration & social-networking \\ \hline + Odnoklassniki.Message & 4502 & collaboration & instant-messaging \\ \hline + SignalPrivateMessenger & 4800 & collaboration & instant-messaging \\ \hline + \tabincell{l}{SignalPrivateMessenger.\\MessageFile} & 4801 & collaboration & instant-messaging \\ \hline + Skype & 5000 & collaboration & voip-video \\ \hline + Skype.VideoCalls & 5001 & collaboration & \tabincell{l}{voip-video\\ + file-sharing} \\ \hline + Skype.Message & 5002 & collaboration & instant-messaging \\ \hline + Skype.MessageFile & 5003 & collaboration & voip-video \\ \hline + Snapchat & 5400 & collaboration & instant-messaging \\ \hline + Telegram & 5500 & collaboration & instant-messaging \\ \hline + Telegram.VideoCalls & 5501 & collaboration & voip-video \\ \hline + Twitter & 5700 & collaboration & \tabincell{l}{auth-service\\ + social-networking} \\ \hline + Twitter.Message & 5701 & collaboration & social-networking \\ \hline + viber & 5800 & collaboration & voip-video \\ \hline + Viber.VoiceCalls & 5801 & collaboration & voip-video \\ \hline + Viber.Message & 5802 & collaboration & \tabincell{l}{auth-service\\ + voip-video} \\ \hline + Viber.MessageFile & 5803 & collaboration & file-sharing \\ \hline + Vkontakte & 6300 & collaboration & \tabincell{l}{instant-messaging\\ + auth-service\\ + social-networking} \\ \hline + Vkontakte.VideoCalls & 6301 & collaboration & voip-video \\ \hline + Vkontakte.Live & 6302 & collaboration & photo-video \\ \hline + Vkontakte.VOD & 6303 & collaboration & photo-video \\ \hline + WeChat & 6700 & collaboration & \tabincell{l}{auth-service\\ + instant-messaging} \\ \hline + WeChat.VideoCalls & 6701 & collaboration & voip-video \\ \hline + WeChat.Message & 6702 & collaboration & instant-messaging \\ \hline + WeChat.MessageFile & 6703 & general-internet & file-sharing \\ \hline + whatsapp & 7100 & collaboration & \tabincell{l}{auth-service\\ + instant-messaging} \\ \hline + WhatsApp.VideoCalls & 7101 & collaboration & \tabincell{l}{voip-video\\ + instant-messaging} \\ \hline + WhatsApp.Message & 7102 & collaboration & instant-messaging \\ \hline + WhatsApp.MessageFile & 7103 & general-internet & file-sharing \\ \hline + CMBMobileBank & 7400 & business-systems & general-business \\ \hline + ICBCMobileBank & 7500 & business-systems & general-business \\ \hline + bilibili & 7600 & media & photo-video \\ \hline + douyutv & 7700 & media & photo-video \\ \hline + facebook & 7800 & \tabincell{l}{media\\ + collaboration} & \tabincell{l}{photo-video\\ + auth-service\\ + social-networking} \\ \hline + Facebook.VideoCalls & 7801 & collaboration & voip-video \\ \hline + Facebook.Message & 7802 & collaboration & instant-messaging \\ \hline + Facebook.Live & 7803 & media & photo-video \\ \hline + Facebook.MessageFile & 7804 & media & photo-video \\ \hline + iqiyi & 8300 & media & photo-video \\ \hline + wangyiyunmusic & 8400 & media & audio-streaming \\ \hline + periscope & 8500 & media & photo-video \\ \hline + qqmusic & 8600 & media & audio-streaming \\ \hline + youtube & 8700 & media & photo-video \\ \hline + YouTube.Live & 8701 & media & photo-video \\ \hline + YouTube.VOD & 8702 & media & photo-video \\ \hline + YouTube.UploadFiles & 8703 & media & photo-video \\ \hline + YouTube.Search & 8704 & collaboration & web-posting \\ \hline + ArcadeVPN & 9200 & networking & encrypted-tunnel \\ \hline + Betternet & 9300 & networking & encrypted-tunnel \\ \hline + BrowsecVPN & 9400 & networking & encrypted-tunnel \\ \hline + DubkiVPN & 9500 & networking & encrypted-tunnel \\ \hline + EasyVPN & 9600 & networking & encrypted-tunnel \\ \hline + FishVPN & 9700 & networking & encrypted-tunnel \\ \hline + FoxVPN & 9800 & networking & encrypted-tunnel \\ \hline + VPNFrance & 9900 & networking & encrypted-tunnel \\ \hline + freegate & 10000 & networking & proxy \\ \hline + FreeVPNProxy & 10100 & networking & proxy \\ \hline + FreeVPNUnlimitedProxy & 10200 & networking & proxy \\ \hline + VPNGermany & 10300 & networking & proxy \\ \hline + GooseVPN & 10400 & networking & proxy \\ \hline + Heywire & 10500 & networking & proxy \\ \hline + HidemeVPN & 10600 & networking & proxy \\ \hline + hidemyass & 10700 & networking & proxy \\ \hline + HolaVPN & 10800 & networking & encrypted-tunnel \\ \hline + HotSpotshieldVPN & 10900 & networking & encrypted-tunnel \\ \hline + HotSpotVPN & 11000 & networking & encrypted-tunnel \\ \hline + LunaVPN & 11100 & networking & encrypted-tunnel \\ \hline + LuxVPN & 11200 & networking & encrypted-tunnel \\ \hline + VPNMalaysia & 11300 & networking & encrypted-tunnel \\ \hline + orbot & 11400 & networking & encrypted-tunnel \\ \hline + PandaVPN & 11500 & networking & encrypted-tunnel \\ \hline + psiphon & 11600 & networking & proxy \\ \hline + PureVPN & 11700 & networking & encrypted-tunnel \\ \hline + SecureVPN & 11800 & networking & encrypted-tunnel \\ \hline + SetupVPNChromeExtension & 11900 & networking & encrypted-tunnel \\ \hline + SuperVPN & 12000 & networking & encrypted-tunnel \\ \hline + SurfSharkVPN & 12100 & networking & proxy \\ \hline + Talk2 & 12200 & networking & proxy \\ \hline + ThunderVPN & 12300 & networking & proxy \\ \hline + TOROrbot & 12400 & networking & encrypted-tunnel \\ \hline + TunnelBear & 12500 & networking & encrypted-tunnel \\ \hline + TurboVPN & 12600 & networking & encrypted-tunnel \\ \hline + USAVPN & 12700 & networking & encrypted-tunnel \\ \hline + UVPN & 12800 & networking & encrypted-tunnel \\ \hline + VPNCanada & 12900 & networking & encrypted-tunnel \\ \hline + VPNIndonesia & 13000 & networking & encrypted-tunnel \\ \hline + VPNIndia & 13100 & networking & encrypted-tunnel \\ \hline + VPNJapan & 13200 & networking & encrypted-tunnel \\ \hline + VPNKorea & 13300 & networking & encrypted-tunnel \\ \hline + VPNProxyMaster & 13400 & networking & encrypted-tunnel \\ \hline + AvastVPN & 13500 & networking & encrypted-tunnel \\ \hline + VPNRussia & 13600 & networking & encrypted-tunnel \\ \hline + VPNTap2free & 13700 & networking & encrypted-tunnel \\ \hline + VPNUkraine & 13800 & networking & encrypted-tunnel \\ \hline + VPNUSA & 13900 & networking & encrypted-tunnel \\ \hline + VyprVPN & 14000 & networking & encrypted-tunnel \\ \hline + WolfVPN & 14100 & networking & encrypted-tunnel \\ \hline + Ultrasurf & 14200 & networking & encrypted-tunnel \\ \hline + ZenmateVPN & 14300 & networking & proxy \\ \hline + SecurityKiss & 14400 & networking & encrypted-tunnel \\ \hline + VPNOneClick & 14500 & networking & encrypted-tunnel \\ \hline + NordVPN & 14600 & networking & encrypted-tunnel \\ \hline + HoxxVPN & 14700 & networking & encrypted-tunnel \\ \hline + WindscribeVPN & 14800 & networking & encrypted-tunnel \\ \hline + TouchVPN & 14900 & networking & encrypted-tunnel \\ \hline + VPN365 & 15000 & networking & encrypted-tunnel \\ \hline + ProtonVPN & 15100 & networking & encrypted-tunnel \\ \hline + OVPNspider & 15200 & networking & encrypted-tunnel \\ \hline + BusinessVPN & 15300 & networking & encrypted-tunnel \\ \hline + VPNTT & 15400 & networking & encrypted-tunnel \\ \hline + FoxFlyRouter & 15500 & networking & encrypted-tunnel \\ \hline + LaowangVPN & 15600 & networking & encrypted-tunnel \\ \hline + SurfVPN & 15700 & networking & encrypted-tunnel \\ \hline + BaiJingVPN & 15800 & networking & encrypted-tunnel \\ \hline + FlexVPN & 15900 & networking & encrypted-tunnel \\ \hline + LionVPN & 16000 & networking & encrypted-tunnel \\ \hline + VPNIsrael & 16100 & networking & encrypted-tunnel \\ \hline + PandaVPNPro & 16200 & networking & encrypted-tunnel \\ \hline + LieBaoJiaSuQi & 16300 & networking & encrypted-tunnel \\ \hline + AceVPN & 16400 & networking & encrypted-tunnel \\ \hline + ShotVPN & 16500 & networking & encrypted-tunnel \\ \hline + McAfeeVPN & 16600 & networking & encrypted-tunnel \\ \hline + SmartVPN & 16700 & networking & encrypted-tunnel \\ \hline + RusVPN & 16800 & networking & encrypted-tunnel \\ \hline + VPNify & 16900 & networking & encrypted-tunnel \\ \hline + UnlockSecureFreeVPN & 17000 & networking & encrypted-tunnel \\ \hline + BestVPNProxy & 17100 & networking & encrypted-tunnel \\ \hline + MelonVPN & 17200 & networking & encrypted-tunnel \\ \hline + FreeUnlimitedVPNProxy & 17300 & networking & encrypted-tunnel \\ \hline + FreeVPNUnblockProxy & 17400 & networking & encrypted-tunnel \\ \hline + VPNProxyMasterPro & 17500 & networking & encrypted-tunnel \\ \hline + VPNProxyMasterLite & 17600 & networking & encrypted-tunnel \\ \hline + CyberGuardVPN & 17700 & networking & encrypted-tunnel \\ \hline + TopVPN & 17800 & networking & encrypted-tunnel \\ \hline + FreeZenVPN & 17900 & networking & encrypted-tunnel \\ \hline + VPNEasy & 18000 & networking & encrypted-tunnel \\ \hline + SetupVPN & 18100 & networking & encrypted-tunnel \\ \hline + VPNHub & 18200 & networking & encrypted-tunnel \\ \hline + FreeVPNWhiteKey & 18300 & networking & encrypted-tunnel \\ \hline + FreeVPNColorKey & 18400 & networking & encrypted-tunnel \\ \hline + EutVPN & 18500 & networking & encrypted-tunnel \\ \hline + UFOVPNBasic & 18600 & networking & encrypted-tunnel \\ \hline + FinchVPN & 18700 & networking & encrypted-tunnel \\ \hline + FlashVPN & 18800 & networking & encrypted-tunnel \\ \hline + LunaVPNFreeProxy & 18900 & networking & encrypted-tunnel \\ \hline + StarVPN & 19000 & networking & encrypted-tunnel \\ \hline + PlexVPN & 19100 & networking & encrypted-tunnel \\ \hline + DailyVPN & 19200 & networking & encrypted-tunnel \\ \hline + CyberGhostVPN & 19300 & networking & encrypted-tunnel \\ \hline + VPNLite & 19400 & networking & encrypted-tunnel \\ \hline + SnapVPN & 19500 & networking & encrypted-tunnel \\ \hline + VPNRobot & 19600 & networking & encrypted-tunnel \\ \hline + BESTVPN & 19700 & networking & encrypted-tunnel \\ \hline + JapanVPNMasterFree & 19800 & networking & encrypted-tunnel \\ \hline + IPVanishVPN & 19900 & networking & encrypted-tunnel \\ \hline + UnlimitedVPN & 20000 & networking & encrypted-tunnel \\ \hline + OneVPN & 20100 & networking & encrypted-tunnel \\ \hline + AppsverseAvVPN & 20200 & networking & encrypted-tunnel \\ \hline + CloudVPN & 20300 & networking & encrypted-tunnel \\ \hline + VPNInf & 20400 & networking & encrypted-tunnel \\ \hline + MelonVPNNew & 20500 & networking & encrypted-tunnel \\ \hline + GeckoVPN & 20600 & networking & encrypted-tunnel \\ \hline + Seed4MeVPN & 20700 & networking & encrypted-tunnel \\ \hline + MatrixVPN & 20800 & networking & encrypted-tunnel \\ \hline + ElectroVPN & 20900 & networking & encrypted-tunnel \\ \hline + BVPN & 21000 & networking & encrypted-tunnel \\ \hline + WASELProVPN & 21100 & networking & encrypted-tunnel \\ \hline + IWASEL & 21200 & networking & encrypted-tunnel \\ \hline + CatVPN & 21300 & networking & encrypted-tunnel \\ \hline + PhoneGuardianVPN & 21400 & networking & encrypted-tunnel \\ \hline + VpnBeaver & 21500 & networking & encrypted-tunnel \\ \hline + SpeedVPN & 21600 & networking & encrypted-tunnel \\ \hline + TroidVPN & 21700 & networking & encrypted-tunnel \\ \hline + SmallRabbitVPN & 21800 & networking & encrypted-tunnel \\ \hline + ArmadaVPN & 21900 & networking & encrypted-tunnel \\ \hline + GOVPN & 22000 & networking & encrypted-tunnel \\ \hline + IvacyVPN & 22100 & networking & encrypted-tunnel \\ \hline + VPNGO & 22200 & networking & encrypted-tunnel \\ \hline + Try2CatchVPN & 22300 & networking & encrypted-tunnel \\ \hline + BoxPN & 22400 & networking & encrypted-tunnel \\ \hline + VPNTunnel & 22500 & networking & encrypted-tunnel \\ \hline + VPNAI & 22600 & networking & encrypted-tunnel \\ \hline + FreeVPN & 22700 & networking & encrypted-tunnel \\ \hline + YinHeVPN & 22800 & networking & encrypted-tunnel \\ \hline + FreeSSVPN & 22900 & networking & encrypted-tunnel \\ \hline + FreeMikaVPN & 23000 & networking & encrypted-tunnel \\ \hline + AntVPN & 23100 & networking & encrypted-tunnel \\ \hline + WaspVPN & 23200 & networking & encrypted-tunnel \\ \hline + RejinderiFreeVPN & 23300 & networking & encrypted-tunnel \\ \hline + GoatVPN & 23400 & networking & encrypted-tunnel \\ \hline + SoloVPN & 23500 & networking & encrypted-tunnel \\ \hline + HouWangVPN & 23600 & networking & encrypted-tunnel \\ \hline + Nash & 23700 & networking & encrypted-tunnel \\ \hline + HOTVPN & 23800 & networking & encrypted-tunnel \\ \hline + WORLDVPN & 23900 & networking & encrypted-tunnel \\ \hline + HexatechVPN & 24000 & networking & encrypted-tunnel \\ \hline + R-VPN & 24100 & networking & encrypted-tunnel \\ \hline + SatuVPN & 24200 & networking & encrypted-tunnel \\ \hline + PolestarVPN & 24300 & networking & encrypted-tunnel \\ \hline + VPNMonster & 24400 & networking & encrypted-tunnel \\ \hline + BuddyVPN & 24500 & networking & encrypted-tunnel \\ \hline + VPNEARTH & 24600 & networking & encrypted-tunnel \\ \hline + FastFreeVPN & 24700 & networking & encrypted-tunnel \\ \hline + liquiduRocketVPN & 24800 & networking & encrypted-tunnel \\ \hline + TunnelLight & 24900 & networking & encrypted-tunnel \\ \hline + NetVPN & 25000 & networking & encrypted-tunnel \\ \hline + SmartLockVPN & 25100 & networking & encrypted-tunnel \\ \hline + BoxVPN & 25200 & networking & encrypted-tunnel \\ \hline + TheBestVPNHotspotMaster & 25300 & networking & encrypted-tunnel \\ \hline + VPNChina & 25400 & networking & encrypted-tunnel \\ \hline + VPNBlue & 25500 & networking & encrypted-tunnel \\ \hline + BlueVPN & 25600 & networking & encrypted-tunnel \\ \hline + VPNPlus & 25700 & networking & encrypted-tunnel \\ \hline + VPNBlue & 25800 & networking & encrypted-tunnel \\ \hline + VPNCity & 25900 & networking & encrypted-tunnel \\ \hline + FreshVPN & 26000 & networking & encrypted-tunnel \\ \hline + PhoenixVPN & 26100 & networking & encrypted-tunnel \\ \hline + LightVPN & 26200 & networking & encrypted-tunnel \\ \hline + BESTVPN & 26300 & networking & encrypted-tunnel \\ \hline + LvYeVPN & 26400 & networking & encrypted-tunnel \\ \hline + VPNBOTTLE & 26500 & networking & encrypted-tunnel \\ \hline + VPNExpress & 26600 & networking & encrypted-tunnel \\ \hline + PrivatixVPN & 26700 & networking & encrypted-tunnel \\ \hline + WhatsVPN & 26800 & networking & encrypted-tunnel \\ \hline + OrangeVPN & 26900 & networking & encrypted-tunnel \\ \hline + SuperVPN & 27000 & networking & encrypted-tunnel \\ \hline + LiteVPN & 27100 & networking & encrypted-tunnel \\ \hline + JustVPN & 27200 & networking & encrypted-tunnel \\ \hline + HoxxVPN & 27300 & networking & encrypted-tunnel \\ \hline + OmanVPN & 27400 & networking & encrypted-tunnel \\ \hline + TaiwanVPN & 27500 & networking & encrypted-tunnel \\ \hline + WangVPN & 27600 & networking & encrypted-tunnel \\ \hline + EgyptVPN & 27700 & networking & encrypted-tunnel \\ \hline + BrazilVPN & 27800 & networking & encrypted-tunnel \\ \hline + SpainVPN & 27900 & networking & encrypted-tunnel \\ \hline + NewZealandVPN & 28000 & networking & encrypted-tunnel \\ \hline + PhilippinesVPN & 28100 & networking & encrypted-tunnel \\ \hline + IndonesiaVPN & 28200 & networking & encrypted-tunnel \\ \hline + VPNBestVPN & 28300 & networking & encrypted-tunnel \\ \hline + FROGVPN & 28400 & networking & encrypted-tunnel \\ \hline + BlackVPN & 28500 & networking & encrypted-tunnel \\ \hline + ChinaFastVpn & 28600 & networking & encrypted-tunnel \\ \hline + RussiaFastVPN & 28700 & networking & encrypted-tunnel \\ \hline + LaoSongVPN & 28800 & networking & encrypted-tunnel \\ \hline + IranVPN & 28900 & networking & encrypted-tunnel \\ \hline + ZVPN & 29000 & networking & encrypted-tunnel \\ \hline + OMGVPN & 29100 & networking & encrypted-tunnel \\ \hline + AmigoVPN & 29200 & networking & encrypted-tunnel \\ \hline + FreeVPN & 29300 & networking & encrypted-tunnel \\ \hline + PhilippinesVPN & 29400 & networking & encrypted-tunnel \\ \hline + EgyptVPN & 29500 & networking & encrypted-tunnel \\ \hline + PurpleVPN & 29600 & networking & encrypted-tunnel \\ \hline + MambaVPN & 29700 & networking & encrypted-tunnel \\ \hline + AirVPN & 29800 & networking & encrypted-tunnel \\ \hline + LunaVPN & 29900 & networking & encrypted-tunnel \\ \hline + UFOVPN-NetVPN & 30000 & networking & encrypted-tunnel \\ \hline + ArvinVPN & 30100 & networking & encrypted-tunnel \\ \hline + OwlVPNFree & 30200 & networking & encrypted-tunnel \\ \hline + HalleyVPN & 30300 & networking & encrypted-tunnel \\ \hline + HotFreeVPN & 30400 & networking & encrypted-tunnel \\ \hline + VPNPro & 30500 & networking & encrypted-tunnel \\ \hline + FaceTime.VideoCalls & 30600 & collaboration & voip-video \\ \hline + zello & 30700 & collaboration & social-networking \\ \hline + Zello.MessageVoice & 30701 & collaboration & voip-video \\ \hline + appstore & 30900 & general-internet & internet-utility \\ \hline + google & 31000 & general-internet & internet-utility \\ \hline + instagram & 31100 & media & photo-video \\ \hline + Instagram.VideoCalls & 31101 & media & photo-video \\ \hline + Instagram.Message & 31102 & media & photo-video \\ \hline + Instagram.Live & 31103 & media & photo-video \\ \hline + JingDong & 31500 & business-systems & general-business \\ \hline + microsoftteam & 31600 & collaboration & internet-conferencing \\ \hline + Operamini & 31700 & \tabincell{l}{general-internet\\ networking} & \tabincell{l}{internet-utility\\ encrypted-tunnel} \\ \hline + GooglePlayMarket & 31800 & general-internet & internet-utility \\ \hline + \tabincell{l}{GooglePlayMarket.\\DownloadFiles} & 31801 & general-internet & internet-utility \\ \hline + GooglePlayMarket.Search & 31802 & general-internet & internet-utility \\ \hline + QQWebVideo & 32100 & collaboration & voip-video \\ \hline + QQVideoChat & 32200 & collaboration & voip-video \\ \hline + Weibo & 32300 & collaboration & social-networking \\ \hline + BaiDuTieBa & 32400 & collaboration & social-networking \\ \hline + WPS & 32500 & business-systems & general-business \\ \hline + Yandex & 32600 & general-internet & file-sharing \\ \hline + Office365 & 32700 & business-systems & office-programs \\ \hline + slack & 32800 & collaboration & \tabincell{l}{instant-messaging\\ voip-video} \\ \hline + slack.Login & 32901 & collaboration & social-business \\ \hline + slack.Logout & 32902 & collaboration & social-business \\ \hline + YandexTurbo & 33100 & general-internet & file-sharing \\ \hline + Teamviewer & 33200 & networking & photo-video \\ \hline + Teamviewer.TransferFile & 33201 & networking & file-sharing \\ \hline + Teamviewer.RemoteControl & 33202 & networking & remote-access \\ \hline + XiangRiKui & 33500 & networking & \tabincell{l}{remote-access\\ file-sharing} \\ \hline + Xiangrikui.Login & 33501 & networking & auth-service \\ \hline + HuaTianOA & 33700 & business-systems & general-business \\ \hline + PHPOA & 33800 & collaboration & web-posting \\ \hline + 78OA & 33900 & collaboration & web-posting \\ \hline + TongDaOA & 34000 & collaboration & web-posting \\ \hline + WeaverOA & 34100 & general-internet & gaming \\ \hline + RanZhiOA & 34200 & collaboration & web-posting \\ \hline + JinDieOA & 34300 & business-systems & management \\ \hline + Tita & 34400 & business-systems & management \\ \hline + IIEARP & 34500 & business-systems & general-business \\ \hline + WindowsRemote & 34600 & networking & remote-access \\ \hline + HuaWeiCloudWeLink & 34700 & business-systems & \tabincell{l}{voip-video\\ management} \\ \hline + \tabincell{l}{HuaWeiCloudWeLink.\\VideoCalls} & 34701 & business-systems & office-programs \\ \hline + FeiShu & 34900 & business-systems & management \\ \hline + dingding & 35000 & business-systems & management \\ \hline + DingDing.VideoCalls & 35001 & business-systems & management \\ \hline + CSTCloud & 35200 & business-systems & internet-conferencing \\ \hline + CSTCloud.Login & 35201 & business-systems & internet-conferencing \\ \hline + ShiMoDocs & 35400 & business-systems & office-programs \\ \hline + WeiXinWork & 35500 & collaboration & instant-messaging \\ \hline + WeiXinWork.VideoCalls & 35501 & collaboration & voip-video \\ \hline + TencentDocs & 35700 & business-systems & office-programs \\ \hline + YinXiangNotes & 35800 & business-systems & office-programs \\ \hline + YouDaoNotes & 35900 & business-systems & office-programs \\ \hline + TencentMeeting & 36000 & collaboration & internet-conferencing \\ \hline + TencentMeeting.VideoCalls & 36001 & collaboration & internet-conferencing \\ \hline + Trello & 36200 & business-systems & management \\ \hline + Quip & 36300 & business-systems & general-business \\ \hline + XYLink & 36400 & collaboration & internet-conferencing \\ \hline + XYLink.VideoCalls & 36401 & collaboration & internet-conferencing \\ \hline + XYLink.Login & 36402 & collaboration & internet-conferencing \\ \hline + Teambition & 36700 & business-systems & office-programs \\ \hline + Teambition.Login & 36701 & business-systems & office-programs \\ \hline + vpngate & 36900 & meida & gaming \\ \hline + webex & 37000 & collaboration & internet-conferencing \\ \hline + webex.login & 37001 & collaboration & internet-conferencing \\ \hline + tunnel\_behavior & 37200 & networking & encrypted-tunnel \\ \hline +\end{longtable}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Appendix_C.tex b/TSG_Administrator's_Guide/content/Appendix_C.tex new file mode 100644 index 0000000..fe20dc3 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_C.tex @@ -0,0 +1,459 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix C Log Fields Description}{Appendix C Log Fields Description} +\chapter*{\hypertarget{link:Appendix C Log Fields Description}{Appendix C Log Fields Description}} +\label{sec:appendix_c} + +\notemark\textit{The column with * is the default display column after logging in to the system for the first time. Once the user has made the configuration, +the configuration will be saved in the browser's local data. The next time the user logs in to the system through the same machine and the same browser, +it will display columns that the user has previously configured. The fields with bold font are the Log Fields used when creating reports.} + +\pdfbookmark[1]{Log Type}{Log Type} +\section*{\hypertarget{link:Log Type}{Log Type}} +\label{sec:appendix_c:logtype} + +\begin{longtable}{p{0.31\textwidth}|p{0.63\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Log Type}} & \textcolor{white}{Schema Type} \\\hline + Security Event Logs & All types \\\hline + Proxy Event Logs & Base, HTTP and DoH \\\hline + Session Records & All types except Radius \\\hline + Radius Logs & Base and Radius \\\hline +\end{longtable} + +\pdfbookmark[1]{Base}{Base} +\section*{\hypertarget{link:Base}{Base}} +\label{sec:appendix_c:base} + +\begin{longtable}{p{0.34\textwidth}|p{0.58\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Log ID * & A log entry identifier incremented sequentially; each log has a unique number \\\hline + \textbf{Receive Time *} & Time the log was received \\\hline + \textbf{Subscriber ID *} & Identifier of RADIUS Accounting for Subscriber Access (if applicable) \\\hline + \textbf{Client IP *} & Original session client IP address. \\\hline + \textbf{Internal IP} & Internal region IP of the session (if applicable) \\\hline + Client Port & Client port utilized by the session \\\hline + L4 Protocol & Transport layer protocol associated with the session \\\hline + Address Type & IP protocol version associated with the session, 4 or 6 \\\hline + \textbf{Server IP *} & Original session server IP address \\\hline + \textbf{Server Port *} & Server port utilized by the session \\\hline + \textbf{External IP} & External region IP of the session (if applicable) \\\hline + \textbf{Action} & Action taken for the session; possible values are: + \begin{itemize} + \item Allow - session was allowed by policy. + \item Deny - session was denied by policy. + \item Monitor - session was allowed by policy and a log will be generated when matched. + \item Intercept - Intercept HTTP/HTTPS traffic for proxy. If the traffic use SSL/TSL, it will be decrypted. + \item Redirect - The Proxy redirect matched HTTP session to a predefined URL. + \item Replace - The Proxy Searches in a given HTTP part to Find a given string, and Replace any matches with another given string. + \item Hijack - The Proxy hijack a downloading file. + \item Insert - The Proxy insert a “js” or “css” scripts to webpages. + \end{itemize} + \\\hline + Direction & Indicates session client-to-server direction, possible values are: + + + Egress—Internal to External + + + Ingress—External to Internal + \\\hline + \textbf{Sled IP} & IP of sled which the session was logged \\\hline + Client Location & Location the session client IP from.\\\hline + Client ASN & BGP Autonomous system number the session client IP from\\\hline + \textbf{Server Location} & Location the session server IP from\\\hline + Server ASN & BGP Autonomous system number the session server IP from\\\hline + Sessions & Number of sessions with same client IP, server IP, Application, seen within 5 seconds\\\hline + Packets Sent & Number of client-to-server packets for the session\\\hline + Packets Received & Number of server-to-client packets for the session\\\hline + Bytes Sent & Number of bytes in the client-to-server direction of the session\\\hline + Bytes Received & Number of bytes in the server-to-client direction of the session\\\hline + \textbf{Sub Action *} & Sub Action taken for action; possible values are: + + + drop—session was dropped by deny action + + + block—session was blocked by deny action + + + alert—session was alerted by deny action + + + allow—session was allowed by intercept action + + + deny—session was denied by intercept action + + + monitor—session was monitored by intercept action + + + redirect—session was redirected by intercept action + + + replace—session was replaced by intercept action + + + hijack—session was hijacked by intercept action + + + insert—session was inserted by intercept action \\\hline + Device ID & Unique identifier of devices on which the session was logged \\\hline + Data Center & Name of data center on which the session was logged \\\hline + Application Label & Application label associated with the session \\\hline + Protocol Label & Protocol associated with the session \\\hline + L7 Protocol & Layer 7 Protocol associated with the session \\\hline + Start Time & Time of session start \\\hline + End Time & Time of session end \\\hline + Establish Latency & Establish time of the session \\\hline + Duration(ms) & Elapsed time of the session \\\hline + Stream Direction & Captured packet direction of the session, possible values are: c2s, s2c, double \\\hline + Session ID & An internal numerical identifier applied of the session \\\hline + Fragmentation Packets(c2s) & Number of IP fragment packets in client-to-server direction of the session \\\hline + Fragmentation Packets(s2c) & Number of IP fragment packets in server-to-client direction of the session \\\hline + Sequence Gap Loss(c2s) & Number of TCP gap loss packets in client-to-server direction of the session \\\hline + Sequence Gap Loss(s2c) & Number of TCP gap loss packets in server-to-client direction of the session \\\hline + Unorder Packets(c2s) & Number of TCP out of order packets in client-to-server direction of the session \\\hline + Unorder Packets(s2c) & Number of TCP out of order packets in server-to-client direction of the session \\\hline +\end{longtable} + +\pdfbookmark[1]{Log Fields per Protocol}{Log Fields per Protocol} +\section*{\hypertarget{link:Log Fields per Protocol}{Log Fields per Protocol}} +\label{sec:appendix_c:protocol} + +\pdfbookmark[2]{HTTP}{HTTP} +\subsection*{\hypertarget{link:HTTP}{HTTP}} +\label{sec:appendix_c:protocol:HTTP} + +\begin{longtable}{p{0.33\textwidth}|p{0.61\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + \textbf{Http.URL} & Uniform Resource Locator (URL) of current HTTP session \\\hline + Http.Host & Host of current HTTP session \\\hline + \textbf{Http.Domain} & Domain of current HTTP session \\\hline + Http.Cookie & Cookie of current HTTP session \\\hline + Http.Referer & Reference of current HTTP session \\\hline + Http.User Agent & User-Agent of current HTTP session \\\hline + Http.Content Length & Content Length of current HTTP session \\\hline + Http.Content Type & Content Type of current HTTP session \\\hline + Http.Set Cookie & Set Cookie of current HTTP session \\\hline + Http.Version & HTTP protocol version of current HTTP session, possible values are: http1, http2 \\\hline + \tabincell{l}{Http.Response\\ Latency(ms)} & HTTP response latency of current HTTP session \\\hline + Http.Action File Size & HTTP sub action profile size of current HTTP session, possible sub actions are: + + + alert + + + hijack + + + insert \\\hline + Http.Session Duration(ms) & Duration time of current HTTP session \\\hline +\end{longtable} + +\pdfbookmark[2]{MAIL}{MAIL} +\subsection*{\hypertarget{link:MAIL}{MAIL}} +\label{sec:appendix_c:protocol:MAIL} + +\begin{longtable}{p{0.26\textwidth}|p{0.68\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Mail.Protocol Type & Specific mail protocol type of current Mail session, possible values are: smtp, imap, pop \\\hline + Mail.Account & Account of current Mail session \\\hline + Mail.From CMD & From information of current Mail session \\\hline + Mail.To CMD & To information of current Mail session \\\hline + Mail.From & Sender account of current mail session \\\hline + Mail.To & Receiver account of current mail session \\\hline + Mail.CC & Mail carbon copy account of current mail session \\\hline + Mail.BCC & Mail blind carbon copy account of current mail session \\\hline + Mail.Subject & Subject of current mail session \\\hline + Mail.Attachment & Attachment name of current mail session \\\hline + Mail.EML File & EML file download link of current mail session \\\hline +\end{longtable} + +\pdfbookmark[2]{DNS}{DNS} +\subsection*{\hypertarget{link:DNS}{DNS}} +\label{sec:appendix_c:protocol:DNS} + +\begin{longtable}{p{0.29\textwidth}|p{0.65\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Dns.Message ID & Message identifier of current DNS session \\\hline + Dns.QR & Query/Response Flag of current DNS session \\\hline + Dns.OPCODE & Operation Code of current DNS session \\\hline + Dns.AA & Authoritative Answer Flag of current DNS session \\\hline + Dns.TC & Truncation Flag of current DNS session \\\hline + Dns.RD & Recursion Desired of current DNS session \\\hline + Dns.RA & Recursion Available of current DNS session \\\hline + Dns.RCODE & Response Code of current DNS session \\\hline + Dns.QDCOUNT & Question Count of current DNS session \\\hline + Dns.ANCOUNT & Answer Record Count of current DNS session \\\hline + Dns.NSCOUNT & Authority Record Count of current DNS session \\\hline + Dns.ARCOUNT & Additional Record Count of current DNS session \\\hline + Dns.QNAME & Query domain name of current DNS session \\\hline + Dns.QTYPE & Query type of current DNS session \\\hline + Dns.QCLASS & Query class of current DNS session \\\hline + Dns.cname & Canonical Name Record of current DNS session \\\hline + Dns.SUB & Extension description of current DNS session, possible values are: dns, dnssec \\\hline + Dns.RR & Resource records of current DNS session \\\hline +\end{longtable} + +\pdfbookmark[2]{SSL}{SSL} +\subsection*{\hypertarget{link:SSL}{SSL}} +\label{sec:appendix_c:protocol:SSL} + +\begin{longtable}{p{0.3\textwidth}|p{0.64\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + \textbf{SSL.SNI} & Server Name Indication of current SSL session \\\hline + SSL.SAN & Subject Alternative Name of current SSL session \\\hline + SSL.CN & Common Name of current SSL session \\\hline + SSL.Pinning & Pinning status of current SSL session, possible values are: + + + 0-not pinning + + + 1-pinning + + + 2-maybe pinning \\\hline + SSL.Intercept State & Intercept State of current SSL session, possible values are: + + + 0-passthrough, + + + 1-intercept + + + 2-shutdown \\\hline + \tabincell{l}{SSL.Server Side\\ Latency(ms)} & Server side establish latency of current SSL session \\\hline + \tabincell{l}{SSL.Client Side\\ Latency(ms)} & Client side establish latency of current SSL session \\\hline + SSL.Server Side Version & Server-side SSL version latency of current session, possible values are: + + + SSLv3, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3, unknown \\\hline + SSL.Client Side Version & Client-side SSL version latency of current session, possible values are: + + + SSLv3, TLSv1, TLSv1.1, TLSv1.2, TLSv1.3, unknown \\\hline + SSL.Certificate Verify & Certificate verify status of current SSL session, possible values are: + + + 0-passed + + + 1-failed \\\hline + SSL.Error & Error message of current SSL session \\\hline + SSL.JA3 hash & JA3 Fingerprint is hashed with MD5 \\\hline +\end{longtable} + +\pdfbookmark[2]{QUIC}{QUIC} +\subsection*{\hypertarget{link:QUIC}{QUIC}} +\label{sec:appendix_c:protocol:QUIC} + +\begin{longtable}{p{0.31\textwidth}|p{0.63\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Quic.Version & Version of current QUIC session \\\hline + Quic.SNI & Server Name Indication of current QUIC session \\\hline + Quic.User Agent & User Agent of current QUIC session \\\hline +\end{longtable} + +\pdfbookmark[2]{DoH}{DoH} +\subsection*{\hypertarget{link:DoH}{DoH}} +\label{sec:appendix_c:protocol:DoH} + +\begin{longtable}{p{0.23\textwidth}|p{0.71\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + DoH.URL & Uniform Resource Locator (URL) of current DoH session \\\hline + DoH.Host & Host of current DoH session \\\hline + DoH.Cookie & Cookie of current DoH session \\\hline + DoH.Referer & Referer of current DoH session \\\hline + DoH.User Agent & User Agent of current DoH session \\\hline + DoH.Version & HTTP Version of current DoH session, possible values are: http1, http2 \\\hline + DoH.Message ID & Message ID of current DoH session \\\hline + DoH.QR & Query/Response Flag of current DoH session \\\hline + DoH.OPCODE & Operation Code of current DoH session \\\hline + DoH.AA & Authoritative Answer Flag of current DoH session \\\hline + DoH.TC & Truncation Flag of current DoH session \\\hline + DoH.RD & Recursion Desired of current DoH session \\\hline + DoH.RA & Recursion Available of current DoH session \\\hline + DoH.RCODE & Response Code of current DoH session \\\hline + DoH.QDCOUNT & Question Count of current DoH session \\\hline + DoH.ANCOUNT & Answer Record Count of current DoH session \\\hline + DoH.NSCOUNT & Authority Record Count of current DoH session \\\hline + DoH.ARCOUNT & Additional Record Count of current DoH session \\\hline + DoH.QNAME & Query domain name of current DoH session \\\hline + DoH.QTYPE & Query type of current DoH session \\\hline + DoH.QCLASS & Query class of current DoH session \\\hline + DoH.CNAME & Canonical Name Record of current DoH session \\\hline + DoH.SUB & Extension description of current DoH session, possible values are: dns, dnssec \\\hline + DoH.RR & Resource records of current DoH session \\\hline +\end{longtable} + +\pdfbookmark[2]{FTP}{FTP} +\subsection*{\hypertarget{link:FTP}{FTP}} +\label{sec:appendix_c:protocol:FTP} + +\begin{longtable}{p{0.3\textwidth}|p{0.64\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Ftp.Account & Account of current ftp session \\\hline + Ftp.URL & Uniform Resource Identifier of current ftp session \\\hline + Ftp.Content & File content of current ftp session \\\hline +\end{longtable} + +\pdfbookmark[2]{RADIUS}{RADIUS} +\subsection*{\hypertarget{link:RADIUS}{RADIUS}} +\label{sec:appendix_c:protocol:RADIUS} + +\begin{longtable}{p{0.29\textwidth}|p{0.65\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Packet Type & Packet type of current radius session, possible values are: + + + 1- Access-Request + + + 2- Access-Accept + + + 3- Access-Reject + + + 4- Accounting-Request + + + 5- Accounting-Response + + + 11-Access-Challenge \\\hline + Account & RADIUS account of current radius session \\\hline + \textbf{Nas IP *} & NAS device IP of current radius session \\\hline + \textbf{Framed IP *} & IP address assigned by RADIUS server to user of current radius session \\\hline + Session Timeout & Timeout of current radius session \\\hline + Idle Timeout & Maximum idle time of current radius session \\\hline + ACC Status Type * & Account status type of current radius session, possible values are: + + + 1-Start + + + 2-Stop + + + 3-Interim-Update \\\hline + \tabincell{l}{Acct Terminate\\ Cause} & Account terminating reason of current radius session, possible values are: + + + 1-User Request + + + 2-Lost Carrier + + + 3-Lost Service + + + 4-Idle Timeout + + + 5-Session Timeout + + + 6-Admin Reset + + + 7-Admin Reboot + + + 8-Port Error + + + 9-NAS Error + + + 10-NAS Request + + + 11-NAS Reboot + + + 12-Port Unneeded + + + 13-Port Preempted + + + 14-Port Suspended + + + 15-Service Unavailable + + + 16-Callback + + + 17-User Error + + + 18-Host Request \\\hline + Event Timestamp & Dial-in user request event time stamp of current radius session \\\hline + Service Type & Dial-in user request authentication type, possible values are: + + + 2(Framed): A Framed Protocol should be started for the User, such as PPP or SLIP. + + + 5(Outbound): The user should be granted access to outgoing devices. + + + 10(Call Check): Used by the NAS in an Access-Request packet to indicate that a call is being received and that the RADIUS server should send back an Access-Accept to answer the call. \\\hline + Nas Port & NAS-Port of current radius session \\\hline + Framed Protocol & Framed Protocol of current radius session, possible values are: + + + 1-PPP + + + 2-SLIP + + + 3-AppleTalk Remote Access Protocol (ARAP) + + + 4-Gandalf proprietary SingleLink/MultiLink protocol + + + 5-Xylogics proprietary IPX/SLIP + + + 6-X.75 Synchronous \\\hline + Callback Number & A dialing number to be used for callback of current radius session \\\hline + Callback ID & Callback Identifier of current radius session \\\hline + Termination Action & Action the NAS should take when the specified service is completed, possible values are: + + + 0-Default + + + 1-RADIUS-Request \\\hline + Called Station Id & NAS device Identifier of current radius session \\\hline + Calling Station Id & Client Identifier of current radius session \\\hline + Acct Delay Time & Indicates how many seconds the user has been trying to send record of current radius session \\\hline + Acct Session ID & A unique accounting ID of current radius session \\\hline + Acct Multi Session ID & A unique Accounting ID to make it easy to link together multiple related sessions \\\hline + Acct Input Octets & Input bytes of current radius account \\\hline + Acct Output Octets & Output bytes of current radius account \\\hline + Acct Input Packets & Input Packets of current radius account \\\hline + Acct Output Packets & Output Packets of current radius account \\\hline + Acct Session Time & Indicates how many seconds the user has received service for \\\hline + Acct Link Count & Count of links which are known to have been in a given multilink session at the time the accounting record \\\hline + Acct Interim Interva &l Indicates the number of seconds between each interim update in seconds \\\hline +\end{longtable} + +\pdfbookmark[2]{APP}{APP} +\subsection*{\hypertarget{link:APP}{APP}} +\label{sec:appendix_c:protocol:APP} + +\begin{longtable}{p{0.3\textwidth}|p{0.64\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + app\_extra\_info & Detail information about the application. \\\hline +\end{longtable}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Appendix_D.tex b/TSG_Administrator's_Guide/content/Appendix_D.tex new file mode 100644 index 0000000..f77571b --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_D.tex @@ -0,0 +1,250 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix D Predefined Reports}{Appendix D Predefined Reports} +\chapter*{\hypertarget{link:Appendix D Predefined Reports}{Appendix D Predefined Reports}} +\label{sec:appendix_d} + +\pdfbookmark[1]{Predefined Reports}{Predefined Reports} +\section*{\hypertarget{link:Predefined Reports}{Predefined Reports}} +\label{sec:appendix_d:report} + +\begin{longtable}{p{0.12\textwidth}|p{0.16\textwidth}|p{0.66\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Schedule}} & \textcolor{white}{Content} \\\hline + \tabincell{l}{Network\\ Overview} & Report of the previous day, scheduled everyday & Report Profile + + + Traffic Statistics + + + Bandwidth Trend + + + Sessions Trend + + + Top 30 Users by Bandwidth and Sessions + + + Top 30 Website Domains by Bandwidth and Sessions + + + Top 30 Server IP by Bandwidth and Sessions + + + Top 30 Client IP by Bandwidth and Sessions + + + Top 30 Destination Regions by Bandwidth and Sessions + + + Top 10 TCP Server Ports Sessions Distribution + + + Top 30 TCP Server Ports by Sessions + + + Top 30 Endpoint Devices by Bandwidth \\\hline + + \tabincell{l}{Network\\ Object\\ Statistics} & Report of the previous day, scheduled everyday & Report Profile + + + Traffic Statistics + + + Bandwidth Trend + + + Sessions Trend + + + Top 30 Sources by Sessions + + + Top 30 Destinations by Sessions + + + Top 30 Destination Regions by Bandwidth + + + Top 30 Destination Transmission APP by Bandwidth + + + Top 30 Website Domains by Bandwidth + + + Top 30 TCP Server Ports by Sessions + + + Top 30 Endpoint Devices by Bandwidth \\\hline + + \tabincell{l}{Website\\ Domain\\ Usage} & Report of the previous day, scheduled everyday & Report Profile + + + Traffic Statistics + + + Bandwidth Trend + + + Sessions Trend + + + Top 100 Website Domains by Unique Clients + + + Top 20 Website Domains Bandwidth Distribution + + + Top 100 Website Domains by Bandwidth + + + Top 20 Website Domains Sessions Distribution + + + Top 100 Website Domains by Sessions \\\hline + + \tabincell{l}{Web\\ Traffic\\ Summary} & Report of the previous day, scheduled everyday & Report Profile + + + Traffic Statistics + + + Bandwidth Trend + + + Sessions Trend + + + Top 20 Website Domains Bandwidth Distribution + + + Top 20 Website Domains by Server IP and Bandwidth + + + Top 20 Website Domains Sessions Distribution + + + Top 20 Website Domains by Client IP and Sessions + + + Top 20 Browsing Users by Website domains and Sessions \\\hline + + \tabincell{l}{Traffic\\ QoS} & Report of the previous day, scheduled everyday & Report Profiles + + + Traffic Statistics + + + Bandwidth Trend + + + Sessions Trend + + + Session Logs Sent to Database Trend + + + Proxy Logs Sent to Database Trend + + + Security Logs Sent to Database Trend + + + Estimated One-Sided Connections + + + Estimated TCP Sequence Gap Loss \\\hline + +\end{longtable} + +\pdfbookmark[1]{Predefined Chart Libraries}{Predefined Chart Libraries} +\section*{\hypertarget{link:Predefined Chart Libraries}{Predefined Chart Libraries}} +\label{sec:appendix_d:chart} + +\begin{longtable}{p{0.82\textwidth}|p{0.12\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Name}} & \textcolor{white}{Chart Type} \\\hline + Top 30 Users by Bandwidth and Sessions Traffic-Top-User-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Website Domains by Bandwidth and Sessions Traffic-Top-Website-Domain-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Server IP by Bandwidth and Sessions Traffic-Top-Server-IP-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Client IP by Bandwidth and Sessions Traffic-Top-Client-IP-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Server Ports by Sessions Traffic-Top-Server-Port-by-Sessions & table \\\hline + Top 30 Endpoint Devices by Bandwidth Traffic-Top-Endpoint-Device-by-Bandwidth & table \\\hline + Top 30 Destination Regions by Bandwidth and Sessions Traffic-Top-Destination-Region-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Sources by Sessions Traffic-Top-User-Source-by-Sessions & table \\\hline + Top 30 Destinations by Sessions Traffic-Top-Destination-Domain-by-Sessions & table \\\hline + Top 30 Destination Regions by Bandwidth Traffic-Top-Destination-Region-by-Bandwidth-and-Sessions & table \\\hline + Top 30 Destination Transmission APP by Bandwidth Traffic-Top-Destination-Transmission-APP-by-Bandwidth & table \\\hline + Top 30 Website Domains by Bandwidth Traffic-Top-Website-Domain-by-Bandwidth & table \\\hline + Top 20 Website Domains Bandwidth Distribution Traffic-Top-Website-Domain-by-Bandwidth & bar \\\hline + Top 100 Website Domains by Bandwidth Traffic-Top-Website-Domain-by-Bandwidth & table \\\hline + Top 20 Website Domains Sessions Distribution Traffic-Top-Website-Domain-by-Sessions & bar \\\hline + Top 100 Website Domains by Sessions Traffic-Top-Website-Domain-by-Sessions & table \\\hline + Top 100 Website Domains by Unique Clients Top-Website-Domain-by-Unique-Client & table \\\hline + Top 20 Website Domains by Server IP and Bandwidth Top-Website-Domain-by-Server-IP-and-Bandwidth & table \\\hline + Top 20 Website Domains by Client IP and Sessions Top-Website-Domain-by-Client-IP-and-Session & table \\\hline + Top 20 Browsing Users by Website domains and Sessions Top-Browsing-User-by-Website-domain-and-Session & table \\\hline + Top 20 Server Ports Sessions Distribution Traffic-Top-Server-Port-by-Sessions & pie \\\hline + Session Logs Sent to Database Hourly Traffic-Log-History & bar \\\hline + Proxy Logs Sent to Database Hourly Proxy-Event-Hit-History & bar \\\hline + Security Logs Sent to Database Hourly Security-Event-Hit-History & bar \\\hline + Top 30 TCP Server Ports by Sessions Traffic-Top-TCP-Server-Port-by-Sessions & table \\\hline + Top 10 TCP Server Ports Sessions Distribution Traffic-Top-TCP-Server-Port-by-Sessions & pie \\\hline + Session Logs Sent to Database Trend Traffic-Session-Logs-to-Database & area \\\hline + Proxy Logs Sent to Database Trend Proxy-Logs-to-Database & area \\\hline + Security Logs Sent to Database Trend Security-Logs-to-Database & area \\\hline + Estimated One-sided Connections Estimated-One-sided-Connections & area \\\hline + Estimated TCP Sequence Gap Loss Estimated-TCP-Sequence-Gap-Loss & area \\\hline +\end{longtable} + +\pdfbookmark[1]{Predefined Datasets}{Predefined Datasets} +\section*{\hypertarget{link:Predefined Datasets}{Predefined Datasets}} +\label{sec:appendix_d:dataset} + +\begin{longtable}{p{0.74\textwidth}|p{0.2\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Name}} & \textcolor{white}{Log Type} \\\hline + Traffic-Top-Website-Domain-by-Sessions & Session Records \\\hline + Traffic-Top-Website-Domain-by-Bandwidth & Session Records \\\hline + Traffic-Top-Website-Domain-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Bandwidth-History & Session Records \\\hline + Traffic-Session-History & Session Records \\\hline + Proxy-Intercept-Website-Detailed-Client-Log & Security Event \\\hline + Traffic-Top-Internal-Host-by-Sessions & Session Records \\\hline + Traffic-Top-Internal-Host-by-Bandwidth & Session Records \\\hline + Traffic-Top-Internal-Host-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Top-External-Host-by-Sessions & Session Records \\\hline + Traffic-Top-External-Host-by-Bandwidth & Session Records \\\hline + Traffic-Top-External-Host-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Top-User-by-Sessions & Session Records \\\hline + Traffic-Top-User-by-Bandwidth & Session Records \\\hline + Traffic-Top-User-by-Bandwidth-and-Sessions & Session Records \\\hline + Proxy-Event-Usage-Log & Proxy Event \\\hline + Proxy-Event-Hit-History & Proxy Event \\\hline + Security-Event-Top-Polices-by-Bandwidth-and-Sessions & Security Event \\\hline + Traffic-Top-User-Source-by-Sessions & Session Records \\\hline + Traffic-Top-User-Source-by-Bandwidth & Session Records \\\hline + Traffic-Top-Destination-Domain-by-Sessions & Session Records \\\hline + Traffic-Top-Destination-Domain-by-Bandwidth & Session Records \\\hline + Security-Event-Hit-History & Security Event \\\hline + Traffic-Top-Destination-Region-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Top-Server-Port-by-Sessions & Session Records \\\hline + Traffic-Top-Endpoint-Device-by-Bandwidth & Session Records \\\hline + Traffic-Top-Destination-Transmission-APP-by-Bandwidth & Session Records \\\hline + Traffic-Top-Destination-Transmission-APP-by-Sessions & Session Records \\\hline + Top-Website-Domain-by-Unique-Client & Session Records \\\hline + Top-Website-Domain-by-Server-IP-and-Bandwidth & Session Records \\\hline + Top-Website-Domain-by-Client-IP-and-Session & Session Records \\\hline + Top-Browsing-User-by-Website-domain-and-Session & Session Records \\\hline + Traffic-Top-TCP-Server-Port-by-Sessions & Session Records \\\hline + Traffic-Session-Logs-to-Database & Session Records \\\hline + Proxy-Logs-to-Database & Proxy Event \\\hline + Security-Logs-to-Database & Security Event \\\hline + Estimated-One-sided-Connections & Session Records \\\hline + Estimated-TCP-Sequence-Gap-Loss & Session Records \\\hline + Traffic-Top-Client-IP-by-Sessions & Session Records \\\hline + Traffic-Top-Client-IP-by-Bandwidth & Session Records \\\hline + Traffic-Top-Client-IP-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Top-Server-IP-by-Sessions & Session Records \\\hline + Traffic-Top-Server-IP-by-Bandwidth & Session Records \\\hline + Traffic-Top-Server-IP-by-Bandwidth-and-Sessions & Session Records \\\hline + Traffic-Log-History & Session Records \\\hline +\end{longtable}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Appendix_E.tex b/TSG_Administrator's_Guide/content/Appendix_E.tex new file mode 100644 index 0000000..116b496 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_E.tex @@ -0,0 +1,192 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix E TSG Packet Flow}{Appendix E TSG Packet Flow} +\chapter*{\hypertarget{link:Appendix E TSG Packet Flow}{Appendix E TSG Packet Flow}} +\label{sec:appendix_e} + +\pdfbookmark[1]{Overview}{Overview} +\section*{\hypertarget{link:Overview}{Overview}} +\label{sec:appendix_e:overview} + +This document describes the packet handling sequence in TSG. TSG Firewall performs stateful checks, TSG proxy performs decryption. + + +The Ingress stage, session stage and egress stage are the three stages of TSG traffic processing. The ingress and egress stages handle network functions and make packet forwarding decisions on a per-packet basis. The remaining stages are session-based security functions such as application identification and content inspection. TSG does not change the operation of the MPLS, 802.1Q, IPv4, IPv6 protocols regardless of the configured policies. + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/packet_flow} + %\caption{Figure: Inspection Stage} + \label{fig:system:packet_flow} +\end{figure} + +\pdfbookmark[1]{Packet Handling Sequence}{Packet Handling Sequence} +\section*{\hypertarget{link:Packet Handling Sequence}{Packet Handling Sequence}} +\label{sec:appendix_e:sequence} + +\pdfbookmark[2]{Ingress stage}{Ingress stage} +\subsection*{\hypertarget{link:Ingress stage}{Ingress stage}} +\label{sec:appendix_e:sequence:ingress} + +The ingress stage receives packets from the network interface, parses those packets, and then determines whether a given packet is subject to further inspection. If the packet is subject to further inspection, the system continues with a session lookup and the packet enters the session stage. Otherwise, the system forwards the packet to the egress stage. + +\pdfbookmark[3]{Layer 2 Decode}{Layer 2 Decode} +\subsubsection*{\hypertarget{link:Layer 2 Decode}{Layer 2 Decode}} +\label{sec:appendix_e:sequence:ingress:decode} + +Packet parsing starts with the Ethernet (Layer-2) header of the packet received from the wire. VLAN, MPLS, MAC\_IN\_MAC headers are parsed here. The ingress port, 802.1q tag, and destination MAC address are used as keys to lookup the ingress logical interface. + +\pdfbookmark[3]{Tunnel Decapsulation}{Tunnel Decapsulation} +\subsubsection*{\hypertarget{link:Tunnel Decapsulation}{Tunnel Decapsulation}} +\label{sec:appendix_e:sequence:ingress:decapsulation} + +If the packet has PPPOE, IPIP, GRE, PPTP, L2TP, Teredo, GTP encapsulations, they are decoded at this stage. + +\pdfbookmark[3]{IP Defragmentation}{IP Defragmentation} +\subsubsection*{\hypertarget{link:IP Defragmentation}{IP Defragmentation}} +\label{sec:appendix_e:sequence:ingress:defragmentation} + +After the IP header is parsed (Layer-3), the TSG parses IP fragments, reassembles using the defragmentation process, and then feeds the packet back to the parser starting with the IP header. At this stage, a fragment may be discarded due to tear-drop attack (overlapping fragments), fragmentation errors, or if the TSG hits system limits on buffered fragments (hits the max packet threshold). + +\pdfbookmark[2]{Session Setup}{Session Setup} +\subsection*{\hypertarget{link:Session Setup}{Session Setup}} +\label{sec:appendix_e:sequence:setup} + +If the packet is subject to firewall inspection, it performs a flow lookup on the packet. In TSG ’s implementation, the firewall identifies the flow using a 5-tuple key: + + +• Source and destination IP addresses: IP addresses from the IP packet. + + +• Source and destination ports: Port numbers from TCP/UDP protocol headers. For non-TCP/UDP, different protocol fields are used (e.g., for ICMP the ICMP identifier and sequence numbers are used). + + +• Protocol: The IP protocol number from the IP header is used to derive the flow key. + + +The firewall stores active flows in the flow lookup table. When a packet is determined to be eligible for firewall inspection, the firewall extracts the 5-tuple flow key from the packet and then performs a flow lookup to match the packet with an existing flow. Each flow has a client and server component. For TCP, the client is the sender of the TCP SYN packet of the session from firewall’s perspective. For UDP, the client is the sender with smaller Port number. The server is the receiver of this first packet. + + +If the packet belongs to on new session, firewall performs a session setup. + + +The firewall uses the IP address of the packet to query mapping tables. + + +• Subscriber-IP mapping table: The corresponding user information is fetched. + + +• ASN-IP mapping table: The autonomous system number is fetched. + + +• Geo-IP mapping table: The geographical location is fetched. + + +There is a chance that above information is not available at this point. In that case, policies with these conditions cannot be enforced. + +\pdfbookmark[2]{Session Maintenance}{Session Maintenance} +\subsection*{\hypertarget{link:Session Maintenance}{Session Maintenance}} +\label{sec:appendix_e:sequence:maintenance} + +A packet that matches an existing session will enter the session maintenance stages. This stage starts with Layer 2 to Layer 4 firewall processing: + + +• If the session is in close wait state, then the firewall discards the packet by forwarding to egress stage. + + +• If the session is active, refresh session timeout. + + +• If the packet is a TCP FIN/RST, the session TCP half closed timer is started if this is the first FIN packet received (half closed session) or the TCP Time Wait timer is started if this is the second FIN packet or RST packet. The session is closed as soon as either of these timers expire. + + +If an application uses TCP as the transport, the firewall processes it by the TCP reassembly module before it sends the data stream into the security-processing module. The TCP reassembly module will also perform window check, buffer out-of-order data while skipping TCP retransmission. The firewall drops the packets if there is a reassembly error or if it receives too many out-of-order fragments, resulting in the reassembly buffers filling up. + + +A packet matching an existing session is subject to further processing if packet has TCP/UDP data (payload). If the firewall does not detect the session application, it performs application identification. If the identification is non-conclusive, the content inspection module runs known protocol decoder checks and heuristics to help identify the application. The application identification result could change throughout the life of the session. Once a traffic attribute is parsed, it’s subject to security policy enforcement. + +\pdfbookmark[2]{Firewall Process}{Firewall Process} +\subsection*{\hypertarget{link:Firewall Process}{Firewall Process}} +\label{sec:appendix_e:sequence:firewall} + +\pdfbookmark[3]{Layer 7 Decode}{Layer 7 Decode} +\subsubsection*{\hypertarget{link:Layer 7 Decode}{Layer 7 Decode}} +\label{sec:appendix_e:sequence:firewall:decode} + +The firewall decodes Layer 7 protocols such as HTTP, SSL/TLS and DNS, to get traffic attributes. + +\pdfbookmark[3]{Application Identification}{Application Identification} +\subsubsection*{\hypertarget{link:Application Identification}{Application Identification}} +\label{sec:appendix_e:sequence:firewall:identification} + +The firewall identifies application with built-in and customized signature. The firewall uses protocol decoding in the content inspection stage to determine if an application changes from one application to another. After the firewall identifies the session application, security policy will be enforced as configured. + +\pdfbookmark[3]{Content Decode}{Content Decode} +\subsubsection*{\hypertarget{link:Content Decode}{Content Decode}} +\label{sec:appendix_e:sequence:firewall:contentdecode} + +The firewall decodes the flow and parses attributes and content, then scan them for keywords, e.g., email attachments that are text-based. If it results in keywords detection, then the corresponding security policy action is taken. Application identification is still on at this stage, as the more traffic attributes are parsed, application identification result may be changed. + +\pdfbookmark[3]{Security Policy Lookup}{Security Policy Lookup} +\subsubsection*{\hypertarget{link:Security Policy Lookup}{Security Policy Lookup}} +\label{sec:appendix_e:sequence:firewall:lookup} + +The firewall uses application ANY, IP, port, Geographic and Subscriber ID to perform the lookup and check for a rule match. In case of a rule match, if the policy action is set to ‘deny’, the firewall drops the packet. + + +If security policy action is set to intercept and the application is SSL or HTTP, the firewall sends session packets to Proxy to perform decryption. + + +After more packet transferred, identified application as well as FQDN, URL and applicable protocol fields in the session are used as key to find rule match. If the session matches a security rule, and the rule has logging enabled, the firewall generates a security event log at the session end. + +\pdfbookmark[2]{Proxy Process}{Proxy Process} +\subsection*{\hypertarget{link:Proxy Process}{Proxy Process}} +\label{sec:appendix_e:sequence:proxy} + +\pdfbookmark[3]{Duplicate Packet Processing}{Duplicate Packet Processing} +\subsubsection*{\hypertarget{link:Duplicate Packet Processing}{Duplicate Packet Processing}} +\label{sec:appendix_e:sequence:proxy:duplicate} + +Packet usually travels a route one time only, otherwise it’s a waste of bandwidth. But network of real world is complicated: tunnels, policy ACLs and human mistakes all induce packet travels a link more than one time. + + +This will cause problems on Proxy function. When Proxy terminates server-side SSL connections, as a client, it sends packet to server with original 4-tuple, and that packet goes through TSG again. Since this packet has the same 4-tuple and sequence number as the client-side, TSG will drop it as a client-side retransmission packet, which causes server-side timeout. + + +The proxy fixes this problem by following two mechanisms: + + +• Duplicate packet identification: For TSG sent packets, TSG adds its 4-tuple, IPID, acknowledge number, sequence number and timestamp (if applicable) to the Bloom filter. For received packet, TSG will query the Bloom filter with the aforementioned protocol fields. If a packet is considered duplicate, it will be bypassed, if not, it will be delivered to TCP stack. + + +• Duplicate flow detection: Since not all traffic flows have duplicate packets, do duplicate identification on each packet is a waste of CPU and memory, moreover, it induces performance overhead. Hence, only the TCP flows with duplicate SYN or SYN/ACK packet will conduct duplicate packet identification. + +\pdfbookmark[3]{TCP Stack}{TCP Stack} +\subsubsection*{\hypertarget{link:TCP Stack}{TCP Stack}} +\label{sec:appendix_e:sequence:proxy:TCP} + +Opening a TCP connection involves a three-way handshake involving packets: the client contacts the server, the server acknowledges the client, and the client acknowledges the server. The proxy’s TCP stack attempts to connect server-side immediately after receiving the client's initial connection request, but waits to return the server acknowledgement until determining whether or not the server-side connection succeeds. This provides greater transparency, as the client receives either an RST or no response, which mirrors what is sent from a server when connections fail. + +\pdfbookmark[3]{Build SSL Session}{Build SSL Session} +\subsubsection*{\hypertarget{link:Build SSL Session}{Build SSL Session}} +\label{sec:appendix_e:sequence:proxy:build} + +The proxy first builds server-side SSL session, if the server certificate verification is failed, the proxy will sign certificate with untrusted root. That’s because the proxy wants the untrust certificate to warn users that they are trying to access potentially unsafe sites. + +\pdfbookmark[3]{Proxy Policy Lookup}{Proxy Policy Lookup} +\subsubsection*{\hypertarget{link:Proxy Policy Lookup}{Proxy Policy Lookup}} +\label{sec:appendix_e:sequence:proxy:lookup} + +After decode Layer 7 protocols, traffic attributes like HTTP URL, headers are subject to proxy policy lookup, then according action is taken. + +\pdfbookmark[3]{Re-encryption}{Re-encryption} +\subsubsection*{\hypertarget{link:Re-encryption}{Re-encryption}} +\label{sec:appendix_e:sequence:proxy:re-encryption} + +The content is compressed and encrypted, and send to egress stage + +\pdfbookmark[2]{Egress Stage}{Egress Stage} +\subsection*{\hypertarget{link:Egress Stage}{Egress Stage}} +\label{sec:appendix_e:sequence:egress} + +The system identifies encapsulation information for the packet, including MAC addresses, VLAN ID and tunnel headers. And find the egress interface. +Finally, the packet is transmitted out of the physical egress interface. diff --git a/TSG_Administrator's_Guide/content/Appendix_F.tex b/TSG_Administrator's_Guide/content/Appendix_F.tex new file mode 100644 index 0000000..c7def6a --- /dev/null +++ b/TSG_Administrator's_Guide/content/Appendix_F.tex @@ -0,0 +1,979 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Appendix F Best Practice}{Appendix F Best Practice} +\chapter*{\hypertarget{link:Appendix F Best Practice}{Appendix F Best Practice}} +\label{sec:appendix_f} + +\pdfbookmark[1]{Security Policy}{Appendix Security Policy} +\section*{\hypertarget{link:Appendix Security Policy}{Security Policy}} +\label{sec:appendix_f:policy} + +To improve your overall security posture, use the guidelines in this section to plan, deploy, and maintain your internet gateway best practice security policy. Apply security best practices to gain visibility into traffic, prevent threats, and protect your network, users, and data. + + +\textbf{The first use case} is to deny SSL traffic based on SNI. For example, users are forbidden to visit Netflix pages. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, visit Netflix website and you can view it normally. + \item Create a Deny Security Policy: + \begin{enumerate} + \item After logging into the system, create a Security Policy. + \item Policy names can be defined according to user habits. + \item Action select Deny. + \item Specify client IP as matching criteria for the source field. + \item Application select SSL. + \item Specify the Netflix page you wish to deny as matching criteria for SNI field. + \item Select Drop as Sub Action. + \item Enable the policy and submit. + \end{enumerate} + \item Visit Netflix again and pages cannot be accessed. + \end{enumerate} +\end{description} + +\textbf{The second use case} is monitor mails based on specified keywords. This Security Policy will generate a Security Event Log when matched. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Create a Monitor Security Policy: + \begin{enumerate} + \item After logging into the system, create a Security Monitor Policy. + \item Policy names can be defined according to user habits. + \item Action select Monitor. + \item Specify client IP as matching criteria for the source field. + \item Application select MAIL. + \item Specify the keywords you wish to monitor as matching criteria for Content field. + \item Enable the policy and submit. + \end{enumerate} + \item When the policy is matched, you can view Logs > Security Event Logs and see the mail content. + \end{enumerate} +\end{description} + +\pdfbookmark[1]{Proxy Policy}{Appendix Proxy Policy} +\section*{\hypertarget{link:Appendix Proxy Policy}{Proxy Policy}} +\label{sec:appendix_f:proxy} + +The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. We are going to take five use case to demonstrate proxy policy best practice. + + +\textbf{The first use case} is to specifically deny HTTPS traffic based on the URL. For example, users are forbidden to visit specific pages of YouTube, but other pages of YouTube website are not affected. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, visit YouTube website and you can view it normally. + \item Create a Deny Policy: + \begin{enumerate} + \item After logging into the system, create a policy. + \item Policy names can be defined according to user habits. + \item Action select Deny. + \item Specify client IP as matching criteria for the source field. Specify the YouTube page you wish to deny as matching criteria for URL field. + \item You can select the Response Content of the blocking page as an optional parameter. + \item Enable the policy and submit. + \end{enumerate} + \item Visit YouTube again. The specified pages cannot be accessed and other pages can be accessed normally. + \end{enumerate} +\end{description} + +\textbf{The second use case} is URL redirect, such as redirect the traffic accessing Google to Bing. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, you can visit Google normally and search normally. + \item Create a redirect policy. The above has demonstrated how to create a policy, to save time, simply enable the policy that which was created before. Then click Edit to view the content of the policy. + \begin{enumerate} + \item Action is Redirect. + \item Filter is Google URL. + \item Redirect URL is Bing URL. + \item The policy is Enabled and click OK. + \end{enumerate} + \item Visit Google again and the page is redirected to Bing. + \end{enumerate} +\end{description} + +\textbf{The third use case} is content Replace. For example, search china in Google. Create a content Replace policy to make the search results only come from www.news.cn. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, search china in Google and you’ll see the search results come from different websites, wikis, etc. + \item Create a Replace policy: + \begin{enumerate} + \item Action select Replace. + \item Add Google URL as Filter. + \item Specify Action Parameters: + \begin{enumerate} + \item Replace “q=china” in HTTP Request URI with “q=china+site%3Awww.news.cn”. + \item Replace “china site:www.news.cn” in HTTP Response Body with “china”. + \end{enumerate} + \item Enable the policy and submit. + \end{enumerate} + \item Visit Google again, search china and you’ll see the search results only come from www.news.cn. + \end{enumerate} +\end{description} + +\textbf{The fourth use case} is hijack file. For example, download the WhatsApp installation package and replace it with other files, such as the WhatsApp installation package with trojan virus. Now replace it with test.exe is used Instead. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, it is normal to download the WhatsApp installation package. + \item Create a Hijack policy: + \begin{enumerate} + \item Action select Hijack. + \item Select WhatsApp download URL as Filter. + \item Select test.exe as Hijack File for Action Parameters. + \item Enable the policy and submit. + \end{enumerate} + \item Download WhatsApp again and find that the actual download file is test.exe. If you do not want to be found easily, you can change the hijack file into the same name as the original. + \end{enumerate} +\end{description} + +\textbf{The fifth use case} is script injection. For example, visit Facebook, insert the script into Facebook page, and the script will be executed on the client side. Here we use a JS script of pop-up window will show up to demonstrate. + +\begin{description}[leftmargin=0pt,itemindent=0em] + \item[] + \begin{enumerate} + \item Without any policies, visit Netflix website and it displays normally without any pop-up window. + \item Create an Insert policy: + \begin{enumerate} + \item Action select Insert. + \item Select Netflix URL as Filter. + \item Select the JS script of pop-up window as Insert Script for Action Parameters. + \item Enable the policy and submit. + \end{enumerate} + \item Visit the Netflix website again, and the pop-up window appears. + \end{enumerate} +\end{description} + +\notemark\textit{The Watch feature only support policy and object. You can add them to your watch list. Select the checkbox for objects and policies in the list and Click \textbf{Watch} at the bottom to add to Watch List. And then you can click the star icon in the bottom right and select Object/Policy tab to view the Watch List. You can search objects and policies by ID and Name in the list. For policy, you can check policy in the list and enable or disable it. You can also export and clear the list.} + +\pdfbookmark[1]{Custom Application}{Custom Application} +\section*{\hypertarget{link:Custom Application}{Custom Application}} +\label{sec:appendix_f:application} + +A policy object consists of one item or a set of collective items that groups discrete identities such as IP addresses, URLs, applications, or accounts. The relationship between each item is “or”. However, for keyword, within each item, there can be “and” expression and the item can have up to 4 substrings. You can reference the object in policy as conditions. The relationship between each condition within policy is “and”. There can be eight conditions at most for every policy. + + +Application is a little special as a kind of object in TSG. Applications increase the value of our TSG firewalls by making it easier and faster to determine the exact identity of applications traversing the network, enabling teams to set and enforce the right policies. Applications can reduce complexity and minimize human error. + + +The following introduced predefined application attributes: + + +TCP/UDP/IP Attributes + +\begin{longtable}{p{0.35\textwidth}|p{0.11\textwidth}|p{0.08\textwidth}|p{0.14\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Attribute Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Layer}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Stage}} & \textcolor{white}{Value Type} \\\hline + IP Address + + + ip.src & Packet & 0 & ip \\ \hline + ip.dst & Packet & 0 & ip \\ \hline + tcp.payload.c2s\_first\_data & Session & 1 & string \\ \hline + tcp.payload.s2c\_first\_data & Session & 2 & string \\ \hline + tcp.analysis.create\_with\_syn & Session & 1 & Bool \\ \hline + ip.payload & Packet & 0 & string \\ \hline + tcp.payload & Packet & 0 & string \\ \hline + tcp.srcport & Packet & 0 & Numeric \\ \hline + tcp.dstport & Packet & 0 & Numeric \\ \hline + tcp.syn.fingerprint & Session & 1 & string \\ \hline + tcp.sack.fingerprint & Session & 1 & string \\ \hline + udp.payload.c2s\_first\_data & Session & 0 & string \\ \hline + udp.payload.s2c\_first\_data & Session & 1 & string \\ \hline + udp.srcport & Packet & 0 & Numeric \\ \hline + udp.dstport & Packet & 0 & Numeric \\ \hline +\end{longtable} + +SSL Attributes + +\begin{longtable}{p{0.61\textwidth}|p{0.11\textwidth}|p{0.08\textwidth}|p{0.14\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Attribute Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Layer}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Stage}} & \textcolor{white}{Value Type} \\\hline + ssl.handshake.extensions\_server\_name & Session & 1 & string \\ \hline + ssl.handshake.cert.fingerprint & Session & 2 & string \\ \hline + ssl.handshake.cert.serial\_number & Session & 2 & string \\ \hline + ssl.handshake.certificate.issuer\_common\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.issuer\_organization\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.issuer\_country\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.subject\_common\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.subject\_organization\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.subject\_country\_name & Session & 2 & string \\ \hline + ssl.handshake.certificate.not\_valid\_before & Session & 2 & string \\ \hline + ssl.handshake.certificate.not\_valid\_after & Session & 2 & string \\ \hline + ssl.handshake.certificate.algorithm\_id & Session & 2 & string \\ \hline + ssl.analysis.use\_session\_resumption & Session & 3 & Numeric \\ \hline + ssl.analysis.use\_selfsigned\_certificate & Session & 3 & Numeric \\ \hline + ssl.analysis.incomplete\_certificate\_chain & Session & 3 & Numeric \\ \hline +\end{longtable} + +\notemark\textit{Client Hello is in Stage 1, and Server Hello is in Stage 2. SSL Attributes are all in Session Layer.} + +HTTP Attributes + +\begin{longtable}{p{0.35\textwidth}|p{0.11\textwidth}|p{0.08\textwidth}|p{0.14\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Attribute Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Layer}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Stage}} & \textcolor{white}{Value Type} \\\hline + http.host & Session & 1 & string \\ \hline + http.uri & Session & 1 & string \\ \hline + http.user\_agent & Session & 1 & string \\ \hline + http.content\_type & Session & 1 & string \\ \hline + http.content\_encoding & Session & 1 & string \\ \hline + http.referer & Session & 1 & string \\ \hline + http.cookie & Session & 1 & string \\ \hline + http.set\_cookie & Session & 3 & string \\ \hline +\end{longtable} + +\notemark\textit{HTTP Request Header, Request Body, Response Header, Response Body are in Stage 1, Stage 2, Stage 3, Stage 4 in sequence. HTTP attributes are all in Session Layer.} + + +Other Attributes + +\begin{longtable}{p{0.35\textwidth}|p{0.11\textwidth}|p{0.08\textwidth}|p{0.14\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Attribute Name}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Layer}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Stage}} & \textcolor{white}{Value Type} \\\hline + quic.sni & Session & 1 & string \\ \hline + dns.qry.name & Session & 1 & string \\ \hline + general.session.analysis.app\_id & Session & 2 & numeric \\ \hline + general.c2s\_session\_size & Session & 2 & string \\ \hline + general.s2c\_session\_size & Session & 2 & string \\ \hline +\end{longtable} + +\pdfbookmark[1]{Make Your Own Reports}{Make Your Own Reports} +\section*{\hypertarget{link:Make Your Own Reports}{Make Your Own Reports}} +\label{sec:appendix_f:report} + +The following guides you to set a report with one type of chart. Of course, you can create a report with all types of charts by TSG function \textbf{Reports}. + +\pdfbookmark[2]{The 1st: Bar}{The 1st: Bar} +\subsection*{\hypertarget{link:The 1st: Bar}{The 1$^{st}$: Bar}} +\label{sec:appendix_f:report:bar} + +Create a Bar Report. For example, make a report about the top 10 server IP that our security policy matched last week and the sum of bytes sent and bytes received from that server IP. + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. + \item Enter a \textbf{Name}, security event bytes by server IP dataset. + \item Select a \textbf{Log Type}: Security Event. + \item Select the \textbf{Group by}. This will serve as the X-Axis Data Binding options for Chart Libraries. The report mainly displays Server IP, so select Server IP. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label, which serve as Y-Axis Data Binding options of your Chart Libraries. Field consists of the Group by field you just added. You can add one or multiple fields. Field select bytes Sent and bytes Received. Aggregate select sum. Label set to bytes-Sum. + \item Specify \textbf{Filter} and \textbf{Having}. For Filter, select Action as Field; select “=” as Operator; select Monitor and Intercept as Value. That is to say, only security policies with monitor and intercept actions will be counted. For Having, select Log ID as Field; select count as Aggregate; select “>=” as Operator; select 10 as value. This means only security policies that match more than 10 times (including 10) will be counted. Your selections will automatically generate a SQL. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] Create Chart Library. Chart set the display form of the data. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. Complete name, security event bytes by server IP Chart Library. Leave description set to empty. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type}: Bar. + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. Set Show Top to 10. Set Label, which will be displayed in your report. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, security event bytes by server IP report. + \item Select a \textbf{Time Period}. Here select last 1 week, which is from yyyy-mm-dd-7 hh:mi:ss to yyyy-mm-dd hh:mi:ss. + \item Select the \textbf{Chart Library} you just created. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 2nd: Line}{The 2nd: Line} +\subsection*{\hypertarget{link:The 2nd: Line}{The 2$^{nd}$: Line}} +\label{sec:appendix_f:report:line} + +Create a Line Report. For example, make a report about the security event sessions count previous day. + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. + \item Enter a \textbf{Name}, security event sessions by time dataset. + \item Select a \textbf{Log Type}: Security Event. + \item Select the \textbf{Group by}. For Line Chart, you must select Receive Time. This will serve as the X-Axis Data Binding options for Chart Libraries. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label, which serve as Lines Data Binding options of your Chart Libraries. Field consists of the Group by field you just added. You can add one or multiple fields. Field select Log ID. Aggregate select count. Label set to count. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] Create Chart Library. Chart set the display form of the data. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. Complete name, security event sessions by time Chart Library. Leave description set to empty. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. For Lines, select count as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input count as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, security event sessions by time report. + \item Select a \textbf{Time Period}. Here select previous 1 day, which means from yyyy-mm-dd-1 00:00:00 to yyyy-mm-dd-1 23:00:00 if the Time Granularity is 1 hour. + \item Select the \textbf{Chart Library} you just created. Enter number and select time unit for \textbf{Time Granularity}. Here set it to 1 hour. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 3rd: Drilldown}{The 3rd: Drilldown} +\subsection*{\hypertarget{link:The 3rd: Drilldown}{The 3$^{rd}$: Drilldown}} +\label{sec:appendix_f:report:drilldown} + +Create a Drilldown Report. For example, make a report about the session count for top 100 Http.Domain, Drilldown on Subscriber ID and show Drilldown top 5 that our security policy matched last week. + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click Create. + \item Enter a \textbf{Name}, security event session top domain and subscriber IDs drilldown dataset. + \item Select a \textbf{Log Type}: Security Event. + \item Select the \textbf{Group by}. The report mainly displays Http.Domain and Subscriber ID, so add Http.Domain and Subscriber ID. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label, which serve as Columns options of your Chart Libraries. Field consists of the Group by field you just defined and you can add other fields. Here add Log ID; select count as Aggregate and set Label to sessions. + \item Specify \textbf{Filter} and \textbf{Having}. For Filter, select Address Type as Field; select “=” as Operator; select IPv4 as Value. That is to say, only security policies with IPv4 address type will be counted. For Having, select Log ID as Field; select count as Aggregate; select “>=” as Operator; select 10 as value. This means only security policies that match more than 10 times (including 10) will be counted. Your selections will automatically generate a SQL. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] Create Chart Library. Chart set the display form of the data. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. Complete name, security event session top domain and subscriber IDs drilldown chart. Leave description set to empty. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type}: Table. + \item For \textbf{Data Bindings}, select Drilldown as Table Type. Drilldown tables have three columns and you must select one as drilldown column. Complete Title, Width, Data Binding, Format and Legend for each column. And enable Drilldown Columns for Subscriber ID. Select order by sessions descending. Show Top 100 Http.Domains. Drilldown Top 5 on Subscriber ID. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, security event session top domain and subscriber IDs drilldown report. + \item Select a \textbf{Time Period}. Here select last 1 week, which is from yyyy-mm-dd-7 hh:mi:ss to yyyy-mm-dd hh:mi:ss. + \item \textbf{Enable Notification}, select Email as Output Profile. + + + Email: Enter recipient's e-mail. + \item Select the \textbf{Chart Library} you just created. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 4th: Double-lines}{The 4th: Double-lines} +\subsection*{\hypertarget{link:The 4th: Double-lines}{The 4$^{th}$: Double-lines}} +\label{sec:appendix_f:report:double-lines} + +Create a top N Line Report. For example, make a report about the session count group by Http.Domain (top 5) every day that our security policy matched in the last month. + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. + \item Enter a \textbf{Name}, security event counter by domain dataset. + \item Select a \textbf{Log Type}: Security Event. + \item Select the \textbf{Group by}. For Line Chart, you must select Receive Time. This will serve as the X-Axis Data Binding options for Chart Libraries. The report mainly displays Http.Domain, so add Http.Domain. This will be added to your Group by option in your Chart Libraries. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field consists of the Group by field you just added. You can add other fields. Field select Log ID. Aggregate select count. Label set to counter. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] Create Chart Library. Chart set the display form of the data. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. Complete name, security event counter by domain chart. Leave description set to empty. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. For Lines, select counter as Data Binding; select Default as Format; select Line Up as Type; input counter as Legend. Check Group by and select Http.Domain. Check Order by and select counter. Check Descending. Max line is 5. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, security event counter by domain report. + \item Select a \textbf{Time Period}. Here select last 1 month, which is from yyyy-(mm-1)-dd hh:mi:ss to yyyy-mm-dd hh:mi:ss. + \item Select the \textbf{Chart Library} you just created. Enter number and select time unit for \textbf{Time Granularity}. Here set it to 1 day. + \item Add \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This means, empty domain name will not be counted. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 5th: Area}{The 5th: Area} +\subsection*{\hypertarget{link:The 5th: Area}{The 5$^{th}$: Area}} +\label{sec:appendix_f:report:area} + +Create an Area Report. For example, make a report about the sum of bytes Sent and bytes Received and the sum of Packets Sent and Packets Received every day that our security policy matched in last month. + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. + \item Enter a \textbf{Name}, security event bytes and packets dataset. + \item Select a \textbf{Log Type}: Security Event. + \item Select the \textbf{Group by}. For Area Chart, you must select Receive Time. This will serve as the X-Axis (TimeLine) Data Binding options for Chart Libraries. You can add other Fields, which will be added to your Group by options in your Chart Libraries. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field consists of the Group by field you just added. You can add other fields. Field select bytes Sent and bytes Received; aggregate select sum; label set to bytes. Field select Packets Sent and Packets Received; aggregate select sum; label set to Packets. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] Create Chart Library. Chart set the display form of the data. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. Complete name, security event bytes and packets chart. Leave description set to empty. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type}: Area. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. For Lines, select bytes as Data Binding; select Bandwidth (Kbps/Mbps/Gbps) as Format; select Line Up as Type; input bytes as Legend. Select Packets as Data Binding; select Bandwidth (Kpps/Mpps/Gpps) as Format; select Line Down as Type; input Packets as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, security event bytes and packets report. + \item Select a \textbf{Time Period}. Here select last 1 month, which is from yyyy-(mm-1)-dd hh:mi:ss to yyyy-mm-dd hh:mi:ss. + \item Select the \textbf{Chart Library} you just created. Enter number and select time unit for \textbf{Time Granularity}. Here set it to 1 day. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 6th: Network Behavior Analysis for Specific User }{The 6th: Network Behavior Analysis for Specific User } +\subsection*{\hypertarget{link:The 6th: Network Behavior Analysis for Specific User }{The 6$^{th}$: Network Behavior Analysis for Specific User }} +\label{sec:appendix_f:report:6th} + +Create a report to analyze network behavior of specific user, such as specific IP address or Subscriber ID. For example, create a report for Internal IP 192.168.50.2. It will include 9 charts and tables, that display traffic trend, top access domain and top access URLs based on sessions. + +\begin{description} + \item[STEP 1.] Create 3 Datasets. Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. Select the same Log Type for the 3 datasets: Session Records. + \begin{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Metrics-Trend. + \begin{enumerate} + \item Select Receive Time as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings once and reference the same dataset when creating multiple charts. Now add 7 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to bytes. + \item Field select Bytes Sent; aggregate select sum; Label set to Bytes Sent. + \item Field select Bytes Received; aggregate select sum; Label set to Bytes Received. + \item Field select sessions; aggregate select sum; Label set to New sessions. + \item Field select Packets Sent and Packets Received; aggregate select sum; Label set to Packets. + \item Field select Packets Sent; aggregate select sum; Label set to Packets Sent. + \item Field select Packets Received; aggregate select sum; Label set to Packets Received. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Top-Access-Domain. + \begin{enumerate} + \item Select Http.Domain as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Sessions; aggregate select sum; label set to Sessions. + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude empty domains. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Top-Access-URL. + \begin{enumerate} + \item Select Http.URL as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Sessions; aggregate select sum; label set to Sessions. + \item Specify \textbf{Filter}. Select Http.URL as Field; select notEmpty as Operator. This configuration will exclude empty URLs. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 2.] Create 9 Chart Libraries. Chart set the display form of the data. Select \textbf{Reports} > \textbf{Chart Library} menu, and click Create. + \begin{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Bandwidth Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Metrics-Trend. + \item Select \textbf{Chart Type}: Area. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. You can add multiple Data Binding for Lines. + \begin{enumerate} + \item Select Bytes as Data Binding; select Bandwidth (Kbps/Mbps/Gbps) as Format; select Line Up as Type; input total as Legend. + \item Select Bytes Sent as Data Binding; select Bandwidth (Kbps/Mbps/Gbps) as Format; select Line Up as Type; input out as Legend. + \item Select Bytes Received as Data Binding; select Bandwidth (Kbps/Mbps/Gbps) as Format; select Line Up as Type; input in as Legend. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Packet Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Metrics-Trend. + \item Select \textbf{Chart Type}: Area. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. You can add multiple Data Binding for Lines. + \begin{enumerate} + \item Select Packets as Data Binding; select Bandwidth(Kpps/Mpps/Gpps) as Format; select Line Up as Type; input total as Legend. + \item Select Packets Sent as Data Binding; select Bandwidth (Kpps/Mpps/Gpps) as Format; select Line Up as Type; input out as Legend. + \item Select Packets Received as Data Binding; select Bandwidth (Kpps/Mpps/Gpps) as Format; select Line Up as Type; input in as Legend. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic New Sessions Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Metrics-Trend. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. Select New Sessions as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input New Sessions as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 30 Access Domains Detail. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-Domain. + \item Select \textbf{Chart Type}: Table. + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Domain as Data Binding; input Domain as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Select order by Sessions descending. Show Top 30. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 30 Access Domains Distribution. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-Domain. + \item Select \textbf{Chart Type}: Bar. + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. For X-Axis, select Domain as Data Binding; set Domain as Label; set Show Top to 30. For Y-Axis, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 10 Access Domains Percent. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-Domain. + \item Select \textbf{Chart Type}: Pie. + \item Set the \textbf{Data Bindings} for Category and Series. For Category, select Domain as Data Binding; set Domain as Label; set Show Top to 10. For Series, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. Check Bundle rest into ‘Others’. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 30 Access URLS Detail. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-URL. + \item Select \textbf{Chart Type}: Table. + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in URL as Title; select URL as Data Binding; input URL as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Select order by Sessions descending. Show Top 30. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 30 Access URLS Distribution. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-URL. + \item Select \textbf{Chart Type}: Bar. + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. For X-Axis, select URL as Data Binding; set URL as Label; set Show Top to 30. For Y-Axis, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 10 Access URLS Percent. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Access-URL. + \item Select \textbf{Chart Type}: Pie. + \item Set the \textbf{Data Bindings} for Category and Series. For Category, select URL as Data Binding; set URL as Label; set Show Top to 10. For Series, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. Check Bundle rest into ‘Others’. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, Traffic Report with Internal IP 192.168.50.2. + \item Select a \textbf{Time Period}. Select last 1 day. + \item Select the \textbf{Chart Library} you just created. Click Add Chart to add multiple charts. + \begin{enumerate} + \item Select Traffic Bandwidth Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Traffic Packets Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Traffic New Sessions Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Traffic Top 30 Access Domains Detail. + \item Select Traffic Top 30 Access Domains Distribution. + \item Select Traffic Top 10 Access Domains Percent. + \item Select Traffic Top 30 Access URLS Detail. + \item Select Traffic Top 30 Access URLS Distribution. + \item Select Traffic Top 10 Access URLS Percent. + \end{enumerate} + \item Specify \textbf{Filter}. Select Internal IP as Field; select “=” as Operator; set Value to 192.168.50.2. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 7th: Website Access Analysis for Specific Domain}{The 7th: Website Access Analysis for Specific Domain} +\subsection*{\hypertarget{link:The 7th: Website Access Analysis for Specific Domain}{The 7$^{th}$: Website Access Analysis for Specific Domain}} +\label{sec:appendix_f:report:7th} + +Create a report to analyze website access of specific domain, such as google.com. For example, create a custom report to analyze security events which hit google.com. It will include 5 charts and tables, that display traffic trend based on bandwidth and client IP number, security event action hit sessions trend and and top Server IP based on sessions. + +\begin{description} + \item[STEP 1.] Create 3 Datasets. Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. Select the same \textbf{Log Type} for the 3 datasets: Security Event. + \begin{enumerate} + \item Create a Dataset with \textbf{Name} Security-Intercept-Event-Metrics-Trend. + \begin{enumerate} + \item Select Receive Time as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 2 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Client IP; aggregate select count distinct; Label set to Unique Client IP. + \end{enumerate} + \item Specify \textbf{Filter}. Select Action as Field; select “=” as Operator; set Value to Intercept. This configuration will only include Security Events with intercept action. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Action-Hit-Sessions-Trend. + \begin{enumerate} + \item Select Receive Time and Action as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Log ID; Label set to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Server-IP. + \begin{enumerate} + \item Select Server IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Log ID; Label set to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 2.] Create 5 Chart Libraries. Chart set the display form of the data. Select \textbf{Reports} > \textbf{Chart Library} menu, and click Create. + \begin{enumerate} + \item Create a Chart Library with \textbf{Name} Security Intercept Event Metrics Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Intercept-Event-Metrics-Trend. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. For Lines, select Unique Client IP as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input Unique Client IP as Legend. Select Bytes as Data Binding; select Bandwidth(Kbps/Mbps/Gbps) as Format; select Line Down as Type; input bps as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Security Event Action Hit Sessions Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Action-Hit-Sessions-Trend. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. For Lines, select sessions as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input sessions as Legend. Check Group By and select Action. Check Order By, select sessions and check Descending. Show Top 10. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Security Event Top 30 Server IP Detail. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Server-IP. + \item Select \textbf{Chart Type}: Table. + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Server IP as Title; select Server IP as Data Binding; input Server IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Select order by Sessions descending. Show Top 30. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Security Event Top 30 Server IP Distribution. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Server-IP. + \item Select \textbf{Chart Type}: Bar. + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. For X-Axis, select Server IP as Data Binding; set Server IP as Label; set Show Top to 30. For Y-Axis, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Security Event Top 10 Server IP Percent. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Server-IP. + \item Select \textbf{Chart Type}: Pie. + \item Set the \textbf{Data Bindings} for Category and Series. For Category, select Server IP as Data Binding; set Server IP as Label; set Show Top to 10. For Series, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. Check Bundle rest into ‘Others’. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, Security Event Report with Domain google.com. + \item Select a \textbf{Time Period}. Select last 1 day. + \item Select the \textbf{Chart Library} you just created. Click Add Chart to add multiple charts. + \begin{enumerate} + \item Select Security Intercept Event Metrics Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Security Event Action Hit Sessions Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Security Event Top 30 Server IP Detail. Set 5 minutes for \textbf{Time Granularity}. + \item Select Security Event Top 30 Server IP Distribution. + \item Select Security Event Top 10 Server IP Percent. + \end{enumerate} + \item Specify \textbf{Filter}. Select Http.Domain as Field; select “=” as Operator; set Value to google.com. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 8th: Endpoints Access Analysis for Specific City}{The 8th: Endpoints Access Analysis for Specific City} +\subsection*{\hypertarget{link:The 8th: Endpoints Access Analysis for Specific City}{The 8$^{th}$: Endpoints Access Analysis for Specific City}} +\label{sec:appendix_f:report:8th} + +Customize a report to analyze endpoints access of specific Data Center. For example, create a report to analyze session records about endpoints information in specific Data Center. It will include 2 charts and tables, that display number of Unique External IP, Internal IP and Subscriber ID trend based on bandwidth and show Unique client IP number and Unique Subscriber ID number of Top 100 domains. + +\begin{description} + \item[STEP 1.] Create 2 Datasets. Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. Select the same \textbf{Log Type} for the 2 datasets: Session Records. + \begin{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Endpoints-Metrics-Trend. + \begin{enumerate} + \item Select Receive Time as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 5 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Sessions; aggregate select sum; Label set to Sessions. + \item Field select Internal IP; aggregate select count distinct; Label set to Unique Internal IP. + \item Field select External IP; aggregate select count distinct; Label set to Unique External IP. + \item Field select Subscriber ID; aggregate select count distinct; Label set to Unique Subscriber ID. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Top-Domain-with-Unique-Client-IP-and-Subscriber-ID. + \begin{enumerate} + \item Select Http.Domain as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 2 items. + \begin{enumerate} + \item Field select Client IP; aggregate select count distinct; Label set to Unique Client IP. + \item Field select Subscriber ID; aggregate select count distinct; Label set to Unique Subscriber ID. + \end{enumerate} + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude Session Records with empty domain. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 2.] Create 2 Chart Libraries. Chart set the display form of the data. Select \textbf{Reports} > \textbf{Chart Library} menu, and click Create. + \begin{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Endpoints Metrics Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Endpoints-Metrics-Trend. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. For Lines, select Unique External IP as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input Unique External IP as Legend; select Unique Internal IP as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input Unique Internal IP as Legend; select Unique Subscriber ID as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input Unique Subscriber ID as Legend. Select Bytes as Data Binding; select Bandwidth(Kbps/Mbps/Gbps) as Format; select Line Down as Type; input bps as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 100 Domains with Unique Client IP and Subscriber ID. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Domain-with-Unique-Client-IP-and-Subscriber-ID. + \item Select \textbf{Chart Type}: Table. + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Http.Domain as Data Binding; input Http.Domain as Legend. Fill in Unique Client IP as Title; select Unique Client IP as Data Binding; select Counter(K/M/G) as Format; input Unique Client IP as Legend. Fill in Unique Subscriber ID as Title; select Unique Subscriber ID as Data Binding; select Counter(K/M/G) as Format; input Unique Subscriber ID as Legend. Select order by Unique Client IP descending. Show Top 100. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, Traffic Report with Data Center DC1 and DC2. + \item Select a \textbf{Time Period}. Select last 1 day. + \item Select the \textbf{Chart Library} you just created. Click Add Chart to add multiple charts. + \begin{enumerate} + \item Select Traffic Endpoints Metrics Trend. Set 5 minutes for \textbf{Time Granularity}. + \item Select Traffic Top 100 Domains with Unique Client IP and Subscriber ID. + \end{enumerate} + \item Specify \textbf{Filter}. Select Data Center as Field; select “=” as Operator; set Value to DC1 and DC2. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 9th: Endpoints Details Analysis for Intercept Action }{The 9th: Endpoints Details Analysis for Intercept Action } +\subsection*{\hypertarget{link:The 9th: Endpoints Details Analysis for Intercept Action }{The 9$^{th}$: Endpoints Details Analysis for Intercept Action }} +\label{sec:appendix_f:report:9th} + +Customize a report to analyze endpoints details of intercept action. For example, create a report to analyze Security Event Logs about multiple dimensional endpoints information. It will include 8 charts and tables, that display endpoints statistics details, including Top Client IP, Server IP, Internal IP, External IP (by Sessions with Bandwidth), Top Domain Distribution (by Sessions with Bandwidth), Top Domain Drilldown Internal IP (by Sessions), Top Domain Drilldown Server IP (by Bandwidth), Top Subscriber ID Drilldown Domain (by Sessions). With the help of this example, you can have a better understanding of the meaning of Drilldown table and bar charts and how to create them. + +\begin{description} + \item[STEP 1.] Create 8 Datasets. Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. Select the same \textbf{Log Type} for the 2 datasets: Security Event. + \begin{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Internal-IP-by-Sessions-with-Bandwidth. + \begin{enumerate} + \item Select Internal IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 4 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Bytes Sent; aggregate select sum; Label set to Bytes Sent. + \item Field select Bytes Received; aggregate select sum; Label set to Bytes Received. + \item Field select Log ID; Label set to Sessions. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-External-IP-by-Sessions-with-Bandwidth. + \begin{enumerate} + \item Select External IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 4 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Bytes Sent; aggregate select sum; Label set to Bytes Sent. + \item Field select Bytes Received; aggregate select sum; Label set to Bytes Received. + \item Field select Log ID; Label set to Sessions. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Client-IP-by-Sessions-with-Bandwidth. + \begin{enumerate} + \item Select Client IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 4 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Bytes Sent; aggregate select sum; Label set to Bytes Sent. + \item Field select Bytes Received; aggregate select sum; Label set to Bytes Received. + \item Field select Log ID; Label set to Sessions. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Server-IP-by-Sessions-with-Bandwidth. + \begin{enumerate} + \item Select Server IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 4 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Bytes Sent; aggregate select sum; Label set to Bytes Sent. + \item Field select Bytes Received; aggregate select sum; Label set to Bytes Received. + \item Field select Log ID; Label set to Sessions. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Domain-by-Sessions. + \begin{enumerate} + \item Select Http.Domain as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Field select Log ID; Label set to Sessions. + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude Security Event Logs with empty Domain. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Domain-by-Internal-IP-and-Sessions. + \begin{enumerate} + \item Select Http.Domain and Internal IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Field select Log ID; Label set to Sessions. + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude Security Event Logs with empty Domain. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Domain-by-Server-IP-and-Bandwidth. + \begin{enumerate} + \item Select Http.Domain and Server IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude Security Event Logs with empty Domain. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Security-Event-Top-Subscriber-ID-by-Website-Domains-and-Sessions. + \begin{enumerate} + \item Select Http.Domain and Subscriber ID as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Field select Log ID; Label set to Sessions. + \item Specify \textbf{Filter}. You can add multiple items. Select Http.Domain as Field; select notEmpty as Operator. Click add and select Subscriber ID as Field; select notEmpty as Operator. This configuration will exclude Security Event Logs with empty Domain and Subscriber ID. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 2.] Create 9 Chart Libraries. Chart set the display form of the data. Select \textbf{Reports} > \textbf{Chart Library} menu, and click \textbf{Create}. + \begin{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Internal IP by Sessions with Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Internal-IP-by-Sessions-with-Bandwidth. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Internal IP as Title; select Internal IP as Data Binding; input Internal IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Fill in Bytes as Title; select Bytes as Data Binding; select Bandwidth(KB/MB/GB) as Format; input Bytes as Legend. Fill in Bandwidth as Title; select Bytes Sent as Data Binding; select Bar as Format; input Bytes Sent as Legend; select Bytes Received as Data Binding; select Bar as Format; input Bytes Received as Legend. Select order by Sessions descending. Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 External IP by Sessions with Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-External-IP-by-Sessions-with-Bandwidth. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in External IP as Title; select External IP as Data Binding; input External IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Fill in Bytes as Title; select Bytes as Data Binding; select Bandwidth(KB/MB/GB) as Format; input Bytes as Legend. Fill in Bandwidth as Title; select Bytes Sent as Data Binding; select Bar as Format; input Bytes Sent as Legend; select Bytes Received as Data Binding; select Bar as Format; input Bytes Received as Legend. Select order by Sessions descending. Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Client IP by Sessions with Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Client-IP-by-Sessions-with-Bandwidth. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Client IP as Title; select Client IP as Data Binding; input Client IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Fill in Bytes as Title; select Bytes as Data Binding; select Bandwidth(KB/MB/GB) as Format; input Bytes as Legend. Fill in Bandwidth as Title; select Bytes Sent as Data Binding; select Bar as Format; input Bytes Sent as Legend; select Bytes Received as Data Binding; select Bar as Format; input Bytes Received as Legend. Select order by Sessions descending. Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Server IP by Sessions with Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Server-IP-by-Sessions-with-Bandwidth. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Server IP as Title; select Server IP as Data Binding; input Server IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Fill in Bytes as Title; select Bytes as Data Binding; select Bandwidth(KB/MB/GB) as Format; input Bytes as Legend. Fill in Bandwidth as Title; select Bytes Sent as Data Binding; select Bar as Format; input Bytes Sent as Legend; select Bytes Received as Data Binding; select Bar as Format; input Bytes Received as Legend. Select order by Sessions descending. Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Website Domains Sessions Distribution. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Domain-by-Sessions. + \item Select \textbf{Chart Type}: Bar + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. For X-Axis, select Domain as Data Binding; set Domain as Label; set Show Top to 20. For Y-Axis, select Sessions as Data Binding; select Counter(K/M/G) as Format; set Label to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Website Domains by Internal IP and Sessions. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Domain-by-Internal-IP-and-Sessions. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Drilldown as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Domain as Data Binding; input Domain as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Fill in Internal IP as Title; select Internal IP as Data Binding; input Internal IP as Legend. Check Bundle rest into ‘Others’. Select order by Sessions descending. Show Top 20. For Drilldown, Fill in Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Website Domains by Server IP and Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Domain-by-Server-IP-and-Bandwidth. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Drilldown as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Domain as Data Binding; input Domain as Legend. Fill in Server IP as Title; select Server IP as Data Binding; input Server IP as Legend. Fill in Bytes as Title; select Bytes as Data Binding; select Bandwidth(KB/MB/GB) as Format; input Bytes as Legend. Check Bundle rest into ‘Others’. Select order by Bytes descending. Show Top 20. For Drilldown, Fill in Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 20 Subscriber ID by Website domains and Sessions. + \begin{enumerate} + \item Select \textbf{Dataset} Security-Event-Top-Subscriber-ID-by-Website-Domains-and-Sessions. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Drilldown as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Domain as Data Binding; input Domain as Legend. Fill in Subscriber ID as Title; select Subscriber ID as Data Binding; input Subscriber ID as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Check Bundle rest into ‘Others’. Select order by Sessions descending. Show Top 20. For Drilldown, Fill in Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, Security Event Intercept Endpoints Report. + \item Select a \textbf{Time Period}. Select last 1 day. + \item Select the \textbf{Chart Library} you just created. Click Add Chart to add multiple charts. + \begin{enumerate} + \item Select Top 20 Internal IP by Sessions with Bandwidth. + \item Select Top 20 External IP by Sessions with Bandwidth. + \item Select Top 20 Client IP by Sessions with Bandwidth. + \item Select Top 20 Server IP by Sessions with Bandwidth. + \item Select Top 20 Website Domains Sessions Distribution. + \item Select Top 20 Website Domains by Internal IP and Sessions. + \item Select Top 20 Website Domains by Server IP and Bandwidth. + \item Select Top 20 Subscriber ID by Website domains and Sessions. + \end{enumerate} + \item Specify \textbf{Filter}. Select Action as Field; select “=” as Operator; set Value to Intercept. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{The 10th: Traffic QoS Analysis for Specific Data Center }{The 10th: Traffic QoS Analysis for Specific Data Center } +\subsection*{\hypertarget{link:The 10th: Traffic QoS Analysis for Specific Data Center }{The 10$^{th}$: Traffic QoS Analysis for Specific Data Center }} +\label{sec:appendix_f:report:10th} + +Customize a report to diagnose traffic statistics for specific data center. For example, create a report to analyze traffic QoS for Data Center DC2. It will include 4 charts and tables, that display network traffic QoS, including Estimated One-sided Connections, Internal IP at Top ADC Bandwidth Tend, SSL Certificate Installation Unique Client IP Trend and Top Internal IP Drill down Sled IP (by Sessions). + + +\begin{description} + \item[STEP 1.] Create Datasets. Select \textbf{Reports} > \textbf{Datasets} menu. + \begin{enumerate} + \item Select a predefined Dataset with \textbf{Name} Estimated-One-sided-Connections. You can use the search function, click and select Name and enter the given name. + \item Create a Dataset with \textbf{Name} Traffic-Bandwidth-Trend-ADC-Internal-IP-192.168.50.2. + \begin{enumerate} + \item Select Session Records for \textbf{Log Type}. + \item Select Device ID and Receive Time as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Specify \textbf{Filter}. Select Internal IP as Field; select “=” as Operator; set Value to 192.168.50.2. This configuration will restrict data source only come from ADC with internal IP 192.168.50.2. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Unique-Client-Security-Intercept-Event-with-Bytes. + \begin{enumerate} + \item Select Security Event for \textbf{Log Type}. + \item Select Receive Time as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. You can add multiple items for data bindings. Now add 2 items. + \begin{enumerate} + \item Field select Bytes Sent and Bytes Received; aggregate select sum; Label set to Bytes. + \item Field select Client IP; aggregate select count distinct; Label set to Unique Client IP. + \end{enumerate} + \item Specify \textbf{Filter}. Select SSL.Intercept State as Field; select “=” as Operator; set Value to Intercept. This configuration will only include Security Events with intercept action. + \item Specify \textbf{Having}. Field select Bytes Sent and Bytes Received; Aggregate select sum; Operator select “>=”; Value set to 65535. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Top-Internal-IP-by-Sled-IP-and-Sessions. + \begin{enumerate} + \item Select Session Records for \textbf{Log Type}. + \item Select Internal IP and Sled IP as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Sessions; aggregate select sum; Label set to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Dataset with \textbf{Name} Traffic-Top-Domain-by-Establish-Latency-Time. + \begin{enumerate} + \item Select Session Records for \textbf{Log Type}. + \item Select Http.Domain as \textbf{Group by}. + \item Specify the \textbf{Data Bindings}, add field, aggregate, and label. Field select Establish Latency(ms); aggregate select avg; Label set to Avg Establish Latency(ms). + \item Specify \textbf{Filter}. Select Http.Domain as Field; select notEmpty as Operator. This configuration will exclude empty domains. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 2.] Create 4 Chart Libraries. Chart set the display form of the data. Select \textbf{Reports} > \textbf{Chart Library} menu, and click Create. + \begin{enumerate} + \item Create a Chart Library with \textbf{Name} Estimated One-sided Connections with Bandwidth. + \begin{enumerate} + \item Select \textbf{Dataset} Estimated-One-sided-Connections. + \item Select \textbf{Chart Type}: Area. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. You can add multiple Data Binding for Lines. + \begin{enumerate} + \item Select Bytes as Data Binding; select Bandwidth (Kbps/Mbps/Gbps) as Format; select Line Down as Type; input bps as Legend. + \item Select one\_side\_percent as Data Binding; select Default as Format; select Line Up as Type; input percent as Legend. + \end{enumerate} + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Bandwidth Trend Top 10 ADC Internal IP 192.168.50.2. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Bandwidth-Trend-ADC-Internal-IP-192.168.50.2. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. For Lines, select Bytes as Data Binding; select Bandwidth(Kbps/Mbps/Gbps) as Format; select Line Up as Type; input bps as Legend. Group By Device ID; Order By Bytes Descending; Show Top 10. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Security Intercept Event Certificated Unique Client Trend. + \begin{enumerate} + \item Select \textbf{Dataset} Unique-Client-Security-Intercept-Event-with-Bytes. + \item Select \textbf{Chart Type}: Line. + \item Set the \textbf{Data Bindings} for X-Axis and Lines. Select Receive Time defined in Group By from dataset as X-Axis. Select Time as Format. For Lines, select Unique Client IP as Data Binding; select Counter(K/M/G) as Format; select Line Up as Type; input Unique Client IP as Legend. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Traffic Top 20 Internal IP by Sled IP and Sessions. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Internal-IP-by-Sled-IP-and-Sessions. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Drilldown as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Internal IP as Title; select Internal IP as Data Binding; input Internal IP as Legend. Fill in Sled IP as Title; select Sled IP as Data Binding; input Sled IP as Legend. Fill in Sessions as Title; select Sessions as Data Binding; select Counter(K/M/G) as Format; input Sessions as Legend. Select order by Sessions descending. Show Top 20. For Drilldown, Fill in Show Top 20. + \item Click \textbf{OK}. + \end{enumerate} + \item Create a Chart Library with \textbf{Name} Top 100 Most Time Consuming Domains. + \begin{enumerate} + \item Select \textbf{Dataset} Traffic-Top-Domain-by-Establish-Latency-Time. + \item Select \textbf{Chart Type}: Table + \item For \textbf{Data Bindings}, select Regular as Table Type. Click to add Column. Complete Title, Width, Data Binding, Format and Legend for each column. Fill in Domain as Title; select Domain as Data Binding; input Domain as Legend. Fill in Avg Establish Latency(ms) as Title; select Avg Establish Latency(ms) as Data Binding; input Avg Establish Latency(ms) as Legend. Select order by Avg Establish Latency(ms) descending. Show Top 100. + \item Click \textbf{OK}. + \end{enumerate} + \end{enumerate} + \item[STEP 3.] Create a Report. + \begin{enumerate} + \item Enter a \textbf{Name}, Security Event Intercept Endpoints Report. + \item Select a \textbf{Time Period}. Select last 1 day. + \item Select the \textbf{Chart Library} you just created. Click Add Chart to add multiple charts. + \begin{enumerate} + \item Select Estimated One-sided Connections with Bandwidth. Set 5 minutes for \textbf{Time Granularity}. + \item Select Traffic Bandwidth Trend Top 10 ADC Internal IP 192.168.50.2. Set 5 minutes for \textbf{Time Granularity}. + \item Select Security Intercept Event Certificated Unique Client Trend. Set 1 hour for \textbf{Time Granularity}. + \item Select Traffic Top 20 Internal IP by Sled IP and Sessions. + \item Select Top 100 Most Time Consuming Domains. + \end{enumerate} + \item Specify \textbf{Filter}. Select Data Center as Field; select “=” as Operator; set Value to DC2. + \item Click \textbf{OK}. + \end{enumerate} +\end{description}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Decryption.tex b/TSG_Administrator's_Guide/content/Decryption.tex new file mode 100644 index 0000000..78b1828 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Decryption.tex @@ -0,0 +1,475 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Decryption}{Decryption} +\chapter*{\hypertarget{link:Decryption}{Decryption}} +\label{sec:decrypt} + +Except firewall, TSG has a proxy which utilizes MITM (Man-in-the-middle) technologies and enables you to perform layer 4-7 advanced manipulation of network traffic. +The Proxy is deployed in transparent mode; thus, no proxy settings on browser side. The proxy can decrypt and inspect traffic to control protocols and certificate verification. +The proxy handles encrypted traffic according to your configured security settings. Traffic will be reconstructed according to the TCP/IP protocol stack with the original headers +(source IP, source Port, destination IP, destination Port, Protocol, etc.) and decrypted payload. Decryption prevents malicious encrypted content from entering your network +and sensitive content from leaving your network concealed as encrypted traffic. +Enabling decryption need preparing the keys and certificates required, creating decryption profiles and configuring traffic mirror profile. + +{ +\color{linkblue} +\hyperlink{link:Decryption Concepts}{> Decryption Concepts} \\ +\hyperlink{link:Keys and Certificates}{> Keys and Certificates} \\ +\hyperlink{link:Certificate Managements}{> Certificate Managements}\\ +\hyperlink{link:Proxy Profiles}{> Proxy Profiles}\\ +} +\clearpage + +\pdfbookmark[1]{Decryption Concepts}{Decryption Concepts} +\section*{\hypertarget{link:Decryption Concepts}{Decryption Concepts}} +\label{sec:decrypt:concept} + +The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encryption protocols secure traffic between two entities, such as a web server and a client. Without special instructions, SSL in this document refers to SSL/TLS. SSL encapsulate traffic, encrypting data so that it is meaningless to entities other than the client and server with the certificates to affirm trust between the devices and the keys to decode the data. + + +The proxy uses certificates and keys to decrypt traffic to plaintext, and then enforces security settings on the plaintext traffic. After decrypting and inspecting traffic, the proxy re-encrypts the plaintext traffic as it exits the proxy to ensure privacy and security. + + +SSL decryption requires certificates to establish the proxy as a trusted third party, and to establish trust between a client and a server to secure an SSL/TLS connection. You can also use certificates when excluding servers from SSL decryption for technical reasons (the site breaks decryption for reasons such as certificate pinning, unsupported ciphers, or mutual authentication). + + +You can integrate a hardware security module (HSM) with TSG to enable enhanced security for the private keys. +To learn more about integrating an HSM, see \hyperlink{link:Manage Keys with a Hardware Security Module}{\color{linkblue}{Manage Keys with a Hardware Security Module}}. + +\pdfbookmark[1]{Keys and Certificates}{Keys and Certificates} +\section*{\hypertarget{link:Keys and Certificates}{Keys and Certificates}} +\label{sec:decrypt:keys} + +Keys are strings of numbers typically generated using a mathematical operation involving random numbers and large primes. Keys transform strings—such as passwords and shared secrets—from unencrypted plaintext to encrypted ciphertext and from encrypted ciphertext to unencrypted plaintext. Keys can be symmetric (the same key is used to encrypt and decrypt) or asymmetric (one key is used for encryption and a mathematically related key is used for decryption). Any system can generate a key. + + +X.509 certificates establish trust between a client and a server to establish an SSL connection. A client attempting to authenticate a server (or a server authenticating a client) knows the structure of the X.509 certificate and therefore knows how to extract identifying information about the server from fields within the certificate, such as the FQDN or IP address (called a common name or CN within the certificate) or the name of the organization, or user to which the certificate was issued. A certificate authority (CA) must issue all certificates. After the CA verifies a client or server, the CA issues the certificate and signs it with a private key. + + +When you decrypt traffic, a session between the client and the server is established only if the firewall trusts the CA that signed the server certificate. In order to establish trust, the firewall must have the server root CA certificate in its Trusted Certificate Authorities list and use the public key contained in that root CA certificate to verify the signature. The firewall then presents a copy of the server certificate for the client to authenticate. You can also configure the firewall to use an enterprise CA for SSL Proxy. If the firewall does not have the server root CA certificate in its Trusted Certificate Authorities list, the firewall will present a copy of the server certificate signed by the Forward Untrust certificate to the client. The Forward Untrust certificate ensures that clients are prompted with a certificate warning when attempting to access sites hosted by a server with untrusted certificates. + + +The change of the static expiration time for new generated certificates will not cause a service shutdown or other problems that negatively affect the decryption. + + +TSG allows you to delete installed certificates, including default certificate, change global and default certificate; +but if the certificate is already referenced by a policy, TSG does not allow deleting it. You can modify the referenced certificate instead. +For detailed information on certificates, see \hyperlink{link:Certificate Management}{\color{linkblue}{Certificate Management}}. + +\pdfbookmark[1]{Certificate Managements}{Certificate Managements} +\section*{\hypertarget{link:Certificate Managements}{Certificate Managements}} +\label{sec:decrypt:certificate} + +The digital certificates are used to ensure trust between parties in a secure communication session. Each certificate contains a cryptographic key to encrypt plaintext or decrypt ciphertext. Each certificate also includes a digital signature to authenticate the identity of the issuer. The issuer must be in the list of trusted certificate authorities (CAs) of the authenticating party. + +\pdfbookmark[2]{Trusted Certificate Authorities}{Trusted Certificate Authorities} +\subsection*{\hypertarget{link:Trusted Certificate Authorities}{Trusted Certificate Authorities}} +\label{sec:decrypt:certificate:trusted} + +TSG trusts the most common and trusted authorities (CAs) by default. These trusted certificate providers are responsible for issuing the certificates TSG requires to secure connections to the internet. The additional CAs you might want to add are trusted enterprise CAs that your organization requires. You can perform the following to import a certificate: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Certificate Managements} and select \textbf{Trusted Certificate Authorities} tab, Click \textbf{Import}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. It can use only letters, numbers, hyphens, and underscores. + \item[STEP 3.] Click \textbf{Please upload} and upload a PEM (base64-encoded) format file. + \item[STEP 4.] Click \textbf{OK}. +\end{description} + +Go back to Trusted Certificate Authorities tab, you can view detailed information about the CA you just created. +To edit and delete CAs, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +The system will periodically check whether the CA certificate has expired. +If the CA certificate expires, the system will automatically set the status of the CA certificate to disable. +To download it, you can click the cloud icon under \textbf{File}, and wait a few seconds for the file to be downloaded to your local folder. +You can search CAs based on ID, Name, Issuer, Common Name and Certificate Fingerprint, or the combination. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Decryption Keyrings}{Decryption Keyrings} +\subsection*{\hypertarget{link:Decryption Keyrings}{Decryption Keyrings}} +\label{sec:decrypt:certificate:keyring} + +If your enterprise has its own public key infrastructure (PKI), you can import a certificate and private key into TSG from your enterprise certificate authority (CA). Enterprise CA certificates (unlike most certificates purchased from a trusted, third-party CA) can automatically issue CA certificates for applications such as SSL/TLS decryption. + + +Note that the built-in certificate with ID 1(\#1) means trusted certificate, and built-in certificate with ID 0(\#0) means untrusted certificate. You can add trusted certificate to TSG with two methods. One is local management with TSG interface through the following procedure; the other is integrate an external HSM device, the certificate will be saved to the HSM for specified website. For more details about HSM, see Manage Keys with a Hardware Security Module. + + +\notemark\textit{If the HSM is down, the firewall can process decryption for sites of HSM mode for which it has cached the response from the HSM, meanwhile the firewall will deploy default certificates (\#0 or \#1) for those un-cached sites of HSM mode.} + + +You can perform the following to Import a Certificate and Private Key: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Certificate Managements} and select \textbf{Decryption Keyrings} tab, Click \textbf{Create} + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] \textbf{Please Upload} a \textbf{Certificate}. For Intermediate CA, certificate must be a complete chain. + \item[STEP 4.] \textbf{Please Upload} a \textbf{Private Key File} separately. It supports PEM (base64-encoded) format only. + If you have your digital keys stored in HSM, please select \textbf{HSM}, and fill in \textbf{Slot ID}. + \item[STEP 5.] Enter customized \textbf{Reissue Expiry Hours} or select Mirror Server Certificate. + \item[STEP 6.] Select a \textbf{Type} from Root Certificate, Intermediate Certificate and End-entity. + \item[STEP 7.] Select \textbf{Public Key Algorithm} from RSA 1024, RSA 2048, SECP 256r1 and SECP 384r1. + \item[STEP 8.] Enter \textbf{Certificate Revocation List} address or leave the value set to empty. + \item[STEP 9.] Enable \textbf{Include root in client-side certificate chain} if you wish to. +\end{description} + +Go back to Decryption Keyrings tab, you can view detailed information about the Keyrings you just created. +To edit and delete Keyrings, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +To download it, you can click the cloud icon under \textbf{Private Key} and \textbf{Certificate}, and wait a few seconds for the file to be downloaded to your local folder. +You can search Keyrings based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[3]{Manage Keys with a Hardware Security Module}{Manage Keys with a Hardware Security Module} +\subsubsection*{\hypertarget{link:Manage Keys with a Hardware Security Module}{Manage Keys with a Hardware Security Module}} +\label{sec:decrypt:certificate:keyring:hsm} + +A hardware security module (HSM) is a physical device that manages digital keys. An HSM provides secure storage and generation of digital keys. It provides both logical and physical protection of these materials from non-authorized use and potential adversaries. HSM clients integrated with TSG enable enhanced security for the private keys used in SSL/TLS decryption. + + +You can integrate Hardware Security Module (HSM) device on TSG and reference it in Decryption Keyrings. + + +You can integrate an HSM device by the following procedure. + +\begin{description} + \item[STEP 1.] Select \textbf{Devices} > \textbf{HSM} and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Select \textbf{HSM Server Type}. For now, only support CERTEX HSM. + \item[STEP 4.] Specify \textbf{Server IP} and \textbf{Partition Password}. Password only allow English letters, numbers, underscore \_, minus sign \-, English dot (.) and its minimum 6 bits, maximum 16 bits. + \item[STEP 5.] Click \textbf{Reachability Test} to know the status of HSM. + \item[STEP 6.] Select \textbf{Data Center} of the HSM. + \item[STEP 7.] Click \textbf{OK}. +\end{description} + +\pdfbookmark[2]{SSL Decryption Exclusion}{SSL Decryption Exclusion} +\subsection*{\hypertarget{link:SSL Decryption Exclusion}{SSL Decryption Exclusion}} +\label{sec:decrypt:certificate:exclusion} + +SSL Decryption Exclusion can exclude two types of traffic from decryption: + + +• Traffic that breaks decryption for technical reasons, such as using a pinned certificate, unsupported ciphers, or mutual authentication (decrypting blocks the traffic). If you encounter sites that break decryption technically and are not on the SSL Decryption Exclusion list, you can add them to list manually by server hostname. + + +• Traffic that you choose not to decrypt because of business, regulatory, personal, or other reasons, such as financial-services, health-and-medicine, or government traffic. You can choose to exclude traffic based on FQDN. + + +\notemark\textit{To increase visibility into traffic and reduce the attack surface as much as possible, don’t make decryption exceptions unless you must.} + + +Perform the following to exclude a Server from Decryption: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Certificate Managements} and select \textbf{SSL Decryption Exclusion} tab, Click \textbf{Create}. + \item[STEP 2.] Enter an \textbf{FQDN}, it supports suffix matching and exactly matching only. E.g. *.example.com, \$www.example.com. + \item[STEP 3.] Enter a \textbf{Description}. The description can have up to 255 characters. + \item[STEP 4.] Click \textbf{OK}. +\end{description} + +If you create an SSL Decryption Exclusion entry, actually TSG will create an FQDN object which contains only one item. But this FQDN object can only be seen in SSL Decryption Exclusion and will be referenced in TSG built-in Policy ID 1. + + +Go back to SSL Decryption Exclusion tab, you can view detailed information about the SSL Decryption Exclusion list you just created. +To edit and delete, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +You can search exclusion list based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Cached Intermediate Certificates}{Cached Intermediate Certificates} +\subsection*{\hypertarget{link:Cached Intermediate Certificates}{Cached Intermediate Certificates}} +\label{sec:decrypt:certificate:cached} + +TSG will automatically cache intermediate certificates. You can select \textbf{Settings} > \textbf{Certificate Managements} +and select \textbf{Cached Intermediate Certificates} tab to view detailed information about these Intermediate Certificates. +These Intermediate Certificates are issued by Trusted Certificate Authorities, which is an effort to amend the incomplete certificate chain. +TSG will collect the following information: source website, issuer by, issuer to, Cn, and expiry date. + + +To download it, you can click the icon under \textbf{File}, and wait a few seconds for the file to be downloaded to your local folder. +You can also enable and disable it by clicking the switch under \textbf{Enabled}. +The system will periodically check whether the intermediate certificate has expired. +If the intermediate certificate expires, the system will automatically set the status of the intermediate certificate to disable. +You can search intermediate certificates based on ID, Source Website, Issuer, Common Name and Certificate Fingerprint, or the combination. +Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{SSL Fingerprint}{SSL Fingerprint} +\subsection*{\hypertarget{link:SSL Fingerprint}{SSL Fingerprint}} +\label{sec:decrypt:certificate:fingerprint} + +With the improvement of people's security awareness, more and more apps support Pinning. And JA3 fingerprinting is no longer a luxury and is a hard requirement. You can use shared JA3 hash across the network to help accurately identify Pinning applications and then configure the app to Dynamic Bypass or not accordingly in TSG. It can mean the difference between a rapid response and a missed detection. + + +It is difficult to collect JA3 hash for Pinning Apps, but as a traffic inspection device, TSG can determine exactly which apps are Not Pinning. And It is relatively easy to collect JA3 hash for Not Pinning Apps. Over time, more and more JA3 hashes of Not Pinning have been collected. If an SSL connection exhibits Pinning characteristics and is not included in the collected JA3 hash of Not Pinning, it is more accurate than ever to tell the APP is Pinning. Under the circumstances, the Dynamic Bypass is recommended in profile. If an SSL connection exhibits Pinning characteristics and is included in the collected JA3 hash of Not Pinning, it is more accurate than ever to tell the APP is a browser without installed root certificate. Under the circumstances, the Intercept is recommended in profile. To configure Dynamic Bypass or Intercept for Pinning Apps, see Decryption Profile. + + +The overall process is as follows: + +\begin{description}[leftmargin=0pt] + \item + \begin{enumerate} + \setlength{\topsep}{0pt} + \item The firewall collects JA3 hash through security event logs or session records. And you can view SSL.JA3 hash field and query by it in the specific logs page. + \item Analyze JA3 hash through TSG report. For example, you can create the following JA3 hash related reports. + \begin{enumerate} + \item In session records, perform top N statistics on JA3 hash according to different SNI numbers. + \item In security event logs, perform top N statistics on SNI according to the number of unique JA3 hash. + \item In security event logs, perform top N on the combination of JA3 hash and SNI according to the bytes transmitted. + \item In security event logs or session records, according to the number of unique JA3 hash, perform top N statistics on Client IP or Internal IP. + \end{enumerate} + \item TSG administrator imports JA3 hashes that meet the requirements in the report analysis result into the DB through TSG interface. + \item JA3 hash is synchronized from DB to Redis. Redis delivers JA3 hash to Proxy. And Proxy uses JA3 hash for Pinning identification. + \end{enumerate} +\end{description} + +Perform the following steps to create an SSL fingerprint: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Certificate Managements}, select \textbf{SSL Fingerprint} tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{JA3 Hash}. + \item[STEP 3.] Select Yes or No for \textbf{Pinning}. + \item[STEP 4.] (\textcolor{gold}{Optional})Enter a \textbf{Description}. The description can have up to 1024 characters. + \item[STEP 5.] Click \textbf{OK}. +\end{description} + +Go back to SSL Fingerprint tab, you can view detailed information about the SSL Fingerprint list you just created. +To edit and delete, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +You can search fingerprint list based on ID and JA3 Hash. Click the Import or Export icon on the right to import or export csv file for SSL fingerprint. +You can also upload User-Agent using json formats. The User-Agent string is often used for content negotiation, +where the origin server selects suitable content or operating parameters for the response. +The concept of content tailoring is built into the HTTP standard in RFC1945 “for the sake of tailoring responses to avoid particular user agent limitations.” +The information in the User-Agent string contributes to the information that the client sends to the server, since the string can vary considerably from user to user. + +\pdfbookmark[1]{Proxy Profiles}{Proxy Profiles} +\section*{\hypertarget{link:Proxy Profiles}{Proxy Profiles}} +\label{sec:decrypt:profile} + +A policy rule combines with several conditions and one action. The action determines how to control the traffic, and action parameters are managed in policy profiles. +While policy objects enable you to identify traffic to enforce policies, policy profiles help you define further action. + +\pdfbookmark[2]{Response Pages}{Response Pages} +\subsection*{\hypertarget{link:Response Pages}{Response Pages}} +\label{sec:decrypt:profile:response} + +When the Proxy Policy or Security Policy terminates matched HTTP session with a response page in Deny action, +you can specify a Response Code and a Response Content to generate an error page +or you could upload a html file via \textbf{Proxy Profile} > \textbf{Response Pages}. + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Proxy Profile}, select \textbf{Response Pages} tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Please Upload a \textbf{File}. Allow html/htm format only. +\end{description} + +Go back to Response Pages tab, you can view detailed information about the page you just created. +To edit and delete, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +To download it, you can click the cloud icon under \textbf{File}, and wait a few seconds for the file to be downloaded to your local folder. +You can search page list based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Insert Scripts}{Insert Scripts} +\subsection*{\hypertarget{link:Insert Scripts}{Insert Scripts}} +\label{sec:decrypt:profile:insert} + +The Proxy Policy can insert a “js” or “css” scripts to webpages. You can upload a script via \textbf{Proxy Profile} > \textbf{Insert Scripts}. + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Proxy Profile}, select \textbf{Insert Script}s tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Please Upload a \textbf{Script}. Allow js” and “css” only. + \item[STEP 4.] Select a \textbf{Script Type} from drop-down. +\end{description} + +Go back to Insert Scripts tab, you can view detailed information about the scripts you just created. +To edit and delete, find the item you want to edit or delete in the list. +Click \textbf{Edit} or \textbf{Delete} at the top left. To download it, you can click the cloud icon under \textbf{File}, +and wait a few seconds for the file to be downloaded to your local folder. +You can search scripts list based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Hijack Files}{Hijack Files} +\subsection*{\hypertarget{link:Hijack Files}{Hijack Files}} +\label{sec:decrypt:profile:hijack} + +The Proxy Policy can hijack a downloading file or page. You can upload a file, img or html for hijack via \textbf{Proxy Profile} > \textbf{Hijack Files}. + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Proxy Profile}, select \textbf{Hijack Files} tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 64 characters. + \item[STEP 3.] Please Upload a \textbf{File}. Allow img, exe, apk, and html type only. + \item[STEP 4.] Enable Mirror Server Response or enter a \textbf{Download Name}. + \item[STEP 5.] Select a \textbf{File Type}. +\end{description} + +\notemark\textit{Note that the Maximum Limitation is 20MB for your uploaded file.} + + +Go back to Hijack Files tab, you can view detailed information about the file you just created. To edit and delete, find the item you want to edit or delete in the list. +Click \textbf{Edit} or \textbf{Delete} at the top left. To download it, you can click the cloud icon under File, and wait a few seconds for the file to be downloaded to your local folder. +You can search file list based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Traffic Mirror Profiles}{Traffic Mirror Profiles} +\subsection*{\hypertarget{link:Traffic Mirror Profiles}{Traffic Mirror Profiles}} +\label{sec:decrypt:profile:mirror} + +You also can mirror proxied traffic (decrypted) to third-party servers by referring a traffic mirror profile. The destination servers are described with VLAN Tag or MAC addresses, traffic will be load balanced over multiple servers of one profile. + + +You can manage the profile by the following procedure: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Proxy Profile}, select \textbf{Traffic Mirror Profiles} tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Select VLAN or MAC as your \textbf{Connectivity} from drop-down. + \item[STEP 4.] Enter \textbf{VLAN ID/MAC}. Make sure to input valid mirror destination MAC address. +\end{description} +Go back to Traffic Mirror Profiles tab, you can view detailed information about the profile you just created. +To edit and delete, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. +You can search profile list based on ID and Name. Enter search conditions in search bar and click search icon. + +\pdfbookmark[2]{Decryption Profile}{Decryption Profile} +\subsection*{\hypertarget{link:Decryption Profile}{Decryption Profile}} +\label{sec:decrypt:profile:decryptionprofile} + +A Decryption Profile includes three parts: Certificate Checks, Dynamic bypass and Protocol Version. + +\pdfbookmark[3]{Certificate Checks}{Certificate Checks} +\subsubsection*{\hypertarget{link:Certificate Checks}{Certificate Checks}} +\label{sec:decrypt:profile:decryptionprofile:check} + +Server certificate verification options allow you to customize certificate check approaches. + + +\textbf{Common Name}: TSG checks if the client hello’s SNI extension matches CN and SAN of the certificate. + + +\textbf{Issuer}: TSG checks the certificate chain if the issuer is a trusted certificate authority list. See Certificate Managements > Trusted Certificate Authorities > Built-in for a complete list. + + +\textbf{Self-signed}: TSG checks if a certificate is self-signed. + + +\textbf{Expiry Date}: TSG checks if a certificate is expired with the system clock. + + +\textbf{Fail Action}: If certificate is considered invalid, the proxy will take the fail action: + +\begin{itemize} + \item \textbf{Fail-Close}: Terminate the SSL session by close the TCP connection. + \item \textbf{Pass-through}: For expired, untrusted issuer or self-signed certificate, TSG send a certificate that signed by the default untrusted keyring to client-side. Thus, the client-side browser raises an untrusted issuer warning. For mismatched common names, TSG send a certificate that signed by policy defined keyring, client-side browser raises a common name invalid warning. +\end{itemize} + +\pdfbookmark[3]{Dynamic Bypass}{Dynamic Bypass} +\subsubsection*{\hypertarget{link:Dynamic Bypass}{Dynamic Bypass}} +\label{sec:decrypt:profile:decryptionprofile:bypass} + +Dynamic bypass options allow you to customize intercept exceptions on policy basis. If an SSL session matches an intercept policy, and has one of following enabled properties, further communication will be exempt from intercept. That is to say, with dynamic bypass enabled, client-side can visit normally. + + +\textbf{EV Certificate}: An Extended Validation (EV) Certificate is a certificate used for HTTPS websites and software that proves the legal entity controlling the website or software package. Obtaining an EV certificate requires verification of the requesting entity's identity by a certificate authority. + + +\textbf{Certificate Transparency}: Certificate Transparency (CT) is an internet security standard and open source framework for monitoring and auditing digital certificates. + + +\textbf{Mutual Authentication}: Mutual authentication is a process or technology in which both entities in a communications link authenticate each other. The server sends a client certificate request, and the client must response with a valid certificate. Proxy could not intercept SSL sessions with mutual authenticated, these sessions will be blocked when this option is disabled. + + +\textbf{On Protocol Errors}: Protocol errors are unsupported ciphers, communication exceptions and etc., enable this option will increase network availabilities. + + +\textbf{Certificate Pinning}: The application known the server certificate by hard-coding, and can then ignore the device's trust store and rely on its own. +The proxy detects pinning by client alert and SSL handshake errors. The proxy can also determine whether the current connection is Pinning through the SSL fingerprint profile. +The SSL Fingerprint profile will be checked in advanced than client alert and SSL handshake errors when proxy detects pinning. +Proxy could not intercept SSL sessions with certificate pinning, these sessions will be blocked when this option is disabled. +For more details, see \textbf{\hyperlink{link:Dynamic Bypass when Certificate Pinning}{\color{linkblue}{Dynamic Bypass when Certificate Pinning}}}. + + +\textbf{Certificate Not Installed}: Trusted Root Certificate is Not Installed on Client. +For more details, see \textbf{\hyperlink{link:Dynamic Bypass when Certificate is Not Installed}{\color{linkblue}{Dynamic Bypass when Certificate is Not Installed}}}. + +\pdfbookmark[4]{Dynamic Bypass when Certificate Pinning}{Dynamic Bypass when Certificate Pinning} +\hypertarget{link:Dynamic Bypass when Certificate Pinning}{\paragraph{Dynamic Bypass when Certificate Pinning}} +\label{sec:decrypt:profile:decryptionprofile:bypass:pinning} + +%\newline +Certificate pinning is the process of a client check the server certificate with its pre-configured certificate list, if the server certificate does not match then the client will prevent the session from taking place. This enforcement ensures that the user devices are communicating only to the dedicated trustful servers. Applications, such as Facebook, Twitter and Apple App store, utilize certificate pinning approach. + + +In order for an SSL proxy to decrypt and re-encrypt traffic so that a proxy policy can be enforced it needs to intercept the server certificate sent by the server to the client. Once it has intercepted the server certificate it will replace the server certificates with keyring signed ones. If a site works in a browser but not in an app on the same device, you are almost certainly looking at an instance of certificate pinning. + + +In reality, MITM applications of certificate pinning will block their communications. Alternatively, you can configure SSL Proxy to automatically bypass the next connection when the first N attempts to establish a connection fails. + + +The following behavior are indications of application use certificate pinning: + +• The proxy received an SSL ALERT Message from the client during the SSL handshake. The Alert is usually an “Unknown CA (48)” alert indicating Certificate Pinning. + + +• The proxy received no alerts, instead, it received a TCP reset after the handshake is done. + + +If the SSL connection establishment fails as above for 4 or more times in 5 minutes, the proxy will consider it as certificate pinning, following attributes will be recorded for bypassing further connections: + + +• Client IP address + + +• Server Name Indicator (SNI) of SSL handshake message, if any + + +• SSL fingerprints, e.g. cipher suites of SSL handshake message + + +Different applications often have different handshake fingerprints, and therefore the proxy will only bypass those use certificate pinning. + +\pdfbookmark[4]{Dynamic Bypass when Certificate is Not Installed}{Dynamic Bypass when Certificate is Not Installed} +\hypertarget{link:Dynamic Bypass when Certificate is Not Installed}{\paragraph{Dynamic Bypass when Certificate is Not Installed}} +\label{sec:decrypt:profile:decryptionprofile:bypass:notinstalled} + +%\newline +As a best practice, the trusted root certificate certificates should be installed on clients to ensure that the browsers/apps perform the certificate checks to validate the identity of the proxy before establishing a connection. When client does not install the trusted root certificate, intercept its SSL connection will be failed. + + +The challenge is the behavior of certificate not installed is very similar to certificate pinning. The proxy determines whether the current connection is Not Pinning by querying the SSL fingerprint profile. When an SSL connection fails like certificate pinning, and its fingerprint status is Not Pinning, the application is not considered as certificate pinning. Following figure shows the process. + + +The following graph shows difference on Certificate Pinning and Certificate is Not Installed: + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/dynamic_bypass} + %\caption{Figure: Inspection Stage} + \label{fig:system:dynamic_bypass} +\end{figure} + +You can configure SSL Proxy to automatically bypass those applications, or alternatively, still intercept to make the client install the trusted root certificate. + + +Let’s dig into the technical details by a use case. There are two clients, client A and B, reside in our network. They shared a same IPv4 address (NAT), where client A has trusted root certificate installed and uses Facebook app (pinning); client B has no root certificate installed and uses Chrome to visit Facebook website (not pinning). With dynamic bypass configuration: + + +• Certificate Pinning: Enabled + + +• Certificate Not Installed: Disabled + + +At the beginning, both Client A and B’s SSL connections are failed for their own reasons. And then, the proxy identifies client B’s SSL connection as MITMable by finding Chrome’s SSL fingerprints status is Not Pinning in the SSL fingerprint profile. Finally, Client A is bypassed, and client B is not. + +\pdfbookmark[3]{Protocol Version}{Protocol Version} +\subsubsection*{\hypertarget{link:Protocol Version}{Protocol Version}} +\label{sec:decrypt:profile:decryptionprofile:version} + +Protocol Versions allows you to configure SSL/TLS versions. By default, Proxy mirrors the client versions. Note that some website disable SSLv3 supports for security concerns, set both minimum and maximum version to SSLv3 will interrupt communications. + + +HTTP/2 is a major revision of the HTTP network protocol that provide increased speed. If Allow HTTP/2 is enabled, user will have better experience, but requires third-party systems to be able to process decrypted HTTP/2 traffic. + +\pdfbookmark[3]{Create a Decryption Profile}{Create a Decryption Profile} +\subsubsection*{\hypertarget{link:Create a Decryption Profile}{Create a Decryption Profile}} +\label{sec:decrypt:profile:decryptionprofile:create} + +Perform the following to create a decryption profile: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Proxy Profile}, select \textbf{Decryption Profile} tab, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Enable or disable the following certificate checks: \textbf{Common Name}, \textbf{Issuer}, \textbf{Self-signed} and \textbf{Expiry Date}. If you enable Common Name, select Fail-close or Pass-through as your \textbf{Fail Action}. + \item[STEP 4.] Enable or disable the following Dynamic bypass: \textbf{EV Certificate}, \textbf{Certificate Transparency}, \textbf{Mutual Authentication}, \textbf{On Protocol Errors}, \textbf{Certificate Pinning}, \textbf{Certificate Not Installed}. + \item[STEP 5.] Enable or disable the following Protocol Versions: \textbf{Mirrors Client Versions}, \textbf{Allow HTTP/2}. If you disable Mirrors Client Versions, you need to select the Min Version and Max Version from SSLv3.0, TLSv1.0, TLSv1.1, TLSv1.2 and TLSv1.3. +\end{description} + +Go back to Decryption Profile tab, you can view detailed information about the profile you just created. To edit and delete, find the item you want to edit or delete in the list. +Click \textbf{Edit} or \textbf{Delete} at the top left. You can search profile list based on ID and Name. Enter search conditions in search bar and click search icon. diff --git a/TSG_Administrator's_Guide/content/Getting_Started.tex b/TSG_Administrator's_Guide/content/Getting_Started.tex new file mode 100644 index 0000000..46dd77d --- /dev/null +++ b/TSG_Administrator's_Guide/content/Getting_Started.tex @@ -0,0 +1,420 @@ + +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Getting Started}{Getting Started} +\chapter*{\hypertarget{link:Getting Started}{Getting Started}} +\label{sec:intro} +\addcontentsline{toc}{chapter}{Preface} + +The following topics provide system overview and detailed steps to help you logging into Tiangou Secure Gateway (TSG). +Then it goes on to elaborate how to set up a basic security policy and a basic proxy policy. +Administrators can configure, manage, and monitor Tiangou Secure Gateway using the web interface, CLI, and TSG Integration API. + +{ +% \color{ctcolortitle} +\color{linkblue} +\hyperlink{link:system overview}{> System Overview} \\ +\hyperlink{link:Logging into the System}{> Logging into the System} \\ +\hyperlink{link:Set Up a Basic Security Policy}{> Set Up a Basic Security Policy}\\ +\hyperlink{link:Set Up a Basic Proxy Policy}{> Set Up a Basic Proxy Policy}\\ +\hyperlink{link:Command Line Interface}{> Command Line Interface}\\ +\hyperlink{link:TSG Integration API}{> TSG Integration API}\\ +\hyperlink{link:TSG Administration}{> TSG Administration}\\ +} +\clearpage + +\pdfbookmark[1]{System Overview}{System Overview} +\section*{\hypertarget{link:system overview}{System Overview}} +\label{sec:intro:overview} + +\pdfbookmark[2]{Purpose}{Purpose} +\subsection*{\hypertarget{link:Purpose}{Purpose}} +\label{sec:intro:overview:purpose} + +The Tiangou Secure Gateway (TSG) can be used for any purpose where keeping track of the traffic flowing in a network is useful. + + +The following are examples of such purposes:\\ +• Protecting the network from malicious traffic.\\ +• Enforcing network policies.\\ +• Lawful interception.\\ +• Network performance optimization.\\ +• Network visualization\\ + +\pdfbookmark[2]{System Introduction}{System Introduction} +\subsection*{\hypertarget{link:System Introduction}{System Introduction}} +\label{sec:intro:overview:introduction} + +Tiangou Secure Gateway (TSG) is a scalable traffic management product for all types of network environments. +TSG performs deep packet and flow inspection on Internet Protocol (IP) packets, and classifies their content using stream-based analysis engine. +TSG Firewalls are devices or programs that control the flow of network traffic between networks or hosts that employ differing security postures. +TSG firewall uses a network stack to process the packet, like the OSI model. When a network packet passes through, it will be parsed and resembled to a network session. +And the reassembled network session is decoded to identify the embedded content. + + +Tiangou Secure Gateway’s Proxy module enables authorities to perform layer 4-7 advanced manipulation of application and user traffic for interception. +The Proxy is deployed in transparent mode; thus, no proxy settings on browser side. + + +TSG enables service providers and organizations to gain insight into their network and control traffic in high-performance environments, +such as large data centers and high-bandwidth network perimeters. TSG allows content visibility of HTTP, DNS, MAIL, FTP and SSL. +TSG identifies and controls applications as well as evasive tools blocking. The TSG is able to modify HTTP sessions, as well as override redirect request, +modify headers, inject scripts, replace texts and respond with an uploaded file. +The TSG has an SSL Proxy allows all decrypted traffic to be mirrored to a third-party system for additional analysis. + + +\pdfbookmark[2]{Who is this Guide for?}{Who is this Guide for?} +\subsection*{\hypertarget{link:Who is this Guide for}{Who is this Guide for?}} +\label{sec:intro:overview:for} + +This manual is for TSG operators, system administrators and implementation personnel. + + +\pdfbookmark[1]{Logging into the System}{Logging into the System} +\section*{\hypertarget{link:Logging into the System}{Logging into the System}} +\label{sec:intro:logging} + +You can use the Web Interface to perform configuration and monitoring tasks with relative ease. +This graphical interface allows you to access TSG using HTTP and it is the best way to perform administrative tasks. + + +It is recommended to use the following web browsers:\\ +• Chrome 83+\\ +However, the best practice is to install the latest version. + + +\begin{description} + \item[STEP 1.]Using a browser, open the home page of the system, for example, (http://<IP address>). You can use the IPv4 or IPv6 address. + \item[STEP 2.]Enter your username and password defined for the TSG, select your own \textbf{Language} and set the \textbf{Authentication Mode} to \textbf{LOCAL}, then click \textbf{Login}. + \item[STEP 3.]You can see your User Name at the top right of the web interface. Click it and you can change the language settings to English, Chinese or Russian. You can also Sign Out from here. +\end{description} + + +\notemark\textit{Lightweight Directory Access Protocol (LDAP) is a standard protocol for accessing information directories. +You can connect to an LDAP server when you set the Authentication Mode to LDAP.} + + +\pdfbookmark[2]{Logging into the Web Interface}{Logging into the Web Interface} +\subsection*{\hypertarget{link:Logging into the Web Interface}{Logging into the Web Interface}} +\label{sec:intro:logging:for} + +\pdfbookmark[2]{Changing Your Password}{Changing Your Password} +\subsection*{\hypertarget{link:Changing Your Password}{Changing Your Password}} +\label{sec:intro:logging:password} + +You should periodically change your password. The following procedure explains how to change the password while logged into TSG. + + +\begin{description} + \item[STEP 1.]Select \textbf{Administration} > \textbf{Users} and find your account item in the list. + \item[STEP 2.]Click the item in the list, then click \textbf{Edit}. + \item[STEP 3.]Check your account information and enter your new password. + \item[STEP 4.]Click \textbf{OK}.\\ +\end{description} + +\pdfbookmark[2]{Login Restrictions}{Login Restrictions} +\subsection*{\hypertarget{link:Login Restrictions}{Login Restrictions}} +\label{sec:intro:logging:restrictions} + +TSG restricts administrator logins to improve system security. An IP address will be Lockout after maximum login attempts. +And you can specify limited IP addresses to be able to login the system. Configure Login Restrictions by the following procedure: + + +\begin{description} + \item[STEP 1.]Select \textbf{Administration} > \textbf{Login Restrictions}. + \item[STEP 2.]If you wish to set the IP addresses that are allowed to log in, enable \textbf{Set to allow login IP}. By default, it is off, and all IP addresses are allowed to log in. + Once enabled, up to 256 IPv4 CIDRs can be configured. For example, 192.168.0.1/32, 192.168.1.1/24. + \item[STEP 3.](\textcolor{gold}{Optional})Add \textbf{IP} addresses if you enabled Set to allow login IP. + \item[STEP 4.]Configure \textbf{Maximum Login Attempts}, if the number of attempts reaches the limit, the client IP will be locked. + \item[STEP 5.]Specify \textbf{Lockout Time}. Within the lockout time period, this client IP cannot log into the system even with the correct user name and password. + \item[STEP 6.]Click \textbf{OK}. +\end{description} + +\pdfbookmark[1]{Set Up a Basic Security Policy}{Set Up a Basic Security Policy} +\section*{\hypertarget{link:Set Up a Basic Security Policy}{Set Up a Basic Security Policy}} +\label{sec:intro:security} + +Use the following workflow set up a very basic Security policy. This gives you a brief idea of policies so that you can verify that you have successfully configured TSG. + +\begin{description} + \item[STEP 1.] Launch the Web Interface. + \begin{enumerate} + \item Select \textbf{Policies} > \textbf{Security} and click \textbf{Create}. + \item Enter a descriptive \textbf{Name} for the rule. + \item Set the \textbf{Action} to \textbf{Allow}. + \item Specify a \textbf{Source} IP Address or leave the value set to \textbf{any}. + \item Specify a \textbf{Destination} IP Address or leave the value set to \textbf{any}. + \item Select the \textbf{Application}. You can select multiple applications. For more details, see \hyperlink{link:Applications}{\color{linkblue}{Applications}}. + \item (\textcolor[RGB]{205,153,16}{Optional})\textbf{Add} a \textbf{Filter} or leave the value empty. + \item (\textcolor{gold}{Optional})Specify a \textbf{Tag} or leave the value empty. + You can select one or more Policy Tags which are created from \textbf{Policies} > \textbf{Tags} previously. Optionally, you can click the plus icon to create new Tags. + After you click the icon, a page will slide in on the right. Enter the \textbf{Tag Category}. Pick a \textbf{Color}. And add one or multiple \textbf{Tags}. + Then you can select the tag you just created from the list. + \item (\textcolor{gold}{Optional})Specify \textbf{Effective Devices} by choosing Device Tags or leave the value empty, which means the policy is effective on all devices by default. + \item (\textcolor{gold}{Optional})Select a \textbf{Schedule} or leave the value set to always. + \item Verify that \textbf{Log Session} is enabled. Only traffic that matches the Security policy rule will be logged in Security Event Logs. + \item (\textcolor{gold}{Optional})Enter a \textbf{Description} for the rule. + \item Verify that Enabled is enabled. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 2.] (\textcolor{gold}{Optional})To verify that you have set up your basic policies effectively, test whether your Security policy rules are being evaluated and determine which Security policy rule applies to a traffic flow. For example, to verify the policy rule that will be applied for a client with the IP address 192.168.0.1 when it sends a HTTP request to the 172.16.0.1 server: + \begin{enumerate} + \item Select \textbf{Settings} > \textbf{Trouble Shooting} and select \textbf{Policy Verify} tab. + \item Select \textbf{Security Policy Match} from the \textbf{Select Test} drop-down. + \item Enter the \textbf{Client IP} and \textbf{Server IP} addresses. + \item Specify the \textbf{Client Port} and \textbf{Server Port}. + \item Select the \textbf{Protocol} and \textbf{APP ID} from the drop-down. + \item Click \textbf{Verify} to execute the \textbf{Security policy match} test. + \end{enumerate} + \item[STEP 3.] After the policy has been hit, view Logs to monitor the policy rule status and determine the effectiveness of the policy rule. + Select \textbf{Logs} > \textbf{Security Event Logs} and view relative information about the policy. +\end{description} + + +\notemark\textit{When you are creating or editing policies and objects, click the sidebar menu will not navigate you to the corresponding page. +A prompt window will appear to remind you that changes you made are not saved.} + + +\pdfbookmark[1]{Set Up a Basic Proxy Policy}{Set Up a Basic Proxy Policy} +\section*{\hypertarget{link:Set Up a Basic Proxy Policy}{Set Up a Basic Proxy Policy}} +\label{sec:intro:proxy} + +Security Policies with Intercept actions intercept HTTP/HTTPS traffic for proxy, which is a prerequisite for proxy policy. + + +You can perform the following to set up a basic proxy policy. \\ +\begin{description} + \item[STEP 1.] Add a rule. + \begin{enumerate} + \item Select \textbf{Policies} > \textbf{Proxy} and click \textbf{Create} to add a new rule. + \item Enter a descriptive \textbf{Name} for the rule. + \item Define what action you want TSG to take for traffic that matches the rule. Select an \textbf{Action}. See \hyperlink{link:Proxy Actions}{\color{linkblue}{Proxy Policy Actions}} for a description of each action. + \item Define the matching criteria for the source fields in the packet. Specify a \textbf{Source} IP Address/ User or leave the value set to any. + \item Define the matching criteria for the destination fields in the packet. Specify a \textbf{Destination} IP Address or leave the value set to any. + \item (\textcolor{gold}{Optional})Specify a \textbf{Filters} as match criteria for the rule. For example, select a \textbf{Category} for \textbf{Host}. If you select a category, only web traffic will match the rule and only if the traffic is destined for that specified category. + \item (\textcolor{gold}{Optional})If the Action is Redirect, specify the \textbf{Application}. + \item (\textcolor{gold}{Optional})Specify a \textbf{Tag} or leave the value empty. + You can select one or more Policy Tags which are created from \textbf{Policies} > \textbf{Tags} previously. Optionally, you can click the plus icon to create new Tags. + After you click the icon, a page will slide in on the right. Enter the \textbf{Tag Category}. Pick a \textbf{Color}. + And add one or multiple \textbf{Tags}. Then you can select the tag you just created from the list. + \item Specify \textbf{Effective Devices} by choosing Device Tags or leave the value empty, which means the policy is effective on all devices by default. + \item (\textcolor{gold}{Optional})Enter a \textbf{Description} for the rule. + \item Select a \textbf{Schedule} or leave the value set to always. + \item Verify that \textbf{Log Session} is enabled if you wish to have proxy event logs. When Log Session is enabled, select Metadata only for \textbf{Log Options} or set it to All by default. + \item Verify that \textbf{Enabled}is on. + \item Click \textbf{OK} to save the policy rule. + \end{enumerate} + \item[STEP 2.] (\textcolor{gold}{Optional})To verify that you have set up your basic policies effectively, test whether your Proxy Policy rules are being evaluated + and determine which Proxy Policy rule applies to a traffic flow. + \begin{enumerate} + \item Select \textbf{Settings} > \textbf{Trouble Shooting} and select \textbf{Policy Verify} tab. + \item Select \textbf{Proxy Policy Match} from the \textbf{Select Test} drop-down. + \item Enter the \textbf{Client IP} and \textbf{Server IP} addresses or leave it set to default. + \item Specify the \textbf{Client Port} and \textbf{Server Port} or leave it set to default. + \item Select the \textbf{Protocol} and \textbf{APP ID} from the drop-down. + \item Click \textbf{Verify} to execute the Proxy Policy Match test. + \end{enumerate} + \item[STEP 3.] Go to \textbf{Logs} > \textbf{Proxy Event Logs} and view \textbf{Logs} to monitor the policy rule status, verify if the proxy rule has been hit and determine the effectiveness of the policy rule. +\end{description} + +\pdfbookmark[1]{Command Line Interface}{Command Line Interface} +\section*{\hypertarget{link:Command Line Interface}{Command Line Interface}} +\label{sec:intro:command} + +You can use the TSG Command Line Interface (CLI) to perform a series of tasks by entering commands in rapid succession over SSH. +The TSG CLI is a TSG specific command shell. By leveraging industry-standard tools and utilities, the CLI provides a set of commands that you can use to monitor and configure TSG devices. +TSG CLI supports two types of command, TSG specified commands and Linux-like system operational commands. +TSG specified commands help control policy and object, configure and check devices status. The commands related with policy and object control work on all TSG devices cluster. +The other CLI commands only work on local device. When you become familiar with the nesting structure and syntax of the commands, the CLI provides quick response times and administrative efficiency. + + +For more details, please view \textcolor{darkblue}{\textbf{\underline{TSG CLI User Guide}}}. + +\pdfbookmark[1]{TSG Integration API}{TSG Integration API} +\section*{\hypertarget{link:TSG Integration API}{TSG Integration API}} +\label{sec:intro:api} + +TSG Integration API is a web service implemented using HTTP requests and responses following architecture style REST the RESTful API. +You can use this RESTful API to streamline your operations and integrate with existing, internally developed applications and repositories. + + +For more details, please refer to \textcolor{darkblue}{\textbf{\underline{TSG Integration API Specification}}}. + + +\pdfbookmark[1]{TSG Administration}{TSG Administration} +\section*{\hypertarget{link:TSG Administration}{TSG Administration}} +\label{sec:intro:admin} + +\pdfbookmark[2]{Configure TSG Users}{Configure TSG Users} +\subsection*{\hypertarget{link:Configure TSG Users}{Configure TSG Users}} +\label{sec:intro:admin:users} + +The following table list three authentication mode for TSG:\\ +%\begin{longtable}{ccccccccccc} + %{p{3cm}!{\color{white}\vrule width 3pt}p{12cm}} +%\begin{tabularx}{0.8\textwidth}{@{\extracolsep{\fill}}X|X} +%\end{longtable} +%\resizebox{\textwidth}{15mm}{\begin{tabular}{cccccccccccc} + %\resizebox{\textwidth}{10cm}{ \midrule \bottomrule +\begin{table}[h] + \begin{tabularx}{\textwidth}{p{0.27\textwidth}|p{0.67\textwidth}} + %\cellcolor[HTML]{000000}{\color[HTML]{FFFFFF} Authentication Mode} & \cellcolor[HTML]{000000}{\color[HTML]{FFFFFF} Privileges} \\ \hline + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Authentication Mode}} & \textcolor{white}{Privileges} \\\hline + LOCAL & The administrative account credentials mechanisms are local to TSG and provide full access to the web interface.\\\hline + SSH Keys & The CLI specified administrative accounts are local to the TSG, but authentication to the CLI is based on SSH keys.\\\hline + External service & The administrative accounts you define locally on TSG serve as references to the accounts defined on an external LDAP server. The external server performs authentication.\\\hline + \end{tabularx} +\end{table} +%\begin{table}[h] +% \caption[A useless table]{A useless table.} +% \labtab{useless} +% \begin{tabular}{ c c c c } +% \toprule +% col1 & col2 & col3 & col 4 \\ +% \midrule +% \multirow{3}{4em}{Multiple row} & cell2 & cell3 & cell4\\ & +% cell5 & cell6 & cell7 \\ & +% cell8 & cell9 & cell10 \\ +% \multirow{3}{4em}{Multiple row} & cell2 & cell3 & cell4 \\ & +% cell5 & cell6 & cell7 \\ & +% cell8 & cell9 & cell10 \\ +% \bottomrule +% \end{tabular} +%\end{table} +To restrict system access to authorized users, TSG provides role-based access control (RBAC). The basic concept of RBAC is that permissions are associated with roles, +and users are made members of appropriate roles, thereby acquiring the roles' permissions. This leads to “user-role-permission” authorization model. In TSG system, +the relationship between users and roles is one-to-one, and the relationship between roles and functional permissions is one-to-many. That is, a user can only have one role, +and a role can be assigned multi-level permissions to different features. For each feature, there are three permission levels: Enable, Read Only and Disable. +When the user has Read Only permission to a feature which normally is related with certain menu, the user cannot click Create, Edit, Delete, Enable and Disable button +and the detail pages of Policies and Objects are locked. + + +• Enable—Read/write access to the selected feature.\\ +• Read Only—Read-only access to the selected feature.\\ +• Disable—No access to the selected feature.\\ + +\pdfbookmark[3]{Users and Roles}{Users and Roles} +\subsubsection*{\hypertarget{link:Users and Roles}{Users and Roles}} +\label{sec:intro:admin:users:role} + +Perform the following steps to add a LOCAL administrative account on TSG.\\ +\begin{description} + \item[STEP 1.] Select \textbf{Administration} > \textbf{Users}, select tab Users and click \textbf{Create}. + \item[STEP 2.] Enter a \textbf{Name} to identify the account. + \item[STEP 3.] Enter your \textbf{User Name} which is the login name and \textbf{Password}. + \item[STEP 4.] Please \textbf{Confirm Password}. + \item[STEP 5.] If you enable \textbf{Required Password Change}, fill in the \textbf{Required Password Change Period}. + A message will show up when you login after the period expires to enforce you to change to a new password. + \item[STEP 6.] Verify that the account is \textbf{Enabled}. + \item[STEP 7.] Select \textbf{Role Management} from dropdown list. Each account must and can only have one role, which defines different user permissions. + For details, see \hyperlink{link:Roles and Permissions}{\textcolor{linkblue}{Roles and Permissions}}. + \item[STEP 8.] Click \textbf{OK}. + \item[STEP 9.] (\textcolor{gold}{Optional})To verify that you have add a TSG account effectively, you can \textbf{Sign Out} and log into the system with the new account. + Select \textbf{Administration} > \textbf{Login Log} and you can view your login information. +\end{description} +If compliance, audit, or security requirements stipulate that the default administrative account must be removed from your devices, +you can remove it after you create at least one other superuser administrative account. +You cannot remove the default administrative account until you configure at least one other superuser administrative account on the device. +Perform the following steps to delete an account on TSG.\\ +\begin{description} + \item[STEP 1.] Select tab Users of \textbf{Administration} > \textbf{Users} and find the item you want to delete in the list. + \item[STEP 2.] Click \textbf{Delete} at the top left. Click \textbf{Delete} to confirm. +\end{description} +If you wish to temporarily disable an account, you can search it by User Name or Name at the top right search box. +Then click the switch under \textbf{Enable}. Please make sure your account is assigned the proper role with proper permission before you do \textbf{Delete} or \textbf{Enable}. +See \hyperlink{link:Roles and Permissions}{\textcolor{linkblue}{Roles and Permissions}} to find more details. + + +\notemark\textit{And TSG supports 100 concurrent users at present.} + +\pdfbookmark[3]{Roles and Permissions}{Roles and Permissions} +\subsubsection*{\hypertarget{link:Roles and Permissions}{Roles and Permissions}} +\label{sec:intro:admin:users:permission} + +There are two predefined roles in TSG, including:\\ +• superuser: full permissions to all features and can create new accounts.\\ +• superreader: read only permissions to all features. + + +\notemark\textit{If a user’s role permissions enable TSG feature "Administrator-Users-Users" and at least include "Administrator-Users-Roles" Read Only access, +the user can create new users, and modify other users’ role permissions. This ability can affect the access rights of all users, please authorize with caution.} + + +Perform the following to create a new role: + + +\begin{description} + \item[STEP 1.] Select \textbf{Administration} > \textbf{Users}, select tab Roles and click \textbf{Create}. + \item[STEP 2.] Enter a \textbf{Name} to identify the role. + \item[STEP 3.] (\textcolor{gold}{Optional})Enter your \textbf{Description}. + \item[STEP 4.] Click the icon before each \textbf{Menu} to switch the permission levels, which defines different permissions. + \item[STEP 5.] Click \textbf{OK}. +\end{description} + + +\notemark\textit{It is recommended to configure the same access permission for Policies, Objects and Settings menu, because their data are related. +Make sure Devices are enabled before you enable Dashboard, because Devices affects the reading of data for device module in Dashboard.} + + +\pdfbookmark[2]{Enroll LDAP Servers}{Enroll LDAP Servers} +\subsection*{\hypertarget{link:Enroll LDAP Servers}{Enroll LDAP Servers}} +\label{sec:intro:admin:ldap} + +Configuring TSG to connect to a LDAP server enables you to login in LDAP Authentication Mode with LDAP account. Perform the following steps to add a LDAP server on TSG. + + +\begin{description} + \item[STEP 1.] Select \textbf{Administration} > \textbf{LDAP Server} and click \textbf{Create}. + \item[STEP 2.] Define a \textbf{Name} to specify the LDAP server. + \item[STEP 3.] Enter your \textbf{Host} and \textbf{Port} of the LDAP server. + \item[STEP 4.] Enter your \textbf{User Name}, which is the administrative user of LDAP server, and \textbf{User Mapper} which specifies the hierarchy of LDAP user. + \item[STEP 5.] Enter the \textbf{Password} of user in STEP 4. Verify that \textbf{Enabled} is on. + \item[STEP 6.] \textbf{Test Connection}. After success, click \textbf{OK}. + \item[STEP 7.] (\textcolor{gold}{Optional})To verify that you have add a LDAP server effectively, you can view related information on the \textbf{LDAP Server} list page. +\end{description} + + +After setting LDAP server, you can login using the LDAP accounts of enrolled LDAP server. +After a LDAP account login TSG first time, the LDAP accounts will show on the tab \textbf{Users} of \textbf{Administration} > \textbf{Users}. +The column Source indicates the type of account which is shown as LDAP for LDAP account. +The column User name includes the full path for LDAP user, and the value of “uid” is the actual login username on TSG. +When logging into TSG system for the first time with LDAP user, TSG system will assign the user the role supperreader by default. +If the LDAP user requires other role permissions, you need to login by other users who have permission to modify a user’s role to modify it. + + +In \textbf{Administration} > \textbf{LDAP Server} page, you can view the LDAP Server list. Operator displays who has modified the item, and it can be a LOCAL or LDAP account. +Select the item you wish to change in the list and click \textbf{Edit} to modify LDAP server information. +You can delete or disable the LDAP server and after that you will not be able to log into the system with the LDAP account. + +\pdfbookmark[2]{Audit Log}{Audit Log} +\subsection*{\hypertarget{link:Audit Log}{Audit Log}} +\label{sec:intro:admin:audit} + +If you perform an operation which influence the running of TSG, TSG will generate a log about this action. +For example, Audit Log will record the operations of adding or deleting or updating an object or policy, or clearing traffic logs, etc. +You can view \textbf{Administration} > \textbf{Audit Log} to see details. You can query audit logs within certain time range by ID, Source IP or Target Type. +Audit logs can be exported as trace evidence. And when you are editing a policy or an object, you will find a link to audit log about this policy or object. + +\pdfbookmark[2]{Mail Server}{Mail Server} +\subsection*{\hypertarget{link:Mail Server}{Mail Server}} +\label{sec:intro:admin:mail} + +Configure Mail Server to send mail alerts, which is currently used to send reports. Perform the following to create a Mail server profile: + + +\begin{description} + \item[STEP 1.] If you perform an operation which influence the running of TSG, TSG will generate a log about this action. + For example, Audit Log will record the operations of adding or deleting or updating an object or policy, or clearing traffic logs. + You can view \textbf{Administration} > \textbf{Audit Log} to see details. + \item[STEP 2.] Select \textbf{Administration} > \textbf{Mail Server}. + \item[STEP 3.] For Simple Mail Transport Protocol (SMTP) server (email server), Add a \textbf{Server} and \textbf{Port}. + \item[STEP 4.] Enable \textbf{Need Authentication}. + \item[STEP 5.] Define a \textbf{Name} to identify the SMTP server (1-32characters). This field is just a label and doesn’t have to be the hostname of an existing email server. + Define \textbf{E-mail}, the name to show in the \textbf{From} field of the email. + \item[STEP 6.] Enable \textbf{SSL}. + \item[STEP 7.] Click \textbf{OK} to save the Email server profile. +\end{description} + + +To verify if the mail server works well, you can generate a Report and \textbf{Enable Notification} to send emails. For details, see \hyperlink{link:View and Manage Reports}{\textcolor{linkblue}{View and Manage Reports}}. + diff --git a/TSG_Administrator's_Guide/content/Monitoring.tex b/TSG_Administrator's_Guide/content/Monitoring.tex new file mode 100644 index 0000000..af5d9cf --- /dev/null +++ b/TSG_Administrator's_Guide/content/Monitoring.tex @@ -0,0 +1,779 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Monitoring}{Monitoring} +\chapter*{\hypertarget{link:Monitoring}{Monitoring}} +\label{sec:monitor} + +To forestall potential issues and to accelerate incidence response when needed, TSG provides intelligence about traffic and user patterns using customizable and informative reports. +The dashboard, logs, and reports on TSG allow you to monitor activity on your network. You can monitor the logs and filter the information to generate reports with predefined +or customized views. For example, you can use the predefined templates to generate reports on user activities or analyze the reports and logs to interpret unusual behavior +on your network and generate a custom report on the traffic pattern. For a visually engaging presentation of network activity, the dashboard chart, with which you can interact +to find the information you care about. + +{ +\color{linkblue} +\hyperlink{link:Use the Dashboard}{> Use the Dashboard} \\ +\hyperlink{link:View and Manage Logs}{> View and Manage Logs} \\ +\hyperlink{link:View and Manage Report}{> View and Manage Report}\\ +\hyperlink{link:Take Packet Captures}{> Take Packet Captures}\\ +} +\clearpage + +\pdfbookmark[1]{Use the Dashboard}{Use the Dashboard} +\section*{\hypertarget{link:Use the Dashboard}{Use the Dashboard}} +\label{sec:monitor:dashboard} + +The TSG Dashboard include two sub menus, Main Board and Live Chart. Main Board show general TSG system overview, endpoints, policy hits statistics. By default, the Main Board shows information of the last 24 hours. However, you can customize time range by clicking the time widget. By default, the statistics on the screen will not refresh automatically. You can turn it on and the Minimum Refresh Time is 15s. The following table describes the Main Board widgets: + + +\begin{longtable}{p{0.15\textwidth}|p{0.21\textwidth}|p{0.56\textwidth}} + \rowcolor{black}\multicolumn{2}{l!{\vlinewhite}}{\textcolor{white}{Main Board}} & \textcolor{white}{Description}\\\hline + \multirow{5}{*}{\tabincell{l}{System\\ Overview}} & Traffic & Monitor traffic bandwidth over time. You can view Bits, Packets and Sessions number. Bits is the accumulated bits sent/received. Packets is the accumulated packets sent/received. Sessions is the total sessions blocked/allowed.\\ \cline{2-3} + & New & Displays the count number of New connections, which go through the system. \\ \cline{2-3} + & Live & Displays the count number of current active connections, which go through the system. \\ \cline{2-3} + & Device Count & Device Count shows the devices number in TSG, and the devices number that are in Up, Down and Alarm status. And it provides a link to NEZHA system. \\ \cline{2-3} + & Security Policy & Enabled count, total count and Disabled count of Security Policy. Hover over Total, and you can also get enabled and disabled count about Proxy Policy. \\ \hline + \multirow{2}{*}{\tabincell{l}{Security\\ Policy Hits}} & \tabincell{l}{Security Policy\\ Hits by action} & Hits are the times that traffic matched the criteria you defined in the Security Policy rule. A display of Security Policy Hits by action within the current time scope. You can view the Number of hit action by Sessions, Packets and bytes. \\ \cline{2-3} + & \tabincell{l}{Security Policy\\ Top Hits} & Displays Top 10 or 100 Security Policy Hits. You can view either the tables or bars. \\ \hline + \multirow{5}{*}{Endpoints} & Active Client IP & Displays Active Client IP by Sessions, Packets and bytes. You can view either the tables, pies or bars. \\ \cline{2-3} + & Active Server IP & Displays Active Server IP by Sessions, Packets and bytes. You can view either the tables, pies or bars. \\ \cline{2-3} + & Active Subscriber ID & Displays Active Subscriber ID by sessions, Packets and bytes. You can view either the tables, pies or bars. \\ \cline{2-3} + & Top URLs & Displays Top URLs of Security and Proxy Policy Hits by session count. You can view either the tables or bars. \\ \cline{2-3} + & Top Domains & Displays Top Domains by sessions, Packets and bytes. You can view either the tables, pies or bars. \\ \hline + \multirow{3}{*}{\tabincell{l}{Proxy Policy\\ Hits}} & Proxy Policy Hits by action & Hits are the times that traffic matched the criteria you defined in the Proxy Policy rule. A display of Proxy Policy Hits by action within the current time scope. You can view the Number of hit action by Sessions, Packets and bytes number. \\ \cline{2-3} + & \tabincell{l}{Proxy Policy\\ Pinning} & Displays Pinning information for SSL/TSL traffic. \\ \cline{2-3} + & Proxy Policy Top Hits & Displays Top 10 or 100 Proxy Policy Hits. You can view either the tables or bars. \\ \hline +\end{longtable} + + +Live Chart show network summary, survey statistics, throughput and protocol information. Live Chart shows information of last 12 hours, and you can also customize it. Each built-in dashboard contains multiple widgets which can be expanded for detail view. The following table describes the Live Chart widgets: + + +\begin{longtable}{p{0.13\textwidth}|p{0.22\textwidth}|p{0.57\textwidth}} + \rowcolor{black}\multicolumn{2}{l!{\vlinewhite}}{\textcolor{white}{Live Chart}} & \textcolor{white}{Description}\\\hline + \multicolumn{2}{l!{\vlineblack}}{Network Summary} & Displays Unique Client IP count, Sessions, Date Rate and Throughput. \\ \hline + \multicolumn{2}{l!{\vlineblack}}{Survey Statistics} & Displays the percentage and number of Uncategorized Traffic, One-side Connections, Sequence Gap Loss and Packet Fragmentation. \\ \hline + \multirow{4}{*}{Protocols} & Total Throughput & Displays Total Throughput in real-time by protocol. When you click the Protocol Composition pie chart, it updates dynamically. The first time to enter the page the X-axis displays 20\% of the current time scope. (Sometimes the peak data is outside the display window, so the line graph will appear empty.) You can adjust the display time window as needed. \\ \cline{2-3} + & \tabincell{l}{Protocol\\ Composition} & Classify traffic by protocol shown in pie chart view. The pie chart shows the distribution (or percentage) of each level of protocol and the total bandwidth.\\ \cline{2-3} + & Network Protocol Tree & It is like the Protocol Composition widget, but displayed in tree structure.\\ \cline{2-3} + & Protocol Statistics & Displays the Sent Packets, Received Packets and Sessions of each protocol.\\ \hline +\end{longtable} + + +\notemark\textit{You can click a specific protocol to display the detailed data about it shown in the adjacent widget: Total Throughput, Network Protocol Tree and Protocol Statistics. As you can see the three widgets change dynamically when you click different protocol. By default, the reports of ETHERNET will be displayed. For the full list of Network Protocol Tree, please refer to Appendix B Network Protocol Tree.} + +\pdfbookmark[1]{View and Manage Logs}{View and Manage Logs} +\section*{\hypertarget{link:View and Manage Logs}{View and Manage Logs}} +\label{sec:monitor:log} + +A log is an automatically generated, time-stamped file that provides an audit trail for network traffic events that TSG monitors. Log records contain columns, which are properties, activities, or behaviors associated with the logged event. Each log type records information for a different event type. You can see the following 4 log types in the Log pages. + + +• Security Event Logs + + +• Proxy Event Logs + + +• Session Records + + +• Radius Logs + +\pdfbookmark[2]{Log Types}{Log Types} +\subsection*{\hypertarget{link:Log Types}{Log Types}} +\label{sec:monitor:log:type} + +Security Event Logs and Proxy Event Logs + + +• Security Event Logs and Proxy Event Logs data provides the ability to validate rule additions and rule changes and to monitor the time frame when a rule was used. The log gives you the information to determine whether a rule is effective for access enforcement. + + +Session Records + + +• Session records regardless of policy configuration; it shows all traffic that is allowed on your network. Traffic logs display an entry for the start and end of each session. + + +Radius Logs + + +• Remote Authentication Dial-In User Service (RADIUS) is a broadly supported networking protocol that provides centralized authentication and authorization. +TSG will keep track of radius traffic information, including Packet Type, Account, Nas IP, Framed IP, ACC Status Type and so on. +You can use the Account information in radius log to create \hyperlink{link:Subscriber ID}{\color{linkblue}{Subscriber ID}} object. + + +Please refer to \hyperlink{link:Appendix C Log Fields Description}{\color{linkblue}{Appendix C Logs Fields Description}} for more details. + +\pdfbookmark[2]{View Logs}{View Logs} +\subsection*{\hypertarget{link:View Logs}{View Logs}} +\label{sec:monitor:log:view} + +You can view the different log types on TSG in a tabular format. + + +\begin{description} + \item[STEP 1.] Select \textbf{Logs}. Select a log type from the list. + \item[STEP 2.] (\textcolor{gold}{Optional}) Customize the log column display. + \begin{enumerate} + \item Click the gear icon to the left of any column header. + \item Select columns to display from the list. The log updates automatically to match your selections. + \end{enumerate} + \item[STEP 3.] View additional details about log entries. + \begin{enumerate} + \item Click the \textbf{Log ID} for a specific log entry. The Detailed Log View has more information about the source and destination of the session, as well as a list of sessions related to the log entry. + \item (\textcolor{gold}{Optional})If you are viewing Security Event Logs and Proxy Event Logs, hover over the \textbf{Policy ID}, + you can view the Policy Name, Action, Application, Destination, Source and Filter. + Hover over the \textbf{Client IP} and \textbf{Server IP}, you can view the corresponding IP, Port, ASN and Location. + \item (\textcolor{gold}{Optional}) If you are viewing Radius Log, hover over the \textbf{Subscriber ID}, you can view Subscriber ID, related Security Event Logs and Session Records. + Hover over \textbf{Framed IP}, you can also view related Security Event Logs and Session Records. + \end{enumerate} +\end{description} + +\pdfbookmark[2]{Filter Logs}{Filter Logs} +\subsection*{\hypertarget{link:Filter Logs}{Filter Logs}} +\label{sec:monitor:log:filter} + +The ability to filter logs is useful for focusing on events on your TSG that possess particular attributes. Filter logs by columns that are associated with individual log records. For example, filtering by the Policy ID makes it easier to pinpoint the specific rule you want to locate, even among many similarly rules. If your ruleset is very large and contains many rules, using the rule’s Policy ID as a filter spotlights the particular rule you need to find without having to navigate through pages of results. + + +\begin{description} + \item[STEP 1.] Select \textbf{Logs}. Select a log type from the list. For example, \textbf{Proxy Event Logs}. + \item[STEP 2.] Select the log generated time period. By default, it shows logs of last hour. + \item[STEP 3.] Search by one or more artifacts. For example, enter the Client IP 192.168.50.62 and Action Deny to display only entries that contain both artifacts in the log. You can search by the following artifacts: Log ID, Policy ID, Subscriber ID, Client IP, Server IP, Server Port, Action, Sled IP, Session ID, Http.URL, Http.Domain, SSL.SNI and Schema Type. +\end{description} + +\pdfbookmark[2]{Export Logs}{Export Logs} +\subsection*{\hypertarget{link:Export Logs}{Export Logs}} +\label{sec:monitor:log:export} + +You can export the contents of a log type to a xlsx file. First, Filter Logs according to time and other conditions. Then, Click the Log Export icon on the right. Wait a few seconds for the file to be generated and downloaded to your local folder. + + +\notemark\textit{Maximum export log records are 100000.} + +\pdfbookmark[1]{View and Manage Reports}{View and Manage Reports} +\section*{\hypertarget{link:View and Manage Reports}{View and Manage Reports}} +\label{sec:monitor:report} + +The reporting capabilities on TSG allow you to keep a pulse on your network and focus your efforts on maintaining network security for keeping your users safe and productive. + + +The purpose of the report is to summarize a large amount of log data. Based on the configured report parameters, the data is extracted and displayed graphically, making the data easier and faster to understand. The models and trends revealed in the report already exist in the form of data in the database, but manually locating, cross-referencing and analyzing multiple log files is very difficult and takes a lot of time, especially when the user does not know what kind of trends and models to look for. User-customized reports are created based on the TSG report interface. The reports will summarize logs and generate user-customized graphical reports, providing you with fast and detailed network data. You can then use this information to better understand network behavior or improve network security. + + +\notemark\textit{Note that the report itself does not provide any recommendations or give any indication of problems. Users must analyze and consider network problems based on report data and graphs.} + + +TSG includes a number of predefined datasets, charts and reports. It can basically meet the needs of most users. +You can quickly view network activities based on preset reports for event or behavior analysis. +For more details about predefined reports, please refer to \hyperlink{link:Appendix D Predefined Reports}{\color{linkblue}{Appendix D Predefined Reports}}. + + +You can use predefined reports as-is, or you can build custom reports that meet your needs for specific data and actionable tasks. Create and schedule custom reports that show exactly the information you want to see by filtering on conditions and columns to include. You can also include aggregate function for more specific drill down on report data. + + +In order to create purposeful custom reports, you must consider the attributes or key pieces of information that you want to retrieve and analyze. Reports can be sent for email delivery or FTP service if you enable notification when creating a report. + + +Report is a set of data placed in orderly charts. A chart contains two elements: + + +• The data set is a SELECT query that extracts the specified data from the database. + + +• In what format the data is displayed (for example: pie chart, bar chart and table). + + +Each chart is associated with one dataset. When you generate a report, the dataset associated with each chart extracts data from the logs and populates the charts. Each dataset requires a specific log type. + + +To customize a report, you need to follow three steps. + + +\begin{longtable}{p{0.31\textwidth}|p{0.31\textwidth}|p{0.31\textwidth}} + \multicolumn{1}{c!\vlinewhite}{STEP 1} & \multicolumn{1}{c!\vlinewhite}{STEP 2} & STEP 3 \\ + \multicolumn{1}{c!\vlinewhite}{\textcolor{linkblue}{\arrowmarkr\arrowmarkr\arrowmarkr}} & \multicolumn{1}{c!\vlinewhite}{\textcolor{linkblue}{\arrowmarkr\arrowmarkr\arrowmarkr}} & \textcolor{linkblue}{\arrowmarkr\arrowmarkr\arrowmarkr} \\ + \multicolumn{1}{c!\vlinewhite}{Dataset} & \multicolumn{1}{c!\vlinewhite}{Chart Library} & Report +\end{longtable} + +This consideration guides you in making the following selections in a custom report. For example, create a report about the top 10 IP Addresses that visited Google last month by sessions. + + +\begin{description} + \item[STEP 1.] Create a Dataset. Dataset specify what data to extract from logs. + \begin{enumerate} + \item Select \textbf{Reports} > \textbf{Datasets} menu, and click \textbf{Create}. + \item Enter a \textbf{Name}. + \item Select a \textbf{Log Type} from the following: Security Event, Proxy Event, Session Records and Radius. Because session records show all traffic that is allowed on your network, select session records. + \item Select the \textbf{Group by}. Fields are the result fields of a dataset collection, include group by fields and metric fields. Fields are the dimensions of your report. This will serve as the X-Axis Data Binding options for Chart Libraries. The report mainly displays client IP, so select client IP. + \item Specify the \textbf{Data Bindings}, add Field, Aggregate, and Label, which serve as legend of your Chart Libraries. Variable consists of log field. You can add at least one or multiple variables. Aggregate is metric function and the available options are sum, min, max, avg, count, and count distinct. Label is the legend that will show in your Chart Libraries. In this case, Field select Sessions; Aggregate select sum; and sessions is filled in for Label by default. + \item (\textcolor{gold}{optional})Specify \textbf{Filter} and \textbf{Having}. Query conditions, only calculated within the data range of a certain field or a few fields that match a specific expression. All lines that do not match the conditions will be excluded from the collections of data. Your selections will automatically generate a SQL. Filter conditions is before data aggregation, and Having is after data aggregation. Since the visiting target is Google, you can set Feild as Http.Domain, set Aggregate as Suffix and set Value to “google.com”. + \item Click \textbf{OK}. + \end{enumerate} + + \item[]Please view the following table for details about new dataset. + + \begin{longtable}{p{0.16\textwidth}|p{0.78\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Name & Enter a name for the dataset.\\\hline + Log Type & Data source, select a log type from the dropdown list. + + + The following log types are available: + + + • Security Event + + + • Proxy Event + + + • Session Records + + + • Radius Logs \\\hline + Group by & Collect data from multiple records and group the results by one or more fields (columns). + + + Click the "+" button to add variable. + + + \notemark\textit{Field in Group by will serve as the X-Axis Data Binding options for Chart Libraries.} + + + For the detailed meaning of each Log Field, please view \textbf{\hyperlink{link:Appendix C Log Fields Description}{\color{linkblue}{Appendix C Log Fields Description}}}. \\\hline + Data Bindings & Data Bindings are the result fields of a dataset collection, include group by log fields. + + + Click the "+" button to add field, aggregate, and description information. + + \begin{itemize} + \item Field: log fields + + + For the detailed meaning of each Log Field, please view \textbf{\hyperlink{link:Appendix C Log Fields Description}{\color{linkblue}{Appendix C Log Fields Description}}}. + \item Aggregate: Metric function, Select a value from the dropdown list. The available options vary depending on the selected variable. + \begin{itemize} + \item sum \item min \item max \item avg \item count \item Count Distinct + \end{itemize} + \item Label: description information + \end{itemize} \\\hline + Filter & Query conditions, only calculated within the data range of a certain field or a few fields that match a specific expression. All lines that do not match the conditions will be excluded from the collections of data. + + + Click the "+ Add Condition" button to add field, operator, and value. + \begin{itemize} + \item Field: log field + \item Operator: Match operator, Select a value from the dropdown list. The available options vary depending on the selected field. + \begin{itemize} + \item = \item!= \item > \item < \item >= \item <= \item Like \item Not Like \item notEmpty + \end{itemize} + \item Value: Enter a value for field + \end{itemize} \\\hline + Having & Query conditions after data aggregation. Click the "+ Add Condition" button to add field, aggregate, operator and value. \\\hline + SQL & Generate SQL based on log type, grouping field, result field, and filter conditions, for user reference only. \\\hline + \end{longtable} + + + \item[] The following table lists different Group by, Data Bindings and Filter fields for different log types. + + + \begin{longtable}{p{0.09\textwidth}|p{0.21\textwidth}|p{0.21\textwidth}|p{0.37\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{\begin{tabular}{l}Log\\ Type\end{tabular}}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Group by}} & \multicolumn{1}{l!\vlinewhite}{\textcolor{white}{\tabincell{l}{Data Bindings\\ (Metrics)}}} & \textcolor{white}{Filter} \\\hline + \tabincell{l}{Session\\ Records} & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Sled IP\\ + Device ID\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + Client Port\\ + Server Port\\ + Schema Type\\ + L4 Protocol\\ + L7 Protocol\\ + Data Center\\ + Client ASN\\ + Server ASN\\ + Start Time\\ + End Time\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + SSL.SNI\\ + SSL.JA3 hash\\ + Receive Time} + & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Subscriber ID\\ + Sled IP\\ + Device ID\\ + Packets Sent\\ + Packets Received\\ + Bytes Sent\\ + Bytes Received\\ + Sessions\\ + Duration(ms)\\ + Establish\\ Latency(ms)\\ + Fragmentation\\ Packets(c2s)\\ + Fragmentation\\ Packets(s2c)\\ + Sequence Gap\\ Loss(c2s)\\ + Sequence Gap\\ Loss(s2c)\\ + Unorder Packets\\(c2s)\\ + Unorder Packets\\(s2c)\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + SSL.SNI\\ + SSL.JA3 hash\\ + Log ID} & \tabincell{l}{Address Type\\ + Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Client Port\\ + Server Port\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + Packets Sent\\ + Packets Received\\ + Bytes Sent\\ + Bytes Received\\ + Fragmentation Packets(c2s)\\ + Fragmentation Packets(s2c)\\ + Sequence Gap Loss(c2s)\\ + Sequence Gap Loss(s2c)\\ + Unorder Packets(c2s)\\ + Unorder Packets(s2c)\\ + L4 Protocol\\ + L7 Protocol\\ + Stream Direction\\ + Direction\\ + Data Center\\ + Sled IP\\ + Device ID\\ + Schema Type\\ + Client ASN\\ + Server ASN\\ + Start Time\\ + End Time\\ + Duration(ms)\\ + Establish Latency(ms)\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + SSL.SNI\\ + SSL.JA3 hash} \\ \hline + \multirow{2}{*}{\tabincell{l}{Security\\ Event}} & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Policy ID\\ + Action\\ + Sled IP\\ + Device ID\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + Client Port\\ + Server Port\\ + Schema Type\\ + L4 Protocol\\ + L7 Protocol\\ + Data Center\\ + Client ASN\\ + Server ASN\\ + Start Time\\ + End Time\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + SSL.SNI\\ + SSL.JA3 hash\\ + SSL.Client Side\\ Version\\ + SSL.Server Side\\ Version\\ + Mail.Account\\ + Mail.From\\ + Mail.To\\ + Quic.SNI\\ + Receive Time} & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Subscriber ID\\ + Sled IP\\ + Device ID\\ + Sessions\\ + Packets Sent\\ + Packets Received\\ + Bytes Sent\\ + Bytes Received\\ + Duration(ms)\\ + Establish\\ Latency(ms)\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + SSL.SNI\\ + SSL.JA3 hash\\ + SSL.Client Side\\ Latency(ms)\\ + SSL.Server Side\\ Latency(ms)\\ + Mail.Account\\ + Mail.From\\ + Mail.To\\ + Quic.SNI\\ + Log ID} & %& \\ \cline{5-5} + % & & & \multirow{-2}{*}{\tabincell{l}{Policy ID\\ + \tabincell{l}{Policy ID\\ + Action\\ + Address Type\\ + Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Client Port\\ + Server Port\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + Packets Sent\\ + Packets Received\\ + Bytes Sent\\ + Bytes Received\\ + L4 Protocol\\ + L7 Protocol\\ + Stream Direction\\ + Data Center\\ + Sled IP\\ + Device ID\\ + Direction\\ + Schema Type\\ + Client ASN\\ + Server ASN\\ + Start Time\\ + End Time\\ + Duration(ms)\\ + Establish Latency(ms)\\ + Http.Host\\ + Http.Domain\\ + Http.URL + Http.Content Type\\ + SSL.SNI \\ + SSL.JA3 hash\\ + SSL.Pinning\\ + SSL.Intercept State\\ + SSL.Client Side Version\\ + SSL.Server Side Version\\ + SSL.Certificate Verify\\ + SSL.Client Side Latency(ms)\\ + SSL.Server Side Latency(ms)} \\\arrayrulecolor{white} \hline + & & & \tabincell{l}{ + Mail.Account\\ + Mail.From\\ + Mail.To\\ + Mail.Subject\\ + Quic.SNI} \\ \arrayrulecolor{black} \hline + \tabincell{l}{Radius\\ Logs} & \tabincell{l}{Nas IP\\ + Framed IP\\ + Subscriber ID\\ + Receive Time} & \tabincell{l}{Framed IP\\ + Event Timestamp\\ + Packets Sent\\ + Packets Received\\ + Bytes Sent\\ + Bytes Received\\ + Log ID} & \tabincell{l}{Framed IP\\ + Subscriber ID\\ + Packet Type\\ + Acct Session ID\\ + Acct Multi Session ID\\ + ACC Status Type} \\ \hline + \tabincell{l}{Proxy\\ Event} & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Policy ID\\ + Sub Action\\ + Sled IP\\ + Device ID\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + Client Port\\ + Server Port\\ + Schema Type\\ + Data Center\\ + Client ASN\\ + Server ASN\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + DoH.Host\\ + DoH.QNAME\\ + Receive Time} & \tabincell{l}{Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Subscriber ID\\ + Sled IP\\ + Device ID\\ + Sessions\\ + Bytes Sent\\ + Bytes Received\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + DoH.Host\\ + DoH.QNAME\\ + Log ID} & \tabincell{l}{Policy ID\\ + Sub Action\\ + Address Type\\ + Server IP\\ + Client IP\\ + Internal IP\\ + External IP\\ + Client Port\\ + Server Port\\ + Client Location\\ + Server Location\\ + Subscriber ID\\ + L4 Protocol\\ + Data Center\\ + Sled IP\\ + Device ID\\ + Client ASN\\ + Server ASN\\ + Direction\\ + Schema Type\\ + Http.Host\\ + Http.Domain\\ + Http.URL\\ + Http.Content Type\\ + DoH.Host\\ + DoH.QNAME} \\ \hline + \end{longtable} + + \item[] \notemark\textit{Viewing the SQL query of an existing dataset.\\ + To view the SQL query for an existing dataset: \\ + 1. Go to Reports > Datasets.\\ + 2. Hover the mouse cursor over the dataset on the dataset list. The SQL query is displayed as a tooltip. You can also open the dataset to view the Query and detail information.} + + \item[STEP 2.] Create Chart Library. Chart set the display form of the dataset. + \begin{enumerate} + \item Enter a \textbf{Name} and \textbf{Description}. + \item Select the \textbf{Dataset} you just created. + \item Select \textbf{Chart Type} from the following: Line, Pie, Bar, Area and Table. This selection affects the rest of the available selections. To create Line and Area chart, you must select Group by Receive Time. Here select Bar. + \item Set the \textbf{Data Bindings} for X-Axis and Y-Axis. For X-Axis, set Data Binding to Client IP, set Label to Client IP and set Show Top to 10. For Y-Axis, set Data Binding to Sessions, set Format to Counter(K/M/G) and set Label to Sessions. + \item Click \textbf{OK}. + \end{enumerate} + + \item[] Please view the following table for details about new chart library. + + + \begin{longtable}{p{0.16\textwidth}|p{0.78\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Name & Enter a name for the dataset.\\\hline + Description & Enter a description of the chart. \\\hline + Dataset & Select a dataset from the dropdown list. \\\hline + Chart Type & Select a graph type from the dropdown list, one of Table, Bar, Pie, Line and Area. This selection affects the rest of the available selections. + + + \notemark\textit{For Line and Area type, Receive Time field must be chosen as one of Group By – Variable in selected dataset to generate meaningful report.} \\\hline + \tabincell{l}{Data\\ Bindings} & The data bindings vary depending on the chart type selected. \\\hline + \multicolumn{2}{l}{\textbf{Table}}\\\hline + Table Type & Regular or Drilldown. \\\hline + Add Column & Click to add Column. Up to 15 columns can be added for a Regular table. + + + Drilldown tables have three columns.\\\hline + Columns & The following column settings must be set: + + + \begin{itemize} + \item Title: Enter a title for the column. + \item Width: Enter the column width as a percentage. + \item Data Binding: Select a value from the dropdown list. The options vary depending on the selected dataset. + \item Format: Select a value from the dropdown list. You can select Bar to create an intuitional chart. + \item Legend: Description information. + \item Click the "+" button to add more data bindings to the column. Every column must have at least one data binding. The maximum of columns varies depending on the table type. + \end{itemize} \\\hline + Order by & Decide what to order the table by. The available options vary depending on the selected dataset. \\\hline + Show Top & Enter a numerical value. Only the first ‘X’ items are displayed. + Other items can be bundled to be displayed as Others when you check the \textbf{Bundle rest into ‘Others’} which is above the \textbf{Order By}. \\\hline + Drilldown Top & Enter a numerical value. Only the first ‘X’ items are displayed. This option is only available for Drilldown tables.\\\hline + \multicolumn{2}{l}{\textbf{Bar}}\\\hline + X-Axis & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. + \item Label: Enter a label for the axis. + \item Show Top: Enter a numerical value. Only the first ‘X’ items are displayed. + \item Other items are bundled into the Others category. + \end{itemize} \\\hline + Y-Axis & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. + \item Format: Select a format from the dropdown list: Bandwidth, Counter, Default and Percentage. + \item Label: Enter a label for the axis. + \end{itemize} \\\hline + Bundle rest into “Others” & Other items are bundled into the Others category if check this option. This reflects in ‘X’ Label of a Bar chart. \\\hline + \multicolumn{2}{l}{\textbf{Pie}}\\\hline + Category & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. + \item Label: Enter a label for the axis. + \item Show Top: Enter a numerical value. Only the first ‘X’ items are displayed. + \item Other items can be bundled into the Others category. + \end{itemize} \\\hline + Series & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. + \item Format: Select a format from the dropdown list: Bandwidth, Counter, Default and Percentage. + \item Label: Enter a label for the axis. + \end{itemize} \\\hline + Bundle rest into “Others” & Other items are bundled into the Others category if check this option. This reflects in Category of a Pie chart.\\\hline + \multicolumn{2}{l}{\textbf{Line} or \textbf{Area}}\\\hline + X-Axis & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. The selected dataset should include time filed. + + + \notemark\textit{Group by must include Receive Time in selected dataset.} + \item Format: Select the format Time from the dropdown list. + \end{itemize} \\\hline + Lines & \begin{itemize} + \item Data Binding: Select a value from the dropdown list. The available options vary depending on the selected dataset. + \item Format: Select from the dropdown list, one of: Bandwidth, Counter and Default. + \item Type: Select from the dropdown list, one of: Line Up and Line Down. + + + \notemark\textit{If data in Y-Axis has different units, please select Line Up and Line Down respectively.} + \item Legend: Enter the legend text for the line. + \end{itemize} \\\hline + Add line & Click "+" button to add more lines.\\\hline + \end{longtable} + + \item[] \notemark\textit{Viewing datasets associated with charts\\ + To view datasets associated with charts: + \begin{enumerate} + \item Go to Reports > Chart Libraries. + \item In the Chart list pane, find the name of the dataset associated with the chart in the Dataset. + \item Go to Reports > Datasets. + \item In the Search box, type the name of the dataset. + \item Select the dataset that is found, and click View in the toolbar to view it. + \end{enumerate} + Or you can perform the following: + \begin{enumerate} + \item Edit chart. + \item Click the Dataset Input. + \item Click the Edit pencil of the dataset in the dataset list, and you can view the dataset. + \end{enumerate}} + \item[] \notemark\textit{Hover the mouse cursor over the chart name on the chart libraries list, you can view the key information about this chart.} + + \item[STEP 3.] Create a Report. You can generate reports directly, or you can use schedule to generate reports regularly. Predefined reports are actually report templates with basic default setting configurations. + \begin{enumerate} + \item Enter a \textbf{Name}. + \item Select a \textbf{Time Period}. In this case, select ‘last’ ‘1’ ‘month’. + \item (\textcolor{gold}{Optional})If you \textbf{Enable Schedule}, select a schedule from drop-down or create a schedule. For more details, see \textbf{Policies} > \textbf{\hyperlink{link:Schedules}{\color{linkblue}{Schedules}}}. Here don’t Enable Schedule. + \notemark\textit{The time period defines the time scope of the data in the report. And schedule defines when the report will begin to generate. For example, set Time Period to last 1 hour, and Enable Schedule set to 14:00-18:00 every day. The report will begin to generate at 14:00 every day and the report data comes from 13:00-14:00 of that day. Take another example, set Time Period to today and Enable Schedule to 14:00-18:00 every day. TSG will create a statistical task for the report at 14:00 but it will complete at 24:00 and the report data only comes from that day.} + \item (\textcolor{gold}{Optional})If you \textbf{Enable Notification}, you can select FTP or Email as Output Profile. + \begin{itemize} + \item Email: Enter recipient's e-mail. + \item FTP: Enter server, port, username, password and directory. + \end{itemize} + \item Select the \textbf{Chart Library} you just created. Enter number and select time unit for \textbf{Time Granularity}. The available options vary depending on the selected chart, only applies to charts with time parameters. This will affect the data density of X-Axis. Here, let it grey by default since it is a Bar chart. + \item (\textcolor{gold}{optional})Add \textbf{Filter} if you have related requirements. You can apply log message filters to reports and charts. If add multiple charts, the filter field is limited to the common fields of multiple charts. Here don’t add any Filter. + \item Click \textbf{OK}. + \item Wait a while for the generation of the report. Click button (\[\blacktriangleright\]) at the left of the report row to get the details of the result. After the status reach 100\%, click \textbf{View} and you’ll see: firstly, the overviews of traffic statistics, then the traffic trend in the time period and finally the results of your custom selections. + \end{enumerate} + + \item[] Please view the following table for details about new report. + \begin{longtable}{p{0.18\textwidth}|p{0.76\textwidth}} + \rowcolor{black}\multicolumn{1}{l!\vlinewhite}{\textcolor{white}{Field}} & \textcolor{white}{Description} \\\hline + Name & Enter a name for the dataset.\\\hline + Time Period & The time period the report covers. Select a time period or select customize to manually specify the start and end date and time. + \begin{itemize} + \item today: from 0:00-24:00 today + \item yesterday: from 0:00-24:00 yesterday + \item this: current time period. For example, this 1 hour means from yyyy-mm-dd hh:00:00 to yyyy-mm-dd hh:59:59. + \item last: last time period. For example, last 1 hour means from yyyy-mm-dd hh-1:mi:ss to yyyy-mm-dd hh:mi:ss. + \item previous: previous time period. For example, previous 1 hour means yyyy-mm-dd hh-1:00:00 to yyyy-mm-dd hh:00:00. + \item customize: If you select customize, you can’t Enable Schedule. + \end{itemize} \\\hline + \tabincell{l}{Enable\\ Schedule} & Select to enable schedules.\\\hline + Schedule & Select a schedule from the dropdown list to run the report.\\\hline + \tabincell{l}{Enable\\ Notification} & Setting report notification profile.\\\hline + Output Profile & Select the output profile from the dropdown list: + \begin{itemize} + \item Email: Enter recipient's e-mail. + \item FTP: Enter server, port, username, password and directory. + \end{itemize} \\\hline + Chart Library & Click the button “+” and select a chart from the slide page Chart Library. \\\hline + \tabincell{l}{Time\\ Granularity} & Enter number and select time unit. The available options vary depending on the selected chart, only applies to charts with time parameters.\\\hline + Add Chart & Click the "+ Add Chart" button to add more charts.\\\hline + Filter & You can apply log message filters to reports and charts. If add multiple charts, the filter field is limited to the common fields of multiple charts. + + + Click the "+ Add Condition" button to add log Field, Operator, and Value. + \begin{itemize} + \item Field: Variables in log field for reports. + \item Operator: Match operator. Select a value from the dropdown list. The available options vary depending on the selected field. + \begin{itemize} + \item = \item != \item > \item < \item >= \item <= \item Like \item Not Like \item notEmpty + \end{itemize} + \item Value: Enter a value for log Field. + \end{itemize} \\\hline + \end{longtable} +\end{description} + +\notemark\textit{To base a report on a predefined template, select the predefined Dataset or Chart Libraries. +If you Enable Schedule for a report, the execution button (\[\blacktriangleright\]) under Operation will not be available and (-) will show in column Operation. +You can view the create time of a result for the report, when you click button (\[\blacktriangleright\]) +(switch to button (\[\blacktriangledown\]) to indicate folding back) at the left of a row to unfold the report details. +Create time shows the time that the report generated this cycle according to the schedule, not the time you configure the report. +The reports are displayed in descending order by create time. For example, you create a report with Time Period “today” +and Enable Schedule “Daily, Start Time 14:00 \& End Time 18:00” at 9:00 am. In this case, the first result of report +which is shown in (\[\blacktriangledown\]) will be created at 14:00 today with Create Time: YYYY-MM-DD 14:00. +Meanwhile the percentage which indicates the ready status of the result will reach 100\% after 24:00:00 since the report configuration was set Time Period as “today”. +And you can get a new result at the 14:00 and view the report after midnight every day from now on. +The report list displays Last Modified Time and Last Execution Time and you can click the column to make the list display in descending or ascending order.} + + +For more details about reports best practice, please refer to \hyperlink{link:Make Your Own Reports}{\color{linkblue}{Appendix F Make Your Own Reports}} + + +Advantages of TSG report: +\begin{itemize} + \item Flexible customization: If the predefined reports do not meet the needs of users, you can add new customized report models at any time according to different scenarios. Reduce the waiting period for statistical requirements, demand communication, development and online. + \item Schedule statistics: support report schedules and it can generate reports regularly. The schedule is flexible, and reports can be generated regularly by day, week, month, and year. + \item Report archive: Support online sending or offline exporting to report archive. +\end{itemize} + +\pdfbookmark[1]{Take Packet Captures}{Take Packet Captures} +\section*{\hypertarget{link:Take Packet Captures}{Take Packet Captures}} +\label{sec:monitor:packet} + +TSG captures packets for all traffic or for specific traffic based on filters that you define. For example, you can configure TSG to only capture packets to and from a specific source and destination IP address or port. You may need to take packet captures when creating a custom application, because you have to gather information about the application. + +\begin{description} + \item[STEP 1.] Before you start a packet capture, identify the attributes of the traffic that you want to capture. + + + For example, to determine the source IP address, and the destination IP address for traffic between two systems. + If you wish to troubleshoot a Security Event Log, go to \textbf{Logs} > \textbf{Security Event Log} and locate the traffic log for the two systems. + Click the \textbf{Log ID} to view the Client IP, Client Port, Server IP, Server Port. + \item[STEP 2.] Set packet capture conditions, so TSG only captures traffic you are interested in. + \begin{enumerate} + \item Select \textbf{Setting} > \textbf{Trouble Shooting} menu, and select Packet Capture tab. + \item Enter a descriptive \textbf{Name}. + \item Select \textbf{Address Type}, IPV4 or IPV6. + \item Enter \textbf{Client IP}, \textbf{Client Port}, \textbf{Server IP}, \textbf{Server Port}. + \item Select TCP, UDP or Any as \textbf{Protocol}. + \item Select \textbf{Effective Devices} leave the value set to any. + \item Enter \textbf{Captured Number} and \textbf{Capture Duration}. + \item Click \textbf{OK}. + \end{enumerate} + \item[STEP 3.] Packet Capture will automatically start after you created it. Generate traffic that matches the filters that you defined. It will stop after your capture duration expires, or you can turn it off manually after TSG captures the data that you want to analyze. + \item[STEP 4.] Click the triangle icon to the left in the list to expand the item, then click \textbf{Download} to download packets or \textbf{Delete} to delete packets. + \item[STEP 5.] View the packet capture files using a network packet analyzer. +\end{description}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Objects.tex b/TSG_Administrator's_Guide/content/Objects.tex new file mode 100644 index 0000000..1789940 --- /dev/null +++ b/TSG_Administrator's_Guide/content/Objects.tex @@ -0,0 +1,402 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Objects}{Objects} +\chapter*{\hypertarget{link:Objects}{Objects}} +\label{sec:objects} + +A policy object consists of one item or a set of collective items that groups discrete identities such as IP addresses, URLs, applications, or accounts. +One policy object is allowed to reference same type objects as subordinate objects. Typically, when creating a policy object, you group objects that require similar permissions in policy. +For example, you can group the set of server IP addresses as an address group policy object and reference the address group in the security policy. By grouping objects, +you can significantly reduce the administrative overhead in creating policies. An object group is also considered as an object when referenced. +You can reference the object group in policy instead of manually selecting multiple objects one at a time. + +{ +\color{linkblue} +\hyperlink{link:Objects Type}{> Objects Type} \\ +\hyperlink{link:IP Addresses}{> IP Addresses} \\ +\hyperlink{link:Subscriber IDs}{> Subscriber IDs}\\ +\hyperlink{link:Categories}{> Categories}\\ +\hyperlink{link:Applications}{> Applications}\\ +\hyperlink{link:Configure Object Group}{> Configure Object Group}\\ +} +\clearpage + +You can create an object or create an object group. A policy object consists of one or multiple items, while an object group is composed of one or multiple subordinate objects. One object is allowed to reference same type objects as subordinate objects. + + +To view object usages, please click column \textbf{Reference Count} of object list. + + +Then you will see\\ +• Various policies for referencing the object; \\ +• The group object that references the object. + + +Click the Graph button, you will see an object relationship graph. Policies, Proxy TCP Options, and parent objects that reference current object are displayed in the graph. +As well as application signatures, which reference IP Address object when creating signatures with ip.src and ip.dst as Traffic Attribute. +For more details, see \textbf{Advanced Setting} > \textbf{\hyperlink{link:Proxy TCP Option}{\color{linkblue}{Proxy TCP Option}}} and \textbf{Objects} > \textbf{Applications} > \textbf{\hyperlink{link:Signatures}{\color{linkblue}{Signatures}}}. + + +Click the solid circle to unfold the referenced ancient object and click the hollow circle to fold the picture. + + +\notemark\textit{Note that direct or indirect self-reference is prohibited, i.e. A->A or A->B->A. Within the TSG system, object references can have up to six levels (from root node to leaf node).} + + +You can reference objects and object groups in your policies. Thus, you reduce the administrative overhead in creating policies. You can identify an object by its name or ID number. The object ID never changes even if you modify the object, such as when you change the object name. + + +\pdfbookmark[1]{Objects Type}{Objects Type} +\section*{\hypertarget{link:Objects Type}{Objects Type}} +\label{sec:objects:type} + +You can create the following policy objects on TSG. A policy object consists of one or multiple items, while an object group is composed of one or multiple subordinate objects. + + +\begin{longtable}{p{0.21\textwidth}|p{0.74\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{Policy Object}} & \textcolor{white}{Description} \\\hline + \tabincell{l}{IP Addresses/\\ Address Group} & IP Address contains three sub-types: IP, geography and IP Learning. The IP object can include an IPv4 or IPv6 address (single IP, range). Address Group Allow you to group specific source or destination addresses that require the same policy enforcement. You can then group a collection of address objects of the same type to create an address object group. IP learning type is not allowed to create group.\\ \hline + \tabincell{l}{FQDNs/\\FQDN Group} & That is fully qualified domain name to identify traffic. Using an FQDN object or FQDN object group reduces issues in environments where the host is subject to dynamic IP address changes. Support exactly matching and suffix matching.\\\hline + \tabincell{l}{Subscriber IDs/\\Subscriber ID\\ Group} & Allow you to create a list of Subscriber ID for RADIUS traffic. Support exactly matching only. \\\hline + \tabincell{l}{HTTP Signatures/\\HTTP Signature\\ Group} & Allow you to add keyword in Request as User-Agent and Cookie, in Response as Set-Cookie and Content-Type. Support exactly matching, prefix matching, suffix matching and substring matching. \\\hline + \tabincell{l}{Keywords/\\Keyword Group} & A string you define that can be added as a filter in policy. You can enable Hex Mode. Support exactly matching, prefix matching, suffix matching and substring matching. + + + \notemark\textit{Support maximum 8 substrings for AND expression. And when adding keyword for other objects, the same rule applies.}\\\hline + \tabincell{l}{URLs/\\URL Group} & A Uniform Resource Locator, colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. A typical URL could have the form http://www.example.com/index.html, which indicates a protocol (http), a hostname (www.example.com), and a file name (index.html). Here the protocol is not allowed when adding. Support exactly matching, prefix matching, suffix matching, and substring matching \\\hline + \tabincell{l}{Categories/\\Category Group} & Category classifies websites based on site content, features, and safety. Once created, the category can be selected as a filter of a policy. This means that a policy will only allow or block requests that match the category. For details, please refer to \hyperlink{link:Categories}{\color{linkblue}{Categories}}.\\\hline + \tabincell{l}{Accounts/\\Account Group} & Stores the account information for your application. For example, you can add your email account as a filter when creating a policy using MAIL application. Support exactly matching, prefix matching, suffix matching and substring matching. \\\hline + \tabincell{l}{Applications} & Applications, a patented traffic classification system available in TSG firewalls, determines what an application is irrespective of port, protocol, encryption or any other evasive tactic used by the application. It applies multiple classification mechanisms—application signatures, application protocol decoding, and heuristics—to your network traffic stream to accurately identify applications. An Application allows you to filter applications dynamically. \\\hline +\end{longtable} + + +\notemark\textit{Description of matching method:} + + +\textit{• Substring matching, which has no wildcard character. E.g. “abc” is a substring of “abcde”.} + + +\textit{• Prefix matching, which is end with an asterisk character “*”. E.g. “abc*” is a prefix of “abcde”.} + + +\textit{• Suffix matching, which is begin with an asterisk character “*”. E.g. “*cde” is a suffix of “abcde”.} + + +\textit{• Exactly matching, which is begin with a dollar character “\$”. E.g. “\$abcde” is exactly same as “abcde”.} + + +\textit{• AND expression, which contains maximum 4 substrings. E.g. “abc” \& “cde” matches “abcde”.} + + +\textit{You could input nonprintable keyword in Hex mode. A valid hexadecimal keyword only contains “0~9” and “a~f”, and has even character number, e.g. “1a2b3c4d”.} + + +You can perform the following to create an object. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects}. Select the object menu you wish to create, and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Specify a \textbf{Color}. + \item[STEP 4.] Add an \textbf{Item}. + \item[STEP 5.] (\textcolor{gold}{Optional})Enter a \textbf{Description}. The description can have up to 1024 characters. + \item[STEP 6.] Click \textbf{OK}. +\end{description} + +You can view detailed information about the object you just created. To edit and delete the object, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. + + +You can export the contents of objects to a txt or csv file. First, search objects according to ID, Name, Keywords, Sub Object (ID), Description, Operator, Time and other conditions. Then, Click the Export icon on the right to download and save the file to your local folder. + + +You can also import objects by clicking the import icon. Only csv and txt formats can be uploaded. Duplicated items are automatically omitted when you import objects. You can take the exported file as template for import. In addition, the exported file of object can also be used to back up the object of the current system. After export, it can be directly imported into the same version (or the official version of TSG compatible with the exported version). + + +\notemark\textit{The TSG system only provides the export of objects with items, but object group with subordinate object are not allowed to be exported.} + + +Select the checkbox for objects in the list and Click \textbf{Watch} at the bottom to add to Watch List. And then you can click the star icon in the bottom right and select Object tab to view the Watch List. You can search objects by ID and Name in the list. + +\pdfbookmark[1]{IP Addresses}{IP Addresses} +\section*{\hypertarget{link:IP Addresses}{IP Addresses}} +\label{sec:objects:ip} + +An address object is a set of IP addresses that you can manage in one place and then use in multiple policy rules. You can reference the same address object in multiple policy rules without needing to specify the same individual addresses in each use. Furthermore, create an address object on TSG to group IP addresses, and then reference the address object in a policy rule to avoid having to individually specify multiple IP addresses in the rule. For example, you can create an address object that specifies an IPv4 address range and then reference the address object in a Security policy rule. + + +There are three Sub Types of address object: IP, Geography and IP Learning. IP Sub Type include an IPv4 or IPv6 address (single IP, range). Geography are IP addresses organized by geographical scope. You can select a country or a city as an item. For more details, please see \textbf{\hyperlink{link:IP Libraries}{\color{linkblue}{IP Libraries}}}. IP Learning can learn from FQDNs whose host IP addresses change frequently. + + +\notemark\textit{At present, the system supports geography selection at both national and urban levels.} + + +Initially, the IP Learning object is empty and contains no addresses. When the client tries to resolve a FQDN address, TSG will analyze the DNS response. The IP address(es) contained in the answer section of the DNS response will be added to the corresponding IP Learning object. When the IP Learning gets the resolved IP addresses, TSG loads the addresses into policy for traffic matching. At any given time, a single IP Learning object may have up to 10000 IP addresses. + + +You can perform the following to create an IP object: + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{IP Addresses} and click \textbf{Create} and select Address. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Specify a \textbf{Color}. + \item[STEP 4.] Select a sub \textbf{Type}. There are three sub Types, namely: IP, Geography, and IP Learning. + \item[STEP 5.] (\textcolor{gold}{Optional})If you select \textbf{IP} as your sub Type, you can add one or more items, you can add IPv4, IPv6 and IP range. Also, add port, port range or leave the value set to empty. + \item[STEP 6.] (\textcolor{gold}{Optional})If you select \textbf{Geography} as your sub Type, select one or more countries and cities as your Item. + \item[STEP 7.] (\textcolor{gold}{Optional})If you select \textbf{IP Learning} as your sub Type, you need to fill in the following fields. + \begin{enumerate} + \item Add one or more FQDNs for \textbf{Learn from FQDNs}. + \item Select HTTP, SSL from drop-down for \textbf{Learn from Protocols}. + \item Select 1 Degree or 2 Degrees for \textbf{Learning Depth}. + \item Specify \textbf{Aging Times}. IP domain name learning after a certain period of time, the value density will be reduced. That is to say, the IP addresses obtain between the first discovery and the last discovery of the service IP returned by the domain name. Aging Times Cannot be 0, exceed maximum 2147483647, and be empty. + \item Specify \textbf{Vote Clients Number}. Total number of independent client IP supporting IP learning. Cannot be 0, exceed maximum 10000, and be empty. + \item Specify \textbf{Learned IP limits}. Maximum number of IP addresses to learn. Cannot be 0, exceed maximum 10000, and be empty. + \end{enumerate} + \item[STEP 8.] (\textcolor{gold}{Optional})Enter a \textbf{Description} or leave the value set to empty. Description can have up to 1024 characters. + \item[STEP 9.] Click \textbf{OK}. +\end{description} + +\pdfbookmark[2]{IP Libraries}{IP Libraries} +\subsection*{\hypertarget{link:IP Libraries}{IP Libraries}} +\label{sec:objects:ip:library} + +IP Libraries map geographic locations to IP addresses. TSG provides built-in IP libraries, so you can select Geography Sub Type when creating IP Address object. You can also import your own geography and IP addresses mappings. + + +The following steps guide you to Create Geography: + +\begin{description} + \item[STEP 1.] Select \textbf{Settings} > \textbf{Advanced} > \textbf{IP Libraries}, and click \textbf{Create}. + \item[STEP 2.] Create Geography. + \begin{enumerate} + \item Select geography \textbf{Type} between Country and City, if you select Country, you need to select \textbf{Continent} field. Here, select City as an example. + \item Select \textbf{Country} from slide page Geographic Locations. + \item Add \textbf{Geo Name ID}. + \item Specify \textbf{City}. The City name is case-sensitive and can have up to 128 characters. + \item Add \textbf{IP Range}. Take Format IPv4 Range x.x.x.x-y.y.y.y, IPv6 Range x:x:x::x-y:y:y::y as an example. + \item (\textcolor{gold}{Optional})Specify \textbf{Longitude} and \textbf{Latitude}. + \item Click \textbf{OK}. + \end{enumerate} +\end{description} + +You can \textbf{Edit} or \textbf{Delete} imported Geography. When editing built-in geography, please operate with caution. + +\pdfbookmark[1]{Subscriber IDs}{Subscriber IDs} +\section*{\hypertarget{link:Subscriber IDs}{Subscriber IDs}} +\label{sec:objects:subscriber} + +You can create Subscriber ID to keep track of Radius traffic user. After you create Subscriber ID object, you can use it in your policy rule and Active Subscriber ID will be shown in your dashboard. + + +You can perform the following to create a Subscriber ID: + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{Subscriber IDs} and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Specify a \textbf{Color}. + \item[STEP 4.] Add an \textbf{Item}. You can view \textbf{History Subscriber} for your reference. Subscriber ID must be exactly matching. E.g. \$test62. + \item[STEP 5.] (\textcolor{gold}{Optional})Enter a \textbf{Description}. The description can have up to 1024 characters. + \item[STEP 6.] Click \textbf{OK}. +\end{description} + +\pdfbookmark[1]{Categories}{Categories} +\section*{\hypertarget{link:Categories}{Categories}} +\label{sec:objects:category} + +Category classifies websites based on site content, features, safety and so on. TSG firewall has built-in categories. + + +Please refer to \hyperlink{link:Appendix A Built-in Category}{\color{linkblue}{Appendix A Built-in Category}} for more details. + +\pdfbookmark[1]{Applications}{Applications} +\section*{\hypertarget{link:Applications}{Applications}} +\label{sec:objects:application} + +An application is any program, or group of programs, that is designed for the end user to perform an activity. Applications enables visibility into the applications on the network, so you can category them and understand their characteristics and their relative risk. This application knowledge allows you to create and enforce security policy rules to allow and inspect applications and deny unwanted applications. When you use policy rules to control traffic, applications can classify traffic without any additional configuration. + + +AppSketch is a traffic classification system available in TSG firewalls, determines what an application is irrespective of port, protocol, encryption or any other evasive tactic. It applies multiple classification mechanisms to your network traffic stream to accurately identify applications. These classification mechanisms include application signatures, application protocol decoding, and heuristics. + + +The firewall identifies application with predefined and customized signature. The TSG firewall uses protocol decoding in the content inspection stage to determine one application from the other. After the firewall identifies the session application, security policy can be enforced as configured. The identified application as well as IP, port, protocol, Subscriber ID, FQDN and URL in the session is used as key to find rule match. + + +When creating a security policy, there are built-in protocols and well-known Applications and customized Applications in the list. You can search the application you want to fill in. You can also use application selector and group as objects in policy + +\pdfbookmark[2]{Signatures}{Signatures} +\subsection*{\hypertarget{link:Signatures}{Signatures}} +\label{sec:objects:application:signature} + +In TSG, application is composed of App ID, Properties and Signature Sequence. App ID is the unique identification of Application. Application Properties include Category, Subcategory, Technology, Risk and Characteristics. You can create Application Selector based on application Properties. Signature refers to the expression of network traffic attributes in a specific scope. Traffic Attribute is a piece of information which obtained from network transfer unit. Signature Sequence is the signatures of the application that appear in a certain order. There is a sequential "and" relationship between signatures. + + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/fig_signatures} + %\caption{Figure: Inspection Stage} + \label{fig:system:fig_signatures} +\end{figure} + + +The following demonstrates how to create a customized signature. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{Applications}, select tab \textbf{Signatures} and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Specify a \textbf{Color}. + \item[STEP 4.] (\textcolor{gold}{Optional})Enter a \textbf{Comment}. + \item[STEP 5.] Add \textbf{Conditions}. You can add one or multiple conditions. The relation between New Conditions is “and”, and the relation within existing condition is “or”. + Select \textbf{Attribute Name} and this affects the rest of the available selections. Fill in the corresponding content. Note that valid keywords length is from 4 to 1024 bytes. + \item[STEP 6.] Click \textbf{OK}. +\end{description} + +\notemark\textit{Within the same signature, attributes from different protocols are not allowed to serve as Conditions, except for TCP/IP/General Attributes.} + + +You can \textbf{Edit} or \textbf{Delete} your signature and reference one or multiple signatures when creating application object. + +\pdfbookmark[2]{Customized Attributes}{Customized Attributes} +\subsection*{\hypertarget{link:Customized Attributes}{Customized Attributes}} +\label{sec:objects:application:attribute} + +The traffic attribute is the information obtained after the analysis of the network transmission unit. The attributes used by the App recognition can be found in \textbf{Appendix F Best Practice} > \textbf{\hyperlink{link:Custom Application}{\color{linkblue}{Custom Application}}}. + + +You can also upload a Lua script to create your own traffic attributes. + + +The following is a basic example of how to create a customized attribute. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{Applications}, select tab \textbf{Customized Attributes} and click \textbf{Create}. + \item[STEP 2.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 3.] Select \textbf{Parent Attribute} from traffic attribute list. + \item[STEP 4.] Please upload \textbf{Uploaded File}. + \item[STEP 5.] Select \textbf{Attribute Type} from: Bool, Numeric Value, and String. + \item[STEP 6.] Specify \textbf{Maximum Execution Time}. + \item[STEP 7.] Click \textbf{OK}. +\end{description} + +\notemark\textit{Lua is a lightweight, high-level, multi-paradigm programming language designed primarily for embedded use in applications. TSG is able to interact with Lua scripts when process network traffic.} + + +\notemark\textit{It is best practice to construct a Pre-Signature to improve performance when a customized attribute is referenced by Signature as a Condition.} + + +You can \textbf{Edit} or \textbf{Delete} your customized attributes and download the Uploaded File. + +\pdfbookmark[2]{Custom Application}{Custom Application} +\subsection*{\hypertarget{link:Custom Application}{Custom Application}} +\label{sec:objects:application:customize} + +Applications allow you classify all traffic, across all ports, all the time. To ensure that your internal custom applications do not show up as unknown traffic, you can create a custom application. Then practice granular policy control over these applications to minimize the range of unidentified traffic on your network. + + +To create a custom application, you must define the application attributes: its characteristics, category and sub-category, risk, port, timeout. In addition, you must define patterns or values that TSG can use to match to the traffic flows (the signature). Finally, you can attach the custom application to a policy that allows or denies the application (or add it to an application group or match it to an application selector). + + +\notemark\textit{In order to collect the right data to create a custom application signature, you'll need a good understanding of packet captures and how to analyze data pattern. If the signature is created too broadly, you might inadvertently include other similar traffic; if it is defined too narrowly, the traffic will evade detection if it does not strictly match the pattern.} + + +The following is a basic example of how to create a custom application. + +\begin{description} + \item[STEP 1.] Gather information about the application to create custom signatures. + + + To do this, you need have an understanding of the application and how you want to control access to it. For example, you may want to limit what operations users can perform within the application, such as uploading, downloading, or live streaming. + + + • Capture application packets so that you can find unique characteristics about the application on which to base your custom application signature. One way to do this is to run a protocol analyzer, such as Wireshark, on the client system to capture the packets between the client and the server. Perform different actions in the application, such as uploading and downloading, so that you will be able to locate each type of session in the resulting packet captures (PCAPs). + + + • Because TSG supports packet captures for all traffic, you can take packet captures using TSG. See \hyperlink{link:Take Packet Captures}{\color{linkblue}{Take Packet Captures}}. + + + • Use the packet captures to find patterns or values in the packet contexts that you can use to create signatures that will uniquely match the application. For example, look for string patterns in HTTP request or response headers, URI, or hostnames. + \item[STEP 2.] Add the custom application. + \begin{enumerate} + \item Select \textbf{Objects} > \textbf{Applications} and click \textbf{Create}. + \item Enter a \textbf{Name} and a \textbf{Description} for the custom application that will help other administrators understand why you created the application. + \item Verify that \textbf{Enabled} is enabled. + + + Policy rules referencing applications only match to and enforce traffic based on enabled applications. + + + Predefined applications cannot be disabled and only allow a status of enabled. Disabling a base application could cause applications which depend on the base application to also be disabled. For example, disabling Facebook-base will disable all other Facebook applications. + \item Define the application Properties and Characteristics. + + + Select the \textbf{Category}, \textbf{Subcategory}, \textbf{Technology} and \textbf{Risk} from drop-down. Add \textbf{Parent App} if there is any. Enable \textbf{Continue Scanning} if you need to. Select the checkbox for characteristics, including Evasive, Excessive Bandwidth, Prone to Misuse, SaaS, Transfer Files, Tunnels Other Apps, Used by Malware, Vulnerability and Widely Used. + \item Define the timeout values or leave the value set to default. + \end{enumerate} + \item[STEP 3.] Define the Surrogates which is the criteria that the firewall will use to match the traffic to the new application. + + + You will use the information you gathered from the packet captures to specify unique string context values that the firewall can use to match patterns in the application traffic. + + + Select Signatures or click plus icon to create a signature. + \begin{enumerate} + \item On create a Signature page, define a Signature \textbf{Name} and optionally a \textbf{Comment} to provide information about how you intend to use this signature. + \item Pick a \textbf{Color} or use the default color. + \item Specify \textbf{Conditions} to define signatures. + + + If the order in which the firewall attempts to match the signature definitions is important, make sure to enable the Ordered Match and then order the conditions so that they are evaluated in the appropriate order. Select a condition and click Move Up or Move Down. + \end{enumerate} + \item[STEP 4.] Click \textbf{OK}. + \item[STEP 5.] Validate that traffic matches the custom application as expected. + \begin{enumerate} + \item Select \textbf{Policies} > \textbf{Security} and \textbf{Create} a security policy rule to allow the new application. + \item Run the application from a client system that is between the firewall and the application and then check the logs to make sure that you see traffic matching the new application (and that it is being handled per your policy rule). + \end{enumerate} +\end{description} + +\pdfbookmark[2]{Application Selector}{Application Selector} +\subsection*{\hypertarget{link:Application Selector}{Application Selector}} +\label{sec:objects:application:selector} + +An application selector is an object that dynamically groups applications based on application attributes that you define, including category, subcategory, technology, risk and characteristics. This is useful when you want to enable access to applications that you do not explicitly sanction, but that you want users to be able to access. For example, you may want to enable employees to choose their own office programs, such as Evernote, Google Docs, or Microsoft Office, for business use. To enable these types of applications, you could create an application selector that matches on the Category business-systems and the Subcategory office-programs. As new applications office programs emerge, these new applications will automatically match the selector you defined; you don’t have to make any additional changes to your policy rules to enable any application that matches the attributes you defined for the selector. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{Applications} > \textbf{Selectors}. + \item[STEP 2.] Create a selector and give it a descriptive \textbf{Name}. + \item[STEP 3.] Define the selector by selecting attribute values from the Category, Subcategory, Technology, Risk, and Characteristics sections. + As you select values, notice that the list of matching applications at the bottom of the dialog narrows. + When you have adjusted the filter attributes to match the types of applications you want to safely enable, click \textbf{OK}. +\end{description} + +\pdfbookmark[2]{Application Group}{Application Group} +\subsection*{\hypertarget{link:Application Group}{Application Group}} +\label{sec:objects:application:group} + +An application group is an object that contains applications that you want to treat similarly in a policy. Application groups are useful for allow or deny access to applications that you explicitly sanction or forbid. Grouping sanctioned or forbidden applications simplifies administration of your rules. Instead of having to update individual policy rules when there is a change in the applications you sanction or deny, you can update only the affected application groups. + + +When deciding how to group applications, consider how you plan to enforce access to your applications and create an application group that aligns with each of your policy goals. For example, you might have some applications that you will allow, and other applications that you want to deny. In this case, you would create separate application groups for each of these policy goals. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects} > \textbf{Applications} > \textbf{Groups}. + \item[STEP 2.] Create a group and give it a descriptive \textbf{Name}. + \item[STEP 3.] Add the applications you want in the group. + \item[STEP 4.] (\textcolor{gold}{Optional}) Enter a \textbf{Description} or leave the value set to empty. Description can have up to 1024 characters. + \item[STEP 5.] Click \textbf{OK}. +\end{description} + +\pdfbookmark[1]{Configure Object Group}{Configure Object Group} +\section*{\hypertarget{link:Configure Object Group}{Configure Object Group}} +\label{sec:objects:group} + +A policy object consists of one or multiple items, while an object group is composed of one or multiple subordinate objects. An object group is also considered as an object. Typically, when creating a policy object, you organize objects that require similar permissions in policy. One object is allowed to reference same type objects as subordinate objects, but not allowed to add items in object. For example, An IP object defines a set of single address, whereas an IP object group can define more than one address object. By grouping objects, you can significantly reduce the administrative overhead in creating policies. You can create object group for all types of objects. + + +The following procedure explains how you can create objects group directly through the Objects page. + +\begin{description} + \item[STEP 1.] Select \textbf{Objects}, then select the menu you want to create from the following: IP addresses, FQDNs, Subscriber IDs, HTTP Signatures, Keywords, URLs, Categories, Accounts. + \item[STEP 2.] To create a group, let’s take FQDN as an example, click \textbf{Create} and select FQDN group. + \item[STEP 3.] Add a \textbf{Name}. The name is case-sensitive and can have up to 128 characters. + \item[STEP 4.] Specify a \textbf{Color}. + \item[STEP 5.] Add one or more \textbf{Sub Objects}. Note that you cannot add sub objects and items at the same time. + \item[STEP 6.] (\textcolor{gold}{Optional})Enter a \textbf{Description}. The description can have up to 1024 characters. + \item[STEP 7.] Click \textbf{OK}. +\end{description}
\ No newline at end of file diff --git a/TSG_Administrator's_Guide/content/Policies.tex b/TSG_Administrator's_Guide/content/Policies.tex new file mode 100644 index 0000000..d103dfc --- /dev/null +++ b/TSG_Administrator's_Guide/content/Policies.tex @@ -0,0 +1,819 @@ +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +\pdfbookmark[0]{Policies}{Policies} +\chapter*{\hypertarget{link:Policies}{Policies}} +\label{sec:policies} + +The policy is the axis around which most features of TSG revolve. Many TSG settings end up relating to or being associated with the policies and the traffic they govern. +Any traffic going through TSG has to be associated with a policy. These policies are essentially discrete compartmentalized sets of instructions that control the traffic +flow going through TSG. These instructions control where the traffic goes, how it is processed, if it is processed, and whether or not it is allowed to pass through the gate. + + +When TSG receives a connection packet, it analyzes the source, destination, application and corresponding filters. Using this information, +TSG attempts to locate a security policy that matches the packet. If a policy matches the parameters, then TSG takes the required action for that policy. +If it is Allow, the traffic is allowed to proceed to the next step. If the action is Deny, the traffic is not allowed to proceed. If the action is Monitor, +the traffic is scanned and a log is generated. If it is Intercept, the traffic is intercepted and relative proxy policy will be applied. + +{ +\color{linkblue} +\hyperlink{link:Policy Concepts}{> Policy Concepts} \\ +\hyperlink{link:Security Policy}{> Security Policy} \\ +\hyperlink{link:Proxy Policy}{> Proxy Policy}\\ +\hyperlink{link:Schedules}{> Schedules}\\ +\hyperlink{link:Verify Policy Rules}{> Verify Policy Rules}\\ +} +\clearpage + +\pdfbookmark[1]{Policy Concepts}{Policy Concepts} +\section*{\hypertarget{link:Policy Concepts}{Policy Concepts}} +\label{sec:policies:concepts} + +Policies allow you to enforce rules and take action. From TSG’s perspective, network packets are first resembled to a session, and identified as many manageable attributes. +For example, a TLS session could be parsed to attributes as IP address, SNI, certificate and so on. For effective management, user could define policy rules with TSG user interface. + + +A policy rule combines with several conditions and one action. The action determines how to control the traffic, and action parameters are managed in policy profiles. +Profiles are elaborated in chapter \hyperlink{link:Certificate Managements}{\color{linkblue}{Certificate Managements}} and chapter \hyperlink{link:Proxy Profiles}{\color{linkblue}{Proxy Profiles}}. +The conditions describe attributes of applicable traffic, and they are organized by policy objects. +While policy objects enable you to identify traffic to enforce policies, policy profiles help you define further action. Traffic must match all conditions of a policy before taking its action. +Traffic matching one item of an object means it satisfies the object. In short, objects in one policy are “AND” relation, items and subordinate object in one object are “OR” relation. + + +You can identify a policy rule by its name or ID number. The policy ID for a rule never changes even if you modify the rule, such as when you change the rule name. +The policy ID allows you to track the rule across rules even after you disable the rule. + + +\notemark\textit{Note that activation of policy rules on all devices is no more than 1 minute. +For details about capacities of policies and URLs/URIs, and other system parameters, see \textcolor{darkblue}{\textbf{\underline{ADC-L404 Datasheet}}}.} + +\pdfbookmark[2]{Rule Types}{Rule Types} +\subsection*{\hypertarget{link:Rule Types}{Rule Types}} +\label{sec:policies:concepts:types} + +TSG supports a variety of policy types that work together to safely enable applications on your network. The different types of policy rules that you can create on TSG are:\\ +%\begin{table}[h] +\begin{longtable}{p{0.17\textwidth}|p{0.77\textwidth}} +% \begin{tabularx}{\textwidth}{p{0.17\textwidth}|p{0.77\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Policy Type}} & \textcolor{white}{Description} \\\hline + Security & Determine whether to allow, deny, monitor or intercept a session based on traffic attributes such as the IP addresses, subscriber ID, APP ID and protocol fields. + For more details, see \hyperlink{link:Security Policy}{\color{linkblue}{Security Policy}}.\\\hline + \begin{tabular}{l}\tabincell{l}{Proxy\\ Manipulation}\end{tabular} & Instruct the proxy how to manipulate (including allow, deny, monitor, redirect, replace, hijack and insert), + a session based on traffic attributes such as the source and destination IP address, the subscriber ID, and filter, including host, URL, + request header, response header, request content and response content. Encrypted traffic Identified will be decrypted for further control. + Manipulation requires targeted sessions are intercepted in security policies. For more details, see \hyperlink{link:Proxy Policy}{\color{linkblue}{Proxy Policy}}.\\\hline +% \end{tabularx} +\end{longtable} +%end{table} + +\pdfbookmark[2]{Policy Conditions}{Policy Conditions} +\subsection*{\hypertarget{link:Policy Conditions}{Policy Conditions}} +\label{sec:policies:concepts:conditions} + +Each rule has a set of conditions. All criteria need to match if the rule action is to be used. The order of each condition in the list is irrelevant. +A condition consists of an object type from the list of object types used for traffic identification, an operator (only support equals for now) and a specific object of that type. +If a connection matches all the objects set to "equals" in the rule, the rule will apply to the connection. + + +Policy objects server as policy conditions. There are four types of conditions at most in each policy, namely: Source, Destination, Application and corresponding Filter. +You can view which objects are referenced as conditions by selecting \textbf{Policies} > \textbf{Security} or \textbf{Policies} > \textbf{Proxy}, then double click the policy in the list. + + +A policy object consists of collective items that groups discrete identities such as IP addresses, URLs, applications, or user accounts. +You can define an object with a set of items or a set of subordinate objects and reuse it in multiple policies. + + +\notemark\textit{Consider a Source, Destination, Application and each member of a Filter as a condition. A policy contains 8 conditions at most. +The relation between each condition is “and”. The relation within each condition is “or”. +Take HTTP as an example, possible values of its Filter can be Host, URL, Request Header etc. If you add two Hosts for Filter, the relation between each Host is also “and”.} + + +For more details about policy objects, see \hyperlink{link:Objects}{\color{linkblue}{Objects}}. + + +\pdfbookmark[2]{Policy Hierarchy and Evaluation Order}{Policy Hierarchy and Evaluation Order} +\subsection*{\hypertarget{link:Policy Hierarchy and Evaluation Order}{Policy Hierarchy and Evaluation Order}} +\label{sec:policies:concepts:order} + +TSG firewall uses a network stack to process the packet, like the OSI model. When a network packet passes through, it will be parsed and resembled to a network session. +And the reassembled network session is decoded to identify the embedded content. At each step of the decoding process, all applicable fields of the application protocol, +the application, and the file are extracted and stored. These extracted attributes provide context to the content that was extracted from the data. +This extracted attributes and content provide comprehensive visibility into network traffic. With this deep visibility, +security policies can be fine grained crafted to detect and manage network threats. + + +Based aforementioned design, security policy rules are enforced as following \textbf{inspection layers}: +\begin{description}[leftmargin=0pt,itemindent=0em,itemsep=0.5ex] + \item + \begin{enumerate} + \item Packet layer: The firewall parses IP fragments, reassembles using the defragmentation process, and then parses IP header and TCP/UDP protocol headers if applicable. As application identification is on all layers, the identified application as well as IP address, ASN and Subscriber ID is used as key to find rule match. Because the application is not necessarily known in the first packets, it can take several packets to determine what the underlying application is, and rules without specifying application will be enforced in advance. + \item Session layer: Packets are reassembled to network session and decoded to traffic attributes, e.g. TLS SNI (TLS handshake option), HTTP Host, Mail addresses and DNS QNAME. + \item Content layer: Content that extracted from one session or more sessions are applicable for keywords scan, e.g. HTTP request body and Mail attachment. + \end{enumerate} + \end{description} +Within the layer, traffic attributes are not acquired simultaneously, which is known as \textbf{parsing stages}. This design offers stateful security functions at the application layer, +and the effectiveness of policy enforcement. The parsing stages of common protocols are listed in table below.\\ +%\begin{table}[h] +\begin{longtable}{p{0.17\textwidth}|p{0.77\textwidth}} + %\begin{tabularx}{\textwidth}{p{0.17\textwidth}|p{0.77\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Protocols}} & \textcolor{white}{Attributes Parsing Stages} \\\hline + HTTP & \begin{tabular}{l} + 1. Host, URL \\ + 2. Request Header \\ + 3. Request Body \\ + 4. Response Header \\ + 5. Response Body + \end{tabular}\\ \hline + TLS/SSL & \begin{tabular}{l} + 1. SNI \\ + 2. CN, SAN + \end{tabular}\\ \hline + DNS & QNAME\\\hline + MAIL & \begin{tabular}{l} + 1. Account\\ + 2. From, To, Subject\\ + 3. Content\\ + 4. Attachment File Name\\ + 5. Attachment File + \end{tabular}\\\hline + FTP & \begin{tabular}{l} + 1. Account\\ + 2. URI\\ + 3. Content + \end{tabular}\\\hline + %\end{tabularx} +%\end{table} +\end{longtable} +As the firewall receives more packets and do more in-depth inspection, more traffic attributes and content are ready for policy enforcement, which is shown in figure below.\\ + + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/inspection_stage} + %\caption{Figure: Inspection Stage} + \label{fig:system:inspection_stage} +\end{figure} + + +It is highly likely that even after only a relatively small number of policies have been created that there will be some that overlap +or are subsets of the parameters that the policies use to determine which policy should be matched against the incoming traffic. +When this happens there has to be a method to determine which policy should be applied to the packet. The method which is used by TSG is the policy hierarchy. +In another words, policies with lower inspection layers and earlier parsing stages are precedent. For example, a HTTP session, its URL appears before response body. +That’s why policy rules that inspect HTTP response body, are always evaluated after ones that inspect URL. + + +\notemark\textit{A policy rule that combines with condition fields of different layers and stages are evaluated at the last layer and stage. +Rule stage is decided by policy condition fields; and rule modification may change the rule stages.} + + +As firewall maybe unable to determine the exact application from the first packet, a session may be allowed through the firewall as undecided +until the application is identified, at which time the security rules are re-evaluated and an appropriate action is taken. + + +For more details about how TSG process packet flow, please see \hyperlink{link:Appendix E TSG Packet Flow}{\color{linkblue}{Appendix E TSG Packet Flow}}. + +\pdfbookmark[1]{Security Policy}{Security Policy} +\section*{\hypertarget{link:Security Policy}{Security Policy}} +\label{sec:policies:security} + +Security policies determine whether to deny, allow, monitor or intercept a session based on initial session attributes, +such as the subscriber ID, IP addresses, ports, protocols and applicable protocol fields (e.g. TLS SNI). +On TSG, security policy rules are enforced by firewall module. + + +All traffic passing through the firewall is matched against a session and each session is matched against a security policy rule. +When a session match occurs, the firewall applies the matching security policy rule to bidirectional traffic in that session (client to server and server to client). +For traffic that doesn’t match any defined rules, the default rule applies. The default rule is predefined to allow all traffic for firewall policy check. +Although the default rule is read-only by default, you can override them and change a limited number of settings, including the tags, action (allow or deny) and log settings. + + +A packet is matched against the first rule that meets the defined criteria and, after a match is triggered, subsequent rules are not evaluated. +Session that matches a rule generates a log entry at the end of the session in the security event log if you enable logging for that rule. +The logging options are configurable for each rule. + +\pdfbookmark[2]{Components of a Security Policy Rule}{Components of a Security Policy Rule} +\subsection*{\hypertarget{link:Components of a Security Policy Rule}{Components of a Security Policy Rule}} +\label{sec:policies:security:component} + +The Security policy rule construct permits a combination of the required and optional fields as detailed in the following table:\\ + + +\begin{longtable}{p{0.15\textwidth}|p{0.23\textwidth}|p{0.54\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{\begin{tabular}{l}Required/\\Optional\end{tabular}}} & \multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Field}} & \textcolor{white}{Description}\\\hline + \multirow{3}{*}{Required} & Name & A label (up to 128 characters) that identifies the rule.\\ \cline{2-3} + & Action & Specifies an Allow, Deny, Monitor or Intercept action for the traffic based on the criteria you define in the rule. For more details, see \hyperlink{link:Security Actions}{\color{linkblue}{Security Policy Actions}}. \\ \cline{2-3} + & Application & The application that you wish to control. It provides application control and visibility in creating security policies that block unknown applications, while enabling, inspecting, and shaping those that are allowed. For more information, see \textbf{Objects} > \textbf{Applications} and \hyperlink{link:Appendix B Predefined Applications}{\color{linkblue}{Appendix B Predefined Application}}.\\ \hline + \multirow{9}{*}{Optional} & Source & Define host IP addresses, address groups, Subscriber ID, IP Learning, or Geographic enforcement.\\ \cline{2-3} + & Destination & The location or destination for the packet. Define host IP addresses, address groups, IP Learning, or Geographic enforcement.\\ \cline{2-3} + & Filter & All web traffics are compared against the filtering, giving you a way to safely control how your users interact with online content. You will have Filter available when you select only one of the following protocols: HTTP, SSL, DNS, MAIL, FTP and QUIC in Applicationfield.\\ \cline{2-3} + & Tag & A keyword or phrase that help you to identify the policy. \\ \cline{2-3} + & Effective Devices & Select the devices that the security rule will be applied.\\ \cline{2-3} + & Schedule & Schedule when (day and time) the security rule should be in effect. \\ \cline{2-3} + & Log Session & When enabled, traffic that match security policies will be logged in Security Event Logs. \\ \cline{2-3} + & Description & A text field, up to 1024 characters, used to describe the rule. \\ \cline{2-3} + & Enabled & Only enabled policies will be enforced.\\ \hline +\end{longtable} + +\pdfbookmark[2]{Actions}{Security Actions} +\subsection*{\hypertarget{link:Security Actions}{Actions}} +\label{sec:policies:security:action} + +For traffic that matches the attributes defined in a security policy, you can apply the following actions:\\ + + +\begin{longtable}{p{0.12\textwidth}|p{0.82\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Action}} & \textcolor{white}{Description} \\\hline + Allow & The traffic is allowed to proceed to the next step.\\ \hline + Deny & \begin{tabular}{l} + The traffic is not allowed to proceed. There are 5 Sub Action to \\ + select, they are Drop, RST (TCP reset attack), Block, Alert and \\ + Redirect.\\ + Sub Action of Deny:\\ + \textbf{Drop}, silently drops the traffic.\\ + \textbf{RST}, sends a TCP reset to the client-side device.\\ + \textbf{Block}, sends 403/404 return code and customized content to \\ + the client.\\ + \textbf{Alert}, sends 200/204 return code and customized content to the \\ + client.\\ + \textbf{Redirect}, redirects to the link set in the policy configuration. + \end{tabular}\\ \hline + Intercept & Intercept HTTP/HTTPS traffic for proxy. If the traffic use SSL/TLS, it will be decrypted.\\\hline + Monitor & Scan all allowed traffic and generate a detailed log.\\\hline +\end{longtable} + +\pdfbookmark[2]{Applications and Filters}{Security Applications and Filters} +\subsection*{\hypertarget{link:Security Applications and Filters}{Applications and Filters}} +\label{sec:policies:security:filter} + +AppSketch is a traffic classification system available in TSG firewalls, determines what an application is irrespective of port, protocol, +encryption or any other evasive tactic used by the application. It applies multiple classification mechanisms, (including application signatures, +application protocol decoding, heuristics, and machine learning) to your network traffic stream to accurately identify applications. + + +Applications enables visibility into the applications on the network, so you can learn how they work and understand their behavioral characteristics +and their relative risk. When you define policy rules to control traffic, applications begin to classify traffic without any additional configuration. + + +\begin{longtable}{p{0.14\textwidth}|p{0.19\textwidth}|p{0.58\textwidth}} + \rowcolor{black}\multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Applications Type}} & \textcolor{white}{Description}\\\hline + \multirow{3}{*}{Application} & Basic Protocols & Network protocols ensure that computer network devices can transmit and receive data using a common language regardless of their different designs, hardware or infrastructures. + List all 50 basic protocols: + + + Unknown\_TCP, Unknown\_UDP, Unknown\_Other, DNS, FTP, FTPS, HTTP, HTTPS, ICMP, IKE, IMAP, MAIL, IMAPS, IPSEC, XMPP, L2TP, NTP, POP3, POP3S, PPTP, QUIC, SIP, SMB, SMTP, SMTPS, SPDY, SSH, SSL, SOCKS, TELNET, DHCP, RADIUS, OPENVPN, STUN, TEREDO, DTLS, DoH, ISAKMP, MDNS, NETBIOS, NETFLOW, RDP, RTCP, RTP, SLP, SNMP, SSDP, TFTP, BJNP, LDAP, RTMP, RTSP. + \\ \cline{2-3} + & \tabincell{l}{Predefined\\ Applications} & TSG has various predefined applications. \\ \cline{2-3} + & \tabincell{l}{Customized\\ Applications} & TSG allows you create custom applications and reference the customized application objects in policy.\\\hline + Selector & Selector & TSG allows you dynamically group applications based on application properties that you define into one object Selector. It is available for Action Allow and Deny. For more details, see \hyperlink{link:Application Selector}{\color{linkblue}{Application Selector}}. \\ \hline + Group & Group & An application group is an object that contains applications that you want to treat similarly in a policy. It is available for Action Allow and Deny. For more details, see \hyperlink{link:Application Group}{\color{linkblue}{Application Group}}. \\ \hline +\end{longtable} + + +You will have Filter available when you select only one of the following protocols: HTTP, SSL, DNS, MAIL, FTP and QUIC. +The following table lists different Filter fields for each protocol and the available object type you can select for each filter field, +it also shows whether each filter field support allow, deny, monitor and intercept action or not. + + +% + %\rowcolor{black}\multirow{2}{*}{\multicolumn{1}{@{}l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Protocol}}} & \multirow{2}{*}{\multicolumn{1}{@{}l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Filter Field}}} & + %\multirow{2}{*}{\multicolumn{1}{@{}l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Available Object}}} & \multicolumn{4}{@{}l}{\textcolor{white}{Applicable Actions}} + %&\textcolor{white}{Applicable Actions} &\textcolor{white}{Applicable Actions} &\textcolor{white}{Applicable Actions} + %\multicolumn{1 !{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Protocol}} + %\textcolor{white}{Protocol} + %!{\color{white}\vrule width 0.5pt} +%\begin{longtable}{p{0.16\textwidth}|p{0.17\textwidth}|p{0.18\textwidth}|p{0.1\textwidth}|p{0.1\textwidth}|p{0.11\textwidth}|p{0.12\textwidth}} + %\setlength{\arrayrulewidth}{2pt} +\begin{longtable}{p{0.13\textwidth}|p{0.15\textwidth}|p{0.14\textwidth}|p{0.07\textwidth}|p{0.07\textwidth}|p{0.11\textwidth}|p{0.11\textwidth}} + \rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{} & + \multicolumn{1}{l !{\vlinewhite}}{} & + \multicolumn{1}{l !{\vlinewhite}}{} & + \multicolumn{4}{c}{\textcolor{white}{Applicable Actions}} \\ + \arrayrulecolor{white}\cline{4-7} + \rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{\multirow{-2}{*}{\textcolor{white}{Protocol}}} & + \multicolumn{1}{l !{\vlinewhite}}{\multirow{-2}{*}{\textcolor{white}{Filter Field}}} & + \multicolumn{1}{l !{\vlinewhite}}{\multirow{-2}{*}{\textcolor{white}{\tabincell{l}{Available\\ Object}}}} & + \multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Allow}} & + \multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Deny}} & + \multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Monitor}} & + \textcolor{white}{Intercept} \\ \arrayrulecolor{black}\hline + \multirow{6}{*}{HTTP} & Host & \tabincell{l}{FQDNs\\ Category} & \cmark & \cmark & \cmark & \cmark\\ \cline{2-7} + & URL & URLs & \cmark & \cmark & \cmark & \xmark \\ \cline{2-7} + & \tabincell{l}{Request\\ Header} & \multirow{2}{*}{\tabincell{l}{HTTP\\ Signatures}} & \xmark & \cmark & \cmark & \xmark\\ \cline{2-2}\cline{4-7} + & \tabincell{l}{Response\\ Header} & & \xmark & \cmark & \cmark & \xmark\\ \cline{2-7} + & \tabincell{l}{Request\\ Content} & \multirow{2}{*}{Keywords} & \xmark & \cmark & \cmark & \xmark\\ \cline{2-2}\cline{4-7} + & \tabincell{l}{Response\\ Content} & & \xmark & \cmark & \cmark & \xmark\\\hline + \multirow{3}{*}{SSL} & SNI & \multirow{3}{*}{\tabincell{l}{FQDNs\\ Category}} & \cmark & \cmark & \cmark & \cmark \\ \cline{2-2}\cline{4-7} + & CN & & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & SAN & & \xmark & \cmark & \cmark & \xmark \\ \hline + QUIC & SNI & \tabincell{l}{FQDNs\\ Category} & \cmark & \cmark & \cmark & \xmark \\ \hline + DNS & QNAME & \tabincell{l}{FQDNs\\ Category} & \xmark & \cmark & \cmark & \xmark \\ \hline + \multirow{7}{*}{MAIL} & Account & \multirow{3}{*}{\tabincell{l}{Accounts}} & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & From & & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & To & & \xmark & \cmark & \cmark & \xmark \\ \cline{2-7} + & Subject & \multirow{4}{*}{\tabincell{l}{Keywords}} & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & Content & & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & \tabincell{l}{Attachment\\ Name} & & \xmark & \cmark & \cmark & \xmark \\ \cline{2-2}\cline{4-7} + & \tabincell{l}{Attachment\\ Content} & & \xmark & \cmark & \cmark & \xmark \\ \hline + \multirow{3}{*}{FTP} & URI & URLs & \xmark & \cmark & \cmark & \xmark \\ \cline{2-7} + & Content & Keywords & \xmark & \cmark & \cmark & \xmark \\ \cline{2-7} + & Account & Accounts & \xmark & \cmark & \cmark & \xmark \\ \hline +\end{longtable} + + +The Evaluation Order for security policy is described as following. + + +Security policy is evaluated before Proxy policy. Proxy manipulation requires targeted sessions are intercepted in security policies. +That is to say an intercept security policy rule is the prerequisite for proxy policy. + + +Traffic can match one or multiple security policy rules with monitor action. This means traffic can hit multiple security policy rules only with monitor actions. +For security policies with allow, deny and intercept actions, traffic can only hit one policy that meets the defined criteria with top priority. +After a match is triggered, subsequent rules are not evaluated. It is important to know the policy evaluation order to create policies accordingly. + + +There are three factors in evaluation of policies. They are condition, action and policy ID in sequence. + + +\begin{description}[leftmargin=0pt,itemindent=0em,itemsep=0.5ex] + \item + \begin{enumerate} + %\setlength{\itemindent}{-30pt}% + \setlength{\topsep}{0pt} %列表到上下文的垂直距离 + %\setlength{\itemsep}{-10pt} %条目间距 + \item The ranked evaluation order for condition is:\\ + IP > FQDN/URL/Request Header > Request Content > Response Header >Response Content + \item The priority queue of action is:\\ + Allow > Deny > Intercept > Monitor\\ + For policies that match \hyperlink{link:SSL Decryption Exclusion}{\color{linkblue}{SSL Decryption Exclusion}} are evaluated before intercept policies. + \item Prioritize policies in descending order by policy ID. + \end{enumerate} +\end{description} + + +For more details about how TSG process packet flow, please see \textbf{\hyperlink{link:Appendix E TSG Packet Flow}{\color{linkblue}{Appendix E TSG Packet Flow}}}. + +\pdfbookmark[2]{Allow Rules}{Allow Rules} +\subsection*{\hypertarget{link:Allow Rules}{Allow Rules}} +\label{sec:policies:security:allow} + +TSG allows the network traffic to pass through, without apply further policy checking. You can define traffic that you choose not to enforce policies because of business, +regulatory, personal, or other reasons, such as financial, health, military, or government traffic. + + +Generally, allow policies need not generate logs. However, if you enable Log Session, traffic that matches the allow policy rule will also be logged in Event Logs. +If you wish to have logs, it is recommended to create monitor rules with Log Session enabled, which will have the same effect. + +\pdfbookmark[2]{Intercept Rules}{Intercept Rules} +\subsection*{\hypertarget{link:Intercept Rules}{Intercept Rules}} +\label{sec:policies:security:intercept} + +Security policy with intercept action allows you to define traffic that you want the Proxy to terminate. Both HTTP and HTTPS sessions could be terminated. +You can do further manipulation on intercepted traffic with Proxy Policy. + + +When an SSL session is set to intercept, the Proxy terminates the client-side session and initiates a new server-side session. +Thus, the server certificate is replaced and content is decrypted. + + +You can specify different keyrings for individual intercept policy. If not, the Proxy uses the default keyring for trusted website. +Keyrings are managed via \textbf{Certificate Managements} > \textbf{\hyperlink{link:Decryption Keyrings}{\color{linkblue}{Decryption Keyrings}}}. + +\pdfbookmark[3]{Intercept Options}{Intercept Options} +\subsubsection*{\hypertarget{link:Intercept Options}{Intercept Options}} +\label{sec:policies:security:intercept:option} + +While policy objects enable you to identify traffic to enforce policies, policy profiles help you define further action. +When you create an Intercept policy and select the SSL application to enable access to encrypted sites, you will have three Action Parameters, +namely Keyring, Mirror Decrypted Traffic and Decryption Profile. They serve as your intercept options. + + +• You can specify a Keyring or use TrustedDefault. To specify a different Keyring, select the item from drop-down or click the plus icon to create a new one. For more details, see \hyperlink{link:Decryption Keyrings}{\color{linkblue}{Decryption Keyrings}}. + + +• If you enable Mirror Decrypted Traffic, you can select one item from drop-down or click the plus icon to create a new profile. For more details, see \hyperlink{link:Traffic Mirror Profile}{\color{linkblue}{Traffic Mirror Profile}}. + + +• You can use decryption-default for your Decryption Profile, or you can select different one from drop-down and create new ones. For more details, see \hyperlink{link:Decryption Profile}{\color{linkblue}{Decryption Profile}}. + +\pdfbookmark[3]{Proxy Limitations}{Proxy Limitations} +\subsubsection*{\hypertarget{link:Proxy Limitations}{Proxy Limitations}} +\label{sec:policies:security:intercept:limitation} + +There are two types of traffic that exclude from decryption. They are the proxy limitations. One is that you choose not to decrypt because of business, regulatory, +personal, or other reasons. The other is traffic that breaks decryption for technical reasons: + + +\begin{itemize} + \item Asymmetric Routing Traffic + \item Certificate Pinning Apps: + \begin{itemize} + \item[-] Facebook, Instagram + \item[-] YouTube, Gmail, Google Search + \item[-] Twitter + \item[-] Apple Store + \end{itemize} + \item Mutual Authentication (Client Certificate Request) + \item Some android System that unable to install root certificate + \item Website using HPKP + \item Nonstandard SSL/TLS implications + \item SSLv1.0, SSLv2.0 are not supported + \item Unsupported ciphers +\end{itemize} +For more details, see \hyperlink{link:SSL Decryption Exclulsion}{\color{linkblue}{SSL Decryption Exclulsion}}. + + +If you wish to exclude FQDN from decryption, create an SSL Decryption Exclusion item and it will immediately become effective. +For policies that match SSL Decryption Exclusion are evaluated before intercept policies. + +\pdfbookmark[3]{Intercept Trouble Shooting}{Intercept Trouble Shooting} +\subsubsection*{\hypertarget{link:Intercept Trouble Shooting}{Intercept Trouble Shooting}} +\label{sec:policies:security:intercept:troubleshooting} + +You can find out if the interception is successful by checking if the certificates are issued by your pre-configured Root CA. +You should exercise with cautions because web applications may not cooperate with SSL interception. + + +• Your connection is not private/secure + + +Visit the website that should match the intercept rule. For Chrome, Microsoft Internet Explorer and Firefox, click the lock icon next to the address bar to view website certificates. +If the browser warning that the connection is not secure, one possible reason is you haven’t install/trust the root certificate yet. + + +Another possible reason is that the site uses an incomplete certificate chain, the Proxy doesn’t automatically fix the chain as a browser would. +Although Proxy is able to cache unseen intermediate certificates that issued +by trusted root (\textbf{Certificate Managements} > \textbf{\hyperlink{link:Cached Intermediate Certificates}{\color{linkblue}{Cached Intermediate Certificates}}}), +you still need to manually download the missing intermediate certificates occasionally. +Missing certificates could be import via \textbf{Certificate Managements} > \textbf{\hyperlink{link:Trusted Certificate Authorities}{\color{linkblue}{Trusted Certificate Authorities}}}. + + +• Handling Web Sites Where Decrypt Re-sign Works for a Browser but not an App (SSL or Certificate Authority Pinning) + + +Some apps for smart phones and other devices use a technique called SSL (or Certificate Authority) pinning. +The SSL pinning technique embeds the hash of the original server certificate inside the app itself. +As a result, when the app receives the resigned certificate from TSG, the hash validation fails and the connection is aborted. + + +If internet users cannot connect to the web site using the site’s app, but they can connect using the web browser, +even when using the browser on the same device where the app fails. For example, users cannot use the Facebook iOS or android app, +but they can point Safari or Chrome at https://www.facebook.com and make a successful connection. + + +Because SSL pinning is specifically used to avoid man-in-the-middle attacks, there is no workaround. You must choose between the following options: + + +- Support app users, by enabling Certificate Pinning dynamic bypass option, in which case you can only decrypt browser traffic to the site. +For more details, see \textbf{Proxy Profiles} > \textbf{\hyperlink{link:Trusted Certificate Authorities}{\color{linkblue}{Decryption Profile}}}. + + +- Force users to use browsers only. If you must decrypt traffic to the site, you will need to inform users that they cannot use the site’s app +when connecting through your network, that they must use their browsers only. + +\pdfbookmark[2]{Create a Security Policy Rule}{Create a Security Policy Rule} +\subsection*{\hypertarget{link:Create a Security Policy Rule}{Create a Security Policy Rule}} +\label{sec:policies:security:create} + +\begin{description} + \item[STEP 1.] Add a rule. Select \textbf{Policies} > \textbf{Security} and click \textbf{Create} to add a new rule. Enter a descriptive \textbf{Name} for the rule. + \item[STEP 2.] Define what action you want TSG to take for traffic that matches the rule. Select an \textbf{Action}. + See \hyperlink{link:Security Actions}{\color{linkblue}{Security Policy Actions}} for a description of each action. + \item[STEP 3.] Define the matching criteria for the source fields in the packet. Specify single or multiple \textbf{Source} IP Addresses/ Subscriber IDs or leave the value set to any. If you don’t add entries to the list, the policy has no IP address restrictions. + \item[STEP 4.] Define the matching criteria for the destination fields in the packet. Specify one or multiple \textbf{Destination} IP Addresses or leave the value set to any. + + + \notemark\textit{As a best practice, use address objects as the Destination Address to enable access to only specific servers or specific groups of servers especially + for commonly exploited services, such as DNS and VPN.} + \item[STEP 5.] Select one or more \textbf{Applications}. There are built-in protocols and well-known Applications and customized Applications in the list. + You can search the application you want to fill in. You can also use application \textbf{Selector} and \textbf{Group} as objects in policy. + For more details, see \textbf{Security Policy} > \textbf{\hyperlink{link:Security Applications and Filters}{\color{linkblue}{Applications and Filters}}} and \textbf{Objects} > \textbf{\hyperlink{link:Applications}{\color{linkblue}{Applications}}}. + \item[STEP 6.] (\textcolor{gold}{Optional}) Specify a \textbf{Filter} as match criteria for the rule. For example, select a \textbf{Category} for \textbf{Host}. + If you select a category, only web traffic will match the rule and only if the traffic is destined for that specified category. + For more details, see \textbf{Security Policy} > \textbf{\hyperlink{link:Security Applications and Filters}{\color{linkblue}{Applications and Filters}}}. + + + \notemark\textit{Filter is not available when multiple or no applications are selected.} + \item[STEP 7.] (\textcolor{gold}{Optional})Specify a \textbf{Tag} or leave the value empty. + You can select one or more Policy Tags which are created from \textbf{Policies} > \textbf{Tags} previously. + Optionally, you can click the plus icon to create new Tags. After you click the icon, a page will slide in on the right. Enter the \textbf{Tag Category}. + Pick a \textbf{Color}. And add one or multiple \textbf{Tags}. Then you can select the tag you just created from the list. + \item[STEP 8.] Specify \textbf{Effective Devices} by choosing Device Tags or leave the value empty, which means the policy is effective on all devices by default. + Device Tags are built-in labels to classify the devices according to user’s requirement when TSG is deployed. Normally, the Device Tags will be classified by areas or ISPs. + \item[STEP 9.] (\textcolor{gold}{Optional})Enter a \textbf{Description} for the rule. + \item[STEP 10.] (\textcolor{gold}{Optional})Select a \textbf{Schedule} or leave the value set to always. For more details, see \textbf{Policies} > \textbf{\hyperlink{link:Schedules}{\color{linkblue}{Schedules}}}. + + + \notemark\textit{If you select a schedule, the schedule will determine when the policy will be enabled and effective. + This means you don’t have to turn the Enabled switch on. Because the policy will automatically be effective according to your specified schedule. + And even if you set the policy Enabled, the policy will not be effective, if it has not reached the schedule time frame.} + \item[STEP 11.] Verify that \textbf{Log Session} is enabled if you wish to have logs. Only traffic that matches a Security policy rule will be logged. + \item[STEP 12.] Verify that \textbf{Enabled} is enabled. + \item[STEP 13.] Click \textbf{OK} to save the policy rule. + \item[STEP 14.] (\textcolor{gold}{Optional})To verify that you have set up your policies effectively, test whether your Security policy rules are being evaluated and determine which Security policy rule applies to a traffic flow. For example, to verify the policy rule that will be applied for a client with the IP address 192.168.0.1 when it sends a HTTP request to the 172.16.0.1 server: + \begin{enumerate} + \item Select \textbf{Settings} > \textbf{Trouble Shooting} and select \textbf{Policy Verify} tab. + \item Select \textbf{Security Policy Match} from the \textbf{Select Test} drop-down. + \item Enter the \textbf{Client IP} and \textbf{Server IP} addresses or leave it set to default. + \item Specify the \textbf{Client Port} and \textbf{Server Port} or leave it set to default. + \item Select the \textbf{Protocol} and \textbf{APP ID}. + \item Click \textbf{Verify} to execute the \textbf{Security policy match} test. + \end{enumerate} + \item[STEP 15.] After the policy has been hit. View \textbf{Logs} to monitor the policy rule status and determine the effectiveness of the policy rule. + Select \textbf{Logs} > \textbf{Security Event Logs} and view relative information about the policy. +\end{description} + +You can view detailed information about the policy you just created. To edit and delete the policy, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. + + +You can export the contents of policies to a json file. First, search policies according to ID, Name. Then, click the Export icon on the right to download and save the file to your local folder. + + +You can also import policies by clicking the import icon. Only json and txt formats can be uploaded. You can take the exported file as template for import. + + +Select the checkbox for policies in the list and Click \textbf{Watch} at the bottom to add to Watch List. And then you can click the star icon in the bottom right and select Policy tab to view the Watch List. +You can search policies by ID and Name in the list. The Watch feature gives you the ability to observe policies and objects on which you wish to keep an eye any time. + + +\notemark\textit{Policy No. 0: For traffic that passes through TSG but does not hit any policies, the traffic is executed according to policy No. 0. +The conditions of policy No. 0 are all any, and by default the action is Allow. Policy No. 0 is forbidden to edit.} + +\pdfbookmark[1]{Proxy Policy}{Proxy Policy} +\section*{\hypertarget{link:Proxy Policy}{Proxy Policy}} +\label{sec:policies:proxy} + +Proxy policy instructs the proxy how to manipulate a session. Manipulation requires targeted sessions are intercepted in security policies. An individual manipulation policy rules determine whether to allow, monitor, deny or manipulate a session based on traffic attributes. Valid objects depend on specific action. + + +Proxy policy works correctly on all platforms, including Windows, Linux, MacOS, Android, iOS, etc. and also supports console commands, such as wget and curl, mobile devices, tablets and workstations in all locations. But TSG does not support TV device that cannot install the certificate, and device with Android 7.0 and versions below. + + +For the site which breaks decryption for certificate pinning, the proxy only can bypass or deny the traffic based on your configuration. For more details, see \hyperlink{link:Decryption}{\color{linkblue}{Decryption}}. + +\pdfbookmark[2]{Components of a Proxy Policy Rule}{Components of a Proxy Policy Rule} +\subsection*{\hypertarget{link:Components of a Proxy Policy Rule}{Components of a Proxy Policy Rule}} +\label{sec:policies:proxy:component} + +The Proxy Policy rule construct permits a combination of the required and optional fields as detailed in the following table: + + +\begin{longtable}{p{0.15\textwidth}|p{0.23\textwidth}|p{0.54\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{\begin{tabular}{l}Required/\\Optional\end{tabular}}} & \multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Field}} & \textcolor{white}{Description}\\\hline + \multirow{2}{*}{Required} & Name & A label (up to 128 characters) that identifies the rule.\\ \cline{2-3} + & Action & Specifies an Allow, Deny, Monitor, Redirect, Replace, Hijack or Insert action for the traffic based on the criteria you define in the rule. + For more details, see \hyperlink{link:Proxy Actions}{\color{linkblue}{Proxy Policy Actions}}. \\ \hline + \multirow{11}{*}{Optional} & Source & Define host IP addresses, address groups, Subscriber ID, IP Learning, or Geographic enforcement.\\ \cline{2-3} + & Destination & The location or destination for the packet. Define host IP addresses, address groups, IP Learning, or Geographic enforcement.\\ \cline{2-3} + & Filter & All web traffics are compared against the filtering, giving you a way to safely control how your users interact with online content. You must fill one of the Source, Destination or Filter.\\ \cline{2-3} + & Application & The application that you wish to control. It provides application control and visibility in creating proxy policies that block unknown applications, while enabling, inspecting, and shaping those that are allowed.\\ \cline{2-3} + & Tag & A keyword or phrase that help you to identify the policy. \\ \cline{2-3} + & Effective Devices & Select the devices that the security rule will be applied.\\ \cline{2-3} + & Schedule & Schedule when (day and time) the security rule should be in effect. \\ \cline{2-3} + & Log Session & When enabled, traffic that match security policies will be logged in Security Event Logs. \\ \cline{2-3} + & Log Option & Metadata and All: Metadata only structured logs are recorded. All provides raw log files for some special log fields, such as content of HTTP request header or HTTP response content.\\ \cline{2-3} + & Description & A text field, up to 1024 characters, used to describe the rule. \\ \cline{2-3} + & Enabled & Only enabled policies will be enforced.\\ \hline +\end{longtable} + +\pdfbookmark[2]{Actions}{Proxy Actions} +\subsection*{\hypertarget{link:Proxy Actions}{Actions}} +\label{sec:policies:proxy:action} + +For traffic that matches the attributes defined in a proxy policy, you can apply the following actions: + + +\begin{longtable}{p{0.12\textwidth}|p{0.82\textwidth}} + \rowcolor{black}\multicolumn{1}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Action}} & \textcolor{white}{Description} \\\hline + Allow & The Proxy pass-through the matched sessions. The traffic is allowed to proceed to the next step.\\ \hline + Deny & The Proxy terminate matched HTTP session with an error page. More information of uploading a html file, see \textbf{Proxy Profile} > \textbf{\hyperlink{link:Response Pages}{\color{linkblue}{Response Pages}}}.\\ \hline + Monitor & The Proxy produce a log to record matched HTTP session information.\\\hline + Redirect & The Proxy redirect matched HTTP session to a predefined URL. Since redirection + need to be performed before delivering response to client, condition of response body is not + applicable in this action. You MUST configure the redirect response via Response Code and Redirect + URL. The Destination URL should begin with a valid protocol (http:|https:). You SHOULD NOT select + 301 as Response Code unless you exactly know what you are doing. This action produces a log. \\ \hline + Replace & The Proxy Searches in a given HTTP part to Find a given string, and Replace any matches with another given string. If no match was found, the session remained untouched. For performance concerns, condition of request body and response body is not available in this action. For example, you can configure the Proxy to search in the response body of URL “www.example.com/index.html”, find every “string1” and replace with “string2”. This action produces a log. You can use regex to do replacement, e.g. case insensitive find “(?i)CaSEInSensitive(?-i)”. You can add multiple replacement. + + + \notemark \textit{Note that when searching and replacing content, there must be at least 512 characters of the replaced content. And the system support utf8 encoding and has the ability to replace content of different languages, including Kazakh, Russian and English.}\\ \hline + Hijack & The Proxy hijack a downloading file. Supported file type are img, exe, apk and html. More information of uploading a file for hijack, see \textbf{Proxy Profile} > \textbf{\hyperlink{link:Hijack Files}{\color{linkblue}{Hijack Files}}}.\\ \hline + Insert & The Proxy insert a “js” or “css” scripts to webpages. More details of uploading a script, see \textbf{Proxy Profile} > \textbf{\hyperlink{link:Insert Scripts}{\color{linkblue}{Insert Scripts}}}.\\ \hline +\end{longtable} + +\pdfbookmark[2]{Applications and Filters}{Proxy Applications and Filters} +\subsection*{\hypertarget{link:Proxy Applications and Filters}{Applications and Filters}} +\label{sec:policies:proxy:filter} + +Only two basic protocol HTTP and DoH are available for the Application in proxy policy. The following table lists different Filter fields for the two protocols and the available object type you can select for each filter field, it also shows whether each filter field support allow, deny, monitor, redirect, replace, hijack and insert action or not. + + +Only two basic protocol HTTP and DoH are available for the Application in proxy policy. The following table lists different Filter fields for the two protocols and the available object type you can select for each filter field, it also shows whether each filter field support allow, deny, monitor, redirect, replace, hijack and insert action or not. + + +\begin{longtable}{p{0.12\textwidth}|p{0.02\textwidth}|p{0.02\textwidth}|p{0.02\textwidth}|p{0.02\textwidth}|p{0.03\textwidth}|p{0.03\textwidth}|p{0.04\textwidth}|p{0.04\textwidth}|p{0.04\textwidth}|p{0.04\textwidth}|p{0.03\textwidth}|p{0.03\textwidth}|p{0.03\textwidth}|p{0.03\textwidth}} + \rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{} & + \multicolumn{14}{c}{\textcolor{white}{\tabincell{l}{Filter Fields Fit in Actions\\ \qquad HTTP | DoH }}} \\ \arrayrulecolor{white}\cline{2-15} + \rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{\multirow{-2}{*}{\textcolor{white}{Filter Type}}}& + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Allow}} & + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Deny}} & + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Monitor}} & + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Redirect}} & + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Replace}} & + \multicolumn{2}{l!{\color{white}\vrule width 0.5pt}}{\textcolor{white}{Hijack}} & + \multicolumn{2}{l}{\textcolor{white}{Insert}} \\\arrayrulecolor{black}\hline + Host & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \cmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark \\ \hline + URL & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark \\ \hline + \tabincell{l}{Request\\ Header} & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark \\ \hline + \tabincell{l}{Response\\ Header} & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark \\ \hline + \tabincell{l}{Request\\ Content} & \xmark & \xmark & \cmark & \xmark & \cmark & \xmark & \cmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark \\ \hline + \tabincell{l}{Response\\ Content} & \xmark & \xmark & \cmark & \xmark & \cmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark \\ \hline + QNAME & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark & \cmark & \xmark & \xmark & \xmark & \xmark & \xmark & \xmark \\ \hline +\end{longtable} +Object type available for Filter: + + +\begin{longtable}{p{0.25\textwidth}|p{0.05\textwidth}|p{0.09\textwidth}|p{0.04\textwidth}|p{0.14\textwidth}|p{0.07\textwidth}} + %\rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{\cellcolor{black}} & + \multicolumn{5}{c}{\textcolor{white}{\cellcolor{black}Object Type}} \\ \arrayrulecolor{white}\cline{2-6} + %\rowcolor{black} + \multicolumn{1}{l !{\vlinewhite}}{\multirow{-2}{*}{\cellcolor{black}\textcolor{white}{Filter Type}}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}FQDN}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}Category}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}URL}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}HTTP Signature}} & + \multicolumn{1}{l}{\textcolor{white}{\cellcolor{black}Keyword}} \\\arrayrulecolor{black}\hline + Host & \cmark & \cmark & & & \\ \hline + URL & & & \cmark & & \\ \hline + Request Header & & & & \cmark & \\ \hline + Response Header & & & & \cmark & \\ \hline + Request Content & & & & & \cmark \\ \hline + Response Content & & & & & \cmark \\ \hline + QNAME & \cmark & \cmark & & & \\ \hline +\end{longtable} + +The Evaluation Order for proxy policy is described as following. + + +Security policy is evaluated in preference to Proxy policy. Proxy manipulation requires targeted sessions are intercepted in security policies. That is to say an intercept security policy is the prerequisite for proxy policy. + + +For proxy policies with allow action, traffic can only hit one policy that meets the defined criteria. After a match is triggered, subsequent rules are not evaluated. Except allow action, proxy policies with other actions can be matched together only with monitor policies. This means traffic can hit a block proxy policy and a monitor proxy policy that meets the defined criteria at the same time. It is important to know the policy evaluation order to create policies accordingly. + + +There are three factors in evaluation of policies. They are condition, action and policy ID in sequence. + + +\begin{description}[leftmargin=0pt] + \item + \begin{enumerate} + \setlength{\topsep}{0pt} %列表到上下文的垂直距离 + %\setlength{\itemsep}{0.3ex} + \item The ranked evaluation order for condition is:\\ + IP > FQDN/URL/Request Header > Request Content > Response Header >Response Content + \item The priority queue of action is:\\ + Allow > Block (Monitor) >Redirect (Monitor)> Replace (Monitor) > Hijack (Monitor) > Insert (Monitor) + \item Prioritize policies in descending order by policy ID. + \end{enumerate} +\end{description} + + +For more details about how TSG process packet flow, please see \textbf{\hyperlink{link:Appendix E TSG Packet Flow}{\color{linkblue}{Appendix E TSG Packet Flow}}}. + +\pdfbookmark[2]{Create a Proxy Policy Rule}{Create a Proxy Policy Rule} +\subsection*{\hypertarget{link:Create a Proxy Policy Rule}{Create a Proxy Policy Rule}} +\label{sec:policies:proxy:create} + +\begin{description} + \item[STEP 1.] Add a rule. Select \textbf{Policies} > \textbf{Proxy} and click \textbf{Create} to add a new rule. Enter a descriptive \textbf{Name} for the rule. + \item[STEP 2.] Define what action you want TSG to take for traffic that matches the rule. Select an \textbf{Action}. See \hyperlink{link:Proxy Actions}{\color{linkblue}{Proxy Policy Actions}} for a description of each action. + \item[STEP 3.] Define the matching criteria for the source fields in the packet. Specify one or multiple \textbf{Source} IP Addresses/ Subscriber IDs or leave the value set to any. If you don’t add entries to the list, the policy has no IP address restrictions. + \item[STEP 4.] Define the matching criteria for the destination fields in the packet. Specify single or multiple \textbf{Destination} IP Addresses or leave the value set to any. + + + \notemark\textit{As a best practice, use address objects as the Destination Address to enable access to only specific servers or specific groups of servers especially for commonly exploited services, such as DNS and VPN.} + \item[STEP 5.] (\textcolor{gold}{Optional})If the Action is Redirect, specify the \textbf{Application}. + \item[STEP 6.] (\textcolor{gold}{Optional}) Specify \textbf{Filters} as match criteria for the rule. For example, select a \textbf{Category} for \textbf{Host}. + If you select a category, only web traffic will match the rule and only if the traffic is destined for that specified category. + For more details, see \textbf{Proxy Policy} > \textbf{\hyperlink{link:Proxy Applications and Filters}{\color{linkblue}{Applications and Filters}}} and \textbf{Objects} > \textbf{\hyperlink{link:Applications}{\color{linkblue}{Applications}}}. + \item[STEP 7.] (\textcolor{gold}{Optional})Specify a \textbf{Tag} or leave the value empty. + + + You can select one or more Policy Tags which are created from \textbf{Policies} > \textbf{Tags} previously. Optionally, you can click the plus icon to create new Tags. After you click the icon, a page will slide in on the right. Enter the \textbf{Tag Category}. Pick a \textbf{Color}. And add one or multiple \textbf{Tags}. Then you can select the tag you just created from the list. + \item[STEP 8.] Specify \textbf{Effective Devices} by choosing Device Tags or leave the value empty, which means the policy is effective on all devices by default. Device Tags are built-in labels to classify the devices according to user’s requirement when TSG is deployed. Normally, the Device Tags will be classified by areas or ISPs. + \item[STEP 9.] (\textcolor{gold}{Optional})Enter a \textbf{Description} for the rule. + \item[STEP 10.] Select a \textbf{Schedule} or leave the value set to always. For more details, see \textbf{Policies} > \textbf{\hyperlink{link:Schedules}{\color{linkblue}{Schedules}}}. + + + \notemark\textit{If you select a schedule, the schedule will determine when the policy will be enabled and effective. This means you don’t have to turn the Enabled switch on. Because the policy will automatically be effective according to your specified schedule. And even if you set the policy Enabled, the policy will not be effective, if it has not reached the schedule time frame.} + \item[STEP 11.] Verify that \textbf{Log Session} is enabled if you wish to have proxy event logs. Only traffic that matches a Proxy policy rule will be logged. + When \textbf{Log Session} is enabled, select one of \textbf{Log Options}, Metadata only or All. If option Metadata only is enabled, only structured logs are recorded for the proxy policy rule. + While option All provides raw log files for some special log fields, such as content of HTTP request header or HTTP response content. For more details of logs, see \textbf{\hyperlink{link:View and Manage Logs}{\color{linkblue}{View and Manage Logs}}}. + \item[STEP 12.] Verify that \textbf{Enabled} is on if you don’t have a schedule. + \item[STEP 13.] Click \textbf{OK} to save the policy rule. + \item[STEP 14.] (\textcolor{gold}{Optional})To verify that you have set up your policies effectively, test whether your Proxy Policy rules are being evaluated and determine which Proxy Policy rule applies to a traffic flow. + \begin{enumerate} + \item Select \textbf{Settings} > \textbf{Trouble Shooting} and select \textbf{Policy Verify} tab. + \item Select \textbf{Proxy Policy Match} from the \textbf{Select Test} drop-down. + \item Enter the \textbf{Client IP} and \textbf{Server IP} addresses or leave it set to default. + \item Specify the \textbf{Client Port} and \textbf{Server Port} or leave it set to default. + \item Select the \textbf{Protocol} and \textbf{APP ID} from the drop-down. + \item Click \textbf{Verify} to execute the \textbf{Proxy Policy Match} test. + \end{enumerate} + \item[STEP 15.] (\textcolor{gold}{Optional})After the policy has been hit. View \textbf{Logs} to monitor the policy rule status and determine the effectiveness of the policy rule. + Select \textbf{Logs} > \textbf{Proxy Event Logs} and view relative information about the policy. +\end{description} + + +You can view detailed information about the policy you just created. To edit and delete the policy, find the item you want to edit or delete in the list. Click \textbf{Edit} or \textbf{Delete} at the top left. + + +You can export the contents of policies to a json file. First, search policies according to ID, Name. Then, click the Export icon on the right to download and save the file to your local folder. + + +You can also import policies by clicking the import icon. Only json and txt formats can be uploaded. You can take the exported file as template for import. + + +Select the checkbox for policies in the list and Click \textbf{Watch} at the bottom to add to Watch List. And then you can click the star icon in the bottom right and select Policy tab to view the Watch List. You can search policies by ID and Name in the list. + +\pdfbookmark[1]{Schedules}{Schedules} +\section*{\hypertarget{link:Schedules}{Schedules}} +\label{sec:policies:schedules} + +Schedules is the time frame that is applied to the policy or report. Schedules allow you to control the time period for which security rules and proxy rules are in effect. This can be something as simple as a time range that the sessions are allowed to start such as between 8:00 am and 5:00 pm. Something more complex like business hours that include a break for lunch and time of the session’s initiation may need assign multiple schedules to a policy because it will require multiple time ranges. You can then apply these schedules to the rules and reports. + + +Types of Schedules: + + +• Recurring: Recur daily, weekly or monthly during the specified time periods. + + +• One-time: Policy or report is effective once during the specified days and time period. You can apply one-time schedules to control policies or reports related to one-time events. + + +The schedule page displays the full list of predefined and custom schedules. To view the policies to which a schedule is attached, to apply a schedule to a policy or to change the applied schedule, go to the corresponding policy Edit page. + + +\notemark\textit{You cannot delete a schedule that is currently applied to a policy. To do so, you must apply a different schedule to the policy or delete the policy itself.} + + +Perform the following to create a schedule. + + +\begin{description} + \item[STEP 1.] Select \textbf{Policies} > \textbf{Schedules} and click create. + \item[STEP 2.] Add a \textbf{Name}. + \item[STEP 3.] Select \textbf{Repeat} mode from Daily, Weekly, Monthly and one-time. You can customize recurring mode. + \item[STEP 4.] Enter \textbf{Start Date}, \textbf{End Date}, \textbf{Start Time} and \textbf{End Time}. + \item[STEP 5.] Click \textbf{OK}. +\end{description} + +\pdfbookmark[1]{Verify Policy Rules}{Verify Policy Rules} +\section*{\hypertarget{link:Verify Policy Rules}{Verify Policy Rules}} +\label{sec:policies:verify} + +Verify the policy rules in your running configuration to ensure that your policies appropriately allow and deny traffic and access to applications and websites in compliance with your business needs and requirements. + + +You can test and verify that your policy rules by executing policy match tests for your TSG directly from the web interface. + + +For example, a Proxy Policy has been defined with ID 4736, Name tsg-test-pxyverify. And the basic information about this policy is listed as following. + + +\begin{longtable}{p{0.21\textwidth}|p{0.15\textwidth}|p{0.15\textwidth}|p{0.14\textwidth}|p{0.2\textwidth}} + \rowcolor{black} + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}Source}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}Destination}} & + \multicolumn{1}{l!{\vlinewhite}}{\textcolor{white}{\cellcolor{black}Application}} & + \multicolumn{2}{l}{\textcolor{white}{\cellcolor{black}Filter}} \\\hline + + \multirow{3}{*}{\tabincell{l}{192.168.50.71\\ 0-65535}} & \multirow{3}{*}{Any} & \multirow{3}{*}{HTTP} & HTTP & \tabincell{l}{www.vip.com\\ www.json.cn\\ index.com}\\ \cline{4-5} + & & & URL & microsoft.com \\ \cline{4-5} + & & & \tabincell{l}{Response\\ Header} & \tabincell{l}{beer\\ cute\&nice\&easy\\ love\&beauty} \\ \hline +\end{longtable} + + +\begin{description} + \item[STEP 1.] \hyperlink{link:Logging into the Web Interface}{\color{linkblue}{Logging into the Web Interface}}. + \item[STEP 2.] Select \textbf{Settings} > \textbf{Trouble Shooting} and select \textbf{Policy Verify} tab to perform a policy match or connectivity test. + \item[STEP 3.] Enter the required information to perform the policy match test. In this example, just run a \textbf{Proxy Policy Match}. + \begin{enumerate} + \item Select \textbf{Proxy Policy Match} from the Select Test drop-down. + \item Enter the \textbf{Client IP} and \textbf{Server IP} addresses or leave it set to default. If you wish to match your specified policy, enter at least one Client IP that is in Source IP set and enter at least one Server IP that is in Destination IP set. If the Source or Destination is any in your policy, leave the corresponding Client IP or Server IP set to default. Here fill in Client IP 192.168.50.71. + \item Specify the \textbf{Client Port} and \textbf{Server Port} or leave it set to default. + \item Select the \textbf{Protocol} from Any, TCP and UDP. + \item Specify \textbf{Subscriber ID} if your specified policy references Subscriber ID object. + \item Select \textbf{APP ID} from the Applications side page, and you can search your application by name. Here select HTTP. + \item If you selected one of HTTP, SSL, DNS, MAIL, FTP and QUIC as \textbf{APP ID}, you need to add corresponding additional filter for your policy rule testing. And you need to fill in all the filter fields defined in the policy, but you can add only one item for each field. For example, click plus, and add “www.vip.com” for Host; click plus, and add “microsoft.com” for URL; click plus and add “beer” for Response Header. + \end{enumerate} + \item[STEP 4.] Click \textbf{Verify} to execute the \textbf{Proxy policy match} test. + \item[STEP 5.] Review the \textbf{Policy Match} and \textbf{Object Match} result to see the policy rules. +\end{description} + + +Only when all conditions are matched, you can find the matched policy. The evaluation order for policy verify is the same as executing policies. diff --git a/TSG_Administrator's_Guide/content/titlepage.tex b/TSG_Administrator's_Guide/content/titlepage.tex new file mode 100644 index 0000000..691c57b --- /dev/null +++ b/TSG_Administrator's_Guide/content/titlepage.tex @@ -0,0 +1,37 @@ + +% !TEX root = ../TSG_Administrator's_Guide_SV20.11_v1.0_EN.tex +% +% ------------------------------------ --> cover title page +\begin{titlepage} + \pdfbookmark[0]{Cover}{Cover} + \flushright + \hfill + \vfill + {\LARGE\thesisTitle \par} + \rule[5pt]{\textwidth}{.4pt} \par + Version \thesisVersion + \vfill + Copyright @ \\ + Publish Date: \textit{\large\thesisDate} \\ + +\end{titlepage} + +% ------------------------------------ --> copyright +{ + \pdfbookmark[0]{Copyright}{Copyright} + + \large\textbf{Contact Information} \\ + \sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\\ + \\ + \\ + \large \textbf{Copyright} \\ + \sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\\ + © The copyright of this user manual is owned by \sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow. Without the permission and authorization of \sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow\sixsnow , + any organization or person shall not use, copy or disseminate any text, content and pictures contained in this manual for any reason, + in any way or by any means (electronic or mechanical).\\ + \\ + \\ + \large \textbf{Last Revised} \\ + \thesisDate \\ +} + diff --git a/TSG_Administrator's_Guide/gfx/dynamic_bypass.png b/TSG_Administrator's_Guide/gfx/dynamic_bypass.png Binary files differnew file mode 100644 index 0000000..07e57fa --- /dev/null +++ b/TSG_Administrator's_Guide/gfx/dynamic_bypass.png diff --git a/TSG_Administrator's_Guide/gfx/fig_signatures.png b/TSG_Administrator's_Guide/gfx/fig_signatures.png Binary files differnew file mode 100644 index 0000000..139cb5e --- /dev/null +++ b/TSG_Administrator's_Guide/gfx/fig_signatures.png diff --git a/TSG_Administrator's_Guide/gfx/inspection_stage.png b/TSG_Administrator's_Guide/gfx/inspection_stage.png Binary files differnew file mode 100644 index 0000000..3f61fed --- /dev/null +++ b/TSG_Administrator's_Guide/gfx/inspection_stage.png diff --git a/TSG_Administrator's_Guide/gfx/packet_flow.png b/TSG_Administrator's_Guide/gfx/packet_flow.png Binary files differnew file mode 100644 index 0000000..30e8b3e --- /dev/null +++ b/TSG_Administrator's_Guide/gfx/packet_flow.png @@ -0,0 +1 @@ +0.4.1
\ No newline at end of file diff --git a/cleanthesis.sty b/cleanthesis.sty new file mode 100644 index 0000000..f5b6294 --- /dev/null +++ b/cleanthesis.sty @@ -0,0 +1,775 @@ +%% cleanthesis.sty +%% Copyright 2020 R. Langner +% +% This work may be distributed and/or modified under the +% conditions of the LaTeX Project Public License, either version 1.3 +% of this license or (at your option) any later version. +% The latest version of this license is in +% http://www.latex-project.org/lppl.txt +% and version 1.3 or later is part of all distributions of LaTeX +% version 2005/12/01 or later. +% +% This work has the LPPL maintenance status `maintained'. +% +% The Current Maintainer of this work is R. Langner. +% +% This work consists of all files listed in MANIFEST.md. +% +% +% ************************************************** +% +% Clean Thesis +% -- A LaTeX Style for Thesis Documents -- +% +% ************************************************** +% +% Readme: +% ---------------------------------------- +% Please check out the README.md file in the root of this package. +% +% ************************************************** +\NeedsTeXFormat{LaTeX2e} +\ProvidesPackage{cleanthesis}[2020/06/17 v0.4.1 A clean LaTeX style for thesis documents] +% +% ************************************************** +% Package options +% ************************************************** +% +% -- process all available package options +% +% +% The xkeyval package enables us to handle for example key-value pairs +% in an easy way +\RequirePackage{xkeyval} + +% OPTION hangfigurecaption +% --> values = true|false +\define@boolkey[ct]{cthesis}{hangfigurecaption}[true]{} +\setkeys[ct]{cthesis}{hangfigurecaption=false} + +% OPTION hangsection +% --> values = true|false +\define@boolkey[ct]{cthesis}{hangsection}[true]{} +\setkeys[ct]{cthesis}{hangsection=true} + +% OPTION hangsubsection +% --> values = true|false +\define@boolkey[ct]{cthesis}{hangsubsection}[true]{} +\setkeys[ct]{cthesis}{hangsubsection=true} + +%增加第4层和第5层的标题 + +% OPTION hangsubsubsection +% --> values = true|false +\define@boolkey[ct]{cthesis}{hangsubsubsection}[true]{} +\setkeys[ct]{cthesis}{hangsubsubsection=true} + +% OPTION sansserif +% --> values = true|false +\define@boolkey[ct]{cthesis}{sansserif}[false]{} +\setkeys[ct]{cthesis}{sansserif=false} + +% OPTION configurelistings +% --> values = true|false +\define@boolkey[ct]{cthesis}{configurelistings}[false]{} +\setkeys[ct]{cthesis}{configurelistings=false} + +% OPTION configurebiblatex +% --> values = true|false +\define@boolkey[ct]{cthesis}{configurebiblatex}[false]{} +\setkeys[ct]{cthesis}{configurebiblatex=false} + +% OPTION figuresep +% --> values = none|colon|period|space|quad|endash +\define@choicekey*[ct]{cthesis}{figuresep}{none,colon,period,space,quad,newline,endash}[endash]{\def\cthesis@figuresep{#1}} +\setkeys[ct]{cthesis}{figuresep=endash} + +% OPTION colorize +% --> values = full|reduced|bw +\define@choicekey*[ct]{cthesis}{colorize}[\val\colorizenr]{full,reduced,bw}[full]{\def\cthesis@colorize{\colorizenr}} +\setkeys[ct]{cthesis}{colorize=full} + +% OPTION colortheme +% --> values = bluemagenta|bluegreen +\define@choicekey*[ct]{cthesis}{colortheme}[\val\themenr]{bluemagenta,bluegreen}[bluemagenta]{\def\cthesis@colortheme{\themenr}} +\setkeys[ct]{cthesis}{colortheme=bluemagenta} + +% OPTION bibsys +% --> values = biber|bibtex +\define@choicekey*[ct]{cthesis}{bibsys}[\val\bibsysnr]{biber,bibtex}[bibtex]{\def\cthesis@bibsys{#1}} +\setkeys[ct]{cthesis}{bibsys=bibtex} + +% OPTION bibfile +% --> values = file name of your bibtex file +\define@key[ct]{cthesis}{bibfile}[bib-refs]{\def\cthesis@bibfile{#1}} +\setkeys[ct]{cthesis}{bibfile=bib-refs} + +% OPTION bibstyle +% --> values = biblatex style options +\define@key[ct]{cthesis}{bibstyle}[alphabetic]{\def\cthesis@bibstyle{#1}} +\setkeys[ct]{cthesis}{bibstyle=alphabetic} + +% OPTION bibsorting +% --> values = biblatex sorting options +\define@key[ct]{cthesis}{bibsorting}[nty]{\def\cthesis@bibsorting{#1}} +\setkeys[ct]{cthesis}{bibsorting=nty} + +% OPTION quotesstyle +% --> values = csquotes style options +\define@key[ct]{cthesis}{quotesstyle}[english]{\def\cthesis@quotesstyle{#1}} +\setkeys[ct]{cthesis}{quotesstyle=english} + +\DeclareOptionX*{ + \PackageWarning{cleanthesis}{Unknown option ‘\CurrentOption’}% +} + +\ProcessOptionsX[ct]<cthesis> + +% Checks if bib file exists, if not we throw an error +\IfFileExists{\[email protected]}{}{\PackageError{cleanthesis}{Unable to find BibTeX file \[email protected]!}{Please provide the name of your BibTeX file to the cleanthesis package parameter bibfile.}} + +% ************************************************** +% Color Definitions +% ************************************************** +% +% -- defines color themes and color commands +% +% +% The xcolor package enables us to create/handle/name different colors +\RequirePackage[dvipsnames]{xcolor} + +% updates all colors regarding the defined main and accessory +% color, as well as the defined colorize mode (full, reduced, bw) +\long\def\ct@cthesis@updatecolors{% + % sets all colors (like colorize == full) + % -- footer colors + \colorlet{ctcolorfooterpage}{ctcolorblack} + \colorlet{ctcolorfooterline}{ctcolormain} + \colorlet{ctcolorfootermark}{ctcolorblack} + \colorlet{ctcolorfootertitle}{ctcolormain} + % -- sectioning colors + \colorlet{ctcolortitle}{ctcolormain} + \colorlet{ctcolorpartnum}{ctcolormain} + \colorlet{ctcolorpartline}{ctcolorblack} + \colorlet{ctcolorparttext}{ctcolorblack} + \colorlet{ctcolorchapternum}{ctcolormain} + \colorlet{ctcolorchapterline}{ctcolormain} + \colorlet{ctcolorsection}{ctcolormain} + \colorlet{ctcolorsubsection}{ctcolormain} + \colorlet{ctcolorparagraph}{ctcolorblack} + % --> text colors + \colorlet{ctcolorfloatlabel}{ctcoloraccessory} + \colorlet{ctcolorlistlabel}{ctcolormain} + + \ifcase\cthesis@colorize + % case = 0 (colorize == full) + % do nothing + \or + % case = 1 (colorize == reduced) + % --> footer colors + \colorlet{ctcolorfooterline}{ctcolorgray} + \colorlet{ctcolorfootertitle}{ctcolorgray} + % --> sectioning colors + \colorlet{ctcolorsubsection}{ctcolorblack} + \colorlet{ctcolorpartnum}{ctcolorblack} + % --> text colors + \colorlet{ctcolorlistlabel}{ctcolorblack} + \or + % case = 2 (colorize == bw) + % --> footer colors + \colorlet{ctcolorfooterline}{ctcolorgray} + \colorlet{ctcolorfootertitle}{ctcolorgray} + % --> sectioning colors + \colorlet{ctcolortitle}{ctcolorblack} + \colorlet{ctcolorpartnum}{ctcolorblack} + \colorlet{ctcolorchapternum}{ctcolorblack} + \colorlet{ctcolorchapterline}{ctcolorblack} + \colorlet{ctcolorsection}{ctcolorblack} + \colorlet{ctcolorsubsection}{ctcolorblack} + % --> text colors + \colorlet{ctcolorfloatlabel}{ctcolorblack} + \colorlet{ctcolorlistlabel}{ctcolorblack} + \else + \fi +} + +% sets the main and accessory color for the document +\def\cthesissetcolor#1#2#3{% + \definecolor{ctcolormain}{#1}{#2}% + \definecolor{ctcoloraccessory}{#1}{#3}% + \ct@cthesis@updatecolors% +} + +% sets the blue-magenta color theme (blue/magenta) +\def\cthesissetcolorbluemagenta{% + \cthesissetcolor{cmyk}{1, .50, .10, .01}{.18, .98, .18, 0}% +} + +% sets the blue-green color theme (blue/green) +\def\cthesissetcolorbluegreen{% + \cthesissetcolor{cmyk}{.61, .47, .03, 0}{.48, .05, .91, 0}% +} + +% defines general colors +\definecolor{ctcolorblack}{gray}{0} +\definecolor{ctcolorgray}{gray}{.5} +\definecolor{ctcolorgraylight}{gray}{.8} +\definecolor{ctcolorgraylighter}{gray}{.95} + +% sets the color theme regarding the given package option colortheme +\ifcase\cthesis@colortheme + % case 0 (colortheme == bluemagenta) + \cthesissetcolorbluemagenta +\or + % case 1 (colortheme == bluegreen) + \cthesissetcolorbluegreen +\else + % all other cases + \cthesissetcolorbluemagenta +\fi + + +% ************************************************** +% Font Definitions (see http://www.tug.dk/FontCatalogue/) +% ************************************************** +\RequirePackage[T1]{fontenc} % font types and character verification + +\ifct@cthesis@sansserif + % Using sans-serif fonts + % + %\RequirePackage{helvet} % Font: Helvetica + %\RequirePackage{nimbus} % Font: Nimbus Sans, a clone of the Helvetica + \RequirePackage{tgheros} % Font: TEX Gyre Heros + %\RequirePackage{libertine} % Font: Biolinum, the standard sans serif typeface with the Libertine package + %\RequirePackage[scaled]{berasans} % Font: Bera Sans, a a version of Bitstream Vera Sans slightly enhanced + \renewcommand*\familydefault{\sfdefault}% +\else + % Using serif fonts + % + \RequirePackage{lmodern} % font set: Latin Modern + \RequirePackage{charter} % font set: Charter + %\RequirePackage{fourier} % font set: (basically improved utopia) +\fi + +% ************************************************** +% Load Packages +% ************************************************** +\RequirePackage{microtype} % typographic tuning +\RequirePackage{setspace} % for line spacing, e.g. \onehalfspacing +\RequirePackage[]{graphicx} % graphics import features +\RequirePackage{tabularx} % table features +%\RequirePackage{fancyhdr} % for header and footer modifications +\RequirePackage{enumitem} % for simple list modifications +\RequirePackage{blindtext} % package for blind text +\RequirePackage{textcomp} % different symbols +\RequirePackage{hyperref} % interactive link inside the document +\RequirePackage{calc} +\RequirePackage[automark]{scrlayer-scrpage} + +% +\RequirePackage[ % modify figure and table captions + font={small}, % - small font size + labelfont={bf,sf,color=ctcolorfloatlabel},% - label in bold, sans-serif and magenta + labelsep=\cthesis@figuresep, % - separator: none, colon, period, space, quad, newline, endash + singlelinecheck=false % - no centered single-lined captions +]{caption}[2008/08/24] +%\ifthenelse{\boolean{@figurecaptionoutside}}% +\ifct@cthesis@hangfigurecaption +% {% + \DeclareCaptionFormat{llap}{\llap{#1#2}#3\par}% + \captionsetup{format=llap,labelsep=quad,singlelinecheck=false}% +% }{} +\fi +% +% +% ************************************************** +% Page construction +% ************************************************** +\KOMAoption{headinclude}{false} % include header in body? +\KOMAoption{footinclude}{false} % include footer in body? +\KOMAoption{footlines}{2.1} % number of foot lines +\KOMAoption{mpinclude}{false} % include marginpar in body? +\KOMAoption{BCOR}{25mm} % binding correction +\KOMAoption{DIV}{12} % number of page divs (divider) +% +% +\RequirePackage[ % advanced quotes + strict=true, % - warning are errors now + style=\cthesis@quotesstyle % - german quotes +]{csquotes} +% + +% ************************************************** +% Bibliography +% ************************************************** +\ifct@cthesis@configurebiblatex + \RequirePackage[ % use biblatex for bibliography + backend=\cthesis@bibsys, % - use biber backend (bibtex replacement) or bibtex + style=\cthesis@bibstyle, % - use alphabetic (or numeric) bib style + natbib=true, % - allow natbib commands + hyperref=true, % - activate hyperref support + backref=true, % - activate backrefs + isbn=false, % - don't show isbn tags + url=false, % - don't show url tags + doi=false, % - don't show doi tags + urldate=long, % - display type for dates + maxnames=3,% + minnames=1,% + maxbibnames=5,% + minbibnames=3,% + maxcitenames=2,% + mincitenames=1,%, + sorting=\cthesis@bibsorting% + ]{biblatex} + \bibliography{\cthesis@bibfile} + \DefineBibliographyStrings{ngerman}{% + andothers = {{et\,al\adddot}}, % 'et al.' instead of 'u.a.' + backrefpage = {{zitiert auf Seite}},% + backrefpages = {{zitiert auf den Seiten}},% + } +\fi + +% ************************************************** +% Text Format +% ************************************************** +\setstretch{1.2} % value for line spacing, use \setstretch{} or \singlespacing or \onehalfspacing or \doublespacing +%\setlength{\parindent}{0em} % value for paragraph indentation +\clubpenalty = 10000 % prevent single lines at the beginning of a paragraph (Schusterjungen) +\widowpenalty = 10000 % prevent single lines at the end of a paragraph (Hurenkinder) +\displaywidowpenalty = 10000 % + +% ************************************************** +% Listing Format +% ************************************************** +\ifct@cthesis@configurelistings + \RequirePackage{listings} % package for listings + \lstset{% + backgroundcolor=\color{ctcolorgraylighter}, + linewidth=\textwidth, + xleftmargin=10pt, + captionpos=b, + showspaces=false, + showstringspaces=false, + showtabs=false, + tabsize=2, + basicstyle=\footnotesize\ttfamily, + frame=leftline, + framerule=3pt, + framexleftmargin=4pt, + rulecolor=\color{ctcolorgraylight}, + numbers=left, + numberstyle=\footnotesize\sffamily\color{ctcolorgray}, + numbersep=15pt + } +\fi + +% ************************************************** +% List Definitions +% ************************************************** +\newenvironment{my_list}% + {\begin{enumerate}% + \setlength{\itemsep}{0pt}% + \setlength{\parskip}{0pt}% + \setlength{\parsep}{0pt}% + }% + {\end{enumerate}} +% +\newenvironment{my_list_num} + {\begin{enumerate}[topsep=-5pt,partopsep=0pt,parsep=2pt,itemsep=0pt]} + {\end{enumerate}}% + +\newenvironment{my_list_item} + {\begin{itemize}[topsep=-5pt,partopsep=0pt,parsep=2pt,itemsep=0pt]} + {\end{itemize}}% + +\newenvironment{ct_version_list} + {\begin{itemize}[topsep=-5pt,partopsep=0pt,parsep=2pt,itemsep=0pt]} + {\end{itemize}}% + + \newenvironment{ct_version_list_sub} + {\begin{itemize}[topsep=-0pt,partopsep=0pt,parsep=0pt,itemsep=0pt]} + {\end{itemize}}% + +\renewcommand{\descriptionlabel}[1]{% + \hspace*{\labelsep}% + \color{ctcolorlistlabel}% + %\color{red}% + \tgherosfont\textbf{#1}% +} +\newenvironment{my_list_desc} + {\begin{description}[% + style=multiline,% + topsep=-5pt,% + leftmargin=3cm,% + partopsep=0pt,% + parsep=2pt,% + itemsep=0pt% + ]} + {\end{description}}% + +% ************************************************** +% Header and Footer +% ************************************************** + +\automark[section]{chapter} % automatically marks sections as rightmark + % and chapters as leftmark +\setlength{\footheight}{120pt} % avoids scrlayer-scrpage warning: + % footheight to low warning +\setlength{\footskip}{185pt} % BAD HACK that moves the foot downwards +\KOMAoption{footwidth}{foot:53pt} % BAD HACK that moves the foot towards + % the outer border +\setkomafont{pagefoot}{\ctfontfootertext} % font for footer +\setkomafont{pagenumber}{\ctfontfooterpagenumber} % font for page numbers + +%% Redefinition of the chaptermark (used for footer mark on even (left) pages) +\renewcommand{\chaptermark}[1]{% + \markboth{% + \ctfontfootertext + % use \@chapapp instead of \chaptername to avoid + % 'Chapter A Appendix ...', thanks to @farbverlust (issue #47) + {\color{ctcolorfootermark}\textbf{\@chapapp\ \thechapter}}% + \hspace{.25cm}% + \protect\begin{minipage}[t]{.65\textwidth}% + #1% + \protect\end{minipage}% + }{}% +} + +%% Redefinition of the sectionmark (used for footer mark on odd (right) pages) +\renewcommand{\sectionmark}[1]{% + \markright{% + \ctfontfootertext + \protect\raggedleft% + {\color{ctcolorfootermark}\textbf{\thesection}}% + \hspace{.25cm}% + \protect\begin{minipage}[t]{\minof{\widthof{#1}}{.7\textwidth}}% + #1% + \protect\end{minipage}% + }% +} + +%% Vertical line in the footer (between page number and mark) +\newcommand{\ctfooterline}{% + \color{ctcolorfooterline}\rule[-90pt]{1.25pt}{100pt}% +} + +%% Page number for odd (right) pages +\newcommand{\ctfooterrightpagenumber}{% + \ctfooterline% + \hspace*{10pt}% + \begin{minipage}[b]{1.5cm}% + \pagemark\ % + \end{minipage}% +} + +%% Page number for even (left) pages +\newcommand{\ctfooterleftpagenumber}{% + \begin{minipage}[b]{1.5cm}% + \raggedleft\pagemark% + \end{minipage}% + \hspace*{10pt}% + \ctfooterline% +} + +%% Defines the content for header and footer +\lehead{} +\cehead{} +\rehead{} +\lohead{} +\cohead{} +\rohead{} +\lefoot[% > plain + \ctfooterleftpagenumber% +]{% > srcheadings + \ctfooterleftpagenumber% + \hspace*{0.75cm}% + \headmark% +} +\cefoot{} +\refoot{} +\lofoot{} +\cofoot{} +\rofoot[% > plain + \ctfooterrightpagenumber% +]{% > srcheadings + \headmark% + \hspace*{0.75cm}% + \ctfooterrightpagenumber% +} + + +% ************************************************** +% New Commands +% ************************************************** +% TODO command +\definecolor{color_todo}{rgb}{.6,.8,.2} +\newcommand{\TODO}[1]{{\color{color_todo}\textbf{[TODO #1]}}} +% +% +% ref commands, e.g. for images, tables and text labels +% -------------------------------------------------- +% RESULT = (siehe Tab. 12.4) +\newcommand{\tabref}[1]{(siehe Tab.~\ref{#1})} +% +% RESULT = (siehe Tab. 12.4) +\newcommand{\tableref}[1]{(siehe Tab.~\ref{#1} Seite~\pageref{#1})} +% +% -------------------------------------------------- +% RESULT = (siehe 3.4) +\newcommand{\tref}[1]{(siehe \ref{#1})} +% +% RESULT = Abschnitt 3.4 +\newcommand{\treft}[1]{Abschnitt~\ref{#1}} +% +% RESULT = (siehe 3.4, Seite 12) +\newcommand{\textref}[1]{(siehe \ref{#1}, Seite~\pageref{#1})} +% +% RESULT = Abschnitt 3.4 (siehe Seite 12) +\newcommand{\textreft}[1]{Abschnitt~\ref{#1} (siehe Seite~\pageref{#1})} +% +% -------------------------------------------------- +% RESULT = (siehe Abb. 10.4) +\newcommand{\fref}[1]{(siehe Abb.~\ref{#1})} +% +% RESULT = (siehe Abb. 10.4 b) +\newcommand{\frefadd}[2]{(siehe Abb.~\ref{#1}~#2)} +% +% RESULT = (siehe Abb. 10.4, Seite 12) +\newcommand{\figref}[1]{(siehe Abb.~\ref{#1}, Seite~\pageref{#1})} +% +% RESULT = (siehe Abb. 10.4 b, Seite 12) +\newcommand{\figrefadd}[2]{(siehe Abb.~\ref{#1}~#2, Seite~\pageref{#1})} +% +% RESULT = Abbildung 10.4 +\newcommand{\figreft}[1]{Abbildung~\ref{#1}} +% +% RESULT = Abbildung 10.4 b +\newcommand{\figrefaddt}[2]{Abbildung~\ref{#1}~#2} +% +% -------------------------------------------------- +% RESULT = (siehe Seite 12) +\newcommand{\seepage}[1]{(siehe Seite~\pageref{#1})} + + +% ************************************************** +% Sectioning Commands +% ************************************************** +% +\newcommand*{\ctSetFont}[3]{% + arg1=#1, arg2=#2, arg3=#3% +} + +% own font definitions +\newcommand{\helv}{\fontfamily{phv}\fontsize{9}{11}\selectfont} +\newcommand{\book}{\fontfamily{pbk}\fontseries{m}\fontsize{11}{13}\selectfont} +\newcommand{\tgherosfont}{\fontfamily{qhv}\selectfont} + +\newcommand{\thesispartlabelfont}{\color{ctcolorpartnum}\nobreak\book\fontsize{60}{60}\selectfont} +\newcommand{\thesispartfont}{\color{ctcolorparttext}\nobreak\normalfont\huge \tgherosfont\selectfont} +\newcommand{\thesischapterfont}{\color{ctcolorblack}\nobreak\normalfont\huge \fontfamily{phv}\selectfont} +%\newcommand{\thesissectionfont}{\color{ctcolormain}\nobreak\LARGE\bfseries \tgherosfont} +\newcommand{\thesissectionfont}{\color{ctcolorsection}\nobreak\normalfont\LARGE \tgherosfont} +\newcommand{\thesissubsectionfont}{\color{ctcolorsubsection}\nobreak\normalfont\Large \tgherosfont} +\newcommand{\thesisparagraphfont}{\color{ctcolorparagraph}\nobreak\tgherosfont\small\bfseries} + +\newcommand{\ctfontfooterpagenumber}{% + \color{ctcolorfooterpage}% + \normalfont\normalsize\bfseries \tgherosfont% +} +\newcommand{\ctfontfootertext}{% + \color{ctcolorfootertitle}% + \normalfont\footnotesize \tgherosfont% +} +% +% headings +\setkomafont{part}{\thesispartfont} % for chapter entries +\setkomafont{chapter}{\thesischapterfont} % for chapter entries +\setkomafont{section}{\thesissectionfont} % for section entries +\setkomafont{subsection}{\thesissubsectionfont} % for section entries +\addtokomafont{subsubsection}{\tgherosfont} +%\addtokomafont{paragraph}{\tgherosfont} +\setkomafont{paragraph}{\large\thesisparagraphfont} + +%\setkomafont{subsection}{\large} % for subsection entries + + + +% +% ************************************************** +% Sectioning +% ************************************************** +% +% -- modifications regarding sectioning (structural) commands, +% i.e. \part, \chapter, \section, \subsection, \subsubsection, \paragraph +% +% --------------------------- +% > formats: \part +% --------------------------- +\renewcommand*{\partpagestyle}{empty} +\renewcommand*{\raggedpart}{\raggedleft} +\renewcommand*\partheadmidvskip{\par\vspace*{3em}} +\renewcommand*{\partformat}{% + \usekomafont{part}% + \thesispartlabelfont% + \partname\ \thepart\quad% + {\color{ctcolorpartline}\hspace*{-200pt}\rule[0pt]{600pt}{2pt}}% +} +% +% --------------------------- +% > formats: \chapter +% --------------------------- +\renewcommand*\chapterheadstartvskip{\vspace*{-8.75em}} +\renewcommand*\chapterheadendvskip{\vspace*{2.5\baselineskip}} +\renewcommand*{\chapterformat}{% + \ctchapternumber{\thechapter}% +} +\renewcommand{\chapterlinesformat}[3]{% + \ctchaptertitle{#3}% + #2% +} +%\renewcommand{\chapterlineswithprefixformat}[3]{% +% \ctchaptertitle{\@chapapp\ \thechapter: #3}% +% #2% +%} +\newcommand{\ctchapternumber}[1]{% + \usekomafont{chapter}% + \begin{minipage}[t]{0.3\textwidth}% + \raggedleft{% + {\color{ctcolorchapterline}\rule[-5pt]{2pt}{5cm}}% + \quad% + {\color{ctcolorchapternum}\fontsize{60}{60}\selectfont#1}% + }% + \end{minipage}% +} +\newcommand{\ctchaptertitle}[1]{% + \usekomafont{chapter}% + \begin{minipage}[t]{0.7\textwidth}% + \vspace*{5.85em}% + \raggedright% + #1% + \end{minipage}% +} +% +% --------------------------- +% > formats: \section +% --------------------------- +\ifct@cthesis@hangsection + \renewcommand*{\sectionformat}{% + \usekomafont{section}% + \makebox[0pt][r]{\color{ctcolorblack}\thesection\hspace*10pt}}% + } +\else + \renewcommand*{\sectionformat}{% + \usekomafont{section}% + {\color{ctcolorblack}\thesection\hspace*{10pt}}% + } +\fi +% +% --------------------------- +% > formats: \subsection +% --------------------------- +\ifct@cthesis@hangsubsection + \renewcommand*{\subsectionformat}{% + \usekomafont{subsection}% + \makebox[0pt][r]{\color{ctcolorblack}\thesubsection\hspace*{10pt}}% + } +\else + \renewcommand*{\subsectionformat}{% + \usekomafont{subsection}% + {\color{ctcolorblack}\thesubsection\hspace*{10pt}}% + } +\fi +%新增目录层级第4层 格式定义 +% +% --------------------------- +% > formats: \subsubsection +% --------------------------- +\ifct@cthesis@hangsubsubsection + \renewcommand*{\subsubsectionformat}{% + \usekomafont{subsubsection}% + \makebox[0pt][r]{\color{ctcolorblack}\thesubsubsection\hspace*{7pt}}% + } +\else + \renewcommand*{\subsubsectionformat}{% + \usekomafont{subsubsection}% + {\color{ctcolorblack}\thesubsubsection\hspace*{7pt}}% + } +\fi +%新增目录层级第5层 格式定义 +% +% --------------------------- +% > formats: \subsubsubsection +% --------------------------- +\ifct@cthesis@hangsubsubsubsection + \renewcommand*{\subsubsubsectionformat}{% + \usekomafont{subsubsubsection}% + \makebox[0pt][r]{\color{ctcolorblack}\thesubsubsubsection\hspace*{4pt}}% + } +\else + \renewcommand*{\subsubsubsectionformat}{% + \usekomafont{subsubsubsection}% + {\color{ctcolorblack}\thesubsubsubsection\hspace*{4pt}}% + } +\fi + + +% +% +% ************************************************** +% ToC, LoF, LoT, LoL +% ************************************************** +% +% -- modifications regarding the table of contents, +% the list of figures, list of tables, +% and list of listings +% +% > removes indention for lists of floating environments (e.g., lof and lot) +\KOMAoption{listof}{flat} +% +% +% ************************************************** +% Mishmash +% ************************************************** +% +% Clean chapter quotations +\newcommand{\hugequote}{% + {\book\fontsize{75}{80}\selectfont% + \hspace*{-.475em}\color{ctcolorgraylight}% + \textit{\glqq}% + \vskip -.26em}% +} +\newcommand{\cleanchapterquote}[3]{% + \begin{minipage}{.865\textwidth}% + \begin{flushright} + \begin{minipage}{.65\textwidth}% + \begin{flushleft} + {\hugequote}\textit{#1} + \end{flushleft} + \begin{flushright} + --- \textbf{#2} \\ + #3 + \end{flushright} + \end{minipage}% + \end{flushright} + \end{minipage}% + \bigskip +} +% +% Clean Quotation environment +\newenvironment{thesis_quotation}% + {% + \begin{minipage}{.865\textwidth}% + \begin{flushright} + \begin{minipage}{.95\textwidth}% + }% + {% + \end{minipage}% + \end{flushright} + \end{minipage}% + }% +% +% Clean signs around word origins in definitions +%\newcommand{\cthesisorigin}[1]{\textsf{\textlangle}#1\textsf{\textrangle}} + + + diff --git a/doc/cleanthesis-doc.pdf b/doc/cleanthesis-doc.pdf Binary files differnew file mode 100644 index 0000000..d75851a --- /dev/null +++ b/doc/cleanthesis-doc.pdf diff --git a/doc/cleanthesis-doc.tex b/doc/cleanthesis-doc.tex new file mode 100644 index 0000000..bd750a7 --- /dev/null +++ b/doc/cleanthesis-doc.tex @@ -0,0 +1,259 @@ +%% cleanthesis-doc.tex +%% Copyright 2020 R. Langner +% +% This work may be distributed and/or modified under the +% conditions of the LaTeX Project Public License, either version 1.3 +% of this license or (at your option) any later version. +% The latest version of this license is in +% http://www.latex-project.org/lppl.txt +% and version 1.3 or later is part of all distributions of LaTeX +% version 2005/12/01 or later. +% +% This work has the LPPL maintenance status `maintained'. +% +% The Current Maintainer of this work is R. Langner. +% +% This work consists of all files listed in MANIFEST.md. +% +\documentclass{ltxdockit} +\usepackage{btxdockit} +\usepackage[utf8]{inputenc} +\usepackage[american]{babel} +\usepackage[strict]{csquotes} +\usepackage{tabularx} +\usepackage{longtable} +\usepackage{booktabs} +\usepackage{shortvrb} +\usepackage{pifont} +\usepackage{graphicx} + +\newcommand*{\cleanthesis}{\emph{Clean Thesis}\xspace} +\newcommand*{\cthesishome}{http://cleanthesis.der-ric.de/} +%\newcommand*{\cthesisctan}{http://www.ctan.org/tex-archive/macros/latex/contrib/../} + +\titlepage{% + title={The \sty{cleanthesis} Package}, + subtitle={A Clean LaTeX Style for Thesis Documents}, + url={\cthesishome}, + author={Ricardo Langner}, + email={[email protected]}, + revision={0.4.1}, + date={2020/06/17}} + +\hypersetup{% + pdftitle={The \cleanthesis Package}, + pdfsubject={A Clean LaTeX Style for Thesis Documents}, + pdfauthor={Ricardo Langner}, + pdfkeywords={tex, latex, thesis, style}} + + +%\setcounter{secnumdepth}{4} +% > adjust depth of the toc and removes the indention +\setcounter{tocdepth}{3} +\AtBeginToc{\setcounter{tocdepth}{3}} +\AtEndToc{\setcounter{tocdepth}{5}} +\KOMAoption{toc}{flat} + +\begin{document} + +\printtitlepage +\tableofcontents +%\listoftables + +\section{Introduction} +\label{sec:intro} + +\subsection[About]{About \sty{cleanthesis}} +\label{sec:intro:about} + +\subsection{Donation} +\label{sec:intro:donation} + +If you like the \cleanthesis style, or you have used it for one of your own documents successfully there are (at least) three different but pretty easy ways of saying thank you. + +\paragraph{Report on issues and missing features} If you have ideas for new features, suggestions for improvements or you encounter problems and errors using the \cleanthesis style please report them using the issue tracker\footnote{\url{https://github.com/derric/cleanthesis/issues}} at the GitHub Project\footnote{\url{https://github.com/derric/cleanthesis}} or send an email to \texttt{issue[at]cleanthesis.der-ric.de}. + +\paragraph{Be Social} I would very much appreciate a donation in the form of a blog post, tweet, or facebook post. Share your experience and your opinion. Talk to your friends, fellow students, or colleagues about the \cleanthesis style. + +\paragraph{Send me a postcard} Based on the idea of André Miede: I would be very pleased about a donation in the form of a POSTCARD. You can find my address below this paragraph. I am going to collect all postcards and exhibit them on the website \url{\cthesishome}. My address is + + +\begin{itemize} +\item \textbf{Ricardo Langner} \\ +Alfred-Schrapel-Str. 7 \\ +01307 Dresden, Germany +\end{itemize} + +\subsection{License} +\label{sec:intro:license} + +Copyright \textcopyright\ 2020 R. Langner + +This work may be distributed and/or modified under the +conditions of the LaTeX Project Public License, either version 1.3 +of this license or (at your option) any later version. +The latest version of this license is in + \url{http://www.latex-project.org/lppl.txt} +and version 1.3 or later is part of all distributions of LaTeX +version 2005/12/01 or later. + +This work has the LPPL maintenance status `maintained'. + +The Current Maintainer of this work is R. Langner. + +This work consists of all files listed in MANIFEST.md. + +\subsection{Feedback} +\label{sec:intro:feedback} + +\subsection{Acknowledgments} +\label{sec:intro:ack} + +First of all I would like to thank André Miede. He is the author of the Classic Thesis style. His Classic Thesis style inspired end encouraged me to publish my own thesis style. Thank you André for doing a great job. + +I would like to thank the following people for using the \cleanthesis style and providing me important initial feedback (e.g., features, bugs): (1) \textbf{Sebastian Kleinau} in his bachelor thesis, (2) \textbf{Mathias Frisch} in his dissertation (PhD), and (3) \textbf{Anton Augsburg} in his project thesis. + +\subsection{Prerequisites} +\label{sec:intro:pre} + +The following section gives an overview of all resources required by this package. + +\subsubsection{Requirements} +\label{sec:intro:req} + +\section{User Guide} +\label{sec:userguide} + +\subsection{Package Options} +\label{sec:userguide:pkgopt} + +All package options are given in \keyval notation. +The value \texttt{true} can be omitted for all boolean keys, \eg \opt{hangsection} without a value is equivalent to \kvopt{hangsection}{true}. + +All of the following options must be used as \sty{cthesis} is loaded, \ie in the optional argument to \cmd{usepackage}. + +\begin{optionlist} + +\boolitem[false]{hangfigurecaption} + +Sets whether to use a hanging figure label (similar to headlines, placed in page margin) or not. + +\boolitem[true]{hangsection} + +Sets whether to use a hanging section label (placed in page margin) or not. + +\boolitem[true]{hangsubsection} + +Sets whether to use a hanging sub-section label (placed in page margin) or not. + +\boolitem[false]{sansserif} + +Sets whether to use a sans serif font or not. + +\boolitem[false]{configurelistings} + +Sets whether to use the package listings and to configure the visual appearance of lstlisting environments. + +\optitem[endash]{figuresep}{\opt{none},\opt{colon},\opt{period},\opt{space},\opt{quad},\opt{endash}} + +This option can be used to define a different label separator for cations of figures. The following value are allowed: + +\begin{valuelist} +\item[none] Inserts no character in between. +\item[colon] Inserts a colon (\textbf{:}) in between. +\item[period] Inserts a period (\textbf{.}) in between. +\item[space] Inserts a single space character in between. +\item[quad] Inserts a \cmd{\\quad} in between. +\item[endash] Inserts an en dash (\textbf{--}) in between. +\end{valuelist} + +\optitem[full]{colorize}{\opt{full},\opt{reduced},\opt{bw}} + +This option can be used to define a color mode, i.e., what elements or parts of the document should be colored. +This allows you to reduce costs, if you need to print the document. +The following values are allowed: + +\begin{valuelist} +\item[full] In this mode, almost every page uses some color, because the thin line besides the page number (footer) is colored. + The following elements are colored as well: title of the document (title page), number of the chapter on the chapter page, name of the chapter in the footer, section and sub-section headlines, and figure labels. +\item[reduced] This mode reduces the use of colors to reasonable level. + Footers are totally free of colors. + Only the title page, chapter pages, section headlines, and figure labels are colored. +\item[bw] This mode completely eliminates all colors of the document style---every element is black or gray. + If you do not use colored images either, the document is completely achromatic. +\end{valuelist} + +\optitem[bluemagenta]{colortheme}{\opt{bluemagenta},\opt{bluegreen}} + +This option can be used, to switch between different color presets. +These presets are used to colorize, e.g., headlines, footnotes, or chapter numbers. +This option has a reduced or no effect depending on the package option \texttt{colorize} (see above). +The following values are allowed: + +\begin{valuelist} +\item[bluemagenta] Headlines and titles use a blue color, figure labels use magenta. +\item[bluegreen] Headlines and titles use a blue color, figure labels use green. +\end{valuelist} + +\optitem[english]{quotesstyle}{csquotes style options} + +Sets the quote style. +This is a direct interface to the corresponding style option of the csquotes package. +For further information please check out the csquotes documentation \url{https://www.ctan.org/pkg/csquotes}. +The default is \texttt{english}. +For individual settings, for instance German quotes, you can use \texttt{quotesstyle=german}. + + +\subsubsection{Setup Your Bibliography} + +\boolitem[false]{configurebiblatex} + +Sets whether to use and configure the package biblatex within the template. + +If this option is set to false, you can setup your bibliography environment by yourself depending on your individual needs or requirements. In this case, you have to include something like \cs{usepackage\{biblatex\}} and \cs{bibliography\{bib-refs\}} in your preamble (i.e., before the \cs{begin\{document\}} statement). + +\optitem[bibtex]{bibsys}{\opt{biber},\opt{bibtex}} + +Sets whether to use \texttt{biber} or \texttt{bibtex} as citation management tool (engine). +The default (still) is \texttt{bibtex}. + +"\texttt{Biber} [is] a BibTeX replacement for users of BibLaTeX", see \url{http://biblatex-biber.sourceforge.net/}. + +\optitem[bib-refs]{bibfile}{file name of your bibtex file} + +Sets the file name of the bibtex file used for the bibliography. +If this option is not used (defined), the package looks for the default bibliography \texttt{bib-refs.bib}. + +\optitem[alphabetic]{bibstyle}{biblatex style options} + +Sets the bibliography style. +This is a direct interface to the corresponding style option of the biblatex package. +For further information please check out the biblatex documentation \url{http://www.ctan.org/pkg/biblatex}. +The default is \texttt{alphabetic}. +Two popular options are: + +\begin{valuelist} +\item[alphabetic] (default) Prints labels similar to the traditional BibTeX style \texttt{alpha.bst}, for instance \texttt{[Lan+15]} or \texttt{[LHD17]} +\item[numeric] Uses numeric labels, such as \texttt{[1]} or \texttt{[37]} +\end{valuelist} + +However, you can also pass non-standard options to make use of other bibliography packages for biblatex. +For example, by setting the option \texttt{style=ieee} or \texttt{style=ieee-alphabetic} you can use the biblatex-ieee package (see \url{https://ctan.org/pkg/biblatex-ieee}). + +\optitem[nty]{bibsorting}{biblatex sorting options} + +Sets the sorting order of the bibliography. +This is a direct interface to the corresponding option of the biblatex package. +For further information please check out the biblatex documentation \url{http://www.ctan.org/pkg/biblatex}. +The default is \texttt{nty}. +Some popular options include: + +\begin{valuelist} +\item[nty] (default) Sort by name, title, year +\item[nyt] Sort by name, year, title +\item[none] No sorting at all, entries are processed in the order of their citation +\end{valuelist} + +\end{optionlist} + +\end{document} diff --git a/doc/wrapfooter.jpg b/doc/wrapfooter.jpg Binary files differnew file mode 100644 index 0000000..401ede3 --- /dev/null +++ b/doc/wrapfooter.jpg diff --git a/example-thesis/bib-refs.bib b/example-thesis/bib-refs.bib new file mode 100644 index 0000000..11f5dfd --- /dev/null +++ b/example-thesis/bib-refs.bib @@ -0,0 +1,53 @@ +@online{WEB:GNU:GPL:2010, + Author = {{Free Software Foundation, Inc.}}, + Title = {GNU General Public License}, + Url = {http://www.gnu.org/licenses/gpl.html}, + Urldate = {2011-05-27}, + Year = {2010}} + +@online{WEB:Miede:2011, + Author = {Andr{\'e} Miede}, + Title = {A Classic Thesis Style by Andr{\'e} Miede}, + Url = {http://www.miede.de/index.php?page=classicthesis}, + Urldate = {2011-05-27}, + Year = {2011}} + +@book{Jurgens:2000, + Author = {Manuela J{\"u}rgens}, + Publisher = {FernUniversit{\"a}t Gesamthochschule in Hagen}, + Title = {LaTeX: eine Einf{\"u}hrung und ein bisschen mehr}, + Year = {2000}} + +@book{Jurgens:1995, + Author = {Manuela J{\"u}rgens}, + Publisher = {FernUniversit{\"a}t Gesamthochschule in Hagen}, + Title = {LaTeX: Fortgeschrittene Anwendungen}, + Year = {1995}} + +@manual{Miede:2011, + Author = {Andr{\'e} Miede}, + Title = {A Classic Thesis Style: An Homage to The Elements of Typographic Style}, + Year = {2011}} + +@book{Kohm:2011, + Author = {Markus Kohm and Jens-Uwe-Morawski}, + Title = {KOMA-Script: Die Anleitung}, + Year = {2011}} + +@book{Apple:keynote:2010, + Author = {{Apple Inc.}}, + Publisher = {{Apple Inc.}}, + Title = {Keynote '09 User Guide}, + Year = {2010}} + +@book{Apple:numbers:2010, + Author = {{Apple Inc.}}, + Publisher = {{Apple Inc.}}, + Title = {Numbers '09 User Guide}, + Year = {2010}} + +@book{Apple:pages:2010, + Author = {{Apple Inc.}}, + Publisher = {{Apple Inc.}}, + Title = {Pages '09 User Guide}, + Year = {2010}} diff --git a/example-thesis/content/abstract.tex b/example-thesis/content/abstract.tex new file mode 100644 index 0000000..a011582 --- /dev/null +++ b/example-thesis/content/abstract.tex @@ -0,0 +1,14 @@ +% !TEX root = ../my-thesis.tex +% +\pdfbookmark[0]{Abstract}{Abstract} +\addchap*{Abstract} +\label{sec:abstract} + +\blindtext + +\vspace*{20mm} + +{\usekomafont{chapter}Abstract (different language)} +\label{sec:abstract-diff} + +\blindtext diff --git a/example-thesis/content/acknowledgement.tex b/example-thesis/content/acknowledgement.tex new file mode 100644 index 0000000..09f2999 --- /dev/null +++ b/example-thesis/content/acknowledgement.tex @@ -0,0 +1,7 @@ +% !TEX root = ../my-thesis.tex +% +\pdfbookmark[0]{Acknowledgement}{Acknowledgement} +\addchap*{Acknowledgement} +\label{sec:acknowledgement} + +\Blindtext[2][2] diff --git a/example-thesis/content/chapter-appendix.tex b/example-thesis/content/chapter-appendix.tex new file mode 100644 index 0000000..e482c18 --- /dev/null +++ b/example-thesis/content/chapter-appendix.tex @@ -0,0 +1,40 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{Example Appendix} +\label{sec:appendix} + +\Blindtext[1][1] + +\section{Appendix Section 1} +\label{sec:appendix:sec1} + +\Blindtext[1][1] + +\begin{table}[h] + \begin{tabularx}{\textwidth}{X | X | X} + %\hline + Alpha & Beta & Gamma \\ \hline + 0 & 1 & 2 \\ \hline + 3 & 4 & 5 \\ %\hline + \end{tabularx} + \label{tab:table1} + \caption{This is a caption text.} +\end{table} + +\section{Appendix Section 2} +\label{sec:appendix:sec2} + +\Blindtext[1][1] + +\begin{table}[h] + \begin{tabularx}{\textwidth}{X | X | X} + %\hline + Alpha & Beta & Gamma \\ \hline + 0 & 1 & 2 \\ \hline + 3 & 4 & 5 \\ %\hline + \end{tabularx} + \label{tab:table2} + \caption{This is a caption text.} +\end{table} + +\Blindtext[1][2] diff --git a/example-thesis/content/chapter-concepts.tex b/example-thesis/content/chapter-concepts.tex new file mode 100644 index 0000000..3255bf3 --- /dev/null +++ b/example-thesis/content/chapter-concepts.tex @@ -0,0 +1,28 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{Concepts: This text is here to test a very long title, to simulate the line break behavior, to show that an extremely long title also works} +\label{sec:concepts} + +\cleanchapterquote{Users do not care about what is inside the box, as long as the box does what they need done.}{Jef Raskin}{about Human Computer Interfaces} + +\Blindtext[2][1] + +\section{Concepts Section 1} +\label{sec:concepts:sec1} + +\Blindtext[2][2] + +\section{Concepts Section 2 with a very very long title that illustrates how long section titles are handled in the footer} +\label{sec:concepts:sec2} + +\Blindtext[3][2] + +\section{Concepts Section 3} +\label{sec:concepts:sec3} + +\Blindtext[4][2] + +\section{Conclusion} +\label{sec:concepts:conclusion} + +\Blindtext[2][1] diff --git a/example-thesis/content/chapter-conclusion.tex b/example-thesis/content/chapter-conclusion.tex new file mode 100644 index 0000000..a4b46b9 --- /dev/null +++ b/example-thesis/content/chapter-conclusion.tex @@ -0,0 +1,21 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{Conclusion} +\label{sec:conclusion} + +\Blindtext[2][1] + +\section{System Section 1} +\label{sec:conclusion:sec1} + +\Blindtext[2][2] + +\section{System Section 2} +\label{sec:conclusion:sec2} + +\Blindtext[3][2] + +\section{Future Work} +\label{sec:conclusion:future} + +\Blindtext[2][2] diff --git a/example-thesis/content/chapter-introduction.tex b/example-thesis/content/chapter-introduction.tex new file mode 100644 index 0000000..a10e2c4 --- /dev/null +++ b/example-thesis/content/chapter-introduction.tex @@ -0,0 +1,82 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{Introduction} +\label{sec:intro} + +\cleanchapterquote{You can’t do better design with a computer, but you can speed up your work enormously.}{Wim Crouwel}{(Graphic designer and typographer)} + +\Blindtext[2][2] + +\section{Postcards: My Address} +\label{sec:intro:address} + +\textbf{Ricardo Langner} \\ +Alfred-Schrapel-Str. 7 \\ +01307 Dresden \\ +Germany + + +\section{Motivation and Problem Statement} +\label{sec:intro:motivation} + +\Blindtext[3][1] \cite{Jurgens:2000,Jurgens:1995,Miede:2011,Kohm:2011,Apple:keynote:2010,Apple:numbers:2010,Apple:pages:2010} + +\section{Results} +\label{sec:intro:results} + +\Blindtext[1][2] + +\subsection{Some References} +\label{sec:intro:results:refs} + +\cite{WEB:GNU:GPL:2010,WEB:Miede:2011} +\Blindtext[1][1] + +\subsubsection{Methodology} +\label{sec:intro:results:refs:method} + +\Blindtext[1][2] + +\paragraph{Strategy 1} +\Blindtext[1][1] + +\begin{lstlisting}[language=Python, caption={This simple helloworld.py file prints Hello World.}\label{lst:pyhelloworld}] +#!/usr/bin/env python +print "Hello World" +\end{lstlisting} + +\paragraph{Strategy 2} +\Blindtext[1][1] + +\begin{lstlisting}[language=Python, caption={This is a bubble sort function.}\label{lst:pybubblesort}] +#!/usr/bin/env python +def bubble_sort(list): + for num in range(len(list)-1,0,-1): + for i in range(num): + if list[i]>list[i+1]: + tmp = list[i] + list[i] = list[i+1] + list[i+1] = tmp + +alist = [34,67,2,4,65,16,17,95,20,31] +bubble_sort(list) +print(list) +\end{lstlisting} + +\section{Thesis Structure} +\label{sec:intro:structure} + +\textbf{Chapter \ref{sec:related}} \\[0.2em] +\blindtext + +\textbf{Chapter \ref{sec:system}} \\[0.2em] +\blindtext + +\textbf{Chapter \ref{sec:concepts}} \\[0.2em] +\blindtext + +\textbf{Chapter \ref{sec:concepts}} \\[0.2em] +\blindtext + +\textbf{Chapter \ref{sec:conclusion}} \\[0.2em] +\blindtext diff --git a/example-thesis/content/chapter-related-work.tex b/example-thesis/content/chapter-related-work.tex new file mode 100644 index 0000000..5fe1cbf --- /dev/null +++ b/example-thesis/content/chapter-related-work.tex @@ -0,0 +1,39 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{Related Work} +\label{sec:related} + +\cleanchapterquote{A picture is worth a thousand words. An interface is worth a thousand pictures.}{Ben Shneiderman}{(Professor for Computer Science)} + +\Blindtext[2][1] + +\begin{lstlisting}[language=Java, caption={A simple Hellow World example in Java.}\label{lst:javahelloworld}] +public class HelloWorld { + public static void main ( String[] args ) { + // Output Hello World! + System.out.println( "Hello World!" ); + } +} +\end{lstlisting} + +\Blindtext[1][1] + +\section{Related Work Section 1} +\label{sec:related:sec1} + +\Blindtext[2][2] + +\section{Related Work Section 2} +\label{sec:related:sec2} + +\Blindtext[3][2] + +\section{Related Work Section 3} +\label{sec:related:sec3} + +\Blindtext[4][2] + +\section{Conclusion} +\label{sec:related:conclusion} + +\Blindtext[2][1] diff --git a/example-thesis/content/chapter-system.tex b/example-thesis/content/chapter-system.tex new file mode 100644 index 0000000..641d8a9 --- /dev/null +++ b/example-thesis/content/chapter-system.tex @@ -0,0 +1,44 @@ +% !TEX root = ../my-thesis.tex +% +\chapter{System} +\label{sec:system} + +\cleanchapterquote{Innovation distinguishes between a leader and a follower.}{Steve Jobs}{(CEO Apple Inc.)} + +\Blindtext[2][1] + +\section{System Section 1} +\label{sec:system:sec1} + +\Blindtext[1][2] + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/Clean-Thesis-Figure} + \caption{Figure example: \textit{(a)} example part one, \textit{(c)} example part two; \textit{(c)} example part three} + \label{fig:system:example1} +\end{figure} + +\Blindtext[1][2] + +\section{System Section 2} +\label{sec:system:sec2} + +\Blindtext[1][2] + +\begin{figure}[htb] + \includegraphics[width=\textwidth]{gfx/Clean-Thesis-Figure} + \caption{Another Figure example: \textit{(a)} example part one, \textit{(c)} example part two; \textit{(c)} example part three} + \label{fig:system:example2} +\end{figure} + +\Blindtext[2][2] + +\section{System Section 3} +\label{sec:system:sec3} + +\Blindtext[4][2] + +\section{Conclusion} +\label{sec:system:conclusion} + +\Blindtext[2][1] diff --git a/example-thesis/content/colophon.tex b/example-thesis/content/colophon.tex new file mode 100644 index 0000000..94fe067 --- /dev/null +++ b/example-thesis/content/colophon.tex @@ -0,0 +1,13 @@ +% !TEX root = ../my-thesis.tex +% +\pagestyle{empty} +\hfill +\vfill +\pdfbookmark[0]{Colophon}{Colophon} +\section*{Colophon} + +This thesis was typeset with \LaTeXe. +It uses the \textit{Clean Thesis} style developed by Ricardo Langner. +The design of the \textit{Clean Thesis} style is inspired by user guide documents from Apple Inc. + +Download the \textit{Clean Thesis} style at \url{http://cleanthesis.der-ric.de/}. diff --git a/example-thesis/content/declaration.tex b/example-thesis/content/declaration.tex new file mode 100644 index 0000000..08905f4 --- /dev/null +++ b/example-thesis/content/declaration.tex @@ -0,0 +1,27 @@ +% !TEX root = ../my-thesis.tex +% +%************************************************ +% Declaration +%************************************************ +\pdfbookmark[0]{Declaration}{Declaration} +\addchap{Declaration} +\label{sec:declaration} +\thispagestyle{empty} + +You can put your declaration here, to declare that you have completed your work solely and only with the help of the references you mentioned. + +\bigskip + +\noindent\textit{\thesisUniversityCity, \thesisDate} + +\smallskip + +\begin{flushright} + \begin{minipage}{5cm} + \rule{\textwidth}{1pt} + \centering\thesisName + \end{minipage} +\end{flushright} + +%***************************************** +%***************************************** diff --git a/example-thesis/content/titlepages.tex b/example-thesis/content/titlepages.tex new file mode 100644 index 0000000..3fe0835 --- /dev/null +++ b/example-thesis/content/titlepages.tex @@ -0,0 +1,86 @@ +% !TEX root = ../my-thesis.tex +% +% ------------------------------------ --> cover title page +\begin{titlepage} + \pdfbookmark[0]{Cover}{Cover} + \flushright + \hfill + \vfill + {\LARGE\thesisTitle \par} + \rule[5pt]{\textwidth}{.4pt} \par + {\Large\thesisName} + \vfill + \textit{\large\thesisDate} \\ + Version: \thesisVersion +\end{titlepage} + + +% ------------------------------------ --> main title page +\begin{titlepage} + \pdfbookmark[0]{Titlepage}{Titlepage} + \tgherosfont + \centering + + {\Large \thesisUniversity} \\[4mm] + \includegraphics[width=6cm]{gfx/Clean-Thesis-Logo} \\[2mm] + \textsf{\thesisUniversityDepartment} \\ + \textsf{\thesisUniversityInstitute} \\ + \textsf{\thesisUniversityGroup} \\ + + \vfill + {\large \thesisSubject} \\[5mm] + {\LARGE \color{ctcolortitle}\textbf{\thesisTitle} \\[10mm]} + {\Large \thesisName} \\ + + \vfill + \begin{minipage}[t]{.27\textwidth} + \raggedleft + \textit{1. Reviewer} + \end{minipage} + \hspace*{15pt} + \begin{minipage}[t]{.65\textwidth} + {\Large \thesisFirstReviewer} \\ + {\small \thesisFirstReviewerDepartment} \\[-1mm] + {\small \thesisFirstReviewerUniversity} + \end{minipage} \\[5mm] + \begin{minipage}[t]{.27\textwidth} + \raggedleft + \textit{2. Reviewer} + \end{minipage} + \hspace*{15pt} + \begin{minipage}[t]{.65\textwidth} + {\Large \thesisSecondReviewer} \\ + {\small \thesisSecondReviewerDepartment} \\[-1mm] + {\small \thesisSecondReviewerUniversity} + \end{minipage} \\[10mm] + \begin{minipage}[t]{.27\textwidth} + \raggedleft + \textit{Supervisors} + \end{minipage} + \hspace*{15pt} + \begin{minipage}[t]{.65\textwidth} + \thesisFirstSupervisor\ and \thesisSecondSupervisor + \end{minipage} \\[10mm] + + \thesisDate \\ + +\end{titlepage} + + +% ------------------------------------ --> lower title back for single page layout +\hfill +\vfill +{ + \small + \textbf{\thesisName} \\ + \textit{\thesisTitle} \\ + \thesisSubject, \thesisDate \\ + Reviewers: \thesisFirstReviewer\ and \thesisSecondReviewer \\ + Supervisors: \thesisFirstSupervisor\ and \thesisSecondSupervisor \\[1.5em] + \textbf{\thesisUniversity} \\ + \textit{\thesisUniversityGroup} \\ + \thesisUniversityInstitute \\ + \thesisUniversityDepartment \\ + \thesisUniversityStreetAddress \\ + \thesisUniversityPostalCode\ and \thesisUniversityCity +} diff --git a/example-thesis/gfx/Clean-Thesis-Figure.pdf b/example-thesis/gfx/Clean-Thesis-Figure.pdf new file mode 100644 index 0000000..f817692 --- /dev/null +++ b/example-thesis/gfx/Clean-Thesis-Figure.pdf @@ -0,0 +1,2687 @@ +%PDF-1.3
%����
+1 0 obj
<</Metadata 2 0 R/OutputIntents[<</DestOutputProfile 5 0 R/Info(Coated FOGRA39 \(ISO 12647-2:2004\))/OutputCondition()/OutputConditionIdentifier(Custom)/RegistryName()/S/GTS_PDFX/Type/OutputIntent>>]/Pages 3 0 R/Type/Catalog>>
endobj
2 0 obj
<</Length 46845/Subtype/XML/Type/Metadata>>stream
+<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> +<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> + <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> + <rdf:Description rdf:about="" + xmlns:dc="http://purl.org/dc/elements/1.1/"> + <dc:format>application/pdf</dc:format> + <dc:title> + <rdf:Alt> + <rdf:li xml:lang="x-default">Clean-Thesis-figure</rdf:li> + </rdf:Alt> + </dc:title> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmp="http://ns.adobe.com/xap/1.0/" + xmlns:xmpGImg="http://ns.adobe.com/xap/1.0/g/img/"> + <xmp:CreatorTool>Adobe Illustrator CS5</xmp:CreatorTool> + <xmp:CreateDate>2011-05-27T13:46:45+02:00</xmp:CreateDate> + <xmp:ModifyDate>2011-05-27T13:46:45+02:00</xmp:ModifyDate> + <xmp:MetadataDate>2011-05-27T13:46:45+02:00</xmp:MetadataDate> + <xmp:Thumbnails> + <rdf:Alt> + <rdf:li rdf:parseType="Resource"> + <xmpGImg:width>256</xmpGImg:width> + <xmpGImg:height>164</xmpGImg:height> + <xmpGImg:format>JPEG</xmpGImg:format> + <xmpGImg:image>/9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA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</xmpGImg:image> + </rdf:li> + </rdf:Alt> + </xmp:Thumbnails> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" + xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" + xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"> + <xmpMM:RenditionClass>proof:pdf</xmpMM:RenditionClass> + <xmpMM:OriginalDocumentID>uuid:65E6390686CF11DBA6E2D887CEACB407</xmpMM:OriginalDocumentID> + <xmpMM:DocumentID>xmp.did:FA7F11740720681192B09E943B71A8D6</xmpMM:DocumentID> + <xmpMM:InstanceID>uuid:6a5e8f5d-074c-c34c-b566-08f89cb9e2a3</xmpMM:InstanceID> + <xmpMM:VersionID>1</xmpMM:VersionID> + <xmpMM:DerivedFrom rdf:parseType="Resource"> + <stRef:instanceID>xmp.iid:F77F11740720681192B09E943B71A8D6</stRef:instanceID> + <stRef:documentID>xmp.did:F77F11740720681192B09E943B71A8D6</stRef:documentID> + <stRef:originalDocumentID>uuid:65E6390686CF11DBA6E2D887CEACB407</stRef:originalDocumentID> + <stRef:renditionClass>proof:pdf</stRef:renditionClass> + </xmpMM:DerivedFrom> + <xmpMM:History> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <stEvt:action>saved</stEvt:action> + <stEvt:instanceID>xmp.iid:F77F11740720681192B09E943B71A8D6</stEvt:instanceID> + <stEvt:when>2011-05-27T10:30:47+02:00</stEvt:when> + <stEvt:softwareAgent>Adobe Illustrator CS5</stEvt:softwareAgent> + <stEvt:changed>/</stEvt:changed> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stEvt:action>saved</stEvt:action> + <stEvt:instanceID>xmp.iid:FA7F11740720681192B09E943B71A8D6</stEvt:instanceID> + <stEvt:when>2011-05-27T13:46:41+02:00</stEvt:when> + <stEvt:softwareAgent>Adobe Illustrator CS5</stEvt:softwareAgent> + <stEvt:changed>/</stEvt:changed> + </rdf:li> + </rdf:Seq> + </xmpMM:History> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:illustrator="http://ns.adobe.com/illustrator/1.0/"> + <illustrator:StartupProfile>Web</illustrator:StartupProfile> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmpTPg="http://ns.adobe.com/xap/1.0/t/pg/" + xmlns:stDim="http://ns.adobe.com/xap/1.0/sType/Dimensions#" + xmlns:stFnt="http://ns.adobe.com/xap/1.0/sType/Font#" + xmlns:xmpG="http://ns.adobe.com/xap/1.0/g/"> + <xmpTPg:NPages>1</xmpTPg:NPages> + <xmpTPg:HasVisibleTransparency>True</xmpTPg:HasVisibleTransparency> + <xmpTPg:HasVisibleOverprint>False</xmpTPg:HasVisibleOverprint> + <xmpTPg:MaxPageSize rdf:parseType="Resource"> + <stDim:w>1292.598633</stDim:w> + <stDim:h>255.930664</stDim:h> + <stDim:unit>Points</stDim:unit> + </xmpTPg:MaxPageSize> + <xmpTPg:Fonts> + <rdf:Bag> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Colaborate-Bold</stFnt:fontName> + <stFnt:fontFamily>Colaborate-Bold</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>ColabBol.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Colaborate-Light</stFnt:fontName> + <stFnt:fontFamily>ColaborateLight</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>ColabLig.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>HelveticaLTStd-Light</stFnt:fontName> + <stFnt:fontFamily>Helvetica LT Std</stFnt:fontFamily> + <stFnt:fontFace>Light</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>OTF 1.029;PS 001.004;Core 1.0.33;makeotf.lib1.4.1585</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>HelveticaLTStd-Light.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>HelveticaLTStd-Bold</stFnt:fontName> + <stFnt:fontFamily>Helvetica LT Std</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.040;PS 003.001;Core 1.0.35;makeotf.lib1.5.4492</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>HelveticaLTStd-Bold.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>FontinSans-Bold</stFnt:fontName> + <stFnt:fontFamily>Fontin Sans</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>1.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>Fontin_Sans_B_45b.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>FontinSans-Regular</stFnt:fontName> + <stFnt:fontFamily>Fontin Sans</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>1.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>Fontin_Sans_R_45b.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Delicious-Roman</stFnt:fontName> + <stFnt:fontFamily>Delicious</stFnt:fontFamily> + <stFnt:fontFace>Roman</stFnt:fontFace> + <stFnt:fontType>Type 1</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>DelicRom; Delicious_76</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>YanoneKaffeesatz-Light</stFnt:fontName> + <stFnt:fontFamily>Yanone Kaffeesatz</stFnt:fontFamily> + <stFnt:fontFace>Light</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.002</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>YanoneKaffeesatz-Light.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>GentiumPlus</stFnt:fontName> + <stFnt:fontFamily>Gentium Plus</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.504</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>GentiumPlus-R.ttf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>YanoneKaffeesatz-Bold</stFnt:fontName> + <stFnt:fontFamily>Yanone Kaffeesatz</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.002</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>YanoneKaffeesatz-Bold.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Delicious-Bold</stFnt:fontName> + <stFnt:fontFamily>Delicious</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Type 1</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>DelicBol; Delicious_76</stFnt:fontFileName> + </rdf:li> + </rdf:Bag> + </xmpTPg:Fonts> + <xmpTPg:PlateNames> + <rdf:Seq> + <rdf:li>Cyan</rdf:li> + <rdf:li>Magenta</rdf:li> + <rdf:li>Yellow</rdf:li> + <rdf:li>Black</rdf:li> + </rdf:Seq> + </xmpTPg:PlateNames> + <xmpTPg:SwatchGroups> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Default Swatch Group</xmpG:groupName> + <xmpG:groupType>0</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>White</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>Black</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Red</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Yellow</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Green</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Cyan</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Blue</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Magenta</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=193 G=39 B=45</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>193</xmpG:red> + <xmpG:green>39</xmpG:green> + <xmpG:blue>45</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=237 G=28 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>237</xmpG:red> + <xmpG:green>28</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=241 G=90 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>241</xmpG:red> + <xmpG:green>90</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=247 G=147 B=30</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>247</xmpG:red> + <xmpG:green>147</xmpG:green> + <xmpG:blue>30</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=251 G=176 B=59</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>251</xmpG:red> + <xmpG:green>176</xmpG:green> + <xmpG:blue>59</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=252 G=238 B=33</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>252</xmpG:red> + <xmpG:green>238</xmpG:green> + <xmpG:blue>33</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=217 G=224 B=33</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>217</xmpG:red> + <xmpG:green>224</xmpG:green> + <xmpG:blue>33</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=140 G=198 B=63</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>140</xmpG:red> + <xmpG:green>198</xmpG:green> + <xmpG:blue>63</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=57 G=181 B=74</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>57</xmpG:red> + <xmpG:green>181</xmpG:green> + <xmpG:blue>74</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=146 B=69</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>146</xmpG:green> + <xmpG:blue>69</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=104 B=55</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>104</xmpG:green> + <xmpG:blue>55</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=34 G=181 B=115</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>34</xmpG:red> + <xmpG:green>181</xmpG:green> + <xmpG:blue>115</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=169 B=157</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>169</xmpG:green> + <xmpG:blue>157</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=41 G=171 B=226</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>41</xmpG:red> + <xmpG:green>171</xmpG:green> + <xmpG:blue>226</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=113 B=188</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>113</xmpG:green> + <xmpG:blue>188</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=46 G=49 B=146</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>46</xmpG:red> + <xmpG:green>49</xmpG:green> + <xmpG:blue>146</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=27 G=20 B=100</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>27</xmpG:red> + <xmpG:green>20</xmpG:green> + <xmpG:blue>100</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=102 G=45 B=145</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>102</xmpG:red> + <xmpG:green>45</xmpG:green> + <xmpG:blue>145</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=147 G=39 B=143</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>147</xmpG:red> + <xmpG:green>39</xmpG:green> + <xmpG:blue>143</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=158 G=0 B=93</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>158</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>93</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=212 G=20 B=90</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>212</xmpG:red> + <xmpG:green>20</xmpG:green> + <xmpG:blue>90</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=237 G=30 B=121</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>237</xmpG:red> + <xmpG:green>30</xmpG:green> + <xmpG:blue>121</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=199 G=178 B=153</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>199</xmpG:red> + <xmpG:green>178</xmpG:green> + <xmpG:blue>153</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=153 G=134 B=117</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>153</xmpG:red> + <xmpG:green>134</xmpG:green> + <xmpG:blue>117</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=115 G=99 B=87</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>115</xmpG:red> + <xmpG:green>99</xmpG:green> + <xmpG:blue>87</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=83 G=71 B=65</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>83</xmpG:red> + <xmpG:green>71</xmpG:green> + <xmpG:blue>65</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=198 G=156 B=109</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>198</xmpG:red> + <xmpG:green>156</xmpG:green> + <xmpG:blue>109</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=166 G=124 B=82</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>166</xmpG:red> + <xmpG:green>124</xmpG:green> + <xmpG:blue>82</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=140 G=98 B=57</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>140</xmpG:red> + <xmpG:green>98</xmpG:green> + <xmpG:blue>57</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=117 G=76 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>117</xmpG:red> + <xmpG:green>76</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=96 G=56 B=19</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>96</xmpG:red> + <xmpG:green>56</xmpG:green> + <xmpG:blue>19</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=66 G=33 B=11</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>66</xmpG:red> + <xmpG:green>33</xmpG:green> + <xmpG:blue>11</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Grays</xmpG:groupName> + <xmpG:groupType>1</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=0 B=0</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=26 G=26 B=26</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>26</xmpG:red> + <xmpG:green>26</xmpG:green> + <xmpG:blue>26</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=51 G=51 B=51</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>51</xmpG:red> + <xmpG:green>51</xmpG:green> + <xmpG:blue>51</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=77 G=77 B=77</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>77</xmpG:red> + <xmpG:green>77</xmpG:green> + <xmpG:blue>77</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=102 G=102 B=102</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>102</xmpG:red> + <xmpG:green>102</xmpG:green> + <xmpG:blue>102</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=128 G=128 B=128</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>128</xmpG:red> + <xmpG:green>128</xmpG:green> + <xmpG:blue>128</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=153 G=153 B=153</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>153</xmpG:red> + <xmpG:green>153</xmpG:green> + <xmpG:blue>153</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=179 G=179 B=179</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>179</xmpG:red> + <xmpG:green>179</xmpG:green> + <xmpG:blue>179</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=204 G=204 B=204</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>204</xmpG:red> + <xmpG:green>204</xmpG:green> + <xmpG:blue>204</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=230 G=230 B=230</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>230</xmpG:red> + <xmpG:green>230</xmpG:green> + <xmpG:blue>230</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=242 G=242 B=242</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>242</xmpG:red> + <xmpG:green>242</xmpG:green> + <xmpG:blue>242</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Web Color Group</xmpG:groupName> + <xmpG:groupType>1</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=63 G=169 B=245</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>63</xmpG:red> + <xmpG:green>169</xmpG:green> + <xmpG:blue>245</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=122 G=201 B=67</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>122</xmpG:red> + <xmpG:green>201</xmpG:green> + <xmpG:blue>67</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=147 B=30</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>147</xmpG:green> + <xmpG:blue>30</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=29 B=37</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>29</xmpG:green> + <xmpG:blue>37</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=123 B=172</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>123</xmpG:green> + <xmpG:blue>172</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=189 G=204 B=212</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>189</xmpG:red> + <xmpG:green>204</xmpG:green> + <xmpG:blue>212</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + </rdf:Seq> + </xmpTPg:SwatchGroups> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdf="http://ns.adobe.com/pdf/1.3/"> + <pdf:Producer>Adobe PDF library 9.90</pdf:Producer> + <pdf:Trapped>False</pdf:Trapped> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdfxid="http://www.npes.org/pdfx/ns/id/"> + <pdfxid:GTS_PDFXVersion>PDF/X-1:2001</pdfxid:GTS_PDFXVersion> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdfx="http://ns.adobe.com/pdfx/1.3/"> + <pdfx:GTS_PDFXVersion>PDF/X-1:2001</pdfx:GTS_PDFXVersion> + <pdfx:GTS_PDFXConformance>PDF/X-1a:2001</pdfx:GTS_PDFXConformance> + </rdf:Description> + </rdf:RDF> +</x:xmpmeta> + + + + + + + + + + + + + + + + + + + + + +<?xpacket end="w"?>
endstream
endobj
3 0 obj
<</Count 1/Kids[6 0 R]/Type/Pages>>
endobj
6 0 obj
<</BleedBox[0.0 0.0 1292.6 255.931]/Contents 7 0 R/MediaBox[0.0 0.0 1292.6 255.931]/Parent 3 0 R/Resources<</ExtGState<</GS0 8 0 R>>/Font<</T1_0 9 0 R>>/ProcSet[/PDF/Text]>>/TrimBox[0.0 0.0 1292.6 255.931]/Type/Page>>
endobj
7 0 obj
<</Filter/FlateDecode/Length 7759>>stream
+H��Y����u +] i�� �l��Hxl`�
�}`�?���\�Յں�(�R�������էdZp��͛��zw�����k��5�V�ϼl%��/�������-�n�������Z�)ї��m�o���b���a9?�Ou=/]ɤ��4���q%b����y���b1��5&h�W猋m�Ѥ��f31@�ƥ�^�lR�kt&Դ�6��o�5u�&�6n�J��M��{��q�y�s�c�<֯�����%�8nf2�3�'X��*w�0���3�Ra, jk��~[���{zS#`b�� 'o���m�M�
��l�A��hj��M5�v�@H�E9J�K5�
�9�Ʒcmk2��M5|� +<C��p-���&!>2#
;�V +�Dߺ����|�a���i0�6�V
\:�T�[FqE4÷�Y>m�w�6m��E�Ӊ.��X|�[뻗�2�JA/� N��]�b��U�k]��9/�g��b*FqC�&_y�<ߺ@DHq�S�8�Tv� Z�h�o@�j����:�6_��4Rό�P���AM��G�K�0��x��� +"�rU*b +a�e���O�v��� b�M������tE�O*��|9�R�\�-�8�Ķ� �9^0�E�.�=$lG�R��w��(^��Q���R�cbG��N�x���w���~�);Q��F,
>�j�� �R�F��0^�a˴�8��t^4����ߣS�$��*dcQ�/C�։է�C�B�D�u�mP:�M��RL�,�#*�U�ґ�5D*�Zc�����Y�ע"��м"��m���cIC�=e
{nU�����Q�V#���Ñ1��Ifr]�Ǎ�f +���c���`���MA�}w��~?]TC������g�����ɛ ^g�4f+�B�.iRo�]�\�k�v�6�Z��xW�����,-���a�@T��fK�f�쌔���CT���m�*-��b�IdS�\�]�on��1�;���<L'����)�Kgtٰ�
��si���-�4A�<YKlQ(���w�*Z���XR{�u暱]�,���_�e�b����x��V.=�I�+O�T [Yw[*��)$Kګ�]��Ȋ�R����-ru�p�)��9� +���}�fq�Z����caL����M8�O��*,4�%�W���ҙ���Q�G2�A'Ge�z͌�xK�(s��WzͨҺ�R*EJ5%6�ݗ��9HE���QQy�Lz��S����x���;��)�|Y@nb�Ъ1��.F�&6��t��P��G�.HGe�uY�~&-^�7��"I~���@�u��d?��G@��)�_��&�����N��c/H5�p7op�qR!�QaNi%���Q�&�g��JA3�6-�|��G�k�zI���kdYwO~��5[ˌ+O�}�����Bz�;lΖCA� +a�� l�F���g ,g��Q0~��3¶ a�a�#�-�
/E�x���m6��=",�T��{ l��$6Np�I9�I�18��
3��#���pRN���D�n&XI +�e�cA�{/H�GI|� ����S9l�ˆ{&X����Q��q>�`c�.���~��ȎѽO��q:��ֿ��oR����
tmx�z�R�o��m�͟3l�b�_�b��)��D�6(W���_R��u:3<��Š����'�:[�x&�=�+t�ܠ>�Q̬�4���n��B�E�������L�>bf{�2��Hѫɤ�ß�hH�ya +�^�/�lV>��ef +�A�/���z�x��a�\k�19q/H���f�����Z<�5QǍb{~}�9M5���Q-�u��NY��ȴ�"���y��� ,J,&�]�]pQ�|��Ş�c��ᚪ�����f���%�����O/� �t�cʰ%r�^�<c�6�r����cX9�7#��
�Y��3�uc���� �����,X�J�� ^u�l@���x\K��S9��+����\q1xLN9k���+X����R�@����RϬ�·5��V7����4��,Kb��9%�xu#-�Cd�K��-s&�Q��h�{�e��m:��V� ��X��N��l0��\����ȵ��S��w��C�rm��ɵ��U�ۗ��l���#غ:'��Nt���� ��E�N3E�v�5Lo%���yf��R����3��og�#�>�I���_���@б����'˦cm�vN%�=B,�v�s,
?t2,���rgX��+<>��}����3,}X��`'Xl˜w���
H�X"���Y÷�UH����|o'$bL�vi�D����6��6 #۔�,�+=��k_��@�%��ry��X� MR�j� ���7�P��R[��ԋW����M���jRhy1Y�W�G���� ���w��S�1�E
�� ��n�(WH�Dlp��P���So}���
�A���i�9��'f��9�lV�k3m�[���VriEv6'����C��C���Xx�u�"J��1��6��2�e!������yz�B6h|(����m��\ +�k7~xS�%�D*��0�Ƶ�b���C/�^���2 �l����&�H��RYײ�Fb�����ī̂rĴY�h��TK����)���, +��x�C���O�41���+�k�B�2��r�|���q5�3�1��qq��M]�}��x=3sJ�J��N���dž��9�E��aW03x�������LR]vS�E�AhR�R�]��$[�li�M��c#��\ۆ�m����"��T�{ +��p� �����]��f%�]d��3���Z0�I�#��fk(�:��L|\�С��S�b��%13J�v6�wgz��<��o��R��R��9��SP�U����&�B��Xӕ>��g��zs�o [�
̥08�s��|��Ŭ�ABZ�|?�
����C5}������@**��me+<�pe*{��w��j���bXb��WIV2=K�:�Ŀ4�l�R��q(�Ǿ�+F}2�EbG,
gi�(����m�P�9���!�&|�]��:��O'c�K�Ny�U��p좀��ASґ˸�a����3������A�9���M����MQ&QܺG���b��X0�q��"Rݵ}�F����($O�7�zc�t�1��W��Q˹O���p�`&� +H.�+(�{M��m6/p�]�"-隓ϓ,X��5��o�����Cg�{٪aQ�{�Q��/�.*�=�=���ߨ֦��ihs<�QTd�F禫l�,l���� +`�a�#��}y�}:���_z�Q#�f��{ia>����e4�`Uv�zFt}��Hf����K��N_N��=J�t;����<�&��Di��J6��E�>R�ؐE�@^E���R��Rx�p��xjud�le�t����F=�u�7�>���@AV��6�T����C�FQz�J��6�V��9���H�}��VJ�7�O(A|����_N!e>��h��f��������i�i+]����A~�I���%�<�B�4=p�4���[�8Hi3�r��t�㊛�^-���J.4_��]LH[��z�` sUۯ9���g]��U�l"i���H+��\\�N +Z�@��&!��!�Ft��F_/�p��&�ؐ=�oșS��K��{ c>��}�$��d7Ml�&�t��fD��kE��ƃ��� n�@�2]�<���>�B�A[����H)�
dL��_��A�g�Uz�(���$�|�c�w�c��p�I�lv0L9Hs�v��y�t���G��e�89������O^�Q�kU��/S:
0�6�5e3��lEO�I�R���K�.nD6NynȽ�s�#A�E�ρ2]ԝL1K�S����vyn��O8���W�tL����R��ޯ�M\�o�!@��s�1�A6?�P!�p�|%F�qQ2L�¦\)�<�����>q��=��(܆Q�A[Eј�
h���F�\A��� +;!Q|cT�A@���Lht�IK��#���<�]k��I�B���L��%�j�E�pq/`�0e��W8C�Bk3ntRlS��H���f��vL��i��9�N��i�}a缾��϶[� +5�; +�r�B���z>Vp�� ��Ũ.Ʈ`Ȭ��Ч� +B1����aVc3ۊ�k��s4-Y�K�I�����*Ys ��A�����o3I���6��RQ#�ЬR�]�E�9�r� +�T�G���D��\6%�@�ۚ�\�tD?��5��{|݆j�h��,c��}�����@HI��[�qj�c��n��~�z(�X��h:\K{ML���B��h�cV?7���*�n�0�8�d7ZX�1��%�~�kA��ah�x��5i��HT��bz�Էn0ER��O�$�mЃ�rk����sV��%��,�;��K�%�����Y�>�l��+K%�ʒ�gIޱ�XB�*4FA���x�+t��1��&L��W���:3���U��1����:��<�3�㈻�eơ&oa(+̒?D��g�#��!���9�a={ ߛ��S�cyz���p~����C�����>E�2�0lE���W�~�������_x�b��&�ٶ~A��r���q�tJ����3���yw�ꎖ��yg�P<�8��I�rgo�YT-�!�/��OV��*�k���ֲ�f��O_�9i�s�b�9��D�W��Z���1��[9ߜ�` +H��Mh�`��vIf�Z�B�G��E�ͯ�vBa;�+�ĉ��̚l��%&]ڢG��Tph� �����A����$�<x轈�7��<<<���� �
0�}��s��kǒ��Θ�Z�O�������HK��
�F{����3����
�=�{a:��\�a:�孤iU��\���Gp<�3U�.<nΗ�ߚ���um\U
��'����X[�Iն͢�g
��8���vu-zٴo���x*]�t|��2b!v���?wB^� �$\y#���'s�0O�2 ~��?���=��yr
��.P@�i�q�(
C�ϐ�&-HK���zD$��5��2Ф]Zߖ�
/��m���"z V�\�2"T + +���
�����vj_UJA7+�����{ f!S"B#2$$%&
''�(�)�*�+�,�-�.�/�0�1�2x3c4L566 7 7�8�9�:�;�<�=�>�?�@�AzBuCrDqEqFrGuHzIJ�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Z [\!]-^4_;`BaHbOcVd]edfkgrhyi�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�{ |}%~1<�I�X�g�y�������҈��-�P�v�����ڑ���2�Q�o�����ʚ���:�U�o�������ҥ���1�J�b�{�����ʰ���=�\�}���������м�����0�E�Z�oŅƚǰ����������"�'�+�.�1�3�4�5�5�5�4�3�1�/�-�*�'�%�!�������������k�N�1���������d�F�(� ���������y�a�J�6�%�� +�� + +���
�nP2�����w\3���uQ/
� �!�"�#r$T%6&&�'�(�)�*�+�,{-k.\/O071 22�3�4�5�6�7�8�9�:};r<e=V>H?<@0A%BCD +EE�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�def%g0h<iIjWkflvm�n�o�p�q�r�tu v9wSxny�z�{�|�~"�C�e�����х���@�Q�c�v�������͐����5�R�p�����Қ���>�d�����ۣ�/�Z�����ߪ
�;�i���ǯ���0�N�l�����ɸ� +�,�O�s��������>�lś������H�q̙������4�W�xԘշ������ �5�I�[�l�z�����y�`�F�+��������q�O�,� ������u�O�)��������l�F�!���������g�D�!�� +��V
#
���g;���^0��{N"���qE �!�"�#p$G%%�&�'�(�)j*L+/,,�-�.�/�0�1�2p3\4J586(788�9�:�;�<�=�>�?�@�A�B~CoDaETFGG<H1I'JKL
MM�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�de +fgh#i-j7kAlMmYneorp�q�r�s�t�u�v�w�yz%{;|Q}h~�����ς� +�)�J�k�����ԋ���D�i�����ܔ�*�R�z���˚���H�s���ɡ���E�l�������4�]�����ڱ�0�[�������=�l���Ž��K�x¦��� +�^%�
�zA ��_'���H��k4���T�� q!9" +*�+�,�-i.D//�0�1�2�3f4A55�6�7�8�9^:8;;�<�=�>x?R@,AA�B�C�DqEMF)GG�H�I�J|K[L;MM�N�O�P�Q�RuS\TEU0VWW�X�Y�Z�[�\�]�^�_�`valbacXdNeEf<g3h)i jkll�m�n�o�p�q�r�s�t�u�v�w�x�yxzq{k|e}a~^\�[�\�^�b�h�o�y���������Ì���4�O�j�����×��"�B�c�����Ơ��'�F�f�����é�� �?�]�|�����۳���@�e�����ݼ �8�j������MČ����Rɖ���!�gέ���9�~����Qט���'�pܺ��P�����:����1����6����N���u���>����d���(����� +�i�|G��w|��8a�|ݕ�K�}��4�}0�{�|����y{:���A{F�T�*{T���L{h����{��R��{ޢ�v,|,��a||��KG|���4<|ʔ�|/�`�{���z�����{���{�ߞ�{G�r��{��!uT{Ҥ`_|�\J�|U��3�|g���{�����z��pۣz��pƝz���z�h{��{A��t�{��"_�{���Jp{쟗3�|� +����z��٧z��fĬz��C��z��P��z�ű��zؾ*sR{��^�{'��I�{E��3n{p���zɑ��c�@}��Y�L}��3�{}����~T�t�W~�����~�v��dTa���K���� +``�I��J���x3(�Ã7Ɓ��{���=�1��h�6�d���"��'����҂ ��t@�و�_>����I��d��2t�/�9f�����>���?�s���U���q�Y�+�(�e�ő+�]�p�Lr��3��^2���H��Պx1Ԁ��D�p���Z��@�{�Ҡ����*�o�����c��*����ەq���]@��NH�S�/1Y�$���lj������K��������8��������9�Ԁc��pӀ3��\n���Gg�1��
���P�����z�ﲔ���B��������_�D�݃����o�͜�[���=F����0�;��<~|�����f�%�����k�����M���E쫻�����or�D[P��Fo�0w~Ֆ�U}�� +zo�֪�g��U +�������S{r���kJ�զ�Z̋I� ��8i�Y��%e���a+�w��Ԛ�ī^�?�a����� +8��4%7�l�8K�����-��`�E���{�/�ʑ�Gy�����iˍ�EY����&H�����7��ݢ%�(�e����8��y��y�z�����{�i��{p{F��{�k�D|�Zr��}2IC��}�7E��~�#A�aee�.��{�� �סN�Қ�������^z�Q�Oj���WY��:�gH��6����"����V��.��(�������+�ߝJ�B��a�Vy
����i#�#�X�����Gݐg�@69�[� +"���R��K����v���T��a�����ׇ֙��Ox��hB����X�,��GB���5ȍۈP"y�z�\ӊ��,���ܙ��e���w�%�����>�jw����ga���WC���SF��m��5`�Z��"N�܋�
�����X�y���ߟ��T�ƜL���ٙ�v�5�(f�����V��D��F����5�ۏ_"2�9�x
]��� �$�@���˞��i�X�s�������uC�ڜ�e˓M��U��CE�����4��m�"����
����7���&�ۢ������R�;� �Ș?�tb����e���(UJ����E#�A�"4\���!��/�)
ڇL�]��'��������4�!�R�����sk�Z��d-����T��H�+D����4����!Õ +���~�آ!�������6���ȗ���r��.�Dcl����S�� +��D ����3��h��!��i��2�H����ˠ���w�0�i�����ڻ>qߕ +�bВV�&Su�ج}C��z� 3p�+�X!�� ��R�ꉯ�k��z�|��z��t��z�G�{Yr#��{�b���|�S[�|}&C3��}�26�8~���� +%�p�L������%��^�?��&�?�r� +[�b��ܬO�J��7�c�E�V��M�͆�p`���an�]��R�W�KB���1h�����v�� +��s��������� +���������>���0�/�;�+}g���5n��u��_�W�PZ��A���q0�������+�d +����V�������ߦ���/�ܚ�|x�L�mӜ
��_1���P&���@���J0w�k�!}�z��W�Ї��y�{�6��j��S����{�����m���(^�����O����<@?���'06����w������k�_�ݗ�<�2�j�L��z͞���lR�d��]�4��O�.��?ӒJ�O/Kk�Z� �Y��_�U����&���h�(��y؞z�dks�#��]��Nq�ܟ�?]��/��.��V���#�Lj5�y�F�ǖ��K�����x��P�(j�����\r����M䔕�E>�����/h�ܜWB��uQ�P�T���3Dž�E��d�ˡ��JxO�.�:j����[�r�Mq�\��>��l�+/3����2�/�jw���m��?z^�్z���� z�wn��{RiB��{�[�||Lt�`}*=K��}�-G�~�����1�g�����l�t�װс���Y��v����h��*��Z��Z��K����<�S�k,��`������r�M�6� ������������u�n�%g�Y���GKz�"�<~����,����ޓ�����S������Ǒ
�p�D����u-�ы�gA��YT�7��J����<�5�t,}�.�9ГJ��ݎx�֞�j�ߐ&��ق>����t`�N�f��r��X����RJu��;����,D����Ԓ�� .���5�<� +;�!�뚍�������د�~��N��qK���cơ��VS�$��H��{��:P���/+z���b���; +{����Ȳi�^�����~1�(��p��Ů�c����U��ا/H�+��9����+I�U��8 +���9�/�Rñ�S����}�� �o酪�^b����UC���(G��騭9��e�?+"� +���=�6 +ى��V���{���7{X{P�{�m�E{�`���|vSJ�w}E��]}�7H��~�(+�Pjř���v�$��J���Ӈ�i�|z��K�:mS���`��Rץ��<E)���|6��ց�'����~Θ�������X�w�툳�=����z����lŭӆE_��f��Rf��rDʡ�E6��/�G'Ι҅�֗ņ1�������H�z�����
y`�茵l5�6�}_�ϊ�Q�Dk�r�"6k����'��0��ޖ��x;������-�ݶj�Ix��]�wk�����^��B�]Qy���#D ��6%��F'������$����)�!�g�7���)���ow���+j��/��]���&P��o�C��U� +5�s��'n��W*�B���6�n�ú�o������wc����j\�ě8]q�Q��P�����CS�ܕ5�����'Y�Q�4R��0j�f������9��T��v��.��i��f��\���P���qB��j�B5n�~��'C�͔�q�Տ������\���0�&���v ��i��z\M���\O��$��B����5/�
�p',�Q�9��=�� �����L�r�{��wuh����hx�ˬ�[æ=�O*�̥�B@����4�����'��C����� =���?����촺��t毃�4g�����[T���N͡��JA��W��4˙^�M'���c��Z� +��a�����U����Ir�Ú�=�!�0K���N"��0��q�����q�(y��n��mi���]a �P�U�>�?I�G��<բ���03�8�|"����5������|�;���"��yh�!�l��Y�f`����T��ڧ�HϦݤ�<��3��0�ŝ)#����a�������e�^�ڼ�x�ภl����`S����T_���'H����F<{�ڤ�0�i�N#�(����{��-����~��~r���}�f���}�Z��}�OG�D~
C���~�7���H+)��Ѥ݁�������j~n�� +rI��;fS�炜Z����KO�^�?Cm��]7{��+���EܣՄ'��d�+�т�~@�(� r����f"����Zv�&��Nܶ���CG��67^��4+�(����>0�N�?����~/�m�r�7�if�+��Ze�g��N͵Ҋ�C:�Y�;7R�5��*��g�����^�W����}�̪��q��w��e��n�"Z/����N���PC���F7>�n��*����H�2����H�S�ՃU}�����qh�ʙfe{���/Yڹ��=NZ�W��B�ђF7#���I*��Ɛ�3�D���.��r�݃�},�k��q�;��e-�,�3Y��V��N����B��'�E7��� *����X�x��i�<����|�����p�ķ�]dྠ�ZYH����M��mB����}6��S�+�f���������f�OB�T�;|��r��p��8�d����X��0��M����@Bp��#6�+�@���|��������r|`���p;�˯�dN���SX�����Mp��EBP�g�~6�-��+-�6�j�u��G� ��֎>��|ɰ��o��s��d�K��X��O�NME����B6����6㦿�l+=�ŝ' +����|�����ڄ���|�z]�R|�z���}&{T�5}�{��~}�|���}�}xw~3}�b�~n~L�~�~u4�~�~��~�.�U{���{v�ɧ{݃��.|V���|��̌|���w}H�ka�}��7Kz}3�}���2}��y㎅��z[��džzы�D{E�0��{��%�{|�5u�|o�N`n|͆pJ�}��3,}K���|��u�x�=��yr��Ţy듂�yzP�o�Mz����{5��ti{��?_^|��I�|u�52�|���q|I���.x)�0�x�����y'����y����z�F��z���s@{�a^g{}�H�{��2|�OW{�� +�h[ys��F�yȢC0�z +|Q�-#|,��o{"�~���wg�&�ax$� +�Ixأ��y���zH~^��{$k*�9{�Wj��|�B�0}},ʃ�~u��~���K���?�+���7�1�~���p�X�z���a|�����i�h��V^���B�|��,7�&�Z��r� ����^����p�0��>���"��؆t{��1��hу��SUi�@��AR�f+����B�K���P�L��¢�V�"�ʅy�n���čЌ��!�pzr���*g�� +��T�����@��B��+>��&-����҈������u�.�ߗ�2�$���@����y>�f��{��S���@����*�Y�q=�ԇ�����Y�4�ŭ��b���ƃ��������x�q�-eĂ��Ra?�;�K*��ʍ�m� +���v�����Ъ)�S���K���2���ւ��w���d�����RK�8��? �ϓ*]�M�Z�]�/����I����������(�]�ө��Ȃ4��v.����d'�4��Q��՚;>��g�*$ܔc�~ʌ��ЅV���Q�D�q�˃N�R�8���D����|uE�K��ce�٣_Q�v�5>4���)�s��~M��˞�(��*�
�i������;�J�
�݁���t}��Rb����7P��$�n=����)��R�}��ʑ�����2��ͦ�҂��]�n���%�m� +��T�ʌ(N�w��ru���c���P����=C���R(A� ������4�&����\��D�o�����K�P�Ʌ��Bsڈ��b +�݄fO���<����'݅f����ʃ`�~�Ԑ��͍H�)���؍���@��f�rÈC��a�@��N�S��<�x�('��ӆ����I�ݎ-�[�=���#�~�>�������ق��Αq����H`-����N+�̌;~�'9�:� +�Μ9�<�~�z�r�U��p��:��_I�?�aMy�T�H;�o�u&����~�v����`���a�ݧ�NJk�����*�h��o��њ +��nf�N��}��y�^}œv�v}��.��~t֕�~bel�M~�Un�'D,n3��s� /���� +NJo�q�柉�X�$�|��6������7�sɔ胸d���T����KD>���'3�Ӄ' �Ƀ����?�p�Ǎ�؛��!�
��������rՔ=�c�� �SS��C����2��C�n%��3�DŽխ�6�0�a�ܘd������qۓ���b̑�=S9�n��C �{��2R������x��u��_��Μ��\�͚������]ʕ��p�=�a� +�)R����XB�� +%�H�ܞV�[����������R�{u+�)�KgV�B�nY��p��K4�Ř7<m�8�- +e����k�6�r���������FtA�䦟f����IX˕� J��l�-;��ۚ�,��i�zˋc�� +���,����T�ԡ\�T�%�۱Ksr���5e̗��hX)�ԥ�J� �v;����,p��.����� +Ɇ��K�����x��1� +�;�c�K��u����vf��xw+r��w�dv�x�Vٞ�y�H��Rz�9ϘM{�*��|���}�����D�I��| ��|�~���}q<��}ac��Q}�V<��~5H"��~�9n��<)���$�À��{��G���������}קǃpw���c����U��+��G��邢9�₾)��D�,���6���_�4������|���o��i�Dbd�U���G+�P��8��H�D)����63���x�����=�����0�z��|���n�֍�a��]��To����F�����8d����)V����A�G�%��G�t����]��{B� �n �_�9`��S֛}�$F0�?��8�,��)&�b��W�t�e1�҅������������z����mr����`b�w��SR�
��Eŗ͒�7����S(��ې`i���R���Ó��u�6���b�:y��j�Al����O_����RŚ��[ER�e�'7d�I�U(̑a�rq��ΉY����@�~�ک$�x٥$��k�S�Z_�šXR&�L��DЗ��7���(���El���� �dž�������&x +��ak1���^c�~�:Q����D\���(6�����(]����e�� <�O�?��轫�7�Ĺkwb���<j��߱%]ߝE�YQ'����C��n��6f�F��(3�C��`���{ d��Z����vP��wu`�dw�h��x�[ߨy]O�
zIAŠS{:3ל�|5%�}E֘�~��I���ʸ�}�N�}Et���}wh�E}�[W�7~ N��C~}Af�� +LԠ���?���2��o��$��?�9������a��� ���s}DZ�4ql�s��e�-��X��"��Lk�-�?��p�r2i��@$~���Ó2�M���ʉi�i�}���ppʬ��ds�ƝX3����K�����?P����20�l�,$i����|��d������%��|_�^��p����c˧j��W��S��K��S��>P1����$N�����ݎ/��M�,�����{����oi�{�c6���W� +'��:���Ғ��1�)��X��t��j�wi|�Ȱ�^T�5�=SV���,H���?>�V��3B�s��(�Ț�1�V�6���Iȋ���ybt��Py�u���z_v֯z�w��A{<x��K{�y�r�|#z�^|�{yH�}|E1T}I|��} }=�w�'�Gx9"��x��3yv��z8��z�xq�{"�\�{��G�|*�0�|p��|$��^v�4�vۈ1��w��>�bxD�d��x���^y��4pYz8��[�zՄ
F�{\��/�{�� F{G���St����$u�����v��/��w4���`w�&��x���o)yi��Z�z�QE�z��$/hz�0 z���[sӜ��Jt�0u��N� +v[���w(����w���nx���Y�yi��E&y���.�zM�� +x)��Yx�;D�yy��.�y��%y�}�,r�� �8s��ѸBtd���Hu+���gv�|vۜxl*w��Xgxj��Dy��.TyC��Dx��Mܽr+����s����s��t��W�Bu���~zvj��kSw:�lW�w��pC�x���.xД^x���`q����wrԾ(��s�����tc�9�u7�}rv�j~vդ6W&w���C3x�G-�xa�Luw��%�(q����Br�nj�gsj�a��t�R�t|�u���i�v�5V�w,��B�w���-�x���w@��� q���Drq�(�ts9�Z��s�â�=t��%{�u~��i/v8�YV9vު9B�wf�-�w���v������s����tи�uu��gvՓ`w�[yl�pzX��z�C��{�-��|���}
ڷ~/}cȴ~'}���~$}��~+}�k~=~1~�~S~�kd~}~�W�~�%C ~�i,�~���~����|���ƻ|҆<��|�S}
���}7�y}W}d�j;}���V�}�RB>~��,e~/���~�d��{��<�{���{��9��|�َ||Q��||���i'|݈U�}+�{A�}i��+�}���~}P���z˙��={�F�V{6� �<{S��{��z�{��.h|6�qT�|���@�|̊A+�|݉�|����gz����zU�˯�z��՝�z�����z��cy�{Q��g {��sT
|�(@X|F�+:|I���{Ո���y��0�<y˨i�uz����z0�&��z|��x�zҚ�fF{4�xS`{���?�{ё�*�{Ȑ�{5�{Ѕy,����y^�!�+y����Oy��y��z
�qw�zc�}exzŜ�R�{"� ?n{_��*�{P�c�z����?x�
��y ����y3���yd��qy��lv�z��d�z_�YR)z��? +z�X*�z��Mz9���x�Ƞ�lx�����x�m�y����ye��u�y��Wd +�*�,tF���u_����v�p��w�_a�x�M>�\y�:U��z�%��^{�
T��}
����z����Lz��d�{h���{ŀK�|Do��|�^K�I}WL]��}�9���~Q%:��~�
�����ƋL�0�܊�ܟlj���k��2~�� � ny�E��]R����K��߁�9�F��$�ہ�
��*�Ҿ�J���Q�*���]����$�(��}؆R��mv���\t�׆kJބ9��8����0$��6��
Ԃt�ʼ{��N�Èk����e�φv�*|�����lh��a[��>�J*����8���$e���4��������ǫ@��Z�p����w�{q�#��kY�d��Z�����I{�#��7����r$/�ꋬ;�݇s���w�I��p�7�+�o�0�M�y�=ze����jo���Y�M�oH䂱�79��%$ +�F}M�Д>yv��Xz�ɐ�z��=��z�w��Q{�g���|0W���|�F��Z}R4�O}�!D��~�1�X������J�:�|�H���O���vx�|�f���VÉԁ#E����+4s���E!����t��������ʢ�M������%�ƍ�Our����f�b� U��*��E`�� 4 ��� �T����̃���G��{���~����� ���l��t\��Ve�Nj3U3���Dv�3��k�& ��������I����� +����O�{�ڂS���sA����d�H�ATf���D$��35�� ����2-�(���X�U��Ύ��j�"����@�|�rK�!��cG�ؕSS����C����2ۅa�i q�^�c�o�U�� +�Q���[� ����ŀ7���q]����bv�s��S�A��C��N2|��L I�ؐw��҈��в�������f�,�ǧTpl�e��a���TRR��B�����2���] �a����N�������%�y�ܶ��%��~D���Yo���B`�ǦIQ����pB�f��1��2�����o׀ሮ��l�ܚ�����!��[}��G��n�ް�`X���oQ6�O�A��"�z1l�띆ǂ��|������G�p��?�QrC���s�4��t�pd�ru�a}�uw;Q⏠x`A���yy0���z�U�{����}訾��xӚ˙Ay�����z }픘z�o=��{A`}��{�Q��|�@��3}10��}�:�,~� ����.���T�;���<�׀�|���n6�À�_�����PO���@j����/���%"�]�� U�ׁ�˙�C��^�Ê��-{���vmK���^Ǐ-��O��v�?�߄�/n�x�n���� �����Y�1���������Z��z��D�slU�a�^]����aN���f?b�J��/�ڇ����� �;��%�������2������=y��ƒbk\���]��:N@�`��>ۊČf.ĉF�h�)�� +,�\����=�Y�b�ʝ���x��x��W�Wj��s�'\]���M���>f�O�N.z�Ŏ�ч��E +l����ȗ�,�N�w�X����uw����|i����[��?�%M����=��q.)�P������q +����1�Ɨ���D�5�΄��Ԩuv�����hՎ���Z�㞤Li�+��=k���-͇�e��w�\ +Ѓr�P�ڗ��+�Y���t������u�b��h�q��Z>���bKڊڠ�<��0��-{���gr��� +���i�
�X�����ϻO� +�����(�ۧ��;}ͣ��q��l��e����}Y`�ԣ�M2�Ƞ�@q��*3,�,��%D���\��r��φ��H��G��}$���q�:�Ze����X䙖�dLȖ��E@����2��%�A�8��
����2�b���*q[z���r�o��s�b���t�VԤ�vJ��dwX=��x�0,�y�!���z�ڗ�|Yw�vX��x7zO��x�nv��ywb`��zVK�z�J-��{�=f�4|[/��/}.!���~��^�T��8�~�y���m���2aȦ�?Uɣ6{I����=�a�*/řW��!��́;T�r�O�S�E�[���xĭ��Am�̈́�a7����UJ�c�EIR��"<����/����!����Z��t�r��r�&���^�Dx�%�pl`���`��G��T����Hޞ-�w<h���/a�؇�!��.����q�� ���h���wS���qk����"_爐��T-���Hf����<
�F��/'�0�*!��m���r��o�����3�I�5v���nk���__�0��S����UG��
��;�����.�����!v�ƍ����ZljŃ�u�ꟼu�����jl���Q^ˣ��S/��)G����i;k�A��.����!b�1�x>�؋����ǯ��]uG�_��i��?�M^.�Z��R����bG�*�I;�Ҙh.}���h!B����Q�0�bP���E��Y�Bt���Zi+���m]���xR)�^��F��Пf:��s�.C�?��!%�8��^���k�� �gb��zt�ٱh�����]3���YQǟ�bFc����:y�'��.��!�ܖYi�3�s�����{W��rp?��sBe
��t`Y��|u]NZ�Lv�B��@w�6�}x�*@�z1��y{l
<�1}8$���{ +�ux�oy<d���y�Ya��zPN�_{B��W{�6â�|�*.�}���M~�
��������z��bon��&dF��@Y��NMũv�By�o�6����T*�&����@��
ܘ��= ���
y�n�Ln쵗�cް���X����bMy���1B=��6o���*�D�>ӚR�����Pg�Myi����ni�Ɗ�c]�*�,X;�߉aM����A�I6:���)��p���h��g�z�<όۂ�x�葿mݴ��bʯ��eW��9�.L���2A���\5��8��)ݛ��?�������h��<���x]�]��mU���6bL����W@����LA����AH�o�j5ʞ��i)ț +���ǍH��}�w���w̷��lϳ��aЮ|��Vͪ&��Kߥ��,@��蔬5���g)��s�<��{)���@�b�RwH���lK����aP���VV���+Kx���!@��m�W5Z����)���`�{�}T���],�˃v��3��k̲]��`᭯�FU�C��K��D@`��;5(�$��)x�q�!���-v�_�tc�O��v��jkZ��(`��c�U���Jפå�@&����4��̞�)c��#������䊇����o��}s|e*�pt+Zz�it�O�nu�Ef��v�:ۮx-/���yh#���z�.��{� �'~ +o��Vy�e1�Oy�Z��Pz"O�`z�Ee��{B:ܭ|/Ȩ�|�$��}�l�� +W���[n���o��%�e +��m�eߏ��Do����dپ�ZC���Oƴ;�JEP��$:תۄ/զ��:$A����ҟ8�$�K�0B���oD�0��d����Y��#��O��P�E����:���)/ʥ���$Q���� +�$��^�$������n��y�Rd+�d��Y��f��O$����Dέь�:�!�/��ċ�$^���{H��I���^#��nn����cǻ��,Y9�Ó�Nѱ�D��*��:P�v��/���9$i��|�6�]� �)��E�bn� ��cn���X�+��N��O��DJ���5:$�ؔ/��l�$t�@�s��g�;Z�.�Zڋ���mͿ��tc#���
X�����N9����D����9��D�y/x�і�$����ۚ�����k��!����mp�1�dbֺ%��XU�"�M��1��C۫r��9צƜ�/j�N��$���8���ϔɈ�[�y��m�֮rb��ǫHX ���YMȯƥ�C���X9��a�N/_�䜄$�����"������F�������u�o��Pv�q��w_r���xsғ�x�u*��yYv�mAzw�YJz�x�D�{Qz.{�z�{�{Sܢs�y��>t�z2��u�z���v�{'�1wR{�Qx|Mlx�|�X4y�}PC�zZ}�-ez�~ �z�~-�qԃ�� s�-��t;�£9u(�i��v�1}�w +v|r���d�s���R9t��?Buy��*�uԘXuˍ�HlL�мzm�ʌ��n��Y��p �B�[q0�Xu�rQ�~c�sb��Q�tY�B? +|�|�?J}}U)�}J}�Z}�~$�]x|���Mx��f�yq�6��y���zW��w:zʀ�d�{I��R {ʀ�>�|7��)X|p��]|����Yw0�ǻpwɉŪ]xV�љ +xӇ�yX�.vyކwc�zo��QKz��#=�{s��(�{��_{�ʁv#����vϒ7��wk����w���Cx��wt�y�b�y���P}zK�o=Xzň@(�z��Zz{�J��uV�!�v���0v��*�w>���wؓ�s�xu��by��O�y���<�z2� (SzR���zf�O�Pt��D��uh���v
����v�����wB�r�w�=a/x���Oy5�<Yy���(yĎU�ylj ��t4�r�Nt߫���u�����v� +��v���q�we�`gx��N{x���;�y4��'�yA���y@��Ĥs��tp�7�Xu
�͒�u��|��vJ�Op�v�0_�w��<M�xB�;�x��/'�xƔm
x͋��zsu���t��Et����uC���u�Kpv���^�w7��Mfw٠�;3xO��'{x^��%xp���xs)ː��s����gt]�b��t��܀u��howv8��^qv㪶L�w���:�w��H'Wx ��7x%���+��m���_o[����q�ҁ�rv�ҁSs�r��uh`��v�N���x;q��yW&n��zA
��{V�?�vƴ1��w��ހrxa�"�Dy�O�y�qb�z�_��{iM��|):��|�&�
}Y
�~�E}ȲKU��2�������p0~��^��L�"�::$8�b%�;�uE���W~>����~0�֠�~%��-~�\�~��o~�?]�~;��L~a�Q9�~}��%f~}��$~�����}K�j��}F���}D����}F�~p}R��n}`��\�}���K]}��9}Շ�% }dž�O}Äν|x�#�`|�����|��i|���}8|���l�|��\|��PJ�}$��8�}@�C$�}�^�}����{ۢ��{� �:{��6�:{��t|)|��l|4�k[M|j�J
|���8'|���$�|����|[�T�>{^����{f�5�{o���{y�T{%{�� k!{��Z�{�Ix|*�M7�|B��${|���{Ή��z����yz�����{����{ +��z${$��j?{@��Y�{y�jH�{��7X{ʗ?$G{��J�{V���z����`z����z��|�z���yEzī|i{zݧ#Y.{��He{M�7 +�Mv����}wv���x4z�y +j�}y�Yx��z�H6��{�6-�.|U">�|���~�U��~*�L��~U��K~y����~�xτ~�i��X��FG|���5��i�"�4�܁��g���z�����߆���G���2����w��/��g����1W��R��Fӂ��58���?!ҁz�"���m�݄�������$�q�����svz�k�ef����kVځ��xF)�\��4Á��!��oO�2�[�o�͗e���O�����̓����B��uT�ϐ/e��c��V��E��̋�4Q�z�v!l����h�%��1���T���?���:�Ã}���ItV�D��e�ޓ�UJ����D�M��3���!Au���~��������!��B��X�����k�8��sa�̛�dC�h�0T����Dcؔ3�{�!~鏩�~)���u�p�������2�`�q�[�ӥ�rl�e�Ucm���S����C�g��3!�A �~i�
}��ˬF�/�-�ˁ��&�4���p����q����b����SCR�CR��2�~�� +��qbr��\r�cҊ%twS�u�C\�$w@1�bx�r�'y� ��{۫Ꮢt��Ԏ%u��{��v����|w{qƊPxcb2yWS�1z<B��K{1���{�T�;|� v��~B�;�6|Ɯ>��}���}`h�p}�p��Y}�aňM~AR:�]~�B��~�1��R9�f� ̈́ +�H�@���D��B� +��N�ۊ�|�����n����_醼�FP���~@�$��0c�p�4�� +`�~� �����Ɨ�h�=���@��{ψ �mr�!��^��-�DO�X��@Q����/��։�߃*�` +������V�����ښ��݈��mzȇ��8l����2^0���COE�ݐi?΄��/��O�d����* +Ԁ������ɕ��i��ĈG�Qyɇ%��k��,��]j�>�sN��l�?J����/L�ґ:����`�q���D�Ԕb�������uxȆȣ+j��ˠ\��ڝM��>��8�|.�^�7j�o��'߇��ي��W�ӱm������w�{��i��z�R[�����M]���]>A�ۜR.�����?����Fv���ˉĽ��s���\��j�$w3�;��iV�8��[i�?��L�c��=݂���.>���A����`!������l.�i�Dn�֔"o�xВDqRj���r�\f��thMc�Vu�=��w7-��x�J��y��"|���t����u@����vMw��)w)i���x[{��yL��rz =�&z�,Ŋ{�J��|�n�&~�����{�����|E�@��|�v��&|�h���}`Z��}�K~=<��Y~�,|�L(J���φG��� �ʃO�7�ɃL���*um�<��g�����Yˌ+��KG�҂{<%���h,;���tJ� +��#���Q���������\�Ӑ$��tX�{��f���X��w�kJ��&��;����;+����A�8� +r���횆�@�z���Z�Q�����
sL�䎡eŌ`�`X(��6I�;%�b�+��C�g1�k����ԅk�[����ؘQ���zrd�_��d��ޒ�Wt�l� +q�d+�m�5VÉ���HLj���:@�m�+ +�5����� -�z�5�5��u�����}��@��p�����cX��V
���YH+�C��9����*����=脑�x Z��S�.�±S���Ѯ|č���oÌ@�db����Un�@��G����9O���+*[�[�/Ƅ� ~���k�=�|�\������|
����o���b�v�?T����G4���*8�X� *� ������[ ��.��ѠCl-�]�xm�|���o�o��gq*bN�r�T���tGFՑ�u�7��.w"(5��x|��y�&�G}*����s��0�/t�{���u�n��Nv�ak�w�T2��x�F:�y�7��Ez�(��{�3��|���=�*��z��{�zt��{�m��P|U`��'|�Sx�}SE��&}�7-�p~\'ۍ ~�R����R�ڑ휩��Ě�&y`���l��i��_��I��R��8��E�Z��6э���'��E�1m����`���`���Ή`���M��xR��Ck�����^蒎��R +����D����
6l����'�����}��������ӏ���������zwQ�O�\j˔�$^���QY��C���46�f�o'F�މ��ڈF �Ä��������*�vs�ʔvj����]k�v�*P��r��C|���X5����2'�H�����zO��>�����u��Z��i8��y\���mP&���~B��%��5A�g�,&҉�����m�f��]�����E���k��t����4ha����[����O�����Bn���r4Ί���&��I�j�؎��х;��������sԔ���g��b��[R�H��N�?�
A�a�q4h����&7�╭R�[��_�W�ޙG�p�ڲs+�v��g +� �Zː��N~����A���i4�O�4%�����?�����m�O�6lB~���m�r���o}fs��p�Z��r�M��7t$@e��u�2_��w
#e��xp�y���%}��E��sS}���tZq֠�u\e���vXYe��wfM�8x?��y�2��z�#Y��{�7�p|��y�2��zP|���z�p㟚{Edܜ�{�X���|=Lw�K|�?���}s1ؒ�~#N��~�s�M�w���$���{����o����d
�X +vqQ,��w|E���x�9S��y�,T�1z�`�9{�{��}l����}r��zr}�z�gd�j{%\�{�P���|$E0��|�9��}s,1�:~*p�+ʓ��-���7|��ǀ�q�� ��f��t��[r���P ���D����8���F,
�W��~�;�%����}�ʂ\{Ы�p�1��e����VZСP��O����DK���U8d��&+������X�qM�x���ނ�{��sp9����eE����Z1����O +�u�/CؚS��8�u�+��Ո�{������l��C���zK����o���d��n�GY����N����Cu�č�7Ö��+��8�Eu�ы��������!�y���/nզv��d���Y���N�b��C
�C�#7r�_��+J���b�1�Gю��܇s�Ixթ���n#�
��c_���X|���M��ꘫB��̖�7��e+�-��>����������qx%�M�bm}��� bŢ"��W5M����B6�g��6Õ���*Ȓ����*���r��H�g��w��[l�Z�ubI�֨�W��c��L��0�UA���6��,��*��i�l +̙+{S +��t�^y��u�S���v�H��w�>-�xx�2��!y�&��.z�_��| 7��~i��r�zh���z�^ +����<�Y��g��ʆJ]��L��S��ۅNI����?�+��6���+����� ɟy�A윈�h k�i�I��a�"g=���]9���SF�
�&Il���z?��_� +�B��u����f����\���aR�����H�T�q?9��X5����x+�����!��������� +`�`�ĉ܁�f3��\@�w��R`���H����K>��Z��5x���+����!�K�VӘЍ� +����+�B�e��q�~[��8R�t�H^��6>ͧȚ�5R���*+p����!������$�� +ɑ�K<�ł0e9��P[��}��Q���-H.���>��R�254�$��+a��_!�8�F���� +�f�eh�`�N��rj3�.s%l5�Vt#n#�buo�Ju�q�zv�s[gzw�t�Tax�v@vyww�*�y�x�fz�yoѾo�tK�*p�uH�|r/v@��sPw0��thx"x�uzyfPv�y�S_w�z�?�xd{�*x�|fy�|`�m�~�o#~"��p�~8��q�~_�Is~�wt6~�e<u`~�Ruvw'>�wfI)�w�Ngx�E�|k݇��%m��ê�o� +�gpq�l��qń�vPs�jd:tR��Q�u�u>Dv}��))v���gẃ��~j�� +�OlJ�r�m���o^����pƋQu!r$�c9sv��P�t���=�u���(�v'���w�8��i��^��kd���m���in����<p��s�qp��bBrˍ�P +t�?= u��(�uw�j�vW�c� hӣ��$j����&lL���%mښ̈́o[�!r�pѕ�alr4�Oasy��<�t�u(Lt��u��?ƪh,���i�T��k�����m7��n���rp=�c`�q��7N�r�4<>s��x(tO�g +~�p�l�~�rr[�~�t$J
~�u�7�w:##NxH��y��h|�qī#|�s ��|�t;��|�uR{�}vrkl}Cw�Z�}�x�I4}�y�6�~z�"�~H{k�~�|��Uz�z��){!{��{Z{n�{�{�z@{�|RjG|#|�Y�|}}XHq|�}�6t}1~P"�}Y~�}���y{�a�yyу�=z(�ˈ�z���y zQi;{-�,X�{��G�|��5�|`��"[|���9}"�M��xS���x�� ��y �&�]y��.w�y�Vh1zS��W�z̆�G{F�5{��~"#{��p|^�f� wQ���Iwϒ�LxG�R�x���v�y+�?g0y���Wz��Fhz��E5z��,!�z����{��S��v��(��w�Ԕw�����x +!9x��v
@y�����t���su ���u���v�`r2v���cGw�kS�w��)C�x.�;3Bx��G!x]�.
WyQ�����h!���jQ�h�Ilc�J��nGu +y�����p��k�*r%�ׂ�sq�قZt�s�� +u�du��v�T���x"C�ay?2��EzF�K{ ��|��߂y/����yɐ8�WzZ�v�z�r���{oci��| S���|�CD�x}52�g}���`~! +�D~��*����� +�_�{���,�b�%��>qXӁ1bl��0R���0B���21���8���C +X����r�ޛ{Q�*�K/�m~�
��p5~��ap~Ն`R ~�B +~�>1N~���~��� +�~Ń��~���~y����~d�P}�~K��o~9��`}~(�{Q>~3�WAl~D�G0�~>�d�}��� +�~ +}X�g�0}H�m�z}/�ۉ�}�G{�}��mC}�=^�}��O�}��@[}1��0'}"��;|���5|ɇ�� +�F�r�: K���'���=�]�/��m����s?��seтX�HXD�ϔ1J�b�3;h���g,���Ќ� z~��h� +�8F�8�(醋�dc�G������)����� +���z����zm�t�`��N��S�.�fF+�B�7Іx��(��ǃ�h�\��/�Ñ֍ˍH�ΌK��y����l��`����S!���"E����^7V�Շ�(_��N_�{��Q�Z�H����������vx��H�l� ��_Q��,Ru����D����6�E��(�v��X���q���������5����jw�����k5���|^�����QΆ}��Dn���6}��'ԃ玅E� ��ā�@���+��������v��R�+jR�(��]ȇ�JQ$���C܅#��6�H��'z�c��%�n�}_�~�ʫh���S��uÈ���i��ʢ�]���#P����^C\����5��ߘs'*�������w���j�5����u����h�}�Y\��j� +P�]��B�n��5?���;&肔�3큀��3Å�����g��ș3i�uŖ�k�iY��m�\���o�P�#qjBk��s'4�'t�$��5vS�uw����{�<��n�����p�t�q�hk��s6[��t�OJ�u�Aގvw.3��xi$�� y�#�)z�6��}�v,k�bw!s��Qw�gx�xx�[��y�N���zbAV�x{33`�)|$��&|�Y� +��K^�r�@>NJ��1�����#��z����k�i<���7�P����y)�瞟mߏ���b\�4�cV����NJĊ��Q>C���x1+�?��#]������Ōm�W�X�X����xG���ym��� +pkG�_qp_ƙ�r�T��t*HW�:u�;��-v�.Z�nx.��+ynt��z���~~U�I��u�ui��vhjW�4w?^���x
Sn�px�GƔ(y�;S�%z�.%�i{� �|�`}�:���-�W|3t^��|�ic�|�^"��}BR��i}�G+�#~/:�,~�-��|( �%��G������_~!�Z��sb����h|�-��]W�ւ�R����F��K��:w�Y��-����� �B�9�1�H�˂�};�y��r���
g��q�q\����Q_�؇\F +����:����-c��b�s��\�%��]���|L�Sq��E�;f�̎([��x�Pӓ<�(E���L9����-#�U�ʋ���z�>����!�&{b�O��pٙ��wf0�=��[U��}P@���E����9C����,Ռȍ���!����s�N�z�Pz��ם�o��B��e]�ÚZ��g�*O��1�dD����8Ύ�7,u�I�\�����������ty��b��o,�آZd��]�*Y�����O�ś�D����8g����,�ޕ�� ��x�(�#H�y��xΚ���ny�}��d +� +�PYp����N��m�HC��I��8�Y�U+�������q���k���wy�ig�l���j +v���n�lA�`pa��!qyV�2r�K��\t'@���u�51�+v�(��xA ��y���{�t�~�uҨwu3kx�v$`���wVM�w�K{�Ax�@���y�4�z�(���{�-�n|�i�A~Z��.t�T{�j���|`:��|�U��|�J�5}a@�v}�4��~y(p��M�]�����b�3�zt�Y�
iԣ�_���T����J^�P� +?����*4Q�-�R(L���]�_�%
��ɈH��sR�x�Zi�>��^֟-�xTi�Z��Iܙ���?@�߆Y4�v�'(!�O�$`�y�
:�Ӆ&�[�!r~�ˎ�ho����^B����S盳��Il���+>�C�~3��։�'�����a���j
j�ކ�u���Vq��7��g�����]���US^�� H��_��>�����3q�E��'ʑ �rR���
���`��傄q���g
�x��\��d�Rǚ��hHt�Ӕ�>�,��3���T'��|�#.�e�O
��C�3�T��pT�/��fc����\a���RA���H�[� =����[2ɒL��'J��9 +��<
����: �݂�o����We̟���[圐��Qՙ��UG����7=h�\�<2���'�����v��
�� �?E�}��l���hob���jWX���l*Nl�8m�D+��o�9ա�q�.���sH"Μ{t��� +vp���y� +/�1������(i����2_���V�J��LE���0Bc����8~�u��-�����"���ٔ��' +{� �����jh��� +��
�<k�с�hc�H��^ۨ���U>���K~����A��b��7��-��-��:�K"ɕ���
��� +�.�d��!��g뫮��^Y��}T��O�"K����A]�t7����]-q����"���
�^���g�|��g[���]٧Z�9TL�ě�J��l��A �8�S7g��->� �g"��W�� �Ŏ�.������fê��&]c���S�T��J]����@Ŝȝ57/���R-����"q�蔻�H��D�=��F���7a_��iGW¸Rj�N5�6l?D��9m�;E�Qo�1���qz'��@sEw��t�b�xv�ј�z� +s�1��KuY'���v���xLϞ�y�X� |� +5�,�~^ +p�i��rl(��s7n;sGt\pBa|u�r0O-v�t<w�u�&�xv�
�y�wxƹk^n��mpx�2n�q�;psQ�+qxt�rr�u�`ctw+N<uMxS;GvUy[&Zv�z +%�u�}:
�w{}f�}g��i8����k2��� l�Y�zn��;o�p�"^mq��L�s��:t-��%�t��w
�v����e{�>�Hg;�i؉C��k��\/m^��n�o��]~p���K�r�<9vsI��%Js���uւt��d6�w��f����xhҐ�Cj��P}�l{��m�n8�W\�oފ�K%q\��8�r��N%r��UWu'���3cA���.e���#g蘟�iՖL|�k��l�m}��[�o.��J�p���8�q�$�r1���t�����b}����d壉��g�l��i�f{�j���k�lҗ�[n���I�p�^85qJ� +$�q��@�t�2�ua߯媧d@���fx�\��ho��z�jX�)j�l2��Zjm�SI|o��'7�p��N$�q�D�s����faD���c�����e�W��g�ziͧ�j)k���Y�mk��In��7�p;��$}p���sN�/��`��J��c0�E�ey�O�:gn�oyii[��i�k8��Y^l��@H�n���7fo՜u$ep&��+s�A��t1dK�#uf�2u�i`��v�k�}�wAm�mw�o�[�x�q�JOy�s�7�z?uc#Az�v�~|w���q�mì+r�oj�js�p��Mt�rz|u�s�k�v{uGZ�wiv�IqxPw�7)yx�"�yry��{ z���oav��/p�wɚ�q�x���s +yCz�ty�j�uz�Y�v,{`H�w-|6�x|�"�xS|��z}l��m��Qo���pq��Qq��y�r̀i�s�Yu�)G�v'�36w�4"RwM��yB۵�l�䦓m��*�\o,�v��pt��xKq��.h�r셓X/t#��G@uD�o5�v(��"va�l0x{�$�jᑨ�l��4��n*�Ά�o�|w pЌ7g�r��WWs\��F�t���5#uk��!�u���vwƄ<��i�f��k��C��mD�.�vn��/vp�@f�q]�ZV�r���Fs�4�tŋS!�t��V�w+��#i%�-�Yj�e�sl���bm�u'oQ�oe�p���U�r�yE�s@�54gt*�6!�t=�|�v�����h���$jB���PkڥW�WmE�t8n���ep��UDqn��E +"{����r�����s��C�ut���u��9qvk��b7w%�ZR�w��B{x���1�yD�<�yR�� +e{ +�zF�ѧ�pǗk��q�����s��}�s�ot��\`su���Q0vz�0AWwL��0�w����wĉ� +�y����up�Ҙ�q3�j��rA�|�s)��n(t�N_�t�P�uّ�@�v���0vwD�Ubw��y��Fo��K��p��X��q��c{�r��jmCsv��^�tV��O�uC�@Xv��0!v���@v��Fx����0o�͖�p�T��q ��z�r�Sl}r���^;sӟ�OYt��F?�u��K/�v1�r!u��>jxN���@n��W��o��Q��p��Hy�q��<k�r��9]�sg�DN�tW�~?�u5� /�uə� u����x�˧�Yc^�R�e��V��hw|���j�nc�yl�_��SoP1�Hq@�Pr�.�dt����u�b��x]�K~�kޗ�m��� ok{�p�mru^�s�OKut?W/v�.�Jx�ix���{�a}t:��}EuG�3}uvDz/}�w*k�}�x]�}�yNz}�y�>�~#z�..~I{��~T|!~�}v��{j|x�V{�|݆�|}4x�|A}uj�|q}�\�|�~M�|�~m>2},~�-�}a~�}}[%p~��z����z��f�gz�w�{'��i�{h�w[�{��8L�{���=�|R��-�|���g|m�q�}S���vx㌊�[yz���y���v�zD��h�z��
Z�z߈<L<{>�q={���-"{̆M{��� |��n�w����x����y��u�y{�g�y�Zz/�:K�z���<�z���,�{$��6zψ� A{����wL����w蚒��xl�t�xЖ^f�y4�YYKy��cJ�y���<z^��,}z��nz �� u{d�`��vä���w[�#��wޟ�s�xC��f%x��]X�y ��Jayt�w;�yГH,'y����y��� �z��vO��v���wi��r�wΣ�eox5�yW�x��oI�x���;/yU��+�yt��x��� �z�����u� �v��t1w��r!wn�2d�wզ�W|x4��Isx���:�x�u+�y���x��c �zA���t�ac����e�����htC�jUf��yl�X���n�J�fp�:�� +r�*d��tD��ue���x�Ԇ k8�<��m�Y�n�s��pUet�q�WŃ�s~IQ�@t�:&��vf*��w�ς�x���{m��Ws%����tF~uWq˃,vPdg��wPVނrxTH��'yM9���z;)܁�{ށ�{�o�}�����{ +�D[;����PC���KE.�x��9U�u��,ڄx�|��n����jo���z��ycp,�%ere���g�Z���i�Oe��l&D��nX7ɑ�pY*���r1f��s���u��{Dy|��i�o=�ik�d��<m�YӖ2o.N��3p�C��Cr�7f��t1*u�@u�}�fwڍ x����}"xa�p�n3��q�cʖ�s;Y ��tcN��u�B��v�7�lx *I�y.��*zK
+��{� +��~�w[��w\m2��x#bؕ�x�X2��y�MV��zUB]��{%6��T{�*�|���}t
r��~�q��<v8��~l2�~~Va���~�Wm��~�L���!Aώ�~64�b�)��3����
��h�X҅9��u:�w��kM���ia-���7V����L���AP� ��5Ҍ���)��F����(�%
؈R��+�[�$tM���j����s`~�ԉ�V&���(K��0��@�n�5}�ꇟ)n���^��_�x
��e��w���Xst��i�� ��_˒&�}U��M�lK
���l@s�ό~5$�M��).��c���t���n�����r��a�h�v��_���cT珳��J�����@ +1�H|� +��~�Q���hl`�t} +ˋ�J����(k��l�-b$�Ѓ4X��N�/N���D����:��\� /�_�9$����v!�8� �ǃ\�́fj����Ha}����X +���vNG�.��D[�䇋:^���4/�����$f�߆�.�Y��?�Յ a� +��j�Ώg`ڛD��Wy�ύ�Mʖy��C�6�&:���r/v����$A�.��*����f� +9\�ݔ�.�ޓ�#܌��i��B�������
�f�h���S_���dU�+��Ln�Ȝ�B͒���9�q�n.��r�9#������ŏ`��'��2� +�)eS�}c�\��e�R���hH�j&?0��lB5W��nf*��bph��rC\��s���{w� +o��s�P���>j _��k�bӝ�mSe��wn�hJ} p#j�l{q�m[|r�oZI�tAq~7�u\si#u�t�Ix�u���f�i���h�k���j�m���l�o]{�n&qkFo�r�ZsqStKIr�u�6�s�w"�t_w�ewmx���d's@��f�tE�h�uN�Ej�v\zFl[wXj'n#xNY�o�y4HGqmz 6Ar�z�"?s{vk{���a�|a�dj|��vf�|��h�}1y +j�}~il�}�X�n�~G�p4~D5�q�~i!�q�~U�u�~P��`�~�Db�����e,���sg^�w�iy��hk��TW�mn��F�o&��59pz�+!�p����t��γ�^}����aR�<�ic��f8��v�hk��gj���V�l���F;nG��4�o���!�oȅ4&t��P]E�r�<`&�t�!bԓ���e2��u�gy�f0i��KV4k���E�m��4vn���!{o��ps}���\F�W��_-����a�)��dO��t�f��Gech��U�j���E3lΏ�4(n2��!cnP��r�����[w�H��^d���a���c���s�e��d�h/��T�jK��D�l)�03�m���!Om���r����Z��7��]��h�`{���b��seJ�Mc�g���Tni��4Dek���3�m� !?m.��
r;�֭�Z"��])���J_��R�bbg�rodȩ�cug��Ti<�sDk)��3�l���!2lÓ~
4q�����p +_S��q bM�Tr)e/��s"g�vLt&jdf�u+l�V:v8oEFw<q63uxs!�x�tX B{u�Gl�h���njj���o�l��Iqn�t�rBpfe]str#U:t�s�Dxu�uZ2�v�v�9ww� zy�x��"jrq���l&r���m�t0��o)uTs�p�vkdEq�w~TQs@x�C�t�y}2\u�zR�u�z� �x�{ʭ$h\z���j:{�4k�{��im�{�rho|lcEp�|�S|q�}BCsX}�1�te}��t�}� �x~C�Qf��g�h��(��jx��l"��q@mĂtbIo\�?R�p�BtrR��1yse���sw�I +wN����e����g>��LiB�~�k�;p&l��baWng��Q�p��A�qv��1r��E~r��� +qv����Acߔ��<f��h/�U}�i���o1kˎL`�m���Q:o7�nAYp��0�qˈ�iq��. +�v����b���e-�܊�gE��|�i!�unMj��W_�lȒAP�n}�C@�p�e0yq��Uq �J +�u�� ��b$����dj���f��{�hg�XmtjD��_l��Pmѕb@to\��06p{��Bpe� +.u�q��a��X��cʪ���e觚z�gˤDl�i���^lk}��O�m=��@nΗ�/�o�2oېSYt�����a��cG��:ef� +zEgK�"l#i,�>]�j��bO!lğ�?�n[�F/�o��d$ok�(|tq�Ĩ�v`^暡v�a�vwnd�}�w�go5x�i�`Uy$lmP�y�n�@`z�p�/.{r��{ss�T}av]��ssgǘ�tPi��u)k�|bu�m�m�v�o�_(w�q�O�xVs>?�y%t�.�y�vP�z w$�|NyN��q +pw��r)qĉs:s +z�t6tDl�u#uu^vv�N�v�w�?w�x�.Px�y��x�zO�{[{��o +x��EpRy���q�z/y�r�z�k{s�{M]*t�{�N"u�|k>qv�|�-�w�}Wmw�}y0z�~7��mP�f��n��[�/p�KxhqK�2jdrr�$\=s��M`t��=�u +�jY1p\�J�q���;�rԑ�,ds�� +}9v��~�y���w�oO�%x�p��&y#rr�y�sce]zt�W�z�u�IG{w%:,{�xI*6{�yJ{�y�U}�| �Qu�wl��v�x5~�wzx�q�xy�d^x�zIV�y9z�H�y�{�9�zi|6)�z�|�
z�|��|�~,��tPj�,u>�}�v�p�v��cYws�U�x�G�xǀ92yl�,)�y݀; y��D�{��7�r�-��s���|7t��Zoku���bXv{�`U"w0��G8w섂8�x��)Yy +~�!|��9"����>�R�ԁ��v(�v�$k@�4� _�����Tn����H��u��<S�N��/<�0��!K���9���sv������!u�t��jR�D�%_,��yS���H%��E;����.�p�@!!7�M~҅�~˃5~�Ƒ8t��Jivw�E^lR�S*�G�~���;h~��.�~ �~}��V~�I�~9�_}��Gs7~�h�~͕�]�~��Rz~��tG~e��:�~I��.<~"�M �}Ѝ U}g�52}���|�~�qrh~a��g�~@��]~��Q�~��F�}�:�}ɔ+-�}��� �};��Q|ڊ�^}Y��{�~��q�}�|ga}͢-\�}���Q�}��UFZ}~��:[}_��-�}*�= [|$N|i���}��}G��^fr��zaSg�d\Ǎ�f�Qa��iEЋ~k�9B��m�+҉�o�S��q�
� st'��y]{���e�q��bg�f�/j[،lP��m�E�o�8��1q�+���s}W�Hu +t�dȊu�Z�v�N��6w�ĊWx�7ц�y�+�z�_��{w
ׄ�|�u��~�x��z�n��{3c̈�{�Y%��|<N:� |�C.�9}L7\��}�*υ~?R��~����ӂ!�vv��U�Dm�z�qb⇦��XZ�܁�M����B��O��6ꄵ��*��5��7���,/�Ԃ<-�R��u�D��l%�z��b���JW�����L�<�kB���6��*C�o�w �텐Q��xy���Yt��f��kI����aW�� W�0�:Lg�~�]A��͊�6*�>��* +@��C�5?���>)A�����]�txy��B~͂�rҙk^si��a8^���c�T���fdJ�1h�?;��kg3j�Lm�&��_o�ǎqw +��s� +x�]w +Ɉ�z" +�,vy[��w�(�mz� + ��H�����j ����v�|�Fa]�w�>X瓕�FPE���AG_��&>@�?�5 ���-+��T q�����O�e ��膇�
�e`ÔʜqXk� +����X��h��P�����Ht����@ �N�7���a.����%���֍�.�������+:�>��X���RP:�U�H(����?˕���7O����.ȑo�%��[�3ύ^�D<�L�H��j�>`���S*�7_&J���apB���c�:%��f1���hu)��j���\m+;��o:"�Lr 㒐wP +n����p����r���Uu*Z��y� +�W|�0�q}�(�~4���~�s����3��ڋ�x +���8'�ړX0E�!��(j�k�� �����,
�p�d�:� +{B�l�{�1pni|KnU|0 ~t�|ɪ�Zל`\�č�_��Ubu�p�e�a�g{�Ri��A�k��1m8�&m� �s�R�%XQ����[Y�،t^I�~a��oqc���`�fT�SQRh���A`j��&0�l<��l'� +-s����V��h�kY��8\��{|�_؍6n}b���_�eM��P�g��}@�iՈW0fk]�KkV�� +�r����DUd��4X����[Ε�{�^ɓ�m�a��_'db�/Pf��`@zi��0)j��&j��� +�r�N�0TU���*W��� Z�|{]��l�`˘m^yc���O�f��@hP�C/�i�Fj��q����:S��n�EV�2�KZ#�zH]+��l `��]�bᛨOeu��?�g���/�iW�qi��MFqD���bR�$��VJ�;��Y��jy�\���k�_~�]pbO�JN�d일?�g6�m/�h��
i#�Bpp����Pk�Z{� +Yr�x��w�zR��b�u]�Sd�v:��f�wy�h�w�kbj�x�]l�y�M�n�z\>Fp%{-�q]{�-qR{��w |ա3`�~ ��b�~1�e~]xUg6~�jJiJ~�\kQ~�M9m>=�n�4-fp3Dp)%<v?4��^��p�Ia?���c��ow&e݄�iAh��[;j3�(L�l3��=.m��S-o6��o7���u��c�3]N�̐�_ލ���bV��vd��jh\f��^Zzi5�WK�kF�W<�m�e,�nW��ng� +�t��@��\�"��^��a��a>��u-c���g�f�IY�hQ��K\jp�<TlF��,�m��Zm�� @tx�כ�[�h��]ȝ,��`]��tJb̘�f�e2�mY(g��8J�i��;�k��,hlގmm�� ~t�.��ZU�Ǎ�] ����_��1s�b�`f"d���X�fڙ�Jqi +�";�j�,?lH�tl�� �s�����Y��;��\p�Ā_�Xr�a���e�c�X0fL�DJh��;rjt� ,k͕�l4�� �sk����q�Z5��r�]��sJ`�vYt+c�h\uf�Z7viaKCv�k�;�w�nc*�x�p�yq��|[t��nyb��o�e^�~p�g�t�q�jgs +lGYt%noJ\uIpz:�v_rb*�w8tw_t��{>w��k�k���mm'��nen�slo�pne�q%q�Xrls�I�s�u:St�vb*=u�w��u�x"*zCz��i.s�Mj�t�]l^u�r3m�v�d�olw�W2p�x�H�rHy�9�s�zc)�t�{�t�{Ooye|��Ig)|��h�|{~ +FenP��8 +l%u�+`�vQ�EU@w�aI~w���<�xn��/�y��!�yP���y��}|(�р�rk�.vsb��ktU�U_�uB��Twv�H�vՅ<tw���/ix$�_!�xk�4�y���{��[�qR�zt�rU��j2sW��_*tV��S�u9��HDv ��< +���|��1�}��Ivfx���l�x�TbqyV��XyЉ�Mcz7�EB�z���6�z��*�{1�o�{4�?�{ąa�}��upwƒ�k�x��a�x���Wyy��L�yy��B&y⍁6�z>�p*dzy��]zm���{ �Q|���t�w��j�we�vaw֗V�xZ�~Lxxړ�A�yP�m6Xy���*,yݏ�;yÍm�z���2|)��s�vQ��j[vɞ�`�wG�V�wΛL"xX�!A�xٗ;6y4�m)�y^�X y9���z)�W{ڂ�u?��Y�kA��]a��`6V���cK��e�@��Xh�4���k/'���mp���o] +���q� +ԅ,t� +m�J��o�?e�
qV3���s'F�t����u���w� +�0��z�dbO�Z��Z����Q���JH�`�?т۔�6��`��,j�ڒd!��C�����a +���5&�~`���ZX^��])O���`Fh��b�=�Le�3x��hj(ߑ�j�E��m���o���sj +���oS����V��Z-Nҡ=]"F���_�=���b�5?��eu,]��h/"��$j���Ol����oi���t� ++@��{�")�t|�F�3}�
��~�H�q�A +���� + ���v?v��z� +yI̋�|� +F�p|:'�a~� +��~���J�< +��́#ӈ]�� +h�x-i�j�k�k�l�^�m1n�Q�n�p�C�pUrC5q�s�%�r�u?t u��yByL�Zc1n�%egpiv�g|q�jTias"]�k2tdP�l�u�B�n�v�4�p7w�%dq5x�r�y�x^{���`�w��c.w�u�eux�i7g�yf\�i}zO�kfz�B_m={N4.n�{�%.o�|Gq�|l5w�}�#^�~�Oa]"tZc�Uh-e�q[�h�O'j �A�l �3�m��%n��?p���v����\�!_��UsRbX��gGd��pZ�f܄�N�h���AUj��3}l���$�m��bao���vK�lj�[x�w~^a��rfa��f{cw��ZLeĊ�M�g���@�j��3:k���$�l���o*��Ou˃L��ZP�,}*]D��q�`�`e�bx��Y�dҐBM�g��@�i&�Q3j�$�k��n��v�u^�q��Yb��|]\[�p�_"�e+a��Y5d��M#fN��@Ohk�2�j2�R$�k:���n
���u����X���{�[��'pS^h��d�`�X�c^�|L�e���@gӖ�2�i���$�j����m��:�t����s�Uf~�tSY"r�u\�f�u�_�Zv~cMmw?f ?�xh�1x�k�"&y|m��z�oc}~tG�"o�]�}Mq%`�qZrJc`e6sGe�X�tCh|Lbu;j�?v4mG0�woj!�w�q>�y.rG�|\w�Ol�e�{�nHg�o�o�jc�p�l W�r+m�K}sSo�>btuq�0�uvsH!�vt��w�uv?{\y���i�m�zBk�o5n�mkp�b�n�rV�p8svJ�q�t�=�r�v0+s�w%!�t�x�v�x��z{{Ƅ>g�ucx�i�vdm~kqwQa�m +x V n�x�Jo�y�=Dqdzf/�r�{ +!{sJ{�un{��y�}���e�|�w�g�}HlZi�}�`�k�}�U0m0~-IVn�~p<�p0~�/xqh~�!^r<tw]fx��c�Rv�fA�'k\hc��`j<��Ttk��`H�m��<Ho��/-p\��!Eq��cs��Y�xe���eb}��ud�j}g#�P_Li�}S�j戲H:l���;�n,�7.�oo��!0p�/�r��w��haW� t�cҒi�f��^�h��SKi��@G�kÍ;�mZ��.�n���!oA�
�rS�MLwu��~�`_��s�b��ie;�Q^gB��R�i3��Gyk +�;Wl��p.�m�!n��j�qӉ=�w��}�_��sKb&��h�d���]�f��MR�h��G3jr��;#l��.omb�!n +���o� +ۀr� +u �Z�u�+�x+�vGzǂ7m&��U�c��)Y Y؆�\�O߅�_�E���b�;�*e�/���hy#%�j�t��l���p( +
|���}:�Gc�ve�"[|w��R�w���I�x��@�x���71y� ,�ya�a" +,{~�a|hcMu���Z�vP�kRwv�;I�wV��@dwߒ�7xh��,�xː�!�x���'x��� +D{��;|���cy��U�Z���Y
Q���\WHe��_p>Պ�b5�6e�*9��h:_��j�S��l��8p� +��m�+��sZ +P�3ks��m� +n��p����v> +?���fd7��h�/���j�'Y�Ll�D�=o:��p� +���s�爈x� +���v�5�F{ +6�Us.y�7�&�sT��������m�a�0 +��o>.���p�'��'rM f�ds�T��um���w9\�(z����}q +.���}�'���~Z ��V$玠� ����� Z�q���%�� +�`���e�� ��l��/�n�' + ����&�L���Q�m ؆��;b�ՂJ +������[�e +f~PZ7hlp�]j�c8_�l�Uhbn�Gep�8g0rG(8hss�_j�tz�vew]��Pld��S�n'|�W2o�o�ZIqIb8]Ur�T�`Ht FLb�uG7pe<ve'�fwwS2i�w��vz#�6L�u �oP�v({�T�wn�W�w�aA[6x�S�^^y[E�a7z +m�o�RpQp�ytِ Y�b���\�e?w _9g�jaa�i�]ic�lPJf@nBwhxp3�jaq�$�kxsR>n�tZx�wǎIV-k4�Yfmu�\\n�i8^�p]\ka�q�OsdsFA�fyt�3uh|u�$Ti�v�-m�wH�x:zZ��S&s���V�t�tyY�u�h \�v�[}_vw�N�b5xsA2d�y63f�y�$&g�zwKlhz��w�|ʋ.P�{�XT^|(sZW�|�g Z�|�Z�]�}3N`�}w@�cI}�2�eo}�$f�~�ks~8{v���Ne��~7R[�}rbU��PfBY+�Y�\H��Ms_I�g@Mb +{�N�YpR +X +�#L[V��?�^R��2T`ǒ�$qb,�9�hP�at&���hDQ~�i�Urxk&X�fly\�Yvm�_�L�o/cY?p�f~0�q�ia!�r�k�u�mGW|rn�c�Y�}e�\�p�g�_�d�ifb�XMke�K�l�h_>[n[j�0<o�mT!4p�oX%t#p��{`ut�` a�{]bWdmo�d�f�c}f�iW?h|kEJ�j^mg=�l;oi/�m�qC �n�r�3r�s�z�x+�\�jy�_6k�n9a�m�b`c�o\VIf!p�J h?rq=jIs�/Hlu. �l�vE?qkv�ezCz���Y�rx�\�sXm_Kt�aVa�u�Ugdv�IRfhwu<yh�xX.�j^y( �k>y�mpKzM�y�|ՂsWy�wAZ]zhk�]Xz�`f_�{sT�bu{�H�d�|P<g |�.�h�} �i�}k�oS}�Cx�~�-T��av'Xl�oj�[��k_�^U�LS�`��0H.c��;�e׀�.�g��� �h����n����x�ÀS!��u1V��uj)Z +��^�\�8S`_���G�bO��;cd��b.cf��� �g���.mȃ�w��N Q��dt]UP�|isX��x^L[��HR�^��$Gka:� ;1c��.We�� �fψ{jm)�KJw��~MPl��s�T$�rh�W���]�Z��=R�]���G'`P�;bَ�.Pd�H �f� �l��`�v���}�Oy�RsS0�>hbV�� ]kY���R:\���F�_���:�b)��.KdC�K �e����l=��vW�݁�nyQu�o�Uj\p�X�^�q�\VR�r�_�F�s�c9�t�f*,4u�h�ovUkV
yBm~Cs+�jAY+tLk�\bh�mh_v]bn�bVQ�o�e"E�q+g�9+rmjv+�s�l�Ft6n�
7w�pV�}wv}�f�ar�h�c�gpj[f\'k�h[P�mtj�D�n�l�8�p]n�+Mq�p�"r?r;
dv>s��|�x�|Pc+h�qWe�j�fLg�l�[%inn_O�k-pDAl�q�7�nus*�o�t{psu�
�t�v�I|$z�z�`Wp�pb�q�e6eBs*Z2gDtLN�i0ubC�kvr7l�wq*�n*x[�n�y
�s�z +�{p|�y�]�w�n�`�x�d3cNy^YUeyy�N@g�z�C
i}{7kI{�*�l�|0 +mw|�r�}s$z�~�xa[�2m�^�_cTa��X�c��M�f�B�h�6�i��*Yks�lH�!Sr�i�z
��wMZ�nl�]0�b�`��W�bo�:Md���B-f�c6�h*>jX��'kH���q[��y��vdX���l6[Ɍ�a�^��Wna-�L�c��*A�eۉO6Zg܈�*0ig��>jt���p��Uy��u�WY��k�Z���a_]��<W +I|�mJ +�z�p{ +�y�s� +x^v�>}�{q�gdog�i|p�]{k\q�S"l�sH�nbtQ=�o�u~2�qv�&hr w�Nr�x}Uw@z�}3} p�evf�g_v�\�ikw�R[k!x�G�l�yE=tn8y�27o�z�&Hp�{\kqh{��vD}F||~�ogc}e�ew}\[�g�}�Q�i�}�Ggk>~!=l�~b1�nD~�&-oZ�p:i�um�q{��{nia@��d�cӃ�[f$��Qh�SF�i�<�k���1�m��&n:���o;�� t��i�{[��m�_֊�dbv�BZ{dӉ�P�f҈�F�h��H<lj���1�l#�+&mG���ni��St��z� l�^���c�aN��Y�c���PJe��uFOgb<7i��d1qkR��&l~���m���|s��R9z��.lg]���c `U��Y�bϕZO�dۓ�Ff�><
h���1Xj���%�kێ��m5���s<��dzD�Kn{{wQ:d|{�U#Zo{�X�PI|\BE�|S_�;-|�b�/�}#e�#}�h�J~pj���m� +wG� +FvDž�(|Z�uc�dʕ3[rfݔR�h���I�j@��@nk�f6�mz�X,�n̎p"o��b\qc�� +iva��R|��e�BQa[&U+R���X�I��\)?S��_u5W��b�*b��e�u�'hMU��j�߂�n� +w�}�ax�~l�{x� +�Nf�$�Gi%ۄ�k{�jm�h��r� +O�}�l�G�}�n�?H}�p6�~q�-�~7s&$L~pt��~�u��;wyP�{1 +{�|�>|�~�}�� +$x.��Dx}���z�+�|�q +��kd�rp� +���nR���s� +jy0���lv(j�]npK�+pS>�1rp�1t�\�+yI +}����~!�=�~��� +H��g��k� +��{2�D�0 +N���q���T +��7���� +�w +���!���� +UăT�Y"vHWh\riaZN_�\K]b�O_�e�A=bNh�2�dokW#�e]m�;ksn��ys��M^��0P*aRt�SVc�h
V�fr['Y�h�N\�kC@p_�mu2/a�ou#b�q)i�ryv/��H�gX�LiVsgO�kEf�S%mZ=V�n�MQY�p�?�\�r!1�_Rs�"�`�t��h�u\Ix�x��D�o�~1H�q2r)L�rye�PEs�YaTt�L�W�u�?BZ�v�1L]8w�"�^�xj(gyx��x{���A~x|�E�x�qI�yNd�M�y�X�Q�zjLU�z�>�Y{Z1 [�{�"�]�|�f�|iDw~�O>��{�CK�pG��d K�W�P �K�S��>�Ws�0�Z�"�\i��e���vE�"�(<i� z�A�~o4E���cnJ�@W]Nh��K)R���>WV�\0�XӃ�"�[t�w?d��!,u���O:u��z?L��n�D��b�H���V�M�^J�QK�7>ST��%1!Wψ/#DZ��s�dG��t��e��8藞yw=͖n
B��ubpGd��V�K� +]^q�[L_�f�]�b�[=_�e O�bYg�C�d�j7rf�l\*-h�nujp4�qtq��}w"{1T�eVpXW{g\e^Zi\Z/\�kTN�_rm7C2bo6�dfp�)�fDrV�h:s��p.t�|y�y�Q7m(oT.n�dAW!p +Y:Z
qlM�\�r�B�_�t6cbEu3)�d3vL�f�w7
ox\�{�{�xRN/t�m�Q|u�cET�vfXdW�w:MMZ�xB]�x�6`|y�)tbwz7eEz�
vn{�z�}�w-K�|+l�O|lbjR�|�W�U�|�L�Y}4A�\+}v5�^�}�)e`�~-d~Z
�m=pz0�vDIS��lL��Fa�P���WT��LEWq�wAZZ��;5�]��)m_���dc%��"l����y��fu�GJ��kjK�aNω_V�Rs��K�U���A,YZ�05�\S��)�^���bU��xk�Ny +��t�E��j�I���`�MR��VEQ�VK�T��'A +X@�5�[W�)�]��.�a��\�k^�`_x���t[D^�'jZH;�N`?L��U�O���KS��&@�WY��5�Z��2)�\��&a&�(�j� �xD�w�iL�l�jP�a�k T�V�lKXwKrm�\*@n�_�3�p6c(&�qof1xrh� �w�kU +vBn� +Gt�q� +vs�t�~.y�q!W�k�f�Z�mI\�]n�R=_�p7G�b
q�<�dar�1�f~tJ%[hu}Fj�v} +�ruxI�}q{�pUse�W�s�[�Z�t�Q�]Zu�G_�v�<�bvw�1Nd�x{%\fFyT�i�z,qx{��|�}�n�Riz0eUqz}[
Xkz�P�[S{?F�^{�<6`�|1c +|�%]d�}�h]}��p�~�e{��nP#�;dESQ�ZjVq��PeY~��F6\p��;�_:��1a���%kcY���g_�)�o�:�{]�,mPN1�.c�Qz��Y�T��PWچnE�Z��;�]�{0�`p�$%�bF��Cf���#oO�� z߂
l�L��#cO�YrS:��O�Vt��E�Y��;�\ʊ,0�_t�t%�ai��e�'dnхsFzw�7lUKD� +oF!KnCp��q2rXVv�u, +d�Uk��[�X�+R�Z˄�I�]q�a@`�6�b���,\d���!�fS���k�� + +;r��>|5��c�RS��[ +UA�XRX��I +Z֎�?�]���6W`���,Yb�!�d͋k;i�[ +jq��m{灤e�ulMd\u�QRxv_T�H�v�X~?wd\4�x_�)�x�b��y�e��{�h(�~"l� +o`�F�pIc^=q}e�3Wr�hj(�s�j�nt�l�w�n�2{"r� +.w�{� +L9`���C�b��:�e&��1�gG��(i���j��$�o��6u���~6��\�Z�{T@]��K�_G�yCPa��:�c҇w1�f�$(h���iʇ�o��Mu �.F}ڀ�\/Y\��S�[���K�^��C `N��:cb���1�e!�X(g+���i�a�n��*{t��{r}���\�|2M}S�|IQ#J�|WT�B|ZXm8�|�[�/X}_n$�}�b��~|e}
��hIڀ�m} +y�r�|�v� +h�{=�je{�5il|o,�m�|�#�n�}��pL~p>t�}x��p +�AMjK͂�QC���T�;S�+X92��[�)Ԃ:_, ��bZ-�Re( +��_h�Z�Qn +�6k����q� +l!+Lo�Pt� +:{�
@}}�G +�zځ��|܁� +�z!���|W�� +_���b����e�
=��h�/�mm� +!~� +%��l�x�q� +^��o���Qt� +��rs ��w� +~��jA~��7h~��~|�(�~z��0~��6�Z�% +���
�����vj_UJA7+�����{ f!S"B#2$$%&
''�(�)�*�+�,�-�.�/�0�1�2x3c4L566 7 7�8�9�:�;�<�=�>�?�@�AzBuCrDqEqFrGuHzIJ�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Z [\!]-^4_;`BaHbOcVd]edfkgrhyi�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�{ |}%~1<�I�X�g�y�������҈��-�P�v�����ڑ���2�Q�o�����ʚ���:�U�o�������ҥ���1�J�b�{�����ʰ���=�\�}���������м�����0�E�Z�oŅƚǰ����������"�'�+�.�1�3�4�5�5�5�4�3�1�/�-�*�'�%�!�������������k�N�1���������d�F�(� ���������y�a�J�6�%�� +�� + +���
�nP2�����w\3���uQ/
� �!�"�#r$T%6&&�'�(�)�*�+�,{-k.\/O071 22�3�4�5�6�7�8�9�:};r<e=V>H?<@0A%BCD +EE�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�def%g0h<iIjWkflvm�n�o�p�q�r�tu v9wSxny�z�{�|�~"�C�e�����х���@�Q�c�v�������͐����5�R�p�����Қ���>�d�����ۣ�/�Z�����ߪ
�;�i���ǯ���0�N�l�����ɸ� +�,�O�s��������>�lś������H�q̙������4�W�xԘշ������ �5�I�[�l�z�����y�`�F�+��������q�O�,� ������u�O�)��������l�F�!���������g�D�!�� +��V
#
���g;���^0��{N"���qE �!�"�#p$G%%�&�'�(�)j*L+/,,�-�.�/�0�1�2p3\4J586(788�9�:�;�<�=�>�?�@�A�B~CoDaETFGG<H1I'JKL
MM�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�de +fgh#i-j7kAlMmYneorp�q�r�s�t�u�v�w�yz%{;|Q}h~�����ς� +�)�J�k�����ԋ���D�i�����ܔ�*�R�z���˚���H�s���ɡ���E�l�������4�]�����ڱ�0�[�������=�l���Ž��K�x¦��� +�^%�
�zA ��_'���H��k4���T�� q!9" +*�+�,�-i.D//�0�1�2�3f4A55�6�7�8�9^:8;;�<�=�>x?R@,AA�B�C�DqEMF)GG�H�I�J|K[L;MM�N�O�P�Q�RuS\TEU0VWW�X�Y�Z�[�\�]�^�_�`valbacXdNeEf<g3h)i jkll�m�n�o�p�q�r�s�t�u�v�w�x�yxzq{k|e}a~^\�[�\�^�b�h�o�y���������Ì���4�O�j�����×��"�B�c�����Ơ��'�F�f�����é�� �?�]�|�����۳���@�e�����ݼ �8�j������MČ����Rɖ���!�gέ���9�~����Qט���'�pܺ��P�����:����1����6����N���u���>����d���(����� +;F~���*-~[�y�4�"����7��o�c��R��6��J�f�I~�q~���^�~���L�~`�o;*~Y�p*5~1�#��v|8�s��|u�Ӌ2|�����|ۙ9��}L����}�s���~n`���~�M���;���(���e�܍ +���k�{����6�H��������F�.��
rz����_��)��M�R�u:��y�#(������ �!��ͱ���(�B�?�����$�D�;�%�'��0�(q]�[�7^̈́��LL^�΅X:��R(t�'�<�%�x�u�ډ������ڧ +�������ނ����"pF�Ӌz]���K��V�'9����j(Y�Ʉ�ܒ�Ԡw�7�d�J�݈�9�����T�b����d��=oD�W��]$���tK+��9e�0��([�^���8�U�g�Ĉ�u�e�����$�����$�����M���^n\��5\p�9�J�����9,�Ȋ�(t�� ٯ��F�`������B�������+�~\�F�mm����{[ւޔ�JI�*��8��n��(����K�E��-��]�ֳ�����хͫ[� +�֦q~w��lփ4��[F���I�ד>8́�t(��5�T������4�-���ȸ9�����F� ����}�����l��NZ��;��I�����8��Ґ?(��<�
���1�݈Ɩ��������d�2�*�^��|ԃj�5k�����ZH���IE�B�x8~����(����*���l��
�����Ǎ���>��v�2��|7�8�Jk�p��Yꁿ�JI � ��8a�`�?(�����j��{'���{{��w�K{ۡ��t|'�!��|�~��}Dl�w}�[-��~hI���~�7��&儖�G�u������h�r���`������������O}W�Z�0kӉڂZF�j��H׆���7|����&����Ҭ�����l���Q�������߈ۍV�H��|)���jщI�BYt��vH;�z��7#� ��&ڃ���������������8�<�����o{�*��i�cX��f��G���a6Ԅ���&փE�NϚ�n���W�\�ӭ�l����k�'�y�����h��H��X��^G4���#6��I��&�҅��8���!��𢚫���$���D�lj�����x��<��h'�ݒ�W^����Fȅ1��6f�ډ�'�U������������f�����7�������W�Jx�ܚ�gp����V҆/�(Fk�Տr6>�z��'���ˣ���#�}�v�:�h�i�V�j���������wA���hf��/��VH�ߖ{F����6�&��'6�����~�����K�c� �5�J���H�n����ԩ�v\�L�me���)U�����E��9��5�ۏC'I�B���a���8�5�Y��)�6�֖K�M���Ή��wu���ae\���CUB�Z�Ef����5Ȃ���'Y����]����I�Q��P�&��}�2�����t��d؆��T��)�E&�ǘ�5��k�'e�ы)��qzw���pzۨ1��{>���){����|0v���|�f7�\}mU��I~E5�9~�4ÈBa%/�1�M� �s�Ķә��V�|�����s���Ò.��u���e<�ӁvTߋ��pD����r4z����%@����ŕ�����_�Չѥ�/�����ȇ�������t��e�(dY�M�xT*�>��D%�2�%4:�C��%N�/����������%�ȕ��X���!���{��*s��Ҋ�c��ljrS��ĈC���4 +�A�-������`��p)�?�S`��:�(Qb�=��BK�5��3r�2��%ڂ����p�疱�C������n��~��/��oI��`���Pو��&A��13M��T%h�♙�{�͖����ٓ���T�}�� +�Un��Ԧ�_`�Ġ�P`���)A����e3+����&�Y�����˘�֖��'���侠�E�?�|�챉m⌭�^݊��}O�����Ah��V3�s��&�#���J�(z��[z��p��{2�Ԛ�{�~b��|)o�|�_��B}nPG��~A��~�1ˊr�#��݀����+���P���ƛ��#������P}I�>�>n'�p�@^⑶�GO���U@��a�n1��䁗#��G��K�d�֪�Ј�Ӝu���u�s�|F���NmF�䅯^%�1�O����@+���1i�d��#цÃ����w�ݟ-�����ӎH�e�Ԍ�{T��Yls�X�]v����N��
��?Ћo�s1@��T#�N�7�բ(�(�������R���W�R�kzb���qk���\ɐ9��N����?{����1"�z�%$ +�ɅW���Š��z�D�חf�� +d +�1��V`�ݏZH��;��8��.���"L������ߥ\�V�ɡ`�~�����p��6��cu�ҕ�U�}��H~�+��;c�Ԍ�.�����#'�"�0���c�����,�ڋ�!��}�a��p@��Nb֖|��Uh�&�H"�Ӓo;/�x��.��4�_#R�������W�Ř���m�����}�)�kop���b#�.��Tےԙ�G���1:��#��.v�܌�#v�\����F���
�����ޱ +�8���ow�&��j.���]��P��dDb�،>82�Ί",A��!·�,�7�y�U�ˬˠ���4��vm�ʙ�i�����]���?P��~�D�r��8�d�,J�x�z" �^���Y�O������%�ç��gu��z��h��M�O\��,��P���Cԓ�@7���,N���":��t�2����i�N�맸�t�5��hG����[�ћ�O�����C�����7�����,L����"d���L����D�Z�I���+����t9����g����[h����O7�p��C<�f�47��U��,I�c� "��C�Λ ���"���.�����m�s��ͭ�g#���<Z��E��N�/��C�%�T7���,G�#��"���7��{>�6�h{�~l�{�qì�|1eY�)|�Y2�_}WM +��~A��~�5M�C�)��ǀg��:�f�\��Êw���m}��G�+q1�>�dާo�Xʢ��L���H@ǙC��5)����)Ɛ�ދ��w���I�a�ҵ͇x}/����p�����dg�ȅLXd� ��Lb�X�|@����05 ����)ˏy�� �܃p�ں��܉(�,�`|����p%��c�3��W��{��L�·�@S�!��4�u��)ώ� 4�L�S�;��4�����8{�[�Go��d�lcm����W���JK��D��@���T4֒��)��Z�� r���5�����^�Դ'��{D��tn��b�%��W!�h��Kh����?���4Ò_��)��ć� ������E���:�˞�z��}��nj�}��bo����V����AK�H��?����4��狈*�D�!���˓M� �������"z�&��m٩�a�O��VZ����JҚۓ~?��1�X4��z�<*&�Ҋ<!<�
�p���խх�D��yi�ޥ�m6�š�ab���U� �#J~�r�c?T�ɒ�4����*4�m�P!k�����鸝���C��sxѭ���l��|�7`䣜��U�ǝvJ3��?'�q��4����x*?��B!��Z�q�M�h����ߴ�xU�s��l1�@�t`~�Y�qU,���I��ϛ�?�)��4x�w��*H�Ս!���Ќ��0|E�ɾ�|xtָ�|�i�%|�]���}pR_�8~G8��~�<G�ub1���'b�À���q���m�$�n�H���tT���h��X��]7��wR�s��F����<����1��U�+'v��[Ҍ������I��н ��s��/��hL���\�/�yQ˦ąFġj��;���g1����'��Y�������r��q�s�Hs�����g�����\�����Q��*��F��Ӈ�;ڛ{��1����'��Å4�f�\����Ғ�s)���g��[�\H��sQI����Fa�7��;����&1��{��'��"�kz���,���h�V~}�H��r��[��g�ǓR[�[�=P���>F*���M;��E�c1��߉'���ъ����~�؝,r7��Mf��G�x[��ה�P��f�]E����;����w1��X�( +�� ����������}��v�WqĴu��fK�қ�[0�\�{Pp��tE͞��w;s�D��1���(,�x�� Y��5�3�Y�h}���qF���eӮb��Z̨�P$�n��E���
;`�Α�1��l�(I��� ����������|��ά�pس��.ej���Zs����O���Es���s;P�j�h1���m(b���� ��U�����>|+���^p�~�ne���qZ,�1��O����(EQ�a��;C��1�����(u�i�9 ڈ�s���Z~v0��}�j��r}�`� +}�U���~BKg��~�AT�di7��6�.����%���B�����d�f��u���� +j����l_&�U`���K5���A0���.7u�e�g.&�*��%;�ɂ9˂��u���;jx���#_��T�QU:�&��K��=A�τ�7i����.,�q�_%[�7������)�̏#u��E�mjg�؋�_�����U-�t�|K +�B��A�%��7d���.1�͆ +%w���*E�r�e�����u`È�|j1��{_r�厱U���"J��@��p�O7b�S��.C���%���V��Ņ$���W��u �ܗQiݼs��_%�2��Tǰ��JéЎ�@飹��7c���._�m�6%�4�p��ڀ2�͟ t��N� i����^ⵗ�^T��g��J��/�w@֣�$7d���.x�Պ�&���iA��w��P�Gts�ˠ�iM�V�D^���T]�җJ}���9@Ȣ��k7k�v��.��J��&G��N������֩Mt2�M�Si�ѡq^Y�u��T&�?�MJ]���@�����7z��p.��ˍ>&t���#����qo�k�)s����hź_�i^���2S��KJA����@��~��7��{� .Օ_�c&��A���@�����s�����h���
]곗�USѭ\��J+�#��@����7���f.� �Y&���o �����|�zo�|�z�̑}3{i�\}�|�)}�|���~
}/{�~K}�gn~�~*S,~�~�>�~�*�(��~{,���x{���o{�t�a|k���`|ǂ��g}��zX}l�JfB}łR:~��>L~d�p*�~���5y��O�Azr���Yz�C��{b�{͈ڌ�|4��y|���e/}��Qa}x��=�}܃�*\~;���;y���Ty��g�}z ���zs���z���{f�=w�{�xd4|g��P�|��=4}a�*&}׃��lxE��؋xΞA��yJ��"y��!��z5�j�>z���v�{M�*cQ{܍�O�|i��<�|�\*}r�h��w��T��x(��3x����y(�N�Ry��Ɖz@�Hu�zՔ�b�{n�yOl|�<�|���*(}���Vw��Յw�����x'��ex��|�,y<��yН�t�zm�}a�{
�<N�{���<H|;��*8|����vʾ��$w@����w��)�-xJ���xި��yr�Lt'z�*aFz��N�{N��<{��*E|t�7�v��/��w���Cwy�M��x���x���$y'�sby���`�zV��N9z��;�{���*P|7�6�^v�ѾѬv�ʏ�'wE�q��wϼu�x^���Oxꮫr�yw��`Ez��M�z���;�{]��*Y|��mvA�G��v��d�Awˆ�w�û�<x/����x��!r2y>�+_�yȤ!M�z_�;�{'�*`{ދ�眃tx���y����vz+���9zқ��{��ˁ�|?u��r|�bA�I}�O�~?;ހ�~�)��l�w�����́��<� +�D��#����;�큊�Z����tL���sa1���dN/�x�N;S�Y� (�5���e�ڋ��Ȁ����!�F�v�h�$�l�������醹s!��`8�"Mn��N:�փh(�Ăk����
����t{����S�'�6?���2��r9�Y_SI��L�W�::g`��(�`����E�m�V�w��~ј��=~����~����z~��/p�~���^�~Ō�L,~݊2:~���(�~��)�6~���˹~y��@~H�A��~"�ޔ�~���Y~�zp~5�`]�~X�GK�~u�!9�~���(�~���ܮ~F���F~�K��}Ч奎}����f}����_}���o>}ϗ�]%}���K=~��9�~1�(�~/���F}�����}�����}p���a}M���W}J�Հq}Q�n{}r�B\�}���J�}���9m}ߍ�(�}����}��%ǯ}p�H�j})�v�:}���L|�� �}�}m�}��\ +}E�9J�}i�9C}���(�}�����}��cƝ}=�ڴ_|�Q�=|̸ϐf|²d~�|���m|֥b[�|���J?}�9 }P��(�}h��� }xղž}�i��|���q|��Ǐ�|��~~|��l�|���[9|��J|ݚu9}��(�}<�Gڍ��w����6xG�9�x��=�Ky��C�uzx�U��{Zo*��|2\�B}Jʃ�}�8���~�'J�DW�%�������p��{���B�U�����^����|n�!��[�����J����8P�g��':�À�ֲ�����@��˳���ҡ��Z��U���3~ƃ���l��q��[��VIh�o��7�� +~:%���B˶��`�)��]���,Y�Nj�S��uwxy�$�g����V��ƀE����E5]�}�t%��I����d��}�ȇ���H�R�U�����ȉ��wX�t��f��M�
U��1��Em��5����%��҂�Q���R��� +d!�ŐtS�����D���>4r����%�u���Ս �`�������w�"��K�Ş��G���sl�n��cl�c�uSv�`�"C��T��4N�E��&� ��汯�e�R�\�I�ѩ�6�p�ĂO�=��r����b���}R�� +�fCh���J4(��E&����O�º�.������'��.�-�T���Wq��ɡb����Ri����C����4����&.�`���/���b���ܠ�Z�B�+�����z����p����Yal�y��Q�v��Bj�3ށ^�m&>� ���5�p�Я5��Ė�D�/�A�f�̷�Ɇ��jpc�U��`�B�fQ��?��B��2�%3)��&K�S�y�Ju����v̡\�gw����Px��ʐPysr!�Vzgb6�y{LR>��|0Bm��}2��.~#�fO���8~@�B��~T�Ó�~i���~��~��~�q +��|A>_��}A/ԉ[~R"l������}��$��}ԕ���~ ��
~/xF��~xiϒ~�[ ��'Lr�M�=����/��["��v���8�ۅ6�؛��͔b�݄Z�ƖP��wH�߃�h�r�<Zl���K錽��=��k�x/��9�K"���3�̞��������D�'���ĕ���vb�8��h+�؇�YȎ���Ko�9��=V���/v���"܅q�W�~���S�Y�w�����������.uv����g_�R�
Y"��J�=�t�c/`�A��#��{�X�!���-������4�0������t��;��f����^X����,J}�L��<Ĉ���/O��#8�[����ˣ4����Q���ܝY�˔@�Gs��ٗfe�}��W�2��J���<����/A�U�P#b�↕��������z�'����������rKe7�&��Wd�ڕDI�����<F�>�7//����#��{�t���t�'���H����Q��퓯��r�>�Qd{�؝#Vʌ���I9�?��;���c/���C#��$�5��R������
���y� qV��AcՎ��^VC�E�eHՉ��_;����b/ +���m�����`���� Ss���FS��O9����,�F��!��Q�u�)�ҡR���~�֕kz'���/l����&_����-R둎�+E'9J���-,���Q!����{�������������{�6yb�5�WlK�%��_m� �Rv�(�yE��1��9�5�A,�M��",�<�c��d���i�ȝ-�x��ᝇk��͚A^ԓ× Q��˓�EF�Ӑ�8�ՍH,���0"V�χ-�<�=��� +�賶�À!�̟�tt���h�r��]����R����G��b�H<��z2�����(��v� P����=�p��n�~�Vsĩ���hL��=]����R?�E��Gb��� <�����2��W�f(���1 ~���C���-��~��9��s(�d��g¤Ģ�\��V��Qߛ��G����<��U��2u����(�� ��h���Ͳ���~*���r��)�fgR����\H��:Q�����F�W�.<m�
��2h���0(Ɋt�� &����=w�z���xDo_�x�d1��y�YK��z�N���{wD��|v9���}~/���~�%ʑ��������q�2}�z-��}�n��"~c֮�~;X���~�Nm��Cޟ��9��̀/�����%�Ł'ׁ��A��y�����n�H�&c|�-��X��'��N1���C����9h���/����&���� ���_�a��y!�ԉn�w�3c(�h�]Xo�h��M��`�C��e��9R�i��/��c�t&*�m��T�����漸��x��'�m��ƍ*b�����X����M�����CY���g9;�R/����F&P�ƅJ��քf�y�6��x4����m�7��bI��W���\Mg���C%��%9#�$��/���&}����*�2�����=wĶ#��l�����a㫚� WZ����M#����B�����9����/�����&�����8����n�G��wJ����lJ�I�ay��/W +ds�A�Zp�|�EP�����GP��!>�+��5�n�+,�����$��ˆW�$�ymÃ�=n�����d8���AZ-����P}���G*�E��=�5�ҋ,���"$ď1�Uf����y��And��Ec��"�_Y�L��PG���G����=���65�C��,v�y$=�� +�Kx�� n����c����}Y����BP��DF�$�]=ٟp�u5����,����%�2�ވ���x|���mռ�*cr�#�dYl�>��O�w�=Fɤ���=ў���5)�I�),�����%B�ω��F�$x2����m����Jc?�Ĥ�Y<�٠�O����F��J�=ʞ��H52�쑂-�1��%_���c.� +òz|w�kz�wٝ#{bx؉�{�y�vx|[z�c|�{�O�}i|�<C}�}x)7~^~Z��w�+��x[&��y��y��zz6>�nz�}u6{j�a�|�N�|��;�}<�)}���v(�ҿw���w͇��xw�8��y'���yڄ�t z��Y`�{G��M�{��;4|��S(�}Q���t咈��uؐ���v��ӫ"wp�(�hx8����y�Nr�yЈ�`z���MM{]�:�|��(�|�����t� ��t��S�Buؖ���v��9��wv����xT��q�y-��_6z�aL�z։':i{���(�|r�t�sd�y�dtT����u6���v�F��v�8�awƕ4p�x��7^wy��7L-zg�-:'{?�2(�|��ޝrή���s����ct��n��uy�Q��v^�p�fwI��px6��]�y ��K�z�9�z�M(�{��)�4rd�tʝsU�\�t:�S��u�g�wupv�oRwϛY]<x���KXy���9�z��Q(�{j�N��r/���Es�
��s�I�gt����Vu���tv���n�ws�\�x]�vKyI��9�zB�D(�{+�Oکr�=�r�ļ��s��=�Qty�ƑZuY�v�v@�m�w%��\8x +�J�x���9qy��)z��+٥q�Ԝ�r��`��s���ptD�ؐ�u!��~�v�gmQv��[�wơwJ�x���9UyȒ�)zΊ��s�s�ˢ�u +�T��u9�!�^vG����wo{ۃIx�jr��y�Xz�G��3|6X��}%Ձu~D���%{�/�n|<�r��|��n�C|ԋu��}?z��]}�iX�
~1X��~�Fꁇ5��;g%ڀ����݄ݼw�@�Y�Ȃ��ך�C�Y���yb����hZ�L��W?��DFU���5�����%߀l�I�O�ύ��ׂB�@�E�Ɗ����e�ň���xR�̇�gu����V�����Eр^��5d�3��%�����|��K�+�u�;��� +�6�"���@���k�}w=�-��f���U���hEWއ�5(���%������H�鷝���<�~�X���%���f�1v+���e���ZU-���D�m�t4�K��&�S�m�٧z�5�j�����{�����To��u>=��d�(�~T��OD��4�~��&+~���� +��� ���ܤ�����oB���S��t_~כ�d7~ŗ�T~���D3~���4�~���&A~V���ʀG����óӣ�L��[~�(�Z~��ps�~z��c�~g��S�~b�$C�~U�G4�~A�y&S~
��µ��(����ˢ� +�U�n~�����~b�Cr�~+��b�~� S~�mC�~��4_}�� +&a}щI����ı�Uó��~Խ���~i�-��~$��r8}ꪄbv}դR�}ѝkCZ}ɖ�4E}Őb&m}����v��q����=sO�Њ�t�����u�����v�t���x,d7��y[Sʅ�z�C���{�3m��|�$6��~9�z�Tz��ۋ{���{����{�,��|msZ��}c7��}�S��~B��~�3.�L$T�m������/��ʡ��Âu�������ρ�rF���bR���RP�Q��B����n2��āG$o��(���t����d�'���U�v��J�Ն �oqR�3��a��s��Q���� +����������P����ⅷ��~���coW��5_�m�Py��AN���2q�[�\$ŀ�����J�&�^�A����=�ЌÅD��}��u��n|����_5���O�]�@����2P���2$��3�X���N�"��z��ݤ������|���/m��P��^�����Ot���8@��P��2-����$���8�'���w������̅��������{�����lڂ��e]߂J��Nz@Q����2�H��%q���������b���ԅK�����E�[zۃp�Dl'���#]K����N��Z��@���>1��% 1�ܵ��EĞ��*����N���jz3�3��k��i��\ԁ���N%��`?ʀt�>1�̏N%.~��{�ɕqb�(��rĚX��t�=�1uD|2��v�mD��w�^�by +N���z??��i{0��|�"���~M���y�����z*�ΐz��ӎF{)z���{�l/�|n]��}N�4}�?��~L0l�h~�"ۃ�ŴO������ȁr�Z��D���c�yҋ߁k8�b� +\U���Mj���>��1�0J�݁ +#�v�!�ڑ�����������*�هu����xڋ�Ij`����[��X��L��M>h����0,�b��#-��`�m��q�.�+��Ӎ��m�L���wӊ���i}��EZ�̈�L[�~��>�-�;0���#U������V�;�ӎ��
��� ����o��vNJ��h�����Z2�U��Kӆ ��=�����/�h��#}���ٮ���G��b���K���uu߉���gш;�)Y���K^����=w�O�#/݂���#����פּ�����l���8�K�E������Ct��6��g�ڗ�X;J�E��=,��t/��1#��$�欃�o�i�Y���d�6���S��O�1t��.fM���)XR�6�Jk���<ك���/��K��#Ԁч��r�;��X�u���G���ׁ<� +�sW���[e��6��Wƅ뛽I�����<��U��/���#耍�r�f����w�C�������2���ү�r��]�Ne����WT���%I��i�e<U���/k�͎D#��V����iq���r��D��t �!��u;t�lv�f*�Bw�W�)yI��zU;��{�-Έ.}!3�>~��>�:y +��f-z���"[������O�o�q�ˢl�J�d�Qz��*�mɎ)��`Ȍ6��S��Q��F��m��9͆���-i����"~����������p���(�N��~z�١�l��ԝ�`�ݚ3S
���bF���9��(��-R�@��"��4�f����P�چs�ܫ�yK���$lJ����_����YR�����E��ɕ29G�ސ�-<���?"����ؖ��/�Д"�l����x��^�jk��Q�W_�S�:R*�m��El����9���X-+���O"ȁ������q ���r��2�ls�y�xu"l��vn_"��w�Q� yD��ozg7�{�+,�S}Bև�~�x���yB��vy�x +��z�k��{:^`�|Q[�]|�DY��}�7��~R+/��5 �!�>�]��Ő���߄ +���w0�����&���>�����e�O|����p�����e裟�#[ +��&��A��^�{���Q����{K�B��pN����eT���Z����O�
�AEB�-�n:��N��0��k��&ދ��3��ԃ���� +��z����Oo��l��d��V�]Y��f�O��y��D����e:����0��Ն�&�� +$����m*�8��}�,�r����h]�/�c^����S��냰J1�N�y@W���C6��'�-{����$����q����|��X��r7�L�,g�f�P]����fS��&��I��@,� +� ��L֪���C��H�];��62}���*`���"����������s�H��i�މ�_D�z��Uѯ'��L��χ5C٤i��;���2����?*��_��"����߃�r����h��&�}^���Uz�l��Lf���C����w:��_�\2���D*����7#6�J�<>�(�ar<�ەhH�|�
^���&U0�ˏZL+�u��C���8:����2��n�*Ɠ��#k���>����q�<��g��䗒^G���6T�1��K��ސ�C_�~��:ܝ0��2��ފ�*�~��#��%�)Lj ��q�����g��^�]����JT�����K��L�C=����:Ϝ��"2��V��+ +�+I�y1�a8zS��'u{t���Jn�Õp8����q��ՠPr����s}tu"� +� +��{�$u��}A�"�
v�j��wʥ��ox��G�ByF��zu�z�d��{�T+�|�C�}^3Ā ~$��~��2�ɳ�Y���8���"����s� �c��So<�3C`Z�P3�t�S$���]�N~G�d��~;���F~2��k~.���~3�}r�~;��b�~`�ZR�~���B�~,3M~�|$�����}Z��<}W����}X� �}`���f}r�5q�}���b +@�|E��2b|���%E|݈z��z����z�����z��$��z��l{�z���mz��^{=��O,{���@�|��2H|d� +�z~�|��~�m%�S]���VN��f�?����0�#I��B���[�v�A���혠�$�^�ȃ���z��Nl4����]1��xN'���?[�b��0́�#n������r������t�8�T�3���Ɗ�yԂK��k@��\j�}��M��.�r>��ۅL0����##�� ���������P�8�̕ۂ��އK�*��x����jQ�J�Y[�����M����>��b��0���#���8�V����������'���:����ẃ3�bi��ϑ�[ +� ��8S����+��)�� ԃ������`���1�`�����{�-wЍ��=k +��Ҝm���ɐ������/vҍ-��j"���?]�����P߈�wD4�� +7ޅ���+ф�J!;�����K�6�����B����e�u�����ib���\�����P]�
��C؆���7�� ��+Ƀ���!d�
���8�Ӡ!���ٝ������u�=�Rh�����\V��Oۇ��YCw�4��7n����+��;�c!����ߙ7���=�����;�����t?����g�I�}[����4OR�F��C
�o7(�\�+�����!��J���9�7�F� �=��ύX�s|���g7���/[!�j�=Nۆ��,B����6���+����!���M�O��4�A��� ���rߋT�.f�����Z��(��N{���6Bd�C�c6��ː�+~�U�!рLJ֗ޟRl��ݜrn����pNsG�!q�fꔨs�Z��6u<N(��v�A���x�5T�Cz?)X�#| ��~����t���/u-~���vDrZ�w>f��xOZ�LynM���z�AA��{�51��|�)l�g~�Ja�N��{���{�}���|-qp�|�eP��} Y[�r}�M"�5~@�~�5��>)~���Z������ł �h�$�|�����p��9��d��큷X�����L��y��@��X��4��8��)��+����������Q�Y�r{��ۇ�o��~�cȑ9�aX����L*�ׅ#@T���|4҈���)����U�ؑ�<�цQ����z��E�xnҒ�"c����Wt�p��K��P��?��9�I4���)���� ��������f�9��y͔
n�e�#bi�+�VV����KB�ۋ�?��ĉ�4����%)����t B�a�Տ��_�F�}�К�x��S��mY���&aď���V`���bJӋp��?c�Z��4R�<� )���� k� ���z�*x���Il����Aa�X�GU'�KJ[�
�:?���4�ی)���� ����[�"�������-�>wR����kߑB�<`}���UN�ҙ
IQ>�����3ㆉ��)~�p�A ��E��O�h� +���!v��o�kP� +t��{�iJ��{�^��|�S��}3Gܒ}�<��6~y1Ԍa+'I���:���ȉ��i�~��=�
s���h����]u���R��'�G|�O�'<y���;1͋��['g�����c�ֈǢ���}џn�r֜Y�|g͙R��\Ӗb�bR
�u��G���s<>���1��!��'�r�(Dž݇�Ҏ|��nj�r����g����\9�ˉ�Q��䈫F����;��U��1�����'��ل���ׇ �L�`|1�@��q[�5�f��-�a[��G��Q�e�>Fd����;njډ1����'��V�>�����)�暠{f�јxp����Jeޗ��[)�ё�P����F �-��;��k�z1j���Y'���Tl��s�V����z��x�9oܚ_��e-�N��Z��h�&P-���vE��Ɛ�;:���1<�?�"'��~���������9��yҝ%��o,���d����xZ +��8O��0��EG�n��:1�ꌾ'��+����i���ǟحy-�٩`n��̥�d����Y��Ɲ�Od��#D��'�:��k�0�!'���g̃(�����mpwu�^o"l�ap�bA��rNW���s�Mx�Fu�B���wc8��$y.q��z�$��*|�u��~��;�&s�vͩ%u lP�Eva���w#WK��xDM�VywB���z�8g�?{�.}��}-$�O~wۈ�׀t� +80���0.��A�a%G�だ�����~�#��t��H�SjO����`��SUޛb��K��Մ�A�g�!8���.����b%m�:�͆��~9�b��s륙��i����_u�I��Uc��K��:��A��·7�h�+.����L%������?��}s�Ғ�sD� �$i�R��^����"T��6��K=���JAk�I��7Ǐ�o.��u�%�� +��Q����|��\�Qr����uh��Ԕ�^u�8�sT����~J�8��A)�ь�7��l��.~����%�������1�C|���q��#��g�c�a]����T�A�ZJ��Ƒ�@ޒa�\7k����.g���V%ƈ$����Ʌ�{i����qY�à�gY��]i�[�S��ܘJ+�d� +@����7<����.P�3��%̇ˈ�҄t�Xz̧)�lpӣo��f柸�]� ��SP���mI���@e���97�T��.>��%ч����0��w��Mn'm���o�c���qPY訉r�PJ�=tmF��v%=v��w�4 �~y�+0�B{d"��
}|�~�w��tAm.�OuWca��vcY��w_P�@x�F���y�=Z��z�4��|=+O�M}�"ߎ"~���v~��zRl��1z�b��{oYA��{�O¢K|�F��}>=<��}�4��~�+k�t�#�R�MI�W�u벼�;l.�-�\b����qX᥋�uOu�W��FQ���=����4�2+����q#Q��������ub�І
k��K��b��QXw����O���~F�L�/<��0��4���+����J#�������t���k(����a��4��X���N'E˛��_<̗���4�s��+��T�#��7�X<�B��tG�g��j���a���dW��j��Nt�@��E���d<����3����+���#݊��|~���ws��ٖIj*�e��`����WG�ڐ�N#���EQ���_<��s��3�^��+Î?�%#������)�s:�X��i���z`9���CVߢN��M̞,��E� �`<R���3ґ��+ÍƉ�$���{兼��r����i9�q�8_Ѧ��V���M�����Dҙ��0<(���b3��{��+`��$'�L�M�c�r8�w��hҪ��_}���rV:�t�(MB�Z��D��D��<�7�e3��'�+����$6����)��rlԾ]o_c`�[p�Z&�Qq�Q:�@sAH��4t�@<�"v�7�x]/��z%'���{� ���}���%,l��ucF�+u�Z�3v�Q,�*w�H��(x�@<�!y�7�{@/ؚ|�(0��}� ���5�@lk��z�c��{Y� {_Q�{�H{�!|�@7�}E7��~/�~�(^��!/���n�d�:l-���]bܵ9Y���*P���:Hb��g@-���7����0�)�5(��4��!p�K��lj��k���b��ۅ=Y����P���XH7�'�@�$��7��<��0�X�b(��m�3!���� +���k�����b;���Y.�1��Pk�U�G��f�c?�g��7뛁�0)���h(ڑ���!��τ2r�6��k7�+��a�Z�mX鮃�P-����GϤ���?џÉr7���X06���C(���8"%�0�8����]j�|��a�����X��ܑO��CG����?��+�7֚K��0A�k�)����"S���&����j��癜aW��JX_�8�O��Z��Go�~��?�����7Ǚ���0G����)4����"y�)� +��t�p��_d�r`��T�t�yD�u���5wj�`&�y���<g�����i��Y�WkB��
l���n���t
pH��dq��CT9s���D�u`��4�w"�&�x܈w�`gN�i��i"�e��j�d�Ll��l�Fn>�vsuo�kc�q��IS�sZ�DTu��4�v菊&�x��0�$xci���x�kר�y=m�y�o݇�zIq�wz�s�f^{quSU�|wE|�x�4g}�zh$�~L|2�v3s0�v�tV��w�uv�jx2v��x�w�u�y�x�eTzWy�T�{&z�Dk{�{�4|�|�$�}�}���tU|d�u(|��
u�|��v�}6��w�}�t�xu}�dbyZ~QTzH~�C�{63�|?$�}��rۅC�/s˄��^t��9�nu��҃{v��us�w�c�x|��Say��gCkz��3�{���$�|����q��!�pr��͡�s����t��o�Bu��Xr�v��Bb�w��/R�x؆B�y��3fz���$�|�q�op��د�q̔��Kr�����s��t��q�v�Ha�w&�}RxL��B�yo��3:z���%{��ٽ�o�s�vq
���r'�珊s;�Q�tU��p�uq�6av���Q�wэB3x���3z��%{8���oO��+pl����q���qr���sÚ|o�t�+`mv ��Qw^��A�x��)2�y�%7z�;�Qnװ���o�o��q +o�
��p1����qN�|�rx��m�s���^�t�O�v>�IAw��j2�x莔%gz2���l~�i.�b~�k^�'~�mt��~�o`�~�qCp�~�s(`�~�t�P�v�AI?x�1��zT#�|;�~|�r +��|�sT�w|�t��}u�~�}Av�oi}px_�}�yHP:~z|@�~t{�1�~�|�#?5}�v{z���{A{!��{�{���{�|}i||~nV|d}^�|�}�O�}E~@Z}�~�1T~.~�#d~�k��y��M�y�� +�S�^x�����y��zy��Zksz
��\�z��=M�{[��?5|�0�|��^#�}.����v̜B��wN�ؖ*wҗp��xY�
yx��j�yw�|[�z&�9MIz��>�{���0�|2�E#�|ńұ�v9�q�Yv��\�w6�G��w3x'xW�4i�x�5[Ry��8L�zn�3>�{*�"0�{҉$|k��duĬ��(v7���v��4��wC�ww:wڝ�ixu�
Z�y3�MLSz +{v��{�g�|OY��~|�K�g}�<ހR~4.�@~�"�-X�������݀\�p��*�U���/t�ցg��X���J���<����.����"N���� +�@��Pz�ђ�C��k��7���],��9!�~��+����L���L��i���`u���h��t��\x��,P�z�IC���V7���g+�9��!�~���������ރ +�o���b�?tt����h)�.��\���O��3�vCN̔�7ea�/+�~���!�~��~����h6�ۑ~j�����l�u�n�iB��p�\��r�O݉�t�B�Vv�6Q�x�)��z�넛|ƙ|��oڍ���qu�c�Fr�t�t;hY�ru�[��wOC��xeB��|y�6$�<{8*�|�D��~<��Zw5�1��x0�*�y
sԋ�y�gu�gz�[8�{XN���|'B.��|�5���}�*�i~���I����)~��㍃~�~�� rȊ�:f��okZz�-�N$��Aօ��5�J*�Ԁ�Ղ��͕M�"�ĉ�����}ы�1qƉۄ�e����LY��j��M��X��Av�V�5��O��*!�B�Y �.���W���r�Ћ�|��h�pԉ-�dއ�� +Y�ӈM�ɇA�ˆ5s�Ņ*��� C���*�댨�ˇl�*�m{Љʐ�p���Dd(�p��Xr�O�L��L�y@��R��5D�M�?*�=�� n��2� �̆n����z�F��o5���cu���LW܅ِL�ڍ�@b�㋖5
��Y*�҇0 �����Ջ����o�>�=y��ۜ�na����b����WC�p�-K��s�E?��|�S4̂|�h)��s�� ��[��`�����䥉y'���]m��M��b �0��V���K'���?��%��4��&�H)�$�� ʀ�����L�É���x~�=��m���a����VT�ϛ�Jӗw?a�ݓ'4b����)�� �և�ݚ�hR���6j�y)��l�mx��n�aʑ�p�V@�}r�JX��t�>l��v�2Ӊ�x�'���z���2}���o�����qx4�ur�l��os�a�qu^U��tv�Iߌ�xJ>%��y�2���{E'��$|��o~��^��v��V�vww&�Nxek��Uy-`F�gz T��{z�Ik��{�=��|�2��!}�'̆p~�`��nj'��}Y�0�X}�v�=~j̐T~T_~�p~�TZ��H���Y=��$�2��x�'�Ҁv��.������8��h�u�Y��i�{�}^����@S��Ƀ
H����=X�|��2��قZ'��7�-탓���NJ����.t,���ki�̈�^����S$�/��H���)= ��Y2`�H��( +�ħorF�0�<h����^Ē��U���{Kt�[�A��!��8���.؆���&�l�F�3�ezƩ�h�pܥ�kf�7m\���oS ��q Iy�Ws?��/u-5��w@,=��ya##��{����}�y��odp0�dp�f_��ra\y��s�R��uNI �Iv�?V�+xq5��z,W�{�#g��}P�y5��u�ot�*v�e���w�[뜝x�R;�ty�HŖHz�?�7{�5��/|�,n�(}�#��1~�U�U�$xR��{�n��|Od���|�[O��}.Q��v}�Hb�N~:>�M~�5��\R,��h�#|������)w�����m�!��dT�с�Z�����Q@����H�}��>�����5e����,�����$�˂����%vף���mA�X�Wc����Z4� +{�\��|{S��\|�J���}|B~��~9�~�1��sU)����!��*��҇��Dn<�,�2e-��D\4�&�NSQ�s�KJ����\B@��y9ΕB��1�����)�� +��"3�n��&��/m��L��d��C�L[��^��Rퟰ�fJR��� +m ����d5���([]���IR���WJ�T�xAЗ���9�����1��c��)��ą3"��#�p�����l���2c����Z����R>�e�=I���A�� ��9k�o�G1w�ه�)�<��"����}�2�nl"�P�`cD�O��Z��p�Qܝő*Iq�#�[AX�~��9@�ꋾ1`�W��)닿�&"Lj'�s�Ą�k����{bΤÙ^Z��-Q��:��I*����A ��Y9�x�1K�鋭)�U�l"هŇG;�j�rk�1�pbb�K��YȠy�Q?�ɘIH�6��@�8��� +p�f(vWsU�w�uD�yw 4Qzkx�$x{�z�ǐk�o=�1m�pǦ�o:rF�Vp�s���r#uu�s�vqe%uw�T�v�yDQxz\3�y�{�$�{(|��cizxʵ(k�y_��mny���o +z���p�{4t}rE{�d5s�|iS�u�|�C�w4}�3�x�}�$�z�~p�hg���Yiˁ��RkՁv�Vm��L�Yo[�-sqq�cVr߀�S7t���CCvj��3mx&�U$�y��|f����hc����j�����lo� �nK�+rdp&�Pbzr�tR�sᄒB�u���39w���$�yh����dԓ��gL��@i��S��k�����my�q`oh�ta�qV��Q�sD�>Bku/��3w��$�x���:c�ɮ�fd�2��h����hj��9�l���pn��`�p��%Qfr���Bt��^2�v���$�x��`��c,���De��B��g���Tj +��~�l��o�n'��`Gp1�nP�r:�IA�tB�2�vG��%xH����b��B�e�M��gV�[�Nio�r~k���n�m���_�o���Pyq�A�s؎�2�u���%2x����a��ګd}�8��fӭ��oh��}>k�Xn:m ��_!o<��PqZ�.ALs|�U2�u��x%Gwˇ��ar�D�Sd��fg����h��:|�j���m�l��]^�nߞ�O�q�7As3��2�ul��%Xw��;��tqdį�uKgd��vi�Hv�lN��w�n�p�x�p�ayhr�Q3z]t�Au{Xw1�|[x�#
}r{��q�n��soƞCt qe��ur�+vtdo�wu�`x/wPPoyNx�@�zoz'1�{�{i#+|�|Ǻ�o�w)��q!w���rjxč1s�y�}�t�z>n�u�{ +xڀ*1$z0�
#\{���l����"n9��\o��4�zq��{�r{��l�sۅ-]�uI��N�v���?�x3�0�y��H#{�f�=ke�/��m*����nˎ<�7p8��zqq��zk�s�\�t���M�v#�X?Jw���0�y�l#�z��ճ�jw���DlE�h��m�;�om�y{p�j�rs��\3t��Muu���>�w,��0�x��f#�z-��ni���k����m7�>�n��hx�pI��j.qړ�[�sx��M +hCps��Z
r(��K�sꗉ> +u��@0mwm�$2y$�ҳ�z�dK�n{g��{Ti��@{�k�y~{�n'j�|Bpe[�|�r�L�}>t�=�}�v�/?~]x�!� +<qzł�.�{���"V|��=��r$���sO�p�ot^�>��uE�s�v.��e�w��W�x��I�y/�h<z9�3.�{3��"�|&���Fq3����rj�ȎHs��怓t{��r�uu�%e3vr�PWNw��{Ilx���;�y���.�z
�"�{��ܨp����q���2rЙ��sϖ�q�tӔud{uۑ�V�v��cH�x*��;�yN�5.~z^��"�{a����p +y�*^��{+Z�_|��4s����t��߃qu�ug��v�h܂�w�\n�8x�O���zB���{&6��G|=*g�}F���~b����{'���s{����$|"tR��|�g��v|�[��&}|O ��}�B���~e6b��~�*n�jA�8���s���S�F��e��os>�ǂ6g���Z�F��N��&��B1���6-��e*mց3 "�����W�֊�P�9~7�5��r5���fʆ�Z"��8M���qA�|��5�j��*eK� U"�J�q��#�����}1t��qOI�eT%��Yy�_Mg~���Af~���5�~�!*_~Ԅ� �~��l�K~ژ]��~ߖ�|;~Ԕ�pv~���d�~���X�~~��L�~|�{A ~��h5�~|�Y*S~j�] �~I�m�E~J�c��~Z�{M~V��o�~5�c�~�iXI~��Lp~�@�~�I5F~��*B~�� �}��M�A}�a��}�z�}n�}ϝ^cL}�� W�}���L}��n@W}���5}���*1}��3 �}�� +�N}��X�$}���y�}��3n`}{�mb�}j��Wd}\��K�}^��@}f�_4�}m�I*$}|�T �}x�����cŇ7�f{{��i +o���k^c���m�W刌pK��|rV?t�{t�3���v�'���yD˃�{ȑ(��kH�ꋭmRzs��o6n��vp�bшmr�W#�ht`K�sv?��w�3m��y�(��{a'�}D���Lr����1s�y?�%uAm��,vXa��=w{Vl�Rx�J��xy�>Ʉ�{3R��|4(+�}`x�X~��T��yكO��z�x��{Cl���{�a� |UU��E|�J��}�>~��~3:�&~�(?�u>���ߍ��������*w�с;k�� +l�i+��n�_�{p[U�=r7KI��tA��u�6���w�-C��y�#��{���}�{���qYr��r�hK�lt^f�;uDT��v�JΎ�w�@Ό�yU6݊�z�-P��|#$��}�g�'z���w�q�Xx�gj�/yZ]��zSߏ�z�JL��{�@z��|�6���}t-\�~S$I�E;����.y��d~.p"�=~pf��!~�\�~�SH�:Iӌ��@&��6��<�&-[�h�y$m���� +dk�I�G[�iSg��fJYB��4�G:c�ԍ27�v��*y���#����-����lG�]�Sc�ϛ�[��?��S���J��<��B��Ԓ::�x�K2���*n��# �p��I�?�li���ea�gyX��mi�O���l!G��on�?t��p�7&��sk.��#u�'<��x_ڌ_z��:}-i�:j�`���l�X,��n�O���p�GS�&r�?E��t|7�Uv|/ +��x�'l��z� +�Z|zU�I~ah���p�`�rXW���s�OG�SuG ��v{?��w�6��=y{/��{ +'���|� s�t~��vxg�Lv�_���w�W/�mx�N'y�F���zq>זs{m6�4|o/� +��UGMњ���E�L�V>D���6��焂/&�Ʉ(����!N���[����e��y�']��/�hU���M��̉�E�����>�m��6��N��/!�3�(%��:!r��l&�7��e/�ő?])�{�U)�?��M+���E_���*=�ӊ�6`���n/���(,����!����gT�ʄPd��!�=\��ݔ�T̛���Lޘ}�.E"�f�b=��O��6A�>��/�.��(/�$��!��-�?y�q��d'��� +\U�X��T��&��L�����D��F=��� +6)�ٍ�.��̋L(2�ȉ!��܆���*�/_j��e�Wi��g�O���j!Gѧdlb@Z�"n�93��qK2��s�+�wva$f�Kx��{;�R}z_E�k�W@�m#Oa�n�G���p�@F��r�91��t�2�fv�+*�>x�$��z�t�|���W~�^��yqV���rAO ��s~G���t�@,��v[9(�^w�2�=y�+M�"{5$�|�ƌ~G��|�^}�v�V��FwRNۧix)GM�oy@�Vz%9�/{62$� |T+i�}y%�$~�
�A�W����^��{�VB�"|7N��I|�G�Y}/?�I}�9�+~]2*�)+��3�%H�H�MS�t������u]Ԭ���V�!��N`�Q��F�l��?h�8��V�F21�Y�|+��g��%{����������B�I]����UϨ:�FN.�z��F����|?����88ꘝ��27����+�����%��׃^̉�)A���]N� +Zt�y-K{v?zN=w�{e.�y}|Y!�{"}Y��h�z���j�{7�rl�{��=ni|)u�p|�g�q�}Y_s�}�J�uK}�<�w~U.�x�~�!�z�~��gB�Q��iZ���kS��m��t�n�Of�p��X�r���J`ty��<`vY�;.�x*��"&y��e�5e��rh����j0����l��s�m���fo���W�qӅ�I�s˅<u��.�w���"^y��ܩ�d���&g�4�|i-����k"��r�m�EeEo!��WWq(��Ins2�V;�u8��.�w/��"�y �+�qcǜ��f���ghS�`�jV�rlc��d�nu�]V�p��Ir���;�t��5.uvȆ�"�xʄU�=c +�*��eg�7�_g��=~�i��<qQk��8c�mڕ*VDo��H�r)��;ctP��.ivn��"�x��Z�;br�3��dѨ��|g��~i�Kp�k8��cVmW��U�o���H\q��;7s�.^v"�#"�xE�7�ka���dV�Ċ�f��l}nh��pjȢ�b�l�Uwo"��Hqd��;s��$.Vu�z#x��v�_���w0b���w�e���x\har�yk +v�wPUBxx�Gry9y�9�zj{,�{�|3 �|�}Y�mo�y,�Wp�yˊ*r'zg|�sYz�ovt�{�b.u�|1T�v�|�F�xN}b9�y�}�,�z�~] �|%~Т�m�[��o`�O��pʁ={�r�#nrsb�aTt��S�v��F{w���9\x퀵,�zD�!{��E�lz�B�]n"����o���z�q�myrt�Y`�sم�SCuS��Fvׄ(9xS�_,}y���!J{����kQ��#m���nn��Ty�p)��l�q���_�s�%R�t���E�v@�R8�wͅ�,tyD�l!zz���jn��l3��hmޔ�x�od��k�p쐶_)rw��R0t��E>u��t8�wT�P,jxۆ1!�zV���i̠���k���pm3�hw�n���kpP��^�q�@Q�s��uD�u;��8rv劻,_x��!�z +� +��i9�E�j����l���wn:�yjvoΛ^qc��QIs�'D�tА�8Fv���,Ux1�\!�y˅ޛ�h����Nj{�ق�l2��vqmˣ�i�oc��]�p���P�r���DZty�68"v;��,Mw�!�y����m|�_\��}bm�}5e\y}Vhk�}�j�_}�mdQ�~o�DY~ar�7E~�u*�2w��z,��zOg��1z�i愉{7lw�{�nj�{�p^|]rP�|�tC�}Pv7}�w�*�~\y�P~�{қ�xo�x�q8� ytr�vny�s�i�z�uY].{v�PK{�xCf|Tyv6�|�z�*�}�|�~D}Y�Jv?w��wx{��w�y>uWx�y�h�y5z�\ky�{iO�z�|!C{m|�6�|6}�*�|�~�}�~���t�o��u����v��t>wV�g�x�[�x߀Oy��B�z��$6g{��,*�|W�) }"�&�0s\��Et~��Hu��s*v`�wf�w:��Z�x�nN~y��B)y��N6+z삷*|{ʂ C|�����rF�g�s{�V~7t��7r;u��f&vt��Z/wc��M�xc��A�yi�O5�zf�*x{Q�� u|/����qk��r��(}>s˒jq`tː�ejuɎ�Y�vƍM{wҋ)Aqx�I5�y�j*qz慗 �{Ѓ̓�pŝ)�r��|Us*��p�t2�@d�u8��Yv=�aM wQ��Axj�H5�y~��*gz��/ �{�����p8�e�'qz��{�r���o�s���d(t���X�u˕�L�v�\@�x�5dy ��*]z9�� �{>����o���mq�z�r9��oYsK��c�t\�9X+un�pL[v���@�w���5Axԍ�*Uy��� �{ +�.����_@���<bH}/��e0q"�sg�e�"j�Y��mJL���o�@#�wrw4�Vu(<�Ew�Ӂ>zf���)g"���ih{ހ�k�o��m�c���o�X!��q�K��ys�?��lu�3ހew�(R�my�.�z{��Rn҆5p`z�Fq�n�CsNcHt�WZQv;K]`w�?cuy&3��z�(f�{�}�}r��}Vv\��}�wHyh}�x)m�}�x�b4}�y�V�~z�J�~P{�?~�|_3�~�}1(w}��8~Ȏ�{�}��s|*~x?|t~Zl�|�~�aX|�~�U�}JU}lS>�}��3y~�(�~d�~���-z{�/{��w{r�Pk�{���`{|��U@|V�LI�|���>Z} ��3H}��&(�}Ӂ�@~�j��yv��z
�vz��0j�z�:_�{M�KT�{��\IJ|�a>|��b3|��h(�}V�xs}�����x���yC��u0y͐j.z=��_z���T{�nH�{���=�| +�32�|���(�|��}B����w���x���tYy2��ity���^tz��S�z���Hu{�S=h{��2�|��(||����|�z��wp��~Ix�As�x���h�y+�]�y��VS,z&��Hz���=%{.��2�{���(u|5���|��:��w +��=.{Z�"z�q�{xhM�|^��3|�T��J}K +R<��m9I���oyA^� q�8ǎ�t0K��vb(>�mx� ��A{d�?}Oj��|l�b��naZ,��p'Q��uq�I>�,s�A��uf8���w60E��y
(^�oz� ׇ[|���n~zj ��r�aї�s�Y|�Pu6Q�$voH�w�@���y8b��zO0;��{�({��|�!
��~?���i?��x�a�MybXޔz4P���z�HW��{�@Y��|�83��}W00��~!(���~�!@���^���hn�a~1`j�3~�XU�~�P�IG����@���8��:0$����(����!n�!�1��Z��g��Y��_ٔ>��Wޒ/��O��/�rG��*�G?"�7�6��0�T��(��o��!����{�Ȃig#�w�7_O�h��Wg�b�6O\�i��Ga�q��?��y�I7É���0 +����(����?!�����M�*f�����^Ȓ���Vꐨ��N�����G�Ɗ�?i�މ7���E/�0�(��\��!ȃ���H���f���^G���V}� +�5N����F͌4�?5�[��7u����/݆���(���E!ك-��l���[e~�^��]בw�#V$���>NZ���GF����@?���/7X�$��/ˆW��(����z!�ކ}��L��b���`�[�@ctS+�f:K9�h�Cm��k�;��nz4(��qJ,���t%m��v����y�?�P|^bn��f�Z��eh�RȞQk"JߛnmUC&�ro�;��lq�4��tV,���v�%���y���{d��Z}�aŢ�lVZ��n/R@��o�Jz��q�Bۗs�;��&ug4�NwP,���y?%͋�{(=��|� ��~�a4�9rYu�MspQ��qt�J��vB���wu;G��x�3�3z<,��{{�%���}z�)~h\���`���w�X�x�QN�8y�I���zeB@��{E;��|-3ُ:},Ȍ�~&��~���`�����_���|�Xi��}�P�.~Ic��~oB��~�:�T3̎g�,ԋǀ<&?�/���$��[��__���$X��EP��F�TI ���JAғ�H:ѐP�K3����J,ߋ�H&^���L ��T:�Ăb^으�;W����PD�n��Hڔ܆A��?��:����93����,�v�C&t��� F�|�iq�C�^���8W3�@��O喡��H����Af���:���.3��e�5,މ܆7&��`�H e���j���^�+�V͘�� +O�����HP�b��A4��A:c�a��3��܉x,ىX��&��憔 }���Gł��/]�����Vs��1OP�`��H�Ԑ�A�^�:G��]3u�l�q,Ԉ�&����� ��C���9��Y�faOQ���c�J��flC`�Qi<~�xk�5뛔n�/K��q�(ݔt�"ѐ]wz
��z*��`|�X�[f�Q���h�JS�CkC8��mR<f��o�5�"r/^�kt�)��w#�y�g��{���c}�X���lwQ/�&nJ��o�C�1q�<H��sf5ޘ�uY/k�'wa),��yp#N�{k���}9`��~�X��q�P̥�s +}0���~�����W���wPt�Vw�I{�x�B���y�<�z�5��x{�/{��|�)k��}�#��"~�?������WV�a|P?�0|sII��|�Bw��}v;�~
5���~�/��L)����#�P�����W�J��W�A��P�(��I����BV���;ژ?�15��Ɓg/��S��)����$�����w�-����ZVʤ?��O̡3�$H���B0�̄�;��o�I5���/�����)ɍ<��$D���c��+ӄ)�Vk�_�O�L�aH��&��B��;����f5��H��/���)ٌ��e$c�^���_�����V +����O6�}�oH|�\�]Aܙ%�P;���L5����J/��P�')���${�ۅ�4���*�_�U��˒�N��͑-HQ����A����@;o�U��5{� �z/��ԉ�)�Y$��q��N����I��g��fz[���hJ^Җ�jb��k�eEx�m�h5j!o�k[=q�m�Las�p�=�u�s�/ +w�v!wz x��Pb�d���e g[��gXi��=i�lw�k�nJim�psZ\p"r�K�rgt�=.t�v�.�v�x�!�yIz��_�nH��bto��0d�q>��gir�vgi�tFhl?u�Y�n�wK q+x<�s�y�.�v{!�x�|T�]Iw��` wƑ�b�x���e�yQuNh2zg,j�z�X�ms{�Jvp|:<Yr�|�.ouB}i!�w�}�L[.؞9^2Ő5a&��Ad�t9f��fGi��Xl`�I�o!�<q��.Wt��!�wO���Y��q��\�����_��сb��0s0e���ekh���Wmk�4Itn[�;�q8��.Qt +��"1v݁�W��ݛZ[I�O��^��Հ +�:E�p��8�s*��,^u���!cx�J��]Z�?� `�h�\bȒ�x�ed��k�h +��_j�� +Rm^�)E1p�@8�r��R,]u;�h!�wy��\h�
��_:���ea��@w�d���kgU�D^�j��Q�lď#D�o~�8ur5��,]tއ)!�wy����[��А^��у�aR��wd��jxf��w^i{�9QQlA��D�o��8WqՌ,\t���!�w>�c��[&�|�O]�����`ȥ�vxc��5i�fA�U]�i�aQkזYDun��?8>q�� ,\tT�!�w���rD[��s^i��s�a�y�t�d�l�u�g�_zv�j�R xm�D�y^p�7_z�s}*�{�v2�}Sy��o c��p-f�Fqch�xFr�kkMs�mV^suFo�Q>v�q�Dx t?7y�v�*�{x�<|�z̜�lRl�:m�m���o?oov�p�q&j0rDr�]�s�t|P�uYv&C�v�w�6�x�yk*wz2z�t{�|h�i�t:��k�u<�HmXv@u�o
wHi4p�xK\�rbyPO�t&zNCu�{G6�w�|8*nyt}�{'}�Jh|>�,i�|���k�|�t�m�}Wh@og}�[�q9~OOs"~eB�u~�6bv�~�*lx�-�z�_��fp���hq���jn�os�lf�)gXnX��[1pL��N�rN�QBFtW��6-vW��*ox<�8 &z�ϖwe����g,��~�iE��r�kY��f�mh��Z�oz�N9q��A�s��5�uń*rw�� `y���Sc�H��f��}�hM�.q�ju��e�l�� Y�n��vM�p��A�s�+5�uC�*swS�� �yQ�:�\c
�͈�eK��|�g���qi��ce2k�/Yqn��M_pW��AVr��D5�tЈ�*sv� �y�9�lbY�.��d���|f��pji$�d�k\�&Y +�(�x��N�z<���Wh��x~�j���s�lZ��in!�m^:oߙ@Szq��HesN��=]u�62�v���(�xo�~ +}�y &~Sz�j~�|��}w�q�|�xFr�rKx�t9g{y�uv\�z/v�Q�z�w�F�{�y4;�|<zi0�|�{�&�}�|��~?}�.u�x�{�v�y�q5wdzSf�x-z�[�x�{�Q(y�|QF?z�|�;a{_}�0�|0~ &�|�~��}�I��tY�z~uE� +pv0�)e�w�?Z�w��XP{xҀqE�y��|;z���0�{���&�|X��?}����s��ydt�_ou��d�v%�hZAw��O�x�kEKy��:�z�O0�z���&�{ւAy|��Ȃ�r��xls��nCt6��duR��Y�v\��Ohw`�iD�xi�B:�yr�0|zs��&�{d���|C�с�qA�kw�rZ��m�sy�tcct���Y!u��-Ovό|D�w⊳:Ex��0[y��&�{�W�{��p��v�q��l�rܗb�t��X�u4��N�vX�\DWwr��:x��w0=y��&�z����{��{�o࡞v=q �lcr]�[bqs���X]tǖ�Niu���D!w��9�x0��0&yK��&�zl��{s��q��Z�x/��^im2a�c^��d�Xԃeg�Ni�j�C���m�8���p�.?�[s�$E�7v���!y��߂�bYv܂mel��g�bS��j+W��l�M���o(C�sq�8p�[t.<�Iv�$q�Bx��D{�d��i�u��Xk�k��;m�a]�7o�W �3qlM�1s[B��7uE87�Cw/.9�Sy$��hz�r��|�~ ~�p�ta~|rj�~ys�`�~�t�Vo~�v5Lz~�w�B:x�8Cz8.6y{�$��|���~,|�|�w}sO|�xri�|�yT_�}@zU�}~z�K�}�{�A�~
|t7�~d}/.)~�}�$�~�~�7r{�{W~!rJ{�~�h�{�~�^�|-!U +|�aKZ|��Aj}=�7�}��.~ +�6$�~Z�oL~���z�z��qRz_��g�z��R^){9�Tp{���J�|�gA|�� +7V}��.}w�Q%}ӂ�~&��y�y�2poyg��gyى�]�ze��S�z�
Jv{`�,@�{�<7"|s�F-�|�[%}]���}���x�x:��o�x��of`y�>\�y���Syz@�xJz@|{_�z6�{���-�|x�[%|����}b��x
w���n�w��8e�x|��\�y��Sy���I�zT��@Cz팅6�{��Q-�|�+%|��!}�Hwavߝ�niwh��e[w��z\%x��R�yF��I�y��@z��<6�{'�q-�{���%$|X�(#|߄�x��C[:o@�^�eÉ�a�\"��d�Ru�hH�+k">�`n!4���q+o��t,"h�FwDփ�zrw]��b3n*��d�dԇ�g�[E�&jQ��kl�HQ��o#>��q�4̄jt++|��v�"��GyH8��{�v
��h�l���kc̆m#Zo�zoQ��qGńNs>/��u 4��Mw"+���y+"e{,�� +��+���#Z�������q�$��h��S_����W"��0NL���E�r��<�m�33�l�y+~_��#o<�2���pGQ��g���_N~���V�~��M�~㊹EY~܉�<�~��A3�~��+n~���#}~τ} +~��qo�~���g8~o�W^�~U��VD~M�YM�~U��E~`��<R~k�3�~r�/+_~u�W#�~s��-~k�n�}�_f�}ݘ�^f}і�U�}͔vM]}�HD�}��<-~��3�~�(+T~��#�~*��J~-��o�[�f��c^�]��a�U�BeLF��h#C��LkM:��nX1j��qb(·ft ��.w� �z�n$��be��d�](��gNTi�ni�K��lvC&��o:9��q�1X�dtK(�?v� �&y�l�&|<m��hrd��@j�\E��l�S���n�K��p�B��dr�9�Kt�1E�@w)�9y@!+�<{_ÃT}{k���n�c��tpS[p�Mq�R��?syJ��.uB<�v�9��&xC10�9y�)�P{m!\�m}��~�k��t�b��v
Z���w$R\��x7J��yOAׅ�zk9m�"{w1�Q|)+��}�!���~�\���j>��z�b-��{�Z��|*QԆ�|�I���}]A��}�98�D~�1��)3���!���6��L��im�P��a��g��Y����Q`�Ɂ%I7���?A@�/�X9 +���a0�߁i);�2�{!ցs������h��H��`߆m�2X�����P��酁H�/�A�v��8߂ل80قD��)<���F!����K��h�k�`J���tXy��P��$��H��}� @Ȃڈ8��F�0����)6��"���F�Rgw����_Ą萎X �/�eP<�~�HU�猿@��X�V8��̉�0��>� )/����"� �(k���f���_R�P�^W�����O�����H!�n�@r��58w�i�0��މ�))�T��"!ӆ�W�je��[�]˗�_4Uٕrb\MɓtejEƑkh�=��dk�5э~n�-ċ�q�&.��u��x/N�V{Fd���b%]+�ld�UH�hguMC��jEW��l�=���oX5��r +��~-��[~�&Ӆ +Cy���L<K�G��4���-�����&�[�8 ]�
�~2�ށ�`v�o�sY;��fQ�y�KJ��-�C:�܃�<����4نC�k-��� &��Ă� �����h�d��_�����XÌ +�QQ�����JA�Z�8B����;��܆�4����-��k�A&��6�| ��������6_{����XS�F�Q+��&I����Bˇw� +�c ����WL����Pđ��J@���C��F�U=L���7"����0���Y*І��%�B�h����>�U�
S��]LF��_�E��Bb�?�e�8ě�i2Ř<le,���o�&ّ�r�!Y�tv.�Ey1�}{�R��yb�L�Kd�Ef�.gt>�+j8���l�2���o�,̓ar�'�;up!��$x8o�z�v�|}'RD�_g�K��ii�E�ql>��ynC8��Qp�2��r�,ڑ�uY'+��w�!�z!��|Cц�~5Qˢ�m=K,��n�D���p�>q��rc8c��t>2���v,ߐ�x'I��z" ��{���5}���(QK�r_JԞ5s�D|�ct�>F��vc8K��w�2���y?,���z�'p��|7"B��}�A�\~�o��Q ��wmJ���x9DR�#y>)�ez#8>��{)2���|3- +��}?'���~I"~�"F����-��_��PŞ[|.Jk��|�D.�
}>�c}�84��~O2���~�- ���'�,"��f��
�H�Ł�Pu�4��J.����D���=�i�,8$���i2���-/� ��'�X��"ۇ��&�U�K9�C�pP�4�%I晖�C̖���=͔n��8�˄�2�� �b-5�]�'�����"�����;i�ՃOț/��I���� C����=�����7���o2��k��-8���.(��j#����?�]� ��|��O��7��Is�ӌ�Ct�c��=����7�a� +u,/u�wD 9xWy���Z�i-��]�kC�:`�mI|�c�o7ofq
a�iJr�S�l#t�FRovd9q�x,t�y� Ww�{^��W�q�&[Ss<��^�t{xa�u�nd�v�`�g�w�S?j�yE�m�z8�p�{+�s�| rv�}��Ukz���Y{�l\�{�zL_�|mc|�_�fP|�R�i�}VEXl�}�8io�~+�s"~[ �vB~��1S\��%WH���$Z���y/^e�Jl#aʂ_1e1��Rh���D�k�48?oF��+�r��� �uЀ9��Q��B��U��F�Y��Qx8]�ckS`��q^�d3�zQ�g���D�k,��8n���+�r��!Cup����P"�X��T\���X[�w]\�wj�_���]�cS�(Q%f�~Dfj���8n�&,q���!}u�✊N��=��SJ��7W_��v�[��i�^ג;]|b���P�f?��D9i�!7�m���,qG�Y!�tڃ���N�
�Ro�<��V��\u�Z^�kio^%�m]a�aP�e��PDio�57�m6�,'p���!�t����Mp���qQ��#��U㣋urY���i]��C\�ae��PSe5��C�i ��7�l� ,4p��V!�tv����hV��vi�Zi�:kk^x�ma�k�n�e^�p�hPQ>r�k�C�t�n�6�v�q�*Ex�t��z�wd'_���fSby��hreZw�j~hj�l�j�]�n�m\Pup�o�CYs'rv6�utt�*.w�wPy�y��v`�h.��crjd�e�l�v;h2n�iij�po\�l�rZO�oVt=B�q�v6Ct\w�*v�y�Ny6{r��^p��$`�r��c�s�uf(t�hnh�v[�kOwCOm�xyB^p�y�5�s`z�*u�{�vx�}��[�x�^�y��Ta�zhs�dnz�g~g.{�["i�|N�l�|�A�o�},5�r�}�*u?~#�w�~���Y���\]��*`/�r�c +��f�e��Zoh��Nk܀�A�n׀�5�q̀h*t��C ww��)X�Ɋ.[�-~'^ˇ�ra͆�e�dچY�g�DM�k��AXn��5�q.��**t*�6 Jw�w��V����Z8�I}:]���q:`���e2c�,YOg��M-jD�SAmu��5up��p*;s�� �v�����Uy��"Y,�N|^\��op�_ےid�c�]X�fU�JL�i��/@�l��5lp&��*Ls[�� �vs����T����PXT�.{�[ߚ�o�_� dbf�XX{e���L�i��@�ld��5fo��#*\s�S �v8���>S�W���{
[9��oe^��Oc�a֙�X-e/��Lhh��@�k���5aok�*hrˈ� �v �X�-m�V���oZd~qp_^rq�a�e�r�d�YetJh;L�u�k|@-wtn�3�yq�(-z�t��|x#�)jI_�k�b|�m�d�p�o4g�d�p�jZXtrqmLt9o�?�vrL3�w�t�(,y�wZ{�y�@g&gQ�Zi)i�{qkk�o{m +th�(Ov��y��>^��j�ax�v�dA��k�fЅ +`+i]��T�k��Ijn��r=�q.��2�sǂU(bvF��Vx��L�]'�́`7��u�c��j�eNJ�_�hp�qTsk�IImЇ=�p���2�s;��(tuԃ��xO�t�$\��/_5��u2b+��j!d�-_g��iT j`��H�m)��=�o���2�r�� +(�ur�7�x�v�B[<�(l^b�t�ab��i�d/��^�f��+S�iÐ�H�l��B=wo}��2�rY�+(�u"���wńP�|Z��~�]��^t`���i c���^2fl��SliB��H[l)�`=\o�/2�r�(�t�� w���qtV���t�Z[vfu�^ j�vav_`w^d�S�xJh+H+yUko<ezun�1{�q�&$|�u�~xU��p�^��Qq�a�t�s d�i�t=gR^?ucjSv�l�G~w�os;�y&r"0�z}t�&<{�wb}+z��m�f�~�o6h�s�p�khrr&m)]Fs�o>R=t�qWF�vlsn;�w�u�0�yxw�&Pz�y�S|f{��ej�n:}ll�o�run�q}g}p=r�\xq�tpQ�snu�Fquw^;Zv�x�0�x�zB&bz*{��{�}��h�u�|&j�v�qZl�w�f�n�x�[�pby�P�r'zbE�t +�tc�jI��Y3l��tOn���D�p�^:=s$��0RuV�0&�w|���y�6��b��wad��m9gF�$c
i��X�kڐ�N�n"��D^ph��:r��m0Ht�4&�w+� +�y>���aT�yv�d�l�f��xb�h���X|kR�#Nzm��mD3o���:rN��0@t���&�v�5y +����zeV�yz�Zoni{/^c�{}avY{�d�N�|Xh4C�|�k|8�}�n�.2~-r$6~�uL��x���w;^Kw�xaWmx�dFb�yZgXzi�M�z�l�C{qoU8_|;r.'}
t�$`}�w�~�zE�WtSe�vuth+k�vzjua�wYl�W+x<n�L�y#p�B�zs%8{uT.| w�$�}y�h}�{� +6�vF��-�w�j%'y~�+�z��x�i5��ohkF�fm3�u\�n�S0p���I�ro�@Pt#�+6�uщ;-�w�R%5y*�yz���x"hn��n�j���e�l��}\RnY�)R�p*��I�q��p@+s���6�us�p-�w,��%@x熒7z{�lzT��V�p���Z�fÀp^`\��Na�S�CeIQ�Eh�?5�`k�5$��o+���rp"q� u�ρXy-x�}�^oE}�aBe�~dF[�~7gR)~ji�H�~�l�>�~�oy4�@rF+��u"��w�2�mz�woz�e5m�{mg�d�{�j'Z�|Fl]Qb|�n�G�}p�>N}�s4�~u_+�~�w�"�y���| vx�ll�yBnc�y�o�Z.zwq�P�{sSGz{�u=�|Kv�4�|�x`+�}�z"�~M{��~�}jt�v�r�k�wbtab�x*u�Ylx�v�Py�w�F�zay=�{.z34i|{P+�|�|r#}�}�"~E~�s�t�ysj�u�zYa�v�{ X�w�{�O�x|SF�yW|�=Wz?}�4B{-~+�|~�#D|�Wo}��r�sQ�j tp�6au��kXv��zOw|��F%xn��=yn��4!zs��+�{p��#d|\���}5�q�r�@i@sB�`uto��W�u��:N�v���E�w��G<�x���4yЃJ+�z߂�#{�k�|˂q6p��oh�rI��_�s��Wt��N;uωE�v��<�x��3�y@��+�z`��#�{w��|r��p~p��g�q{�c_crÐV�sM�u(�EYvd��<�w���3�xɈ:+�y���#�{�;|)��o�ok�`gtpӖ�^�r$��VgsW��M�t���E-u<iw.��3�xh�J+�y��#�z؆Y{�7q�PW-h��Z�_#�^�V!�`a�M��eQD.�Rh�:��l1���og(��Lr� Ƀv:��y�o΄R^ +K�r�B��t�9��vp1\�x>)1�z!c�A{��h}�lO}�q�d}�sE[�}�t�S~u�J�~Gw;B=~tx�9�~�y�1D~�{ )?A|R!��}�U�~�kx{�w�c9|-x�Z�|�y�R�|�z�J}{fA�}d|.9y}�|�1/~#}�)L~�~z!�~�H� �j�zU~ buz�~�ZM{H~�R ++<�s$z��v��y��{�]^��dV0�2f�N���i5G���k�@x�an9y�p�2K��s'+A��u�$���xGX��z�d��}\��_i�Uv�3lN]�n4G.��p+@��r)9/��t02&��v:+C��xG$Ą�zQ���|I���~%[��|o�TЊoqsMՉisF��ot�?��pv"8��sw�2��y9+L��z�$ꃸ|QȂ�}���38[��u=TE��v�Me�w�Fi�$x�?~�@y�8Ѕ\z�2��|+Z��}'%��~;�/GH���BZm�cz�Sć�{wM��|7F�|�?H�6}s8��j~1���~�+g��W%1�7�5��������+Y܇/�SO�o�OL�����Eڄ���?�C��8����,1��T+p�8�z%L����_������Ym�&��R�j�LN���E����>�b��8x�ȄR1�,��+w����%b��B���������X��)�R�����L +���4G���R.u�!��(̄Ł #n���^3�o��1�~��Q�F��K��׃$E��u�[?�&�U9��M4;���E.z�\�)(��#����\�`���Q��;�uK��߇tE����H?��E��9ԇ�s40��.���o(�}��#��f�6}��������Q�>� +n%m�>�p�pt3s�sW'�vgv�yxߒ`[Tc~�j^Yfzra;h�noc�j�bgf�mEV�i{o�Jclqq�>]ozt2�r�vK'�uhxk&xBz���XkԄ�[mm�y!^�o�mYa�q6a~d�r�U�g�tkI�j�u�=�n/w�2�qly#'�t�z�Tw�|.��U4s��yX�u7w�\fvZlT_�wQ`�b�xAUf0y0ILi�z=�m{2kp}{�'�s�|��v�}ƍ�R�{CV�|Sv�Z�|�ke]�}_�an}nT|d�}�H�h�~ =il$~V2do�~�'�s(~��vuS�YPԃn�0U�Ru�X�j�\���_4`0�uS�c�H�g���=8kU�v2^o�)(
r���Dv���9O!���:Sw�9u#W��ei�[O�n^�_�vS�b�|HFf
�=j���2dnu��(0r0���u���@M��E]R/�teVi��iHZD�^-^'�{S?b��Hf�D=i���2ym�(Uq̈́z�us���yL���~�Q%��s�Uv��h�Ye�u]�]^�BR�a_� G�eh��=ix��2�m��9(uq{� +c�n�f�ffp\[�h�rP�k�s�E�nfu}:�q>w40 +t +x�%�v�z�oy2|9��[�r�{�^�s�p�a�ufdxv9[gIwMPTj&xaEPm yt:gp&z�/�s{�&u�|��x�}��<YHz +b�^h�!X�a�8Noei�KDh��S9�l��U0%p#�Y&�s��k +n�`�b`p:dW�q�gMKsXj&B�um17�v�p=-�x�sK$$z�v=�|Ry9��g�b"v6i�d�k�lgba@m�i�V�o�l>L�q�n�Bs�q!7�u�s�-�w�v
$@y�xlO{z�`d�i�t�g=k�j�i�m�`Sk�o�V m�q_K�o�s2A�ru7\tdv�-�v�x�$Yx�zz�z�|D~b&q2s�d�r�i�gts�_ui�u*USlv`K^niw�A4p�x�7)sOz +-�u�{H$~x|��z'}�|�_�xEr�b�yh�e�y�^�h;ztT�j�{J�m6{�@�o�|j7r_}-�t�}�$�w^~y?y�){�^<q�a?ig�d5�]�f��T"i��Jyl(�@�n��6�q��-�t;�$�vрA�y5�nz�\w�p�_Dž�g)b߅=]je���S�hq�5J#k:��@jn�96�pڂ�-�s��P$�vY���xׁ�y�[ ��p&^���f�a���\�d���SPg���I�jk��@EmV��6�pA��-�s$��%u�z�x���yZ�Ho�]���f
`Ɛi\�c���Sf�� I�i��@(l���6�o&-�r��z%4u���#xH�\x�Y��o\���e�_��{\<b��CR�f�I�i2��@lI��6�o\�h-�rg�,%Ju_� +{MuwR�qv]V�f�w#Z�\�w�^KR�x�a�IyVe�>�zRiQ4�{gl�+H|�p�"D}�t6�~�w�yuq�Z5ozs&]�e�tP`�[�uJc�Q�vZf�HAwwj >^x�m"4�y�p?+D{Osa"t|�vo}�y�w�nza�n p(dFdKq�f�Z�s +:�}�i�1�~nmZ(�q ��t��xpp�x(Zg�x�]�^�y�`�Utzc�Ldz�gC�{gj1:l|,mW1q}p�(�}�s� �~�v�Y�y�ot�a%frvc�]vwf�T�w�i0K�x�k�B�y�nS: z�p�1G{�s�(�|�v?!}�x��~�{kn9r"g�elszj<\�t�llS�u�nlKv�pmB{xru9�yIt~1&z�v�) +��i|�S_`���W\X���[:P!�t^�G��Ob�?t�>fT6��Kj.��nm�&���q?��uAD�(x�hG~�Z_�~�]tW�`�OEc�F�;g>�jjJ6��m�.n�p�&��Zt }��wE��+zsg{�`�^�|!c�V�|�fSN�|�h�F\}Kk�>m}�n:6O~,p�.W~�s�&�7vr��y(��M{�e�x�g(]�y�i�U�zXk�M�z�m�E�{�p>|r+6|�tT.E}v�&�~4x��~�z�G�}d�v�m�]w�ogUEx`q+MKy$r�Eey�t_=�z�v +pIG�~9r@�~ls�9�~�u�2�~�wV+�6y%%�z���|��+~r\T{xrFUj{�s�Nl|euGK|�vb@<}w�9j}gx�2w}�zP+�~?{�%@~�}$~VB��[�y�w�T�zex�M�z�y�F�{fz�?�{�{`9E|S|82k|�}+�}j}�%d}�~�K~�����Z�xL}cTQy}�M�y�~]F�z3~�?�z�9'{^r2c|�+�|��B%�}W��x}���~��pZgw��S�wЂ�M;x��Foy��?�yʂ�9z���2_{E��+�| +��%�|̂m�}��J�~,�0Y�u߇�S}vLJ�L�w��lF;x-��?�x��Y8�y˅�2[z��;+�{���%�|X���})�[}݂�Y�t�S.u�HL�vƋoFwk�w?fxG��8�y6��2Yz%�}+�{�g%�{��S�|܄>7}��UX[�%T-Q{��XJ���[�C��e_�<؊=c_6-�&g,/^�!j�(��*n�"��Dr���tv\��y�W���ZPՋ]�J
�`�C;�d+<w�'gs5�Fj�/F�on$(Ʌ�q�"���t��Hx,x��{BV��`P�fcIy��e�BÆ�h�<�<k~5���nW//��q@(ՄFt2"߃�w2�?y�ɂ�|tU冚e�Or�h}H���j�BQ�m8;Ƅ}o�5{��q�/��tQ(߃v�#��y"i�U{k�}�U'�_k�Nۄm�Hz��o�A��Dq�;���s{5U��u`/�<wM(��y=#2��{$��~|�]�Z~�T��\qN\�4r�H�t\A���u�;V��w.5?�Wx�/� z)��{�#f��}逾~p����Sv\M逨w�Gŀ�x�Ap�ry�;.�Zz�5,�D{�/�*|�),�}�#��~�!����%��Sm@{�M�J|]GwJ}A:<}�;@~)5I~�/LS)ER�#�d�{R���)��pS~��M&~�G-~�vA +~��:�~9��5~b��/&~���)^~��#�~ς |�XI�$R�|߅vL�}��F�}��@�}#�S:�}Y� +5
}���/.}քd)s~� +�1rj�'�n��*s^���@N��}�Em�r�J��ug�O���\�T��Q�Y�RF�_��;�dC��1�ih�U'�nf��vs�c��>��}/C�r\I��gsN`�p\�S��Q�Y +M_��\?RΎ�Q�X?��F�]��<=c +�2hi�(.m��?�r��y�<�*|FA~��q}F��mf�L���\R�MQ�W���F�]�1<Yb���2/h�(Xmn�� ro�C�^�MՀZ`�Rt�b�VPh�eZ�]Jg�^�Q�jb�F?l�f�:�p j�/�s!n�%uv0ra�y/v-��Y�V�~�\?Y�s^�]ug�a�`�\;d�dRP�g�g�E�j�k:QnIna/�q�q�%tt�t��x0x +��UO_|�XEa�q�[Td�f^�gB[Ia�i�P:eQl�D�h�oL9�l�q�/Upat�%ss�w/
wOydž)Qug7{WT�iQpxX;kfe[�msZt_mosO�cBqrDsg5sm9�k9ui/"o2wl%qr�yhAv�{c��No'zQ�p�o_U�rd�YZszY�]_t�N�a�v'De�w|9Li�x�/n-z7%�r*{��u�}�^KDv�x�ONw�nnS_xdc�W}y&Y[�y�N{`z�C�d�{Y94h�|/.mY|�%�q�}��us~��OH�~6xM~fm�Qi~�cU�~�XvZO~�N^�~�C�cr9h,/Al�a&q�Nu��gF���w4K%�l�O���bpT]�(XY��M�]ă%C_b���9!gK�5/cl��&8p���t��9��DȌ�v}I���lKNR��a�S��W�W���M�\ԇmCZa��U9=f��@/�kz�2&pp(�8�tv�N�CU��u�H>�k�M(�|a�R��WpW�!M\
�qC\a��9[f�/�k �\&�oՄ�t=�9aB1�JudG0�k_L2��aHQ9��W=VN�RMg[k�C^`���9se��{/�j��6&�o��.t���gdtN'xee�RRmug�Vyb�i�Z�W�k�^�M!m�b�B@pEf�7r�j�-Au�n�#�xMr��z�vu��_�Vxv�a�Y�l&c�]MawfR`�V�h�dLakeg�A�nAj�7 qDnW-tDq�#�w#t��y�xB�[F^�ub]�aAj�`~c�`jcPf�U�f8i�K�i4lCA)lio6�o�q�,�st�#�vw?-y +��XwW��pCO��gKS��B^tW��qU�[w��M_��D�c̋c;�g�3�l �+�p�w#�sȄ�}w$�lrxp,Oh�q>R�_+rGV�U�sDZ�L�t{^�C�u�c:GwZg1yk(jz�o* b|zs'�~w p�k�V[g7mtY�]�n�\�T�pa`rK�q�c�B�s�g`9�u�j�0�wtna(nyiq� �{Tu`7}x�o%h]�e�i�`X\�k�cS�m�e�J�o�h�Bq�k�9As�n�0�vq�(qx7t� �zNww�|8zQm�d�d�d�f�f�[�h�iR�k;kZJm�m�A�o�o�8�r?rG0pt�t�(sw$w
�ygyl�{r{�l�a�k�c�dm<Z�f�n�R*ip�I�k�rYA1n.t8�p�u�0ds�w�(�v%y�!1x�{^Bz�}!k�^�rEca�sIZAdtt`Q�g:u�I%j +\j��X�_��=P�bу�HTf)�o@ii��8llۂ�0�p$��)4sV�L"vg�cy��h�W�4`�[#�:Xa^e�@PEa��HH.e3�i@Th���8kl8��0�o���)Vr�#":v�K�xׂ�h|V���`;Z +�dX]l��P`̌YHdk��@Ch��8jk��Z0�o8�)pr���"Yu҄_�x��5j&v4Oua4v�SiXuwhWeO�w�[iGsx�_n?y�c}6�z�g�./|k�&R}Yo�~�s�%�w�h�r1Vp_�s+Y�WTt*]*N�u/`�F�v^d>jw�g�6y +k'.z�n�&c|rWE}|u��~�yPgYnT][^�o�`&VHqb�Nr�e�E�th�=�u�k�5�w\n�-�yq�&qz�t�z|sw��}�z�f3kd +]�l�f\U�nfh�MQp0k
EArmk=rs�o�5�u�r@-�w�t�&~y�w<�{�y�6}&|ehj�\�jliT�lnAL�npD�p(q�=$rBs�5]tmu�-�v�w�&�x�y��z�{��|x}ed:e�p�\6g�r&T;i�s{LHlFt�Dyn�v$<�p�w�5Ls5x�-�u�zh&�w�{� +y�}T�{�~�cgc�v�[�e�w�S�h4x�K�j�ySD.m)z)<�o�{5>r%{�-�t�|�' +#d|�{��}�}z�~�T�qEs�N�r_t�H5s�vA�t�w=;ivExr5Uw�y�/3y{);ze|Z#�{�}� }~��~.� TCo{y'Np�y�G�rz�A�sz{N;Iu +y]P�V|J���ZDf�y]�>7�a58��d�2!��h�,,�NlB&h�p
!�s�ނ�wY��z�P�0\aI���_�Cꁠb�=́�e�7���h�1�l, ��o^&z��r�!.��u���y +9�{�O,1b.I[d�Cug�=nKj;7~�l�1��o�,�rn&��Nu?!V��w�S��z�~�D|�N}|wg�H�|�j&C|�lk=$}Dn�7N}�p�1�~;s,~�ui&�w�!��z��|&ʀ�~M�zmHcztoB�z�p�<�{r�71|(tz1�|�vO,5}jx5&�}�z!�~�{��M}��+M}xrOH +x�s�B{y5u:<�y�v�7z�w�1�{�yR,H|Wz�'}|I"}�}�~�~�`W�MvQwfG�v�x}B=w�y�<�x�zh7y|{[1�zz|U,^{_}a'-|=~l":}!bT~�6�~���L�t�|RGhu{}#Bv=}�<|w*~V6�xG~�1�ymm,yz}�'X{���"n|���}��_�~|��LTs��.G#t6��A�u��<cv�6�w?�(1�x��L,�y��o'}zꂆ"�|���}6�a�~+�DLrT��F�s"��A�t ��<Ou�Q6�vh�1�wЄ�,�y&��'�zo�0"�{����|�6}��I�P�DN�XU>Ì�Y,93��]D3���ag.V��e�)�xi�$ +�U};G#�af�BI��i�=P�yl8(�LnM3 +�0p�.*�s)J��u�$���w� �{zL���|gU��~FF +��r13��t$.7��v )n��x.$ɀz6 [��|�}����LFn~�p�A�~�r�<�~�t]7�~�u�2�-wh.Cnx�)�z�$��|@ ��}�4�
�\�1F}:u�A�}8w<�}Lxf7�}}y�2�}�z�.R~I{�)�~�}%+~�~B �~�Tmz�5��E�{�zSAJ{�{<�{�|~7�|}C2�|�~.g}1~�)�}��%a}�J!~_���~��KO{��E�zh~�Azl�<�z��T7�z��2�{��$.z|B��)�|ʁ�%�}I�!!B}ۂG�~��<v'�6ECy.�?@�yO��<ly���7�y���2�z���.�{���*|(��%�|Ń�!l}q�p�~=��~䂫A˗Q*=��U_8_��Y�3���]�.<a�*V��f9%��j�!��n����r�2v�džz<@ⓗV�<���ZV85��^3��>a�.��e�*��Ti}&(��ml!��RqS�u��xg�{k@z�S[�<R��_O8 +3�D|.��}+��~'H��#��D���̀E�8܀e��>�>|�;��}�7�q~�3
�k/��+=���'v́D#������� +�ւ��(? ���;��V7a��3�[/��+U8��'� �!#� �2 ,!�#~�� ˂� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~����������������������������������������������������������������������������������������������������������������������������������D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����E"��L<��SW��]t��a��b��c��d��f�۷j�o�Զt�Ѷx�з|�̵~�Ʊ��������������������������������������������������������������������E"��L;��SW��\t��`��a���a��b��c�ݽe�ٿj���o�нs�ʹy�Ƶ�ò��������������������������������������������������������������������E"��L;��SW��\t��_���_���`��`��a���b���f���n�ʼt�ƹ{�ö�����ﱱ����E"��K;��RW��\t��]���]��^��^���_���^���g���o�żv�¹|����鹴�����������������������F"��K;��RW��[t��\���[��[���\���Z���]���h���q�½x���}㿸�粶}맴|||||||||||||||||���F!��K;��QW��[t��Z���Y���Y���Z���Q���^���j���s�yܾ�~᷹}嬷z袶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z���G!��K;��QW��Yr��W��V���W���O���R���`���lϿ�tֽ�zڻ�}ް�y⦹w垷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w���G!��K:��PV��Wp��U|��S���R���D���T���bž�mμ�uԻ�zس�xܪ�uߠ�t♹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u���F ��J:��PV��Tm�Qw��Q}��B���F���V���dû�o˺�vѴ�vի�tأ�rܛ�qޕ�r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���F ��J9��OV��Ph��No��F|��A���I���Y���f���pȱ�qͪ�pѣ�oԜ�nו�nڐ�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�o���E��I9��MU��L`��Ia��=��C���M���\���h���kĦ�jɟ�j̙�iϓ�iҏ�jԋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�l���D��H8��KQ��FQ��8f��?���H���Q���^���c���c���c�cƎ�cȊ�dˆ�ē�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g���B��F6��EC��2K��:j��C���M���V���Z���Z���[���\���\���]���^�~�`�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b��@��D4��81��3P��>k��H��R���S���R���S���T���U�~�V�{�W�y�Y�v�Z�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\���=��9"��,7��7R��Ci��Mz��N���M���L���L�}�N�x�O�u�P�r�Q�p�S�n�U�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W���8��!��/:��<Q��Hd��Hs��G��G���G�y�H�s�I�o�J�l�L�j�N�h�P�f�R�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T���;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G4��RN��]i��b{��d��g���j��m��p�ޭw�۫|�ت��է��ҟ��Е��ϐ��Ė�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘����;��H4��RN��]i��a{��c��e���h��k��n�߰s�ܯy�٭~�֫��Ө��М��Β�羙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙����;��H4��RN��]i��`z��b���d��f��i��l��o�ݴv�ڳ{�ز��կ��ѥ�����鶚�겚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚����;��H4��SN��]i��_y��a���c��e��g��j��n�s�ݽy�ڽ�պ��ȯ�ಟ��쩚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚����<��H4��SN��]i��^x��_���a��c��f��i���m���r���x���{���}־�ߨ��雤�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞����<��H4��SN��]i��]w��^���`��b���d���h���m���u���w���{���~ָ�~ޞ�~蔵�뚨�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ����<��I4��SN��\h��\v��]���^��`���c���h���n���r���x���{���~ճ�}ޙ�z疸�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶����<��I4��SN��[g��[u��[���\���^���c���h���h���o���u���zμ�}խ�zݘ�x䘹�䘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺����<��I3��SN��Zf��Ys��Y�Z���]���d���^���d���m���sȼ�xϸ�|֦�wݖ�v╻�◻�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ����=��J3��RM��Ye��Xq��W|��X���]���[���Z���c���l���sɸ�xЯ�w֠�tۓ�t���~����ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ�����=��J3��RM��Wc��Un�Ux��W~��X���Q���X���c���l���sɲ�vϨ�s՛�qّ�rݏ�{ݐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ�����>��K3��QM��T`��Rj��Sq��Vs��K���O���X���d���m���rȩ�pΟ�oӕ�n�pٌ�wڌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}���>��K2��PM��Q\�Pd��Pg��Fx��J���O���Z���e���m���lǟ�k̗�kА�kӊ�nՈ�sֈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�y���?��J2��OL��NV��LY��Fb��D|��J���Q���\���g���g���fÕ�fȏ�fˉ�g΅�jЃ�oЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�s���@��J1��MI��JL��FJ��?h��E��L���T���_���`���a���a���aÇ�bƂ�c��f�~�j�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n���B��H0��I?��C;��8P��@k��H���P���X���X���Y���Z���[���\��]�{�_�y�a�w�e�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h���C��G.��A/��18��9U��Cm��L��T���R���Q���S���T�~�U�z�V�w�X�t�Z�r�\�q�_�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b���A��A$��+ ��2=��<W��Gl��O{��M���L���L���M�z�N�u�P�q�Q�o�S�m�U�k�W�i�Y�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\��=��0��*'��5@��AV��Jh��Gv��G���G�~�G�v�H�p�I�l�K�i�M�g�N�f�P�d�R�c�T�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V���3 +����.*��:?��DR��Ab��An��Ay|�A�t�C�m�D�h�E�d�G�b�H�`�J�_�L�]�N�\�P�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R���2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]p��e~��h��l���p��t��y��}�ݔ��ی��ن����ׄ��׆��Ί��Ȏ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ����2��@-��KE��U_��^o��d}��g���j��n��r��v��|�ޛ��ۓ��؋��օ��օ��щ��Ɏ�����ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ�����3��@-��KE��U_��^n��b|��e���h��l��p��t��z�ߢ�ۚ��ؑ��ֈ��Ն��ˌ���ػ��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع�����3��@-��KE��U_��_m��a{��d���g��j��n��r��w��}�ܢ��٘��ӌ��͈��Í�ۻ��ڵ��ڳ��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳�����3��@-��KE��V_��^l��`y��b���e��i���l��p��t��{�ޫ��֠��ʔ���ܹ��ݳ��ݮ��ݭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ�����3��@-��KE��V^��]k��_x��a���d��g��k��o��s��y�۱}�Χ���״��ݮ��ߪ��ߨ��ߧ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ�����3��A-��KE��V]��]j��^w��`���b��f��j��n���s���u�Էy�ǭκ��֬��ޢ��⠔�᠓�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ����3��A,��KE��V]��\j��]v��^���a���d��i���n���q���q�ͽv���|ͳ��դ��ݖ��㕘�㗕�☕�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ����3��A,��KE��V\��[i��[u��]���`��c���i���p���m���m���sù�y̬�}՝����㋡�㐚�����������������3��A,��KE��V[��Zg��Zs��\~��^���c���j���m���i���l���p²�u̥�yԕ�}܇��ᅮ�ጣ��������������������������������������������������������4��A,��LE��WZ��Xf��Yq��Z{��^���c���l���g���i���m���p���r˝�uӍ�xڃ��ށ��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊�����4��B,��LE��WY��Wd��Wn�Yw��]|��d~��e���e���j���n���r���rʙ�r҉�sق��ۄ��چ��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه�����4��B,��LD��VW��Ua��Vk��Xq��\t��^|��]���a���h���n���r���qɔ�pЈ�rֆ�}ֈՉÚԇՇՇՇՇՇՇՇՇՇՇՇՇ���4��B+��LD��TT��S^�Te��Vh��Ym��U���Y���]���e���l���m���lȎ�lφ�o҄�xӅĄ҇őчŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕ���5��C+��MD��QQ��QX��R\��U[��Ns��R���V���\���d���i���h���hlj�h̃�lρ�sρ�}ƈ̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj���6��D+��ND��OL��NP��NO��Ga��Kw��P���V���]���b���c���c���dă�e��h�}�n�}�v�~ɀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ���6��E*��N@��LD��JC��?M��Eg��K{��Q���W���\���]���^���_���`�~�a�z�e�x�j�x�p�x�x�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z���7��G)��K9��G8��?7��>S��Ek��L~��S���W���V���W���X���Z�|�[�x�^�u�a�s�e�s�j�s�q�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s���9��I(�F.��=%��7>��>X��Gm��O~��S���Q���P���R��S�y�U�u�W�r�Y�o�\�n�_�m�d�l�i�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k���;��F#��<��-(��8C��AZ��Jm��N{��L���L���L�|�M�v�O�q�Q�n�R�k�U�i�W�h�Z�g�^�f�b�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c���>��<�� ��1.��:E��EY��Ij��Gw��G���G�{�H�s�H�m�J�i�L�f�N�e�P�c�R�b�U�a�X�`�[�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]���=����'��40��>D��BV��Ae��Aq��Azy�B�q�C�j�E�f�F�b�H�`�J�^�L�]�N�\�P�[�R�Z�U�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V���!�� ��,��70��;A��:P��:^��;hx�<qo�=xh�?}c�A�_�B�\�D�Z�F�Y�H�X�J�W�K�V�N�V�P�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q���*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��We��^s��d���i��m��p��u��{�ㅁ��}���y���x���x���z���{�����σ��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅����*��9&��D=��OU��Wd��^q��d~��i���m��p��s��z�㋀������|���y���z���{�����τ��ȇ��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç����*��9&��D=��OU��Wc��^p��e}��h���l��q��s��x��~�����ހ���{���{���}��Ѓ��Ȉ�����˽��˽��˽��˽��˽��˽��˽��˽��˽��˽��˽��˽�����*��9&��D=��OU��Wb��_o��c{��f���j��o���s��v��}�Ꮓ�ޅ���}���}��ҁ��Ȇ�����ͺ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ�����+��9&��D=��OT��Wa��_m��by��e���i��m��q��u��z�◂�ٍ��Ѓ��ˁ��Ƀ�����к��ϴ��б��б��б��б��б��б��б��б��б��б��б��б�����+��9&��D=��OS��X`��^l��`x��c���g���k��o��s��y�ݠ��є��NJ�����Ҿ��Ҹ��ҳ��Ү��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ�����+��9&��E=��OS��X_��]k��_v��b���e���i��n��s��y�֥~�˛�����ͷ��ӳ����Ԭ��ԩ��ԧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ�����+��:%��E=��OR��X^��\j��^u��`��d��i��n��s�ݳv�Ѫ{�š�ù��̯��ө��֧��֤��֢��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա�����+��:%��E=��OQ��X]��[h��]s��`}��d��h��n��p�ظr�̯x���~ó��̨��ԟ����؛��؛��כ��֛��֛��֛��֛��֛��֛��֛��֛��֛��֛��֛�����+��:%��E=��OQ��X\��Zg��\q��_z��c���h���o���l�ҽp�Ƶv���{��ˡ��ӕ��ِ��ڑ��ڒ��ٔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ�����+��:%��E=��OP��X[��Ye��[o��^w�b~��h���k���h���m���s���x���}ʚ��ӌ��ن��܆��ۊ��ڌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ�����+��:%��E=��OO��WY��Xc��Zl�]s��bx��i{��e���e���j���p���t���yɒ�}҅�����ڀ��ن��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇�����+��:%��E=��OM��UW��W`��Yh��\n��bq��ex��^���b���g���l���p���tȊ�x��~�{���z��Ճ��ԃ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ�����,��;%��E<��PL��TU��V]�Xc��\f��ce��^w��_���a���d���g���k���nǂ�r�y�{�w���vâ�~�����������������������������������������,��;$��F<��PI��SQ��TX��V\��[[��Zf��^x��a���b���d���g���h���i�|�m�w�w�wƆ�xǗ�yȩ�z���z���z���z���z���z���z���z���z���z���z���z�����,��;$��F<��QF��RM��RQ��TQ��SX��Ul��Y~��\���_���d���e���f���f�{�k�y�t�zʀ�{ˎ�|˝�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥���-��<$��F<��PB��OF��OF��NG��M^��Rr��V���Z���]���_���`���a��c�x�g�v�o�v�y�ẅ́�x͐�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ���-��=#��H8��N<��K<��J7��EM��Kd��Ow��T���Y���Y���[���\���]�z�_�u�d�s�j�r�r�s�{�tЅ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ���.��>"��L2��J3��E.��=;��DS��Ih��Oz��U���V���T���V���W�{�Y�u�\�q�`�o�e�n�k�n�s�o�|�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ���/��?"��I)��C%��3'��<A��CX��Jk��Q{��R���Q���P���R�z�S�t�U�o�X�l�[�j�`�i�e�i�k�i�r�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x���0
��A �B��1��4.��=F��D[��Ll��Mz��L���L���L�y�M�r�O�m�Q�i�T�g�W�e�[�d�_�d�d�d�j�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n���2��B��1��)��63��?H��H[��Gj��Fw��F���G�x�H�p�I�j�K�f�M�c�P�b�S�`�V�_�Y�_�]�^�b�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e���4 +��2����. ��95��BH��AY��@f��Ar�B{v�C�n�D�h�E�c�G�`�I�^�L�\�N�[�Q�Z�S�Y�W�Y�[�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]��1�� ��#��2"��;5��:E��9T��:`~�<ju�=rl�>yf�@}a�B�]�D�Z�F�Y�H�W�J�V�L�V�N�U�Q�T�T�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V��� +��6��F#�F!��>��9)��B@��HU��Mg��Rv��P���P���P�{�Q�s�S�l�W�g�[�e�b�d�i�d�p�e�y�eۃ�fی�fی�fی�fی�fی�fی�fی�fی�fی�fی�fی���& ��8��F��;��-��:0��BE��HX��Mi��Kw��K���K�|�L�s�M�l�P�g�S�d�W�b�]�a�b�a�h�a�o�a�x�a��a��a��a��a��a��a��a��a��a��a����'��:��;�� +��1��;5��CH��HZ��Fi��Fu��F|�G�s�H�k�J�e�L�b�O�_�S�^�W�]�\�\�a�\�f�\�m�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t���(��:����$��4#��>8��AI��@Y��@f��Aq|�Bzs�C�k�D�e�F�`�I�]�L�[�O�Y�S�X�V�X�Z�W�^�W�d�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i���'�� + +��*��70��CC��KN��QZ��Wf��]r��b}��g���n��zv��r��k���g���g���g���i���k���o���s«�vê�x«�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�� +��*��70��CB��JM��QY��Wd��\p��a{��f���l��t��w}��n���i���g���h���j���n���r���v���y���z���{���{���{���{���{���{���{���{���{���{���� +��*��8/��CA��JK��PW��Vb��\n��ay��f���k��r��|{��s���m���k���m���o���q���u���y���{���|���|���|���|���|���|���|���|���|���|���|���� +��*��8/��B@��JJ��PU��W`��\k��av��f��k��p��y��{���s���p���p���r���s���w���{���}���~���~���~���~���~���~���~���~���~���~���~���� +��*��8/��B?��II��QS��X^��]i��bs��f}�k��p��x�ۄ���z���u���t���u���w���z���}��������������������������������������������������� +��*��8/��B>��JG��QQ��X\��^f��cp�gz�k��p�ޖx�Ջ~�́���z���x���y���z���|������������������������������������������������������� +��+��8/��B=��JF��RO��YY��_c��dl�hv�l�p�؛v�ϒ|�ň�������|���|���~����������������������������������������������������������� +��+��8/��B<��KD��SM��ZW��_`�ci�fq�kyݩn�ӡs�ɘz������������������������������������������������������������������������������ ��+��8/��B;��KC��TK��[T��^]�ae�fl�iuحj�Φq�Ğw���}��������������������������������������������������������������������������� ��+��8/��B:��LA��TI��ZQ��]Y�``�efdtӲh�ɪo���u���z�����������Ô��Ē��đ��Đ��Ñ������������������������������������������� ��+��8/��B8��L@��UG��YN�\U�_Z�d_ڽ`s϶f�įm���s���x���}��������ĉ��LJ��dž��Ƈ��ƈ��ĉ��É��É��É��É��É��É��É��É��É����� ��+��8.��C7��M>��VD��XJ�ZP�^S��_^��]qʻd���j���p���u���y���~��������}���{���}��ǀ��Ƃ��ł��ł��ł��ł��ł��ł��ł��ł��ł����� ��+��8.��C5��N<��UA��VF�YI��^J��W]��[p��b���h���m���r���v���z��~�v���t���s���v���y���{���{���{���{���{���{���{���{���{���{����� ��,��8-��D3��O9��S=�U@��WA��ZE��Q[��Yn��_��e���i���n���r���u�x�z�p���o���n���p���t���v���v���v���v���v���v���v���v���v���v����� ��,��9+��E1��P5��Q8��R9��V6��PC��PY��Vm��\}��a���f���i���m�|�p�q�v�l���k���j���j���p���q���q���q���q���q���q���q���q���q���q�������,��9)��F-��P0�O1��O.��S)��PA��RW��Tj��X{��]���a���d��g�s�k�j�s�g���f���f���eö�k���l���l���l���l���l���l���l���l���l���l�������-��:&��G)��M*��K'��K ��J.��R@��VT��Wh��Wy��Y���[���]�v�`�j�e�d�o�b�~�aЏ�aҠ�`Գ�e���fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�����-��;"��I#�H!��D��?!��H5��OG��SZ��Vk��Vy��U���U�y�V�l�Y�d�`�a�l�a�z�bۈ�bܖ�cܥ�cݷ�a�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩ����-��<��H��A��2��?'��G;��LN��Q`��Qo��P|��O�}�P�q�R�h�V�b�\�_�f�_�q�_�|�`އ�`ߔ�aࢢaaaaaaaaaa����.��=�@��/��4��?.��FA��KS��Mc��Kq��J}��K�u�L�k�N�d�R�_�X�]�_�\�h�\�q�\�{�\⅞]㑝]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜����/��>��-��%��6��@3��FE��GV��Ee��Eq��F{w�G�m�I�e�K�_�O�\�T�Z�Z�Y�a�X�h�X�p�X�x�Y悖Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕����.��/����+��9$��A7��BG��@W��@d��Aox�Bxn�Cf�E�`�H�[�L�Y�P�W�U�V�Z�U�`�U�f�T�l�T�u�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|����! +��'��)%��)3�+?u�.Ik�0Rc�3Y\�5_W�8cS�;fP�=hN�@jM�CkK�FlJ�IlI�LlH�OlH�RmG�VlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�Zl�� +�� ����!~�!-s�$7i�'@a�*HZ�-NT�0RP�3VM�6XK�9ZI�;[G�>\F�@]E�C^D�F^C�H^B�K^A�N^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�~2*�z?=��FH��MT��S`�~Yl�w`w�pj��is��b|��]���[���Z���[���[���\���]���^Ė�bǖ�eɖ�h̕�kϔ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�� +��#�2*�~><��EG��LR��R^��Xj�}_u�vg��np��fy��`���]���\���\���]���]���^���bř�eǘ�iʘ�l͗�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�� ��#��2*��>;��EE��KP��Q\��Wh��]s�{d~�sm��kw��c���_���]���]���^���_���`�eś�iț�l̚�oϚ�pΛ�q͜�q͜�q͜�q͜�q͜�q͜�q͜�q͜�q͜�� ��#��2*��=9��DC��KN��QZ��We��]q��b|�yk��pt��g~��a���_���_���`���b���d���hƝ�lʝ�o͜�q̝�r̞�s˟�s˟�s˟�s˟�s˟�s˟�s˟�s˟�s˟�� ��#��2*��<8��CB��KL��QW��Wc��]n��by�i��wr��n{��f���c���c���e���f���h���kȟ�o˟�r˟�sʠ�uʡ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�� ��#��2)��<7��D@��LJ��RU��X`��]k��bv�g��~p��uy��m���h���h���i���j���k���mɢ�rɢ�uɢ�vȣ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ����$��2)��;5��D>��LH��RR��X]��]h�br�g}�o��~w��u��n���l���l���n���o���pĦ�tƦ�wƦ�xƦ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ����$��2)��;4��E=��LF��SO��XY��]d�bn�gy�n�݇w��}}��u���q���p���q���s���t���vĩ�yĩ�zĩ�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê����$��2)��;3��E;��MC��SL��YV�^`�bj�gtߘo~֎u�΅{��|���v���t���u���v���w���y¬�{¬�|¬�}���}¬�}¬�}¬�}¬�}¬�}¬�}¬�}¬�}¬����$��2)��<1��E9��MA��TI��ZR�_[�ce�gnڝl|єs�Ȍy���~��|���y���y���z���{���|���~���~������������������������������������$��2)��<0��F7��N?��TG��ZN��`W�d_ުfjբjz̚q�Òw���|������~���}���}���~���������������������������������������������������������$��1(��</��F6��N=��UC�\J�_Q�cXۮbhѦhyǟo���u���z����������������������������������������������������������������������������$��1'��=-��F4��O:��V@�ZF�]L�`Tֲ_g̫fw¤m���s���x���|�������������������������������������������������������������������������$��1&��=,��F2��O7��W=�YA�\EݻZRҶ]eȯdv��k���p���v���z���~���������������������������������������������������������������������$��1%��=*��G0��P4�U8�W;�[=��TQκ[dôbu��h���n���s���w���{�����|���z���x���w���y���|���~���~���~���~���~���~���~���~���~�������$��1#��=(��G-��Q0�S3�U4��U:��QOɿYb��`s��f���k���p���t���x�}�}�t���q���p���o���r���t���v���v���v���v���v���v���v���v���v�������$��2"��>&��H)��Q,��Q,��S+��K8��OM��W`��]q��c���h���l���p���t�v�y�m���k���j���j���m���o���p���p���p���p���p���p���p���p���p�������%��2 ��>#��I%��N%��N$��O ��D6��MK��T^��Zo��`~��d���h���l�z�o�o�u�h���g���f���f���g���k���l���l���l���l���l���l���l���l���l�������%��3��>��J �J��H��@��D4��KH��Q\��Wm��\|��`���c�}�f�q�j�h�q�c�}�b���b���a���a�«f�¬g���g���g���g���g���g���g���g���g�������%��3��?��I��D��?��D��J1��ME��OY��Sj��Wy��Z���]�t�`�i�d�a�m�_�{�^Nj�]ɜ�]ʬ�\�¤`�Ǥb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀ����%��3��?�B��8 ��7��C!��L3��QE��TV��Rg��Sv��U�v�W�j�Y�`�_�\�j�Z�y�Zو�Yڙ�Yܩ�Yݽ�[�͜\�̝\�̝\�̝\�̝\�̝\�̝\�̝\�̝\�̝����&��3��?��5��&��8��C(��J:��NK��N[��Mj��Mwx�N�l�O�a�R�Z�Y�W�d�V�r�V倘W掖W睕W笔W���X�˓X�˓X�˓X�˓X�˓X�˓X�˓X�˓X�˓����%��1 ��6����+��:��C.��I?��HP��H_��Gk{�Hvo�H�d�J�]�O�X�U�U�^�T�h�T�t�T��TꋐT똏T릍T챍T챍T챍T챍T챍T챍T챍T챍T챍����#��*��
+�v�s-%�|60��>9��FC��MN��SY��Ye�x`p�piz�gs��`}��\���[���\���]���^���`���aˍ�eӍ�h�j؎�k֏�m�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�z +�x�u-%�5.��?7��FA��MK��SV��Ya��_l�wgw�np��fz��a���_���`���a���c���d���eɐ�gԐ�k�mՑ�nԓ�oӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�{ +�y�v-$��5-��?5��G>��MH��SR��Y]�^i�~et�wn~�nw��h���d���d���e���f���g���hĕ�jҔ�nҔ�pҕ�qі�rї�rї�rї�rї�rї�rї�rї�rї�rї�| +�z�x,#��5+��?3��G;��NE��SN��YY�^d�do�mz�xu��o}��j���h���i���j���k���l���mϙ�pЙ�rϙ�sϚ�tΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�} �{�{+"��5)��?1��G9��NA��TJ�YT�^_�cj݉luրs��wz��p���m���m���n���o���p���qȜ�s͜�u͝�v̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�} �{�}*!��6(��?/��G6��N>��TF�YO�^Y��ddؐkrЇq��x��w~��s���q���r���s���t���u���vʠ�xʠ�xʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�~ �|��* ��6&��@-��G3��N;�TB�YJ�^Sܞc`Ӗipʎo~u��{��y���v���v���v���w���x���yȣ�zȣ�{ȣ�{ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ� �}��*��6%��@+��H1��N7�T>�YE�^Lآ`^Λhnœn}��s���y����{���y���z���{���{���|Ƨ�}Ƨ�}Ʀ�}Ʀ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ� �~��*��6#��@(��H.��O4�U9�Z?ݭZIӧ^\ʠfm��l{��r���w���|������}���}���~���~���ª�Ī�ĩ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ���~��*��6!��@&��H+�O0�U4�Y8ٱUHϪ\[Ťdk��jy��p���u���y������������������������������¬��ê��ê��ê��ê��ê��ê��ê��ê��ê�����*��6 ��@$��H(�O+�U.�V2մRFˮ[Y��bi��hx��n���s���w���|��������������������~�������������¬��¬��¬��¬��¬��¬��¬��¬������*��6��@!��H$��P&�R(ܼO1ѸQDdzYW��`h��fv��l���q���u���y���~�z���w���v���t���t���v���y���z���z���z���z���z���z���z���z���������*��6��@��H �O �O ��F/ͽOC·WU��^f��du��i���n���r���v�{�z�r���n���m���l���l���n���q���r���r���r���r���r���r���r���r���������*��6��@�H�K��I��D-��MA��US��[d��as��f���k���o���s�t�w�k��h���g���g���f���i�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬������*��6��?�H��E��9��B*��K>��RQ��Yb��^p��c}��g���j�x�n�m�s�f�}�c���c���b���b���e�Ʀf�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũ������*��5��?�B
��;��3��?(��H;��ON��U_��Zn��^{��b�{�f�p�i�f�p�a�{�_���_���^���^���`�ˠb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢ������*��4
�= +��7��!��4��>$��E8��LK��R\��Vk��Zx~�]�r�`�g�d�_�l�\�x�[���[���Z���Yº�Z�И]�Ϛ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ������) +��2�6�� +�o�}$��/��9��A#�G(�M.�S4ڢVAЛ]SȔec��kq��p~��v��{|��w���v���w���w���x���x���yΛ�yΚ�yϚ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�u +�p�$��/��8��@ �G$�M(ߪR-֦S?̠\QÙca��io��n|��t���y��|��z���z���z���z���{���{̞�{̞�{͝�{͜�{͜�{͜�{͜�{͜�{͜�{͜�{͜�u +�q��$��.��8��@��F �L#ܮM*ҩR=ȤZO��a_��hn��mz��r���v���|��~���}���}���}���~���~ɡ�~ʡ�}ˠ�}̞�}̞�}̞�}̞�}̞�}̞�}̞�}̞�v +�r��#��.��8��?�F�KٲG(έP;ĨXM��`]��fl��ly��p���t���y�����������~���|���{�ä{�Ȥ}�ɢ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ�w +�s��#��.��7�>�DߵIԵE'ʱN:��WK��^[��dj��iw��n���r���v���{�x���u���s���r���p���q�Ʀt�Ǥv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢ�x �v��#��-��6�=�Bۺ@йC%ƵM8��UI��\Y��bh��gu��l���p���t�y�x�p��k���j���i���h���i�ǥk�Ǥn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣ�x �y
��"
��-��5�;�> +��5˾A"��K5��SG��YW��_f��ds��i��m�}�q�r�u�i�|�e���d���d���c���d�ʡe�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡ�z �}��"��+��3 �7��4��2��? ��H3��PD��WT��\c��ap��e|��i�v�m�k�r�d�z�a���`���`���_���_�͛a�͜c�̝c�̝c�̝c�̝c�̝c�̝c�̝c�̝�{�� +��!��)�/�.����/��<��F0��MA��TQ��Y`��]n��ayy�d�n�h�e�n�_�x�]���\���\���[���[�˔\�ҕ^�ї^�ї^�ї^�ї^�ї^�ї^�ї^�ї�}���� ��%�%�� +��9��B,��J>��PN��U]��Yj|�\vq�_�f�c�^�j�Z�v�Y���X���X���W���W�ʌW�ٌY�֏Y�֏Y�֏Y�֏Y�֏Y�֏Y�֏Y�֏������� +� +r�h�^�#V� *N�#1H�&5C�*9>�-<;�1>9�6?7�:@4�?A2�DA1�IA/�OA.�UA,�[A+�b@)�k@)�k@)�k@)�k@)�k@)�k@)�k@)�k@�� +����"�'�(ڶ"ϸ1 +Ķ>��H+��P;��WK��]Y��bf��gr��k}{�o�p�s�g�y�c���a���a���`���`�ǖ`�іb�іc�іc�іc�іc�іc�іc�іc�і�o +�|�����!� +������� +��8��?)��E8|�IFr�LSg�P_^�ShV�YoR�brP�nrO�{qNЊpNњoMҫmLӾlL��kK��lL��nL��nL��nL��nL��nL��nL��n��� +|�#r�(h�+)_�.2V�19O�4?I�8DE�=HA�BJ=�HK:�NL8�VL6�_K4�iK3�uJ1��I/��H/��H.��G.��G.��G.��G.��G.��G.��Gǯ +o�f�]�#$U�'+N�*1H�.6B�2:>�6<;�;>8�@?5�E@2�L@0�S@.�[@-�d?+�n?)�x>'��>&��=&��=&��=&��=&��=&��=&��=�� +c�Z�R�L�"E�"'@�&+;�*.7�.04�212�72/�<3,�A3*�G4(�M3&�U3$�\3"�d2 �m2�t2�t2�t2�t2�t2�t2�t2�� +X�P�H�B�<�7�!3� "0�#$-�'$+�+%)�0%&�4%#�9&!�?&�E&�K&�Q%�X%�^%�^%�^%�^%�^%�^%�^%�M�D"�<- �A0"�F8*�GB5�EL>�AVE�=aK�:nN�8zP�7�P�7�P�7�P�8�P�9�P�9�O�:�O�;�O�<�N�<�N�=�M�>�M�?�L�B�L�D�K�G�K�G�K�G�K�G�K�G�K�G�K�G�K�N�E"�?+�E."�I6*�K@4�JK=�EUF�A_L�=kP�;xQ�:�R�:�R�:�R�;�R�<�R�<�Q�=�Q�>�P�?�P�?�P�@�O�A�O�B�N�E�M�G�M�I�N�I�N�I�N�I�N�I�N�I�N�I�N�O�F!�B)�H-!�N5)�P?3�NI=�ISE�E]L�AiQ�>uS�=�T�=�T�=�T�>�T�?�S�?�S�@�S�A�R�B�R�B�Q�C�Q�D�P�E�P�H�O�J�O�K�Q�L�Q�L�Q�L�Q�L�Q�L�Q�L�Q�Q�G!�E(�L+�S4'�U>1�SG;�ORE�I[M�EfR�BrU�A~V�@�V�@�V�A�V�B�U�C�U�C�U�D�T�E�T�F�S�G�S�H�R�H�Q�K�Q�L�R�N�T�O�T�O�T�O�T�O�T�O�T�O�T�R�H �I&�Q)�Y3%�[=/�YF9�UOC�OYL�IcS�FoW�DzX�D�Y�D�Y�E�X�F�X�G�W�G�W�H�V�I�V�J�U�K�U�L�T�M�T�N�U�P�V�R�X�R�X�R�X�R�X�R�X�R�X�R�X�S�J �N$�W(�`2#�c;-�aD7�\MA�VWK�P`S�KkX�Iw[�H�\�H�[�I�[�J�[�K�Z�L�Z�M�Y�N�X�O�X�O�W�P�W�Q�W�R�Y�T�[�U�\�V�\�V�\�V�\�V�\�V�\�V�\�U�K�S!�]'�f1 �j:)�iC3�dK=�^TH�W]R�QhY�Nr]�M}^�M�^�N�^�O�]�P�]�Q�\�R�\�R�[�S�Z�T�Z�U�Y�T�\�V�^�X�_�Y�a�Z�a�Z�a�Z�a�Z�a�Z�a�Z�a�V�M�X�d&�m0�q9&�pA/�mI9�fQD�_[O�XdX�So^�Rya�R�a�R�a�S�`�T�`�U�_�V�_�V�_�W�_�W�_�Y�_�X�a�Z�c�[�d�]�e�]�e�]�e�]�e�]�e�]�e�]�e�W�O�]�i%�r/�w8"�x@*�uG4�oO?�gXJ�aaU�[k^�Wuc�V�d�W�e�W�e�X�e�X�e�Y�e�Z�e�Z�e�[�e�\�e�\�f�^�h�_�i�`�j�a�j�a�j�a�j�a�j�a�j�a�j�X�S�b�o$�x.�}7�~>%�|F/�xM9�rVD�k_P�dh[�^qd�[zh�[�j�[�j�\�j�\�j�]�j�^�j�^�j�_�j�`�j�`�k�b�m�c�m�d�n�d�n�d�n�d�n�d�n�d�n�d�n�Z�W�g�s#�}-��5��=!�D)�L3�{U=�u]J�leY�fmd�auk�`~n�`�o�`�o�`�o�a�o�b�o�b�o�c�p�c�p�d�p�e�q�f�r�g�r�g�r�g�r�g�r�g�r�g�r�g�r�[�[�k�w#��+��4�<�C#�J,ڄT7�|[G�ucV�njc�hql�ezq�d�s�d�t�d�t�e�t�e�t�f�t�f�t�g�u�h�u�i�u�i�v�j�v�j�v�j�v�j�v�j�v�j�v�j�v�\�^�o�{"��*��3�:�AݎI$ԉR4̃ZD�|aS�ug`�onk�kur�i}v�h�x�h�y�i�y�i�y�j�y�j�y�k�y�k�y�l�z�l�z�m�y�m�y�m�y�m�y�m�y�m�y�m�y�\�b�r�~"��)��1�8�?ٔG ЎP1ljXA��_P�|f^�vlj�qrs�nyy�l�{�l�}�l�}�m�}�m�}�m�}�n�}�n�~�n�~�o�}�o�}�o�}�o�}�o�}�o�}�o�}�o�}�]�e�u��! ��( +�/�6ޚ=E̓O/ÎW?��^N��d\�}jh�wor�svy�q}~�p���o���p���p���p���pÂ�q�q၌q။qဋqqqqqq��^�g
�x +�� ��&�- �3 +۞8
ћDȗN-��V=��\K��bY��hf�}mp�ysy�uy��s���r���r���s���s���s���s҆�sޅ�s߄�s߃�s���s���s���s���s���s���_�j�{����%�+�/آ5͟BěL+��U;��[I��aW��fd��ko�~px�zu��w}��u���u���v���v��~v��}v͊|vۉ}v܇}u݆~u݆~u݆~u݆~u݆~u݆~u݆�`�m�}����"�'ޣ*ԥ3 +ɣ@��K(��S8��ZG��`U��ea��jm��nw�s��{y�}y��zy��xy��vy��uy��szȍszٌtyڊvxۉvx܈vx܈vx܈vx܈vx܈vx܈�a
�p +�������"ۧ!Ш1 Ŧ?��I&��R6��YE��_R��d_��hk��lu��p{�u�t~}�p}��n}��m~��k~��j~ďil}ٍn|ڋn|ڋn|ڋn|ڋn|ڋn|ڋn|ڋ�b
�s������ + +��<��E'��K6��QC�UPv�Y\m�]fc�bo\�hvW�qyU�}zT��yT��wS��vR��uR��sQ��tR��vR��wR��wR��wR��wR��wR��w�x�� +m� d�%\�*#T�.*M�21G�66B�;9>�A<;�G=8�N>6�V>4�_=3�j=1�w</��;.��:.��9-��9-��8-��8-��8-��8-��8-��8¯ +b�Y�R�!K�&#E�*(@�.,;�3/8�915�>22�D20�K3.�R3,�[2*�e2(�p1&�|0%��0#��/#��/#��/#��/#��/#��/#��/�� + +W�O�H�B�=�!8�%"4�)#1�.$.�3%,�8&)�>&'�E&%�L&#�T&!�]%�f%�o$�z$�}#�}#�}#�}#�}#�}#�� +L�E� >�
8�4�0�,�)�"'�'$�+!�0�5�;�B�I�Q�X�`�c�c�c�c�c�c�@�7%�5,�9/ �;5$�=@+�;K4�9V:�6b=�5o?�3{@�3�@�3�@�3�@�4�@�5�@�5�?�6�?�6�?�7�>�7�>�8�>�9�=�:�<�:�<�;�;�<�;�<�<�<�<�<�<�<�<�<�<�<�<�A�8$�8*�<,�>3#�A>+�?I4�<T:�9`?�7lA�6xB�5�B�5�B�6�B�7�B�7�A�8�A�8�A�9�@�:�@�:�?�;�?�<�>�<�>�=�=�>�=�=�=�?�?�?�?�?�?�?�?�?�?�?�?�B�9$�;(�@*�C2"�E=+�DH4�@R;�=]@�;jB�9vD�9�D�8�D�9�D�:�C�:�C�;�C�;�B�<�B�=�A�=�A�>�@�?�@�@�?�@�?�@�?�@�@�B�A�B�A�B�A�B�A�B�A�B�A�C�:#�?%�D(�H1!�J;)�IF3�FP;�B[A�?gD�=sF�<~F�<�F�=�F�=�E�>�E�?�E�?�D�@�D�A�C�A�C�B�B�C�B�D�A�D�A�C�B�D�D�F�E�F�E�F�E�F�E�F�E�F�E�D�;#�C#�I'�O/�Q9'�OD1�LN:�GXA�CcF�AoH�@zI�@�I�A�H�B�H�B�H�C�G�D�G�D�F�E�F�F�E�G�E�G�D�H�C�H�E�G�G�H�H�J�I�J�I�J�I�J�I�J�I�J�I�E�>!�G!�Q%�V.�Y8%�WA.�SK8�NUA�I_G�FkJ�EvL�E�L�E�K�F�K�G�J�H�J�H�I�I�I�J�H�K�H�L�G�L�F�L�G�L�J�K�K�M�M�N�N�N�N�N�N�N�N�N�N�N�N�G�C�M�W$�]-�a6!�_?+�[H5�UR>�P\G�LfL�JrN�J}O�J�N�K�N�L�M�M�M�M�L�N�K�O�K�P�J�P�J�Q�J�Q�L�P�O�P�Q�R�R�S�S�S�S�S�S�S�S�S�S�S�S�H�G�S�^#�e+�h4�h=&�dF0�^O:�WXD�RbL�OmP�OxR�O�R�P�Q�Q�P�Q�P�Q�P�R�P�R�P�S�P�S�P�T�Q�U�R�T�T�U�V�V�W�W�X�W�X�W�X�W�X�W�X�W�X�J�K�Y�d"�k*�o2�p;!�mC*�gL5�aV@�[_J�ViQ�TtT�T~V�T�V�T�V�U�V�U�V�V�V�V�V�W�W�W�W�X�W�Y�X�X�Z�Y�[�Z�\�[�\�[�\�[�\�[�\�[�\�[�\�K�P�_�j!�q(�v1�w9�uA$�pI/�kT:�d]E�^eQ�ZoX�Xx[�X�\�X�\�Y�\�Y�\�Z�\�Z�]�[�]�[�]�\�]�]�]�]�_�]�`�^�a�_�a�_�a�_�a�_�a�_�a�_�a�M�U�d�o
�w'
�|/�~7�}?�yH'�uR3�mZB�fbO�ajY�^s^�]|a�]�b�]�b�]�b�^�b�^�b�_�b�_�b�`�c�`�c�`�d�a�e�b�e�c�e�c�e�c�e�c�e�c�e�c�e�N�Y�h�t�{&��,
�5�=ۂG �|P0�uX?�n`M�hgX�do`�bwe�af�a�g�a�g�b�g�b�g�c�h�c�h�c�h�d�h�d�i�e�i�f�i�f�i�f�i�f�i�f�i�f�i�f�i�O�\�l +�x ��$�* +�2
ߊ:ևDN,�|V<�v^J�pdV�kk`�gsg�f{j�e�k�e�l�f�l�f�l�f�l�g�m�g�m�g�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�P�`
�p �{��"��(�/ ۏ7ҌCɇM*��U9�|\G�wbT�qh_�mog�kvl�i~o�i�p�i�q�i�q�i�q�j�q�j�q�j�r�j�r�k�q�k�q�k�p�k�p�k�p�k�p�k�p�k�p�Q�c�s�~��!�%�+ؓ4 +͐AŌK'��S6��ZD�}`Q�xf]�slg�psn�mzr�l�t�l�u�l�u�l�u�l�u�l�v�m�v�m�v�m�u�m�t�m�t�m�t�m�t�m�t�m�t�m�t�T�f +�v�����"ޕ&ӗ3 ʔ@��J%��R4��YB��_O�~e[�yje�ton�qvt�o~w�o�x�o�y�o�y�o�z�o�z�o�z�o�z�p�y�o�x�o�w�o�w�o�w�o�w�o�w�o�w�V�i �x����ڙ К1Ƙ?��I"��Q2��X@��^M��cY�~hc�zmm�vrt�syy�r�|�q�}~r�}}r�~{r�~yr�~xr�~yr�|yr�{zr�zzr�zzr�zzr�zzr�zzr�z�Y
�l�{��� + + +��?��H$��O2��U?��ZK��_Wx�cbo�glf�ku^�r{Z�|~Y��}X��|X��{W��yV��xU��xV��yW��zW��zW��zW��zW��zW��z�l�~� +^� +V�O�H�!B�&<�* 8�/"5�5$2�;%/�A%-�H%+�Q%)�Z%(�e$&�q#$�~#"��"!��!!��!!��!!��!!��!!��!!��!�� +�a�i�i�i�i�i�i�3�*)�-*�0-�04 �1?$�0K(�0W,�/c/�.o0�-{1�,�1�-�1�-�1�.�1�.�0�/�0�/�0�0�/�1�/�1�/�2�.�2�.�3�-�4�,�4�,�4�,�3�-�3�.�3�.�3�.�3�.�3�.�4�*(�0(�3+�43 �5=$�4I)�3U.�2a1�1m2�0y3�/�3�0�3�0�2�1�2�2�2�2�2�3�1�3�1�4�0�4�0�5�0�5�/�6�.�7�.�7�-�6�.�6�0�6�0�6�0�6�0�6�0�6�0�5�,'�3&�7(�:1�;<$�9G)�8R/�6^3�5j4�4v5�3�5�3�5�4�4�5�4�5�4�6�3�6�3�7�3�7�2�8�2�9�1�9�1�:�0�;�0�;�0�:�1�9�3�9�3�9�3�9�3�9�3�9�3�6�0$�8#�<%�@.�A9#�@D*�=O0�;[4�9g6�8s7�8~7�8�7�8�7�9�6�:�6�:�6�;�5�;�5�<�4�<�4�=�3�>�3�>�2�?�2�>�4�=�5�=�7�=�7�=�7�=�7�=�7�=�7�8�5!�= �C$�G-�H6!�FA)�CL0�@W6�>c9�=o:�=z:�=�:�=�9�>�9�?�8�?�8�@�8�@�7�A�7�B�6�B�5�C�5�D�4�C�6�B�8�B�:�A�;�B�;�B�;�B�;�B�;�B�;�9�:�B�J#�O+�P4�N>&�KI/�GS6�D^;�Bj=�Av=�B�=�B�<�C�<�D�;�D�;�E�:�F�9�F�9�G�8�H�8�H�7�H�8�G�;�G�=�F�?�F�@�G�@�G�@�G�@�G�@�G�@�;�?�G�R!�W)�X2�W;#�RE,�NP5�JZ<�Gf?�Fq@�G|@�G�?�H�>�I�>�J�=�J�=�K�<�K�<�K�<�L�<�L�<�M�>�L�@�K�B�K�D�L�E�L�E�L�E�L�E�L�E�L�E�<�C�O�Y �_(�`0�_9�\B'�VL2�QV:�Ma@�LlC�LwC�M�B�M�B�M�B�N�B�N�B�N�B�O�B�O�C�O�C�P�C�Q�C�P�F�P�H�P�I�Q�J�Q�J�Q�J�Q�J�Q�J�Q�J�=�H�V�`�f&�h.�h6�e?"�_I,�ZT7�U]?�RhE�QrG�Q{H�Q�H�Q�H�R�I�R�I�S�I�S�I�S�I�T�I�T�I�U�J�U�L�T�M�T�N�U�O�V�O�V�O�V�O�V�O�V�O�?�N�\
�f�l%�o+�p3�n<�jG%�dQ0�^Z=�YcF�VlL�UvN�U~N�V�O�V�O�V�O�W�O�W�O�W�O�X�O�X�P�Y�P�Y�Q�Y�S�Y�S�Z�T�Z�T�Z�T�Z�T�Z�T�Z�T�C�R�a�k �r# �v)�w1�v9�sE�mO,�gW:�a_F�\hN�ZpR�ZyT�Z�T�Z�U�Z�U�[�U�[�U�[�U�\�U�\�V�\�V�]�W�]�X�]�X�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�G�V�f �p�w!�{'�}- +�}7�zC�uM)�oU7�i]D�cdN�`lU�_tX�^|Z�^�Z�^�Z�_�Z�_�[�_�[�`�[�`�[�`�\�a�\�a�]�a�]�a�]�a�]�a�]�a�]�a�]�a�]�J�Z�j�t�{�$�*ك4 +πA�{K&�uS4�pZA�kaM�fhU�dp[�cx^�b�_�b�_�c�`�c�`�c�`�c�`�c�a�c�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�M�^ �m�w�� އ%ԇ2ʅ?I#�|Q1�vX>�q_J�meT�il\�gs`�f{c�f�d�f�d�f�e�f�e�f�e�f�e�f�f�f�f�f�f�g�e�g�e�g�e�g�e�g�e�g�e�g�e�P
�b
�p�z��ڋ + + +�k�x
�� +�{� + +��>��F!��L-x�Q9p�UCh�ZM`�^VY�d]T�lbQ�vcP��bO��aO��_N��^N��\M��[L��]J��_K��_K��_K��_K��_K��_�y + +1�
,� +(�$�!���"�'�-�4�< �E�O�X�b +�b�g! �j' +�i/�f8�cD�]N)�XW5�T`<�Sj@�RsA�R|B�R�B�S�B�S�B�S�B�T�B�T�C�T�C�T�C�U�D�U�D�U�F�U�G�U�G�U�H�U�H�U�H�U�H�U�H�B�P�^�g�m�p$�p+ �o5
�kB�fL&�`T3�[\=�XeC�WnF�WvG�W~H�W�H�W�H�W�H�X�H�X�I�X�I�Y�I�Y�J�Y�J�Y�K�Y�L�Y�L�Z�L�Z�L�Z�L�Z�L�Z�L�E�U �c�l�r�u �v&�v2 �r?�nI#�hR0�cZ<�_aD�\iI�[qL�[yM�[�N�[�N�[�N�\�N�\�N�\�O�\�O�]�O�]�P�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�I
�Y�g�p�v�y�{ �{0�y=�tH�oP-�jW9�f^C�beK�`mO�_tQ�_|S�_�S�_�S�_�T�_�T�_�T�_�U�_�U�_�U�`�V�`�V�`�U�`�U�`�U�`�U�`�U�`�U�L�] +�j
�s�y +�` �m�v
+��A��J"��Q.�}W:�y\E�uaN�qfW�nl]lsb|k{ezj�fxj�gvj�gtj�gsj�hqj�hpj�gpk�fqk�dqj�cqj�cqj�cqj�cqj�c�W�i�u +��A��I ��O,��T7x�YAq�]Ki�aTa�e]Z�lcV�tgT��gS��fS��eR��cQ��bQ��aP��aN��bO��cO��cO��cO��cO��c�l + +J�,D�3?�:;�A8�I7�S6�]5�h5�u4�3�2�2�1��0��0��0��0��0��0���� +9�
4�!0�&-�,*�3'�9$�A"�J �T�`�n�}������
������������ +�� +�� +�� +�� +�� +�� +#� ��
�
�
�"
�(
+�/
�8�B + +�Y.�U7�RD�NO%�KY+�Jc.�Jm/�Jv0�J~0�K�0�K�0�K�0�L�0�L�0�L�1�L�1�L�1�M�2�M�2�M�4�M�6�L�7�L�7�L�8�L�8�L�8�L�8�<�G + +�U�]�b�c"�a*�_5
�[A�WK#�SU-�P^2�Og5�Op6�Oy6�O�6�O�6�P�7�P�7�P�7�P�7�Q�7�Q�8�Q�8�R�8�Q�:�Q�;�Q�<�R�<�R�<�R�<�R�<�R�<�@
�N �[�c�g�i�h$�g2�d>�_H �ZQ,�WZ4�Ub9�Tk;�Ss<�T{<�T�<�T�=�T�=�T�=�U�=�U�=�U�>�U�>�U�?�V�@�U�A�U�A�U�A�U�A�U�A�U�A�U�A�C �S�_�g�l +�W�c �k +�y@�uI �qP,�mV7�i\@�fbG�ciL�bpO�awP�aQ�a�R�a�R�a�S�a�Sa�T~a�T}a�T|a�S|a�S{a�R{a�R{a�R{a�R{a�R�Q +��A��H��O)��T4}�X>v~]Go{aPhxfXbvl_^ttc[t~dYt�dXt�cWt�bWt�aVu�`Ut�`Ut�_Vr�^Wr�^Wr�^Wr�^Wr�^�b + +2�,
/�3,�;*�C)�L'�W&�b%�p
$�#��"� +!� �� ������������ +'�'$�.!�5
�=�F�P�\ +�j �z ������������������ +�& +�- +�5 +�> +�H�T�b +�� +�� +�� +�� +�� +�� �� �� �� ���������� �� +�� +�� +�� +�� +�&�#�"�%�.�:�G�T�`�l�v�
������������������ +�� +�� +�� �� �� �� +������
��
��
��
�#���"�,�7�D�P�]�i�s�}����
��
��
��
����� �� ��!��"��!��"� +�!� +�!��!��!��!��!��!��!�� ��!�%�()�'4�%@�$M�#Y�#e�#p�#y�$��$��%��%��&��&��'��'��(�
�(�
�)��)��)��)��(��(��(��(��(��(��(���$�'�.�1&�01�.<�,H�+U�+a�+l�+v�,~�,��-��-��-��.��.��/��0��0��0��1��1��0��0��0��/��/��/��/��/��#�*�1�8�:#�9,�78�4C�2P�2\�2g�3r�3{�4��4��5��5��6��6��6��6��7��7��7��8��7��7��7��6��6��6��6��6��)�1�;�B�D �C)�@3�<>�9J�8W�9b�:m�;w�;�;��<��<��<��<��=��=��=��=��>��>��>��=��=� �=�!�=�"�=�"�=�"�=�"�/�7 +�C �J�M �L%�I.�D9�AE�@R�@]�@g�Aq�Ay�A��B��B��B��B��C��C��C��C��C� �D� �D�#�C�%�C�&�C�'�C�'�C�'�C�'�C�'�4
�> �J
�R�U�T!�Q) �N4�KA�HL�GW"�Fa#�Fk$�Gs$�G{%�G�%�G�%�G�%�H�%�H�%�H�%�H�&�H�&�I�&�I�'�I�)�I�+�H�,�H�,�I�-�I�-�I�-�I�-�9 �E�Q�X�[�[�X#�W1 �T>�QH�NR$�L\(�Le*�Kn+�Lu+�L}+�L�+�L�+�L�,�M�,�M�,�M�,�M�-�M�-�M�.�N�/�N�0�N�1�M�2�M�2�M�2�M�2�M�2�= +�K�W�]�` +�}@�zH�wN'�tS1�qX:{m]AukbHqhhNmgoRjfxThf�Uff�Vdf�Vcf�Vaf�V`f�V_f�U`f�S`f�Raf�Qaf�Qaf�Qaf�Q�Y + +0�C/�L-�V-�a,�m ++�| *)؝(ذ&��%��$��#��#��#��#���� +'�#� �!�'�/�8�A�L�X�f +�v ������������������ +�� +"�%�/�;�H
�U� +� +E�R
�^�j +�t�}��� �� +�� +����������
��
��
��
��
����
�������������� ��� �*�6�B�O�[�g�q �z�����������������������������������������������'�2�>�K�W
�c�n +�w ���������������������������� �� � � � +� �� �� �� ���� �'�)#�(/�%:�#G�"S�"_
�"j�"s +�#| �$� �$��%��%��&��&��'��'��'��(��(��(��(� �)��)�
�(��(��(��(��(���$
�*�1�3!
�1*�.5�,B�*N�*Z�+e
�,o�,x�-� +�.� +�.� �.� �.� �/� �/� +�0� +�0� +�0� +�0� +�1��1��1��0��0��0��0��0��0��$�+ �5 �;�< �;&�70�4<�2H�2U�3`�4k�5t�5{�6��6��6��7��7��7��7��8��8��8��8��8��8��8��7��7��7��7��7��* +�3 �>�D�F�D!�@* +�;5
�:C�;P�;[�<e�<n�<v�=}�=��=��>��>��>��>��>��>��>��?��?��>��>��>��>��>��>��>��0 +�;�F �L�M�K�G$�F1 �D>�BJ�BU�B_�Bh�Bp�Cx�C~�C��C��C��D��D��D��D��D��D��E��D� �D�!�D�"�D�#�D�#�D�#�D�#�5�B�L�Q +�Z?�WH�TP$�RX(�R`+�Qh,�Qo-�Qv-�Q}-�Q�.�Q�.�Q�.�Q�/�Q�/�Q�0�Q�0�P�1�P�1�P�2�P�2�P�2�P�2�P�2�P�2�C + +�n?�kG�hM%�dS-�aX4�_^9}]d=z\k?x\sAv\{Bu\�Cs\�Cq\�Do\�Dn\�Dl\�Ek[�Ek\�Ck\�Bk\�Ak\�Ak\�Ak\�A�Q +�~@|FyzL#sxQ,muU4gsZ<ap_C\neIXmmMUlvOTl�OSl�NRl�MQm�LPm�KOm�JOl�JOk�IOk�IOk�IOk�IOk�I�^ +q�@k�Fe�K!_�P)Y�U1S�Z7N�`<K�h>I�s?H�~>H��=G��;F��:F��9E��7D��8C��:B��;B��;B��;B��;�o + +^�?X�ES�KN�P$I�V)F�^,D�g-B�q-A�},A��*@��)?��'?��&>��%=��%<��':��):��):��):��)�| +,�� *�� )��(�� '��'��'��'���� +�� +��� +� +
� +(� 4�@ +�M�Y�d�o�x��������������� +����
��
��
��
���
�
��%�0�=�I �V�
a�
k�
t�|������������������ +�Q�]�g�q�y���������������������������!��!��!�� �� �� �� ��
��$ �) �* �(( +�%3�#? +�"L�"X�"c�#m�$u�$}�%��%��&��&��'��'��(��(��(��)��)��*��*��*� +�)��)��)��)��)�� �$�/ +�3�4�1"�.- �+9 �*F�+S�-^�.h�.p�/x�/~�0��0��0��1��1��1��1��2��2� �2� �2� +�2��2��1��1��1��1��1��% �/�8�<
�<�:�5&�33�4A �5M�6X�6b�7k�7r�8y
�8�
�8�
�8�
�8�
�9�
�9�
�9��9��9��9��9��9��9��9��9��9��9��9��+ +�^?�[G�XN"�VT'�T[*�Sb,�Si-�Rp.�Rw/�R/�R�0~R�0}R�1{R�1yR�2xR�2vR�3vR�2uR�2uR�1uR�1uR�1uR�1�G +�o?�lE|jK!wgP)qeU0lbZ6ha`;e_g>b_oA`_xB^_�B]_�B[_�BZ_�BY^�BW^�BW^�AX^�?X^�>Y^�>Y^�>Y^�>�T +u}@o{FjyK!dwP)^uT0YsY7Tq_=Ppg@MpqBLo|AKp�@Jp�?Jp�>Ip�=Hp�<Ho�<Gn�<Gm�=Gm�=Gm�=Gm�=�c + +;�D
8�K6�S4�[3�f2�q1�~0��
/��/��-�� +,�� ++��*��*��
*��
*��
�� +�Q +� + +� +� +� +� �"�.�;�G�S�^�h�q +� +� ���)�6�C�
O�Z�d�m +�� �!�!�%�0�=�J�U�_�i +�3��3�
�3�
�3��3��3��% +�8Y�8a�9i�9p�9v�9|�9��9��9��:��:��:��:�
�:�
�:��:��:��:��9��9��9��9��, +�`>�]E~ZKzXQ$wVV(tU\+qTc-oTj/mTr0lT{1jT�1hT�2gT�2eT�3cT�3bT�4aT�3aT�2aT�0aS�0aS�0aS�0�K +e|@_{EZzJUxO$PwT*Lu[/Iub1Ftl2Etv2Dt�1Dt�/Ct�.Bt�-Bt�,At�+@r�-?q�.?p�.?p�.?p�.�g +>�E;�L8�S6�\5�e4�p3�}2��1��1��
0��.��.��-��
,��,��,���� +/�W +.�a +-�l ,�y+��*��(��'��&��%��$��#��#��#���� + +� +� +� +� +� +� +� + �
�
�'�3�@ +F +�4��3��3��3��3��' +�9X +�9` +�9g +�9m +�:s +�:y +�:�:��:��:��:��:��:��:�
�:�
�:��:��9��9��9��9��- +�P?�NF�LM�KSJZ}J`{JgyJnxJuvJ}uJ� sJ� rJ�!pJ�!nJ�"mJ�"kI�#kI�"jI�!jI�!jI� jI� �A + +hk?ciE^gJYfO#UdT)QbZ-Nab1Kak2Jau2Ia�2Ha�1Ga�0Fa�/Ea�.Ea�-D`�-D_�-D^�-D^�-D^�-�\ +J�BF�GB�M?�T<�\;�e:�p9�|8��7��6��6��5��4�3~�3}�2}�2}��s +@�D
<�K9�R7�Z6�c5�n4�z3��2��1��1��
0��/��.��-��-��-���z +3�O1�W0�a/�k.�w +-�� ,��+��*��(��(��'��&��&�� &�� �� + + +� +� +� +�4� +�4� +�3� +�3� +�& +�9p +�9v +�9} +�9� +�9� +�:��:��:��:��:�
:�
}9�}9�|9�|9�|9��. +|N?yLEuJLsIRpIXoH^mHekHmjHuhI~fI�eI�cI�aI�`H� ^H� ^H�^H�^H�^H�^H��F +jZ>fXDaWI^UNZTT"WS[%USb'SSk(RSu)PS�)OS�)NS�)MS�)KS�)JR�)JR�(KR�&KQ�%KQ�%KQ�%�S + +4�N2�V1�_0�i/�u.�� +-�� ,��+��*��)��(��(�� '�� +'�� +�x +� +� + +e +k + +{9� +y9� +x9�v9�u9�s9�r9�
p9�
o8�
o8�
n8�
n8�
�5 +�=I~=P|=Vz<\
y<b
w<i
v=p
t=ws=�q=�o=�n=�l=�k=�i=�h=�g<�g<�g<�g<��; +nK>jJDgIJdHPbGV`G]^Gd]Gm[GvZG�XH�WH�UG�TG�SG�RG�RF�RF�SF�SF��J + +Od@KcEGbKDaQAaX?`a=`k<`v;a�;a�:a�9`�8`�8`�7^�6]�6\�6\��` +5zL3yT1y\0yg/yr.y +-y� ,x�+x�*x�*w�)u�(t� (s�(s��o +�3 +� +� +� + +� +� + + +j8� +h8�g8�e8�d8�b8�b7�a7�a7�a7��: +o;Mm;Sk;Yj;`h;gg;o
e<w
d<�b<�a<�_<�]<�\<�[;�Z;�Z;�Z;�Z:��@ +j@Ch?I
f?Od?Ub?\a?c_?k^?t\?~[@�Y@�W@�V?�U?�T?�S>�S>�T>�T>��E +dD@
aDF^CL\BR[BXYB`XChVCqUC{SC�RC�PC�OC�NC�MB�MB�MA�MA�MA��I +RS>NRDKQJHPPFOWDO_BOiAPt@P�?P�>P�=P�<P�;O�;N�;N�;M�;M��U +E^A
B^F?]M<]T:\]8\f7]q7]~6]�5]�4\�4\�3\�2Z�1Y�1X�1X��] +=eE
:dK7dS6d[4de3dp2d}2d�1d�0d�
0c�/c�.a�
-`�,_�,_��` +-l� ,l�+k�*k�)j�)i�(g� 'f�'f��d + + +�R +� + + + + +� +� + +[7� +Z7�X7�W7�U6�U6�U6�U5�U5��? +^:Q]:W[:^Z:fX:o
W;y
U;�
T;�R;�Q;�O;�N:�N:�N9�N9�N8��C +Y>GW>M
U=TT=[R>cQ>lP>vN>�M?�K?�J>�I>�H>�G=�H=�H<�H<��F +IM?
FLECLLAKS?K[=Ke<Lo;L{:L�9L�8L�7L�6K�6K�6J�6I�6I��O +2`N0`W/``.`k +-`x +,`� +`�+_�*_�)^�(]�(\� '[� +'Z��Y +�j +� + + + +R +X +] +c +h + +M6� +K6� +J6�I5�H5�H4�H4�I4� +�; + +N8VM9^K9gJ9qI:|G:�F:�
D:�
C:�
B9�
B9�
B8�
B8�
B7��? +.N� +-M� ,M� ,K�+J�+I�
�J +0TT +.T] +-Uh ,Ut ,U�+U�*T�)T�(S�(S�'Q�&P� &O� +�N +{! + + +3 +=9i +<9u +::� +9:� +89� +79� +69� +59� +58� +67� +67� +�: +9=T8>]7>g5>s4> +3>� +2>� +2>� 1>� 0=� 0<� +0<�0;��= +2C[ +1Cf +0Cq +/D~ .D� .D�-C�,C�+C�+B� +@� ++@� +�A + +e� +m0 + +� + +� + + + +� +� +� + + + +X� +S� +`7 +l +� + +v +� + +L� +G� + + + + + +S +[ +Aw +F1 + + + + + + + +C + + +5d + +:' +H +L +Q + + + + + +: +$� +)T +- +: + + + + + +) +0 +� +� +: + +! +( +, + +h + + + + +
+ +& +. +, + + +! + +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()**+,-./0123456789:;;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~����������������������������������������������������������������������������������������������������������������������������������6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����5��:��?=��Dc��I���L�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����5��:��><��Db��I���K�αj�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����4��9��><��Cb��H���J�αi�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����4��9��=<��Ca��G���H�ͱj�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����3��8��=;��B`��F���F�ͱk�Ȯ��ǯ��ǯ��Ư��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����3��8��<:��A_��E���D�̱k�ȯ��ǯ��ǯ��Ư��Ʈ��Ʈ��Ů��Ů��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����2��7��;:��@^��C���A�˱l�ȯ��ǯ��Ư��Ư��Ʈ��Ů��Ů��Ů��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����1��6��:9��?]��@���=�ʱl�ȯ�ǰ��Ư��Ư��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����0��5��97��<^��<���8�ʱm�ǰ}�Ư��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����.��3��76��8a��5���1�ʵa�ư�ů��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����+��0��27��1d��+���5�ȽZ�İ��į��į��į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į����'��,��*;��'i��$���7���W�»o�µ~�ñ��ð��¯���������������������������������������������������������������������������������������� ��"��#?��(m��*���8���T½�hн�uؽ�|�y㭹w姸w磷w頶x韶zꟶ|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|�������$D��*q��4���?���Q���d���oȬ�nϤ�mӛ�lו�lّ�mڏ�oێ�sۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�v��� �� ��&J��1i��<���G���R���^���`���`���aƉ�bɅ�d˃�f́�í�ḿ�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q���
��&��*G��6_��Bt��M���S���Q���S���U��W�z�Z�w�]�u�a�t�d�t�h�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m���0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��JY��S}�\��d�Ӭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��JY��S}�[��c�Ӭv�Ǭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?��D6��IX��R}�[��b�Ҭv�Ǭ��Ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?��D5��IX��R}�Z��a�Ҭv�Ǭ��ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?�D5��IX��Q}�Y��a�Ѭv�Ǭ��ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?�C5��HX��Q|�Y��`�ѭv�Ǭ��ǭ��ǭ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��>��C5��HW��P|�X��_�ѭt�Ǭ��ǭ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0�>��C4��GW��P|�X��^�Ѯr�ǭ��ǭ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����1�>��B4��GW��O|�W�߳]�ѯo�ȭ��Ȯ��ǯ��ǯ��Ư��Ʈ��Ů��Ů��ŭ��ŭ��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1�=��B3��FV�N|�V�ߴ\�Ѱk�ȭ��ǯ��ǯ��Ư��Ư��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1�=��B3��FV�N{�U��Y�ӳc�Ȯ~�ǰ��Ư��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1��<��A2��EU��M{�S��T�ԹV�ȯx�ư��ů��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů���1��;��@1��DT��Kz�R���L���I�Ʋu�Ű��į��į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į���1��:��?0��CS��Jy��M���=���P�ĸn�ñ��į��į��Į��Į��Į��Į��Į��Į����������������������������������������������������������������2��9��=/��BQ��Hw��A���5���U���k���x���辶�븵쳴}���}|荒}勉~勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉����1��6��;,��?N��Cr��,���;���Wü�iμ�tպ�yڲ�vޫ�uॺt⡹s䝹t囹u暸x暹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{���-��3��7)��;J��+s��5���B���W���f���oɭ�nϥ�mӞ�m֘�lؔ�lڑ�nۏ�pۏ�sۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�v���' +��;!��:5��.T��9r��D���N���X���Y���Z���[���[���\���]��_�}�a�{�d�z�g�z�k�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o��� +��F!��J>��Q\��Oi��Nr��J��A���I���Y���gĹ�q̵�vӨ�r�pܔ�rߒ�wߒ�~ޔ��ݕ��ܐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ����� +��E ��J>��LV��K_��Hg��=���C���L���\���h���oȨ�nΞ�mӔ�l�nٌ�sٌ�yٍ�؎��ՏՏՏՏՏՏՏՏՏՏՏ���
+ +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��a~��g��l��q��w��|�၂��|���z���z���z���|���}���~��ڀ��ԃ��΅��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ������" +��5��B9��OS��Yl��a~��g��l��p��v��{�����ށ���}���|���}�����ۀ��ڂ��Ӆ��Έ��Ȉ��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj���� + + + + +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Xn��_|��f��{n��uu��p}��k���i���i���i���j���k���l���m���n���p���s���v���v���v���v���v���v���v���v���v���v���� +����*��91��FH��Q^��Xm��_{��e���l��{s��u{��o���l���k���k���l���m���n���o���q���t���w���y���y���y���y���y���y���y���y���y���y���� +����*��91��GH��P\��Xl��^z��d���j��q��zy��t���o���m���m���n���p���q���r���u���x���{���|���|���|���|���|���|���|���|���|���|���� +����*��90��GH��P[��Xk��^y��d���j��o��w��y~��s���p���o���p���r���s���v���y���|���}���~���~���~���~���~���~���~���~���~���~���� ����*��:0��GH��PZ��Xi��^x��d���i��n��u��~|��w���r���q���r���s���u���y���}�����Ȁ������������������������������������������ ����+��:0��GH��PY��Xh��^v��d���i��m��s��z��|���u���s���s���u���x���}����ǁ���������������������������������������������� ����+��:0��GH��PW��Xf��^u��d���i��m��q��y�悀��y���t���u���w���|����ǃ���������������������������������������������������� ����+��:0��GG��PV��Xe��^s��d���i���m��q��w��~��~���v���v���z��ρ��Ƅ�ÿ��ĺ��Ķ��IJ��ñ��ñ��ñ��ñ��ñ��ñ��ñ��ñ��ñ����� ����+��:/��GF��PT��Xc��_q��e~��i���m��p��t��|�⅄��y���x�����Dž�ƾ��Ǹ��Ǵ��ǰ��ǭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ����� ����+��:/��GE��OS��Xa��_n��c{��g���l��p���t��z�⎃�׀���|��Ȃ�ʽ��ʶ��ʱ��ʮ��ʫ��ɨ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ����� ����,��:/��GC��PQ��Y_��^l��ax��e���i��m��r��y�ښ��ˋ�����ͼ��γ��ͮ��ͪ��ͧ��̥��ˣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ���������,��:/��FB��PO��Y]��\i��_u��c�g���l��r�ޮv�У}����IJ��Ϭ��Ѩ��Ѥ��Т��Р��ϟ��͞��̝��˝��˝��˝��˝��˝��˝��˝��˝����� +��0 ��;6��BI��EZ��Di��Du��Ez�F�q�G�h�I�b�L�_�R�]�X�\�^�[�f�[�n�[�v�[��\劘\匘\匘\匘\匘\匘\匘\匘\匘\匘� +������$w�!0m�%:c�)C\�,JU�/PP�2UL�6XI�:ZG�?\E�C]C�H^B�L^@�Q^?�W^>�\^=�c^<�l]<�l]<�l]<�l]<�l]<�l]<�l]<�l]<�l]ɹ +T�"M�)H�/D�"3@�'7<�+9:�/;8�3<6�7=5�;>3�??2�D?1�H?/�M?.�R?-�Y?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?�v�s�l�g.&�_>9�cFE�bOR�`X_�[bj�Ulr�Ruy�O�|�N�~�M��M��N��O��O��P��P��R�~�V�~�Y�}�\�}�_�|�a�{�a�{�a�{�a�{�a�{�a�{�a�{�a�{�v�s�l�g.&�_>9�cFE�bOR�`X_�[bj�Ulr�Ruy�O�|�N�~�M��M��N��O��O��P��P��R�~�V�~�Y�}�\�}�_�|�a�{�a�{�a�{�a�{�a�{�a�{�a�{�a�{�w�s�l�g.&�`=8�dFE�dNR�aX_�]aj�Wks�Suy�P}�O��N���N���N���O���P���P���QȀ�S��W��Z�~�]�~�_�}�a�}�a�}�a�}�a�}�a�}�a�}�a�}�a�}�x�t�n�i.%�e<7�jDD�jMQ�gU^�b_j�\is�Vs{�S|��Q���P���P���P���Q���Q���R���S˃�Vσ�Z҂�^Ձ�`�cۀ�c݁�c݁�c݁�c݁�c݁�c݁�c݁�c݁�y�u�o�k-%�j;6�oCB�oKO�lS]�g\i�afs�[p|�Vz��S���R���R���R���S���S���T���Ŭ�Zφ�^҅�aՄ�d�eۄ�f݅�f݅�f݅�f݅�f݅�f݅�f݅�f݅�z�v +�p�l-%�n94�tBA�uJN�rR[�mZh�gds�_n|�Yx��U���T���S���T���T���U���VÊ�Yˉ�]Ή�a҈�eՇ�fه�gۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�{�w +�r�n-%�s83�yA?�zIL�xPY�sXf�lar�ek|�^u��X���V���U���U���V���W���Xƍ�]ˌ�aό�eӋ�h�iٌ�j؍�k؍�k؍�k؍�k؍�k؍�k؍�k؍�k؍�|�x +�t�p-$�x71�~?=��GI�OW�zVd�s^p�lh{�dr��]}��X���W���W���W���X���[ǐ�aː�eϏ�iԎ�k�lՑ�mՑ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�}�z �u�q,$�}5/��>:��GG��NT��Ua�{\m�sey�ko��by��\���X���X���Z���\���_Ȕ�e̓�jђ�lӓ�nҔ�oҕ�pҖ�qі�qі�qі�qі�qі�qі�qі�qі�~�{ �v�u+#��4-��?8��GD��NQ��U^��[j�|bv�sl��jv��b���^���^���`���b���dǗ�jΖ�nі�oИ�qϙ�rϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�~�| �x�y*!��4*��?5��HA��OM��UZ��[g��as�|i~�ts��k}��e���d���e���g���iě�mΛ�qΛ�s͝�t̝�u̞�v̞�v̝�v̝�v̝�v̝�v̝�v̝�v̝�v̝��}�y�})��4(��?3��H>��OJ��VV��[b�an�gz�~q��uz��m���i���j���k���m���pˠ�tˠ�vʡ�wɡ�xɡ�xʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ���~�z��(��5&��@0��I;��PF��VQ�\]�ai�guߊp�׀x��v���p���o���p���r���tǤ�xǤ�yǥ�zǥ�zǥ�{Ǥ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ����{��(��5$��@.��I8��PB��VM�\X�ac�gnْo}ωu��|��w���t���u���v���xĨ�{Ũ�|Ĩ�|Ũ�}Ũ�}ŧ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ����|��(��5"��@+��I4��Q>�WG�]Q�a[ۢejҙl{ȑs���z�����z���y���{���|���~¬�~¬�«�ë�ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�����}��(��5 ��@(��J1��R9�XB�^J�aT֧bh̠jyq���w���}������~���������������������������¬��ê��ê��ê��ê��ê��ê��ê��ê�����~��(��5��@%��J-�R4�X;�\B۳YRЭ`fƦgw��n���u���z���������������������������������������¬��¬��¬��¬��¬��¬��¬��¬�������(��5��A"��K(�S/�V4�X:չUP˲]d��eu��l���r���x���}������������~�����������������������������������������������������������(��5��A��K#�Q(�S+��O8оSNŸ[b��bs��i���o���t���y�}��u���s���r���u���x���z���|���~���~���~���~���~���~���~���~�����������(��5��A�L�M ��P��G6��PK��X`��_q��e���k���p���u�t�|�l���k���j���n���p���r���t���v���v���v���v���v���v���v���v���������
��(��5��A�I��H��B��E3��NI��V]��\o��b~��g���k�{�p�m�x�g���f���e���i���k���l���n���o���o���o���o���o���o���o���o�����������'��4��@�B��>��7��B0��KF��RZ��Xl��]{��b���f�r�j�f�t�b���a���`���c�ŧf�ĩg�ëi�¬j�¬j�¬j�¬j�¬j�¬j�¬j�¬j�¬��������& ��2 �=��5��-��=��E-��IB��NV��Th��Xx��\�w�_�i�e�`�q�]�\Ě�\Ʋ�]�˟`�ɢb�Ȥd�ǥe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀ��������$��.��0����1 +��@��J+��O>��OR��Pd��St{�U�m�X�`�_�Z�n�Xӂ�X�Wر�W�іZ�И\�Λ^�͝`�̞`�̞`�̞`�̞`�̞`�̞`�̞`�̞��������� + +� + �b�X�M,!�M9/�QC;�QMF�NWQ�IaZ�Ela�Bxe�A�g�@�h�?�h�?�i�@�i�@�i�A�h�A�h�A�h�D�h�H�g�L�g�P�f�R�e�U�e�V�d�V�d�V�d�V�d�V�d�V�d�V�d�i + �b�X�N,!�N9/�RB;�RLF�OVQ�J`[�Fla�Cwe�A�h�@�i�?�i�@�i�@�i�A�i�A�i�A�i�B�i�E�h�I�h�M�g�Q�g�S�f�V�e�W�e�W�e�W�e�W�e�W�e�W�e�W�e�j +�c�Z�O,!�S7.�V@:�VJE�TTQ�O^[�Jic�Fth�C�j�B�l�A�l�A�m�B�m�B�m�C�l�C�l�D�l�H�k�M�k�Q�j�T�j�W�i�X�i�Y�j�Y�j�Y�j�Y�j�Y�j�Y�j�Y�j�k �e�[�Q+!�W6-�\?8�[HD�XRP�S\[�Nfd�Irj�F}m�D�o�C�o�C�p�C�p�D�o�E�o�E�o�G�o�L�n�P�n�T�m�W�l�Z�l�[�m�[�n�[�n�[�n�[�n�[�n�[�n�[�n�l �f�\�S+!�\4+�a=7�aFC�]PO�XZ[�Rde�Lok�H{p�F�r�E�r�E�s�E�s�F�s�F�r�G�r�J�q�O�q�T�p�X�p�[�o�\�p�]�q�^�q�^�q�^�q�^�q�^�q�^�q�^�q�m �g
�^�W* �b2*�g;5�gDA�dMM�^WZ�Wad�Qlm�Lwr�H�u�G�v�F�v�G�v�G�v�I�v�J�u�N�u�S�t�X�t�[�s�^�s�_�t�`�u�a�v�a�v�a�v�a�v�a�v�a�v�a�v�n�i
�`�\(�h0'�n93�oC?�lKK�fTX�_^c�Wim�Ptt�L�x�J�y�J�z�K�z�L�z�N�y�O�y�R�x�W�w�\�w�_�w�a�x�b�y�c�z�d�z�d�z�d�z�d�z�d�z�d�z�d�z�o�j
�a�b&�n.%�t90�vB<�tJH�oRU�h[a�`el�Xpu�R|z�P�}�O�~�Q�~�R�}�T�}�U�|�W�|�\�{�a�z�b�|�d�}�e�~�f��g��g��g��g��g��g��g��p�k�c�g$�t.#�{8-�~B9�}JE�xQQ�qX^�jbj�amt�Zw|�V���U���V���X���Y���[���]��a�~�d��f��g���i߃�j߄�j߄�j߄�j߄�j߄�j߄�j߄�j߄�q�l�e�l"�y- ��8*��A5��IA��PM�{WZ�s_f�kir�bt{�]��[���\���]���_���a���aу�e߃�hޅ�i݇�k܈�l܈�m܈�m܈�m܈�m܈�m܈�m܈�m܈�m܈�r�n�f�q!�~-��8'��A1��I=��PH�WU�}]b�ugn�lqy�e{��a���a���b���c���d���f̉�hۉ�kڊ�mٌ�nٌ�oٍ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�s�o�h�u!��-��8#��A-��I8��PC�VO�\\�fh�xou�ow��h���g���g���h���i���jď�l֏�o֏�pՐ�qՑ�rՑ�sՐ�s�s�s�s�s�s�s�t�p�i�y ��,��7 ��A)��I4�P>�VI�\U܋fbԁmr�xt��q|��m���l���m���n���o���pӔ�rӔ�tҕ�tҕ�uҔ�uӔ�uӓ�uӓ�uӓ�uӓ�uӓ�uӓ�uӓ�t�q +�l�} ��,��7��A%��I/�P8�VBߙ\M֒c_͉kpŁq~�yx��s���q���q���r���s���t˙�vϙ�wϙ�wИ�xИ�xї�xі�xі�xі�xі�xі�xі�xі�u�q +�o�� ��+��7��A!�H)�O2�U;ڟZIјb]Ǒim��o|��v��{}��w���v���w���w���xĝ�y̝�z͝�z͜�zΛ�zϚ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�v�r +�r����+��7��@�H$�O+ߪT3դWG˞`Zgk��mz��s���y��}���z���z���{���|���|ɡ�|ʠ�|˟�|̞�{͜�{Λ�{Λ�{Λ�{Λ�{Λ�{Λ�{Λ�v�s �u
����*��6��?�G�N$ڮM1ЩUEƣ^X��ei��lx��q���w���}�����~���������ǥ�Ȥ�~ɢ�~ʠ�}˟�}̞�}̞�}̞�}̞�}̞�}̞�}̞�w�t �x�� +��*
��5�>�F߳LճI/ˮSC��[V��cg��iv��o���t���y��������}���{���z�ĩ|�Ƨ~�ǥ�ȣ��ʡ�ʠ�ʠ�ʠ�ʠ�ʠ�ʠ�ʠ�x�u �{ +�� ��)��4
�=�D۹CѸG,ƳQA��YT��`e��gt��m���r���v�|�|�t���q���o���n�êq�Ĩt�Ƨv�ǥx�ȣy�ɢy�ɢy�ɢy�ɢy�ɢy�ɢy�ɢ�y�v
� ����'��2 +�:�? +��9̽E*��O>��WQ��^b��dr��i���n���s�t�y�j���h���g���f�§i�Ƨk�Ʀn�ǥp�Ȥq�ȣq�ȣq�ȣq�ȣq�ȣq�ȣq�ȣ�z�w
������%�.�4��2��6��C'��L;��TN��[`��ao��f}��j�z�o�l�u�d���c���b���a���d�ɢf�ɢg�ȣi�ɢj�ɢj�ɢj�ɢj�ɢj�ɢj�ɢj�ɢ�{�x������!�'߾%����3��@$��I8��QK��W\��]l��az~�f�q�j�e�r�_���^���^���]���_�Λa�͜b�̝d�̞d�̞d�̞d�̞d�̞d�̞d�̞d�̞�|�z������ +��9��B/��IB��NS��Scy�Vql�Z~`�_�Y�k�V�{�VƎ�Uȣ�Tɼ�T�݇V�ڊX�ٌY�Z�֏Z�֏Z�֏Z�֏Z�֏Z�֏Z�֏�� + +1�.�+�(� &�"!$�&!!�+!�0!�6 �< �B�I�P�U�U�U�U�U�U�U�Y�P�E#�:0!�=6%�A@0�AJ:�>UC�;`I�8mM�6zP�4�Q�2�R�2�R�2�R�2�R�3�R�3�R�3�R�3�R�4�Q�9�Q�=�P�A�P�D�O�G�N�I�N�I�N�I�N�I�N�I�N�I�N�I�N�Z
�Q�F"�=.!�A3%�E=0�EH:�ARC�>^K�:jO�8wR�6�T�4�U�4�U�4�U�4�U�4�U�5�U�6�U�6�T�8�T�<�T�A�S�E�R�H�R�J�Q�L�R�L�R�L�R�L�R�L�R�L�R�L�R�[
�S�G"�A, �E1$�H</�HF:�EQD�A[L�=hR�:tU�8�W�6�X�5�X�6�X�7�X�7�X�8�X�9�W�:�W�;�W�@�V�D�V�H�U�K�T�M�T�N�V�N�V�N�V�N�V�N�V�N�V�N�V�\
�T�I!�E*�I0#�M9.�MD9�JOD�DYM�@eS�<rW�:Z�9�[�9�[�:�[�:�[�;�[�<�[�=�Z�>�Z�?�Y�D�Y�H�X�L�X�O�W�P�X�Q�Z�R�Z�R�Z�R�Z�R�Z�R�Z�R�Z�]�U�J!�I(�O-"�S7-�SA8�PLC�JWM�DbU�AnZ�?{]�=�^�=�^�>�_�?�^�@�^�A�^�B�^�C�]�D�]�H�\�L�[�P�[�R�\�S�]�U�^�U�^�U�^�U�^�U�^�U�^�U�^�_ +�W�L �N%�U+ �[6*�[@6�XJA�STL�L_V�Gk]�Dw`�C�b�B�b�C�c�D�b�E�b�F�b�G�a�H�a�I�`�M�`�Q�_�T�_�V�a�W�b�Y�c�Y�d�Y�d�Y�d�Y�d�Y�d�Y�d�` +�X�N�T#�\*�c4(�d?3�aH?�[RK�U\U�Ng^�Jsc�Hf�G�f�H�g�I�f�J�f�K�f�M�e�N�e�O�d�R�c�V�c�X�e�Z�g�[�h�]�i�]�i�]�i�]�i�]�i�]�i�]�i�a + �Z�P�Z �d(�k3$�m=0�jF;�eOG�^YS�Wc^�Qne�Nzi�M�j�M�k�O�j�P�j�Q�i�S�i�T�h�U�h�X�g�Z�i�\�k�^�l�_�m�`�n�a�n�a�n�a�n�a�n�a�n�a�n�c + �\�T�`�k'�r2!�u<,�tE7�oMC�hVP�a`\�Yje�Tvk�S�n�S�o�T�n�V�n�W�m�Y�l�Z�l�[�l�\�m�_�o�`�q�b�r�c�r�d�s�d�s�d�s�d�s�d�s�d�s�d�s�d �]�X�f�q&�y1�|;'�|D3�yL>�rTK�j]W�bgc�\rl�Y}q�Y�r�Z�r�[�r�[�r�\�r�]�r�^�s�`�s�c�u�d�v�e�w�f�w�g�w�g�w�g�w�g�w�g�w�g�w�g�w�e �^�]�l�v%�0��:#��C.�K9�|RE�u[R�ne_�fnj�`xs�^�w�^�x�_�y�`�y�a�y�b�y�c�y�d�y�f�z�h�{�i�|�j�|�j�|�j�|�j�|�j�|�j�|�j�|�j�|�f�`�b�p�{$��/��9��B(�J3�Q>��ZK�ycY�pkh�itt�e}{�c�~�d�~�e��e��f��g��h��jkဨlဥmဣm•m��m��m��m��m��m��g�a�f�u
��$
��.��8�A#�I,�P7ۊZD҂aV�zif�rps�lx}�i���i���i���j���k���lÄ�lۄ�nޅ�oޅ�pޅ�p߄�p߃�p߃�p߃�p߃�p߃�p߃�p߃�h�b
�j
�x��#��-��7�@�H&ޖO/ՐWẢ_SĂgc�znq�tu}�o}��n���n���n���o���p���pԉ�rۉ�rۉ�r܈�r܈�r݆�r݆�r݆�r݆�r݆�r݆�r݆�h�c
�m�| ��" ��,
��6�?�FڜM+ЖV?Ǐ^P��ea��lo�|r|�vy��s���r���s���s���t���t͎�u؎�u؍�uٌ�uڋ�tۊ�tۉ�tۉ�tۉ�tۉ�tۉ�tۉ�i�d
�p��� ��* +�4�<ޣCՠJ)˛T<]N��d_��jm��pz�}v��y}��v���v���v���w���wǓ�wԒ�wՑ�w֏�w؎�vٌ�vٌ�vٌ�vٌ�vٌ�vٌ�vٌ�j�e�s ������)�1 +�9
ڨ=ХH'ǠS:��[L��b\��hk��nx��s��~y��{���y���z���z���{���zі�zҕ�zԓ�yՑ�y֏�y֏�y֏�y֏�y֏�y֏�y֏�k�f�v������&�.�4֬9̩G$¥Q8��YI��`Z��gi��lv��q���v���}�}~��z~��x~��w��v~Κx}Иy|Җz|Ӕ|{Ԓ|{Ց|{Ց|{Ց|{Ց|{Ց|{Ց�l�g�y�����"�(ۯ,Ѱ7ǮE"��O5��WG��^W��ef��jt��n���s�z�y�r���o���m���k���k�͜n�Ϛp�Иrіt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕ�m�k +�}������ + +� +;�5�1�-�)�" &�( #�-! �3!�: �B �K�U�_�j
�x
�y
�y
�y
�y
�y
�y�� +#�!����$�*�0�7�? �G�O�Y�Z�Z�Z�Z�Z�Z�I�@�5&�2/�44"�2=%�2H-�0S4�-`8�+n;�*{=�)�>�(�?�)�?�*�?�+�?�+�?�,�?�-�?�-�>�.�>�/�>�0�=�2�<�6�<�9�;�;�;�<�<�<�<�<�<�<�<�<�<�<�<�J�A�6&�5-�72!�6;%�5E.�3Q5�1^:�/k=�-y?�,�@�,�A�,�A�-�A�.�A�/�A�/�A�0�A�1�@�2�@�3�@�3�?�6�?�9�>�<�=�>�>�?�?�?�?�?�?�?�?�?�?�?�?�L�A�7%�8*�:/!�:8%�:C.�8O6�5[<�3h@�1vB�0�C�/�C�0�D�1�D�2�D�2�D�3�C�4�C�5�C�6�B�6�B�7�A�9�A�=�@�?�@�A�B�B�C�B�C�B�C�B�C�B�C�B�C�M�C�8%�<(�?, �?5$�@A.�>L7�:X>�8eB�6rE�5F�4�G�5�G�5�G�6�G�7�G�8�G�9�F�9�F�:�E�;�E�<�D�>�D�B�C�C�E�E�F�G�G�G�G�G�G�G�G�G�G�G�G�N�D�;$�B%�E)�G3#�H>.�FJ7�AU?�>aE�;nH�:{J�9�K�:�K�;�K�;�K�<�J�=�J�>�J�?�I�@�I�A�H�B�H�C�G�F�H�H�J�J�K�K�L�K�L�K�L�K�L�K�L�K�L�P
�E�@!�G"�L'�O1!�P<,�MG6�IR@�E]G�AjL�@vN�?�O�?�O�@�O�A�O�B�N�C�N�D�N�E�M�F�M�G�L�H�K�H�L�K�N�N�P�O�Q�P�R�P�R�P�R�P�R�P�R�P�R�Q
�G�E�M�U&�X/�Y:)�VD4�RO?�LZH�HeN�FqR�E}S�E�S�F�S�G�S�H�S�I�R�J�R�K�Q�L�P�M�P�M�P�N�S�Q�U�S�V�T�W�U�W�U�W�U�W�U�W�U�W�U�W�S�I�J�T�\$�a.�c8%�`B0�[L<�UWF�OaO�LmU�KyW�K�X�L�X�M�W�N�W�O�V�P�V�Q�U�R�T�S�T�R�W�T�Y�V�[�X�\�Y�]�Z�]�Z�]�Z�]�Z�]�Z�]�Z�]�T
�K�P�[�d#�i,�l6 �j@+�eI7�_SC�X]N�ShV�Qt[�P\�Q�\�R�[�T�[�T�[�U�[�U�[�V�[�W�[�W�]�Y�`�[�a�\�b�]�b�^�c�^�c�^�c�^�c�^�c�^�c�U
�M�U�b�k"�p*�t5�s>&�pG2�iP>�c[J�\eU�Xp]�V{`�V�a�W�b�X�b�X�b�Y�b�Z�b�Z�b�\�c�\�d�^�f�_�g�`�g�a�h�b�h�b�h�b�h�b�h�b�h�b�h�W�O�Z�h
�q!
�w(�{3�|= �yE+�tN7�nYD�gbQ�ak]�]ud�\g�\�h�\�i�]�i�^�i�^�i�_�i�`�i�a�j�b�l�c�l�d�l�e�l�e�l�e�l�e�l�e�l�e�l�e�l�X�P�_
�m�v �}'��1�;�D$�~M0�yW=�q`N�jh\�dpg�azl�a�n�a�o�b�o�b�o�c�o�c�p�d�p�e�p�f�q�g�q�h�q�h�q�i�p�i�p�i�p�i�p�i�p�i�p�Y�T�c�q �{��% �/�8�AڇL(сU:�z^K�seZ�lmg�huo�f~s�f�u�f�u�g�u�g�u�h�u�h�u�i�u�j�v�k�v�k�u�k�u�k�t�k�t�k�t�k�t�k�t�k�t�Z +�W�g +�u���$��, +�6ސ?ՍJ%̈T8Á\H�{cX�tje�oqp�lyv�j�y�j�z�k�z�k�{�l�{�l�{�m�{�m�z�m�z�m�y�m�x�m�w�m�w�m�w�m�w�m�w�m�w�[ + +�Z
�k�y����!�)�2 +ږ<ВH#ǍR5��ZF��aU�|hc�vno�rux�p~}�o��n��o��o��o��p��p��p�~�p�}�p�|�o�{�o�{�o�{�o�{�o�{�o�{�\ + +�]�n�|�����%ߚ-՚9˗G Q2��YC��`S��fa�}ln�xrx�ty�r���r���r���r���r���sф�s߃�r���rငr��q�~�q�~�q�~�q�~�q�~�q�~�] + +�` +�q
����� ۟&П7
ǜE��P0��XA��^P��e_��jl�ow�zu��v~��u���u���u��~v��}vˉ|v܇}uޅ}u߃~t��~t�~t�~t�~t�~t�~t��^ �c �u���� + +��A��L+��T;��\K��aY��fg��ks��p~x�u�q~�m~��k~��i��g���g؍j}ڋl|ۉnz݇oyޅoyޅoyޅoyޅoyޅoyޅ�` �j�{ +�� +��<��E(��K7}�PEs�URi�Y^_�^iW�fpS�rrR��qQ��pP��nP��mO��kM��mO��pQ��rR��sR��sR��sR��sR��sR��s�p +I�B�<�6�1�$.�**�1 '�7 $�? !�H�S�_�m�|������������������ +2� +�l �q$ +�s,�s6�q@�mL+�gV9�`_G�[hQ�YrV�Y|X�Y�Y�Y�Z�Z�Z�Z�Z�[�Z�[�Z�\�Z�]�[�]�\�]�]�^�^�_�^�`�]�`�]�`�]�`�]�`�]�`�]�I�N�\
+�i�r�w"�z) +�{3�z=�wJ$�qT5�j\D�deQ�`mY�^w^�^�`�^�`�^�a�_�a�_�a�`�a�`�a�a�a�a�b�b�c�c�c�c�b�c�b�c�b�c�b�c�b�c�b�c�b�K
�R
�a�n�v�|�&�/ +ڃ<�~H!�yR2�rZB�lbO�giZ�dra�c{e�c�f�c�g�c�g�d�g�d�g�d�g�e�g�e�h�f�h�f�g�f�g�f�f�f�f�f�f�f�f�f�f�f�f�L
�U�e�r�z���"߈*Ո9̅FÀP/�zX?�t_M�ofY�knc�hvh�gk�g�l�g�l�h�m�h�m�h�m�h�m�h�m�i�m�i�l�i�k�h�j�h�j�h�j�h�j�h�j�h�j�M
�Y �i +�u�~��ڍ%Ѝ7NJD��N,��W<�{^J�vdX�rkc�nrj�lzo�k�q�k�r�k�r�k�r�k�r�k�r�k�r�k�q�k�p�k�o�k�m�k�m�k�m�k�m�k�m�k�m�N
�\�l �x
�� +C��M)��U9��\H�}bU�xha�tok�pvr�nu�n�v�n�w�n�w�n�w�n�w�n�w�n�u�n�s�n�r�m�p�m�p�m�p�m�p�m�p�m�p�O
�_�o�| + + +�e�v� +��A��J'��Q5��WB~�\Ou�a[l�fgb�kp[�svW�xV��wV��uU��sT��rS��rT��sU��tV��tV��tV��tV��tV��tV��t�d +g�4^�: U�@+N�F4H�N:E�X<C�e<B�s;Bڃ:A۔9Aܨ7@��6?��5<��89��;8��>8��?8��?8��?8��?8��?֍ +\�+T�1L�7$E�>+@�F/=�P1;�[2:�h1:�w09�/8�.7��,7��+6��*4��+1��.1��/1��/1��/1��/1��/̘ +H�A�;�%5�+2�2.�9+�B)�L'�W%�d#�t!�� �������������������� +"� +�d*
�b3�^>�ZK'�VV3�R`;�Pk@�PuB�PC�Q�C�Q�C�R�D�R�D�S�D�S�D�S�E�T�E�T�F�T�H�S�I�T�J�U�J�V�J�V�J�V�J�V�J�V�J�:�G�T + �`�h�k�m&�k0
�i<�eH!�`S1�Z\=�WeD�VoH�VyJ�V�K�V�K�W�K�W�K�W�L�X�L�X�L�X�L�Y�M�X�N�X�O�Z�O�Z�O�[�O�[�O�[�O�[�O�[�O�=�L �Z �f�m�q�s"�s+�s9�nF�iP.�cY;�_aF�\jL�[sP�[|Q�[�R�[�R�\�S�\�S�\�S�\�S�]�S�]�T�]�U�]�U�^�U�^�T�^�T�^�T�^�T�^�T�^�T�@�P �_�j�q�v�x�z&�z7�vD�qN*�lV9�g^E�cfN�`nT�`wW�_�X�`�Y�`�Y�`�Y�a�Y�a�Z�a�Z�a�Z�a�Z�a�Z�a�Y�a�Y�a�X�a�X�a�X�a�X�a�X�C
�S�c�n �u +�}B�xL'�sT6�n\C�jcN�gjV�es[�d{^�d�_�d�_�d�_�d�_�d�`�d�`�d�`�d�`�d�_�d�^�d�]�d�\�d�\�d�\�d�\�d�\�G�W�g�q +�^ +��C��K%��R3��X?��]K}�bWt�fbl�kld}rs_|}v]|�v\|�u[}�tZ}�rY}�qY{�p[y�o]w�n^v�m^v�m^v�m^v�m^v�m�Z +-�(�$� !�'�.�6�@�K�X�h
�z�� +�� +�� �� �� �� �� �� �� +���
�
�%
+�,
�6�A + +� �
� + + +�� +�����
�
�
��
��
��
���������
��
��
��
��
��
���'�%�'�,�5�B�P�
^�
k�w����������������������������
��
����������������$�"�#�)�2�?�M�[�h�t��������������������������������������������!� �"�#�!$�"0� <�I�W�d�p�{��� �� ��!��!��"��#��#��$��%��&��&��&��%��$��$��$��#��#��#��#��"�"�(�)�+!�,,�*8�(E�'R�'_�'l�'w�(��(��)��*��*��+��,��,��-��.��.��/��.��-��-��-��-��-��-��-��-��$�(�/�2�7�7(�54�2@�0M�/[�/g�0s�0}�1��2��3��3��4��5��5��6��7��7��7��6��6� �6�"�5�#�5�$�5�$�5�$�5�$�5�$�%�.�6�<�A�B%�?0�<<�8H�7U �7b �8n!�9y!�9� �:� �;� �<��<��=��>��>��>��?��?�!�>�%�=�'�=�)�<�*�<�+�<�+�<�+�<�+�<�+�(�5�=
�E�K�L#�J,�E7�AC�?P"�>]$�?i%�@t%�A~$�B�$�B�%�B�%�C�%�C�&�D�&�D�&�D�'�E�'�E�)�E�,�D�.�C�0�C�1�C�1�D�1�D�1�D�1�D�1�.�;
�C +�N�T�U �T)
�P2�K>�HK"�FW'�Fc*�Gn,�Gx-�H�-�H�.�I�.�I�.�I�/�J�/�J�/�J�0�J�0�K�1�J�3�J�5�J�6�I�7�J�7�J�7�J�7�J�7�J�7�3�@ �K�V
�\�^�]%�Z.
�V;�SH�OS)�M]0�Mh3�Mr5�M{5�N�6�N�6�N�7�O�7�O�7�O�7�O�8�P�8�P�8�P�:�O�<�O�=�O�=�Q�=�Q�=�Q�=�Q�=�Q�=�8�D �R�\�b�d�e�c)�a8�]E�YO)�UY3�Sb9�Rl;�Ru=�S~=�S�>�S�>�T�>�T�?�T�?�T�?�T�?�U�@�U�A�U�B�U�B�U�B�U�B�U�B�U�B�U�B�U�B�<�I�W�a�g +�Q +��B��K#��R0�}W<�y]G�ubQ|rgZvonarmvenm�gll�gjm�ghm�gfm�fdl�fem�dfl�agk�_hj�]hj�]hj�]hj�]hj�]�S +��B��J!}�P-u�U8m�ZCe�^M]�dVW�k\S�u_Q��_Q��]P��[O��ZO��XM��XK��ZL��ZM��[M��[M��[M��[M��[�c + + +"�� !�� �� +���������� +�l �~�������������������� +�G�T�d +����' +� +� +L�Y�e
�q�| +�� � �� +������
��������������������� �� +�� +�� +�� +�� +� ����"�-�:�H�U�a�n
�x���� +�� �� �� �� �� �� �� ���������� ����
������������� � �#�$*�!6�C�Q�]�i�u�~
��� ��!��!��"��#��#��$��%��%� +�%� +�%��%��%��%��$��$��$��$��$���#�'�*�.�.&�,2�)>�'L�'Y�'e�'p�)z�*��*��+��,��,��-��.��/��/�
�/�
�0��/��.��/��.��.��-��-��-��-��!�)�/�6�:�9"�7-�39�0F�0T�0`�1l�3v�3�4��5��6��6��6��7��7��8��8��9��8��8��7��7��6��6��6��6��6��&�0�7 +�@�D�D +�A(
�=4�9@�8N�9[�:g�;r�<{�<��=��=��>��>��?��?��?��?��@��@��?�!�?�#�>�$�>�%�=�%�=�%�=�%�=�%�,�6 +�@�I�M�N�K$�F.
�C;�AI�AU�Ba�Bk�Cu �C}!�D�!�D�!�E�"�E�"�E�"�E�#�F�#�F�#�F�$�F�&�F�(�E�*�E�*�E�+�E�+�E�+�E�+�E�+�1�<�G�Q�U�V�T�P(�O7
�LD�IP �I[%�Ie'�Io(�Ix)�J�)�J�*�J�*�K�+�K�+�K�+�K�+�L�,�L�,�L�-�K�/�K�0�K�1�K�1�K�1�K�1�K�1�K�1�6�A +�VA�RL!�PV)�O_-�Oi0�Or1�Oz1�O�2�P�2�P�2�P�3�P�3�Q�3�Q�4�Q�4�Q�5�Q�6�P�7�P�7�P�6�P�6�P�6�P�6�P�6�: �E + + +b�?[�FU�L$O�R,J�Y1F�b4D�m4C�y3C��2B��0A��/@��-@��,>��.<��1:��39��49��49��49��4�y +*ҳ )��(�� &��$��#��#��#��#���� +������������������ +� +� +8
�E�S +�_�k�u�~������� �� +�� +�� +����������
���������������������
��(�4�A�N�[ �g�r�{�������������������������������� �� +�� +�� +�� +��
��#�&�%#
�"/�<
�I�V�b �m�w� �!��"��#��#��$��$��%��%��&��&��'��'� +�'��'�
�&��%��%��%��%���$ �' �/�1 �0 +�-*�*7
�'D
�'Q�(^�)i +�+s �,| �-��-��.� �.� �/� �/� �0� +�0� +�1� +�1� +�2�
�1��0��0��0��/��/��/��/��#
�+ �2�: +�<�;�7$�30�0>
�0L
�2Y�4d
�5n�6w�7�7��8��8��9��9��9��:��:��:��:��9��9��9��8��8��8��8��8��)�1 +�EA�DM�DX�Db�Ek�Et�F{�F��F��G��G� �G� �G� �G�!�G�!�H�!�G�$�G�%�F�%�F�&�E�&�E�&�E�&�E�&�3 +�d@�aI�^Q)�[Y1�Z`6�Xg8�Xo:�Xw;�X;�W�<�X�<�W�<�W�=�W�=�W�=~V�=}V�<|V�;|V�:{V�9{V�9{V�9{V�9�A +d�@^�GX�M"R�R*L�Y0H�a4F�k5E�w4D��3C��1C��0B��.A��-@��-=��0<��2:��3:��3:��3:��3�q +9�C6�K4�U3�`2�l1�z1��0��
/��-��-��+��)��(��(��(��(���� +� +� +� +
����) � +� +�% �1�?�L�Y�d�n�w��� +� +�)��(��(��(��(�� +�$ +�4� +�3�
�3��2��2��2��2��2��2��%�* + +-�[ +,�f ,�t+��*��(��'��&��$��#�� "�� +!�� +!�� +!�� +�� +�M +�[ + + +� +� +� +� + +����"� + +�� +� +�+� +�+� +�+� +� +�6��5��5��4��4��3��3��3��% +�9R�:[�;d
�;l
�<s
�<z�<��<��=��=��=��=��=��=��=��<��<��;��:��:��:��:��( +Y�BT�HO�MJ�S$F�[(C�c*B�n*A�z)@��'?��&>��$=��#=��!;~�#9}�$8{�&7z�&7z�&7z�&�i +-�� ,�� +��*��)��'�� +&��%��%��%���� +�� +� +� +� + � +� +� +� + +e + +�7� +�6��6��5�
�5�
�4��4��4�� +�<R�<Z�<b
�=i
�=p
�=w�=~�=��=��=��=��=��=��=��<��<��;��;��:��:��:��% +�BD
�BM�BU�B]�Bd�Bk�Br�By�B��C��C��B��B��B��B�~A�}A�{@�{@�z?�z?�z?��* +Zy@UxFPvLKuR"GtX&Dsa)Bsk)Asv(@s�'?s�%>s�$=s�"<s� ;r�!9p�"8n�#8m�#7m�#7m�#�b +8�I
5�R4�[2�e1�q1�
0��/��.�� +,�� +�� *��)��(��(��(���x + +� +� +� +�7� +�7� +�7� +�6�~6�}5�}5�|4�|4�� +�<Q�<Y�=`
�=g
�=m
�=t�=|�=��=��=�=�}=�{<�z<�w<�v;�u;�t:�t:�t:��) +�BE�BM�BT�B[�Bb�BiBp}Bx|B�zB�xB�wB�uA�sA�q@�o@�n@�m?�l?�l?�l?��0 +�HA�GI~FP|FWzF^yFewFluFttF|rF�pF�nF�lE�jE�hD�fD�eD�eC�eC�eC�eC��7 +m]?h[EdYK`XP"\VV&YU])WUe+TTn,STy,QT�,OT�+MT�+LT�*JS�)IS�(IR�&IR�$JQ�#JQ�"JQ�"�L +:�I
7�P5�Y4�c3�o2�|1��
0��/��.�� +-� +}�*|�
)z�)z�)z��p +�� + +� +� + +e +k +x7� +v7� +t7� +r6�p6�o5�o5� +n4� +n4� +�) +�<P~<W}<]
{=d
z=k
x=sv={u=�s=�q=�o<�m<�k;�i;�h;�g:�f:�f9�f9��1 +{BE
yALwASuAYsA`rAgpAonAwmA�kA�iA�gA�e@�c@�a?�`?�_>�_>�_=�_=��8 +pL?lKEiJLgJRdIYbI`aIg_Ip]Iz[I�YH�WH�UH�SG�RF�QF�QF�QE�QE�QE��B + +^\?ZZDVYJRWPNVV"KV^$IUg%GUq%FU}$EU�#CU�"BU�!@U� ?U�>T�>S�>R�>Q�>Q��R +Og@KeFGdLDcSAcZ?cd=cn<c{;c�:c�9c�8c�6b�5`�4_�3^�3]�3]��\ +,p�*n�
)m�(l�(l��h +.|^ +-|j ,|v+|�*|�){�({�&{�%y�$w�#v� "u� +"u� +�o +� +� +� + + +� +� +� +� +: + +l7� +j7� +h7� +f6�d6�b5�a5�a4� +`4� +`3� +�1 +q<Np<Un<[
l<b
k<j
i<rg<{e<�d<�b<�_;�];�[:�Z:�Y9�Y8�Y8�
Y8�
�8 +mAD
jAKhAQf@Xe@_c@fa@o_@x^@�\@�Z@�X?�V?�T>�S>�R=�R<�R<�R<��> +gFAdEGaEN_ET]D[[DcZDkXDuVDTD�RD�PC�NC�LB�LA�LA�L@�L?�L?��C +aK>^JE[JKXIQVHXTH_RHhPHrOH}MH�KG�IG�GG�EF�EF�EE�ED�ED�EC��H + +FaAB`H?_N<_V:__8_j7_v6_�5_�4_�3^�2^�0]�/[�.Y�-X�-X��\ +<gE
9gM7gU5g^4gh3gt2g�0g�
/f�.f�-e� +,d� +*b�)a�(_�(_��a +1oR/o\.og +-os ,o�+o�)n�(n�'m�&l�$j�#h� "g� +"g� +�g +� + +� + +u +| + +^7� +\7� +Z6� +X6� +V5�U5�T4� +S3� +S2� +S2� +�9 +c;Ma;S_;Z
^;a
\;j
Z;s
X;}V;�T;�R;�P:�N9�M9�M8�
M7�
M6�
M6��> +^@C\@IZ@PX@WV?^T?fS?pQ?zO?�M?�K?�I>�G=�F=�F<�F;�F:�F:��C +XE@
VEFSDMQDSOD[MCcKCmJCxHC�FC�DC�BB�@B�?A�?@�?@�??�@>��H +,Z� +Y� )W�(V�(T�
'T��W +2bP0bY/cd +-co +,b| +b�*b�(b�'a�&`�$^�#\� "[� +"[� +�[ +�! + +> + +O6� +M6� +K5� +I5� +G4� +G3� +G2� +G1� G1� �; +T;KR;RQ;YO:a
M:k
K;u
I:�
H:�
F:�
C9�
B9�
@8�@7�@7�@6�@5��? +BJC
?JJ=IQ;IY9Ic7In6I{4I�3I�
2I�0I�/H� +.G�-E�
-D�
-C��I +-O� ,O�*N�)M� (K�'J�'I��L +2VN +0WV.W` +-Wl ,Wx+W�)V�(V�&U�$U�#S�"Q�"P� !O� +�P +h� +vG +� +� + + +� +� +� +� + +D:RB:Z@:c>:m<:y::�8:� +7:� +59� 39� 38� 37� +36� +35� +�; +@?G=?O;?W9?`8?k6?w4?�3?� +1?� 0>� .>�-=� -;� +-:� +-:� +�> +7EM5EU3E_2Ei0Ev +/E� .E�,E�+D�)D�(B�'A�'@� '?� +�A + +h] + + +� + +J +P + + + + + + + + + + + +& + +Or +V6 +] +k +� + + +;� +9� + + + + + +9 +? + +,� +7j +>: +D +K + + + + + +$ +� +� +� +� +37 + +Q +_ + +� + + + +� +� +� +� + +!U + + + + +s + + + +l +( + + + + + + + + + + J +V +s +� + +# +� + + + +< +D +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~������������������������������������������������������������������������������������������������������������������������������������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D6��KH��S]��Zs��`���e���h���j���l���m�ʽrݽ�x誱����������������������������������������������������������������������( +��2��<&��D6��KG��R]��Ys��^���b���c���e���h���kѺ�oڭ�s䛴zzzzzzzzzzzzzzzzz�����( +��2��<%��D5��JG��Q\��Ws��\���^���`���c���fŹ�iή�lס�p���u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u�����( ��2��<%��C4��JF��P[��Vr��Y���\���_���b���d¯�gˤ�jӗ�m܈�q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q�����( ��2��;%��C3��IE��OZ��Tr��V���[���^���a���c���eǛ�hϏ�jׂ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�n�����( ��2��;$��C2��IC��NY��Qq��T���Z���]���_���a���cÓ�eˇ�g�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�����( ��2��;#��C0��IA��MW��Op��S���X���\���^���`���a���bƁ�e�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�����(��2��;!��C.��H?��JV��Mo��R���W���Z���\���^���_���`�{�b�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�����(��2��;��B+��H;��IV��Ln��P���U���Y���[���\���\�~�^�u�`�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�����(��2��;��B&��D<��HV��Jl��N}��S���W���X���Y��Z�v�[�o�^�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�����(��2��;��?"��C=��EU��Hh��Kx��Q���T���V��W�x�X�p�Y�i�\�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�����'��2��9��<$��A=��BR��Ec��Hr��M~��Q��S�w�T�p�V�j�W�d�Z�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^��� +��)��*#��,/��1;{�5Fq�9Ph�=Xa�@^\�DbY�GeW�JgU�MiS�QjR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�Tk����% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��9$��B2��JA��ST��\h��d|��l��t��z�䣀�ޜ��ږ��Վ��Ҋ�z��v�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv������% +��/��9$��B1��JA��RT��[h��c|��j��q��v��|�ݥ��؟��Җ��͏��}��{��{��{��{��{��{��{��{��{��{��{��{��{��{��{������% +��/��9$��B1��I@��QS��Zh��a}��h��n��r��w�ۮ{�֩��ѣ�����馇�ꛂ�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂������% +��/��9#��A0��I?��PS��Xh��_}��e���j���n��q�ںu�չ}�ȯ�ಟ�Ꞓ�쒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉������% +��/��9#��A/��H?��PR��Wh��^}��c���g���i���l���r���x־�ߨ��阢�틓�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ������% ��/��9#��A.��H>��OQ��Vg��\}��`���c���e���i���nͼ�rְ�xޞ�~蔵�뇢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢������% ��/��9"��A.��H=��NQ��Ug��Z}��^���_���b���fº�i̯�mբ�qޑ�v牸�煳�关�关�关�关�关�关�关�关�关�关�关�关�关�关������% ��/��9!��A-��G<��MP��Tf��X|��Z���^���a���d���fʤ�iӖ�kۆ�o䀺���������������������������������������������������% ��/��8 ��@+��G;��MO��Re��U|��Y���]���`���b���dƛ�fώ�h׀�l�{�}�y���y���y���y���y���y���y���y���y���y���y���y���y���y���y�������% ��/��8��@*��G:��LM��Pc��R{��X���\���_���a���b�dʆ�f�{�j�v�x�u���u���u���u���u���u���u���u���u���u���u���u���u���u���u�������%��/��8��@(��F8��KJ��Mb��Pz��V���[���]���_���`���b��c�v�h�q�t�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�����%��/��8��@&��F4��JG��Lb��Ox��U���Y���[���]���^���_�y�a�p�f�l�p�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�����%��/��8��?"��E0��GH��Ja��Mv��R���W���Y���[���[�z�\�r�_�k�d�h�m�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�����$��/��7��?��A/��FH��H_��Kr��P���T���W���X�{�Y�s�Z�k�\�f�a�c�i�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�����$��.��7��;��@1��CH��E\��Hm��M{��Q���T�|�U�t�W�l�X�f�[�a�_�^�e�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�����$��- ��4 ��8��>2��@E��BW��Ef��Is��N~|�Q�t�S�l�T�g�V�b�Y�^�]�\�b�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g��� +��6��:1��;A��>Q��B_��Ej|�Its�M{k�O�f�R�a�T�^�W�[�[�Y�_�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c��� +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@.��I<��RL��\_��fq��p���x��ꍇ�冎�―��}���|���{���r�Ⱥj�ɸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk������" +��,��6"��@-��H;��QK��Z^��dq��m���v��~�蕄�㍊�߆��܁��ۀ���z�ϼp�ѱn�ίo�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o������" +��,��6"��?,��G:��PK��Y^��bq��j���s��z�瞂�ᖇ�܍��ن��ք���y�رq�ةs�ѧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs������" +��,��6!��?+��G9��OJ��X^��`q��h���p���w��}�����ڕ��Ԍ��͈�ۼ��۪w�ڢw�Ԡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw������" ��,��6!��?+��F8��NI��W]��_q��f���m��t��y�ަ�֠��ʔ���ܵ��ݣ}�ݚ{�י{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{������" ��,��6 ��>*��F8��MI��V]��]q��d��k��p��u�۰|�Χ���״��ݮ��ߜ��ߓ�ڒ�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג������" ��,��6 ��>)��F7��MH��U\��\q��b���h���l��r�Էy�ǭκ��֬��ޢ��┋�ዃ�܋��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ�������" ��,��6��>(��F6��LG��T\��[q��a���e���j���p�ͽv���|ͳ��դ��ݖ��㍓�ㄉ�߄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄�������" ��,��6��>(��E6��LG��S[��Yp��^���b���g���m���sù�x̬�}՝����㇟��~���~���~���~���~���~���~���~���~���~���~���~���~���~�������" ��,��5��>'��E5��KF��RZ��Xp��\���`���e���j���p²�u̥�yԕ�}܇��ᅮ��{���z���z���z���z���z���z���z���z���z���z���z���z���z�������" ��,��5��=&��E3��KD��QY��Vo��Y���]���b���g���k���p˝�tӍ�xڃ��ށ���y���x���x���x���x���x���x���x���x���x���x���x���x���x�������"��,��5��=$��D2��JC��OW��Tn��V���[���_���c���f���iʐ�l҃�p�|�}�y���v���u���u���u���u���u���u���u���u���u���u���u���u���u�������"��+��5��=#��D0��JA��NU��Pl��T���Z���]���_���a���bȂ�c�w�h�s�u�q�oÜ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�����"��+��5��= ��D-��I=��KS��Nk��R���X���[���]���_���_�{�a�q�e�m�q�kƀ�jǒ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�����"��+��4��<��C)��G9��JS��Mj��P~��V���Y���[���\�~�]�t�_�l�d�h�m�g�z�f̉�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�����!��+��4��<��B"��D:��HR��Kh��Nz��S���W���Y���Z�v�[�m�]�g�b�d�j�b�u�a҂�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�����!��+
��3��;��="��C;��FQ��Hd��Ku��Q���T���V�x�W�o�Y�h�[�c�`�_�f�^�p�]�{�\��\��\��\��\��\��\��\��\��\��\��\��\������!��* ��2 ��1��<%��A;��BN��E_��Hn��M{��Q�z�S�p�U�i�W�c�Z�_�^�\�c�[�k�Y�t�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w��� +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=+��F7��PE��ZV��eg��ox��x����������z���w���v���u���u���s���n���g���f���f���f���f���f���f���f���f���f���f���f���f������ +��)��3 ��<*��E6��OD��YU��cg��mx��v���~��遍��{���y���x���x���s���l���h���j���j���j���j���j���j���j���j���j���j���j���j������ +��)��3 ��<(��E4��MC��WT��ag��kx��t��|�푃�牊�げ��|���{���y���q�Ǻh�ɳl�°n���n���n���n���n���n���n���n���n���n���n���n������ ��)��3��<'��D3��LB��VT��_f��hy��q��z�왁�摇�����݀���}���{���t�Ͳn�̫p�Ʃr���r���r���r���r���r���r���r���r���r���r���r������ ��)��3��<&��D2��KA��TS��]f��fy��n��v��~�䙄�ڌ��Ѓ��ˁ��Ƀ�иz�ϫs�Ϥt�ɢu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu������ ��(��2��<&��D2��K@��SR��\f��dy�l���s��z�ݞ��Ҕ��NJ�����Ѿ��ұ��Ҥx�ҝw�̛x�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx������ ��(��2��;%��C1��J@��SR��[e��by�j��p��v�ץ}�˛�����ͷ��ӳ��ԫ��ԝ}�Ԗz�ϕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{������ ��(��2��;$��C0��J?��RQ��Ze�ay�g��m�ݲt�Ѫ{�š�ú��̯��ө��֤��֗��}�я~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~������ ��(��2��;#��C/��J>��QP��Xd�_x��e��k�ظr�̰x���~³��̨��ԟ����؏��؉��Ԉ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ������� ��(��2��;"��B.��I=��PO��Wd��]x��c���i�Ӿp�Ƶv���{��ˡ��ӕ��ِ��ڈ��ځ��ց��с��с��с��с��с��с��с��с��с��с��с���������(��2��:!��B-��I<��ON��Vc��[x��`���g���m���s���x���}ʚ��ӌ��ن��܁���z���z���z���z���z���z���z���z���z���z���z���z���z���������(��2��: ��B,��H;��NM��Ta��Yw��^���d���j���o���t���yɒ�}҅������}���u���u���u���u���u���u���u���u���u���u���u���u���u���������(��2��:��A*��H9��MK��R`��Vu��[���a���g���l���p���tȊ�w��~�{���z���s���r���r���r���r���r���r���r���r���r���r���r���r���������(��1��:��A(��G7��LH��P]��St��Y���^���c���g���k���nǁ�r�y�{�w���vģ�o���o���o���o���o���o���o���o���o���o���o���o���o���������(��1��9��A%��G3��KD��M\��Qs��V���Z���^���a���c���f�w�j�q�u�nDŽ�mǗ�kȬ�k���k���k���k���k���k���k���k���k���k���k���k���������(��1��9��@"��F/��HC��L[��Oq��S���X���[���\���]�w�^�l�c�h�m�f�{�eˋ�d̞�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�������(��0��8��?��B+��GC��JZ��Mn��Q���V���X���Z�|�[�p�\�h�b�d�j�c�v�bу�aє�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�������'��0
��7��=��A,��EC��HX��Jk��N{��S���V��W�t�Y�j�[�c�`�`�g�^�q�^�}�]؋�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�������' ��. ��4 ��8��@.��CC��EU��Gf��Kt��P���S�w�U�m�W�e�Z�`�^�]�d�[�l�Z�v�Y߂�Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���������%��)��)��8��=/��?A��AQ��D`��Gm��Lxx�O�o�R�g�U�a�X�]�\�Z�b�Y�h�W�p�W�z�V联V联V联V联V联V联V联V联V联V联V联V联�� +��%��0 ��:(��C2��L?��WN��a_��ln��v}�����z���u���r���q���q���q���p���l§�hŨ�bĩ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ���� +��%��0��9&��B1��K>��VM��`^��jn��t~��}��z���v���t���t���s���p���l���f���f���hê�hê�hê�hê�hê�hê�hê�hê�hê�hê�hê���� +��%��0��9%��B/��J=��UL��_]��hn��r~��{�퀋��z���v���v���u���p���i���f���i���l���l���l���l���l���l���l���l���l���l���l������ +��%��/��9$��B.��J;��TK��]\��gn��p�x��ꇈ��~���x���u���v���r���m���j���m���o���o���o���o���o���o���o���o���o���o���o������ ��%��/��8#��A-��I:��RJ��[\��en��n�v��~�㌄�ۀ���y���x���z���x�ºr�¯m���p���r���r���r���r���r���r���r���r���r���r���r������ ��%��/��8"��A,��H9��PI��Z[��bm�k�t��{�ܑ��҇���~���|���}�ſ}�ųw�Ĩq�Ĥs���u���u���u���u���u���u���u���u���u���u���u������ ��%��/��8!��@+��H8��OH��XZ�am�i�q��w�֙~�̎��
�»��Ǹ��Ƿ��Ǭ|�ǡv�ǝw���x���x���x���x���x���x���x���x���x���x���x������ ��%��/��8 ��@*��G7��OG��WY�_m�g�n�ۧu�О|�ƕ�����²��Ȯ��ʭ��ʥ��ʚz�ɖy�Ôz���z���z���z���z���z���z���z���z���z���z������ ��%��/��8��@)��G6��NF��VX�]l�d�k�֭s�ˤy�����������ɥ��̣��̝��̒~�̎|�Ǝ}���}���}���}���}���}���}���}���}���}���}������ ��%��/��7��?'��G5��ME�TW�\k�bܹi�ѱq�ũw���|��������ɛ��Θ��ϕ��ϊ��·��ɇ��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç������� ��%��/��7��?&��F4��LC��SV��Zj��`~ؿg�˶n���t���z���~����ɒ��ύ��ы��т���~������������������������������������������%��.��7��?%��F2��LB��RT��Xi��^}��e�Ƽl���q���v���{���ȉ��Ђ��Ӏ���{���v���x���x���x���x���x���x���x���x���x���x���x���������%��.��7��>#��E0��K@��PR��Vg��\|��c���i���n���s���w���{ǁ���z���y���v���q���q���q���q���q���q���q���q���q���q���q���q���������%��.��6��>!��E.��J=��NO��Sf��Yz��`���f���j���o���s���v�z�|�u���t���r���m���m���m���m���m���m���m���m���m���m���m���m���������%��.��6��=��D*��I9��LL��Qd��Wy��]���b���f���j���m�~�q�s�x�p���o���n���j���j���j���j���j���j���j���j���j���j���j���j���������%��-��5��=��C&��H4��KJ��Ob��Tw��Y���]���a���d���f�u�k�m�u�kDŽ�jʖ�jͫ�f���f���f���f���f���f���f���f���f���f���f���f���������%��-��5��<��B��E3��JJ��Ma��Qt��U���X���Z���\�v�^�j�c�e�o�d�}�cь�bѝ�aҲ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�������$��,��4
��:��<��D4��HJ��J_��Mq��R���U���W�z�X�m�Z�d�`�`�j�_�v�^փ�]ג�\ؤ�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�������$��+��1��2��< ��B5��EI��G\��Jl��Nz��R�~�U�r�V�h�Y�a�_�]�g�[�q�Z�|�Yވ�Xޘ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�������"��'��'��2��;"��?5��BG��DW��Gf��Ks��O~u�R�k�T�c�X�]�]�Z�d�Y�m�X�v�W倘V捗V晖V晖V晖V晖V晖V晖V晖V晖V晖V晖V晖��
������ +��#��&��*){�.4p�1=g�4E_�8LX�<QS�?TO�CWM�HYK�LZJ�QZI�U[H�Z[G�_[G�eZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZӸ +����z�#%o�&.d�*6\�.<V�2AQ�6EM�:HJ�=JH�AKF�ELE�HLC�LMC�OMB�SMA�XM@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L�� +��y�n�!c�)Z�#/S�'4N�,8J�0;F�3=D�6?B�:?@�=@?�@@>�BA=�EA<�IA:�MA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�x.!�7'��A1��J<��UJ��aX�{mf�uyr�o�|�l���k���k���k���k���kÉ�kˊ�h�eЌ�bӍ�_֎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎������#�z- ��7&��@/��I;��TH��_W��jf�|ut�v��q���n���m���m���m���m���lȔ�hʕ�e͖�bЗ�_И�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ������#�~-��6$��?-��H9��SG��]V��hf��rt�}}��w���r���p���o���o���o���mĞ�iǟ�eʠ�`ɡ�b͜�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ������"��-��6"��?+��G7��QE��\U��fe��pt��z��|���v���r���p���p���p���m���hĨ�cĩ�cƧ�fʡ�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜������"��,��5!��>*��G6��QD��[T��ee��nu�w���z���t���p���o���n���m���i���e���fë�iǤ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ���� +��"��,��5 ��>)��G5��PC��ZS��cd�lu�u��}�����u���p���p���q���s���n���j���j���lŨ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ���� +��"��,��5��>'��F3��OA��XR��bc�kt�s��z�݄���y���t���t���u���w���t���o���m���p¬�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ���� +��"��,��5��>&��E2��M@��VP�_b�it�q�ߔw�~�́���z���x���y���z���y���t���q���s���tê�tê�tê�tê�tê�tê�tê�tê�tê�tê���� +��"��+��4��=$��E0��L>��UO�]b�ft�n�ٛu�В|�ƈ�������|���|���~������x���t���v���w���w���w���w���w���w���w���w���w���w������ +��"��+��4��=#��D/��K=�SN��\`�dsݨk�ԡs�ʙz�������������������������}���x���y���y���y���y���y���y���y���y���y���y���y������ ��"��+��4��<"��D-��K<�RL�Z_�bsٮi�Ϧq�Ğw���}��������������������������{���|���|���|���|���|���|���|���|���|���|���|������ ��"��+��4��< ��C,��J:�PK�X^߸`qԲg�ʫo���u���z�����������Ô��Ē��Ď��Ć�Å������������������������������������ ��"��+��3��;��C*�I8�OI��W\۾^pϷe�Űl���r���x���}��������ĉ��LJ��Dž���}���}���~���~���~���~���~���~���~���~���~���~������� ��"��+��3��;��B(�H6��NF��UZ��\oʼc���j���p���u���y���~��������|���{���u���t���v���v���v���v���v���v���v���v���v���v������� ��"��*��3��;��A%��H3��MC��RY��Zm��a��g���m���q���v���z��~�v���t���s���o���n���o���o���o���o���o���o���o���o���o���o���������"��*��2��:�A"��G/��K?��OW��Wl��^}��d���i���m���q���u�w�z�p���o���n���l���i���j���j���j���j���j���j���j���j���j���j���������!��*��2��9��@��F)��F=��NU��Uj��[{��`���e���i���l�|�p�p�v�k���j���j���i���f���f���f���f���f���f���f���f���f���f���f�����
����!
��)��1��8��>��C"��G:��LR��Rg��Wy��\���`���c��f�r�j�i�s�f���f���eã�dŸ�b���b���b���b���b���b���b���b���b���b���b�����
����! +��( +��0 +��6
��;��@#��G:��JO��Od��Sv��W���Z���\�u�_�i�d�c�o�a��aҐ�`Ԣ�_ַ�]���]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê��
����!��'��-��1��6��@%��E;��HN��Ka��Or��R���U�x�V�k�Y�a�_�]�j�[�y�Z܇�Yݖ�Yݦ�W�X�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢ��
������#��%��$��7��>'��B:��EL��G]��Kl��Oy|�R�p�T�f�X�^�^�Z�g�Y�s�X��W䌛V䚚U嫙T庘T庘T庘T庘T庘T庘T庘T庘T庘T庘������� +��3��7(��:7��=D��@Q}�B]s�Fgj�Job�Ov\�TzX�Z}U�a~S�i~R�q~R�{}Q��|Q��{P��zP��zP��zP��zP��zP��zP��zP��zP��zP��z�� + +v�j�`�!W�'P� ,J�%0F�)3B�-5?�07=�48;�78:�;98�>97�A96�D95�H94�L93�P93�P93�P93�P93�P93�P93�P93�P93�P93�P9�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�~�z�s!�l-!�s5&�w>/�yH9�xSE�s`R�mm^�hzh�e�n�d�q�d�s�d�t�d�u�e�u�e�v�f�w�d�w�b�x�`�x�^�y�[�z�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y��{
�u!�p,�x4$�}>-�G7�QD�z^Q�tj_�nvj�i�s�g�x�f�{�f�|�g�}�g�~�g��g��eԀ�cׁ�`ڂ�]݃�\���]�~�]�~�]�~�]�~�]�~�]�~�]�~�]�~�]�~���|
�v!�t*�}4#��=+��F6��PB��\P�{g^�urk�o~v�j�}�i���h���h���h���h���hˈ�fщ�cԊ�_�\ٌ�^݇�_߃�_߃�_߃�_߃�_߃�_߃�_߃�_߃�_߃���}
�w �x*��3!��<)��E4��N@��ZO��e^�{pl�tzx�n���k���j���i���i���i���iǑ�f͒�bє�^ҕ�_Ց�bڋ�b܈�b܈�b܈�b܈�b܈�b܈�b܈�b܈�b܈���~�x �{*��3��<'��D2��M?��XM��c]��ml�{wz�t���n���k���j���i���i���h�fʜ�a̞�`Λ�cҖ�e�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ����y �~)��2��;%��D0��L=��WL��a\�kl�tz�z}��r���l���j���i���i���j���jɢ�fɢ�dʠ�fΚ�hӔ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ����z ��)��2��;$��C.��K;��VJ��`Z�ik�r{�z��v���n���k���l���m���n���pƥ�kǥ�hǤ�j˟�lЙ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�����{ ��)��1��:"��C,��K9��UH�^Y�gj�p{އv��}}��u���p���p���q���r���s���pĩ�lĩ�mȣ�o͝�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�����| ��(��1��: ��B*��J7��SF�]X�fi��m{؎t�υ{��|���v���t���u���v���w���u¬�p¬�qŧ�rʠ�s͜�s͜�s͜�s͜�s͜�s͜�s͜�s͜�s͜�����}��(��1��:��B(��I5�QE�ZV�chkzҕr�Ɍx���~��|���y���y���z���{���z���u���të�uȤ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�����}��(��0��9��A&��H3�OC�XT�ag֢iy͚q�Òw���|������~���|���}���~������y���w���xŧ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�������'��0��9��@$�G1�N@�WRܮ_fҧgwȠn���u���z�������������������������}���z���{ë�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ���� +����'��0��8��@"�G/�M>�VOس]dͫevål���s���x���|��������������������������}���}���}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ���� +����'��0��7��? �F,�L;TNӷ\cȰct��j���p���u���z���~��������������������z���|���|�¬|�¬|�¬|�¬|�¬|�¬|�¬|�¬|�¬���� +����'��/��7��>�E)��K7��QLϼZaõas��h���n���s���w���{�����|���y���x���v���q���s���t���t���t���t���t���t���t���t���t������� +����&��.��6�=�D%��I4��OJ��X_��_q��e���k���p���t���x�}�}�s���p���p���o���j���l���m���m���m���m���m���m���m���m���m������� ��
��&��.
��5�<��B ��E2��MH��U]��\o��b��g���l���p���t�u�y�m���k���j���j���f���g���g���g���g���g���g���g���g���g���g������� ����& +��-��4��;��@��A/��KF��S[��Ym��_|��d���h���k�y�o�n�u�h���f���f���e���c���c�¬c�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩ������ ��%��+�2 +��7��8��@,��IC��PX��Vj��[z��_���b�}�f�p�i�g�q�c�~�b���a���a���_�ê_�ŧ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ�� +������#��(��-��.��:��C)��G@��MU��Rg��Vw��Y��\�s�_�g�d�`�m�^�|�]Ɍ�]˞�\ͯ�[�ȣZ�ʠZ�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞�� +������ �"����,��;��B+��E>��IQ��Mc��Ps��R�u�U�h�X�_�^�[�j�Y�y�X܊�Xݛ�W߬�V�U�ИV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕ�� +������ +��9��?,��B=��EN��H^��Lly�Oxm�R�c�V�\�]�X�h�V�v�UꄐUT뢎S볍R�̌Q�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ы�� ���� +�w
�x��$��-��6��>!��F,��M:�WJޝ`]Ԗhnˎo}Æu��~{��x���v���v���v���w���x���vȣ�sɢ�tΛ�tҕ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�{ +�x�z��$��-��5��=�E*�L8�VH٣^[МgmƔm|��s���y��~��{���y���z���{���{���{Ʀ�vƦ�v˟�vИ�vі�vі�vі�vі�vі�vі�vі�vі�| +�x�|��$��,��5��<�D'�K4߭TEը]Yˠek��lz��r���w���|������}���}���~���~���ê�yĪ�yȣ�y͜�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�| +�y���$��,��4��;�C$�J1۱RCѬ[Wƥci��jx��p���u���y�������������������������}���|Ƨ�|˟�{̝�{̝�{̝�{̝�{̝�{̝�{̝�{̝�} �z����#
��+��3�;�B �H-PA̰YVªah��hw��n���s���w���|�����������������~���z���y�êzȣzʠzʠzʠzʠzʠzʠzʠzʠ�~ �z����#��*��2�9�@F*ӺO@ȴWT��_f��fu��k���q���u���y���~�z���w���u���t���q���p�¬r�ǥr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣ�~ �{����# +��* +��1��8�?��C(οM>ùUR��]d��cs��i���n���r���v�{�z�q���m���l���k���j���i�¬j�Ʀk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥ��|�� +��"��)��/ +�6
��<��@&��K<��SO��Zb��`q��f��j���n��r�s�w�k���h���g���f���f�¬d�ĩe�Ȥe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢ���} +����!��'�,��2��3��>#��H9��QM��W_��]o��b|��f���j�x�n�l�s�e�}�c���b���b���a���`�Ǥ`�˟a�̞a�̞a�̞a�̞a�̞a�̞a�̞a�̞��� +���� ��$�'��(��,��; ��E6��MJ��T\��Yl��]y��a�{�e�o�i�e�o�`�{�_���^���^���]���\�̞\�Ϛ\�И\�И\�И\�И\�И\�И\�И\�И����������� + +�� ~�$t�)%j�,.`�06X�3<Q�7BK�;EG�AHD�GJB�NK@�UK?�]K>�fJ=�pI<�zI;��H:��G:��F:��F:��F:��F:��F:��F:��F:��Fή +}�r�h� !^�$(V�(/O�,4I�08D�4;A�9=>�?>;�D>9�J?7�P?6�W>5�^>4�f=3�o<1�{;1�;1�;1�;1�;1�;1�;1�;1�;Ÿ +p�f�\�S�#L�(F�$,A�'/<�+19�037�535�943�>41�C4/�I4.�N4-�T3,�[3*�c2*�f2*�f2*�f2*�f2*�f2*�f2*�f2*�f2�� +�d�Z#�f%�n.�r7$�rA.�qJ8�mVD�gbP�bn[�^zb�\�f�[�h�\�i�\�j�\�k�\�k�]�l�]�m�]�n�\�o�Y�o�Z�k�\�g�]�c�]�c�]�c�]�c�]�c�]�c�]�c�]�c�l +�e�_!�k$�s-�x6"�y?+�xI6�uSB�p_O�ik\�cvf�_�l�^�p�]�q�]�s�]�t�]�u�]�v�]�w�]�x�Z�z�\�v�]�q�^�m�_�h�_�h�_�h�_�h�_�h�_�h�_�h�_�h�m
+�f�c�o#�x,�}5�>(�G3�~Q@�x]N�qg\�jrh�d{r�`�w�_�{�^�|�^�~�]��^���_ƀ�`�^��_�|�`�w�a�r�b�m�b�m�b�m�b�m�b�m�b�m�b�m�b�m�n
�h�g�t#�},��4��=%��F0��O=�ZK�ze[�rni�iwv�c��`���`���a���b���c���d���dх�cޅ�b���c�}�d�x�e�r�e�r�e�r�e�r�e�r�e�r�e�r�e�r�n �i�j�x"��+��4��<"��E-�M:�XI�bY�zki�prx�iz��e���e���e���f���g���h���iɊ�iڊ�f܈�g���h�}�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�o �j�n�|"��*��3��;��D*�L7�WF�`Vقhg�ypv�qw��l��j���j���j���k���l���m�nՏ�j؎�k܇�k���l�|�l�|�l�|�l�|�l�|�l�|�l�|�l�|�p �k�q�!��*��2��;�C&�K4�VBܑ_TӉgeˁnt�yt��s{��o���n���n���o���p���q���qΓ�nԓ�oٌ�o݇�oလoလoလoလoလoလoလo��q�k�t��!��)��1��:�B#�J0��U?ח^QΏecňlr��r�zx��u��r���r���s���t���t���uȗ�rї�rՑ�rڋ�rބ�rބ�rބ�rބ�rބ�rބ�rބ�rބ�q�l�w��!
��(��1��9��A �I,ܢS<Ҝ\Oɕda��jp��p}��u��{|��w���v���w���w���x���x�vΚ�uҖ�u֏�tۈ�t܈�t܈�t܈�t܈�t܈�t܈�t܈�r�m�y
��!��(��0�8�?�G(اQ:ΡZMĚb_��in��n{��s���y��|��z���z���z���z���{���z̞�wϚ�wӔ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�s�n�|�� +��'��/
�6�>ޯF#ԫO8ʥYK��`]��gl��mz��r���v���|��~���}���}���}���~���~ɡ�{̞�zЗ�yՐ�y�y�y�y�y�y�y�s +�o�~�� ��' ��-�5�<۳C!ЯN7ƩWJ��_[��ek��kx��p���t���y�����������}���|���z�Ťw~ɢx}Λx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕ�t +�p
�� +����&��, �3�:ַA ̳L5��UH��]Y��ci��iv��n���r���v���{�x���u���s���q���p���n�Ǥo�̞p�їp�іp�іp�іp�іp�іp�іp�і�u +�r������$�*�06Ҽ?ǷJ2��SE��[W��ag��gt��k���p���t�y�x�o��k���j���i���h���f�Ȥg�̞h�Иh�Зh�Зh�Зh�Зh�Зh�Зh�З�v �u������"�&�+��. ��=½H0��QC��XT��^d��dr��h~��l�}�q�r�u�i�}�e���d���c���c���a�ʠb�Λb�Җb�Җb�Җb�Җb�Җb�Җb�Җb�Җ�w �y ������� ��)��:��E-��N@��UQ��[a��`o��e{��i�v�m�k�r�c�{�`���`���_���_���^�Κ^�і^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց�x�~������ + + +y�o�e�[� S�#&L�'+F�+/A�02=�54:�:67�@64�F73�M61�T60�\5.�e5-�o4,�y3+��2+��2+��2+��2+��2+��2+��2+��2�� +V�M�F� ?�
9�4�!1�".�#+�$$)�(%'�,%%�1%#�6% �;%�@$�F$�L#�S"�S"�S"�S"�S"�S"�S"�S"�Y�O�E'�F-!�I3%�I<+�GH2�EU8�Cc<�Cr=�D�=�D�=�E�=�F�=�G�<�H�<�H�<�I�<�I�;�J�;�J�;�K�;�K�:�L�:�L�:�M�:�M�:�M�:�M�:�M�:�M�:�M�:�M�:�Y�P�E'�H, �K2%�K;+�JF2�GS8�Ea=�Ep?�E~?�F�?�G�?�H�?�I�?�I�>�J�>�J�>�K�>�K�=�L�=�L�=�M�=�M�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�Z�Q�F&�L*�P0#�Q:*�OD1�LQ9�I^>�HmB�H{C�I�C�J�C�K�C�L�C�L�C�M�C�M�B�N�B�N�B�O�B�O�B�P�B�P�B�P�B�P�B�Q�A�Q�A�Q�A�Q�A�Q�A�Q�A�Q�A�[�R�H&�P(�U."�W8(�UC0�QN9�N\@�KjD�LxF�L�G�M�G�N�H�N�G�O�G�O�G�P�G�P�G�Q�G�Q�H�R�H�R�H�R�H�R�H�R�F�S�D�S�D�S�D�S�D�S�D�S�D�S�D�\
�S�L$�U'�Z- �\7&�[A/�VL8�SY@�PgG�OtJ�O�L�P�M�P�M�Q�M�Q�M�R�M�R�M�S�M�S�N�T�N�T�N�T�O�T�O�T�N�U�K�U�I�U�I�U�I�U�I�U�I�U�I�U�I�^
�T�P"�Y%�`,�c6$�b@-�_J6�ZV@�VcI�SpN�S}Q�S�S�S�S�T�T�T�T�T�T�U�U�U�U�U�V�V�V�V�W�V�W�V�W�W�S�X�P�X�N�X�N�X�N�X�N�X�N�X�N�X�N�_
�V�U �_"�g+�j4!�j>*�gH4�bS?�]_I�YlR�WxW�V�Z�V�[�V�\�V�\�W�]�W�^�W�^�W�_�X�`�X�a�W�a�Y�]�Z�Z�Z�V�[�S�[�S�[�S�[�S�[�S�[�S�[�S�`�W�Y�d!�m*�q3�q<'�oF1�lP=�f\I�`hT�[s\�Y~a�X�c�X�e�X�f�X�g�X�h�X�i�X�j�X�k�X�l�Z�h�[�d�\�`�]�\�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�a�X�^�j �s)�w2�x;#�xD.�uN:�oYG�hdT�bn`�]yg�[�l�Z�n�Y�p�Y�q�Z�q�[�q�\�q�]�q�]�q�]�o�_�j�`�f�`�b�a�_�a�_�a�_�a�_�a�_�a�_�a�_�b�Z�b�o �x(�}1�: �C*�~K6�yWD�raR�jka�bsl�]}t�]�v�]�w�^�w�_�w�_�w�`�w�a�w�a�w�a�v�b�q�c�l�c�g�d�d�d�d�d�d�d�d�d�d�d�d�d�d�c�[�g�t�}'��0��9��A&�J2�U@�{_P�sg`�jom�dxv�b�z�a�|�b�|�c�|�c�|�d�|�e�|�f�|�e�|�e�w�f�r�f�m�g�i�g�i�g�i�g�i�g�i�g�i�g�i�d�]�j�x��&��/��7�@"�I.�T<ۃ]L�{e]�sml�ltv�h|}�f���f���g���h���h���i���j́�jၪi�|�i�w�j�r�j�n�j�n�j�n�j�n�j�n�j�n�j�n�e�^�n�{
��&
��.��6�?�G*ޑS8Պ\J͂c[�{ji�tqu�nx~�k���k���k���l���l���m���mƅ�nچ�m���m�|�m�w�l�s�l�s�l�s�l�s�l�s�l�s�l�s�f
+�a�q
���%��-��5�=�F%ڗR5АZGljbX��hg�{ot�uu~�q|��o���o���o���p���q���q���rԊ�p݇�pၔo�{�o�w�o�w�o�w�o�w�o�w�o�w�o�w�g
+�d�t�� +��$ +��+�4�<ߟE ՜P3̕YE`V��ge��mr�|r}�wy��t���s���s���s���t���t���uΎ�sٌ�sޅ�r��q�{�q�{�q�{�q�{�q�{�q�{�q�{�g
+�f�w +����#��* �2
�:ۤCѠN0ǚXC��_T��ec��kp��p{�}v��y|��w���v���v���w���w���wȒ�vՐ�uۊ�t߄�t��t��t��t��t��t��t��h +�i
�z ����"��)�0 +�7بAͤL.ÞVA��^R��da��in��nz��s��~y��z���y���y���y���z���zÖyҕ~x؎~w܈}v߃}v߃}v߃}v߃}v߃}v߃}v߃�i +�k�|����!��'�-ެ4 +Ӭ?ɨK,��T?��\O��c_��hl��mx��q���v��|�}��}|��{}��y}��w~��u}ϙu|Ԓv{ًuy݇uy݇uy݇uy݇uy݇uy݇uy݇�j �n����� �$�)۱.ϰ=ŬI*��R<��ZM��a]��gj��kv��o���s�}�x�v���r���p���o���m���l�Λl�ҕmm~ۊm~ۊm~ۊm~ۊm~ۊm~ۊm~ۊ�j �q �������� �"ֶ*˴;��G(��P:��XK��_Z��dh��it��m��q�v�u�m�|�i���g���f���e���d�̚e�ҕe�֏f�ڋf�ڋf�ڋf�ڋf�ڋf�ڋf�ڋ�k �t������� +�x���� +�} +����
+��;��E,��L=��QL��VZx�Zgn�]rc�b{[�i�W�t�V���U���U���T��S��~S��|T��yT��wT��wT��wT��wT��wT��wT��w�u��� +��+{�0q�5+f�96]�<?T�AGN�GMJ�OPG�YRF�cRE�pQD�~PD��NC��MC��LB��KA��IA��IA��IA��IA��IA��IA��IA��Iڙ +J� +��" +��)�1�:�D ؊O/σXA�|`Q�ug_�onj�jur�h~v�h�x�h�x�h�x�i�x�i�x�j�y�j�y�k�w�k�q�k�m�j�h�j�f�j�f�j�f�j�f�j�f�j�f�Z
�_�o +�{��!��( �/�8ݔCӏN,ʉW>��^N�|e]�vki�qrr�nyx�l�{�l�|�l�}�m�}�m�}�m�}�n�}�n�}�n�w�m�q�m�l�l�k�l�k�l�k�l�k�l�k�l�k�[
�b�r �����&�- �5
ٙAΔL*ŎU<��]L��cZ�}ig�wor�svy�q}~�o���o���o���p���p���pŁ�pۂ�p�{�p�v�o�q�o�o�o�o�o�o�o�o�o�o�o�o�\�e�u������$�+ߝ2 ԝ?ʘK(��T9��[I��bX��he�~mp�yry�uy��s���r���r���s���s���s���sֆ�s r�z�q�u�q�s�q�s�q�s�q�s�q�s�q�s�\�g
+�x�����!�'ۣ-С=ƝI%��S7��ZG��aV��fc��kn�~px�zu��w}��u���u���v���v��~v��}vъ|vބ{u�~zt�yzs�wzs�wzs�wzs�wzs�wzs�w�]�j �z������!צ*̥;¡H#��Q5��YE��_S��ea��il��nw�s��{y�}y��zy��xy��vy��tz��szˍsz܈sx��rw�|rv�{rv�{rv�{rv�{rv�{rv�{�^�m +�}����� + + �x�� +>� +�q�y�~& +�.
�7��A�|M*�uW;�n_J�hfW�cn_�awd�`�f�`�f�a�g�a�g�b�g�b�g�c�g�c�g�c�g�f�b�g�]�g�Y�f�U�f�U�f�U�f�U�f�U�f�U�M�Z�i �u�}��$�+ �4ۈ@уL'�|U8�v\H�odU�jk_�gsf�e{j�e�k�e�k�e�l�f�l�f�l�f�l�g�l�g�l�i�g�i�b�i�^�h�Z�h�Z�h�Z�h�Z�h�Z�h�Z�N�]
�l�x����"�(��0 ֍>̈J%ÂS6�|[E�wbS�qh^�mog�jvl�io�i�p�i�p�i�p�i�q�j�q�j�q�j�q�k�m�k�g�k�c�j�_�j�_�j�_�j�_�j�_�j�_�O�` +�p�{����%ܓ,ё<ǍH"��R3��YB�}`P�xf\�slf�psn�mzr�l�t�l�u�l�u�l�u�l�u�l�u�m�v�n�r�n�l�m�h�l�d�l�d�l�d�l�d�l�d�l�d�R�c �s
������ ؗ)͕;ÒG ��P0��X@��^N�~dZ�yje�ton�qvt�o~w�o�x�o�y�o�y�o�y�o�z�o�z�p�w�p�q�o�ln�hn�hn�hn�hn�hn�h�T
�f�v���� + +��B��M)��T8��[F��`S��d_��ij�msx}r|qzy�my��ky��iz��hz��fz��f{g{�{gy�vgw�rgw�rgw�rgw�rgw�rgw�r�] �o�� +��>��F&��L4{�RAr�VLi�ZX`�_aY�fhT�olR�{lQ��kQ��jP��hO��gO��eO��cO��aP��_P��_P��_P��_P��_P��_�v +i�+`�1W�6&O�</I�B5D�J9A�T;@�_;?�k:>�y8>�7=�6=�4<��3;��2;��1:��1:��1:��1:��1:��1:��1ϙ +>�8�2�.�*�&� #�& �+�1�8�A�J�U�`�k �w�������������� +�-�5�> +�j +�m&
�m.�k8�gB!�bN-�\X:�WbD�TlI�TvL�TL�T�M�U�M�U�M�V�M�V�M�V�M�W�N�W�N�W�N�Y�I�Z�F�[�C�]�@�]�?�]�?�]�?�]�?�]�?�A�P
�] �h�o�s$ �u+�t5�q@�lL'�eV7�_^D�[gL�YpQ�YzR�Y�S�Y�S�Y�T�Z�T�Z�T�[�T�[�T�[�T�[�U�]�P�_�L�a�I�a�E�a�D�a�D�a�D�a�D�a�D�D�T�b�m�u�y!�{(�{1�z>�tJ$�nS4�h[B�ccM�_lT�^tW�]}Y�]�Y�^�Y�^�Z�^�Z�_�Z�_�Z�_�Z�`�[�a�W�c�R�d�N�d�K�d�J�d�J�d�J�d�J�d�J�H�X +�f�q�y�~�$ނ-Ԁ<�{H!�vQ1�pY?�j`K�fhT�cpZ�bx]�b�^�b�_�b�_�b�_�c�_�c�`�c�`�c�`�d�^�f�X�g�T�f�P�f�O�f�O�f�O�f�O�f�O�K
�[�j +�u�|��ه)υ:ŁF�|P.�wW<�q^I�meT�il\�gs`�f{c�e�d�e�d�e�d�f�e�f�e�f�e�f�e�f�d�h�^�i�Y�h�U�h�T�h�T�h�T�h�T�h�T�N�^�m �x
�� + +�d�s�~ +R�$K�*D�0>�7!:�>$7�G%5�Q%4�\$3�i#2�w"1�!0��/��/��.��.��.��.��.��.��.���� +I�B�!;�'6�-2�4/�;,�D*�M)�X'�d%�s$��#��"��!��!��!��!��!��!��!���� +)�%�"��!�&�-�4�=�G�S�_�l +$� + + + + + +�$�'�#'�$)�!0�9�F�T�a�o�|��������������������� ��!��!��!�
�!�
�!��!��!��!��!��!��!��%�!%�%$�''�%-�!7� D�Q�_�m�y����� �� ��!��!��"��#��#��$��%��&��&��&��&��&��&��&��&��&��&��&��&�$"�)!�+#�*)�)4�&A�%N�$\�$j�$v�$��%��&��&��'��'��(��)��)��+��+��,��,��,��,��-��,��,��,��,��,��,��'�(�.�0 �0&�11�.>�,K!�+X!�*f �*r�+~�,��-��-��.��.��/��0��0��1��2��2��3��3��3��3��3��3��3��3��3��3��(�-�4�7�9#�:.�8:�4G"�2T$�2a#�2n"�2z!�3� �4��4��5��6��6��7��8��8��9��9��9��:��:��:��;��;��;��;��;��;��*�3�:�?�C!�C+�A7�=C#�:O&�9\'�9i&�9u&�:�%�;�$�;�$�<�#�<�#�=�#�=�"�>�"�?�"�?�"�?�"�?�"�@�!�A� �A��B��B��B��B��B��B��-�9�A�G�L �M)�J3�F>!�BJ'�?W*�?d+�?p+�@{*�A�*�B�*�B�*�B�*�C�*�C�*�C�*�D�*�D�+�D�+�E�*�F�)�G�'�G�%�H�$�H�#�H�#�H�#�H�#�H�#�2�?�G�P
�V�V&�T0�P:�KF%�GR,�F^/�Ek1�Fv1�F�1�G�1�G�1�H�1�H�2�H�2�I�2�I�2�I�3�J�3�J�3�K�0�L�.�M�,�M�*�N�)�N�)�N�)�N�)�N�)�7�C�N�X +�] +�_%
�^-�Z7�TA!�PN*�MY2�Ke6�Kp8�Kz8�L�9�L�9�M�9�M�9�M�9�N�:�N�:�N�:�O�:�O�;�P�8�Q�5�R�3�S�1�S�/�S�/�S�/�S�/�S�/�<�I�T �_�e�g" �g*�d3�`?�[K%�VU2�R_:�Qj=�Qs?�Q|@�Q�@�Q�@�R�@�R�@�R�A�S�A�S�A�S�A�S�B�T�?�V�<�W�9�Y�7�Y�5�Y�5�Y�5�Y�5�Y�5�@�N +�Z +�e�k�n�n&�l/�j=�eI!�_R0�Z[;�WdA�VnD�VwF�VF�V�G�V�G�W�G�W�G�W�G�W�H�X�H�X�H�X�F�[�B�\�?�\�<�]�:�]�:�]�:�]�:�]�:�C
�R�`�j�p�s�t!�t*�r:�mF�gP-�bX9�^`C�[iH�ZqK�ZzL�Z�M�[�M�[�M�[�M�[�N�\�N�\�N�\�N�\�M�^�I�_�E�_�B�`�@�`�@�`�@�`�@�`�@�G�U�d�n�t�x +�Y + +�zC�vL&�qT4�l[@�hbJ�eiP�cpT�bxV�b�W�b�X�b�X�b�Y�b�Y�b�Y�b�Z�b�Z�c�T�e�P�e�L�e�I�e�I�e�I�e�I�e�I�N �] +k�;c�A[�G(T�L1N�R8I�Z<F�c>E�o=D�|<D��;C��9B��8B��7A��5@��5@��5?��5?��5?��5?��5?��5ֆ +3� +.�
*�&�#"�)�0�9�B�M�Z�i
�y�� +�� + +�� �� �� �� �� �� �� + ���
�!
�'
�/
�9�D + +���� + + +z� +������
�
�������� +�� +�� �������������������������$�#�#�%�+�5�C�Q�^�l�x����������
��
�������� +�� +�� ���������������������#� �"�"!�'�3�@�M�[�h�u���������������
��
��� ��!�� � +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�"�#�'�(�'$�(0�%<�#J�"W�!d�!q�!|�"��#��$��$��%��&��&��'��(��(��)��)�
�)�
�)�
�)�
�)�
�*�
�*�
�*�
�*�
�*�
�!�(�-�/�1!�1,�/9�,E�*S�*`�)l�*x�+��,��,��-��-��.��/��/��0��1��1��1��1��2��1��2��2��2��2��2��2��%�/�5�9�<�<)�94�5A�2N�2[�2h�2s�3}�4��5��5��6��6��7��7��8��8��8��9��9��9��:��:��:��:��:��:��:��*�5�<�B
�G�F&�C0�?<�;I �9V!�9b!�:n �;y�;��<��=��=��=��>��>��>��?��?��?��@��A��A��A��A��A��A��A��A��0�;�B +�K +�P�P$�M,�H7�CC�@P#�@]$�Ai$�Bt$�B}$�B�$�C�%�C�%�D�%�D�%�D�&�E�&�E�&�E�&�E�'�F�&�G�$�G�#�H�!�H� �H� �H� �H� �H� �6�@ +�J �T�X�Y �W)
�R3�M?�JL"�HX'�Gc*�Gn+�Hw,�H,�I�-�I�-�I�-�J�-�J�-�J�.�J�.�K�.�K�/�K�-�L�+�M�)�M�'�O�&�O�&�O�&�O�&�O�&�;
�F �Q�[�`�a�`%�\.�X<�TH�PS)�N]/�Mg2�Mq3�My4�N�4�N�4�N�4�O�5�O�5�O�5�O�5�O�6�P�6�P�5�Q�2�S�0�T�.�T�,�T�+�T�+�T�+�T�+�? +�K�W�a�f�h�g �d*�b9�^E�YO)�UX2�Sb7�Rk9�Rt:�R|;�S�;�S�;�S�;�T�<�T�<�T�<�T�<�T�=�T�=�V�9�W�6�W�4�X�2�X�1�X�1�X�1�X�1�B +�O + +��B��J"�}Q.�yV8�v[Br`KyoeStlkYpks]mj|_kj�`ij�`gj�`fj�`dj�`ck�_el�Yfl�Ugl�Qgl�Pgl�Pgl�Pgl�P�X + +$�� +#�� !�� +!�� +!�� +!�� +!�� +�� +)�*%�2
#�;
�E
�P�]�m +�~ �������������������� +�+ +�4 +�>
�I +�V�e�w������������������ +�"�*�4 + +� +�� ��������� �� �� +�� +�� +�� +�� +�� +�� +�� +�� +����������"����%�1�>�L�Z�f�r
�}�
��� +�� �� ������������������������������������� ��"�.�;�H�V�c�o�y��
������ +�� +�� �� ������������������� �� �� �� �� ���#�'�&�*�)+�&7�#D�!Q�!^� j� u�!�"��#�
�$��$��%��&��&� +�'� +�(� +�(� �(� �(� +�(� +�)��*��)��)��)��)��)��"�*�.�2�5�4&�13�-?�+L�*Y�*f�+q�+{�,��-��.��.��/��/��0��1��1�
�1�
�1��2��2��2��2��2��2��2��2��2��(�1
�6 +�=�@�?#�;-�7:�3G�2T�3a�4l�5v�6�6��7��7��7��8��8��9��9��9��9��:��:��:��;��;��:��:��:��:��.�7 �> �F�J�I +�E)�@4�<A�:N�;[�<g�=q�=z�>��>��>��?��?��?��@��@��@��@��A��A��B��B��B��B��B��B��B��3
�= �F�O�R�R�O% �J/
�F<�DI�CV�Ca�Ck �Dt!�D|!�E�!�E�!�E�"�E�"�F�"�F�"�F�#�F�#�F�#�G�#�G�"�H� �I��J��I��I��I��I��9�B + +�uA�qI �mP+�jV5�f\=�cbB�ahF~`oI|`wKz`�Ly`�Lw`�Mu`�Ms`�Nq_�Np_�Opa�Iqa�Erb�Brb�@rb�@rb�@rb�@�P + +6�?
3�H2�R0�]0�j/�x
.Έ-Ι,ϭ+�� +*�� (��'��
&��&��&��&���� +�� ������������ +"�$� +!� +� +#�0�=�K
�X� +a +� +l � +w�����
��
����������������������������������������"� )�5�B�O�\�h +�s �|��������������������������� �� �� �� �� �� �� ���$
�& +�+�-�,$�(0�$=�"J�!W
�!c�"n +�#x �$��%��%��&��&��'��'��(��(��(��)��*��*��*� �*� �*� �*� +�*� +�*� +�*� +�%�+�/ �7�8 �7 �3+�.8�,E�+R�+^
�-j�.t�/} +�/� +�0� +�0� +�1� +�1��2��2��2��3��3��3�
�4�
�3��4��3��3�
�3�
�3�
�3�
�+ +�2 �:�A +�C�A�=& +�81
�4?�4L�5Y�6e�7n�8w�8�9��9��:��:��:��;��;��;��;��;��;��<��;��;��<��<��<��<��1 +�8 + +v�Ap�Gj�M$c�Q,]�V5W�[<R~bAN}jDL}uEK}�DJ~�CI~�AI~�@H~�>G~�=G}�;G|�:G|�9G|�9G|�9G|�9�h +d�A^�GX�M"R�R)M�X/I�`3F�i4E�t4D��2C��1C��/B��.A��,@��+?��+?��+>��+>��+>��+>��+�u +�S +���& + +� +�
� +� +
�
� *�7�E � +�N�Z� +f� +p�y�
������������� +�H �U�a�l�u�}��������������������� ��"��"��"��"��"��!��!��!��! �% �*�/ �0�.�*) �%5 +�#C �"P�#\�$g�%q�&y�'��(��(��)��)��*��*��+��+��+��,��,��,��,��,� �+� �+� �+� �+� �' �, +�4� +�4� +�5� +�5��5��5��5��5�
�5�
�6�
�6�
�6�
�6�
�6�
�- +-�� +��*��)��'��&��%�� $�� +#�� +#�� +#�� +�� + +� +� +� +� +� +� +� � +�
�
��#�0�>� +� +�7� +�7� +�7��7��7��7��7��6��6��6��6��. +�BC�BM�BV�B^�Bf�Cm�Ct�Cz�C��C��C��C��C��C��C��B��B��B��B��B��B��B��B��4 + +�[?�XF�UM�TS$}RZ&{R`(yQg*wQo*uQw+tQ�,rQ�,pQ�-oQ�-mQ�.kQ�/iP�/iQ�+iQ�)iQ�'iQ�&iQ�&iQ�&�E + +6�J
4�S2�\1�g0�s
0��/��.�� +,�� +��*��)�� +(��'��'��'���� +� + + +� +� +� +� � + +��� +��!� +��"�
. +< +�8� +�8� +�8��8��7��7��7��7��7��7��* + +�I@�HI�GQ�FX�F_�Fe�Fl�Fs�F{F�}F�|F�zF�yF�wF�uF�tF�sF�rF�rE�rE�rE��9 +Yx@TvFPuKKsQ!GrW%Dr_'Bqi(Aqt'@r�&?r�$>r�#=r�!<r� <r�:p� 9o� 9n�!9n�!9n�!�g +-�� ,�� +��*��)��
)��)���{ + +�
�� + +� +� +�8� +�8� +�8��8��8�~7�}7�}7�}7�}7��* +�=J�=R�=Y�=_
�=f
�=l
�=s
�=z�=��=�=�~=�|=�{=�y=�w=�v=�u<�u<�t<�t<��3 +OqAKpGFoMCnT@n[>me<mp<n|;n�:n�9n�8n�7n�6l�5k�4j�4i�4i��g +-� +,}�+|�
*{�)z�)z��s +.�` -�l ,�x+��)��(��'��%��%��$��#��#�� #�� �{ +�� +� +� + + +� +� +� +� +� + + + +w8� +v8�t7�r7�q7�o7�o7�o6�o6��3 +zAD
xAKu@Rs@Xq@^p@en@mm@uk@~i@�h@�f@�d@�b@�a@�`@�_@�_?�_?�_?��@ +tFApEGnDNkDTiDZhDafDieDqcD{aD�`D�^D�\D�ZD�YC�XC�XC�XC�XC�XC��E +ElCAkI>jP;jX9ja8jk7jw6j�5j�4j�3j�2j�1h�0g�/f�.e�.e��f +,q�+o�
*n�)m�)m��l +1|U +/|^ +.|i +-|u ,|�+{�){�({�'z�&y�%x�$v� #u� +#u� +�r +�Z +� +� +� +� +� +# +i7� +g7�f7�d7�b7�a6�a6�a6�a6��9 +p;Mn;Tl;Zj;`i;hg;p
f;y
d;�
b;�a;�_;�];�[;�Z;�Z;�Y:�Y:�Y:��? +k@Ch?I
f?Od?Vb?\a?d_?l^?v\?�[?�Y?�W?�U?�T?�S?�S>�S>�S=�S=��D +<fE
9fL6eT4e]3eg2fs1f�0f�
/f�.f�-e� +,e� ++c�*b�)a�)`��e +1nR/n[.ne +-nq ,n+n�*n�)n�'m�&m�%k�$i� #h� +#h� +�k + +�� + +� + + + +R +Z6� +X6�V6�U6�T5�T5�T5�T4��? +^9Q +]9X[:_Z:gX:pW:{
U:�
T;�R;�P:�O:�M:�M9�M9�M8�M8��D + +Y>GW=M
U=TT=[R>dQ>mO>xN>�L>�K>�I>�G>�F>�F=�F=�F<�G<��I +-Z� ,Z� *X�)W�
(V�(U��_ +/aX +.ab +-bn ,b{+b�)b�(a�'a�&a�%_�$]� #\� +#\��d +u� +u� +t� +�4 + +K6� +I5�H5�G5�G4�G4�G3� +�D +N8W +M9_K9hJ9sH:G:�E:�
C:�
B:�
@9�
@9�
@8�
@8�
A7��H + +-O� ,O�*O�)N� (L�(K�(K�
�Y +�^ +j� +vS +� + +v + +� +� +:3� +:3� �G +=9k +;9w +9:� +8:� +7:� +5:� +4:� 39� +38�48�47��K +9=U7>^6>i5>u3?� +2?� +1?� 0?� .?�.>� -=� +-<�.<��O +2C\ +1Dg +/Dt .D� -E�,E�+E�)E�(D�(C� 'A� +'A��S +� + + + +? +E + + +[f +c + + +� +� +� +& + + + +� + + + +~ +� +� +� + +;� + +H* + + + +U +_ + +0� +/� +6[ +� + + + + + +D +&� +*K +/ + + + + + + + +� + + + + +3 +; +� += + +" +* + + + +� +* +2 +^ + + + + +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()**+,-./0123456789:;;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������o����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������zP�����������������������������MX����������������������������эiJq�����������������������������Ѽ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������Ën�������������������������������?
v����������������������������C + + + + + +0000000016 00000 n
+0000000258 00000 n
+0000047180 00000 n
+0000000000 00000 f
+0000056431 00000 n
+0000047231 00000 n
+0000047464 00000 n
+0000056319 00000 n
+0000055292 00000 n
+0000055460 00000 n
+0000055740 00000 n
+0000710839 00000 n
+trailer
<</Size 13/Root 1 0 R/Info 12 0 R/ID[<68DEE0B0E8624FD685D9B20C84B5C578><7D72D22D393A45B9B017296A4F7DCEB7>]>>
startxref
711101
%%EOF
\ No newline at end of file diff --git a/example-thesis/gfx/Clean-Thesis-Logo.pdf b/example-thesis/gfx/Clean-Thesis-Logo.pdf new file mode 100644 index 0000000..b33bf72 --- /dev/null +++ b/example-thesis/gfx/Clean-Thesis-Logo.pdf @@ -0,0 +1,2669 @@ +%PDF-1.3
%����
+1 0 obj
<</Metadata 2 0 R/OutputIntents[<</DestOutputProfile 5 0 R/Info(Coated FOGRA39 \(ISO 12647-2:2004\))/OutputCondition()/OutputConditionIdentifier(Custom)/RegistryName()/S/GTS_PDFX/Type/OutputIntent>>]/Pages 3 0 R/Type/Catalog>>
endobj
2 0 obj
<</Length 49591/Subtype/XML/Type/Metadata>>stream
+<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> +<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 "> + <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> + <rdf:Description rdf:about="" + xmlns:dc="http://purl.org/dc/elements/1.1/"> + <dc:format>application/pdf</dc:format> + <dc:title> + <rdf:Alt> + <rdf:li xml:lang="x-default">Clean-Thesis-Logo</rdf:li> + </rdf:Alt> + </dc:title> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmp="http://ns.adobe.com/xap/1.0/" + xmlns:xmpGImg="http://ns.adobe.com/xap/1.0/g/img/"> + <xmp:CreatorTool>Adobe Illustrator CS5</xmp:CreatorTool> + <xmp:CreateDate>2011-05-27T10:39:23+02:00</xmp:CreateDate> + <xmp:ModifyDate>2011-05-27T10:39:23+02:00</xmp:ModifyDate> + <xmp:MetadataDate>2011-05-27T10:39:23+02:00</xmp:MetadataDate> + <xmp:Thumbnails> + <rdf:Alt> + <rdf:li rdf:parseType="Resource"> + <xmpGImg:width>252</xmpGImg:width> + <xmpGImg:height>256</xmpGImg:height> + <xmpGImg:format>JPEG</xmpGImg:format> + <xmpGImg:image>/9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA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</xmpGImg:image> + </rdf:li> + </rdf:Alt> + </xmp:Thumbnails> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" + xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" + xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"> + <xmpMM:RenditionClass>proof:pdf</xmpMM:RenditionClass> + <xmpMM:OriginalDocumentID>uuid:65E6390686CF11DBA6E2D887CEACB407</xmpMM:OriginalDocumentID> + <xmpMM:DocumentID>xmp.did:F97F11740720681192B09E943B71A8D6</xmpMM:DocumentID> + <xmpMM:InstanceID>uuid:b8744613-2de0-7841-aa9e-70b3c1c183b8</xmpMM:InstanceID> + <xmpMM:VersionID>1</xmpMM:VersionID> + <xmpMM:DerivedFrom rdf:parseType="Resource"> + <stRef:instanceID>xmp.iid:F77F11740720681192B09E943B71A8D6</stRef:instanceID> + <stRef:documentID>xmp.did:F77F11740720681192B09E943B71A8D6</stRef:documentID> + <stRef:originalDocumentID>uuid:65E6390686CF11DBA6E2D887CEACB407</stRef:originalDocumentID> + <stRef:renditionClass>proof:pdf</stRef:renditionClass> + </xmpMM:DerivedFrom> + <xmpMM:History> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <stEvt:action>saved</stEvt:action> + <stEvt:instanceID>xmp.iid:F77F11740720681192B09E943B71A8D6</stEvt:instanceID> + <stEvt:when>2011-05-27T10:30:47+02:00</stEvt:when> + <stEvt:softwareAgent>Adobe Illustrator CS5</stEvt:softwareAgent> + <stEvt:changed>/</stEvt:changed> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stEvt:action>saved</stEvt:action> + <stEvt:instanceID>xmp.iid:F97F11740720681192B09E943B71A8D6</stEvt:instanceID> + <stEvt:when>2011-05-27T10:39:20+02:00</stEvt:when> + <stEvt:softwareAgent>Adobe Illustrator CS5</stEvt:softwareAgent> + <stEvt:changed>/</stEvt:changed> + </rdf:li> + </rdf:Seq> + </xmpMM:History> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:illustrator="http://ns.adobe.com/illustrator/1.0/"> + <illustrator:StartupProfile>Web</illustrator:StartupProfile> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:xmpTPg="http://ns.adobe.com/xap/1.0/t/pg/" + xmlns:stDim="http://ns.adobe.com/xap/1.0/sType/Dimensions#" + xmlns:stFnt="http://ns.adobe.com/xap/1.0/sType/Font#" + xmlns:xmpG="http://ns.adobe.com/xap/1.0/g/"> + <xmpTPg:NPages>1</xmpTPg:NPages> + <xmpTPg:HasVisibleTransparency>True</xmpTPg:HasVisibleTransparency> + <xmpTPg:HasVisibleOverprint>False</xmpTPg:HasVisibleOverprint> + <xmpTPg:MaxPageSize rdf:parseType="Resource"> + <stDim:w>302.325195</stDim:w> + <stDim:h>46.173828</stDim:h> + <stDim:unit>Points</stDim:unit> + </xmpTPg:MaxPageSize> + <xmpTPg:Fonts> + <rdf:Bag> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Colaborate-Bold</stFnt:fontName> + <stFnt:fontFamily>Colaborate-Bold</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>ColabBol.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Colaborate-Light</stFnt:fontName> + <stFnt:fontFamily>ColaborateLight</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>ColabLig.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>HelveticaLTStd-Light</stFnt:fontName> + <stFnt:fontFamily>Helvetica LT Std</stFnt:fontFamily> + <stFnt:fontFace>Light</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>OTF 1.029;PS 001.004;Core 1.0.33;makeotf.lib1.4.1585</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>HelveticaLTStd-Light.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>HelveticaLTStd-Bold</stFnt:fontName> + <stFnt:fontFamily>Helvetica LT Std</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.040;PS 003.001;Core 1.0.35;makeotf.lib1.5.4492</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>HelveticaLTStd-Bold.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>FontinSans-Bold</stFnt:fontName> + <stFnt:fontFamily>Fontin Sans</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>1.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>Fontin_Sans_B_45b.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>FontinSans-Regular</stFnt:fontName> + <stFnt:fontFamily>Fontin Sans</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>1.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>Fontin_Sans_R_45b.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Delicious-Roman</stFnt:fontName> + <stFnt:fontFamily>Delicious</stFnt:fontFamily> + <stFnt:fontFace>Roman</stFnt:fontFace> + <stFnt:fontType>Type 1</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>DelicRom; Delicious_76</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>YanoneKaffeesatz-Light</stFnt:fontName> + <stFnt:fontFamily>Yanone Kaffeesatz</stFnt:fontFamily> + <stFnt:fontFace>Light</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.002</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>YanoneKaffeesatz-Light.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>GentiumPlus</stFnt:fontName> + <stFnt:fontFamily>Gentium Plus</stFnt:fontFamily> + <stFnt:fontFace>Regular</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.504</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>GentiumPlus-R.ttf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>YanoneKaffeesatz-Bold</stFnt:fontName> + <stFnt:fontFamily>Yanone Kaffeesatz</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Open Type</stFnt:fontType> + <stFnt:versionString>Version 1.002</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>YanoneKaffeesatz-Bold.otf</stFnt:fontFileName> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <stFnt:fontName>Delicious-Bold</stFnt:fontName> + <stFnt:fontFamily>Delicious</stFnt:fontFamily> + <stFnt:fontFace>Bold</stFnt:fontFace> + <stFnt:fontType>Type 1</stFnt:fontType> + <stFnt:versionString>001.000</stFnt:versionString> + <stFnt:composite>False</stFnt:composite> + <stFnt:fontFileName>DelicBol; Delicious_76</stFnt:fontFileName> + </rdf:li> + </rdf:Bag> + </xmpTPg:Fonts> + <xmpTPg:PlateNames> + <rdf:Seq> + <rdf:li>Cyan</rdf:li> + <rdf:li>Magenta</rdf:li> + <rdf:li>Yellow</rdf:li> + <rdf:li>Black</rdf:li> + </rdf:Seq> + </xmpTPg:PlateNames> + <xmpTPg:SwatchGroups> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Default Swatch Group</xmpG:groupName> + <xmpG:groupType>0</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>White</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>Black</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Red</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Yellow</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Green</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Cyan</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>255</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Blue</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>RGB Magenta</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>255</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=193 G=39 B=45</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>193</xmpG:red> + <xmpG:green>39</xmpG:green> + <xmpG:blue>45</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=237 G=28 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>237</xmpG:red> + <xmpG:green>28</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=241 G=90 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>241</xmpG:red> + <xmpG:green>90</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=247 G=147 B=30</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>247</xmpG:red> + <xmpG:green>147</xmpG:green> + <xmpG:blue>30</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=251 G=176 B=59</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>251</xmpG:red> + <xmpG:green>176</xmpG:green> + <xmpG:blue>59</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=252 G=238 B=33</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>252</xmpG:red> + <xmpG:green>238</xmpG:green> + <xmpG:blue>33</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=217 G=224 B=33</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>217</xmpG:red> + <xmpG:green>224</xmpG:green> + <xmpG:blue>33</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=140 G=198 B=63</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>140</xmpG:red> + <xmpG:green>198</xmpG:green> + <xmpG:blue>63</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=57 G=181 B=74</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>57</xmpG:red> + <xmpG:green>181</xmpG:green> + <xmpG:blue>74</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=146 B=69</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>146</xmpG:green> + <xmpG:blue>69</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=104 B=55</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>104</xmpG:green> + <xmpG:blue>55</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=34 G=181 B=115</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>34</xmpG:red> + <xmpG:green>181</xmpG:green> + <xmpG:blue>115</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=169 B=157</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>169</xmpG:green> + <xmpG:blue>157</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=41 G=171 B=226</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>41</xmpG:red> + <xmpG:green>171</xmpG:green> + <xmpG:blue>226</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=113 B=188</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>113</xmpG:green> + <xmpG:blue>188</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=46 G=49 B=146</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>46</xmpG:red> + <xmpG:green>49</xmpG:green> + <xmpG:blue>146</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=27 G=20 B=100</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>27</xmpG:red> + <xmpG:green>20</xmpG:green> + <xmpG:blue>100</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=102 G=45 B=145</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>102</xmpG:red> + <xmpG:green>45</xmpG:green> + <xmpG:blue>145</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=147 G=39 B=143</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>147</xmpG:red> + <xmpG:green>39</xmpG:green> + <xmpG:blue>143</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=158 G=0 B=93</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>158</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>93</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=212 G=20 B=90</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>212</xmpG:red> + <xmpG:green>20</xmpG:green> + <xmpG:blue>90</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=237 G=30 B=121</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>237</xmpG:red> + <xmpG:green>30</xmpG:green> + <xmpG:blue>121</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=199 G=178 B=153</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>199</xmpG:red> + <xmpG:green>178</xmpG:green> + <xmpG:blue>153</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=153 G=134 B=117</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>153</xmpG:red> + <xmpG:green>134</xmpG:green> + <xmpG:blue>117</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=115 G=99 B=87</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>115</xmpG:red> + <xmpG:green>99</xmpG:green> + <xmpG:blue>87</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=83 G=71 B=65</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>83</xmpG:red> + <xmpG:green>71</xmpG:green> + <xmpG:blue>65</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=198 G=156 B=109</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>198</xmpG:red> + <xmpG:green>156</xmpG:green> + <xmpG:blue>109</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=166 G=124 B=82</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>166</xmpG:red> + <xmpG:green>124</xmpG:green> + <xmpG:blue>82</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=140 G=98 B=57</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>140</xmpG:red> + <xmpG:green>98</xmpG:green> + <xmpG:blue>57</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=117 G=76 B=36</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>117</xmpG:red> + <xmpG:green>76</xmpG:green> + <xmpG:blue>36</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=96 G=56 B=19</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>96</xmpG:red> + <xmpG:green>56</xmpG:green> + <xmpG:blue>19</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=66 G=33 B=11</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>66</xmpG:red> + <xmpG:green>33</xmpG:green> + <xmpG:blue>11</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Grays</xmpG:groupName> + <xmpG:groupType>1</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=0 G=0 B=0</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>0</xmpG:red> + <xmpG:green>0</xmpG:green> + <xmpG:blue>0</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=26 G=26 B=26</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>26</xmpG:red> + <xmpG:green>26</xmpG:green> + <xmpG:blue>26</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=51 G=51 B=51</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>51</xmpG:red> + <xmpG:green>51</xmpG:green> + <xmpG:blue>51</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=77 G=77 B=77</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>77</xmpG:red> + <xmpG:green>77</xmpG:green> + <xmpG:blue>77</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=102 G=102 B=102</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>102</xmpG:red> + <xmpG:green>102</xmpG:green> + <xmpG:blue>102</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=128 G=128 B=128</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>128</xmpG:red> + <xmpG:green>128</xmpG:green> + <xmpG:blue>128</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=153 G=153 B=153</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>153</xmpG:red> + <xmpG:green>153</xmpG:green> + <xmpG:blue>153</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=179 G=179 B=179</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>179</xmpG:red> + <xmpG:green>179</xmpG:green> + <xmpG:blue>179</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=204 G=204 B=204</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>204</xmpG:red> + <xmpG:green>204</xmpG:green> + <xmpG:blue>204</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=230 G=230 B=230</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>230</xmpG:red> + <xmpG:green>230</xmpG:green> + <xmpG:blue>230</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=242 G=242 B=242</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>242</xmpG:red> + <xmpG:green>242</xmpG:green> + <xmpG:blue>242</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:groupName>Web Color Group</xmpG:groupName> + <xmpG:groupType>1</xmpG:groupType> + <xmpG:Colorants> + <rdf:Seq> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=63 G=169 B=245</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>63</xmpG:red> + <xmpG:green>169</xmpG:green> + <xmpG:blue>245</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=122 G=201 B=67</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>122</xmpG:red> + <xmpG:green>201</xmpG:green> + <xmpG:blue>67</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=147 B=30</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>147</xmpG:green> + <xmpG:blue>30</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=29 B=37</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>29</xmpG:green> + <xmpG:blue>37</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=255 G=123 B=172</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>255</xmpG:red> + <xmpG:green>123</xmpG:green> + <xmpG:blue>172</xmpG:blue> + </rdf:li> + <rdf:li rdf:parseType="Resource"> + <xmpG:swatchName>R=189 G=204 B=212</xmpG:swatchName> + <xmpG:mode>RGB</xmpG:mode> + <xmpG:type>PROCESS</xmpG:type> + <xmpG:red>189</xmpG:red> + <xmpG:green>204</xmpG:green> + <xmpG:blue>212</xmpG:blue> + </rdf:li> + </rdf:Seq> + </xmpG:Colorants> + </rdf:li> + </rdf:Seq> + </xmpTPg:SwatchGroups> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdf="http://ns.adobe.com/pdf/1.3/"> + <pdf:Producer>Adobe PDF library 9.90</pdf:Producer> + <pdf:Trapped>False</pdf:Trapped> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdfxid="http://www.npes.org/pdfx/ns/id/"> + <pdfxid:GTS_PDFXVersion>PDF/X-1:2001</pdfxid:GTS_PDFXVersion> + </rdf:Description> + <rdf:Description rdf:about="" + xmlns:pdfx="http://ns.adobe.com/pdfx/1.3/"> + <pdfx:GTS_PDFXVersion>PDF/X-1:2001</pdfx:GTS_PDFXVersion> + <pdfx:GTS_PDFXConformance>PDF/X-1a:2001</pdfx:GTS_PDFXConformance> + </rdf:Description> + </rdf:RDF> +</x:xmpmeta> + + + + + + + + + + + + + + + + + + + + + +<?xpacket end="w"?>
endstream
endobj
3 0 obj
<</Count 1/Kids[6 0 R]/Type/Pages>>
endobj
6 0 obj
<</BleedBox[0.0 0.0 302.325 46.1738]/Contents 7 0 R/MediaBox[0.0 0.0 302.325 46.1738]/Parent 3 0 R/Resources<</ExtGState<</GS0 8 0 R>>>>/TrimBox[0.0 0.0 302.325 46.1738]/Type/Page>>
endobj
7 0 obj
<</Filter/FlateDecode/Length 1399>>stream
+H��WK�7��)��H��� �6��qd����T�R���'���(Y��z��6ɽ�%����߿��If�3I�7g���㧟I���_�|&��gR��?���r<r�����8H7�"j�|��U��mX����yT�v�s��`W;s�\�Y�XQ�R`�l�|M���f)��"m��.�1mI���|�¨���~A�^p���Y���y*�s����<��=٤4\'��p���4\�e����fK /÷����Q��B2,�����-���)���S�4Px3SeX#1C�^�� +����c�=�cHǶ�_�-O�c�&c��.|[h諥�!<K���oL:�_YgHY����������p{m��H3\5 +�nn�҄+t��X�����&��6���{��v���ؤ�b�1�4 +�((<7�a�k�8k����{����M�T� +"8�Q��W*Y��[={B�dD��
;Be��k&��_O��;u8�t҂OFD��^�0��f��#P +�{/!��@$Ua�@L!��if�>y]v�.)��%H�̴i�����������!O�r89��wd_��� iV��`�՜���ػ�#|mQzA�(�C�Ixߣ��� ++B* +/���' Xi�)'�c^ޣ��M-��<�5dcAfHg���x + +���
�����vj_UJA7+�����{ f!S"B#2$$%&
''�(�)�*�+�,�-�.�/�0�1�2x3c4L566 7 7�8�9�:�;�<�=�>�?�@�AzBuCrDqEqFrGuHzIJ�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Z [\!]-^4_;`BaHbOcVd]edfkgrhyi�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�{ |}%~1<�I�X�g�y�������҈��-�P�v�����ڑ���2�Q�o�����ʚ���:�U�o�������ҥ���1�J�b�{�����ʰ���=�\�}���������м�����0�E�Z�oŅƚǰ����������"�'�+�.�1�3�4�5�5�5�4�3�1�/�-�*�'�%�!�������������k�N�1���������d�F�(� ���������y�a�J�6�%�� +�� + +���
�nP2�����w\3���uQ/
� �!�"�#r$T%6&&�'�(�)�*�+�,{-k.\/O071 22�3�4�5�6�7�8�9�:};r<e=V>H?<@0A%BCD +EE�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�def%g0h<iIjWkflvm�n�o�p�q�r�tu v9wSxny�z�{�|�~"�C�e�����х���@�Q�c�v�������͐����5�R�p�����Қ���>�d�����ۣ�/�Z�����ߪ
�;�i���ǯ���0�N�l�����ɸ� +�,�O�s��������>�lś������H�q̙������4�W�xԘշ������ �5�I�[�l�z�����y�`�F�+��������q�O�,� ������u�O�)��������l�F�!���������g�D�!�� +��V
#
���g;���^0��{N"���qE �!�"�#p$G%%�&�'�(�)j*L+/,,�-�.�/�0�1�2p3\4J586(788�9�:�;�<�=�>�?�@�A�B~CoDaETFGG<H1I'JKL
MM�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�de +fgh#i-j7kAlMmYneorp�q�r�s�t�u�v�w�yz%{;|Q}h~�����ς� +�)�J�k�����ԋ���D�i�����ܔ�*�R�z���˚���H�s���ɡ���E�l�������4�]�����ڱ�0�[�������=�l���Ž��K�x¦��� +�^%�
�zA ��_'���H��k4���T�� q!9" +*�+�,�-i.D//�0�1�2�3f4A55�6�7�8�9^:8;;�<�=�>x?R@,AA�B�C�DqEMF)GG�H�I�J|K[L;MM�N�O�P�Q�RuS\TEU0VWW�X�Y�Z�[�\�]�^�_�`valbacXdNeEf<g3h)i jkll�m�n�o�p�q�r�s�t�u�v�w�x�yxzq{k|e}a~^\�[�\�^�b�h�o�y���������Ì���4�O�j�����×��"�B�c�����Ơ��'�F�f�����é�� �?�]�|�����۳���@�e�����ݼ �8�j������MČ����Rɖ���!�gέ���9�~����Qט���'�pܺ��P�����:����1����6����N���u���>����d���(����� +�i�|G��w|��8a�|ݕ�K�}��4�}0�{�|����y{:���A{F�T�*{T���L{h����{��R��{ޢ�v,|,��a||��KG|���4<|ʔ�|/�`�{���z�����{���{�ߞ�{G�r��{��!uT{Ҥ`_|�\J�|U��3�|g���{�����z��pۣz��pƝz���z�h{��{A��t�{��"_�{���Jp{쟗3�|� +����z��٧z��fĬz��C��z��P��z�ű��zؾ*sR{��^�{'��I�{E��3n{p���zɑ��c�@}��Y�L}��3�{}����~T�t�W~�����~�v��dTa���K���� +``�I��J���x3(�Ã7Ɓ��{���=�1��h�6�d���"��'����҂ ��t@�و�_>����I��d��2t�/�9f�����>���?�s���U���q�Y�+�(�e�ő+�]�p�Lr��3��^2���H��Պx1Ԁ��D�p���Z��@�{�Ҡ����*�o�����c��*����ەq���]@��NH�S�/1Y�$���lj������K��������8��������9�Ԁc��pӀ3��\n���Gg�1��
���P�����z�ﲔ���B��������_�D�݃����o�͜�[���=F����0�;��<~|�����f�%�����k�����M���E쫻�����or�D[P��Fo�0w~Ֆ�U}�� +zo�֪�g��U +�������S{r���kJ�զ�Z̋I� ��8i�Y��%e���a+�w��Ԛ�ī^�?�a����� +8��4%7�l�8K�����-��`�E���{�/�ʑ�Gy�����iˍ�EY����&H�����7��ݢ%�(�e����8��y��y�z�����{�i��{p{F��{�k�D|�Zr��}2IC��}�7E��~�#A�aee�.��{�� �סN�Қ�������^z�Q�Oj���WY��:�gH��6����"����V��.��(�������+�ߝJ�B��a�Vy
����i#�#�X�����Gݐg�@69�[� +"���R��K����v���T��a�����ׇ֙��Ox��hB����X�,��GB���5ȍۈP"y�z�\ӊ��,���ܙ��e���w�%�����>�jw����ga���WC���SF��m��5`�Z��"N�܋�
�����X�y���ߟ��T�ƜL���ٙ�v�5�(f�����V��D��F����5�ۏ_"2�9�x
]��� �$�@���˞��i�X�s�������uC�ڜ�e˓M��U��CE�����4��m�"����
����7���&�ۢ������R�;� �Ș?�tb����e���(UJ����E#�A�"4\���!��/�)
ڇL�]��'��������4�!�R�����sk�Z��d-����T��H�+D����4����!Õ +���~�آ!�������6���ȗ���r��.�Dcl����S�� +��D ����3��h��!��i��2�H����ˠ���w�0�i�����ڻ>qߕ +�bВV�&Su�ج}C��z� 3p�+�X!�� ��R�ꉯ�k��z�|��z��t��z�G�{Yr#��{�b���|�S[�|}&C3��}�26�8~���� +%�p�L������%��^�?��&�?�r� +[�b��ܬO�J��7�c�E�V��M�͆�p`���an�]��R�W�KB���1h�����v�� +��s��������� +���������>���0�/�;�+}g���5n��u��_�W�PZ��A���q0�������+�d +����V�������ߦ���/�ܚ�|x�L�mӜ
��_1���P&���@���J0w�k�!}�z��W�Ї��y�{�6��j��S����{�����m���(^�����O����<@?���'06����w������k�_�ݗ�<�2�j�L��z͞���lR�d��]�4��O�.��?ӒJ�O/Kk�Z� �Y��_�U����&���h�(��y؞z�dks�#��]��Nq�ܟ�?]��/��.��V���#�Lj5�y�F�ǖ��K�����x��P�(j�����\r����M䔕�E>�����/h�ܜWB��uQ�P�T���3Dž�E��d�ˡ��JxO�.�:j����[�r�Mq�\��>��l�+/3����2�/�jw���m��?z^�్z���� z�wn��{RiB��{�[�||Lt�`}*=K��}�-G�~�����1�g�����l�t�װс���Y��v����h��*��Z��Z��K����<�S�k,��`������r�M�6� ������������u�n�%g�Y���GKz�"�<~����,����ޓ�����S������Ǒ
�p�D����u-�ы�gA��YT�7��J����<�5�t,}�.�9ГJ��ݎx�֞�j�ߐ&��ق>����t`�N�f��r��X����RJu��;����,D����Ԓ�� .���5�<� +;�!�뚍�������د�~��N��qK���cơ��VS�$��H��{��:P���/+z���b���; +{����Ȳi�^�����~1�(��p��Ů�c����U��ا/H�+��9����+I�U��8 +���9�/�Rñ�S����}�� �o酪�^b����UC���(G��騭9��e�?+"� +���=�6 +ى��V���{���7{X{P�{�m�E{�`���|vSJ�w}E��]}�7H��~�(+�Pjř���v�$��J���Ӈ�i�|z��K�:mS���`��Rץ��<E)���|6��ց�'����~Θ�������X�w�툳�=����z����lŭӆE_��f��Rf��rDʡ�E6��/�G'Ι҅�֗ņ1�������H�z�����
y`�茵l5�6�}_�ϊ�Q�Dk�r�"6k����'��0��ޖ��x;������-�ݶj�Ix��]�wk�����^��B�]Qy���#D ��6%��F'������$����)�!�g�7���)���ow���+j��/��]���&P��o�C��U� +5�s��'n��W*�B���6�n�ú�o������wc����j\�ě8]q�Q��P�����CS�ܕ5�����'Y�Q�4R��0j�f������9��T��v��.��i��f��\���P���qB��j�B5n�~��'C�͔�q�Տ������\���0�&���v ��i��z\M���\O��$��B����5/�
�p',�Q�9��=�� �����L�r�{��wuh����hx�ˬ�[æ=�O*�̥�B@����4�����'��C����� =���?����촺��t毃�4g�����[T���N͡��JA��W��4˙^�M'���c��Z� +��a�����U����Ir�Ú�=�!�0K���N"��0��q�����q�(y��n��mi���]a �P�U�>�?I�G��<բ���03�8�|"����5������|�;���"��yh�!�l��Y�f`����T��ڧ�HϦݤ�<��3��0�ŝ)#����a�������e�^�ڼ�x�ภl����`S����T_���'H����F<{�ڤ�0�i�N#�(����{��-����~��~r���}�f���}�Z��}�OG�D~
C���~�7���H+)��Ѥ݁�������j~n�� +rI��;fS�炜Z����KO�^�?Cm��]7{��+���EܣՄ'��d�+�т�~@�(� r����f"����Zv�&��Nܶ���CG��67^��4+�(����>0�N�?����~/�m�r�7�if�+��Ze�g��N͵Ҋ�C:�Y�;7R�5��*��g�����^�W����}�̪��q��w��e��n�"Z/����N���PC���F7>�n��*����H�2����H�S�ՃU}�����qh�ʙfe{���/Yڹ��=NZ�W��B�ђF7#���I*��Ɛ�3�D���.��r�݃�},�k��q�;��e-�,�3Y��V��N����B��'�E7��� *����X�x��i�<����|�����p�ķ�]dྠ�ZYH����M��mB����}6��S�+�f���������f�OB�T�;|��r��p��8�d����X��0��M����@Bp��#6�+�@���|��������r|`���p;�˯�dN���SX�����Mp��EBP�g�~6�-��+-�6�j�u��G� ��֎>��|ɰ��o��s��d�K��X��O�NME����B6����6㦿�l+=�ŝ' +����|�����ڄ���|�z]�R|�z���}&{T�5}�{��~}�|���}�}xw~3}�b�~n~L�~�~u4�~�~��~�.�U{���{v�ɧ{݃��.|V���|��̌|���w}H�ka�}��7Kz}3�}���2}��y㎅��z[��džzы�D{E�0��{��%�{|�5u�|o�N`n|͆pJ�}��3,}K���|��u�x�=��yr��Ţy듂�yzP�o�Mz����{5��ti{��?_^|��I�|u�52�|���q|I���.x)�0�x�����y'����y����z�F��z���s@{�a^g{}�H�{��2|�OW{�� +�h[ys��F�yȢC0�z +|Q�-#|,��o{"�~���wg�&�ax$� +�Ixأ��y���zH~^��{$k*�9{�Wj��|�B�0}},ʃ�~u��~���K���?�+���7�1�~���p�X�z���a|�����i�h��V^���B�|��,7�&�Z��r� ����^����p�0��>���"��؆t{��1��hу��SUi�@��AR�f+����B�K���P�L��¢�V�"�ʅy�n���čЌ��!�pzr���*g�� +��T�����@��B��+>��&-����҈������u�.�ߗ�2�$���@����y>�f��{��S���@����*�Y�q=�ԇ�����Y�4�ŭ��b���ƃ��������x�q�-eĂ��Ra?�;�K*��ʍ�m� +���v�����Ъ)�S���K���2���ւ��w���d�����RK�8��? �ϓ*]�M�Z�]�/����I����������(�]�ө��Ȃ4��v.����d'�4��Q��՚;>��g�*$ܔc�~ʌ��ЅV���Q�D�q�˃N�R�8���D����|uE�K��ce�٣_Q�v�5>4���)�s��~M��˞�(��*�
�i������;�J�
�݁���t}��Rb����7P��$�n=����)��R�}��ʑ�����2��ͦ�҂��]�n���%�m� +��T�ʌ(N�w��ru���c���P����=C���R(A� ������4�&����\��D�o�����K�P�Ʌ��Bsڈ��b +�݄fO���<����'݅f����ʃ`�~�Ԑ��͍H�)���؍���@��f�rÈC��a�@��N�S��<�x�('��ӆ����I�ݎ-�[�=���#�~�>�������ق��Αq����H`-����N+�̌;~�'9�:� +�Μ9�<�~�z�r�U��p��:��_I�?�aMy�T�H;�o�u&����~�v����`���a�ݧ�NJk�����*�h��o��њ +��nf�N��}��y�^}œv�v}��.��~t֕�~bel�M~�Un�'D,n3��s� /���� +NJo�q�柉�X�$�|��6������7�sɔ胸d���T����KD>���'3�Ӄ' �Ƀ����?�p�Ǎ�؛��!�
��������rՔ=�c�� �SS��C����2��C�n%��3�DŽխ�6�0�a�ܘd������qۓ���b̑�=S9�n��C �{��2R������x��u��_��Μ��\�͚������]ʕ��p�=�a� +�)R����XB�� +%�H�ܞV�[����������R�{u+�)�KgV�B�nY��p��K4�Ř7<m�8�- +e����k�6�r���������FtA�䦟f����IX˕� J��l�-;��ۚ�,��i�zˋc�� +���,����T�ԡ\�T�%�۱Ksr���5e̗��hX)�ԥ�J� �v;����,p��.����� +Ɇ��K�����x��1� +�;�c�K��u����vf��xw+r��w�dv�x�Vٞ�y�H��Rz�9ϘM{�*��|���}�����D�I��| ��|�~���}q<��}ac��Q}�V<��~5H"��~�9n��<)���$�À��{��G���������}קǃpw���c����U��+��G��邢9�₾)��D�,���6���_�4������|���o��i�Dbd�U���G+�P��8��H�D)����63���x�����=�����0�z��|���n�֍�a��]��To����F�����8d����)V����A�G�%��G�t����]��{B� �n �_�9`��S֛}�$F0�?��8�,��)&�b��W�t�e1�҅������������z����mr����`b�w��SR�
��Eŗ͒�7����S(��ې`i���R���Ó��u�6���b�:y��j�Al����O_����RŚ��[ER�e�'7d�I�U(̑a�rq��ΉY����@�~�ک$�x٥$��k�S�Z_�šXR&�L��DЗ��7���(���El���� �dž�������&x +��ak1���^c�~�:Q����D\���(6�����(]����e�� <�O�?��轫�7�Ĺkwb���<j��߱%]ߝE�YQ'����C��n��6f�F��(3�C��`���{ d��Z����vP��wu`�dw�h��x�[ߨy]O�
zIAŠS{:3ל�|5%�}E֘�~��I���ʸ�}�N�}Et���}wh�E}�[W�7~ N��C~}Af�� +LԠ���?���2��o��$��?�9������a��� ���s}DZ�4ql�s��e�-��X��"��Lk�-�?��p�r2i��@$~���Ó2�M���ʉi�i�}���ppʬ��ds�ƝX3����K�����?P����20�l�,$i����|��d������%��|_�^��p����c˧j��W��S��K��S��>P1����$N�����ݎ/��M�,�����{����oi�{�c6���W� +'��:���Ғ��1�)��X��t��j�wi|�Ȱ�^T�5�=SV���,H���?>�V��3B�s��(�Ț�1�V�6���Iȋ���ybt��Py�u���z_v֯z�w��A{<x��K{�y�r�|#z�^|�{yH�}|E1T}I|��} }=�w�'�Gx9"��x��3yv��z8��z�xq�{"�\�{��G�|*�0�|p��|$��^v�4�vۈ1��w��>�bxD�d��x���^y��4pYz8��[�zՄ
F�{\��/�{�� F{G���St����$u�����v��/��w4���`w�&��x���o)yi��Z�z�QE�z��$/hz�0 z���[sӜ��Jt�0u��N� +v[���w(����w���nx���Y�yi��E&y���.�zM�� +x)��Yx�;D�yy��.�y��%y�}�,r�� �8s��ѸBtd���Hu+���gv�|vۜxl*w��Xgxj��Dy��.TyC��Dx��Mܽr+����s����s��t��W�Bu���~zvj��kSw:�lW�w��pC�x���.xД^x���`q����wrԾ(��s�����tc�9�u7�}rv�j~vդ6W&w���C3x�G-�xa�Luw��%�(q����Br�nj�gsj�a��t�R�t|�u���i�v�5V�w,��B�w���-�x���w@��� q���Drq�(�ts9�Z��s�â�=t��%{�u~��i/v8�YV9vު9B�wf�-�w���v������s����tи�uu��gvՓ`w�[yl�pzX��z�C��{�-��|���}
ڷ~/}cȴ~'}���~$}��~+}�k~=~1~�~S~�kd~}~�W�~�%C ~�i,�~���~����|���ƻ|҆<��|�S}
���}7�y}W}d�j;}���V�}�RB>~��,e~/���~�d��{��<�{���{��9��|�َ||Q��||���i'|݈U�}+�{A�}i��+�}���~}P���z˙��={�F�V{6� �<{S��{��z�{��.h|6�qT�|���@�|̊A+�|݉�|����gz����zU�˯�z��՝�z�����z��cy�{Q��g {��sT
|�(@X|F�+:|I���{Ո���y��0�<y˨i�uz����z0�&��z|��x�zҚ�fF{4�xS`{���?�{ё�*�{Ȑ�{5�{Ѕy,����y^�!�+y����Oy��y��z
�qw�zc�}exzŜ�R�{"� ?n{_��*�{P�c�z����?x�
��y ����y3���yd��qy��lv�z��d�z_�YR)z��? +z�X*�z��Mz9���x�Ƞ�lx�����x�m�y����ye��u�y��Wd +�*�,tF���u_����v�p��w�_a�x�M>�\y�:U��z�%��^{�
T��}
����z����Lz��d�{h���{ŀK�|Do��|�^K�I}WL]��}�9���~Q%:��~�
�����ƋL�0�܊�ܟlj���k��2~�� � ny�E��]R����K��߁�9�F��$�ہ�
��*�Ҿ�J���Q�*���]����$�(��}؆R��mv���\t�׆kJބ9��8����0$��6��
Ԃt�ʼ{��N�Èk����e�φv�*|�����lh��a[��>�J*����8���$e���4��������ǫ@��Z�p����w�{q�#��kY�d��Z�����I{�#��7����r$/�ꋬ;�݇s���w�I��p�7�+�o�0�M�y�=ze����jo���Y�M�oH䂱�79��%$ +�F}M�Д>yv��Xz�ɐ�z��=��z�w��Q{�g���|0W���|�F��Z}R4�O}�!D��~�1�X������J�:�|�H���O���vx�|�f���VÉԁ#E����+4s���E!����t��������ʢ�M������%�ƍ�Our����f�b� U��*��E`�� 4 ��� �T����̃���G��{���~����� ���l��t\��Ve�Nj3U3���Dv�3��k�& ��������I����� +����O�{�ڂS���sA����d�H�ATf���D$��35�� ����2-�(���X�U��Ύ��j�"����@�|�rK�!��cG�ؕSS����C����2ۅa�i q�^�c�o�U�� +�Q���[� ����ŀ7���q]����bv�s��S�A��C��N2|��L I�ؐw��҈��в�������f�,�ǧTpl�e��a���TRR��B�����2���] �a����N�������%�y�ܶ��%��~D���Yo���B`�ǦIQ����pB�f��1��2�����o׀ሮ��l�ܚ�����!��[}��G��n�ް�`X���oQ6�O�A��"�z1l�띆ǂ��|������G�p��?�QrC���s�4��t�pd�ru�a}�uw;Q⏠x`A���yy0���z�U�{����}訾��xӚ˙Ay�����z }픘z�o=��{A`}��{�Q��|�@��3}10��}�:�,~� ����.���T�;���<�׀�|���n6�À�_�����PO���@j����/���%"�]�� U�ׁ�˙�C��^�Ê��-{���vmK���^Ǐ-��O��v�?�߄�/n�x�n���� �����Y�1���������Z��z��D�slU�a�^]����aN���f?b�J��/�ڇ����� �;��%�������2������=y��ƒbk\���]��:N@�`��>ۊČf.ĉF�h�)�� +,�\����=�Y�b�ʝ���x��x��W�Wj��s�'\]���M���>f�O�N.z�Ŏ�ч��E +l����ȗ�,�N�w�X����uw����|i����[��?�%M����=��q.)�P������q +����1�Ɨ���D�5�΄��Ԩuv�����hՎ���Z�㞤Li�+��=k���-͇�e��w�\ +Ѓr�P�ڗ��+�Y���t������u�b��h�q��Z>���bKڊڠ�<��0��-{���gr��� +���i�
�X�����ϻO� +�����(�ۧ��;}ͣ��q��l��e����}Y`�ԣ�M2�Ƞ�@q��*3,�,��%D���\��r��φ��H��G��}$���q�:�Ze����X䙖�dLȖ��E@����2��%�A�8��
����2�b���*q[z���r�o��s�b���t�VԤ�vJ��dwX=��x�0,�y�!���z�ڗ�|Yw�vX��x7zO��x�nv��ywb`��zVK�z�J-��{�=f�4|[/��/}.!���~��^�T��8�~�y���m���2aȦ�?Uɣ6{I����=�a�*/řW��!��́;T�r�O�S�E�[���xĭ��Am�̈́�a7����UJ�c�EIR��"<����/����!����Z��t�r��r�&���^�Dx�%�pl`���`��G��T����Hޞ-�w<h���/a�؇�!��.����q�� ���h���wS���qk����"_爐��T-���Hf����<
�F��/'�0�*!��m���r��o�����3�I�5v���nk���__�0��S����UG��
��;�����.�����!v�ƍ����ZljŃ�u�ꟼu�����jl���Q^ˣ��S/��)G����i;k�A��.����!b�1�x>�؋����ǯ��]uG�_��i��?�M^.�Z��R����bG�*�I;�Ҙh.}���h!B����Q�0�bP���E��Y�Bt���Zi+���m]���xR)�^��F��Пf:��s�.C�?��!%�8��^���k�� �gb��zt�ٱh�����]3���YQǟ�bFc����:y�'��.��!�ܖYi�3�s�����{W��rp?��sBe
��t`Y��|u]NZ�Lv�B��@w�6�}x�*@�z1��y{l
<�1}8$���{ +�ux�oy<d���y�Ya��zPN�_{B��W{�6â�|�*.�}���M~�
��������z��bon��&dF��@Y��NMũv�By�o�6����T*�&����@��
ܘ��= ���
y�n�Ln쵗�cް���X����bMy���1B=��6o���*�D�>ӚR�����Pg�Myi����ni�Ɗ�c]�*�,X;�߉aM����A�I6:���)��p���h��g�z�<όۂ�x�葿mݴ��bʯ��eW��9�.L���2A���\5��8��)ݛ��?�������h��<���x]�]��mU���6bL����W@����LA����AH�o�j5ʞ��i)ț +���ǍH��}�w���w̷��lϳ��aЮ|��Vͪ&��Kߥ��,@��蔬5���g)��s�<��{)���@�b�RwH���lK����aP���VV���+Kx���!@��m�W5Z����)���`�{�}T���],�˃v��3��k̲]��`᭯�FU�C��K��D@`��;5(�$��)x�q�!���-v�_�tc�O��v��jkZ��(`��c�U���Jפå�@&����4��̞�)c��#������䊇����o��}s|e*�pt+Zz�it�O�nu�Ef��v�:ۮx-/���yh#���z�.��{� �'~ +o��Vy�e1�Oy�Z��Pz"O�`z�Ee��{B:ܭ|/Ȩ�|�$��}�l�� +W���[n���o��%�e +��m�eߏ��Do����dپ�ZC���Oƴ;�JEP��$:תۄ/զ��:$A����ҟ8�$�K�0B���oD�0��d����Y��#��O��P�E����:���)/ʥ���$Q���� +�$��^�$������n��y�Rd+�d��Y��f��O$����Dέь�:�!�/��ċ�$^���{H��I���^#��nn����cǻ��,Y9�Ó�Nѱ�D��*��:P�v��/���9$i��|�6�]� �)��E�bn� ��cn���X�+��N��O��DJ���5:$�ؔ/��l�$t�@�s��g�;Z�.�Zڋ���mͿ��tc#���
X�����N9����D����9��D�y/x�і�$����ۚ�����k��!����mp�1�dbֺ%��XU�"�M��1��C۫r��9צƜ�/j�N��$���8���ϔɈ�[�y��m�֮rb��ǫHX ���YMȯƥ�C���X9��a�N/_�䜄$�����"������F�������u�o��Pv�q��w_r���xsғ�x�u*��yYv�mAzw�YJz�x�D�{Qz.{�z�{�{Sܢs�y��>t�z2��u�z���v�{'�1wR{�Qx|Mlx�|�X4y�}PC�zZ}�-ez�~ �z�~-�qԃ�� s�-��t;�£9u(�i��v�1}�w +v|r���d�s���R9t��?Buy��*�uԘXuˍ�HlL�мzm�ʌ��n��Y��p �B�[q0�Xu�rQ�~c�sb��Q�tY�B? +|�|�?J}}U)�}J}�Z}�~$�]x|���Mx��f�yq�6��y���zW��w:zʀ�d�{I��R {ʀ�>�|7��)X|p��]|����Yw0�ǻpwɉŪ]xV�љ +xӇ�yX�.vyކwc�zo��QKz��#=�{s��(�{��_{�ʁv#����vϒ7��wk����w���Cx��wt�y�b�y���P}zK�o=Xzň@(�z��Zz{�J��uV�!�v���0v��*�w>���wؓ�s�xu��by��O�y���<�z2� (SzR���zf�O�Pt��D��uh���v
����v�����wB�r�w�=a/x���Oy5�<Yy���(yĎU�ylj ��t4�r�Nt߫���u�����v� +��v���q�we�`gx��N{x���;�y4��'�yA���y@��Ĥs��tp�7�Xu
�͒�u��|��vJ�Op�v�0_�w��<M�xB�;�x��/'�xƔm
x͋��zsu���t��Et����uC���u�Kpv���^�w7��Mfw٠�;3xO��'{x^��%xp���xs)ː��s����gt]�b��t��܀u��howv8��^qv㪶L�w���:�w��H'Wx ��7x%���+��m���_o[����q�ҁ�rv�ҁSs�r��uh`��v�N���x;q��yW&n��zA
��{V�?�vƴ1��w��ހrxa�"�Dy�O�y�qb�z�_��{iM��|):��|�&�
}Y
�~�E}ȲKU��2�������p0~��^��L�"�::$8�b%�;�uE���W~>����~0�֠�~%��-~�\�~��o~�?]�~;��L~a�Q9�~}��%f~}��$~�����}K�j��}F���}D����}F�~p}R��n}`��\�}���K]}��9}Շ�% }dž�O}Äν|x�#�`|�����|��i|���}8|���l�|��\|��PJ�}$��8�}@�C$�}�^�}����{ۢ��{� �:{��6�:{��t|)|��l|4�k[M|j�J
|���8'|���$�|����|[�T�>{^����{f�5�{o���{y�T{%{�� k!{��Z�{�Ix|*�M7�|B��${|���{Ή��z����yz�����{����{ +��z${$��j?{@��Y�{y�jH�{��7X{ʗ?$G{��J�{V���z����`z����z��|�z���yEzī|i{zݧ#Y.{��He{M�7 +�Mv����}wv���x4z�y +j�}y�Yx��z�H6��{�6-�.|U">�|���~�U��~*�L��~U��K~y����~�xτ~�i��X��FG|���5��i�"�4�܁��g���z�����߆���G���2����w��/��g����1W��R��Fӂ��58���?!ҁz�"���m�݄�������$�q�����svz�k�ef����kVځ��xF)�\��4Á��!��oO�2�[�o�͗e���O�����̓����B��uT�ϐ/e��c��V��E��̋�4Q�z�v!l����h�%��1���T���?���:�Ã}���ItV�D��e�ޓ�UJ����D�M��3���!Au���~��������!��B��X�����k�8��sa�̛�dC�h�0T����Dcؔ3�{�!~鏩�~)���u�p�������2�`�q�[�ӥ�rl�e�Ucm���S����C�g��3!�A �~i�
}��ˬF�/�-�ˁ��&�4���p����q����b����SCR�CR��2�~�� +��qbr��\r�cҊ%twS�u�C\�$w@1�bx�r�'y� ��{۫Ꮢt��Ԏ%u��{��v����|w{qƊPxcb2yWS�1z<B��K{1���{�T�;|� v��~B�;�6|Ɯ>��}���}`h�p}�p��Y}�aňM~AR:�]~�B��~�1��R9�f� ̈́ +�H�@���D��B� +��N�ۊ�|�����n����_醼�FP���~@�$��0c�p�4�� +`�~� �����Ɨ�h�=���@��{ψ �mr�!��^��-�DO�X��@Q����/��։�߃*�` +������V�����ښ��݈��mzȇ��8l����2^0���COE�ݐi?΄��/��O�d����* +Ԁ������ɕ��i��ĈG�Qyɇ%��k��,��]j�>�sN��l�?J����/L�ґ:����`�q���D�Ԕb�������uxȆȣ+j��ˠ\��ڝM��>��8�|.�^�7j�o��'߇��ي��W�ӱm������w�{��i��z�R[�����M]���]>A�ۜR.�����?����Fv���ˉĽ��s���\��j�$w3�;��iV�8��[i�?��L�c��=݂���.>���A����`!������l.�i�Dn�֔"o�xВDqRj���r�\f��thMc�Vu�=��w7-��x�J��y��"|���t����u@����vMw��)w)i���x[{��yL��rz =�&z�,Ŋ{�J��|�n�&~�����{�����|E�@��|�v��&|�h���}`Z��}�K~=<��Y~�,|�L(J���φG��� �ʃO�7�ɃL���*um�<��g�����Yˌ+��KG�҂{<%���h,;���tJ� +��#���Q���������\�Ӑ$��tX�{��f���X��w�kJ��&��;����;+����A�8� +r���횆�@�z���Z�Q�����
sL�䎡eŌ`�`X(��6I�;%�b�+��C�g1�k����ԅk�[����ؘQ���zrd�_��d��ޒ�Wt�l� +q�d+�m�5VÉ���HLj���:@�m�+ +�5����� -�z�5�5��u�����}��@��p�����cX��V
���YH+�C��9����*����=脑�x Z��S�.�±S���Ѯ|č���oÌ@�db����Un�@��G����9O���+*[�[�/Ƅ� ~���k�=�|�\������|
����o���b�v�?T����G4���*8�X� *� ������[ ��.��ѠCl-�]�xm�|���o�o��gq*bN�r�T���tGFՑ�u�7��.w"(5��x|��y�&�G}*����s��0�/t�{���u�n��Nv�ak�w�T2��x�F:�y�7��Ez�(��{�3��|���=�*��z��{�zt��{�m��P|U`��'|�Sx�}SE��&}�7-�p~\'ۍ ~�R����R�ڑ휩��Ě�&y`���l��i��_��I��R��8��E�Z��6э���'��E�1m����`���`���Ή`���M��xR��Ck�����^蒎��R +����D����
6l����'�����}��������ӏ���������zwQ�O�\j˔�$^���QY��C���46�f�o'F�މ��ڈF �Ä��������*�vs�ʔvj����]k�v�*P��r��C|���X5����2'�H�����zO��>�����u��Z��i8��y\���mP&���~B��%��5A�g�,&҉�����m�f��]�����E���k��t����4ha����[����O�����Bn���r4Ί���&��I�j�؎��х;��������sԔ���g��b��[R�H��N�?�
A�a�q4h����&7�╭R�[��_�W�ޙG�p�ڲs+�v��g +� �Zː��N~����A���i4�O�4%�����?�����m�O�6lB~���m�r���o}fs��p�Z��r�M��7t$@e��u�2_��w
#e��xp�y���%}��E��sS}���tZq֠�u\e���vXYe��wfM�8x?��y�2��z�#Y��{�7�p|��y�2��zP|���z�p㟚{Edܜ�{�X���|=Lw�K|�?���}s1ؒ�~#N��~�s�M�w���$���{����o����d
�X +vqQ,��w|E���x�9S��y�,T�1z�`�9{�{��}l����}r��zr}�z�gd�j{%\�{�P���|$E0��|�9��}s,1�:~*p�+ʓ��-���7|��ǀ�q�� ��f��t��[r���P ���D����8���F,
�W��~�;�%����}�ʂ\{Ы�p�1��e����VZСP��O����DK���U8d��&+������X�qM�x���ނ�{��sp9����eE����Z1����O +�u�/CؚS��8�u�+��Ո�{������l��C���zK����o���d��n�GY����N����Cu�č�7Ö��+��8�Eu�ы��������!�y���/nզv��d���Y���N�b��C
�C�#7r�_��+J���b�1�Gю��܇s�Ixթ���n#�
��c_���X|���M��ꘫB��̖�7��e+�-��>����������qx%�M�bm}��� bŢ"��W5M����B6�g��6Õ���*Ȓ����*���r��H�g��w��[l�Z�ubI�֨�W��c��L��0�UA���6��,��*��i�l +̙+{S +��t�^y��u�S���v�H��w�>-�xx�2��!y�&��.z�_��| 7��~i��r�zh���z�^ +����<�Y��g��ʆJ]��L��S��ۅNI����?�+��6���+����� ɟy�A윈�h k�i�I��a�"g=���]9���SF�
�&Il���z?��_� +�B��u����f����\���aR�����H�T�q?9��X5����x+�����!��������� +`�`�ĉ܁�f3��\@�w��R`���H����K>��Z��5x���+����!�K�VӘЍ� +����+�B�e��q�~[��8R�t�H^��6>ͧȚ�5R���*+p����!������$�� +ɑ�K<�ł0e9��P[��}��Q���-H.���>��R�254�$��+a��_!�8�F���� +�f�eh�`�N��rj3�.s%l5�Vt#n#�buo�Ju�q�zv�s[gzw�t�Tax�v@vyww�*�y�x�fz�yoѾo�tK�*p�uH�|r/v@��sPw0��thx"x�uzyfPv�y�S_w�z�?�xd{�*x�|fy�|`�m�~�o#~"��p�~8��q�~_�Is~�wt6~�e<u`~�Ruvw'>�wfI)�w�Ngx�E�|k݇��%m��ê�o� +�gpq�l��qń�vPs�jd:tR��Q�u�u>Dv}��))v���gẃ��~j�� +�OlJ�r�m���o^����pƋQu!r$�c9sv��P�t���=�u���(�v'���w�8��i��^��kd���m���in����<p��s�qp��bBrˍ�P +t�?= u��(�uw�j�vW�c� hӣ��$j����&lL���%mښ̈́o[�!r�pѕ�alr4�Oasy��<�t�u(Lt��u��?ƪh,���i�T��k�����m7��n���rp=�c`�q��7N�r�4<>s��x(tO�g +~�p�l�~�rr[�~�t$J
~�u�7�w:##NxH��y��h|�qī#|�s ��|�t;��|�uR{�}vrkl}Cw�Z�}�x�I4}�y�6�~z�"�~H{k�~�|��Uz�z��){!{��{Z{n�{�{�z@{�|RjG|#|�Y�|}}XHq|�}�6t}1~P"�}Y~�}���y{�a�yyу�=z(�ˈ�z���y zQi;{-�,X�{��G�|��5�|`��"[|���9}"�M��xS���x�� ��y �&�]y��.w�y�Vh1zS��W�z̆�G{F�5{��~"#{��p|^�f� wQ���Iwϒ�LxG�R�x���v�y+�?g0y���Wz��Fhz��E5z��,!�z����{��S��v��(��w�Ԕw�����x +!9x��v
@y�����t���su ���u���v�`r2v���cGw�kS�w��)C�x.�;3Bx��G!x]�.
WyQ�����h!���jQ�h�Ilc�J��nGu +y�����p��k�*r%�ׂ�sq�قZt�s�� +u�du��v�T���x"C�ay?2��EzF�K{ ��|��߂y/����yɐ8�WzZ�v�z�r���{oci��| S���|�CD�x}52�g}���`~! +�D~��*����� +�_�{���,�b�%��>qXӁ1bl��0R���0B���21���8���C +X����r�ޛ{Q�*�K/�m~�
��p5~��ap~Ն`R ~�B +~�>1N~���~��� +�~Ń��~���~y����~d�P}�~K��o~9��`}~(�{Q>~3�WAl~D�G0�~>�d�}��� +�~ +}X�g�0}H�m�z}/�ۉ�}�G{�}��mC}�=^�}��O�}��@[}1��0'}"��;|���5|ɇ�� +�F�r�: K���'���=�]�/��m����s?��seтX�HXD�ϔ1J�b�3;h���g,���Ќ� z~��h� +�8F�8�(醋�dc�G������)����� +���z����zm�t�`��N��S�.�fF+�B�7Іx��(��ǃ�h�\��/�Ñ֍ˍH�ΌK��y����l��`����S!���"E����^7V�Շ�(_��N_�{��Q�Z�H����������vx��H�l� ��_Q��,Ru����D����6�E��(�v��X���q���������5����jw�����k5���|^�����QΆ}��Dn���6}��'ԃ玅E� ��ā�@���+��������v��R�+jR�(��]ȇ�JQ$���C܅#��6�H��'z�c��%�n�}_�~�ʫh���S��uÈ���i��ʢ�]���#P����^C\����5��ߘs'*�������w���j�5����u����h�}�Y\��j� +P�]��B�n��5?���;&肔�3큀��3Å�����g��ș3i�uŖ�k�iY��m�\���o�P�#qjBk��s'4�'t�$��5vS�uw����{�<��n�����p�t�q�hk��s6[��t�OJ�u�Aގvw.3��xi$�� y�#�)z�6��}�v,k�bw!s��Qw�gx�xx�[��y�N���zbAV�x{33`�)|$��&|�Y� +��K^�r�@>NJ��1�����#��z����k�i<���7�P����y)�瞟mߏ���b\�4�cV����NJĊ��Q>C���x1+�?��#]������Ōm�W�X�X����xG���ym��� +pkG�_qp_ƙ�r�T��t*HW�:u�;��-v�.Z�nx.��+ynt��z���~~U�I��u�ui��vhjW�4w?^���x
Sn�px�GƔ(y�;S�%z�.%�i{� �|�`}�:���-�W|3t^��|�ic�|�^"��}BR��i}�G+�#~/:�,~�-��|( �%��G������_~!�Z��sb����h|�-��]W�ւ�R����F��K��:w�Y��-����� �B�9�1�H�˂�};�y��r���
g��q�q\����Q_�؇\F +����:����-c��b�s��\�%��]���|L�Sq��E�;f�̎([��x�Pӓ<�(E���L9����-#�U�ʋ���z�>����!�&{b�O��pٙ��wf0�=��[U��}P@���E����9C����,Ռȍ���!����s�N�z�Pz��ם�o��B��e]�ÚZ��g�*O��1�dD����8Ύ�7,u�I�\�����������ty��b��o,�آZd��]�*Y�����O�ś�D����8g����,�ޕ�� ��x�(�#H�y��xΚ���ny�}��d +� +�PYp����N��m�HC��I��8�Y�U+�������q���k���wy�ig�l���j +v���n�lA�`pa��!qyV�2r�K��\t'@���u�51�+v�(��xA ��y���{�t�~�uҨwu3kx�v$`���wVM�w�K{�Ax�@���y�4�z�(���{�-�n|�i�A~Z��.t�T{�j���|`:��|�U��|�J�5}a@�v}�4��~y(p��M�]�����b�3�zt�Y�
iԣ�_���T����J^�P� +?����*4Q�-�R(L���]�_�%
��ɈH��sR�x�Zi�>��^֟-�xTi�Z��Iܙ���?@�߆Y4�v�'(!�O�$`�y�
:�Ӆ&�[�!r~�ˎ�ho����^B����S盳��Il���+>�C�~3��։�'�����a���j
j�ކ�u���Vq��7��g�����]���US^�� H��_��>�����3q�E��'ʑ �rR���
���`��傄q���g
�x��\��d�Rǚ��hHt�Ӕ�>�,��3���T'��|�#.�e�O
��C�3�T��pT�/��fc����\a���RA���H�[� =����[2ɒL��'J��9 +��<
����: �݂�o����We̟���[圐��Qՙ��UG����7=h�\�<2���'�����v��
�� �?E�}��l���hob���jWX���l*Nl�8m�D+��o�9ա�q�.���sH"Μ{t��� +vp���y� +/�1������(i����2_���V�J��LE���0Bc����8~�u��-�����"���ٔ��' +{� �����jh��� +��
�<k�с�hc�H��^ۨ���U>���K~����A��b��7��-��-��:�K"ɕ���
��� +�.�d��!��g뫮��^Y��}T��O�"K����A]�t7����]-q����"���
�^���g�|��g[���]٧Z�9TL�ě�J��l��A �8�S7g��->� �g"��W�� �Ŏ�.������fê��&]c���S�T��J]����@Ŝȝ57/���R-����"q�蔻�H��D�=��F���7a_��iGW¸Rj�N5�6l?D��9m�;E�Qo�1���qz'��@sEw��t�b�xv�ј�z� +s�1��KuY'���v���xLϞ�y�X� |� +5�,�~^ +p�i��rl(��s7n;sGt\pBa|u�r0O-v�t<w�u�&�xv�
�y�wxƹk^n��mpx�2n�q�;psQ�+qxt�rr�u�`ctw+N<uMxS;GvUy[&Zv�z +%�u�}:
�w{}f�}g��i8����k2��� l�Y�zn��;o�p�"^mq��L�s��:t-��%�t��w
�v����e{�>�Hg;�i؉C��k��\/m^��n�o��]~p���K�r�<9vsI��%Js���uւt��d6�w��f����xhҐ�Cj��P}�l{��m�n8�W\�oފ�K%q\��8�r��N%r��UWu'���3cA���.e���#g蘟�iՖL|�k��l�m}��[�o.��J�p���8�q�$�r1���t�����b}����d壉��g�l��i�f{�j���k�lҗ�[n���I�p�^85qJ� +$�q��@�t�2�ua߯媧d@���fx�\��ho��z�jX�)j�l2��Zjm�SI|o��'7�p��N$�q�D�s����faD���c�����e�W��g�ziͧ�j)k���Y�mk��In��7�p;��$}p���sN�/��`��J��c0�E�ey�O�:gn�oyii[��i�k8��Y^l��@H�n���7fo՜u$ep&��+s�A��t1dK�#uf�2u�i`��v�k�}�wAm�mw�o�[�x�q�JOy�s�7�z?uc#Az�v�~|w���q�mì+r�oj�js�p��Mt�rz|u�s�k�v{uGZ�wiv�IqxPw�7)yx�"�yry��{ z���oav��/p�wɚ�q�x���s +yCz�ty�j�uz�Y�v,{`H�w-|6�x|�"�xS|��z}l��m��Qo���pq��Qq��y�r̀i�s�Yu�)G�v'�36w�4"RwM��yB۵�l�䦓m��*�\o,�v��pt��xKq��.h�r셓X/t#��G@uD�o5�v(��"va�l0x{�$�jᑨ�l��4��n*�Ά�o�|w pЌ7g�r��WWs\��F�t���5#uk��!�u���vwƄ<��i�f��k��C��mD�.�vn��/vp�@f�q]�ZV�r���Fs�4�tŋS!�t��V�w+��#i%�-�Yj�e�sl���bm�u'oQ�oe�p���U�r�yE�s@�54gt*�6!�t=�|�v�����h���$jB���PkڥW�WmE�t8n���ep��UDqn��E +"{����r�����s��C�ut���u��9qvk��b7w%�ZR�w��B{x���1�yD�<�yR�� +e{ +�zF�ѧ�pǗk��q�����s��}�s�ot��\`su���Q0vz�0AWwL��0�w����wĉ� +�y����up�Ҙ�q3�j��rA�|�s)��n(t�N_�t�P�uّ�@�v���0vwD�Ubw��y��Fo��K��p��X��q��c{�r��jmCsv��^�tV��O�uC�@Xv��0!v���@v��Fx����0o�͖�p�T��q ��z�r�Sl}r���^;sӟ�OYt��F?�u��K/�v1�r!u��>jxN���@n��W��o��Q��p��Hy�q��<k�r��9]�sg�DN�tW�~?�u5� /�uə� u����x�˧�Yc^�R�e��V��hw|���j�nc�yl�_��SoP1�Hq@�Pr�.�dt����u�b��x]�K~�kޗ�m��� ok{�p�mru^�s�OKut?W/v�.�Jx�ix���{�a}t:��}EuG�3}uvDz/}�w*k�}�x]�}�yNz}�y�>�~#z�..~I{��~T|!~�}v��{j|x�V{�|݆�|}4x�|A}uj�|q}�\�|�~M�|�~m>2},~�-�}a~�}}[%p~��z����z��f�gz�w�{'��i�{h�w[�{��8L�{���=�|R��-�|���g|m�q�}S���vx㌊�[yz���y���v�zD��h�z��
Z�z߈<L<{>�q={���-"{̆M{��� |��n�w����x����y��u�y{�g�y�Zz/�:K�z���<�z���,�{$��6zψ� A{����wL����w蚒��xl�t�xЖ^f�y4�YYKy��cJ�y���<z^��,}z��nz �� u{d�`��vä���w[�#��wޟ�s�xC��f%x��]X�y ��Jayt�w;�yГH,'y����y��� �z��vO��v���wi��r�wΣ�eox5�yW�x��oI�x���;/yU��+�yt��x��� �z�����u� �v��t1w��r!wn�2d�wզ�W|x4��Isx���:�x�u+�y���x��c �zA���t�ac����e�����htC�jUf��yl�X���n�J�fp�:�� +r�*d��tD��ue���x�Ԇ k8�<��m�Y�n�s��pUet�q�WŃ�s~IQ�@t�:&��vf*��w�ς�x���{m��Ws%����tF~uWq˃,vPdg��wPVނrxTH��'yM9���z;)܁�{ށ�{�o�}�����{ +�D[;����PC���KE.�x��9U�u��,ڄx�|��n����jo���z��ycp,�%ere���g�Z���i�Oe��l&D��nX7ɑ�pY*���r1f��s���u��{Dy|��i�o=�ik�d��<m�YӖ2o.N��3p�C��Cr�7f��t1*u�@u�}�fwڍ x����}"xa�p�n3��q�cʖ�s;Y ��tcN��u�B��v�7�lx *I�y.��*zK
+��{� +��~�w[��w\m2��x#bؕ�x�X2��y�MV��zUB]��{%6��T{�*�|���}t
r��~�q��<v8��~l2�~~Va���~�Wm��~�L���!Aώ�~64�b�)��3����
��h�X҅9��u:�w��kM���ia-���7V����L���AP� ��5Ҍ���)��F����(�%
؈R��+�[�$tM���j����s`~�ԉ�V&���(K��0��@�n�5}�ꇟ)n���^��_�x
��e��w���Xst��i�� ��_˒&�}U��M�lK
���l@s�ό~5$�M��).��c���t���n�����r��a�h�v��_���cT珳��J�����@ +1�H|� +��~�Q���hl`�t} +ˋ�J����(k��l�-b$�Ѓ4X��N�/N���D����:��\� /�_�9$����v!�8� �ǃ\�́fj����Ha}����X +���vNG�.��D[�䇋:^���4/�����$f�߆�.�Y��?�Յ a� +��j�Ώg`ڛD��Wy�ύ�Mʖy��C�6�&:���r/v����$A�.��*����f� +9\�ݔ�.�ޓ�#܌��i��B�������
�f�h���S_���dU�+��Ln�Ȝ�B͒���9�q�n.��r�9#������ŏ`��'��2� +�)eS�}c�\��e�R���hH�j&?0��lB5W��nf*��bph��rC\��s���{w� +o��s�P���>j _��k�bӝ�mSe��wn�hJ} p#j�l{q�m[|r�oZI�tAq~7�u\si#u�t�Ix�u���f�i���h�k���j�m���l�o]{�n&qkFo�r�ZsqStKIr�u�6�s�w"�t_w�ewmx���d's@��f�tE�h�uN�Ej�v\zFl[wXj'n#xNY�o�y4HGqmz 6Ar�z�"?s{vk{���a�|a�dj|��vf�|��h�}1y +j�}~il�}�X�n�~G�p4~D5�q�~i!�q�~U�u�~P��`�~�Db�����e,���sg^�w�iy��hk��TW�mn��F�o&��59pz�+!�p����t��γ�^}����aR�<�ic��f8��v�hk��gj���V�l���F;nG��4�o���!�oȅ4&t��P]E�r�<`&�t�!bԓ���e2��u�gy�f0i��KV4k���E�m��4vn���!{o��ps}���\F�W��_-����a�)��dO��t�f��Gech��U�j���E3lΏ�4(n2��!cnP��r�����[w�H��^d���a���c���s�e��d�h/��T�jK��D�l)�03�m���!Om���r����Z��7��]��h�`{���b��seJ�Mc�g���Tni��4Dek���3�m� !?m.��
r;�֭�Z"��])���J_��R�bbg�rodȩ�cug��Ti<�sDk)��3�l���!2lÓ~
4q�����p +_S��q bM�Tr)e/��s"g�vLt&jdf�u+l�V:v8oEFw<q63uxs!�x�tX B{u�Gl�h���njj���o�l��Iqn�t�rBpfe]str#U:t�s�Dxu�uZ2�v�v�9ww� zy�x��"jrq���l&r���m�t0��o)uTs�p�vkdEq�w~TQs@x�C�t�y}2\u�zR�u�z� �x�{ʭ$h\z���j:{�4k�{��im�{�rho|lcEp�|�S|q�}BCsX}�1�te}��t�}� �x~C�Qf��g�h��(��jx��l"��q@mĂtbIo\�?R�p�BtrR��1yse���sw�I +wN����e����g>��LiB�~�k�;p&l��baWng��Q�p��A�qv��1r��E~r��� +qv����Acߔ��<f��h/�U}�i���o1kˎL`�m���Q:o7�nAYp��0�qˈ�iq��. +�v����b���e-�܊�gE��|�i!�unMj��W_�lȒAP�n}�C@�p�e0yq��Uq �J +�u�� ��b$����dj���f��{�hg�XmtjD��_l��Pmѕb@to\��06p{��Bpe� +.u�q��a��X��cʪ���e觚z�gˤDl�i���^lk}��O�m=��@nΗ�/�o�2oېSYt�����a��cG��:ef� +zEgK�"l#i,�>]�j��bO!lğ�?�n[�F/�o��d$ok�(|tq�Ĩ�v`^暡v�a�vwnd�}�w�go5x�i�`Uy$lmP�y�n�@`z�p�/.{r��{ss�T}av]��ssgǘ�tPi��u)k�|bu�m�m�v�o�_(w�q�O�xVs>?�y%t�.�y�vP�z w$�|NyN��q +pw��r)qĉs:s +z�t6tDl�u#uu^vv�N�v�w�?w�x�.Px�y��x�zO�{[{��o +x��EpRy���q�z/y�r�z�k{s�{M]*t�{�N"u�|k>qv�|�-�w�}Wmw�}y0z�~7��mP�f��n��[�/p�KxhqK�2jdrr�$\=s��M`t��=�u +�jY1p\�J�q���;�rԑ�,ds�� +}9v��~�y���w�oO�%x�p��&y#rr�y�sce]zt�W�z�u�IG{w%:,{�xI*6{�yJ{�y�U}�| �Qu�wl��v�x5~�wzx�q�xy�d^x�zIV�y9z�H�y�{�9�zi|6)�z�|�
z�|��|�~,��tPj�,u>�}�v�p�v��cYws�U�x�G�xǀ92yl�,)�y݀; y��D�{��7�r�-��s���|7t��Zoku���bXv{�`U"w0��G8w섂8�x��)Yy +~�!|��9"����>�R�ԁ��v(�v�$k@�4� _�����Tn����H��u��<S�N��/<�0��!K���9���sv������!u�t��jR�D�%_,��yS���H%��E;����.�p�@!!7�M~҅�~˃5~�Ƒ8t��Jivw�E^lR�S*�G�~���;h~��.�~ �~}��V~�I�~9�_}��Gs7~�h�~͕�]�~��Rz~��tG~e��:�~I��.<~"�M �}Ѝ U}g�52}���|�~�qrh~a��g�~@��]~��Q�~��F�}�:�}ɔ+-�}��� �};��Q|ڊ�^}Y��{�~��q�}�|ga}͢-\�}���Q�}��UFZ}~��:[}_��-�}*�= [|$N|i���}��}G��^fr��zaSg�d\Ǎ�f�Qa��iEЋ~k�9B��m�+҉�o�S��q�
� st'��y]{���e�q��bg�f�/j[،lP��m�E�o�8��1q�+���s}W�Hu +t�dȊu�Z�v�N��6w�ĊWx�7ц�y�+�z�_��{w
ׄ�|�u��~�x��z�n��{3c̈�{�Y%��|<N:� |�C.�9}L7\��}�*υ~?R��~����ӂ!�vv��U�Dm�z�qb⇦��XZ�܁�M����B��O��6ꄵ��*��5��7���,/�Ԃ<-�R��u�D��l%�z��b���JW�����L�<�kB���6��*C�o�w �텐Q��xy���Yt��f��kI����aW�� W�0�:Lg�~�]A��͊�6*�>��* +@��C�5?���>)A�����]�txy��B~͂�rҙk^si��a8^���c�T���fdJ�1h�?;��kg3j�Lm�&��_o�ǎqw +��s� +x�]w +Ɉ�z" +�,vy[��w�(�mz� + ��H�����j ����v�|�Fa]�w�>X瓕�FPE���AG_��&>@�?�5 ���-+��T q�����O�e ��膇�
�e`ÔʜqXk� +����X��h��P�����Ht����@ �N�7���a.����%���֍�.�������+:�>��X���RP:�U�H(����?˕���7O����.ȑo�%��[�3ύ^�D<�L�H��j�>`���S*�7_&J���apB���c�:%��f1���hu)��j���\m+;��o:"�Lr 㒐wP +n����p����r���Uu*Z��y� +�W|�0�q}�(�~4���~�s����3��ڋ�x +���8'�ړX0E�!��(j�k�� �����,
�p�d�:� +{B�l�{�1pni|KnU|0 ~t�|ɪ�Zל`\�č�_��Ubu�p�e�a�g{�Ri��A�k��1m8�&m� �s�R�%XQ����[Y�،t^I�~a��oqc���`�fT�SQRh���A`j��&0�l<��l'� +-s����V��h�kY��8\��{|�_؍6n}b���_�eM��P�g��}@�iՈW0fk]�KkV�� +�r����DUd��4X����[Ε�{�^ɓ�m�a��_'db�/Pf��`@zi��0)j��&j��� +�r�N�0TU���*W��� Z�|{]��l�`˘m^yc���O�f��@hP�C/�i�Fj��q����:S��n�EV�2�KZ#�zH]+��l `��]�bᛨOeu��?�g���/�iW�qi��MFqD���bR�$��VJ�;��Y��jy�\���k�_~�]pbO�JN�d일?�g6�m/�h��
i#�Bpp����Pk�Z{� +Yr�x��w�zR��b�u]�Sd�v:��f�wy�h�w�kbj�x�]l�y�M�n�z\>Fp%{-�q]{�-qR{��w |ա3`�~ ��b�~1�e~]xUg6~�jJiJ~�\kQ~�M9m>=�n�4-fp3Dp)%<v?4��^��p�Ia?���c��ow&e݄�iAh��[;j3�(L�l3��=.m��S-o6��o7���u��c�3]N�̐�_ލ���bV��vd��jh\f��^Zzi5�WK�kF�W<�m�e,�nW��ng� +�t��@��\�"��^��a��a>��u-c���g�f�IY�hQ��K\jp�<TlF��,�m��Zm�� @tx�כ�[�h��]ȝ,��`]��tJb̘�f�e2�mY(g��8J�i��;�k��,hlގmm�� ~t�.��ZU�Ǎ�] ����_��1s�b�`f"d���X�fڙ�Jqi +�";�j�,?lH�tl�� �s�����Y��;��\p�Ā_�Xr�a���e�c�X0fL�DJh��;rjt� ,k͕�l4�� �sk����q�Z5��r�]��sJ`�vYt+c�h\uf�Z7viaKCv�k�;�w�nc*�x�p�yq��|[t��nyb��o�e^�~p�g�t�q�jgs +lGYt%noJ\uIpz:�v_rb*�w8tw_t��{>w��k�k���mm'��nen�slo�pne�q%q�Xrls�I�s�u:St�vb*=u�w��u�x"*zCz��i.s�Mj�t�]l^u�r3m�v�d�olw�W2p�x�H�rHy�9�s�zc)�t�{�t�{Ooye|��Ig)|��h�|{~ +FenP��8 +l%u�+`�vQ�EU@w�aI~w���<�xn��/�y��!�yP���y��}|(�р�rk�.vsb��ktU�U_�uB��Twv�H�vՅ<tw���/ix$�_!�xk�4�y���{��[�qR�zt�rU��j2sW��_*tV��S�u9��HDv ��< +���|��1�}��Ivfx���l�x�TbqyV��XyЉ�Mcz7�EB�z���6�z��*�{1�o�{4�?�{ąa�}��upwƒ�k�x��a�x���Wyy��L�yy��B&y⍁6�z>�p*dzy��]zm���{ �Q|���t�w��j�we�vaw֗V�xZ�~Lxxړ�A�yP�m6Xy���*,yݏ�;yÍm�z���2|)��s�vQ��j[vɞ�`�wG�V�wΛL"xX�!A�xٗ;6y4�m)�y^�X y9���z)�W{ڂ�u?��Y�kA��]a��`6V���cK��e�@��Xh�4���k/'���mp���o] +���q� +ԅ,t� +m�J��o�?e�
qV3���s'F�t����u���w� +�0��z�dbO�Z��Z����Q���JH�`�?т۔�6��`��,j�ڒd!��C�����a +���5&�~`���ZX^��])O���`Fh��b�=�Le�3x��hj(ߑ�j�E��m���o���sj +���oS����V��Z-Nҡ=]"F���_�=���b�5?��eu,]��h/"��$j���Ol����oi���t� ++@��{�")�t|�F�3}�
��~�H�q�A +���� + ���v?v��z� +yI̋�|� +F�p|:'�a~� +��~���J�< +��́#ӈ]�� +h�x-i�j�k�k�l�^�m1n�Q�n�p�C�pUrC5q�s�%�r�u?t u��yByL�Zc1n�%egpiv�g|q�jTias"]�k2tdP�l�u�B�n�v�4�p7w�%dq5x�r�y�x^{���`�w��c.w�u�eux�i7g�yf\�i}zO�kfz�B_m={N4.n�{�%.o�|Gq�|l5w�}�#^�~�Oa]"tZc�Uh-e�q[�h�O'j �A�l �3�m��%n��?p���v����\�!_��UsRbX��gGd��pZ�f܄�N�h���AUj��3}l���$�m��bao���vK�lj�[x�w~^a��rfa��f{cw��ZLeĊ�M�g���@�j��3:k���$�l���o*��Ou˃L��ZP�,}*]D��q�`�`e�bx��Y�dҐBM�g��@�i&�Q3j�$�k��n��v�u^�q��Yb��|]\[�p�_"�e+a��Y5d��M#fN��@Ohk�2�j2�R$�k:���n
���u����X���{�[��'pS^h��d�`�X�c^�|L�e���@gӖ�2�i���$�j����m��:�t����s�Uf~�tSY"r�u\�f�u�_�Zv~cMmw?f ?�xh�1x�k�"&y|m��z�oc}~tG�"o�]�}Mq%`�qZrJc`e6sGe�X�tCh|Lbu;j�?v4mG0�woj!�w�q>�y.rG�|\w�Ol�e�{�nHg�o�o�jc�p�l W�r+m�K}sSo�>btuq�0�uvsH!�vt��w�uv?{\y���i�m�zBk�o5n�mkp�b�n�rV�p8svJ�q�t�=�r�v0+s�w%!�t�x�v�x��z{{Ƅ>g�ucx�i�vdm~kqwQa�m +x V n�x�Jo�y�=Dqdzf/�r�{ +!{sJ{�un{��y�}���e�|�w�g�}HlZi�}�`�k�}�U0m0~-IVn�~p<�p0~�/xqh~�!^r<tw]fx��c�Rv�fA�'k\hc��`j<��Ttk��`H�m��<Ho��/-p\��!Eq��cs��Y�xe���eb}��ud�j}g#�P_Li�}S�j戲H:l���;�n,�7.�oo��!0p�/�r��w��haW� t�cҒi�f��^�h��SKi��@G�kÍ;�mZ��.�n���!oA�
�rS�MLwu��~�`_��s�b��ie;�Q^gB��R�i3��Gyk +�;Wl��p.�m�!n��j�qӉ=�w��}�_��sKb&��h�d���]�f��MR�h��G3jr��;#l��.omb�!n +���o� +ۀr� +u �Z�u�+�x+�vGzǂ7m&��U�c��)Y Y؆�\�O߅�_�E���b�;�*e�/���hy#%�j�t��l���p( +
|���}:�Gc�ve�"[|w��R�w���I�x��@�x���71y� ,�ya�a" +,{~�a|hcMu���Z�vP�kRwv�;I�wV��@dwߒ�7xh��,�xː�!�x���'x��� +D{��;|���cy��U�Z���Y
Q���\WHe��_p>Պ�b5�6e�*9��h:_��j�S��l��8p� +��m�+��sZ +P�3ks��m� +n��p����v> +?���fd7��h�/���j�'Y�Ll�D�=o:��p� +���s�爈x� +���v�5�F{ +6�Us.y�7�&�sT��������m�a�0 +��o>.���p�'��'rM f�ds�T��um���w9\�(z����}q +.���}�'���~Z ��V$玠� ����� Z�q���%�� +�`���e�� ��l��/�n�' + ����&�L���Q�m ؆��;b�ՂJ +������[�e +f~PZ7hlp�]j�c8_�l�Uhbn�Gep�8g0rG(8hss�_j�tz�vew]��Pld��S�n'|�W2o�o�ZIqIb8]Ur�T�`Ht FLb�uG7pe<ve'�fwwS2i�w��vz#�6L�u �oP�v({�T�wn�W�w�aA[6x�S�^^y[E�a7z +m�o�RpQp�ytِ Y�b���\�e?w _9g�jaa�i�]ic�lPJf@nBwhxp3�jaq�$�kxsR>n�tZx�wǎIV-k4�Yfmu�\\n�i8^�p]\ka�q�OsdsFA�fyt�3uh|u�$Ti�v�-m�wH�x:zZ��S&s���V�t�tyY�u�h \�v�[}_vw�N�b5xsA2d�y63f�y�$&g�zwKlhz��w�|ʋ.P�{�XT^|(sZW�|�g Z�|�Z�]�}3N`�}w@�cI}�2�eo}�$f�~�ks~8{v���Ne��~7R[�}rbU��PfBY+�Y�\H��Ms_I�g@Mb +{�N�YpR +X +�#L[V��?�^R��2T`ǒ�$qb,�9�hP�at&���hDQ~�i�Urxk&X�fly\�Yvm�_�L�o/cY?p�f~0�q�ia!�r�k�u�mGW|rn�c�Y�}e�\�p�g�_�d�ifb�XMke�K�l�h_>[n[j�0<o�mT!4p�oX%t#p��{`ut�` a�{]bWdmo�d�f�c}f�iW?h|kEJ�j^mg=�l;oi/�m�qC �n�r�3r�s�z�x+�\�jy�_6k�n9a�m�b`c�o\VIf!p�J h?rq=jIs�/Hlu. �l�vE?qkv�ezCz���Y�rx�\�sXm_Kt�aVa�u�Ugdv�IRfhwu<yh�xX.�j^y( �k>y�mpKzM�y�|ՂsWy�wAZ]zhk�]Xz�`f_�{sT�bu{�H�d�|P<g |�.�h�} �i�}k�oS}�Cx�~�-T��av'Xl�oj�[��k_�^U�LS�`��0H.c��;�e׀�.�g��� �h����n����x�ÀS!��u1V��uj)Z +��^�\�8S`_���G�bO��;cd��b.cf��� �g���.mȃ�w��N Q��dt]UP�|isX��x^L[��HR�^��$Gka:� ;1c��.We�� �fψ{jm)�KJw��~MPl��s�T$�rh�W���]�Z��=R�]���G'`P�;bَ�.Pd�H �f� �l��`�v���}�Oy�RsS0�>hbV�� ]kY���R:\���F�_���:�b)��.KdC�K �e����l=��vW�݁�nyQu�o�Uj\p�X�^�q�\VR�r�_�F�s�c9�t�f*,4u�h�ovUkV
yBm~Cs+�jAY+tLk�\bh�mh_v]bn�bVQ�o�e"E�q+g�9+rmjv+�s�l�Ft6n�
7w�pV�}wv}�f�ar�h�c�gpj[f\'k�h[P�mtj�D�n�l�8�p]n�+Mq�p�"r?r;
dv>s��|�x�|Pc+h�qWe�j�fLg�l�[%inn_O�k-pDAl�q�7�nus*�o�t{psu�
�t�v�I|$z�z�`Wp�pb�q�e6eBs*Z2gDtLN�i0ubC�kvr7l�wq*�n*x[�n�y
�s�z +�{p|�y�]�w�n�`�x�d3cNy^YUeyy�N@g�z�C
i}{7kI{�*�l�|0 +mw|�r�}s$z�~�xa[�2m�^�_cTa��X�c��M�f�B�h�6�i��*Yks�lH�!Sr�i�z
��wMZ�nl�]0�b�`��W�bo�:Md���B-f�c6�h*>jX��'kH���q[��y��vdX���l6[Ɍ�a�^��Wna-�L�c��*A�eۉO6Zg܈�*0ig��>jt���p��Uy��u�WY��k�Z���a_]��<W +I|�mJ +�z�p{ +�y�s� +x^v�>}�{q�gdog�i|p�]{k\q�S"l�sH�nbtQ=�o�u~2�qv�&hr w�Nr�x}Uw@z�}3} p�evf�g_v�\�ikw�R[k!x�G�l�yE=tn8y�27o�z�&Hp�{\kqh{��vD}F||~�ogc}e�ew}\[�g�}�Q�i�}�Ggk>~!=l�~b1�nD~�&-oZ�p:i�um�q{��{nia@��d�cӃ�[f$��Qh�SF�i�<�k���1�m��&n:���o;�� t��i�{[��m�_֊�dbv�BZ{dӉ�P�f҈�F�h��H<lj���1�l#�+&mG���ni��St��z� l�^���c�aN��Y�c���PJe��uFOgb<7i��d1qkR��&l~���m���|s��R9z��.lg]���c `U��Y�bϕZO�dۓ�Ff�><
h���1Xj���%�kێ��m5���s<��dzD�Kn{{wQ:d|{�U#Zo{�X�PI|\BE�|S_�;-|�b�/�}#e�#}�h�J~pj���m� +wG� +FvDž�(|Z�uc�dʕ3[rfݔR�h���I�j@��@nk�f6�mz�X,�n̎p"o��b\qc�� +iva��R|��e�BQa[&U+R���X�I��\)?S��_u5W��b�*b��e�u�'hMU��j�߂�n� +w�}�ax�~l�{x� +�Nf�$�Gi%ۄ�k{�jm�h��r� +O�}�l�G�}�n�?H}�p6�~q�-�~7s&$L~pt��~�u��;wyP�{1 +{�|�>|�~�}�� +$x.��Dx}���z�+�|�q +��kd�rp� +���nR���s� +jy0���lv(j�]npK�+pS>�1rp�1t�\�+yI +}����~!�=�~��� +H��g��k� +��{2�D�0 +N���q���T +��7���� +�w +���!���� +UăT�Y"vHWh\riaZN_�\K]b�O_�e�A=bNh�2�dokW#�e]m�;ksn��ys��M^��0P*aRt�SVc�h
V�fr['Y�h�N\�kC@p_�mu2/a�ou#b�q)i�ryv/��H�gX�LiVsgO�kEf�S%mZ=V�n�MQY�p�?�\�r!1�_Rs�"�`�t��h�u\Ix�x��D�o�~1H�q2r)L�rye�PEs�YaTt�L�W�u�?BZ�v�1L]8w�"�^�xj(gyx��x{���A~x|�E�x�qI�yNd�M�y�X�Q�zjLU�z�>�Y{Z1 [�{�"�]�|�f�|iDw~�O>��{�CK�pG��d K�W�P �K�S��>�Ws�0�Z�"�\i��e���vE�"�(<i� z�A�~o4E���cnJ�@W]Nh��K)R���>WV�\0�XӃ�"�[t�w?d��!,u���O:u��z?L��n�D��b�H���V�M�^J�QK�7>ST��%1!Wψ/#DZ��s�dG��t��e��8藞yw=͖n
B��ubpGd��V�K� +]^q�[L_�f�]�b�[=_�e O�bYg�C�d�j7rf�l\*-h�nujp4�qtq��}w"{1T�eVpXW{g\e^Zi\Z/\�kTN�_rm7C2bo6�dfp�)�fDrV�h:s��p.t�|y�y�Q7m(oT.n�dAW!p +Y:Z
qlM�\�r�B�_�t6cbEu3)�d3vL�f�w7
ox\�{�{�xRN/t�m�Q|u�cET�vfXdW�w:MMZ�xB]�x�6`|y�)tbwz7eEz�
vn{�z�}�w-K�|+l�O|lbjR�|�W�U�|�L�Y}4A�\+}v5�^�}�)e`�~-d~Z
�m=pz0�vDIS��lL��Fa�P���WT��LEWq�wAZZ��;5�]��)m_���dc%��"l����y��fu�GJ��kjK�aNω_V�Rs��K�U���A,YZ�05�\S��)�^���bU��xk�Ny +��t�E��j�I���`�MR��VEQ�VK�T��'A +X@�5�[W�)�]��.�a��\�k^�`_x���t[D^�'jZH;�N`?L��U�O���KS��&@�WY��5�Z��2)�\��&a&�(�j� �xD�w�iL�l�jP�a�k T�V�lKXwKrm�\*@n�_�3�p6c(&�qof1xrh� �w�kU +vBn� +Gt�q� +vs�t�~.y�q!W�k�f�Z�mI\�]n�R=_�p7G�b
q�<�dar�1�f~tJ%[hu}Fj�v} +�ruxI�}q{�pUse�W�s�[�Z�t�Q�]Zu�G_�v�<�bvw�1Nd�x{%\fFyT�i�z,qx{��|�}�n�Riz0eUqz}[
Xkz�P�[S{?F�^{�<6`�|1c +|�%]d�}�h]}��p�~�e{��nP#�;dESQ�ZjVq��PeY~��F6\p��;�_:��1a���%kcY���g_�)�o�:�{]�,mPN1�.c�Qz��Y�T��PWچnE�Z��;�]�{0�`p�$%�bF��Cf���#oO�� z߂
l�L��#cO�YrS:��O�Vt��E�Y��;�\ʊ,0�_t�t%�ai��e�'dnхsFzw�7lUKD� +oF!KnCp��q2rXVv�u, +d�Uk��[�X�+R�Z˄�I�]q�a@`�6�b���,\d���!�fS���k�� + +;r��>|5��c�RS��[ +UA�XRX��I +Z֎�?�]���6W`���,Yb�!�d͋k;i�[ +jq��m{灤e�ulMd\u�QRxv_T�H�v�X~?wd\4�x_�)�x�b��y�e��{�h(�~"l� +o`�F�pIc^=q}e�3Wr�hj(�s�j�nt�l�w�n�2{"r� +.w�{� +L9`���C�b��:�e&��1�gG��(i���j��$�o��6u���~6��\�Z�{T@]��K�_G�yCPa��:�c҇w1�f�$(h���iʇ�o��Mu �.F}ڀ�\/Y\��S�[���K�^��C `N��:cb���1�e!�X(g+���i�a�n��*{t��{r}���\�|2M}S�|IQ#J�|WT�B|ZXm8�|�[�/X}_n$�}�b��~|e}
��hIڀ�m} +y�r�|�v� +h�{=�je{�5il|o,�m�|�#�n�}��pL~p>t�}x��p +�AMjK͂�QC���T�;S�+X92��[�)Ԃ:_, ��bZ-�Re( +��_h�Z�Qn +�6k����q� +l!+Lo�Pt� +:{�
@}}�G +�zځ��|܁� +�z!���|W�� +_���b����e�
=��h�/�mm� +!~� +%��l�x�q� +^��o���Qt� +��rs ��w� +~��jA~��7h~��~|�(�~z��0~��6�Z�% +���
�����vj_UJA7+�����{ f!S"B#2$$%&
''�(�)�*�+�,�-�.�/�0�1�2x3c4L566 7 7�8�9�:�;�<�=�>�?�@�AzBuCrDqEqFrGuHzIJ�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Z [\!]-^4_;`BaHbOcVd]edfkgrhyi�j�k�l�m�n�o�p�q�r�s�t�u�v�w�x�y�{ |}%~1<�I�X�g�y�������҈��-�P�v�����ڑ���2�Q�o�����ʚ���:�U�o�������ҥ���1�J�b�{�����ʰ���=�\�}���������м�����0�E�Z�oŅƚǰ����������"�'�+�.�1�3�4�5�5�5�4�3�1�/�-�*�'�%�!�������������k�N�1���������d�F�(� ���������y�a�J�6�%�� +�� + +���
�nP2�����w\3���uQ/
� �!�"�#r$T%6&&�'�(�)�*�+�,{-k.\/O071 22�3�4�5�6�7�8�9�:};r<e=V>H?<@0A%BCD +EE�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�def%g0h<iIjWkflvm�n�o�p�q�r�tu v9wSxny�z�{�|�~"�C�e�����х���@�Q�c�v�������͐����5�R�p�����Қ���>�d�����ۣ�/�Z�����ߪ
�;�i���ǯ���0�N�l�����ɸ� +�,�O�s��������>�lś������H�q̙������4�W�xԘշ������ �5�I�[�l�z�����y�`�F�+��������q�O�,� ������u�O�)��������l�F�!���������g�D�!�� +��V
#
���g;���^0��{N"���qE �!�"�#p$G%%�&�'�(�)j*L+/,,�-�.�/�0�1�2p3\4J586(788�9�:�;�<�=�>�?�@�A�B~CoDaETFGG<H1I'JKL
MM�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�de +fgh#i-j7kAlMmYneorp�q�r�s�t�u�v�w�yz%{;|Q}h~�����ς� +�)�J�k�����ԋ���D�i�����ܔ�*�R�z���˚���H�s���ɡ���E�l�������4�]�����ڱ�0�[�������=�l���Ž��K�x¦��� +�^%�
�zA ��_'���H��k4���T�� q!9" +*�+�,�-i.D//�0�1�2�3f4A55�6�7�8�9^:8;;�<�=�>x?R@,AA�B�C�DqEMF)GG�H�I�J|K[L;MM�N�O�P�Q�RuS\TEU0VWW�X�Y�Z�[�\�]�^�_�`valbacXdNeEf<g3h)i jkll�m�n�o�p�q�r�s�t�u�v�w�x�yxzq{k|e}a~^\�[�\�^�b�h�o�y���������Ì���4�O�j�����×��"�B�c�����Ơ��'�F�f�����é�� �?�]�|�����۳���@�e�����ݼ �8�j������MČ����Rɖ���!�gέ���9�~����Qט���'�pܺ��P�����:����1����6����N���u���>����d���(����� +;F~���*-~[�y�4�"����7��o�c��R��6��J�f�I~�q~���^�~���L�~`�o;*~Y�p*5~1�#��v|8�s��|u�Ӌ2|�����|ۙ9��}L����}�s���~n`���~�M���;���(���e�܍ +���k�{����6�H��������F�.��
rz����_��)��M�R�u:��y�#(������ �!��ͱ���(�B�?�����$�D�;�%�'��0�(q]�[�7^̈́��LL^�΅X:��R(t�'�<�%�x�u�ډ������ڧ +�������ނ����"pF�Ӌz]���K��V�'9����j(Y�Ʉ�ܒ�Ԡw�7�d�J�݈�9�����T�b����d��=oD�W��]$���tK+��9e�0��([�^���8�U�g�Ĉ�u�e�����$�����$�����M���^n\��5\p�9�J�����9,�Ȋ�(t�� ٯ��F�`������B�������+�~\�F�mm����{[ւޔ�JI�*��8��n��(����K�E��-��]�ֳ�����хͫ[� +�֦q~w��lփ4��[F���I�ד>8́�t(��5�T������4�-���ȸ9�����F� ����}�����l��NZ��;��I�����8��Ґ?(��<�
���1�݈Ɩ��������d�2�*�^��|ԃj�5k�����ZH���IE�B�x8~����(����*���l��
�����Ǎ���>��v�2��|7�8�Jk�p��Yꁿ�JI � ��8a�`�?(�����j��{'���{{��w�K{ۡ��t|'�!��|�~��}Dl�w}�[-��~hI���~�7��&儖�G�u������h�r���`������������O}W�Z�0kӉڂZF�j��H׆���7|����&����Ҭ�����l���Q�������߈ۍV�H��|)���jщI�BYt��vH;�z��7#� ��&ڃ���������������8�<�����o{�*��i�cX��f��G���a6Ԅ���&փE�NϚ�n���W�\�ӭ�l����k�'�y�����h��H��X��^G4���#6��I��&�҅��8���!��𢚫���$���D�lj�����x��<��h'�ݒ�W^����Fȅ1��6f�ډ�'�U������������f�����7�������W�Jx�ܚ�gp����V҆/�(Fk�Տr6>�z��'���ˣ���#�}�v�:�h�i�V�j���������wA���hf��/��VH�ߖ{F����6�&��'6�����~�����K�c� �5�J���H�n����ԩ�v\�L�me���)U�����E��9��5�ۏC'I�B���a���8�5�Y��)�6�֖K�M���Ή��wu���ae\���CUB�Z�Ef����5Ȃ���'Y����]����I�Q��P�&��}�2�����t��d؆��T��)�E&�ǘ�5��k�'e�ы)��qzw���pzۨ1��{>���){����|0v���|�f7�\}mU��I~E5�9~�4ÈBa%/�1�M� �s�Ķә��V�|�����s���Ò.��u���e<�ӁvTߋ��pD����r4z����%@����ŕ�����_�Չѥ�/�����ȇ�������t��e�(dY�M�xT*�>��D%�2�%4:�C��%N�/����������%�ȕ��X���!���{��*s��Ҋ�c��ljrS��ĈC���4 +�A�-������`��p)�?�S`��:�(Qb�=��BK�5��3r�2��%ڂ����p�疱�C������n��~��/��oI��`���Pو��&A��13M��T%h�♙�{�͖����ٓ���T�}�� +�Un��Ԧ�_`�Ġ�P`���)A����e3+����&�Y�����˘�֖��'���侠�E�?�|�챉m⌭�^݊��}O�����Ah��V3�s��&�#���J�(z��[z��p��{2�Ԛ�{�~b��|)o�|�_��B}nPG��~A��~�1ˊr�#��݀����+���P���ƛ��#������P}I�>�>n'�p�@^⑶�GO���U@��a�n1��䁗#��G��K�d�֪�Ј�Ӝu���u�s�|F���NmF�䅯^%�1�O����@+���1i�d��#цÃ����w�ݟ-�����ӎH�e�Ԍ�{T��Yls�X�]v����N��
��?Ћo�s1@��T#�N�7�բ(�(�������R���W�R�kzb���qk���\ɐ9��N����?{����1"�z�%$ +�ɅW���Š��z�D�חf�� +d +�1��V`�ݏZH��;��8��.���"L������ߥ\�V�ɡ`�~�����p��6��cu�ҕ�U�}��H~�+��;c�Ԍ�.�����#'�"�0���c�����,�ڋ�!��}�a��p@��Nb֖|��Uh�&�H"�Ӓo;/�x��.��4�_#R�������W�Ř���m�����}�)�kop���b#�.��Tےԙ�G���1:��#��.v�܌�#v�\����F���
�����ޱ +�8���ow�&��j.���]��P��dDb�،>82�Ί",A��!·�,�7�y�U�ˬˠ���4��vm�ʙ�i�����]���?P��~�D�r��8�d�,J�x�z" �^���Y�O������%�ç��gu��z��h��M�O\��,��P���Cԓ�@7���,N���":��t�2����i�N�맸�t�5��hG����[�ћ�O�����C�����7�����,L����"d���L����D�Z�I���+����t9����g����[h����O7�p��C<�f�47��U��,I�c� "��C�Λ ���"���.�����m�s��ͭ�g#���<Z��E��N�/��C�%�T7���,G�#��"���7��{>�6�h{�~l�{�qì�|1eY�)|�Y2�_}WM +��~A��~�5M�C�)��ǀg��:�f�\��Êw���m}��G�+q1�>�dާo�Xʢ��L���H@ǙC��5)����)Ɛ�ދ��w���I�a�ҵ͇x}/����p�����dg�ȅLXd� ��Lb�X�|@����05 ����)ˏy�� �܃p�ں��܉(�,�`|����p%��c�3��W��{��L�·�@S�!��4�u��)ώ� 4�L�S�;��4�����8{�[�Go��d�lcm����W���JK��D��@���T4֒��)��Z�� r���5�����^�Դ'��{D��tn��b�%��W!�h��Kh����?���4Ò_��)��ć� ������E���:�˞�z��}��nj�}��bo����V����AK�H��?����4��狈*�D�!���˓M� �������"z�&��m٩�a�O��VZ����JҚۓ~?��1�X4��z�<*&�Ҋ<!<�
�p���խх�D��yi�ޥ�m6�š�ab���U� �#J~�r�c?T�ɒ�4����*4�m�P!k�����鸝���C��sxѭ���l��|�7`䣜��U�ǝvJ3��?'�q��4����x*?��B!��Z�q�M�h����ߴ�xU�s��l1�@�t`~�Y�qU,���I��ϛ�?�)��4x�w��*H�Ս!���Ќ��0|E�ɾ�|xtָ�|�i�%|�]���}pR_�8~G8��~�<G�ub1���'b�À���q���m�$�n�H���tT���h��X��]7��wR�s��F����<����1��U�+'v��[Ҍ������I��н ��s��/��hL���\�/�yQ˦ąFġj��;���g1����'��Y�������r��q�s�Hs�����g�����\�����Q��*��F��Ӈ�;ڛ{��1����'��Å4�f�\����Ғ�s)���g��[�\H��sQI����Fa�7��;����&1��{��'��"�kz���,���h�V~}�H��r��[��g�ǓR[�[�=P���>F*���M;��E�c1��߉'���ъ����~�؝,r7��Mf��G�x[��ה�P��f�]E����;����w1��X�( +�� ����������}��v�WqĴu��fK�қ�[0�\�{Pp��tE͞��w;s�D��1���(,�x�� Y��5�3�Y�h}���qF���eӮb��Z̨�P$�n��E���
;`�Α�1��l�(I��� ����������|��ά�pس��.ej���Zs����O���Es���s;P�j�h1���m(b���� ��U�����>|+���^p�~�ne���qZ,�1��O����(EQ�a��;C��1�����(u�i�9 ڈ�s���Z~v0��}�j��r}�`� +}�U���~BKg��~�AT�di7��6�.����%���B�����d�f��u���� +j����l_&�U`���K5���A0���.7u�e�g.&�*��%;�ɂ9˂��u���;jx���#_��T�QU:�&��K��=A�τ�7i����.,�q�_%[�7������)�̏#u��E�mjg�؋�_�����U-�t�|K +�B��A�%��7d���.1�͆ +%w���*E�r�e�����u`È�|j1��{_r�厱U���"J��@��p�O7b�S��.C���%���V��Ņ$���W��u �ܗQiݼs��_%�2��Tǰ��JéЎ�@飹��7c���._�m�6%�4�p��ڀ2�͟ t��N� i����^ⵗ�^T��g��J��/�w@֣�$7d���.x�Պ�&���iA��w��P�Gts�ˠ�iM�V�D^���T]�җJ}���9@Ȣ��k7k�v��.��J��&G��N������֩Mt2�M�Si�ѡq^Y�u��T&�?�MJ]���@�����7z��p.��ˍ>&t���#����qo�k�)s����hź_�i^���2S��KJA����@��~��7��{� .Օ_�c&��A���@�����s�����h���
]곗�USѭ\��J+�#��@����7���f.� �Y&���o �����|�zo�|�z�̑}3{i�\}�|�)}�|���~
}/{�~K}�gn~�~*S,~�~�>�~�*�(��~{,���x{���o{�t�a|k���`|ǂ��g}��zX}l�JfB}łR:~��>L~d�p*�~���5y��O�Azr���Yz�C��{b�{͈ڌ�|4��y|���e/}��Qa}x��=�}܃�*\~;���;y���Ty��g�}z ���zs���z���{f�=w�{�xd4|g��P�|��=4}a�*&}׃��lxE��؋xΞA��yJ��"y��!��z5�j�>z���v�{M�*cQ{܍�O�|i��<�|�\*}r�h��w��T��x(��3x����y(�N�Ry��Ɖz@�Hu�zՔ�b�{n�yOl|�<�|���*(}���Vw��Յw�����x'��ex��|�,y<��yН�t�zm�}a�{
�<N�{���<H|;��*8|����vʾ��$w@����w��)�-xJ���xި��yr�Lt'z�*aFz��N�{N��<{��*E|t�7�v��/��w���Cwy�M��x���x���$y'�sby���`�zV��N9z��;�{���*P|7�6�^v�ѾѬv�ʏ�'wE�q��wϼu�x^���Oxꮫr�yw��`Ez��M�z���;�{]��*Y|��mvA�G��v��d�Awˆ�w�û�<x/����x��!r2y>�+_�yȤ!M�z_�;�{'�*`{ދ�眃tx���y����vz+���9zқ��{��ˁ�|?u��r|�bA�I}�O�~?;ހ�~�)��l�w�����́��<� +�D��#����;�큊�Z����tL���sa1���dN/�x�N;S�Y� (�5���e�ڋ��Ȁ����!�F�v�h�$�l�������醹s!��`8�"Mn��N:�փh(�Ăk����
����t{����S�'�6?���2��r9�Y_SI��L�W�::g`��(�`����E�m�V�w��~ј��=~����~����z~��/p�~���^�~Ō�L,~݊2:~���(�~��)�6~���˹~y��@~H�A��~"�ޔ�~���Y~�zp~5�`]�~X�GK�~u�!9�~���(�~���ܮ~F���F~�K��}Ч奎}����f}����_}���o>}ϗ�]%}���K=~��9�~1�(�~/���F}�����}�����}p���a}M���W}J�Հq}Q�n{}r�B\�}���J�}���9m}ߍ�(�}����}��%ǯ}p�H�j})�v�:}���L|�� �}�}m�}��\ +}E�9J�}i�9C}���(�}�����}��cƝ}=�ڴ_|�Q�=|̸ϐf|²d~�|���m|֥b[�|���J?}�9 }P��(�}h��� }xղž}�i��|���q|��Ǐ�|��~~|��l�|���[9|��J|ݚu9}��(�}<�Gڍ��w����6xG�9�x��=�Ky��C�uzx�U��{Zo*��|2\�B}Jʃ�}�8���~�'J�DW�%�������p��{���B�U�����^����|n�!��[�����J����8P�g��':�À�ֲ�����@��˳���ҡ��Z��U���3~ƃ���l��q��[��VIh�o��7�� +~:%���B˶��`�)��]���,Y�Nj�S��uwxy�$�g����V��ƀE����E5]�}�t%��I����d��}�ȇ���H�R�U�����ȉ��wX�t��f��M�
U��1��Em��5����%��҂�Q���R��� +d!�ŐtS�����D���>4r����%�u���Ս �`�������w�"��K�Ş��G���sl�n��cl�c�uSv�`�"C��T��4N�E��&� ��汯�e�R�\�I�ѩ�6�p�ĂO�=��r����b���}R�� +�fCh���J4(��E&����O�º�.������'��.�-�T���Wq��ɡb����Ri����C����4����&.�`���/���b���ܠ�Z�B�+�����z����p����Yal�y��Q�v��Bj�3ށ^�m&>� ���5�p�Я5��Ė�D�/�A�f�̷�Ɇ��jpc�U��`�B�fQ��?��B��2�%3)��&K�S�y�Ju����v̡\�gw����Px��ʐPysr!�Vzgb6�y{LR>��|0Bm��}2��.~#�fO���8~@�B��~T�Ó�~i���~��~��~�q +��|A>_��}A/ԉ[~R"l������}��$��}ԕ���~ ��
~/xF��~xiϒ~�[ ��'Lr�M�=����/��["��v���8�ۅ6�؛��͔b�݄Z�ƖP��wH�߃�h�r�<Zl���K錽��=��k�x/��9�K"���3�̞��������D�'���ĕ���vb�8��h+�؇�YȎ���Ko�9��=V���/v���"܅q�W�~���S�Y�w�����������.uv����g_�R�
Y"��J�=�t�c/`�A��#��{�X�!���-������4�0������t��;��f����^X����,J}�L��<Ĉ���/O��#8�[����ˣ4����Q���ܝY�˔@�Gs��ٗfe�}��W�2��J���<����/A�U�P#b�↕��������z�'����������rKe7�&��Wd�ڕDI�����<F�>�7//����#��{�t���t�'���H����Q��퓯��r�>�Qd{�؝#Vʌ���I9�?��;���c/���C#��$�5��R������
���y� qV��AcՎ��^VC�E�eHՉ��_;����b/ +���m�����`���� Ss���FS��O9����,�F��!��Q�u�)�ҡR���~�֕kz'���/l����&_����-R둎�+E'9J���-,���Q!����{�������������{�6yb�5�WlK�%��_m� �Rv�(�yE��1��9�5�A,�M��",�<�c��d���i�ȝ-�x��ᝇk��͚A^ԓ× Q��˓�EF�Ӑ�8�ՍH,���0"V�χ-�<�=��� +�賶�À!�̟�tt���h�r��]����R����G��b�H<��z2�����(��v� P����=�p��n�~�Vsĩ���hL��=]����R?�E��Gb��� <�����2��W�f(���1 ~���C���-��~��9��s(�d��g¤Ģ�\��V��Qߛ��G����<��U��2u����(�� ��h���Ͳ���~*���r��)�fgR����\H��:Q�����F�W�.<m�
��2h���0(Ɋt�� &����=w�z���xDo_�x�d1��y�YK��z�N���{wD��|v9���}~/���~�%ʑ��������q�2}�z-��}�n��"~c֮�~;X���~�Nm��Cޟ��9��̀/�����%�Ł'ׁ��A��y�����n�H�&c|�-��X��'��N1���C����9h���/����&���� ���_�a��y!�ԉn�w�3c(�h�]Xo�h��M��`�C��e��9R�i��/��c�t&*�m��T�����漸��x��'�m��ƍ*b�����X����M�����CY���g9;�R/����F&P�ƅJ��քf�y�6��x4����m�7��bI��W���\Mg���C%��%9#�$��/���&}����*�2�����=wĶ#��l�����a㫚� WZ����M#����B�����9����/�����&�����8����n�G��wJ����lJ�I�ay��/W +ds�A�Zp�|�EP�����GP��!>�+��5�n�+,�����$��ˆW�$�ymÃ�=n�����d8���AZ-����P}���G*�E��=�5�ҋ,���"$ď1�Uf����y��And��Ec��"�_Y�L��PG���G����=���65�C��,v�y$=�� +�Kx�� n����c����}Y����BP��DF�$�]=ٟp�u5����,����%�2�ވ���x|���mռ�*cr�#�dYl�>��O�w�=Fɤ���=ў���5)�I�),�����%B�ω��F�$x2����m����Jc?�Ĥ�Y<�٠�O����F��J�=ʞ��H52�쑂-�1��%_���c.� +òz|w�kz�wٝ#{bx؉�{�y�vx|[z�c|�{�O�}i|�<C}�}x)7~^~Z��w�+��x[&��y��y��zz6>�nz�}u6{j�a�|�N�|��;�}<�)}���v(�ҿw���w͇��xw�8��y'���yڄ�t z��Y`�{G��M�{��;4|��S(�}Q���t咈��uؐ���v��ӫ"wp�(�hx8����y�Nr�yЈ�`z���MM{]�:�|��(�|�����t� ��t��S�Buؖ���v��9��wv����xT��q�y-��_6z�aL�z։':i{���(�|r�t�sd�y�dtT����u6���v�F��v�8�awƕ4p�x��7^wy��7L-zg�-:'{?�2(�|��ޝrή���s����ct��n��uy�Q��v^�p�fwI��px6��]�y ��K�z�9�z�M(�{��)�4rd�tʝsU�\�t:�S��u�g�wupv�oRwϛY]<x���KXy���9�z��Q(�{j�N��r/���Es�
��s�I�gt����Vu���tv���n�ws�\�x]�vKyI��9�zB�D(�{+�Oکr�=�r�ļ��s��=�Qty�ƑZuY�v�v@�m�w%��\8x +�J�x���9qy��)z��+٥q�Ԝ�r��`��s���ptD�ؐ�u!��~�v�gmQv��[�wơwJ�x���9UyȒ�)zΊ��s�s�ˢ�u +�T��u9�!�^vG����wo{ۃIx�jr��y�Xz�G��3|6X��}%Ձu~D���%{�/�n|<�r��|��n�C|ԋu��}?z��]}�iX�
~1X��~�Fꁇ5��;g%ڀ����݄ݼw�@�Y�Ȃ��ך�C�Y���yb����hZ�L��W?��DFU���5�����%߀l�I�O�ύ��ׂB�@�E�Ɗ����e�ň���xR�̇�gu����V�����Eр^��5d�3��%�����|��K�+�u�;��� +�6�"���@���k�}w=�-��f���U���hEWއ�5(���%������H�鷝���<�~�X���%���f�1v+���e���ZU-���D�m�t4�K��&�S�m�٧z�5�j�����{�����To��u>=��d�(�~T��OD��4�~��&+~���� +��� ���ܤ�����oB���S��t_~כ�d7~ŗ�T~���D3~���4�~���&A~V���ʀG����óӣ�L��[~�(�Z~��ps�~z��c�~g��S�~b�$C�~U�G4�~A�y&S~
��µ��(����ˢ� +�U�n~�����~b�Cr�~+��b�~� S~�mC�~��4_}�� +&a}щI����ı�Uó��~Խ���~i�-��~$��r8}ꪄbv}դR�}ѝkCZ}ɖ�4E}Őb&m}����v��q����=sO�Њ�t�����u�����v�t���x,d7��y[Sʅ�z�C���{�3m��|�$6��~9�z�Tz��ۋ{���{����{�,��|msZ��}c7��}�S��~B��~�3.�L$T�m������/��ʡ��Âu�������ρ�rF���bR���RP�Q��B����n2��āG$o��(���t����d�'���U�v��J�Ն �oqR�3��a��s��Q���� +����������P����ⅷ��~���coW��5_�m�Py��AN���2q�[�\$ŀ�����J�&�^�A����=�ЌÅD��}��u��n|����_5���O�]�@����2P���2$��3�X���N�"��z��ݤ������|���/m��P��^�����Ot���8@��P��2-����$���8�'���w������̅��������{�����lڂ��e]߂J��Nz@Q����2�H��%q���������b���ԅK�����E�[zۃp�Dl'���#]K����N��Z��@���>1��% 1�ܵ��EĞ��*����N���jz3�3��k��i��\ԁ���N%��`?ʀt�>1�̏N%.~��{�ɕqb�(��rĚX��t�=�1uD|2��v�mD��w�^�by +N���z??��i{0��|�"���~M���y�����z*�ΐz��ӎF{)z���{�l/�|n]��}N�4}�?��~L0l�h~�"ۃ�ŴO������ȁr�Z��D���c�yҋ߁k8�b� +\U���Mj���>��1�0J�݁ +#�v�!�ڑ�����������*�هu����xڋ�Ij`����[��X��L��M>h����0,�b��#-��`�m��q�.�+��Ӎ��m�L���wӊ���i}��EZ�̈�L[�~��>�-�;0���#U������V�;�ӎ��
��� ����o��vNJ��h�����Z2�U��Kӆ ��=�����/�h��#}���ٮ���G��b���K���uu߉���gш;�)Y���K^����=w�O�#/݂���#����פּ�����l���8�K�E������Ct��6��g�ڗ�X;J�E��=,��t/��1#��$�欃�o�i�Y���d�6���S��O�1t��.fM���)XR�6�Jk���<ك���/��K��#Ԁч��r�;��X�u���G���ׁ<� +�sW���[e��6��Wƅ뛽I�����<��U��/���#耍�r�f����w�C�������2���ү�r��]�Ne����WT���%I��i�e<U���/k�͎D#��V����iq���r��D��t �!��u;t�lv�f*�Bw�W�)yI��zU;��{�-Έ.}!3�>~��>�:y +��f-z���"[������O�o�q�ˢl�J�d�Qz��*�mɎ)��`Ȍ6��S��Q��F��m��9͆���-i����"~����������p���(�N��~z�١�l��ԝ�`�ݚ3S
���bF���9��(��-R�@��"��4�f����P�چs�ܫ�yK���$lJ����_����YR�����E��ɕ29G�ސ�-<���?"����ؖ��/�Д"�l����x��^�jk��Q�W_�S�:R*�m��El����9���X-+���O"ȁ������q ���r��2�ls�y�xu"l��vn_"��w�Q� yD��ozg7�{�+,�S}Bև�~�x���yB��vy�x +��z�k��{:^`�|Q[�]|�DY��}�7��~R+/��5 �!�>�]��Ő���߄ +���w0�����&���>�����e�O|����p�����e裟�#[ +��&��A��^�{���Q����{K�B��pN����eT���Z����O�
�AEB�-�n:��N��0��k��&ދ��3��ԃ���� +��z����Oo��l��d��V�]Y��f�O��y��D����e:����0��Ն�&�� +$����m*�8��}�,�r����h]�/�c^����S��냰J1�N�y@W���C6��'�-{����$����q����|��X��r7�L�,g�f�P]����fS��&��I��@,� +� ��L֪���C��H�];��62}���*`���"����������s�H��i�މ�_D�z��Uѯ'��L��χ5C٤i��;���2����?*��_��"����߃�r����h��&�}^���Uz�l��Lf���C����w:��_�\2���D*����7#6�J�<>�(�ar<�ەhH�|�
^���&U0�ˏZL+�u��C���8:����2��n�*Ɠ��#k���>����q�<��g��䗒^G���6T�1��K��ސ�C_�~��:ܝ0��2��ފ�*�~��#��%�)Lj ��q�����g��^�]����JT�����K��L�C=����:Ϝ��"2��V��+ +�+I�y1�a8zS��'u{t���Jn�Õp8����q��ՠPr����s}tu"� +� +��{�$u��}A�"�
v�j��wʥ��ox��G�ByF��zu�z�d��{�T+�|�C�}^3Ā ~$��~��2�ɳ�Y���8���"����s� �c��So<�3C`Z�P3�t�S$���]�N~G�d��~;���F~2��k~.���~3�}r�~;��b�~`�ZR�~���B�~,3M~�|$�����}Z��<}W����}X� �}`���f}r�5q�}���b +@�|E��2b|���%E|݈z��z����z�����z��$��z��l{�z���mz��^{=��O,{���@�|��2H|d� +�z~�|��~�m%�S]���VN��f�?����0�#I��B���[�v�A���혠�$�^�ȃ���z��Nl4����]1��xN'���?[�b��0́�#n������r������t�8�T�3���Ɗ�yԂK��k@��\j�}��M��.�r>��ۅL0����##�� ���������P�8�̕ۂ��އK�*��x����jQ�J�Y[�����M����>��b��0���#���8�V����������'���:����ẃ3�bi��ϑ�[ +� ��8S����+��)�� ԃ������`���1�`�����{�-wЍ��=k +��Ҝm���ɐ������/vҍ-��j"���?]�����P߈�wD4�� +7ޅ���+ф�J!;�����K�6�����B����e�u�����ib���\�����P]�
��C؆���7�� ��+Ƀ���!d�
���8�Ӡ!���ٝ������u�=�Rh�����\V��Oۇ��YCw�4��7n����+��;�c!����ߙ7���=�����;�����t?����g�I�}[����4OR�F��C
�o7(�\�+�����!��J���9�7�F� �=��ύX�s|���g7���/[!�j�=Nۆ��,B����6���+����!���M�O��4�A��� ���rߋT�.f�����Z��(��N{���6Bd�C�c6��ː�+~�U�!рLJ֗ޟRl��ݜrn����pNsG�!q�fꔨs�Z��6u<N(��v�A���x�5T�Cz?)X�#| ��~����t���/u-~���vDrZ�w>f��xOZ�LynM���z�AA��{�51��|�)l�g~�Ja�N��{���{�}���|-qp�|�eP��} Y[�r}�M"�5~@�~�5��>)~���Z������ł �h�$�|�����p��9��d��큷X�����L��y��@��X��4��8��)��+����������Q�Y�r{��ۇ�o��~�cȑ9�aX����L*�ׅ#@T���|4҈���)����U�ؑ�<�цQ����z��E�xnҒ�"c����Wt�p��K��P��?��9�I4���)���� ��������f�9��y͔
n�e�#bi�+�VV����KB�ۋ�?��ĉ�4����%)����t B�a�Տ��_�F�}�К�x��S��mY���&aď���V`���bJӋp��?c�Z��4R�<� )���� k� ���z�*x���Il����Aa�X�GU'�KJ[�
�:?���4�ی)���� ����[�"�������-�>wR����kߑB�<`}���UN�ҙ
IQ>�����3ㆉ��)~�p�A ��E��O�h� +���!v��o�kP� +t��{�iJ��{�^��|�S��}3Gܒ}�<��6~y1Ԍa+'I���:���ȉ��i�~��=�
s���h����]u���R��'�G|�O�'<y���;1͋��['g�����c�ֈǢ���}џn�r֜Y�|g͙R��\Ӗb�bR
�u��G���s<>���1��!��'�r�(Dž݇�Ҏ|��nj�r����g����\9�ˉ�Q��䈫F����;��U��1�����'��ل���ׇ �L�`|1�@��q[�5�f��-�a[��G��Q�e�>Fd����;njډ1����'��V�>�����)�暠{f�јxp����Jeޗ��[)�ё�P����F �-��;��k�z1j���Y'���Tl��s�V����z��x�9oܚ_��e-�N��Z��h�&P-���vE��Ɛ�;:���1<�?�"'��~���������9��yҝ%��o,���d����xZ +��8O��0��EG�n��:1�ꌾ'��+����i���ǟحy-�٩`n��̥�d����Y��Ɲ�Od��#D��'�:��k�0�!'���g̃(�����mpwu�^o"l�ap�bA��rNW���s�Mx�Fu�B���wc8��$y.q��z�$��*|�u��~��;�&s�vͩ%u lP�Eva���w#WK��xDM�VywB���z�8g�?{�.}��}-$�O~wۈ�׀t� +80���0.��A�a%G�だ�����~�#��t��H�SjO����`��SUޛb��K��Մ�A�g�!8���.����b%m�:�͆��~9�b��s륙��i����_u�I��Uc��K��:��A��·7�h�+.����L%������?��}s�Ғ�sD� �$i�R��^����"T��6��K=���JAk�I��7Ǐ�o.��u�%�� +��Q����|��\�Qr����uh��Ԕ�^u�8�sT����~J�8��A)�ь�7��l��.~����%�������1�C|���q��#��g�c�a]����T�A�ZJ��Ƒ�@ޒa�\7k����.g���V%ƈ$����Ʌ�{i����qY�à�gY��]i�[�S��ܘJ+�d� +@����7<����.P�3��%̇ˈ�҄t�Xz̧)�lpӣo��f柸�]� ��SP���mI���@e���97�T��.>��%ч����0��w��Mn'm���o�c���qPY訉r�PJ�=tmF��v%=v��w�4 �~y�+0�B{d"��
}|�~�w��tAm.�OuWca��vcY��w_P�@x�F���y�=Z��z�4��|=+O�M}�"ߎ"~���v~��zRl��1z�b��{oYA��{�O¢K|�F��}>=<��}�4��~�+k�t�#�R�MI�W�u벼�;l.�-�\b����qX᥋�uOu�W��FQ���=����4�2+����q#Q��������ub�І
k��K��b��QXw����O���~F�L�/<��0��4���+����J#�������t���k(����a��4��X���N'E˛��_<̗���4�s��+��T�#��7�X<�B��tG�g��j���a���dW��j��Nt�@��E���d<����3����+���#݊��|~���ws��ٖIj*�e��`����WG�ڐ�N#���EQ���_<��s��3�^��+Î?�%#������)�s:�X��i���z`9���CVߢN��M̞,��E� �`<R���3ґ��+ÍƉ�$���{兼��r����i9�q�8_Ѧ��V���M�����Dҙ��0<(���b3��{��+`��$'�L�M�c�r8�w��hҪ��_}���rV:�t�(MB�Z��D��D��<�7�e3��'�+����$6����)��rlԾ]o_c`�[p�Z&�Qq�Q:�@sAH��4t�@<�"v�7�x]/��z%'���{� ���}���%,l��ucF�+u�Z�3v�Q,�*w�H��(x�@<�!y�7�{@/ؚ|�(0��}� ���5�@lk��z�c��{Y� {_Q�{�H{�!|�@7�}E7��~/�~�(^��!/���n�d�:l-���]bܵ9Y���*P���:Hb��g@-���7����0�)�5(��4��!p�K��lj��k���b��ۅ=Y����P���XH7�'�@�$��7��<��0�X�b(��m�3!���� +���k�����b;���Y.�1��Pk�U�G��f�c?�g��7뛁�0)���h(ڑ���!��τ2r�6��k7�+��a�Z�mX鮃�P-����GϤ���?џÉr7���X06���C(���8"%�0�8����]j�|��a�����X��ܑO��CG����?��+�7֚K��0A�k�)����"S���&����j��癜aW��JX_�8�O��Z��Go�~��?�����7Ǚ���0G����)4����"y�)� +��t�p��_d�r`��T�t�yD�u���5wj�`&�y���<g�����i��Y�WkB��
l���n���t
pH��dq��CT9s���D�u`��4�w"�&�x܈w�`gN�i��i"�e��j�d�Ll��l�Fn>�vsuo�kc�q��IS�sZ�DTu��4�v菊&�x��0�$xci���x�kר�y=m�y�o݇�zIq�wz�s�f^{quSU�|wE|�x�4g}�zh$�~L|2�v3s0�v�tV��w�uv�jx2v��x�w�u�y�x�eTzWy�T�{&z�Dk{�{�4|�|�$�}�}���tU|d�u(|��
u�|��v�}6��w�}�t�xu}�dbyZ~QTzH~�C�{63�|?$�}��rۅC�/s˄��^t��9�nu��҃{v��us�w�c�x|��Say��gCkz��3�{���$�|����q��!�pr��͡�s����t��o�Bu��Xr�v��Bb�w��/R�x؆B�y��3fz���$�|�q�op��د�q̔��Kr�����s��t��q�v�Ha�w&�}RxL��B�yo��3:z���%{��ٽ�o�s�vq
���r'�珊s;�Q�tU��p�uq�6av���Q�wэB3x���3z��%{8���oO��+pl����q���qr���sÚ|o�t�+`mv ��Qw^��A�x��)2�y�%7z�;�Qnװ���o�o��q +o�
��p1����qN�|�rx��m�s���^�t�O�v>�IAw��j2�x莔%gz2���l~�i.�b~�k^�'~�mt��~�o`�~�qCp�~�s(`�~�t�P�v�AI?x�1��zT#�|;�~|�r +��|�sT�w|�t��}u�~�}Av�oi}px_�}�yHP:~z|@�~t{�1�~�|�#?5}�v{z���{A{!��{�{���{�|}i||~nV|d}^�|�}�O�}E~@Z}�~�1T~.~�#d~�k��y��M�y�� +�S�^x�����y��zy��Zksz
��\�z��=M�{[��?5|�0�|��^#�}.����v̜B��wN�ؖ*wҗp��xY�
yx��j�yw�|[�z&�9MIz��>�{���0�|2�E#�|ńұ�v9�q�Yv��\�w6�G��w3x'xW�4i�x�5[Ry��8L�zn�3>�{*�"0�{҉$|k��duĬ��(v7���v��4��wC�ww:wڝ�ixu�
Z�y3�MLSz +{v��{�g�|OY��~|�K�g}�<ހR~4.�@~�"�-X�������݀\�p��*�U���/t�ցg��X���J���<����.����"N���� +�@��Pz�ђ�C��k��7���],��9!�~��+����L���L��i���`u���h��t��\x��,P�z�IC���V7���g+�9��!�~���������ރ +�o���b�?tt����h)�.��\���O��3�vCN̔�7ea�/+�~���!�~��~����h6�ۑ~j�����l�u�n�iB��p�\��r�O݉�t�B�Vv�6Q�x�)��z�넛|ƙ|��oڍ���qu�c�Fr�t�t;hY�ru�[��wOC��xeB��|y�6$�<{8*�|�D��~<��Zw5�1��x0�*�y
sԋ�y�gu�gz�[8�{XN���|'B.��|�5���}�*�i~���I����)~��㍃~�~�� rȊ�:f��okZz�-�N$��Aօ��5�J*�Ԁ�Ղ��͕M�"�ĉ�����}ы�1qƉۄ�e����LY��j��M��X��Av�V�5��O��*!�B�Y �.���W���r�Ћ�|��h�pԉ-�dއ�� +Y�ӈM�ɇA�ˆ5s�Ņ*��� C���*�댨�ˇl�*�m{Љʐ�p���Dd(�p��Xr�O�L��L�y@��R��5D�M�?*�=�� n��2� �̆n����z�F��o5���cu���LW܅ِL�ڍ�@b�㋖5
��Y*�҇0 �����Ջ����o�>�=y��ۜ�na����b����WC�p�-K��s�E?��|�S4̂|�h)��s�� ��[��`�����䥉y'���]m��M��b �0��V���K'���?��%��4��&�H)�$�� ʀ�����L�É���x~�=��m���a����VT�ϛ�Jӗw?a�ݓ'4b����)�� �և�ݚ�hR���6j�y)��l�mx��n�aʑ�p�V@�}r�JX��t�>l��v�2Ӊ�x�'���z���2}���o�����qx4�ur�l��os�a�qu^U��tv�Iߌ�xJ>%��y�2���{E'��$|��o~��^��v��V�vww&�Nxek��Uy-`F�gz T��{z�Ik��{�=��|�2��!}�'̆p~�`��nj'��}Y�0�X}�v�=~j̐T~T_~�p~�TZ��H���Y=��$�2��x�'�Ҁv��.������8��h�u�Y��i�{�}^����@S��Ƀ
H����=X�|��2��قZ'��7�-탓���NJ����.t,���ki�̈�^����S$�/��H���)= ��Y2`�H��( +�ħorF�0�<h����^Ē��U���{Kt�[�A��!��8���.؆���&�l�F�3�ezƩ�h�pܥ�kf�7m\���oS ��q Iy�Ws?��/u-5��w@,=��ya##��{����}�y��odp0�dp�f_��ra\y��s�R��uNI �Iv�?V�+xq5��z,W�{�#g��}P�y5��u�ot�*v�e���w�[뜝x�R;�ty�HŖHz�?�7{�5��/|�,n�(}�#��1~�U�U�$xR��{�n��|Od���|�[O��}.Q��v}�Hb�N~:>�M~�5��\R,��h�#|������)w�����m�!��dT�с�Z�����Q@����H�}��>�����5e����,�����$�˂����%vף���mA�X�Wc����Z4� +{�\��|{S��\|�J���}|B~��~9�~�1��sU)����!��*��҇��Dn<�,�2e-��D\4�&�NSQ�s�KJ����\B@��y9ΕB��1�����)�� +��"3�n��&��/m��L��d��C�L[��^��Rퟰ�fJR��� +m ����d5���([]���IR���WJ�T�xAЗ���9�����1��c��)��ą3"��#�p�����l���2c����Z����R>�e�=I���A�� ��9k�o�G1w�ه�)�<��"����}�2�nl"�P�`cD�O��Z��p�Qܝő*Iq�#�[AX�~��9@�ꋾ1`�W��)닿�&"Lj'�s�Ą�k����{bΤÙ^Z��-Q��:��I*����A ��Y9�x�1K�鋭)�U�l"هŇG;�j�rk�1�pbb�K��YȠy�Q?�ɘIH�6��@�8��� +p�f(vWsU�w�uD�yw 4Qzkx�$x{�z�ǐk�o=�1m�pǦ�o:rF�Vp�s���r#uu�s�vqe%uw�T�v�yDQxz\3�y�{�$�{(|��cizxʵ(k�y_��mny���o +z���p�{4t}rE{�d5s�|iS�u�|�C�w4}�3�x�}�$�z�~p�hg���Yiˁ��RkՁv�Vm��L�Yo[�-sqq�cVr߀�S7t���CCvj��3mx&�U$�y��|f����hc����j�����lo� �nK�+rdp&�Pbzr�tR�sᄒB�u���39w���$�yh����dԓ��gL��@i��S��k�����my�q`oh�ta�qV��Q�sD�>Bku/��3w��$�x���:c�ɮ�fd�2��h����hj��9�l���pn��`�p��%Qfr���Bt��^2�v���$�x��`��c,���De��B��g���Tj +��~�l��o�n'��`Gp1�nP�r:�IA�tB�2�vG��%xH����b��B�e�M��gV�[�Nio�r~k���n�m���_�o���Pyq�A�s؎�2�u���%2x����a��ګd}�8��fӭ��oh��}>k�Xn:m ��_!o<��PqZ�.ALs|�U2�u��x%Gwˇ��ar�D�Sd��fg����h��:|�j���m�l��]^�nߞ�O�q�7As3��2�ul��%Xw��;��tqdį�uKgd��vi�Hv�lN��w�n�p�x�p�ayhr�Q3z]t�Au{Xw1�|[x�#
}r{��q�n��soƞCt qe��ur�+vtdo�wu�`x/wPPoyNx�@�zoz'1�{�{i#+|�|Ǻ�o�w)��q!w���rjxč1s�y�}�t�z>n�u�{ +xڀ*1$z0�
#\{���l����"n9��\o��4�zq��{�r{��l�sۅ-]�uI��N�v���?�x3�0�y��H#{�f�=ke�/��m*����nˎ<�7p8��zqq��zk�s�\�t���M�v#�X?Jw���0�y�l#�z��ճ�jw���DlE�h��m�;�om�y{p�j�rs��\3t��Muu���>�w,��0�x��f#�z-��ni���k����m7�>�n��hx�pI��j.qړ�[�sx��M +hCps��Z
r(��K�sꗉ> +u��@0mwm�$2y$�ҳ�z�dK�n{g��{Ti��@{�k�y~{�n'j�|Bpe[�|�r�L�}>t�=�}�v�/?~]x�!� +<qzł�.�{���"V|��=��r$���sO�p�ot^�>��uE�s�v.��e�w��W�x��I�y/�h<z9�3.�{3��"�|&���Fq3����rj�ȎHs��怓t{��r�uu�%e3vr�PWNw��{Ilx���;�y���.�z
�"�{��ܨp����q���2rЙ��sϖ�q�tӔud{uۑ�V�v��cH�x*��;�yN�5.~z^��"�{a����p +y�*^��{+Z�_|��4s����t��߃qu�ug��v�h܂�w�\n�8x�O���zB���{&6��G|=*g�}F���~b����{'���s{����$|"tR��|�g��v|�[��&}|O ��}�B���~e6b��~�*n�jA�8���s���S�F��e��os>�ǂ6g���Z�F��N��&��B1���6-��e*mց3 "�����W�֊�P�9~7�5��r5���fʆ�Z"��8M���qA�|��5�j��*eK� U"�J�q��#�����}1t��qOI�eT%��Yy�_Mg~���Af~���5�~�!*_~Ԅ� �~��l�K~ژ]��~ߖ�|;~Ԕ�pv~���d�~���X�~~��L�~|�{A ~��h5�~|�Y*S~j�] �~I�m�E~J�c��~Z�{M~V��o�~5�c�~�iXI~��Lp~�@�~�I5F~��*B~�� �}��M�A}�a��}�z�}n�}ϝ^cL}�� W�}���L}��n@W}���5}���*1}��3 �}�� +�N}��X�$}���y�}��3n`}{�mb�}j��Wd}\��K�}^��@}f�_4�}m�I*$}|�T �}x�����cŇ7�f{{��i +o���k^c���m�W刌pK��|rV?t�{t�3���v�'���yD˃�{ȑ(��kH�ꋭmRzs��o6n��vp�bшmr�W#�ht`K�sv?��w�3m��y�(��{a'�}D���Lr����1s�y?�%uAm��,vXa��=w{Vl�Rx�J��xy�>Ʉ�{3R��|4(+�}`x�X~��T��yكO��z�x��{Cl���{�a� |UU��E|�J��}�>~��~3:�&~�(?�u>���ߍ��������*w�с;k�� +l�i+��n�_�{p[U�=r7KI��tA��u�6���w�-C��y�#��{���}�{���qYr��r�hK�lt^f�;uDT��v�JΎ�w�@Ό�yU6݊�z�-P��|#$��}�g�'z���w�q�Xx�gj�/yZ]��zSߏ�z�JL��{�@z��|�6���}t-\�~S$I�E;����.y��d~.p"�=~pf��!~�\�~�SH�:Iӌ��@&��6��<�&-[�h�y$m���� +dk�I�G[�iSg��fJYB��4�G:c�ԍ27�v��*y���#����-����lG�]�Sc�ϛ�[��?��S���J��<��B��Ԓ::�x�K2���*n��# �p��I�?�li���ea�gyX��mi�O���l!G��on�?t��p�7&��sk.��#u�'<��x_ڌ_z��:}-i�:j�`���l�X,��n�O���p�GS�&r�?E��t|7�Uv|/ +��x�'l��z� +�Z|zU�I~ah���p�`�rXW���s�OG�SuG ��v{?��w�6��=y{/��{ +'���|� s�t~��vxg�Lv�_���w�W/�mx�N'y�F���zq>זs{m6�4|o/� +��UGMњ���E�L�V>D���6��焂/&�Ʉ(����!N���[����e��y�']��/�hU���M��̉�E�����>�m��6��N��/!�3�(%��:!r��l&�7��e/�ő?])�{�U)�?��M+���E_���*=�ӊ�6`���n/���(,����!����gT�ʄPd��!�=\��ݔ�T̛���Lޘ}�.E"�f�b=��O��6A�>��/�.��(/�$��!��-�?y�q��d'��� +\U�X��T��&��L�����D��F=��� +6)�ٍ�.��̋L(2�ȉ!��܆���*�/_j��e�Wi��g�O���j!Gѧdlb@Z�"n�93��qK2��s�+�wva$f�Kx��{;�R}z_E�k�W@�m#Oa�n�G���p�@F��r�91��t�2�fv�+*�>x�$��z�t�|���W~�^��yqV���rAO ��s~G���t�@,��v[9(�^w�2�=y�+M�"{5$�|�ƌ~G��|�^}�v�V��FwRNۧix)GM�oy@�Vz%9�/{62$� |T+i�}y%�$~�
�A�W����^��{�VB�"|7N��I|�G�Y}/?�I}�9�+~]2*�)+��3�%H�H�MS�t������u]Ԭ���V�!��N`�Q��F�l��?h�8��V�F21�Y�|+��g��%{����������B�I]����UϨ:�FN.�z��F����|?����88ꘝ��27����+�����%��׃^̉�)A���]N� +Zt�y-K{v?zN=w�{e.�y}|Y!�{"}Y��h�z���j�{7�rl�{��=ni|)u�p|�g�q�}Y_s�}�J�uK}�<�w~U.�x�~�!�z�~��gB�Q��iZ���kS��m��t�n�Of�p��X�r���J`ty��<`vY�;.�x*��"&y��e�5e��rh����j0����l��s�m���fo���W�qӅ�I�s˅<u��.�w���"^y��ܩ�d���&g�4�|i-����k"��r�m�EeEo!��WWq(��Ins2�V;�u8��.�w/��"�y �+�qcǜ��f���ghS�`�jV�rlc��d�nu�]V�p��Ir���;�t��5.uvȆ�"�xʄU�=c +�*��eg�7�_g��=~�i��<qQk��8c�mڕ*VDo��H�r)��;ctP��.ivn��"�x��Z�;br�3��dѨ��|g��~i�Kp�k8��cVmW��U�o���H\q��;7s�.^v"�#"�xE�7�ka���dV�Ċ�f��l}nh��pjȢ�b�l�Uwo"��Hqd��;s��$.Vu�z#x��v�_���w0b���w�e���x\har�yk +v�wPUBxx�Gry9y�9�zj{,�{�|3 �|�}Y�mo�y,�Wp�yˊ*r'zg|�sYz�ovt�{�b.u�|1T�v�|�F�xN}b9�y�}�,�z�~] �|%~Т�m�[��o`�O��pʁ={�r�#nrsb�aTt��S�v��F{w���9\x퀵,�zD�!{��E�lz�B�]n"����o���z�q�myrt�Y`�sم�SCuS��Fvׄ(9xS�_,}y���!J{����kQ��#m���nn��Ty�p)��l�q���_�s�%R�t���E�v@�R8�wͅ�,tyD�l!zz���jn��l3��hmޔ�x�od��k�p쐶_)rw��R0t��E>u��t8�wT�P,jxۆ1!�zV���i̠���k���pm3�hw�n���kpP��^�q�@Q�s��uD�u;��8rv劻,_x��!�z +� +��i9�E�j����l���wn:�yjvoΛ^qc��QIs�'D�tА�8Fv���,Ux1�\!�y˅ޛ�h����Nj{�ق�l2��vqmˣ�i�oc��]�p���P�r���DZty�68"v;��,Mw�!�y����m|�_\��}bm�}5e\y}Vhk�}�j�_}�mdQ�~o�DY~ar�7E~�u*�2w��z,��zOg��1z�i愉{7lw�{�nj�{�p^|]rP�|�tC�}Pv7}�w�*�~\y�P~�{қ�xo�x�q8� ytr�vny�s�i�z�uY].{v�PK{�xCf|Tyv6�|�z�*�}�|�~D}Y�Jv?w��wx{��w�y>uWx�y�h�y5z�\ky�{iO�z�|!C{m|�6�|6}�*�|�~�}�~���t�o��u����v��t>wV�g�x�[�x߀Oy��B�z��$6g{��,*�|W�) }"�&�0s\��Et~��Hu��s*v`�wf�w:��Z�x�nN~y��B)y��N6+z삷*|{ʂ C|�����rF�g�s{�V~7t��7r;u��f&vt��Z/wc��M�xc��A�yi�O5�zf�*x{Q�� u|/����qk��r��(}>s˒jq`tː�ejuɎ�Y�vƍM{wҋ)Aqx�I5�y�j*qz慗 �{Ѓ̓�pŝ)�r��|Us*��p�t2�@d�u8��Yv=�aM wQ��Axj�H5�y~��*gz��/ �{�����p8�e�'qz��{�r���o�s���d(t���X�u˕�L�v�\@�x�5dy ��*]z9�� �{>����o���mq�z�r9��oYsK��c�t\�9X+un�pL[v���@�w���5Axԍ�*Uy��� �{ +�.����_@���<bH}/��e0q"�sg�e�"j�Y��mJL���o�@#�wrw4�Vu(<�Ew�Ӂ>zf���)g"���ih{ހ�k�o��m�c���o�X!��q�K��ys�?��lu�3ހew�(R�my�.�z{��Rn҆5p`z�Fq�n�CsNcHt�WZQv;K]`w�?cuy&3��z�(f�{�}�}r��}Vv\��}�wHyh}�x)m�}�x�b4}�y�V�~z�J�~P{�?~�|_3�~�}1(w}��8~Ȏ�{�}��s|*~x?|t~Zl�|�~�aX|�~�U�}JU}lS>�}��3y~�(�~d�~���-z{�/{��w{r�Pk�{���`{|��U@|V�LI�|���>Z} ��3H}��&(�}Ӂ�@~�j��yv��z
�vz��0j�z�:_�{M�KT�{��\IJ|�a>|��b3|��h(�}V�xs}�����x���yC��u0y͐j.z=��_z���T{�nH�{���=�| +�32�|���(�|��}B����w���x���tYy2��ity���^tz��S�z���Hu{�S=h{��2�|��(||����|�z��wp��~Ix�As�x���h�y+�]�y��VS,z&��Hz���=%{.��2�{���(u|5���|��:��w +��=.{Z�"z�q�{xhM�|^��3|�T��J}K +R<��m9I���oyA^� q�8ǎ�t0K��vb(>�mx� ��A{d�?}Oj��|l�b��naZ,��p'Q��uq�I>�,s�A��uf8���w60E��y
(^�oz� ׇ[|���n~zj ��r�aї�s�Y|�Pu6Q�$voH�w�@���y8b��zO0;��{�({��|�!
��~?���i?��x�a�MybXޔz4P���z�HW��{�@Y��|�83��}W00��~!(���~�!@���^���hn�a~1`j�3~�XU�~�P�IG����@���8��:0$����(����!n�!�1��Z��g��Y��_ٔ>��Wޒ/��O��/�rG��*�G?"�7�6��0�T��(��o��!����{�Ȃig#�w�7_O�h��Wg�b�6O\�i��Ga�q��?��y�I7É���0 +����(����?!�����M�*f�����^Ȓ���Vꐨ��N�����G�Ɗ�?i�މ7���E/�0�(��\��!ȃ���H���f���^G���V}� +�5N����F͌4�?5�[��7u����/݆���(���E!ك-��l���[e~�^��]בw�#V$���>NZ���GF����@?���/7X�$��/ˆW��(����z!�ކ}��L��b���`�[�@ctS+�f:K9�h�Cm��k�;��nz4(��qJ,���t%m��v����y�?�P|^bn��f�Z��eh�RȞQk"JߛnmUC&�ro�;��lq�4��tV,���v�%���y���{d��Z}�aŢ�lVZ��n/R@��o�Jz��q�Bۗs�;��&ug4�NwP,���y?%͋�{(=��|� ��~�a4�9rYu�MspQ��qt�J��vB���wu;G��x�3�3z<,��{{�%���}z�)~h\���`���w�X�x�QN�8y�I���zeB@��{E;��|-3ُ:},Ȍ�~&��~���`�����_���|�Xi��}�P�.~Ic��~oB��~�:�T3̎g�,ԋǀ<&?�/���$��[��__���$X��EP��F�TI ���JAғ�H:ѐP�K3����J,ߋ�H&^���L ��T:�Ăb^으�;W����PD�n��Hڔ܆A��?��:����93����,�v�C&t��� F�|�iq�C�^���8W3�@��O喡��H����Af���:���.3��e�5,މ܆7&��`�H e���j���^�+�V͘�� +O�����HP�b��A4��A:c�a��3��܉x,ىX��&��憔 }���Gł��/]�����Vs��1OP�`��H�Ԑ�A�^�:G��]3u�l�q,Ԉ�&����� ��C���9��Y�faOQ���c�J��flC`�Qi<~�xk�5뛔n�/K��q�(ݔt�"ѐ]wz
��z*��`|�X�[f�Q���h�JS�CkC8��mR<f��o�5�"r/^�kt�)��w#�y�g��{���c}�X���lwQ/�&nJ��o�C�1q�<H��sf5ޘ�uY/k�'wa),��yp#N�{k���}9`��~�X��q�P̥�s +}0���~�����W���wPt�Vw�I{�x�B���y�<�z�5��x{�/{��|�)k��}�#��"~�?������WV�a|P?�0|sII��|�Bw��}v;�~
5���~�/��L)����#�P�����W�J��W�A��P�(��I����BV���;ژ?�15��Ɓg/��S��)����$�����w�-����ZVʤ?��O̡3�$H���B0�̄�;��o�I5���/�����)ɍ<��$D���c��+ӄ)�Vk�_�O�L�aH��&��B��;����f5��H��/���)ٌ��e$c�^���_�����V +����O6�}�oH|�\�]Aܙ%�P;���L5����J/��P�')���${�ۅ�4���*�_�U��˒�N��͑-HQ����A����@;o�U��5{� �z/��ԉ�)�Y$��q��N����I��g��fz[���hJ^Җ�jb��k�eEx�m�h5j!o�k[=q�m�Las�p�=�u�s�/ +w�v!wz x��Pb�d���e g[��gXi��=i�lw�k�nJim�psZ\p"r�K�rgt�=.t�v�.�v�x�!�yIz��_�nH��bto��0d�q>��gir�vgi�tFhl?u�Y�n�wK q+x<�s�y�.�v{!�x�|T�]Iw��` wƑ�b�x���e�yQuNh2zg,j�z�X�ms{�Jvp|:<Yr�|�.ouB}i!�w�}�L[.؞9^2Ő5a&��Ad�t9f��fGi��Xl`�I�o!�<q��.Wt��!�wO���Y��q��\�����_��сb��0s0e���ekh���Wmk�4Itn[�;�q8��.Qt +��"1v݁�W��ݛZ[I�O��^��Հ +�:E�p��8�s*��,^u���!cx�J��]Z�?� `�h�\bȒ�x�ed��k�h +��_j�� +Rm^�)E1p�@8�r��R,]u;�h!�wy��\h�
��_:���ea��@w�d���kgU�D^�j��Q�lď#D�o~�8ur5��,]tއ)!�wy����[��А^��у�aR��wd��jxf��w^i{�9QQlA��D�o��8WqՌ,\t���!�w>�c��[&�|�O]�����`ȥ�vxc��5i�fA�U]�i�aQkזYDun��?8>q�� ,\tT�!�w���rD[��s^i��s�a�y�t�d�l�u�g�_zv�j�R xm�D�y^p�7_z�s}*�{�v2�}Sy��o c��p-f�Fqch�xFr�kkMs�mV^suFo�Q>v�q�Dx t?7y�v�*�{x�<|�z̜�lRl�:m�m���o?oov�p�q&j0rDr�]�s�t|P�uYv&C�v�w�6�x�yk*wz2z�t{�|h�i�t:��k�u<�HmXv@u�o
wHi4p�xK\�rbyPO�t&zNCu�{G6�w�|8*nyt}�{'}�Jh|>�,i�|���k�|�t�m�}Wh@og}�[�q9~OOs"~eB�u~�6bv�~�*lx�-�z�_��fp���hq���jn�os�lf�)gXnX��[1pL��N�rN�QBFtW��6-vW��*ox<�8 &z�ϖwe����g,��~�iE��r�kY��f�mh��Z�oz�N9q��A�s��5�uń*rw�� `y���Sc�H��f��}�hM�.q�ju��e�l�� Y�n��vM�p��A�s�+5�uC�*swS�� �yQ�:�\c
�͈�eK��|�g���qi��ce2k�/Yqn��M_pW��AVr��D5�tЈ�*sv� �y�9�lbY�.��d���|f��pji$�d�k\�&Y +�(�x��N�z<���Wh��x~�j���s�lZ��in!�m^:oߙ@Szq��HesN��=]u�62�v���(�xo�~ +}�y &~Sz�j~�|��}w�q�|�xFr�rKx�t9g{y�uv\�z/v�Q�z�w�F�{�y4;�|<zi0�|�{�&�}�|��~?}�.u�x�{�v�y�q5wdzSf�x-z�[�x�{�Q(y�|QF?z�|�;a{_}�0�|0~ &�|�~��}�I��tY�z~uE� +pv0�)e�w�?Z�w��XP{xҀqE�y��|;z���0�{���&�|X��?}����s��ydt�_ou��d�v%�hZAw��O�x�kEKy��:�z�O0�z���&�{ւAy|��Ȃ�r��xls��nCt6��duR��Y�v\��Ohw`�iD�xi�B:�yr�0|zs��&�{d���|C�с�qA�kw�rZ��m�sy�tcct���Y!u��-Ovό|D�w⊳:Ex��0[y��&�{�W�{��p��v�q��l�rܗb�t��X�u4��N�vX�\DWwr��:x��w0=y��&�z����{��{�o࡞v=q �lcr]�[bqs���X]tǖ�Niu���D!w��9�x0��0&yK��&�zl��{s��q��Z�x/��^im2a�c^��d�Xԃeg�Ni�j�C���m�8���p�.?�[s�$E�7v���!y��߂�bYv܂mel��g�bS��j+W��l�M���o(C�sq�8p�[t.<�Iv�$q�Bx��D{�d��i�u��Xk�k��;m�a]�7o�W �3qlM�1s[B��7uE87�Cw/.9�Sy$��hz�r��|�~ ~�p�ta~|rj�~ys�`�~�t�Vo~�v5Lz~�w�B:x�8Cz8.6y{�$��|���~,|�|�w}sO|�xri�|�yT_�}@zU�}~z�K�}�{�A�~
|t7�~d}/.)~�}�$�~�~�7r{�{W~!rJ{�~�h�{�~�^�|-!U +|�aKZ|��Aj}=�7�}��.~ +�6$�~Z�oL~���z�z��qRz_��g�z��R^){9�Tp{���J�|�gA|�� +7V}��.}w�Q%}ӂ�~&��y�y�2poyg��gyى�]�ze��S�z�
Jv{`�,@�{�<7"|s�F-�|�[%}]���}���x�x:��o�x��of`y�>\�y���Syz@�xJz@|{_�z6�{���-�|x�[%|����}b��x
w���n�w��8e�x|��\�y��Sy���I�zT��@Cz팅6�{��Q-�|�+%|��!}�Hwavߝ�niwh��e[w��z\%x��R�yF��I�y��@z��<6�{'�q-�{���%$|X�(#|߄�x��C[:o@�^�eÉ�a�\"��d�Ru�hH�+k">�`n!4���q+o��t,"h�FwDփ�zrw]��b3n*��d�dԇ�g�[E�&jQ��kl�HQ��o#>��q�4̄jt++|��v�"��GyH8��{�v
��h�l���kc̆m#Zo�zoQ��qGńNs>/��u 4��Mw"+���y+"e{,�� +��+���#Z�������q�$��h��S_����W"��0NL���E�r��<�m�33�l�y+~_��#o<�2���pGQ��g���_N~���V�~��M�~㊹EY~܉�<�~��A3�~��+n~���#}~τ} +~��qo�~���g8~o�W^�~U��VD~M�YM�~U��E~`��<R~k�3�~r�/+_~u�W#�~s��-~k�n�}�_f�}ݘ�^f}і�U�}͔vM]}�HD�}��<-~��3�~�(+T~��#�~*��J~-��o�[�f��c^�]��a�U�BeLF��h#C��LkM:��nX1j��qb(·ft ��.w� �z�n$��be��d�](��gNTi�ni�K��lvC&��o:9��q�1X�dtK(�?v� �&y�l�&|<m��hrd��@j�\E��l�S���n�K��p�B��dr�9�Kt�1E�@w)�9y@!+�<{_ÃT}{k���n�c��tpS[p�Mq�R��?syJ��.uB<�v�9��&xC10�9y�)�P{m!\�m}��~�k��t�b��v
Z���w$R\��x7J��yOAׅ�zk9m�"{w1�Q|)+��}�!���~�\���j>��z�b-��{�Z��|*QԆ�|�I���}]A��}�98�D~�1��)3���!���6��L��im�P��a��g��Y����Q`�Ɂ%I7���?A@�/�X9 +���a0�߁i);�2�{!ցs������h��H��`߆m�2X�����P��酁H�/�A�v��8߂ل80قD��)<���F!����K��h�k�`J���tXy��P��$��H��}� @Ȃڈ8��F�0����)6��"���F�Rgw����_Ą萎X �/�eP<�~�HU�猿@��X�V8��̉�0��>� )/����"� �(k���f���_R�P�^W�����O�����H!�n�@r��58w�i�0��މ�))�T��"!ӆ�W�je��[�]˗�_4Uٕrb\MɓtejEƑkh�=��dk�5э~n�-ċ�q�&.��u��x/N�V{Fd���b%]+�ld�UH�hguMC��jEW��l�=���oX5��r +��~-��[~�&Ӆ +Cy���L<K�G��4���-�����&�[�8 ]�
�~2�ށ�`v�o�sY;��fQ�y�KJ��-�C:�܃�<����4نC�k-��� &��Ă� �����h�d��_�����XÌ +�QQ�����JA�Z�8B����;��܆�4����-��k�A&��6�| ��������6_{����XS�F�Q+��&I����Bˇw� +�c ����WL����Pđ��J@���C��F�U=L���7"����0���Y*І��%�B�h����>�U�
S��]LF��_�E��Bb�?�e�8ě�i2Ř<le,���o�&ّ�r�!Y�tv.�Ey1�}{�R��yb�L�Kd�Ef�.gt>�+j8���l�2���o�,̓ar�'�;up!��$x8o�z�v�|}'RD�_g�K��ii�E�ql>��ynC8��Qp�2��r�,ڑ�uY'+��w�!�z!��|Cц�~5Qˢ�m=K,��n�D���p�>q��rc8c��t>2���v,ߐ�x'I��z" ��{���5}���(QK�r_JԞ5s�D|�ct�>F��vc8K��w�2���y?,���z�'p��|7"B��}�A�\~�o��Q ��wmJ���x9DR�#y>)�ez#8>��{)2���|3- +��}?'���~I"~�"F����-��_��PŞ[|.Jk��|�D.�
}>�c}�84��~O2���~�- ���'�,"��f��
�H�Ł�Pu�4��J.����D���=�i�,8$���i2���-/� ��'�X��"ۇ��&�U�K9�C�pP�4�%I晖�C̖���=͔n��8�˄�2�� �b-5�]�'�����"�����;i�ՃOț/��I���� C����=�����7���o2��k��-8���.(��j#����?�]� ��|��O��7��Is�ӌ�Ct�c��=����7�a� +u,/u�wD 9xWy���Z�i-��]�kC�:`�mI|�c�o7ofq
a�iJr�S�l#t�FRovd9q�x,t�y� Ww�{^��W�q�&[Ss<��^�t{xa�u�nd�v�`�g�w�S?j�yE�m�z8�p�{+�s�| rv�}��Ukz���Y{�l\�{�zL_�|mc|�_�fP|�R�i�}VEXl�}�8io�~+�s"~[ �vB~��1S\��%WH���$Z���y/^e�Jl#aʂ_1e1��Rh���D�k�48?oF��+�r��� �uЀ9��Q��B��U��F�Y��Qx8]�ckS`��q^�d3�zQ�g���D�k,��8n���+�r��!Cup����P"�X��T\���X[�w]\�wj�_���]�cS�(Q%f�~Dfj���8n�&,q���!}u�✊N��=��SJ��7W_��v�[��i�^ג;]|b���P�f?��D9i�!7�m���,qG�Y!�tڃ���N�
�Ro�<��V��\u�Z^�kio^%�m]a�aP�e��PDio�57�m6�,'p���!�t����Mp���qQ��#��U㣋urY���i]��C\�ae��PSe5��C�i ��7�l� ,4p��V!�tv����hV��vi�Zi�:kk^x�ma�k�n�e^�p�hPQ>r�k�C�t�n�6�v�q�*Ex�t��z�wd'_���fSby��hreZw�j~hj�l�j�]�n�m\Pup�o�CYs'rv6�utt�*.w�wPy�y��v`�h.��crjd�e�l�v;h2n�iij�po\�l�rZO�oVt=B�q�v6Ct\w�*v�y�Ny6{r��^p��$`�r��c�s�uf(t�hnh�v[�kOwCOm�xyB^p�y�5�s`z�*u�{�vx�}��[�x�^�y��Ta�zhs�dnz�g~g.{�["i�|N�l�|�A�o�},5�r�}�*u?~#�w�~���Y���\]��*`/�r�c +��f�e��Zoh��Nk܀�A�n׀�5�q̀h*t��C ww��)X�Ɋ.[�-~'^ˇ�ra͆�e�dچY�g�DM�k��AXn��5�q.��**t*�6 Jw�w��V����Z8�I}:]���q:`���e2c�,YOg��M-jD�SAmu��5up��p*;s�� �v�����Uy��"Y,�N|^\��op�_ےid�c�]X�fU�JL�i��/@�l��5lp&��*Ls[�� �vs����T����PXT�.{�[ߚ�o�_� dbf�XX{e���L�i��@�ld��5fo��#*\s�S �v8���>S�W���{
[9��oe^��Oc�a֙�X-e/��Lhh��@�k���5aok�*hrˈ� �v �X�-m�V���oZd~qp_^rq�a�e�r�d�YetJh;L�u�k|@-wtn�3�yq�(-z�t��|x#�)jI_�k�b|�m�d�p�o4g�d�p�jZXtrqmLt9o�?�vrL3�w�t�(,y�wZ{�y�@g&gQ�Zi)i�{qkk�o{m +th�(Ov��y��>^��j�ax�v�dA��k�fЅ +`+i]��T�k��Ijn��r=�q.��2�sǂU(bvF��Vx��L�]'�́`7��u�c��j�eNJ�_�hp�qTsk�IImЇ=�p���2�s;��(tuԃ��xO�t�$\��/_5��u2b+��j!d�-_g��iT j`��H�m)��=�o���2�r�� +(�ur�7�x�v�B[<�(l^b�t�ab��i�d/��^�f��+S�iÐ�H�l��B=wo}��2�rY�+(�u"���wńP�|Z��~�]��^t`���i c���^2fl��SliB��H[l)�`=\o�/2�r�(�t�� w���qtV���t�Z[vfu�^ j�vav_`w^d�S�xJh+H+yUko<ezun�1{�q�&$|�u�~xU��p�^��Qq�a�t�s d�i�t=gR^?ucjSv�l�G~w�os;�y&r"0�z}t�&<{�wb}+z��m�f�~�o6h�s�p�khrr&m)]Fs�o>R=t�qWF�vlsn;�w�u�0�yxw�&Pz�y�S|f{��ej�n:}ll�o�run�q}g}p=r�\xq�tpQ�snu�Fquw^;Zv�x�0�x�zB&bz*{��{�}��h�u�|&j�v�qZl�w�f�n�x�[�pby�P�r'zbE�t +�tc�jI��Y3l��tOn���D�p�^:=s$��0RuV�0&�w|���y�6��b��wad��m9gF�$c
i��X�kڐ�N�n"��D^ph��:r��m0Ht�4&�w+� +�y>���aT�yv�d�l�f��xb�h���X|kR�#Nzm��mD3o���:rN��0@t���&�v�5y +����zeV�yz�Zoni{/^c�{}avY{�d�N�|Xh4C�|�k|8�}�n�.2~-r$6~�uL��x���w;^Kw�xaWmx�dFb�yZgXzi�M�z�l�C{qoU8_|;r.'}
t�$`}�w�~�zE�WtSe�vuth+k�vzjua�wYl�W+x<n�L�y#p�B�zs%8{uT.| w�$�}y�h}�{� +6�vF��-�w�j%'y~�+�z��x�i5��ohkF�fm3�u\�n�S0p���I�ro�@Pt#�+6�uщ;-�w�R%5y*�yz���x"hn��n�j���e�l��}\RnY�)R�p*��I�q��p@+s���6�us�p-�w,��%@x熒7z{�lzT��V�p���Z�fÀp^`\��Na�S�CeIQ�Eh�?5�`k�5$��o+���rp"q� u�ρXy-x�}�^oE}�aBe�~dF[�~7gR)~ji�H�~�l�>�~�oy4�@rF+��u"��w�2�mz�woz�e5m�{mg�d�{�j'Z�|Fl]Qb|�n�G�}p�>N}�s4�~u_+�~�w�"�y���| vx�ll�yBnc�y�o�Z.zwq�P�{sSGz{�u=�|Kv�4�|�x`+�}�z"�~M{��~�}jt�v�r�k�wbtab�x*u�Ylx�v�Py�w�F�zay=�{.z34i|{P+�|�|r#}�}�"~E~�s�t�ysj�u�zYa�v�{ X�w�{�O�x|SF�yW|�=Wz?}�4B{-~+�|~�#D|�Wo}��r�sQ�j tp�6au��kXv��zOw|��F%xn��=yn��4!zs��+�{p��#d|\���}5�q�r�@i@sB�`uto��W�u��:N�v���E�w��G<�x���4yЃJ+�z߂�#{�k�|˂q6p��oh�rI��_�s��Wt��N;uωE�v��<�x��3�y@��+�z`��#�{w��|r��p~p��g�q{�c_crÐV�sM�u(�EYvd��<�w���3�xɈ:+�y���#�{�;|)��o�ok�`gtpӖ�^�r$��VgsW��M�t���E-u<iw.��3�xh�J+�y��#�z؆Y{�7q�PW-h��Z�_#�^�V!�`a�M��eQD.�Rh�:��l1���og(��Lr� Ƀv:��y�o΄R^ +K�r�B��t�9��vp1\�x>)1�z!c�A{��h}�lO}�q�d}�sE[�}�t�S~u�J�~Gw;B=~tx�9�~�y�1D~�{ )?A|R!��}�U�~�kx{�w�c9|-x�Z�|�y�R�|�z�J}{fA�}d|.9y}�|�1/~#}�)L~�~z!�~�H� �j�zU~ buz�~�ZM{H~�R ++<�s$z��v��y��{�]^��dV0�2f�N���i5G���k�@x�an9y�p�2K��s'+A��u�$���xGX��z�d��}\��_i�Uv�3lN]�n4G.��p+@��r)9/��t02&��v:+C��xG$Ą�zQ���|I���~%[��|o�TЊoqsMՉisF��ot�?��pv"8��sw�2��y9+L��z�$ꃸ|QȂ�}���38[��u=TE��v�Me�w�Fi�$x�?~�@y�8Ѕ\z�2��|+Z��}'%��~;�/GH���BZm�cz�Sć�{wM��|7F�|�?H�6}s8��j~1���~�+g��W%1�7�5��������+Y܇/�SO�o�OL�����Eڄ���?�C��8����,1��T+p�8�z%L����_������Ym�&��R�j�LN���E����>�b��8x�ȄR1�,��+w����%b��B���������X��)�R�����L +���4G���R.u�!��(̄Ł #n���^3�o��1�~��Q�F��K��׃$E��u�[?�&�U9��M4;���E.z�\�)(��#����\�`���Q��;�uK��߇tE����H?��E��9ԇ�s40��.���o(�}��#��f�6}��������Q�>� +n%m�>�p�pt3s�sW'�vgv�yxߒ`[Tc~�j^Yfzra;h�noc�j�bgf�mEV�i{o�Jclqq�>]ozt2�r�vK'�uhxk&xBz���XkԄ�[mm�y!^�o�mYa�q6a~d�r�U�g�tkI�j�u�=�n/w�2�qly#'�t�z�Tw�|.��U4s��yX�u7w�\fvZlT_�wQ`�b�xAUf0y0ILi�z=�m{2kp}{�'�s�|��v�}ƍ�R�{CV�|Sv�Z�|�ke]�}_�an}nT|d�}�H�h�~ =il$~V2do�~�'�s(~��vuS�YPԃn�0U�Ru�X�j�\���_4`0�uS�c�H�g���=8kU�v2^o�)(
r���Dv���9O!���:Sw�9u#W��ei�[O�n^�_�vS�b�|HFf
�=j���2dnu��(0r0���u���@M��E]R/�teVi��iHZD�^-^'�{S?b��Hf�D=i���2ym�(Uq̈́z�us���yL���~�Q%��s�Uv��h�Ye�u]�]^�BR�a_� G�eh��=ix��2�m��9(uq{� +c�n�f�ffp\[�h�rP�k�s�E�nfu}:�q>w40 +t +x�%�v�z�oy2|9��[�r�{�^�s�p�a�ufdxv9[gIwMPTj&xaEPm yt:gp&z�/�s{�&u�|��x�}��<YHz +b�^h�!X�a�8Noei�KDh��S9�l��U0%p#�Y&�s��k +n�`�b`p:dW�q�gMKsXj&B�um17�v�p=-�x�sK$$z�v=�|Ry9��g�b"v6i�d�k�lgba@m�i�V�o�l>L�q�n�Bs�q!7�u�s�-�w�v
$@y�xlO{z�`d�i�t�g=k�j�i�m�`Sk�o�V m�q_K�o�s2A�ru7\tdv�-�v�x�$Yx�zz�z�|D~b&q2s�d�r�i�gts�_ui�u*USlv`K^niw�A4p�x�7)sOz +-�u�{H$~x|��z'}�|�_�xEr�b�yh�e�y�^�h;ztT�j�{J�m6{�@�o�|j7r_}-�t�}�$�w^~y?y�){�^<q�a?ig�d5�]�f��T"i��Jyl(�@�n��6�q��-�t;�$�vрA�y5�nz�\w�p�_Dž�g)b߅=]je���S�hq�5J#k:��@jn�96�pڂ�-�s��P$�vY���xׁ�y�[ ��p&^���f�a���\�d���SPg���I�jk��@EmV��6�pA��-�s$��%u�z�x���yZ�Ho�]���f
`Ɛi\�c���Sf�� I�i��@(l���6�o&-�r��z%4u���#xH�\x�Y��o\���e�_��{\<b��CR�f�I�i2��@lI��6�o\�h-�rg�,%Ju_� +{MuwR�qv]V�f�w#Z�\�w�^KR�x�a�IyVe�>�zRiQ4�{gl�+H|�p�"D}�t6�~�w�yuq�Z5ozs&]�e�tP`�[�uJc�Q�vZf�HAwwj >^x�m"4�y�p?+D{Osa"t|�vo}�y�w�nza�n p(dFdKq�f�Z�s +:�}�i�1�~nmZ(�q ��t��xpp�x(Zg�x�]�^�y�`�Utzc�Ldz�gC�{gj1:l|,mW1q}p�(�}�s� �~�v�Y�y�ot�a%frvc�]vwf�T�w�i0K�x�k�B�y�nS: z�p�1G{�s�(�|�v?!}�x��~�{kn9r"g�elszj<\�t�llS�u�nlKv�pmB{xru9�yIt~1&z�v�) +��i|�S_`���W\X���[:P!�t^�G��Ob�?t�>fT6��Kj.��nm�&���q?��uAD�(x�hG~�Z_�~�]tW�`�OEc�F�;g>�jjJ6��m�.n�p�&��Zt }��wE��+zsg{�`�^�|!c�V�|�fSN�|�h�F\}Kk�>m}�n:6O~,p�.W~�s�&�7vr��y(��M{�e�x�g(]�y�i�U�zXk�M�z�m�E�{�p>|r+6|�tT.E}v�&�~4x��~�z�G�}d�v�m�]w�ogUEx`q+MKy$r�Eey�t_=�z�v +pIG�~9r@�~ls�9�~�u�2�~�wV+�6y%%�z���|��+~r\T{xrFUj{�s�Nl|euGK|�vb@<}w�9j}gx�2w}�zP+�~?{�%@~�}$~VB��[�y�w�T�zex�M�z�y�F�{fz�?�{�{`9E|S|82k|�}+�}j}�%d}�~�K~�����Z�xL}cTQy}�M�y�~]F�z3~�?�z�9'{^r2c|�+�|��B%�}W��x}���~��pZgw��S�wЂ�M;x��Foy��?�yʂ�9z���2_{E��+�| +��%�|̂m�}��J�~,�0Y�u߇�S}vLJ�L�w��lF;x-��?�x��Y8�y˅�2[z��;+�{���%�|X���})�[}݂�Y�t�S.u�HL�vƋoFwk�w?fxG��8�y6��2Yz%�}+�{�g%�{��S�|܄>7}��UX[�%T-Q{��XJ���[�C��e_�<؊=c_6-�&g,/^�!j�(��*n�"��Dr���tv\��y�W���ZPՋ]�J
�`�C;�d+<w�'gs5�Fj�/F�on$(Ʌ�q�"���t��Hx,x��{BV��`P�fcIy��e�BÆ�h�<�<k~5���nW//��q@(ՄFt2"߃�w2�?y�ɂ�|tU冚e�Or�h}H���j�BQ�m8;Ƅ}o�5{��q�/��tQ(߃v�#��y"i�U{k�}�U'�_k�Nۄm�Hz��o�A��Dq�;���s{5U��u`/�<wM(��y=#2��{$��~|�]�Z~�T��\qN\�4r�H�t\A���u�;V��w.5?�Wx�/� z)��{�#f��}逾~p����Sv\M逨w�Gŀ�x�Ap�ry�;.�Zz�5,�D{�/�*|�),�}�#��~�!����%��Sm@{�M�J|]GwJ}A:<}�;@~)5I~�/LS)ER�#�d�{R���)��pS~��M&~�G-~�vA +~��:�~9��5~b��/&~���)^~��#�~ς |�XI�$R�|߅vL�}��F�}��@�}#�S:�}Y� +5
}���/.}քd)s~� +�1rj�'�n��*s^���@N��}�Em�r�J��ug�O���\�T��Q�Y�RF�_��;�dC��1�ih�U'�nf��vs�c��>��}/C�r\I��gsN`�p\�S��Q�Y +M_��\?RΎ�Q�X?��F�]��<=c +�2hi�(.m��?�r��y�<�*|FA~��q}F��mf�L���\R�MQ�W���F�]�1<Yb���2/h�(Xmn�� ro�C�^�MՀZ`�Rt�b�VPh�eZ�]Jg�^�Q�jb�F?l�f�:�p j�/�s!n�%uv0ra�y/v-��Y�V�~�\?Y�s^�]ug�a�`�\;d�dRP�g�g�E�j�k:QnIna/�q�q�%tt�t��x0x +��UO_|�XEa�q�[Td�f^�gB[Ia�i�P:eQl�D�h�oL9�l�q�/Upat�%ss�w/
wOydž)Qug7{WT�iQpxX;kfe[�msZt_mosO�cBqrDsg5sm9�k9ui/"o2wl%qr�yhAv�{c��No'zQ�p�o_U�rd�YZszY�]_t�N�a�v'De�w|9Li�x�/n-z7%�r*{��u�}�^KDv�x�ONw�nnS_xdc�W}y&Y[�y�N{`z�C�d�{Y94h�|/.mY|�%�q�}��us~��OH�~6xM~fm�Qi~�cU�~�XvZO~�N^�~�C�cr9h,/Al�a&q�Nu��gF���w4K%�l�O���bpT]�(XY��M�]ă%C_b���9!gK�5/cl��&8p���t��9��DȌ�v}I���lKNR��a�S��W�W���M�\ԇmCZa��U9=f��@/�kz�2&pp(�8�tv�N�CU��u�H>�k�M(�|a�R��WpW�!M\
�qC\a��9[f�/�k �\&�oՄ�t=�9aB1�JudG0�k_L2��aHQ9��W=VN�RMg[k�C^`���9se��{/�j��6&�o��.t���gdtN'xee�RRmug�Vyb�i�Z�W�k�^�M!m�b�B@pEf�7r�j�-Au�n�#�xMr��z�vu��_�Vxv�a�Y�l&c�]MawfR`�V�h�dLakeg�A�nAj�7 qDnW-tDq�#�w#t��y�xB�[F^�ub]�aAj�`~c�`jcPf�U�f8i�K�i4lCA)lio6�o�q�,�st�#�vw?-y +��XwW��pCO��gKS��B^tW��qU�[w��M_��D�c̋c;�g�3�l �+�p�w#�sȄ�}w$�lrxp,Oh�q>R�_+rGV�U�sDZ�L�t{^�C�u�c:GwZg1yk(jz�o* b|zs'�~w p�k�V[g7mtY�]�n�\�T�pa`rK�q�c�B�s�g`9�u�j�0�wtna(nyiq� �{Tu`7}x�o%h]�e�i�`X\�k�cS�m�e�J�o�h�Bq�k�9As�n�0�vq�(qx7t� �zNww�|8zQm�d�d�d�f�f�[�h�iR�k;kZJm�m�A�o�o�8�r?rG0pt�t�(sw$w
�ygyl�{r{�l�a�k�c�dm<Z�f�n�R*ip�I�k�rYA1n.t8�p�u�0ds�w�(�v%y�!1x�{^Bz�}!k�^�rEca�sIZAdtt`Q�g:u�I%j +\j��X�_��=P�bу�HTf)�o@ii��8llۂ�0�p$��)4sV�L"vg�cy��h�W�4`�[#�:Xa^e�@PEa��HH.e3�i@Th���8kl8��0�o���)Vr�#":v�K�xׂ�h|V���`;Z +�dX]l��P`̌YHdk��@Ch��8jk��Z0�o8�)pr���"Yu҄_�x��5j&v4Oua4v�SiXuwhWeO�w�[iGsx�_n?y�c}6�z�g�./|k�&R}Yo�~�s�%�w�h�r1Vp_�s+Y�WTt*]*N�u/`�F�v^d>jw�g�6y +k'.z�n�&c|rWE}|u��~�yPgYnT][^�o�`&VHqb�Nr�e�E�th�=�u�k�5�w\n�-�yq�&qz�t�z|sw��}�z�f3kd +]�l�f\U�nfh�MQp0k
EArmk=rs�o�5�u�r@-�w�t�&~y�w<�{�y�6}&|ehj�\�jliT�lnAL�npD�p(q�=$rBs�5]tmu�-�v�w�&�x�y��z�{��|x}ed:e�p�\6g�r&T;i�s{LHlFt�Dyn�v$<�p�w�5Ls5x�-�u�zh&�w�{� +y�}T�{�~�cgc�v�[�e�w�S�h4x�K�j�ySD.m)z)<�o�{5>r%{�-�t�|�' +#d|�{��}�}z�~�T�qEs�N�r_t�H5s�vA�t�w=;ivExr5Uw�y�/3y{);ze|Z#�{�}� }~��~.� TCo{y'Np�y�G�rz�A�sz{N;Iu +y]P�V|J���ZDf�y]�>7�a58��d�2!��h�,,�NlB&h�p
!�s�ނ�wY��z�P�0\aI���_�Cꁠb�=́�e�7���h�1�l, ��o^&z��r�!.��u���y +9�{�O,1b.I[d�Cug�=nKj;7~�l�1��o�,�rn&��Nu?!V��w�S��z�~�D|�N}|wg�H�|�j&C|�lk=$}Dn�7N}�p�1�~;s,~�ui&�w�!��z��|&ʀ�~M�zmHcztoB�z�p�<�{r�71|(tz1�|�vO,5}jx5&�}�z!�~�{��M}��+M}xrOH +x�s�B{y5u:<�y�v�7z�w�1�{�yR,H|Wz�'}|I"}�}�~�~�`W�MvQwfG�v�x}B=w�y�<�x�zh7y|{[1�zz|U,^{_}a'-|=~l":}!bT~�6�~���L�t�|RGhu{}#Bv=}�<|w*~V6�xG~�1�ymm,yz}�'X{���"n|���}��_�~|��LTs��.G#t6��A�u��<cv�6�w?�(1�x��L,�y��o'}zꂆ"�|���}6�a�~+�DLrT��F�s"��A�t ��<Ou�Q6�vh�1�wЄ�,�y&��'�zo�0"�{����|�6}��I�P�DN�XU>Ì�Y,93��]D3���ag.V��e�)�xi�$ +�U};G#�af�BI��i�=P�yl8(�LnM3 +�0p�.*�s)J��u�$���w� �{zL���|gU��~FF +��r13��t$.7��v )n��x.$ɀz6 [��|�}����LFn~�p�A�~�r�<�~�t]7�~�u�2�-wh.Cnx�)�z�$��|@ ��}�4�
�\�1F}:u�A�}8w<�}Lxf7�}}y�2�}�z�.R~I{�)�~�}%+~�~B �~�Tmz�5��E�{�zSAJ{�{<�{�|~7�|}C2�|�~.g}1~�)�}��%a}�J!~_���~��KO{��E�zh~�Azl�<�z��T7�z��2�{��$.z|B��)�|ʁ�%�}I�!!B}ۂG�~��<v'�6ECy.�?@�yO��<ly���7�y���2�z���.�{���*|(��%�|Ń�!l}q�p�~=��~䂫A˗Q*=��U_8_��Y�3���]�.<a�*V��f9%��j�!��n����r�2v�džz<@ⓗV�<���ZV85��^3��>a�.��e�*��Ti}&(��ml!��RqS�u��xg�{k@z�S[�<R��_O8 +3�D|.��}+��~'H��#��D���̀E�8܀e��>�>|�;��}�7�q~�3
�k/��+=���'v́D#������� +�ւ��(? ���;��V7a��3�[/��+U8��'� �!#� �2 ,!�#~�� ˂� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~����������������������������������������������������������������������������������������������������������������������������������D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����D"��L<��SW��]t��b��c��e��f�߳h�ڳn�ղt�ұy�ϰ}�ͯ��ʮ��ȭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ����E"��L<��SW��]t��a��b��c��d��f�۷j�o�Զt�Ѷx�з|�̵~�Ʊ��������������������������������������������������������������������E"��L;��SW��\t��`��a���a��b��c�ݽe�ٿj���o�нs�ʹy�Ƶ�ò��������������������������������������������������������������������E"��L;��SW��\t��_���_���`��`��a���b���f���n�ʼt�ƹ{�ö�����ﱱ����E"��K;��RW��\t��]���]��^��^���_���^���g���o�żv�¹|����鹴�����������������������F"��K;��RW��[t��\���[��[���\���Z���]���h���q�½x���}㿸�粶}맴|||||||||||||||||���F!��K;��QW��[t��Z���Y���Y���Z���Q���^���j���s�yܾ�~᷹}嬷z袶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z뢶z���G!��K;��QW��Yr��W��V���W���O���R���`���lϿ�tֽ�zڻ�}ް�y⦹w垷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w螷w���G!��K:��PV��Wp��U|��S���R���D���T���bž�mμ�uԻ�zس�xܪ�uߠ�t♹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u䙹u���F ��J:��PV��Tm�Qw��Q}��B���F���V���dû�o˺�vѴ�vի�tأ�rܛ�qޕ�r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���r���F ��J9��OV��Ph��No��F|��A���I���Y���f���pȱ�qͪ�pѣ�oԜ�nו�nڐ�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�oې�o���E��I9��MU��L`��Ia��=��C���M���\���h���kĦ�jɟ�j̙�iϓ�iҏ�jԋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�lՋ�l���D��H8��KQ��FQ��8f��?���H���Q���^���c���c���c�cƎ�cȊ�dˆ�ē�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g̈́�g���B��F6��EC��2K��:j��C���M���V���Z���Z���[���\���\���]���^�~�`�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b�|�b��@��D4��81��3P��>k��H��R���S���R���S���T���U�~�V�{�W�y�Y�v�Z�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\���=��9"��,7��7R��Ci��Mz��N���M���L���L�}�N�x�O�u�P�r�Q�p�S�n�U�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W�l�W���8��!��/:��<Q��Hd��Hs��G��G���G�y�H�s�I�o�J�l�L�j�N�h�P�f�R�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T�e�T���;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G5��RN��\i��c|��e��h��k��o��s�ުz�ک��ק��Ԡ��Ҙ��ѐ��Џ��ɓ��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė��Ė����;��G4��RN��]i��b{��d��g���j��m��p�ޭw�۫|�ت��է��ҟ��Е��ϐ��Ė�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘�忘����;��H4��RN��]i��a{��c��e���h��k��n�߰s�ܯy�٭~�֫��Ө��М��Β�羙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙�繙����;��H4��RN��]i��`z��b���d��f��i��l��o�ݴv�ڳ{�ز��կ��ѥ�����鶚�겚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚�鲚����;��H4��SN��]i��_y��a���c��e��g��j��n�s�ݽy�ڽ�պ��ȯ�ಟ��쩚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚�멚����<��H4��SN��]i��^x��_���a��c��f��i���m���r���x���{���}־�ߨ��雤�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞�힞����<��H4��SN��]i��]w��^���`��b���d���h���m���u���w���{���~ָ�~ޞ�~蔵�뚨�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ�ꚨ����<��I4��SN��\h��\v��]���^��`���c���h���n���r���x���{���~ճ�}ޙ�z疸�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶�疶����<��I4��SN��[g��[u��[���\���^���c���h���h���o���u���zμ�}խ�zݘ�x䘹�䘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺�㘺����<��I3��SN��Zf��Ys��Y�Z���]���d���^���d���m���sȼ�xϸ�|֦�wݖ�v╻�◻�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ�ᗻ����=��J3��RM��Ye��Xq��W|��X���]���[���Z���c���l���sɸ�xЯ�w֠�tۓ�t���~����ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ��ߔ�����=��J3��RM��Wc��Un�Ux��W~��X���Q���X���c���l���sɲ�vϨ�s՛�qّ�rݏ�{ݐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ��ܐ�����>��K3��QM��T`��Rj��Sq��Vs��K���O���X���d���m���rȩ�pΟ�oӕ�n�pٌ�wڌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}ٌ�}���>��K2��PM��Q\�Pd��Pg��Fx��J���O���Z���e���m���lǟ�k̗�kА�kӊ�nՈ�sֈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�yՈ�y���?��J2��OL��NV��LY��Fb��D|��J���Q���\���g���g���fÕ�fȏ�fˉ�g΅�jЃ�oЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�sЃ�s���@��J1��MI��JL��FJ��?h��E��L���T���_���`���a���a���aÇ�bƂ�c��f�~�j�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n�}�n���B��H0��I?��C;��8P��@k��H���P���X���X���Y���Z���[���\��]�{�_�y�a�w�e�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h���C��G.��A/��18��9U��Cm��L��T���R���Q���S���T�~�U�z�V�w�X�t�Z�r�\�q�_�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b�p�b���A��A$��+ ��2=��<W��Gl��O{��M���L���L���M�z�N�u�P�q�Q�o�S�m�U�k�W�i�Y�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\�i�\��=��0��*'��5@��AV��Jh��Gv��G���G�~�G�v�H�p�I�l�K�i�M�g�N�f�P�d�R�c�T�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V�b�V���3 +����.*��:?��DR��Ab��An��Ay|�A�t�C�m�D�h�E�d�G�b�H�`�J�_�L�]�N�\�P�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R�\�R���2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]q��d��j��n���r��t��y���~�ݏ��ۈ��ك��������Ӈ��̋��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ��ʌ����2��?-��JF��U_��]p��e~��h��l���p��t��y��}�ݔ��ی��ن����ׄ��׆��Ί��Ȏ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ��Ǝ����2��@-��KE��U_��^o��d}��g���j��n��r��v��|�ޛ��ۓ��؋��օ��օ��щ��Ɏ�����ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ��ֿ�����3��@-��KE��U_��^n��b|��e���h��l��p��t��z�ߢ�ۚ��ؑ��ֈ��Ն��ˌ���ػ��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع��ع�����3��@-��KE��U_��_m��a{��d���g��j��n��r��w��}�ܢ��٘��ӌ��͈��Í�ۻ��ڵ��ڳ��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳��۳�����3��@-��KE��V_��^l��`y��b���e��i���l��p��t��{�ޫ��֠��ʔ���ܹ��ݳ��ݮ��ݭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ��ܭ�����3��@-��KE��V^��]k��_x��a���d��g��k��o��s��y�۱}�Χ���״��ݮ��ߪ��ߨ��ߧ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ��ާ�����3��A-��KE��V]��]j��^w��`���b��f��j��n���s���u�Էy�ǭκ��֬��ޢ��⠔�᠓�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ�ࠓ����3��A,��KE��V]��\j��]v��^���a���d��i���n���q���q�ͽv���|ͳ��դ��ݖ��㕘�㗕�☕�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ�ᘕ����3��A,��KE��V\��[i��[u��]���`��c���i���p���m���m���sù�y̬�}՝����㋡�㐚�����������������3��A,��KE��V[��Zg��Zs��\~��^���c���j���m���i���l���p²�u̥�yԕ�}܇��ᅮ�ጣ��������������������������������������������������������4��A,��LE��WZ��Xf��Yq��Z{��^���c���l���g���i���m���p���r˝�uӍ�xڃ��ށ��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊��݊�����4��B,��LE��WY��Wd��Wn�Yw��]|��d~��e���e���j���n���r���rʙ�r҉�sق��ۄ��چ��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه��ه�����4��B,��LD��VW��Ua��Vk��Xq��\t��^|��]���a���h���n���r���qɔ�pЈ�rֆ�}ֈՉÚԇՇՇՇՇՇՇՇՇՇՇՇՇ���4��B+��LD��TT��S^�Te��Vh��Ym��U���Y���]���e���l���m���lȎ�lφ�o҄�xӅĄ҇őчŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕЇŕ���5��C+��MD��QQ��QX��R\��U[��Ns��R���V���\���d���i���h���hlj�h̃�lρ�sρ�}ƈ̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj̓Nj���6��D+��ND��OL��NP��NO��Ga��Kw��P���V���]���b���c���c���dă�e��h�}�n�}�v�~ɀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ�~Ƀ���6��E*��N@��LD��JC��?M��Eg��K{��Q���W���\���]���^���_���`�~�a�z�e�x�j�x�p�x�x�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z�y�z���7��G)��K9��G8��?7��>S��Ek��L~��S���W���V���W���X���Z�|�[�x�^�u�a�s�e�s�j�s�q�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s�s���9��I(�F.��=%��7>��>X��Gm��O~��S���Q���P���R��S�y�U�u�W�r�Y�o�\�n�_�m�d�l�i�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k�l�k���;��F#��<��-(��8C��AZ��Jm��N{��L���L���L�|�M�v�O�q�Q�n�R�k�U�i�W�h�Z�g�^�f�b�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c�f�c���>��<�� ��1.��:E��EY��Ij��Gw��G���G�{�H�s�H�m�J�i�L�f�N�e�P�c�R�b�U�a�X�`�[�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]�`�]���=����'��40��>D��BV��Ae��Aq��Azy�B�q�C�j�E�f�F�b�H�`�J�^�L�]�N�\�P�[�R�Z�U�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V�Z�V���!�� ��,��70��;A��:P��:^��;hx�<qo�=xh�?}c�A�_�B�\�D�Z�F�Y�H�X�J�W�K�V�N�V�P�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q�U�Q���*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��Wf��^t��c���i��m��q��v��|�あ��z���w���w���w���x���z���|��Ӏ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ��σ����*��8&��D>��OU��We��^s��d���i��m��p��u��{�ㅁ��}���y���x���x���z���{�����σ��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅��˅����*��9&��D=��OU��Wd��^q��d~��i���m��p��s��z�㋀������|���y���z���{�����τ��ȇ��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç����*��9&��D=��OU��Wc��^p��e}��h���l��q��s��x��~�����ހ���{���{���}��Ѓ��Ȉ�����˽��˽��˽��˽��˽��˽��˽��˽��˽��˽��˽��˽�����*��9&��D=��OU��Wb��_o��c{��f���j��o���s��v��}�Ꮓ�ޅ���}���}��ҁ��Ȇ�����ͺ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ��ͷ�����+��9&��D=��OT��Wa��_m��by��e���i��m��q��u��z�◂�ٍ��Ѓ��ˁ��Ƀ�����к��ϴ��б��б��б��б��б��б��б��б��б��б��б��б�����+��9&��D=��OS��X`��^l��`x��c���g���k��o��s��y�ݠ��є��NJ�����Ҿ��Ҹ��ҳ��Ү��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ��Ҭ�����+��9&��E=��OS��X_��]k��_v��b���e���i��n��s��y�֥~�˛�����ͷ��ӳ����Ԭ��ԩ��ԧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ��ӧ�����+��:%��E=��OR��X^��\j��^u��`��d��i��n��s�ݳv�Ѫ{�š�ù��̯��ө��֧��֤��֢��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա��ա�����+��:%��E=��OQ��X]��[h��]s��`}��d��h��n��p�ظr�̯x���~ó��̨��ԟ����؛��؛��כ��֛��֛��֛��֛��֛��֛��֛��֛��֛��֛��֛�����+��:%��E=��OQ��X\��Zg��\q��_z��c���h���o���l�ҽp�Ƶv���{��ˡ��ӕ��ِ��ڑ��ڒ��ٔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ��ؔ�����+��:%��E=��OP��X[��Ye��[o��^w�b~��h���k���h���m���s���x���}ʚ��ӌ��ن��܆��ۊ��ڌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ��ٌ�����+��:%��E=��OO��WY��Xc��Zl�]s��bx��i{��e���e���j���p���t���yɒ�}҅�����ڀ��ن��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇��؇�����+��:%��E=��OM��UW��W`��Yh��\n��bq��ex��^���b���g���l���p���tȊ�x��~�{���z��Ճ��ԃ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ��Ճ�����,��;%��E<��PL��TU��V]�Xc��\f��ce��^w��_���a���d���g���k���nǂ�r�y�{�w���vâ�~�����������������������������������������,��;$��F<��PI��SQ��TX��V\��[[��Zf��^x��a���b���d���g���h���i�|�m�w�w�wƆ�xǗ�yȩ�z���z���z���z���z���z���z���z���z���z���z���z�����,��;$��F<��QF��RM��RQ��TQ��SX��Ul��Y~��\���_���d���e���f���f�{�k�y�t�zʀ�{ˎ�|˝�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥�y˥���-��<$��F<��PB��OF��OF��NG��M^��Rr��V���Z���]���_���`���a��c�x�g�v�o�v�y�ẅ́�x͐�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ�yΙ���-��=#��H8��N<��K<��J7��EM��Kd��Ow��T���Y���Y���[���\���]�z�_�u�d�s�j�r�r�s�{�tЅ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ�tЍ���.��>"��L2��J3��E.��=;��DS��Ih��Oz��U���V���T���V���W�{�Y�u�\�q�`�o�e�n�k�n�s�o�|�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ�oӂ���/��?"��I)��C%��3'��<A��CX��Jk��Q{��R���Q���P���R�z�S�t�U�o�X�l�[�j�`�i�e�i�k�i�r�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x�i�x���0
��A �B��1��4.��=F��D[��Ll��Mz��L���L���L�y�M�r�O�m�Q�i�T�g�W�e�[�d�_�d�d�d�j�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n�d�n���2��B��1��)��63��?H��H[��Gj��Fw��F���G�x�H�p�I�j�K�f�M�c�P�b�S�`�V�_�Y�_�]�^�b�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e�^�e���4 +��2����. ��95��BH��AY��@f��Ar�B{v�C�n�D�h�E�c�G�`�I�^�L�\�N�[�Q�Z�S�Y�W�Y�[�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]�Y�]��1�� ��#��2"��;5��:E��9T��:`~�<ju�=rl�>yf�@}a�B�]�D�Z�F�Y�H�W�J�V�L�V�N�U�Q�T�T�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V�T�V��� +��6��F#�F!��>��9)��B@��HU��Mg��Rv��P���P���P�{�Q�s�S�l�W�g�[�e�b�d�i�d�p�e�y�eۃ�fی�fی�fی�fی�fی�fی�fی�fی�fی�fی�fی���& ��8��F��;��-��:0��BE��HX��Mi��Kw��K���K�|�L�s�M�l�P�g�S�d�W�b�]�a�b�a�h�a�o�a�x�a��a��a��a��a��a��a��a��a��a��a����'��:��;�� +��1��;5��CH��HZ��Fi��Fu��F|�G�s�H�k�J�e�L�b�O�_�S�^�W�]�\�\�a�\�f�\�m�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t�\�t���(��:����$��4#��>8��AI��@Y��@f��Aq|�Bzs�C�k�D�e�F�`�I�]�L�[�O�Y�S�X�V�X�Z�W�^�W�d�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i�W�i���'�� + +��*��70��CC��KN��QZ��Wf��]r��b}��g���n��zv��r��k���g���g���g���i���k���o���s«�vê�x«�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�y¬�� +��*��70��CB��JM��QY��Wd��\p��a{��f���l��t��w}��n���i���g���h���j���n���r���v���y���z���{���{���{���{���{���{���{���{���{���{���� +��*��8/��CA��JK��PW��Vb��\n��ay��f���k��r��|{��s���m���k���m���o���q���u���y���{���|���|���|���|���|���|���|���|���|���|���|���� +��*��8/��B@��JJ��PU��W`��\k��av��f��k��p��y��{���s���p���p���r���s���w���{���}���~���~���~���~���~���~���~���~���~���~���~���� +��*��8/��B?��II��QS��X^��]i��bs��f}�k��p��x�ۄ���z���u���t���u���w���z���}��������������������������������������������������� +��*��8/��B>��JG��QQ��X\��^f��cp�gz�k��p�ޖx�Ջ~�́���z���x���y���z���|������������������������������������������������������� +��+��8/��B=��JF��RO��YY��_c��dl�hv�l�p�؛v�ϒ|�ň�������|���|���~����������������������������������������������������������� +��+��8/��B<��KD��SM��ZW��_`�ci�fq�kyݩn�ӡs�ɘz������������������������������������������������������������������������������ ��+��8/��B;��KC��TK��[T��^]�ae�fl�iuحj�Φq�Ğw���}��������������������������������������������������������������������������� ��+��8/��B:��LA��TI��ZQ��]Y�``�efdtӲh�ɪo���u���z�����������Ô��Ē��đ��Đ��Ñ������������������������������������������� ��+��8/��B8��L@��UG��YN�\U�_Z�d_ڽ`s϶f�įm���s���x���}��������ĉ��LJ��dž��Ƈ��ƈ��ĉ��É��É��É��É��É��É��É��É��É����� ��+��8.��C7��M>��VD��XJ�ZP�^S��_^��]qʻd���j���p���u���y���~��������}���{���}��ǀ��Ƃ��ł��ł��ł��ł��ł��ł��ł��ł��ł����� ��+��8.��C5��N<��UA��VF�YI��^J��W]��[p��b���h���m���r���v���z��~�v���t���s���v���y���{���{���{���{���{���{���{���{���{���{����� ��,��8-��D3��O9��S=�U@��WA��ZE��Q[��Yn��_��e���i���n���r���u�x�z�p���o���n���p���t���v���v���v���v���v���v���v���v���v���v����� ��,��9+��E1��P5��Q8��R9��V6��PC��PY��Vm��\}��a���f���i���m�|�p�q�v�l���k���j���j���p���q���q���q���q���q���q���q���q���q���q�������,��9)��F-��P0�O1��O.��S)��PA��RW��Tj��X{��]���a���d��g�s�k�j�s�g���f���f���eö�k���l���l���l���l���l���l���l���l���l���l�������-��:&��G)��M*��K'��K ��J.��R@��VT��Wh��Wy��Y���[���]�v�`�j�e�d�o�b�~�aЏ�aҠ�`Գ�e���fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�fĿ�����-��;"��I#�H!��D��?!��H5��OG��SZ��Vk��Vy��U���U�y�V�l�Y�d�`�a�l�a�z�bۈ�bܖ�cܥ�cݷ�a�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩa�Ĩ����-��<��H��A��2��?'��G;��LN��Q`��Qo��P|��O�}�P�q�R�h�V�b�\�_�f�_�q�_�|�`އ�`ߔ�aࢢaaaaaaaaaa����.��=�@��/��4��?.��FA��KS��Mc��Kq��J}��K�u�L�k�N�d�R�_�X�]�_�\�h�\�q�\�{�\⅞]㑝]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜]㛜����/��>��-��%��6��@3��FE��GV��Ee��Eq��F{w�G�m�I�e�K�_�O�\�T�Z�Z�Y�a�X�h�X�p�X�x�Y悖Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕Y犕����.��/����+��9$��A7��BG��@W��@d��Aox�Bxn�Cf�E�`�H�[�L�Y�P�W�U�V�Z�U�`�U�f�T�l�T�u�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|�T�|����! +��'��)%��)3�+?u�.Ik�0Rc�3Y\�5_W�8cS�;fP�=hN�@jM�CkK�FlJ�IlI�LlH�OlH�RmG�VlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�ZlF�Zl�� +�� ����!~�!-s�$7i�'@a�*HZ�-NT�0RP�3VM�6XK�9ZI�;[G�>\F�@]E�C^D�F^C�H^B�K^A�N^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^A�Q^�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�}2*�x@>�~GI��MU�Tb�zZm�sbx�mk��et��`~��\���Z���Z���Z���[���[���\���]Õ�`ǔ�cɔ�f˓�iΓ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�kГ�� +��#�~2*�z?=��FH��MT��S`�~Yl�w`w�pj��is��b|��]���[���Z���[���[���\���]���^Ė�bǖ�eɖ�h̕�kϔ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�lѕ�� +��#�2*�~><��EG��LR��R^��Xj�}_u�vg��np��fy��`���]���\���\���]���]���^���bř�eǘ�iʘ�l͗�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�nИ�� ��#��2*��>;��EE��KP��Q\��Wh��]s�{d~�sm��kw��c���_���]���]���^���_���`�eś�iț�l̚�oϚ�pΛ�q͜�q͜�q͜�q͜�q͜�q͜�q͜�q͜�q͜�� ��#��2*��=9��DC��KN��QZ��We��]q��b|�yk��pt��g~��a���_���_���`���b���d���hƝ�lʝ�o͜�q̝�r̞�s˟�s˟�s˟�s˟�s˟�s˟�s˟�s˟�s˟�� ��#��2*��<8��CB��KL��QW��Wc��]n��by�i��wr��n{��f���c���c���e���f���h���kȟ�o˟�r˟�sʠ�uʡ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�uɢ�� ��#��2)��<7��D@��LJ��RU��X`��]k��bv�g��~p��uy��m���h���h���i���j���k���mɢ�rɢ�uɢ�vȣ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ�wǤ����$��2)��;5��D>��LH��RR��X]��]h�br�g}�o��~w��u��n���l���l���n���o���pĦ�tƦ�wƦ�xƦ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ�yŧ����$��2)��;4��E=��LF��SO��XY��]d�bn�gy�n�݇w��}}��u���q���p���q���s���t���vĩ�yĩ�zĩ�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê�{ê����$��2)��;3��E;��MC��SL��YV�^`�bj�gtߘo~֎u�΅{��|���v���t���u���v���w���y¬�{¬�|¬�}���}¬�}¬�}¬�}¬�}¬�}¬�}¬�}¬�}¬����$��2)��<1��E9��MA��TI��ZR�_[�ce�gnڝl|єs�Ȍy���~��|���y���y���z���{���|���~���~������������������������������������$��2)��<0��F7��N?��TG��ZN��`W�d_ުfjբjz̚q�Òw���|������~���}���}���~���������������������������������������������������������$��1(��</��F6��N=��UC�\J�_Q�cXۮbhѦhyǟo���u���z����������������������������������������������������������������������������$��1'��=-��F4��O:��V@�ZF�]L�`Tֲ_g̫fw¤m���s���x���|�������������������������������������������������������������������������$��1&��=,��F2��O7��W=�YA�\EݻZRҶ]eȯdv��k���p���v���z���~���������������������������������������������������������������������$��1%��=*��G0��P4�U8�W;�[=��TQκ[dôbu��h���n���s���w���{�����|���z���x���w���y���|���~���~���~���~���~���~���~���~���~�������$��1#��=(��G-��Q0�S3�U4��U:��QOɿYb��`s��f���k���p���t���x�}�}�t���q���p���o���r���t���v���v���v���v���v���v���v���v���v�������$��2"��>&��H)��Q,��Q,��S+��K8��OM��W`��]q��c���h���l���p���t�v�y�m���k���j���j���m���o���p���p���p���p���p���p���p���p���p�������%��2 ��>#��I%��N%��N$��O ��D6��MK��T^��Zo��`~��d���h���l�z�o�o�u�h���g���f���f���g���k���l���l���l���l���l���l���l���l���l�������%��3��>��J �J��H��@��D4��KH��Q\��Wm��\|��`���c�}�f�q�j�h�q�c�}�b���b���a���a�«f�¬g���g���g���g���g���g���g���g���g�������%��3��?��I��D��?��D��J1��ME��OY��Sj��Wy��Z���]�t�`�i�d�a�m�_�{�^Nj�]ɜ�]ʬ�\�¤`�Ǥb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀb�Ʀ����%��3��?�B��8 ��7��C!��L3��QE��TV��Rg��Sv��U�v�W�j�Y�`�_�\�j�Z�y�Zو�Yڙ�Yܩ�Yݽ�[�͜\�̝\�̝\�̝\�̝\�̝\�̝\�̝\�̝\�̝����&��3��?��5��&��8��C(��J:��NK��N[��Mj��Mwx�N�l�O�a�R�Z�Y�W�d�V�r�V倘W掖W睕W笔W���X�˓X�˓X�˓X�˓X�˓X�˓X�˓X�˓X�˓����%��1 ��6����+��:��C.��I?��HP��H_��Gk{�Hvo�H�d�J�]�O�X�U�U�^�T�h�T�t�T��TꋐT똏T릍T챍T챍T챍T챍T챍T챍T챍T챍T챍����#��*��
+�v�s-%�|60��>9��FC��MN��SY��Ye�x`p�piz�gs��`}��\���[���\���]���^���`���aˍ�eӍ�h�j؎�k֏�m�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�mՐ�z +�x�u-%�5.��?7��FA��MK��SV��Ya��_l�wgw�np��fz��a���_���`���a���c���d���eɐ�gԐ�k�mՑ�nԓ�oӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�pӔ�{ +�y�v-$��5-��?5��G>��MH��SR��Y]�^i�~et�wn~�nw��h���d���d���e���f���g���hĕ�jҔ�nҔ�pҕ�qі�rї�rї�rї�rї�rї�rї�rї�rї�rї�| +�z�x,#��5+��?3��G;��NE��SN��YY�^d�do�mz�xu��o}��j���h���i���j���k���l���mϙ�pЙ�rϙ�sϚ�tΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�uΚ�} �{�{+"��5)��?1��G9��NA��TJ�YT�^_�cj݉luրs��wz��p���m���m���n���o���p���qȜ�s͜�u͝�v̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�w̝�} �{�}*!��6(��?/��G6��N>��TF�YO�^Y��ddؐkrЇq��x��w~��s���q���r���s���t���u���vʠ�xʠ�xʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�yʠ�~ �|��* ��6&��@-��G3��N;�TB�YJ�^Sܞc`Ӗipʎo~u��{��y���v���v���v���w���x���yȣ�zȣ�{ȣ�{ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ�|ȣ� �}��*��6%��@+��H1��N7�T>�YE�^Lآ`^Λhnœn}��s���y����{���y���z���{���{���|Ƨ�}Ƨ�}Ʀ�}Ʀ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ�}ǥ� �~��*��6#��@(��H.��O4�U9�Z?ݭZIӧ^\ʠfm��l{��r���w���|������}���}���~���~���ª�Ī�ĩ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ�Ũ���~��*��6!��@&��H+�O0�U4�Y8ٱUHϪ\[Ťdk��jy��p���u���y������������������������������¬��ê��ê��ê��ê��ê��ê��ê��ê��ê�����*��6 ��@$��H(�O+�U.�V2մRFˮ[Y��bi��hx��n���s���w���|��������������������~�������������¬��¬��¬��¬��¬��¬��¬��¬������*��6��@!��H$��P&�R(ܼO1ѸQDdzYW��`h��fv��l���q���u���y���~�z���w���v���t���t���v���y���z���z���z���z���z���z���z���z���������*��6��@��H �O �O ��F/ͽOC·WU��^f��du��i���n���r���v�{�z�r���n���m���l���l���n���q���r���r���r���r���r���r���r���r���������*��6��@�H�K��I��D-��MA��US��[d��as��f���k���o���s�t�w�k��h���g���g���f���i�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬k�¬������*��6��?�H��E��9��B*��K>��RQ��Yb��^p��c}��g���j�x�n�m�s�f�}�c���c���b���b���e�Ʀf�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũg�Ũ������*��5��?�B
��;��3��?(��H;��ON��U_��Zn��^{��b�{�f�p�i�f�p�a�{�_���_���^���^���`�ˠb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢb�ɢ������*��4
�= +��7��!��4��>$��E8��LK��R\��Vk��Zx~�]�r�`�g�d�_�l�\�x�[���[���Z���Yº�Z�И]�Ϛ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ]�Λ������) +��2�6�� +�o�}$��/��9��A#�G(�M.�S4ڢVAЛ]SȔec��kq��p~��v��{|��w���v���w���w���x���x���yΛ�yΚ�yϚ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�u +�p�$��/��8��@ �G$�M(ߪR-֦S?̠\QÙca��io��n|��t���y��|��z���z���z���z���{���{̞�{̞�{͝�{͜�{͜�{͜�{͜�{͜�{͜�{͜�{͜�u +�q��$��.��8��@��F �L#ܮM*ҩR=ȤZO��a_��hn��mz��r���v���|��~���}���}���}���~���~ɡ�~ʡ�}ˠ�}̞�}̞�}̞�}̞�}̞�}̞�}̞�}̞�v +�r��#��.��8��?�F�KٲG(έP;ĨXM��`]��fl��ly��p���t���y�����������~���|���{�ä{�Ȥ}�ɢ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ~ʡ�w +�s��#��.��7�>�DߵIԵE'ʱN:��WK��^[��dj��iw��n���r���v���{�x���u���s���r���p���q�Ʀt�Ǥv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢv�ɢ�x �v��#��-��6�=�Bۺ@йC%ƵM8��UI��\Y��bh��gu��l���p���t�y�x�p��k���j���i���h���i�ǥk�Ǥn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣn�ȣ�x �y
��"
��-��5�;�> +��5˾A"��K5��SG��YW��_f��ds��i��m�}�q�r�u�i�|�e���d���d���c���d�ʡe�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡg�ɡ�z �}��"��+��3 �7��4��2��? ��H3��PD��WT��\c��ap��e|��i�v�m�k�r�d�z�a���`���`���_���_�͛a�͜c�̝c�̝c�̝c�̝c�̝c�̝c�̝c�̝�{�� +��!��)�/�.����/��<��F0��MA��TQ��Y`��]n��ayy�d�n�h�e�n�_�x�]���\���\���[���[�˔\�ҕ^�ї^�ї^�ї^�ї^�ї^�ї^�ї^�ї�}���� ��%�%�� +��9��B,��J>��PN��U]��Yj|�\vq�_�f�c�^�j�Z�v�Y���X���X���W���W�ʌW�ٌY�֏Y�֏Y�֏Y�֏Y�֏Y�֏Y�֏Y�֏������� +� +r�h�^�#V� *N�#1H�&5C�*9>�-<;�1>9�6?7�:@4�?A2�DA1�IA/�OA.�UA,�[A+�b@)�k@)�k@)�k@)�k@)�k@)�k@)�k@)�k@�� +����"�'�(ڶ"ϸ1 +Ķ>��H+��P;��WK��]Y��bf��gr��k}{�o�p�s�g�y�c���a���a���`���`�ǖ`�іb�іc�іc�іc�іc�іc�іc�іc�і�o +�|�����!� +������� +��8��?)��E8|�IFr�LSg�P_^�ShV�YoR�brP�nrO�{qNЊpNњoMҫmLӾlL��kK��lL��nL��nL��nL��nL��nL��nL��n��� +|�#r�(h�+)_�.2V�19O�4?I�8DE�=HA�BJ=�HK:�NL8�VL6�_K4�iK3�uJ1��I/��H/��H.��G.��G.��G.��G.��G.��G.��Gǯ +o�f�]�#$U�'+N�*1H�.6B�2:>�6<;�;>8�@?5�E@2�L@0�S@.�[@-�d?+�n?)�x>'��>&��=&��=&��=&��=&��=&��=&��=�� +c�Z�R�L�"E�"'@�&+;�*.7�.04�212�72/�<3,�A3*�G4(�M3&�U3$�\3"�d2 �m2�t2�t2�t2�t2�t2�t2�t2�� +X�P�H�B�<�7�!3� "0�#$-�'$+�+%)�0%&�4%#�9&!�?&�E&�K&�Q%�X%�^%�^%�^%�^%�^%�^%�^%�M�D"�<- �A0"�F8*�GB5�EL>�AVE�=aK�:nN�8zP�7�P�7�P�7�P�8�P�9�P�9�O�:�O�;�O�<�N�<�N�=�M�>�M�?�L�B�L�D�K�G�K�G�K�G�K�G�K�G�K�G�K�G�K�N�E"�?+�E."�I6*�K@4�JK=�EUF�A_L�=kP�;xQ�:�R�:�R�:�R�;�R�<�R�<�Q�=�Q�>�P�?�P�?�P�@�O�A�O�B�N�E�M�G�M�I�N�I�N�I�N�I�N�I�N�I�N�I�N�O�F!�B)�H-!�N5)�P?3�NI=�ISE�E]L�AiQ�>uS�=�T�=�T�=�T�>�T�?�S�?�S�@�S�A�R�B�R�B�Q�C�Q�D�P�E�P�H�O�J�O�K�Q�L�Q�L�Q�L�Q�L�Q�L�Q�L�Q�Q�G!�E(�L+�S4'�U>1�SG;�ORE�I[M�EfR�BrU�A~V�@�V�@�V�A�V�B�U�C�U�C�U�D�T�E�T�F�S�G�S�H�R�H�Q�K�Q�L�R�N�T�O�T�O�T�O�T�O�T�O�T�O�T�R�H �I&�Q)�Y3%�[=/�YF9�UOC�OYL�IcS�FoW�DzX�D�Y�D�Y�E�X�F�X�G�W�G�W�H�V�I�V�J�U�K�U�L�T�M�T�N�U�P�V�R�X�R�X�R�X�R�X�R�X�R�X�R�X�S�J �N$�W(�`2#�c;-�aD7�\MA�VWK�P`S�KkX�Iw[�H�\�H�[�I�[�J�[�K�Z�L�Z�M�Y�N�X�O�X�O�W�P�W�Q�W�R�Y�T�[�U�\�V�\�V�\�V�\�V�\�V�\�V�\�U�K�S!�]'�f1 �j:)�iC3�dK=�^TH�W]R�QhY�Nr]�M}^�M�^�N�^�O�]�P�]�Q�\�R�\�R�[�S�Z�T�Z�U�Y�T�\�V�^�X�_�Y�a�Z�a�Z�a�Z�a�Z�a�Z�a�Z�a�V�M�X�d&�m0�q9&�pA/�mI9�fQD�_[O�XdX�So^�Rya�R�a�R�a�S�`�T�`�U�_�V�_�V�_�W�_�W�_�Y�_�X�a�Z�c�[�d�]�e�]�e�]�e�]�e�]�e�]�e�]�e�W�O�]�i%�r/�w8"�x@*�uG4�oO?�gXJ�aaU�[k^�Wuc�V�d�W�e�W�e�X�e�X�e�Y�e�Z�e�Z�e�[�e�\�e�\�f�^�h�_�i�`�j�a�j�a�j�a�j�a�j�a�j�a�j�X�S�b�o$�x.�}7�~>%�|F/�xM9�rVD�k_P�dh[�^qd�[zh�[�j�[�j�\�j�\�j�]�j�^�j�^�j�_�j�`�j�`�k�b�m�c�m�d�n�d�n�d�n�d�n�d�n�d�n�d�n�Z�W�g�s#�}-��5��=!�D)�L3�{U=�u]J�leY�fmd�auk�`~n�`�o�`�o�`�o�a�o�b�o�b�o�c�p�c�p�d�p�e�q�f�r�g�r�g�r�g�r�g�r�g�r�g�r�g�r�[�[�k�w#��+��4�<�C#�J,ڄT7�|[G�ucV�njc�hql�ezq�d�s�d�t�d�t�e�t�e�t�f�t�f�t�g�u�h�u�i�u�i�v�j�v�j�v�j�v�j�v�j�v�j�v�j�v�\�^�o�{"��*��3�:�AݎI$ԉR4̃ZD�|aS�ug`�onk�kur�i}v�h�x�h�y�i�y�i�y�j�y�j�y�k�y�k�y�l�z�l�z�m�y�m�y�m�y�m�y�m�y�m�y�m�y�\�b�r�~"��)��1�8�?ٔG ЎP1ljXA��_P�|f^�vlj�qrs�nyy�l�{�l�}�l�}�m�}�m�}�m�}�n�}�n�~�n�~�o�}�o�}�o�}�o�}�o�}�o�}�o�}�o�}�]�e�u��! ��( +�/�6ޚ=E̓O/ÎW?��^N��d\�}jh�wor�svy�q}~�p���o���p���p���p���pÂ�q�q၌q။qဋqqqqqq��^�g
�x +�� ��&�- �3 +۞8
ћDȗN-��V=��\K��bY��hf�}mp�ysy�uy��s���r���r���s���s���s���s҆�sޅ�s߄�s߃�s���s���s���s���s���s���_�j�{����%�+�/آ5͟BěL+��U;��[I��aW��fd��ko�~px�zu��w}��u���u���v���v��~v��}v͊|vۉ}v܇}u݆~u݆~u݆~u݆~u݆~u݆~u݆�`�m�}����"�'ޣ*ԥ3 +ɣ@��K(��S8��ZG��`U��ea��jm��nw�s��{y�}y��zy��xy��vy��uy��szȍszٌtyڊvxۉvx܈vx܈vx܈vx܈vx܈vx܈�a
�p +�������"ۧ!Ш1 Ŧ?��I&��R6��YE��_R��d_��hk��lu��p{�u�t~}�p}��n}��m~��k~��j~ďil}ٍn|ڋn|ڋn|ڋn|ڋn|ڋn|ڋn|ڋ�b
�s������ + +��<��E'��K6��QC�UPv�Y\m�]fc�bo\�hvW�qyU�}zT��yT��wS��vR��uR��sQ��tR��vR��wR��wR��wR��wR��wR��w�x�� +m� d�%\�*#T�.*M�21G�66B�;9>�A<;�G=8�N>6�V>4�_=3�j=1�w</��;.��:.��9-��9-��8-��8-��8-��8-��8-��8¯ +b�Y�R�!K�&#E�*(@�.,;�3/8�915�>22�D20�K3.�R3,�[2*�e2(�p1&�|0%��0#��/#��/#��/#��/#��/#��/#��/�� + +W�O�H�B�=�!8�%"4�)#1�.$.�3%,�8&)�>&'�E&%�L&#�T&!�]%�f%�o$�z$�}#�}#�}#�}#�}#�}#�� +L�E� >�
8�4�0�,�)�"'�'$�+!�0�5�;�B�I�Q�X�`�c�c�c�c�c�c�@�7%�5,�9/ �;5$�=@+�;K4�9V:�6b=�5o?�3{@�3�@�3�@�3�@�4�@�5�@�5�?�6�?�6�?�7�>�7�>�8�>�9�=�:�<�:�<�;�;�<�;�<�<�<�<�<�<�<�<�<�<�<�<�A�8$�8*�<,�>3#�A>+�?I4�<T:�9`?�7lA�6xB�5�B�5�B�6�B�7�B�7�A�8�A�8�A�9�@�:�@�:�?�;�?�<�>�<�>�=�=�>�=�=�=�?�?�?�?�?�?�?�?�?�?�?�?�B�9$�;(�@*�C2"�E=+�DH4�@R;�=]@�;jB�9vD�9�D�8�D�9�D�:�C�:�C�;�C�;�B�<�B�=�A�=�A�>�@�?�@�@�?�@�?�@�?�@�@�B�A�B�A�B�A�B�A�B�A�B�A�C�:#�?%�D(�H1!�J;)�IF3�FP;�B[A�?gD�=sF�<~F�<�F�=�F�=�E�>�E�?�E�?�D�@�D�A�C�A�C�B�B�C�B�D�A�D�A�C�B�D�D�F�E�F�E�F�E�F�E�F�E�F�E�D�;#�C#�I'�O/�Q9'�OD1�LN:�GXA�CcF�AoH�@zI�@�I�A�H�B�H�B�H�C�G�D�G�D�F�E�F�F�E�G�E�G�D�H�C�H�E�G�G�H�H�J�I�J�I�J�I�J�I�J�I�J�I�E�>!�G!�Q%�V.�Y8%�WA.�SK8�NUA�I_G�FkJ�EvL�E�L�E�K�F�K�G�J�H�J�H�I�I�I�J�H�K�H�L�G�L�F�L�G�L�J�K�K�M�M�N�N�N�N�N�N�N�N�N�N�N�N�G�C�M�W$�]-�a6!�_?+�[H5�UR>�P\G�LfL�JrN�J}O�J�N�K�N�L�M�M�M�M�L�N�K�O�K�P�J�P�J�Q�J�Q�L�P�O�P�Q�R�R�S�S�S�S�S�S�S�S�S�S�S�S�H�G�S�^#�e+�h4�h=&�dF0�^O:�WXD�RbL�OmP�OxR�O�R�P�Q�Q�P�Q�P�Q�P�R�P�R�P�S�P�S�P�T�Q�U�R�T�T�U�V�V�W�W�X�W�X�W�X�W�X�W�X�W�X�J�K�Y�d"�k*�o2�p;!�mC*�gL5�aV@�[_J�ViQ�TtT�T~V�T�V�T�V�U�V�U�V�V�V�V�V�W�W�W�W�X�W�Y�X�X�Z�Y�[�Z�\�[�\�[�\�[�\�[�\�[�\�[�\�K�P�_�j!�q(�v1�w9�uA$�pI/�kT:�d]E�^eQ�ZoX�Xx[�X�\�X�\�Y�\�Y�\�Z�\�Z�]�[�]�[�]�\�]�]�]�]�_�]�`�^�a�_�a�_�a�_�a�_�a�_�a�_�a�M�U�d�o
�w'
�|/�~7�}?�yH'�uR3�mZB�fbO�ajY�^s^�]|a�]�b�]�b�]�b�^�b�^�b�_�b�_�b�`�c�`�c�`�d�a�e�b�e�c�e�c�e�c�e�c�e�c�e�c�e�N�Y�h�t�{&��,
�5�=ۂG �|P0�uX?�n`M�hgX�do`�bwe�af�a�g�a�g�b�g�b�g�c�h�c�h�c�h�d�h�d�i�e�i�f�i�f�i�f�i�f�i�f�i�f�i�f�i�O�\�l +�x ��$�* +�2
ߊ:ևDN,�|V<�v^J�pdV�kk`�gsg�f{j�e�k�e�l�f�l�f�l�f�l�g�m�g�m�g�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�h�m�P�`
�p �{��"��(�/ ۏ7ҌCɇM*��U9�|\G�wbT�qh_�mog�kvl�i~o�i�p�i�q�i�q�i�q�j�q�j�q�j�r�j�r�k�q�k�q�k�p�k�p�k�p�k�p�k�p�k�p�Q�c�s�~��!�%�+ؓ4 +͐AŌK'��S6��ZD�}`Q�xf]�slg�psn�mzr�l�t�l�u�l�u�l�u�l�u�l�v�m�v�m�v�m�u�m�t�m�t�m�t�m�t�m�t�m�t�m�t�T�f +�v�����"ޕ&ӗ3 ʔ@��J%��R4��YB��_O�~e[�yje�ton�qvt�o~w�o�x�o�y�o�y�o�z�o�z�o�z�o�z�p�y�o�x�o�w�o�w�o�w�o�w�o�w�o�w�V�i �x����ڙ К1Ƙ?��I"��Q2��X@��^M��cY�~hc�zmm�vrt�syy�r�|�q�}~r�}}r�~{r�~yr�~xr�~yr�|yr�{zr�zzr�zzr�zzr�zzr�zzr�z�Y
�l�{��� + + +��?��H$��O2��U?��ZK��_Wx�cbo�glf�ku^�r{Z�|~Y��}X��|X��{W��yV��xU��xV��yW��zW��zW��zW��zW��zW��z�l�~� +^� +V�O�H�!B�&<�* 8�/"5�5$2�;%/�A%-�H%+�Q%)�Z%(�e$&�q#$�~#"��"!��!!��!!��!!��!!��!!��!!��!�� +�a�i�i�i�i�i�i�3�*)�-*�0-�04 �1?$�0K(�0W,�/c/�.o0�-{1�,�1�-�1�-�1�.�1�.�0�/�0�/�0�0�/�1�/�1�/�2�.�2�.�3�-�4�,�4�,�4�,�3�-�3�.�3�.�3�.�3�.�3�.�4�*(�0(�3+�43 �5=$�4I)�3U.�2a1�1m2�0y3�/�3�0�3�0�2�1�2�2�2�2�2�3�1�3�1�4�0�4�0�5�0�5�/�6�.�7�.�7�-�6�.�6�0�6�0�6�0�6�0�6�0�6�0�5�,'�3&�7(�:1�;<$�9G)�8R/�6^3�5j4�4v5�3�5�3�5�4�4�5�4�5�4�6�3�6�3�7�3�7�2�8�2�9�1�9�1�:�0�;�0�;�0�:�1�9�3�9�3�9�3�9�3�9�3�9�3�6�0$�8#�<%�@.�A9#�@D*�=O0�;[4�9g6�8s7�8~7�8�7�8�7�9�6�:�6�:�6�;�5�;�5�<�4�<�4�=�3�>�3�>�2�?�2�>�4�=�5�=�7�=�7�=�7�=�7�=�7�=�7�8�5!�= �C$�G-�H6!�FA)�CL0�@W6�>c9�=o:�=z:�=�:�=�9�>�9�?�8�?�8�@�8�@�7�A�7�B�6�B�5�C�5�D�4�C�6�B�8�B�:�A�;�B�;�B�;�B�;�B�;�B�;�9�:�B�J#�O+�P4�N>&�KI/�GS6�D^;�Bj=�Av=�B�=�B�<�C�<�D�;�D�;�E�:�F�9�F�9�G�8�H�8�H�7�H�8�G�;�G�=�F�?�F�@�G�@�G�@�G�@�G�@�G�@�;�?�G�R!�W)�X2�W;#�RE,�NP5�JZ<�Gf?�Fq@�G|@�G�?�H�>�I�>�J�=�J�=�K�<�K�<�K�<�L�<�L�<�M�>�L�@�K�B�K�D�L�E�L�E�L�E�L�E�L�E�L�E�<�C�O�Y �_(�`0�_9�\B'�VL2�QV:�Ma@�LlC�LwC�M�B�M�B�M�B�N�B�N�B�N�B�O�B�O�C�O�C�P�C�Q�C�P�F�P�H�P�I�Q�J�Q�J�Q�J�Q�J�Q�J�Q�J�=�H�V�`�f&�h.�h6�e?"�_I,�ZT7�U]?�RhE�QrG�Q{H�Q�H�Q�H�R�I�R�I�S�I�S�I�S�I�T�I�T�I�U�J�U�L�T�M�T�N�U�O�V�O�V�O�V�O�V�O�V�O�?�N�\
�f�l%�o+�p3�n<�jG%�dQ0�^Z=�YcF�VlL�UvN�U~N�V�O�V�O�V�O�W�O�W�O�W�O�X�O�X�P�Y�P�Y�Q�Y�S�Y�S�Z�T�Z�T�Z�T�Z�T�Z�T�Z�T�C�R�a�k �r# �v)�w1�v9�sE�mO,�gW:�a_F�\hN�ZpR�ZyT�Z�T�Z�U�Z�U�[�U�[�U�[�U�\�U�\�V�\�V�]�W�]�X�]�X�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�G�V�f �p�w!�{'�}- +�}7�zC�uM)�oU7�i]D�cdN�`lU�_tX�^|Z�^�Z�^�Z�_�Z�_�[�_�[�`�[�`�[�`�\�a�\�a�]�a�]�a�]�a�]�a�]�a�]�a�]�a�]�J�Z�j�t�{�$�*ك4 +πA�{K&�uS4�pZA�kaM�fhU�dp[�cx^�b�_�b�_�c�`�c�`�c�`�c�`�c�a�c�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�d�a�M�^ �m�w�� އ%ԇ2ʅ?I#�|Q1�vX>�q_J�meT�il\�gs`�f{c�f�d�f�d�f�e�f�e�f�e�f�e�f�f�f�f�f�f�g�e�g�e�g�e�g�e�g�e�g�e�g�e�P
�b
�p�z��ڋ + + +�k�x
�� +�{� + +��>��F!��L-x�Q9p�UCh�ZM`�^VY�d]T�lbQ�vcP��bO��aO��_N��^N��\M��[L��]J��_K��_K��_K��_K��_K��_�y + +1�
,� +(�$�!���"�'�-�4�< �E�O�X�b +�b�g! �j' +�i/�f8�cD�]N)�XW5�T`<�Sj@�RsA�R|B�R�B�S�B�S�B�S�B�T�B�T�C�T�C�T�C�U�D�U�D�U�F�U�G�U�G�U�H�U�H�U�H�U�H�U�H�B�P�^�g�m�p$�p+ �o5
�kB�fL&�`T3�[\=�XeC�WnF�WvG�W~H�W�H�W�H�W�H�X�H�X�I�X�I�Y�I�Y�J�Y�J�Y�K�Y�L�Y�L�Z�L�Z�L�Z�L�Z�L�Z�L�E�U �c�l�r�u �v&�v2 �r?�nI#�hR0�cZ<�_aD�\iI�[qL�[yM�[�N�[�N�[�N�\�N�\�N�\�O�\�O�]�O�]�P�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�]�Q�I
�Y�g�p�v�y�{ �{0�y=�tH�oP-�jW9�f^C�beK�`mO�_tQ�_|S�_�S�_�S�_�T�_�T�_�T�_�U�_�U�_�U�`�V�`�V�`�U�`�U�`�U�`�U�`�U�`�U�L�] +�j
�s�y +�` �m�v
+��A��J"��Q.�}W:�y\E�uaN�qfW�nl]lsb|k{ezj�fxj�gvj�gtj�gsj�hqj�hpj�gpk�fqk�dqj�cqj�cqj�cqj�cqj�c�W�i�u +��A��I ��O,��T7x�YAq�]Ki�aTa�e]Z�lcV�tgT��gS��fS��eR��cQ��bQ��aP��aN��bO��cO��cO��cO��cO��c�l + +J�,D�3?�:;�A8�I7�S6�]5�h5�u4�3�2�2�1��0��0��0��0��0��0���� +9�
4�!0�&-�,*�3'�9$�A"�J �T�`�n�}������
������������ +�� +�� +�� +�� +�� +�� +#� ��
�
�
�"
�(
+�/
�8�B + +�Y.�U7�RD�NO%�KY+�Jc.�Jm/�Jv0�J~0�K�0�K�0�K�0�L�0�L�0�L�1�L�1�L�1�M�2�M�2�M�4�M�6�L�7�L�7�L�8�L�8�L�8�L�8�<�G + +�U�]�b�c"�a*�_5
�[A�WK#�SU-�P^2�Og5�Op6�Oy6�O�6�O�6�P�7�P�7�P�7�P�7�Q�7�Q�8�Q�8�R�8�Q�:�Q�;�Q�<�R�<�R�<�R�<�R�<�R�<�@
�N �[�c�g�i�h$�g2�d>�_H �ZQ,�WZ4�Ub9�Tk;�Ss<�T{<�T�<�T�=�T�=�T�=�U�=�U�=�U�>�U�>�U�?�V�@�U�A�U�A�U�A�U�A�U�A�U�A�U�A�C �S�_�g�l +�W�c �k +�y@�uI �qP,�mV7�i\@�fbG�ciL�bpO�awP�aQ�a�R�a�R�a�S�a�Sa�T~a�T}a�T|a�S|a�S{a�R{a�R{a�R{a�R{a�R�Q +��A��H��O)��T4}�X>v~]Go{aPhxfXbvl_^ttc[t~dYt�dXt�cWt�bWt�aVu�`Ut�`Ut�_Vr�^Wr�^Wr�^Wr�^Wr�^�b + +2�,
/�3,�;*�C)�L'�W&�b%�p
$�#��"� +!� �� ������������ +'�'$�.!�5
�=�F�P�\ +�j �z ������������������ +�& +�- +�5 +�> +�H�T�b +�� +�� +�� +�� +�� +�� �� �� �� ���������� �� +�� +�� +�� +�� +�&�#�"�%�.�:�G�T�`�l�v�
������������������ +�� +�� +�� �� �� �� +������
��
��
��
�#���"�,�7�D�P�]�i�s�}����
��
��
��
����� �� ��!��"��!��"� +�!� +�!��!��!��!��!��!��!�� ��!�%�()�'4�%@�$M�#Y�#e�#p�#y�$��$��%��%��&��&��'��'��(�
�(�
�)��)��)��)��(��(��(��(��(��(��(���$�'�.�1&�01�.<�,H�+U�+a�+l�+v�,~�,��-��-��-��.��.��/��0��0��0��1��1��0��0��0��/��/��/��/��/��#�*�1�8�:#�9,�78�4C�2P�2\�2g�3r�3{�4��4��5��5��6��6��6��6��7��7��7��8��7��7��7��6��6��6��6��6��)�1�;�B�D �C)�@3�<>�9J�8W�9b�:m�;w�;�;��<��<��<��<��=��=��=��=��>��>��>��=��=� �=�!�=�"�=�"�=�"�=�"�/�7 +�C �J�M �L%�I.�D9�AE�@R�@]�@g�Aq�Ay�A��B��B��B��B��C��C��C��C��C� �D� �D�#�C�%�C�&�C�'�C�'�C�'�C�'�C�'�4
�> �J
�R�U�T!�Q) �N4�KA�HL�GW"�Fa#�Fk$�Gs$�G{%�G�%�G�%�G�%�H�%�H�%�H�%�H�&�H�&�I�&�I�'�I�)�I�+�H�,�H�,�I�-�I�-�I�-�I�-�9 �E�Q�X�[�[�X#�W1 �T>�QH�NR$�L\(�Le*�Kn+�Lu+�L}+�L�+�L�+�L�,�M�,�M�,�M�,�M�-�M�-�M�.�N�/�N�0�N�1�M�2�M�2�M�2�M�2�M�2�= +�K�W�]�` +�}@�zH�wN'�tS1�qX:{m]AukbHqhhNmgoRjfxThf�Uff�Vdf�Vcf�Vaf�V`f�V_f�U`f�S`f�Raf�Qaf�Qaf�Qaf�Q�Y + +0�C/�L-�V-�a,�m ++�| *)؝(ذ&��%��$��#��#��#��#���� +'�#� �!�'�/�8�A�L�X�f +�v ������������������ +�� +"�%�/�;�H
�U� +� +E�R
�^�j +�t�}��� �� +�� +����������
��
��
��
��
����
�������������� ��� �*�6�B�O�[�g�q �z�����������������������������������������������'�2�>�K�W
�c�n +�w ���������������������������� �� � � � +� �� �� �� ���� �'�)#�(/�%:�#G�"S�"_
�"j�"s +�#| �$� �$��%��%��&��&��'��'��'��(��(��(��(� �)��)�
�(��(��(��(��(���$
�*�1�3!
�1*�.5�,B�*N�*Z�+e
�,o�,x�-� +�.� +�.� �.� �.� �/� �/� +�0� +�0� +�0� +�0� +�1��1��1��0��0��0��0��0��0��$�+ �5 �;�< �;&�70�4<�2H�2U�3`�4k�5t�5{�6��6��6��7��7��7��7��8��8��8��8��8��8��8��7��7��7��7��7��* +�3 �>�D�F�D!�@* +�;5
�:C�;P�;[�<e�<n�<v�=}�=��=��>��>��>��>��>��>��>��?��?��>��>��>��>��>��>��>��0 +�;�F �L�M�K�G$�F1 �D>�BJ�BU�B_�Bh�Bp�Cx�C~�C��C��C��D��D��D��D��D��D��E��D� �D�!�D�"�D�#�D�#�D�#�D�#�5�B�L�Q +�Z?�WH�TP$�RX(�R`+�Qh,�Qo-�Qv-�Q}-�Q�.�Q�.�Q�.�Q�/�Q�/�Q�0�Q�0�P�1�P�1�P�2�P�2�P�2�P�2�P�2�P�2�C + +�n?�kG�hM%�dS-�aX4�_^9}]d=z\k?x\sAv\{Bu\�Cs\�Cq\�Do\�Dn\�Dl\�Ek[�Ek\�Ck\�Bk\�Ak\�Ak\�Ak\�A�Q +�~@|FyzL#sxQ,muU4gsZ<ap_C\neIXmmMUlvOTl�OSl�NRl�MQm�LPm�KOm�JOl�JOk�IOk�IOk�IOk�IOk�I�^ +q�@k�Fe�K!_�P)Y�U1S�Z7N�`<K�h>I�s?H�~>H��=G��;F��:F��9E��7D��8C��:B��;B��;B��;B��;�o + +^�?X�ES�KN�P$I�V)F�^,D�g-B�q-A�},A��*@��)?��'?��&>��%=��%<��':��):��):��):��)�| +,�� *�� )��(�� '��'��'��'���� +�� +��� +� +
� +(� 4�@ +�M�Y�d�o�x��������������� +����
��
��
��
���
�
��%�0�=�I �V�
a�
k�
t�|������������������ +�Q�]�g�q�y���������������������������!��!��!�� �� �� �� ��
��$ �) �* �(( +�%3�#? +�"L�"X�"c�#m�$u�$}�%��%��&��&��'��'��(��(��(��)��)��*��*��*� +�)��)��)��)��)�� �$�/ +�3�4�1"�.- �+9 �*F�+S�-^�.h�.p�/x�/~�0��0��0��1��1��1��1��2��2� �2� �2� +�2��2��1��1��1��1��1��% �/�8�<
�<�:�5&�33�4A �5M�6X�6b�7k�7r�8y
�8�
�8�
�8�
�8�
�9�
�9�
�9��9��9��9��9��9��9��9��9��9��9��9��+ +�^?�[G�XN"�VT'�T[*�Sb,�Si-�Rp.�Rw/�R/�R�0~R�0}R�1{R�1yR�2xR�2vR�3vR�2uR�2uR�1uR�1uR�1uR�1�G +�o?�lE|jK!wgP)qeU0lbZ6ha`;e_g>b_oA`_xB^_�B]_�B[_�BZ_�BY^�BW^�BW^�AX^�?X^�>Y^�>Y^�>Y^�>�T +u}@o{FjyK!dwP)^uT0YsY7Tq_=Ppg@MpqBLo|AKp�@Jp�?Jp�>Ip�=Hp�<Ho�<Gn�<Gm�=Gm�=Gm�=Gm�=�c + +;�D
8�K6�S4�[3�f2�q1�~0��
/��/��-�� +,�� ++��*��*��
*��
*��
�� +�Q +� + +� +� +� +� �"�.�;�G�S�^�h�q +� +� ���)�6�C�
O�Z�d�m +�� �!�!�%�0�=�J�U�_�i +�3��3�
�3�
�3��3��3��% +�8Y�8a�9i�9p�9v�9|�9��9��9��:��:��:��:�
�:�
�:��:��:��:��9��9��9��9��, +�`>�]E~ZKzXQ$wVV(tU\+qTc-oTj/mTr0lT{1jT�1hT�2gT�2eT�3cT�3bT�4aT�3aT�2aT�0aS�0aS�0aS�0�K +e|@_{EZzJUxO$PwT*Lu[/Iub1Ftl2Etv2Dt�1Dt�/Ct�.Bt�-Bt�,At�+@r�-?q�.?p�.?p�.?p�.�g +>�E;�L8�S6�\5�e4�p3�}2��1��1��
0��.��.��-��
,��,��,���� +/�W +.�a +-�l ,�y+��*��(��'��&��%��$��#��#��#���� + +� +� +� +� +� +� +� + �
�
�'�3�@ +F +�4��3��3��3��3��' +�9X +�9` +�9g +�9m +�:s +�:y +�:�:��:��:��:��:��:��:�
�:�
�:��:��9��9��9��9��- +�P?�NF�LM�KSJZ}J`{JgyJnxJuvJ}uJ� sJ� rJ�!pJ�!nJ�"mJ�"kI�#kI�"jI�!jI�!jI� jI� �A + +hk?ciE^gJYfO#UdT)QbZ-Nab1Kak2Jau2Ia�2Ha�1Ga�0Fa�/Ea�.Ea�-D`�-D_�-D^�-D^�-D^�-�\ +J�BF�GB�M?�T<�\;�e:�p9�|8��7��6��6��5��4�3~�3}�2}�2}��s +@�D
<�K9�R7�Z6�c5�n4�z3��2��1��1��
0��/��.��-��-��-���z +3�O1�W0�a/�k.�w +-�� ,��+��*��(��(��'��&��&�� &�� �� + + +� +� +� +�4� +�4� +�3� +�3� +�& +�9p +�9v +�9} +�9� +�9� +�:��:��:��:��:�
:�
}9�}9�|9�|9�|9��. +|N?yLEuJLsIRpIXoH^mHekHmjHuhI~fI�eI�cI�aI�`H� ^H� ^H�^H�^H�^H�^H��F +jZ>fXDaWI^UNZTT"WS[%USb'SSk(RSu)PS�)OS�)NS�)MS�)KS�)JR�)JR�(KR�&KQ�%KQ�%KQ�%�S + +4�N2�V1�_0�i/�u.�� +-�� ,��+��*��)��(��(�� '�� +'�� +�x +� +� + +e +k + +{9� +y9� +x9�v9�u9�s9�r9�
p9�
o8�
o8�
n8�
n8�
�5 +�=I~=P|=Vz<\
y<b
w<i
v=p
t=ws=�q=�o=�n=�l=�k=�i=�h=�g<�g<�g<�g<��; +nK>jJDgIJdHPbGV`G]^Gd]Gm[GvZG�XH�WH�UG�TG�SG�RG�RF�RF�SF�SF��J + +Od@KcEGbKDaQAaX?`a=`k<`v;a�;a�:a�9`�8`�8`�7^�6]�6\�6\��` +5zL3yT1y\0yg/yr.y +-y� ,x�+x�*x�*w�)u�(t� (s�(s��o +�3 +� +� +� + +� +� + + +j8� +h8�g8�e8�d8�b8�b7�a7�a7�a7��: +o;Mm;Sk;Yj;`h;gg;o
e<w
d<�b<�a<�_<�]<�\<�[;�Z;�Z;�Z;�Z:��@ +j@Ch?I
f?Od?Ub?\a?c_?k^?t\?~[@�Y@�W@�V?�U?�T?�S>�S>�T>�T>��E +dD@
aDF^CL\BR[BXYB`XChVCqUC{SC�RC�PC�OC�NC�MB�MB�MA�MA�MA��I +RS>NRDKQJHPPFOWDO_BOiAPt@P�?P�>P�=P�<P�;O�;N�;N�;M�;M��U +E^A
B^F?]M<]T:\]8\f7]q7]~6]�5]�4\�4\�3\�2Z�1Y�1X�1X��] +=eE
:dK7dS6d[4de3dp2d}2d�1d�0d�
0c�/c�.a�
-`�,_�,_��` +-l� ,l�+k�*k�)j�)i�(g� 'f�'f��d + + +�R +� + + + + +� +� + +[7� +Z7�X7�W7�U6�U6�U6�U5�U5��? +^:Q]:W[:^Z:fX:o
W;y
U;�
T;�R;�Q;�O;�N:�N:�N9�N9�N8��C +Y>GW>M
U=TT=[R>cQ>lP>vN>�M?�K?�J>�I>�H>�G=�H=�H<�H<��F +IM?
FLECLLAKS?K[=Ke<Lo;L{:L�9L�8L�7L�6K�6K�6J�6I�6I��O +2`N0`W/``.`k +-`x +,`� +`�+_�*_�)^�(]�(\� '[� +'Z��Y +�j +� + + + +R +X +] +c +h + +M6� +K6� +J6�I5�H5�H4�H4�I4� +�; + +N8VM9^K9gJ9qI:|G:�F:�
D:�
C:�
B9�
B9�
B8�
B8�
B7��? +.N� +-M� ,M� ,K�+J�+I�
�J +0TT +.T] +-Uh ,Ut ,U�+U�*T�)T�(S�(S�'Q�&P� &O� +�N +{! + + +3 +=9i +<9u +::� +9:� +89� +79� +69� +59� +58� +67� +67� +�: +9=T8>]7>g5>s4> +3>� +2>� +2>� 1>� 0=� 0<� +0<�0;��= +2C[ +1Cf +0Cq +/D~ .D� .D�-C�,C�+C�+B� +@� ++@� +�A + +e� +m0 + +� + +� + + + +� +� +� + + + +X� +S� +`7 +l +� + +v +� + +L� +G� + + + + + +S +[ +Aw +F1 + + + + + + + +C + + +5d + +:' +H +L +Q + + + + + +: +$� +)T +- +: + + + + + +) +0 +� +� +: + +! +( +, + +h + + + + +
+ +& +. +, + + +! + +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()**+,-./0123456789:;;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~����������������������������������������������������������������������������������������������������������������������������������6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����6��;��?=��Ec��J��M�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����5��:��?=��Dc��I���L�ϱj�Ȯ��Ǯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����5��:��><��Db��I���K�αj�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����4��9��><��Cb��H���J�αi�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����4��9��=<��Ca��G���H�ͱj�Ȯ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����3��8��=;��B`��F���F�ͱk�Ȯ��ǯ��ǯ��Ư��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����3��8��<:��A_��E���D�̱k�ȯ��ǯ��ǯ��Ư��Ʈ��Ʈ��Ů��Ů��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����2��7��;:��@^��C���A�˱l�ȯ��ǯ��Ư��Ư��Ʈ��Ů��Ů��Ů��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����1��6��:9��?]��@���=�ʱl�ȯ�ǰ��Ư��Ư��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����0��5��97��<^��<���8�ʱm�ǰ}�Ư��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����.��3��76��8a��5���1�ʵa�ư�ů��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����+��0��27��1d��+���5�ȽZ�İ��į��į��į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į����'��,��*;��'i��$���7���W�»o�µ~�ñ��ð��¯���������������������������������������������������������������������������������������� ��"��#?��(m��*���8���T½�hн�uؽ�|�y㭹w姸w磷w頶x韶zꟶ|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|韶|�������$D��*q��4���?���Q���d���oȬ�nϤ�mӛ�lו�lّ�mڏ�oێ�sۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�v��� �� ��&J��1i��<���G���R���^���`���`���aƉ�bɅ�d˃�f́�í�ḿ�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q́�q���
��&��*G��6_��Bt��M���S���Q���S���U��W�z�Z�w�]�u�a�t�d�t�h�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m�t�m���0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��KY��T}�\��d�Ԭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��JY��S}�\��d�Ӭv�Ȭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��@��E6��JY��S}�[��c�Ӭv�Ǭ��Ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?��D6��IX��R}�[��b�Ҭv�Ǭ��Ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?��D5��IX��R}�Z��a�Ҭv�Ǭ��ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?�D5��IX��Q}�Y��a�Ѭv�Ǭ��ǭ��ǭ��ƭ��ƭ��ƭ��ƭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��?�C5��HX��Q|�Y��`�ѭv�Ǭ��ǭ��ǭ��Ǯ��Ʈ��Ʈ��Ʈ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0��>��C5��HW��P|�X��_�ѭt�Ǭ��ǭ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����0�>��C4��GW��P|�X��^�Ѯr�ǭ��ǭ��Ǯ��Ǯ��Ʈ��Ʈ��Ʈ��Ů��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ��ŭ����1�>��B4��GW��O|�W�߳]�ѯo�ȭ��Ȯ��ǯ��ǯ��Ư��Ʈ��Ů��Ů��ŭ��ŭ��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1�=��B3��FV�N|�V�ߴ\�Ѱk�ȭ��ǯ��ǯ��Ư��Ư��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1�=��B3��FV�N{�U��Y�ӳc�Ȯ~�ǰ��Ư��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů����1��<��A2��EU��M{�S��T�ԹV�ȯx�ư��ů��ů��ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů��Ů���1��;��@1��DT��Kz�R���L���I�Ʋu�Ű��į��į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į��Į���1��:��?0��CS��Jy��M���=���P�ĸn�ñ��į��į��Į��Į��Į��Į��Į��Į����������������������������������������������������������������2��9��=/��BQ��Hw��A���5���U���k���x���辶�븵쳴}���}|荒}勉~勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉�勉����1��6��;,��?N��Cr��,���;���Wü�iμ�tպ�yڲ�vޫ�uॺt⡹s䝹t囹u暸x暹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{嚹{���-��3��7)��;J��+s��5���B���W���f���oɭ�nϥ�mӞ�m֘�lؔ�lڑ�nۏ�pۏ�sۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�vۏ�v���' +��;!��:5��.T��9r��D���N���X���Y���Z���[���[���\���]��_�}�a�{�d�z�g�z�k�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o�z�o��� +��F!��J>��Q\��Oi��Nr��J��A���I���Y���gĹ�q̵�vӨ�r�pܔ�rߒ�wߒ�~ޔ��ݕ��ܐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ��ݐ����� +��E ��J>��LV��K_��Hg��=���C���L���\���h���oȨ�nΞ�mӔ�l�nٌ�sٌ�yٍ�؎��ՏՏՏՏՏՏՏՏՏՏՏ���
+ +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��`��g��l��r��x��~��|���y���w���w���x���y���z���{���|�����Ԃ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ��ӂ������" +��4��B9��NS��Yl��a~��g��l��q��w��|�၂��|���z���z���z���|���}���~��ڀ��ԃ��΅��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ��ͅ������" +��5��B9��OS��Yl��a~��g��l��p��v��{�����ށ���}���|���}�����ۀ��ڂ��Ӆ��Έ��Ȉ��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj��Lj���� + + + + +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Yn��_|�f��zn��uv��o}��k���i���i���i���j���k���l���l���m���p���r���u���v���v���v���v���v���v���v���v���v���� +����)��91��FI��Q_��Xn��_|��f��{n��uu��p}��k���i���i���i���j���k���l���m���n���p���s���v���v���v���v���v���v���v���v���v���v���� +����*��91��FH��Q^��Xm��_{��e���l��{s��u{��o���l���k���k���l���m���n���o���q���t���w���y���y���y���y���y���y���y���y���y���y���� +����*��91��GH��P\��Xl��^z��d���j��q��zy��t���o���m���m���n���p���q���r���u���x���{���|���|���|���|���|���|���|���|���|���|���� +����*��90��GH��P[��Xk��^y��d���j��o��w��y~��s���p���o���p���r���s���v���y���|���}���~���~���~���~���~���~���~���~���~���~���� ����*��:0��GH��PZ��Xi��^x��d���i��n��u��~|��w���r���q���r���s���u���y���}�����Ȁ������������������������������������������ ����+��:0��GH��PY��Xh��^v��d���i��m��s��z��|���u���s���s���u���x���}����ǁ���������������������������������������������� ����+��:0��GH��PW��Xf��^u��d���i��m��q��y�悀��y���t���u���w���|����ǃ���������������������������������������������������� ����+��:0��GG��PV��Xe��^s��d���i���m��q��w��~��~���v���v���z��ρ��Ƅ�ÿ��ĺ��Ķ��IJ��ñ��ñ��ñ��ñ��ñ��ñ��ñ��ñ��ñ����� ����+��:/��GF��PT��Xc��_q��e~��i���m��p��t��|�⅄��y���x�����Dž�ƾ��Ǹ��Ǵ��ǰ��ǭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ��Ƭ����� ����+��:/��GE��OS��Xa��_n��c{��g���l��p���t��z�⎃�׀���|��Ȃ�ʽ��ʶ��ʱ��ʮ��ʫ��ɨ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ��ȧ����� ����,��:/��GC��PQ��Y_��^l��ax��e���i��m��r��y�ښ��ˋ�����ͼ��γ��ͮ��ͪ��ͧ��̥��ˣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ��ʣ���������,��:/��FB��PO��Y]��\i��_u��c�g���l��r�ޮv�У}����IJ��Ϭ��Ѩ��Ѥ��Т��Р��ϟ��͞��̝��˝��˝��˝��˝��˝��˝��˝��˝����� +��0 ��;6��BI��EZ��Di��Du��Ez�F�q�G�h�I�b�L�_�R�]�X�\�^�[�f�[�n�[�v�[��\劘\匘\匘\匘\匘\匘\匘\匘\匘\匘� +������$w�!0m�%:c�)C\�,JU�/PP�2UL�6XI�:ZG�?\E�C]C�H^B�L^@�Q^?�W^>�\^=�c^<�l]<�l]<�l]<�l]<�l]<�l]<�l]<�l]<�l]ɹ +T�"M�)H�/D�"3@�'7<�+9:�/;8�3<6�7=5�;>3�??2�D?1�H?/�M?.�R?-�Y?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?-�Z?�v�s�l�g.&�_>9�cFE�bOR�`X_�[bj�Ulr�Ruy�O�|�N�~�M��M��N��O��O��P��P��R�~�V�~�Y�}�\�}�_�|�a�{�a�{�a�{�a�{�a�{�a�{�a�{�a�{�v�s�l�g.&�_>9�cFE�bOR�`X_�[bj�Ulr�Ruy�O�|�N�~�M��M��N��O��O��P��P��R�~�V�~�Y�}�\�}�_�|�a�{�a�{�a�{�a�{�a�{�a�{�a�{�a�{�w�s�l�g.&�`=8�dFE�dNR�aX_�]aj�Wks�Suy�P}�O��N���N���N���O���P���P���QȀ�S��W��Z�~�]�~�_�}�a�}�a�}�a�}�a�}�a�}�a�}�a�}�a�}�x�t�n�i.%�e<7�jDD�jMQ�gU^�b_j�\is�Vs{�S|��Q���P���P���P���Q���Q���R���S˃�Vσ�Z҂�^Ձ�`�cۀ�c݁�c݁�c݁�c݁�c݁�c݁�c݁�c݁�y�u�o�k-%�j;6�oCB�oKO�lS]�g\i�afs�[p|�Vz��S���R���R���R���S���S���T���Ŭ�Zφ�^҅�aՄ�d�eۄ�f݅�f݅�f݅�f݅�f݅�f݅�f݅�f݅�z�v +�p�l-%�n94�tBA�uJN�rR[�mZh�gds�_n|�Yx��U���T���S���T���T���U���VÊ�Yˉ�]Ή�a҈�eՇ�fه�gۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�hۉ�{�w +�r�n-%�s83�yA?�zIL�xPY�sXf�lar�ek|�^u��X���V���U���U���V���W���Xƍ�]ˌ�aό�eӋ�h�iٌ�j؍�k؍�k؍�k؍�k؍�k؍�k؍�k؍�k؍�|�x +�t�p-$�x71�~?=��GI�OW�zVd�s^p�lh{�dr��]}��X���W���W���W���X���[ǐ�aː�eϏ�iԎ�k�lՑ�mՑ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�nԒ�}�z �u�q,$�}5/��>:��GG��NT��Ua�{\m�sey�ko��by��\���X���X���Z���\���_Ȕ�e̓�jђ�lӓ�nҔ�oҕ�pҖ�qі�qі�qі�qі�qі�qі�qі�qі�~�{ �v�u+#��4-��?8��GD��NQ��U^��[j�|bv�sl��jv��b���^���^���`���b���dǗ�jΖ�nі�oИ�qϙ�rϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�sϚ�~�| �x�y*!��4*��?5��HA��OM��UZ��[g��as�|i~�ts��k}��e���d���e���g���iě�mΛ�qΛ�s͝�t̝�u̞�v̞�v̝�v̝�v̝�v̝�v̝�v̝�v̝�v̝��}�y�})��4(��?3��H>��OJ��VV��[b�an�gz�~q��uz��m���i���j���k���m���pˠ�tˠ�vʡ�wɡ�xɡ�xʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ�yʡ���~�z��(��5&��@0��I;��PF��VQ�\]�ai�guߊp�׀x��v���p���o���p���r���tǤ�xǤ�yǥ�zǥ�zǥ�{Ǥ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ�{ȣ����{��(��5$��@.��I8��PB��VM�\X�ac�gnْo}ωu��|��w���t���u���v���xĨ�{Ũ�|Ĩ�|Ũ�}Ũ�}ŧ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ�}Ʀ����|��(��5"��@+��I4��Q>�WG�]Q�a[ۢejҙl{ȑs���z�����z���y���{���|���~¬�~¬�«�ë�ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�Ĩ�����}��(��5 ��@(��J1��R9�XB�^J�aT֧bh̠jyq���w���}������~���������������������������¬��ê��ê��ê��ê��ê��ê��ê��ê�����~��(��5��@%��J-�R4�X;�\B۳YRЭ`fƦgw��n���u���z���������������������������������������¬��¬��¬��¬��¬��¬��¬��¬�������(��5��A"��K(�S/�V4�X:չUP˲]d��eu��l���r���x���}������������~�����������������������������������������������������������(��5��A��K#�Q(�S+��O8оSNŸ[b��bs��i���o���t���y�}��u���s���r���u���x���z���|���~���~���~���~���~���~���~���~�����������(��5��A�L�M ��P��G6��PK��X`��_q��e���k���p���u�t�|�l���k���j���n���p���r���t���v���v���v���v���v���v���v���v���������
��(��5��A�I��H��B��E3��NI��V]��\o��b~��g���k�{�p�m�x�g���f���e���i���k���l���n���o���o���o���o���o���o���o���o�����������'��4��@�B��>��7��B0��KF��RZ��Xl��]{��b���f�r�j�f�t�b���a���`���c�ŧf�ĩg�ëi�¬j�¬j�¬j�¬j�¬j�¬j�¬j�¬j�¬��������& ��2 �=��5��-��=��E-��IB��NV��Th��Xx��\�w�_�i�e�`�q�]�\Ě�\Ʋ�]�˟`�ɢb�Ȥd�ǥe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀe�Ʀ��������$��.��0����1 +��@��J+��O>��OR��Pd��St{�U�m�X�`�_�Z�n�Xӂ�X�Wر�W�іZ�И\�Λ^�͝`�̞`�̞`�̞`�̞`�̞`�̞`�̞`�̞��������� + +� + �b�X�M,!�M9/�QC;�QMF�NWQ�IaZ�Ela�Bxe�A�g�@�h�?�h�?�i�@�i�@�i�A�h�A�h�A�h�D�h�H�g�L�g�P�f�R�e�U�e�V�d�V�d�V�d�V�d�V�d�V�d�V�d�i + �b�X�N,!�N9/�RB;�RLF�OVQ�J`[�Fla�Cwe�A�h�@�i�?�i�@�i�@�i�A�i�A�i�A�i�B�i�E�h�I�h�M�g�Q�g�S�f�V�e�W�e�W�e�W�e�W�e�W�e�W�e�W�e�j +�c�Z�O,!�S7.�V@:�VJE�TTQ�O^[�Jic�Fth�C�j�B�l�A�l�A�m�B�m�B�m�C�l�C�l�D�l�H�k�M�k�Q�j�T�j�W�i�X�i�Y�j�Y�j�Y�j�Y�j�Y�j�Y�j�Y�j�k �e�[�Q+!�W6-�\?8�[HD�XRP�S\[�Nfd�Irj�F}m�D�o�C�o�C�p�C�p�D�o�E�o�E�o�G�o�L�n�P�n�T�m�W�l�Z�l�[�m�[�n�[�n�[�n�[�n�[�n�[�n�[�n�l �f�\�S+!�\4+�a=7�aFC�]PO�XZ[�Rde�Lok�H{p�F�r�E�r�E�s�E�s�F�s�F�r�G�r�J�q�O�q�T�p�X�p�[�o�\�p�]�q�^�q�^�q�^�q�^�q�^�q�^�q�^�q�m �g
�^�W* �b2*�g;5�gDA�dMM�^WZ�Wad�Qlm�Lwr�H�u�G�v�F�v�G�v�G�v�I�v�J�u�N�u�S�t�X�t�[�s�^�s�_�t�`�u�a�v�a�v�a�v�a�v�a�v�a�v�a�v�n�i
�`�\(�h0'�n93�oC?�lKK�fTX�_^c�Wim�Ptt�L�x�J�y�J�z�K�z�L�z�N�y�O�y�R�x�W�w�\�w�_�w�a�x�b�y�c�z�d�z�d�z�d�z�d�z�d�z�d�z�d�z�o�j
�a�b&�n.%�t90�vB<�tJH�oRU�h[a�`el�Xpu�R|z�P�}�O�~�Q�~�R�}�T�}�U�|�W�|�\�{�a�z�b�|�d�}�e�~�f��g��g��g��g��g��g��g��p�k�c�g$�t.#�{8-�~B9�}JE�xQQ�qX^�jbj�amt�Zw|�V���U���V���X���Y���[���]��a�~�d��f��g���i߃�j߄�j߄�j߄�j߄�j߄�j߄�j߄�j߄�q�l�e�l"�y- ��8*��A5��IA��PM�{WZ�s_f�kir�bt{�]��[���\���]���_���a���aу�e߃�hޅ�i݇�k܈�l܈�m܈�m܈�m܈�m܈�m܈�m܈�m܈�m܈�r�n�f�q!�~-��8'��A1��I=��PH�WU�}]b�ugn�lqy�e{��a���a���b���c���d���f̉�hۉ�kڊ�mٌ�nٌ�oٍ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�pٌ�s�o�h�u!��-��8#��A-��I8��PC�VO�\\�fh�xou�ow��h���g���g���h���i���jď�l֏�o֏�pՐ�qՑ�rՑ�sՐ�s�s�s�s�s�s�s�t�p�i�y ��,��7 ��A)��I4�P>�VI�\U܋fbԁmr�xt��q|��m���l���m���n���o���pӔ�rӔ�tҕ�tҕ�uҔ�uӔ�uӓ�uӓ�uӓ�uӓ�uӓ�uӓ�uӓ�t�q +�l�} ��,��7��A%��I/�P8�VBߙ\M֒c_͉kpŁq~�yx��s���q���q���r���s���t˙�vϙ�wϙ�wИ�xИ�xї�xі�xі�xі�xі�xі�xі�xі�u�q +�o�� ��+��7��A!�H)�O2�U;ڟZIјb]Ǒim��o|��v��{}��w���v���w���w���xĝ�y̝�z͝�z͜�zΛ�zϚ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�v�r +�r����+��7��@�H$�O+ߪT3դWG˞`Zgk��mz��s���y��}���z���z���{���|���|ɡ�|ʠ�|˟�|̞�{͜�{Λ�{Λ�{Λ�{Λ�{Λ�{Λ�{Λ�v�s �u
����*��6��?�G�N$ڮM1ЩUEƣ^X��ei��lx��q���w���}�����~���������ǥ�Ȥ�~ɢ�~ʠ�}˟�}̞�}̞�}̞�}̞�}̞�}̞�}̞�w�t �x�� +��*
��5�>�F߳LճI/ˮSC��[V��cg��iv��o���t���y��������}���{���z�ĩ|�Ƨ~�ǥ�ȣ��ʡ�ʠ�ʠ�ʠ�ʠ�ʠ�ʠ�ʠ�x�u �{ +�� ��)��4
�=�D۹CѸG,ƳQA��YT��`e��gt��m���r���v�|�|�t���q���o���n�êq�Ĩt�Ƨv�ǥx�ȣy�ɢy�ɢy�ɢy�ɢy�ɢy�ɢy�ɢ�y�v
� ����'��2 +�:�? +��9̽E*��O>��WQ��^b��dr��i���n���s�t�y�j���h���g���f�§i�Ƨk�Ʀn�ǥp�Ȥq�ȣq�ȣq�ȣq�ȣq�ȣq�ȣq�ȣ�z�w
������%�.�4��2��6��C'��L;��TN��[`��ao��f}��j�z�o�l�u�d���c���b���a���d�ɢf�ɢg�ȣi�ɢj�ɢj�ɢj�ɢj�ɢj�ɢj�ɢj�ɢ�{�x������!�'߾%����3��@$��I8��QK��W\��]l��az~�f�q�j�e�r�_���^���^���]���_�Λa�͜b�̝d�̞d�̞d�̞d�̞d�̞d�̞d�̞d�̞�|�z������ +��9��B/��IB��NS��Scy�Vql�Z~`�_�Y�k�V�{�VƎ�Uȣ�Tɼ�T�݇V�ڊX�ٌY�Z�֏Z�֏Z�֏Z�֏Z�֏Z�֏Z�֏�� + +1�.�+�(� &�"!$�&!!�+!�0!�6 �< �B�I�P�U�U�U�U�U�U�U�Y�P�E#�:0!�=6%�A@0�AJ:�>UC�;`I�8mM�6zP�4�Q�2�R�2�R�2�R�2�R�3�R�3�R�3�R�3�R�4�Q�9�Q�=�P�A�P�D�O�G�N�I�N�I�N�I�N�I�N�I�N�I�N�I�N�Z
�Q�F"�=.!�A3%�E=0�EH:�ARC�>^K�:jO�8wR�6�T�4�U�4�U�4�U�4�U�4�U�5�U�6�U�6�T�8�T�<�T�A�S�E�R�H�R�J�Q�L�R�L�R�L�R�L�R�L�R�L�R�L�R�[
�S�G"�A, �E1$�H</�HF:�EQD�A[L�=hR�:tU�8�W�6�X�5�X�6�X�7�X�7�X�8�X�9�W�:�W�;�W�@�V�D�V�H�U�K�T�M�T�N�V�N�V�N�V�N�V�N�V�N�V�N�V�\
�T�I!�E*�I0#�M9.�MD9�JOD�DYM�@eS�<rW�:Z�9�[�9�[�:�[�:�[�;�[�<�[�=�Z�>�Z�?�Y�D�Y�H�X�L�X�O�W�P�X�Q�Z�R�Z�R�Z�R�Z�R�Z�R�Z�R�Z�]�U�J!�I(�O-"�S7-�SA8�PLC�JWM�DbU�AnZ�?{]�=�^�=�^�>�_�?�^�@�^�A�^�B�^�C�]�D�]�H�\�L�[�P�[�R�\�S�]�U�^�U�^�U�^�U�^�U�^�U�^�U�^�_ +�W�L �N%�U+ �[6*�[@6�XJA�STL�L_V�Gk]�Dw`�C�b�B�b�C�c�D�b�E�b�F�b�G�a�H�a�I�`�M�`�Q�_�T�_�V�a�W�b�Y�c�Y�d�Y�d�Y�d�Y�d�Y�d�Y�d�` +�X�N�T#�\*�c4(�d?3�aH?�[RK�U\U�Ng^�Jsc�Hf�G�f�H�g�I�f�J�f�K�f�M�e�N�e�O�d�R�c�V�c�X�e�Z�g�[�h�]�i�]�i�]�i�]�i�]�i�]�i�]�i�a + �Z�P�Z �d(�k3$�m=0�jF;�eOG�^YS�Wc^�Qne�Nzi�M�j�M�k�O�j�P�j�Q�i�S�i�T�h�U�h�X�g�Z�i�\�k�^�l�_�m�`�n�a�n�a�n�a�n�a�n�a�n�a�n�c + �\�T�`�k'�r2!�u<,�tE7�oMC�hVP�a`\�Yje�Tvk�S�n�S�o�T�n�V�n�W�m�Y�l�Z�l�[�l�\�m�_�o�`�q�b�r�c�r�d�s�d�s�d�s�d�s�d�s�d�s�d�s�d �]�X�f�q&�y1�|;'�|D3�yL>�rTK�j]W�bgc�\rl�Y}q�Y�r�Z�r�[�r�[�r�\�r�]�r�^�s�`�s�c�u�d�v�e�w�f�w�g�w�g�w�g�w�g�w�g�w�g�w�g�w�e �^�]�l�v%�0��:#��C.�K9�|RE�u[R�ne_�fnj�`xs�^�w�^�x�_�y�`�y�a�y�b�y�c�y�d�y�f�z�h�{�i�|�j�|�j�|�j�|�j�|�j�|�j�|�j�|�j�|�f�`�b�p�{$��/��9��B(�J3�Q>��ZK�ycY�pkh�itt�e}{�c�~�d�~�e��e��f��g��h��jkဨlဥmဣm•m��m��m��m��m��m��g�a�f�u
��$
��.��8�A#�I,�P7ۊZD҂aV�zif�rps�lx}�i���i���i���j���k���lÄ�lۄ�nޅ�oޅ�pޅ�p߄�p߃�p߃�p߃�p߃�p߃�p߃�p߃�h�b
�j
�x��#��-��7�@�H&ޖO/ՐWẢ_SĂgc�znq�tu}�o}��n���n���n���o���p���pԉ�rۉ�rۉ�r܈�r܈�r݆�r݆�r݆�r݆�r݆�r݆�r݆�h�c
�m�| ��" ��,
��6�?�FڜM+ЖV?Ǐ^P��ea��lo�|r|�vy��s���r���s���s���t���t͎�u؎�u؍�uٌ�uڋ�tۊ�tۉ�tۉ�tۉ�tۉ�tۉ�tۉ�i�d
�p��� ��* +�4�<ޣCՠJ)˛T<]N��d_��jm��pz�}v��y}��v���v���v���w���wǓ�wԒ�wՑ�w֏�w؎�vٌ�vٌ�vٌ�vٌ�vٌ�vٌ�vٌ�j�e�s ������)�1 +�9
ڨ=ХH'ǠS:��[L��b\��hk��nx��s��~y��{���y���z���z���{���zі�zҕ�zԓ�yՑ�y֏�y֏�y֏�y֏�y֏�y֏�y֏�k�f�v������&�.�4֬9̩G$¥Q8��YI��`Z��gi��lv��q���v���}�}~��z~��x~��w��v~Κx}Иy|Җz|Ӕ|{Ԓ|{Ց|{Ց|{Ց|{Ց|{Ց|{Ց�l�g�y�����"�(ۯ,Ѱ7ǮE"��O5��WG��^W��ef��jt��n���s�z�y�r���o���m���k���k�͜n�Ϛp�Иrіt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕt~Ӕ�m�k +�}������ + +� +;�5�1�-�)�" &�( #�-! �3!�: �B �K�U�_�j
�x
�y
�y
�y
�y
�y
�y�� +#�!����$�*�0�7�? �G�O�Y�Z�Z�Z�Z�Z�Z�I�@�5&�2/�44"�2=%�2H-�0S4�-`8�+n;�*{=�)�>�(�?�)�?�*�?�+�?�+�?�,�?�-�?�-�>�.�>�/�>�0�=�2�<�6�<�9�;�;�;�<�<�<�<�<�<�<�<�<�<�<�<�J�A�6&�5-�72!�6;%�5E.�3Q5�1^:�/k=�-y?�,�@�,�A�,�A�-�A�.�A�/�A�/�A�0�A�1�@�2�@�3�@�3�?�6�?�9�>�<�=�>�>�?�?�?�?�?�?�?�?�?�?�?�?�L�A�7%�8*�:/!�:8%�:C.�8O6�5[<�3h@�1vB�0�C�/�C�0�D�1�D�2�D�2�D�3�C�4�C�5�C�6�B�6�B�7�A�9�A�=�@�?�@�A�B�B�C�B�C�B�C�B�C�B�C�B�C�M�C�8%�<(�?, �?5$�@A.�>L7�:X>�8eB�6rE�5F�4�G�5�G�5�G�6�G�7�G�8�G�9�F�9�F�:�E�;�E�<�D�>�D�B�C�C�E�E�F�G�G�G�G�G�G�G�G�G�G�G�G�N�D�;$�B%�E)�G3#�H>.�FJ7�AU?�>aE�;nH�:{J�9�K�:�K�;�K�;�K�<�J�=�J�>�J�?�I�@�I�A�H�B�H�C�G�F�H�H�J�J�K�K�L�K�L�K�L�K�L�K�L�K�L�P
�E�@!�G"�L'�O1!�P<,�MG6�IR@�E]G�AjL�@vN�?�O�?�O�@�O�A�O�B�N�C�N�D�N�E�M�F�M�G�L�H�K�H�L�K�N�N�P�O�Q�P�R�P�R�P�R�P�R�P�R�P�R�Q
�G�E�M�U&�X/�Y:)�VD4�RO?�LZH�HeN�FqR�E}S�E�S�F�S�G�S�H�S�I�R�J�R�K�Q�L�P�M�P�M�P�N�S�Q�U�S�V�T�W�U�W�U�W�U�W�U�W�U�W�U�W�S�I�J�T�\$�a.�c8%�`B0�[L<�UWF�OaO�LmU�KyW�K�X�L�X�M�W�N�W�O�V�P�V�Q�U�R�T�S�T�R�W�T�Y�V�[�X�\�Y�]�Z�]�Z�]�Z�]�Z�]�Z�]�Z�]�T
�K�P�[�d#�i,�l6 �j@+�eI7�_SC�X]N�ShV�Qt[�P\�Q�\�R�[�T�[�T�[�U�[�U�[�V�[�W�[�W�]�Y�`�[�a�\�b�]�b�^�c�^�c�^�c�^�c�^�c�^�c�U
�M�U�b�k"�p*�t5�s>&�pG2�iP>�c[J�\eU�Xp]�V{`�V�a�W�b�X�b�X�b�Y�b�Z�b�Z�b�\�c�\�d�^�f�_�g�`�g�a�h�b�h�b�h�b�h�b�h�b�h�b�h�W�O�Z�h
�q!
�w(�{3�|= �yE+�tN7�nYD�gbQ�ak]�]ud�\g�\�h�\�i�]�i�^�i�^�i�_�i�`�i�a�j�b�l�c�l�d�l�e�l�e�l�e�l�e�l�e�l�e�l�e�l�X�P�_
�m�v �}'��1�;�D$�~M0�yW=�q`N�jh\�dpg�azl�a�n�a�o�b�o�b�o�c�o�c�p�d�p�e�p�f�q�g�q�h�q�h�q�i�p�i�p�i�p�i�p�i�p�i�p�Y�T�c�q �{��% �/�8�AڇL(сU:�z^K�seZ�lmg�huo�f~s�f�u�f�u�g�u�g�u�h�u�h�u�i�u�j�v�k�v�k�u�k�u�k�t�k�t�k�t�k�t�k�t�k�t�Z +�W�g +�u���$��, +�6ސ?ՍJ%̈T8Á\H�{cX�tje�oqp�lyv�j�y�j�z�k�z�k�{�l�{�l�{�m�{�m�z�m�z�m�y�m�x�m�w�m�w�m�w�m�w�m�w�m�w�[ + +�Z
�k�y����!�)�2 +ږ<ВH#ǍR5��ZF��aU�|hc�vno�rux�p~}�o��n��o��o��o��p��p��p�~�p�}�p�|�o�{�o�{�o�{�o�{�o�{�o�{�\ + +�]�n�|�����%ߚ-՚9˗G Q2��YC��`S��fa�}ln�xrx�ty�r���r���r���r���r���sф�s߃�r���rငr��q�~�q�~�q�~�q�~�q�~�q�~�] + +�` +�q
����� ۟&П7
ǜE��P0��XA��^P��e_��jl�ow�zu��v~��u���u���u��~v��}vˉ|v܇}uޅ}u߃~t��~t�~t�~t�~t�~t�~t��^ �c �u���� + +��A��L+��T;��\K��aY��fg��ks��p~x�u�q~�m~��k~��i��g���g؍j}ڋl|ۉnz݇oyޅoyޅoyޅoyޅoyޅoyޅ�` �j�{ +�� +��<��E(��K7}�PEs�URi�Y^_�^iW�fpS�rrR��qQ��pP��nP��mO��kM��mO��pQ��rR��sR��sR��sR��sR��sR��s�p +I�B�<�6�1�$.�**�1 '�7 $�? !�H�S�_�m�|������������������ +2� +�l �q$ +�s,�s6�q@�mL+�gV9�`_G�[hQ�YrV�Y|X�Y�Y�Y�Z�Z�Z�Z�Z�[�Z�[�Z�\�Z�]�[�]�\�]�]�^�^�_�^�`�]�`�]�`�]�`�]�`�]�`�]�I�N�\
+�i�r�w"�z) +�{3�z=�wJ$�qT5�j\D�deQ�`mY�^w^�^�`�^�`�^�a�_�a�_�a�`�a�`�a�a�a�a�b�b�c�c�c�c�b�c�b�c�b�c�b�c�b�c�b�c�b�K
�R
�a�n�v�|�&�/ +ڃ<�~H!�yR2�rZB�lbO�giZ�dra�c{e�c�f�c�g�c�g�d�g�d�g�d�g�e�g�e�h�f�h�f�g�f�g�f�f�f�f�f�f�f�f�f�f�f�f�L
�U�e�r�z���"߈*Ո9̅FÀP/�zX?�t_M�ofY�knc�hvh�gk�g�l�g�l�h�m�h�m�h�m�h�m�h�m�i�m�i�l�i�k�h�j�h�j�h�j�h�j�h�j�h�j�M
�Y �i +�u�~��ڍ%Ѝ7NJD��N,��W<�{^J�vdX�rkc�nrj�lzo�k�q�k�r�k�r�k�r�k�r�k�r�k�r�k�q�k�p�k�o�k�m�k�m�k�m�k�m�k�m�k�m�N
�\�l �x
�� +C��M)��U9��\H�}bU�xha�tok�pvr�nu�n�v�n�w�n�w�n�w�n�w�n�w�n�u�n�s�n�r�m�p�m�p�m�p�m�p�m�p�m�p�O
�_�o�| + + +�e�v� +��A��J'��Q5��WB~�\Ou�a[l�fgb�kp[�svW�xV��wV��uU��sT��rS��rT��sU��tV��tV��tV��tV��tV��tV��t�d +g�4^�: U�@+N�F4H�N:E�X<C�e<B�s;Bڃ:A۔9Aܨ7@��6?��5<��89��;8��>8��?8��?8��?8��?8��?֍ +\�+T�1L�7$E�>+@�F/=�P1;�[2:�h1:�w09�/8�.7��,7��+6��*4��+1��.1��/1��/1��/1��/1��/̘ +H�A�;�%5�+2�2.�9+�B)�L'�W%�d#�t!�� �������������������� +"� +�d*
�b3�^>�ZK'�VV3�R`;�Pk@�PuB�PC�Q�C�Q�C�R�D�R�D�S�D�S�D�S�E�T�E�T�F�T�H�S�I�T�J�U�J�V�J�V�J�V�J�V�J�V�J�:�G�T + �`�h�k�m&�k0
�i<�eH!�`S1�Z\=�WeD�VoH�VyJ�V�K�V�K�W�K�W�K�W�L�X�L�X�L�X�L�Y�M�X�N�X�O�Z�O�Z�O�[�O�[�O�[�O�[�O�[�O�=�L �Z �f�m�q�s"�s+�s9�nF�iP.�cY;�_aF�\jL�[sP�[|Q�[�R�[�R�\�S�\�S�\�S�\�S�]�S�]�T�]�U�]�U�^�U�^�T�^�T�^�T�^�T�^�T�^�T�@�P �_�j�q�v�x�z&�z7�vD�qN*�lV9�g^E�cfN�`nT�`wW�_�X�`�Y�`�Y�`�Y�a�Y�a�Z�a�Z�a�Z�a�Z�a�Z�a�Y�a�Y�a�X�a�X�a�X�a�X�a�X�C
�S�c�n �u +�}B�xL'�sT6�n\C�jcN�gjV�es[�d{^�d�_�d�_�d�_�d�_�d�`�d�`�d�`�d�`�d�_�d�^�d�]�d�\�d�\�d�\�d�\�d�\�G�W�g�q +�^ +��C��K%��R3��X?��]K}�bWt�fbl�kld}rs_|}v]|�v\|�u[}�tZ}�rY}�qY{�p[y�o]w�n^v�m^v�m^v�m^v�m^v�m�Z +-�(�$� !�'�.�6�@�K�X�h
�z�� +�� +�� �� �� �� �� �� �� +���
�
�%
+�,
�6�A + +� �
� + + +�� +�����
�
�
��
��
��
���������
��
��
��
��
��
���'�%�'�,�5�B�P�
^�
k�w����������������������������
��
����������������$�"�#�)�2�?�M�[�h�t��������������������������������������������!� �"�#�!$�"0� <�I�W�d�p�{��� �� ��!��!��"��#��#��$��%��&��&��&��%��$��$��$��#��#��#��#��"�"�(�)�+!�,,�*8�(E�'R�'_�'l�'w�(��(��)��*��*��+��,��,��-��.��.��/��.��-��-��-��-��-��-��-��-��$�(�/�2�7�7(�54�2@�0M�/[�/g�0s�0}�1��2��3��3��4��5��5��6��7��7��7��6��6� �6�"�5�#�5�$�5�$�5�$�5�$�5�$�%�.�6�<�A�B%�?0�<<�8H�7U �7b �8n!�9y!�9� �:� �;� �<��<��=��>��>��>��?��?�!�>�%�=�'�=�)�<�*�<�+�<�+�<�+�<�+�<�+�(�5�=
�E�K�L#�J,�E7�AC�?P"�>]$�?i%�@t%�A~$�B�$�B�%�B�%�C�%�C�&�D�&�D�&�D�'�E�'�E�)�E�,�D�.�C�0�C�1�C�1�D�1�D�1�D�1�D�1�.�;
�C +�N�T�U �T)
�P2�K>�HK"�FW'�Fc*�Gn,�Gx-�H�-�H�.�I�.�I�.�I�/�J�/�J�/�J�0�J�0�K�1�J�3�J�5�J�6�I�7�J�7�J�7�J�7�J�7�J�7�3�@ �K�V
�\�^�]%�Z.
�V;�SH�OS)�M]0�Mh3�Mr5�M{5�N�6�N�6�N�7�O�7�O�7�O�7�O�8�P�8�P�8�P�:�O�<�O�=�O�=�Q�=�Q�=�Q�=�Q�=�Q�=�8�D �R�\�b�d�e�c)�a8�]E�YO)�UY3�Sb9�Rl;�Ru=�S~=�S�>�S�>�T�>�T�?�T�?�T�?�T�?�U�@�U�A�U�B�U�B�U�B�U�B�U�B�U�B�U�B�U�B�<�I�W�a�g +�Q +��B��K#��R0�}W<�y]G�ubQ|rgZvonarmvenm�gll�gjm�ghm�gfm�fdl�fem�dfl�agk�_hj�]hj�]hj�]hj�]hj�]�S +��B��J!}�P-u�U8m�ZCe�^M]�dVW�k\S�u_Q��_Q��]P��[O��ZO��XM��XK��ZL��ZM��[M��[M��[M��[M��[�c + + +"�� !�� �� +���������� +�l �~�������������������� +�G�T�d +����' +� +� +L�Y�e
�q�| +�� � �� +������
��������������������� �� +�� +�� +�� +�� +� ����"�-�:�H�U�a�n
�x���� +�� �� �� �� �� �� �� ���������� ����
������������� � �#�$*�!6�C�Q�]�i�u�~
��� ��!��!��"��#��#��$��%��%� +�%� +�%��%��%��%��$��$��$��$��$���#�'�*�.�.&�,2�)>�'L�'Y�'e�'p�)z�*��*��+��,��,��-��.��/��/�
�/�
�0��/��.��/��.��.��-��-��-��-��!�)�/�6�:�9"�7-�39�0F�0T�0`�1l�3v�3�4��5��6��6��6��7��7��8��8��9��8��8��7��7��6��6��6��6��6��&�0�7 +�@�D�D +�A(
�=4�9@�8N�9[�:g�;r�<{�<��=��=��>��>��?��?��?��?��@��@��?�!�?�#�>�$�>�%�=�%�=�%�=�%�=�%�,�6 +�@�I�M�N�K$�F.
�C;�AI�AU�Ba�Bk�Cu �C}!�D�!�D�!�E�"�E�"�E�"�E�#�F�#�F�#�F�$�F�&�F�(�E�*�E�*�E�+�E�+�E�+�E�+�E�+�1�<�G�Q�U�V�T�P(�O7
�LD�IP �I[%�Ie'�Io(�Ix)�J�)�J�*�J�*�K�+�K�+�K�+�K�+�L�,�L�,�L�-�K�/�K�0�K�1�K�1�K�1�K�1�K�1�K�1�6�A +�VA�RL!�PV)�O_-�Oi0�Or1�Oz1�O�2�P�2�P�2�P�3�P�3�Q�3�Q�4�Q�4�Q�5�Q�6�P�7�P�7�P�6�P�6�P�6�P�6�P�6�: �E + + +b�?[�FU�L$O�R,J�Y1F�b4D�m4C�y3C��2B��0A��/@��-@��,>��.<��1:��39��49��49��49��4�y +*ҳ )��(�� &��$��#��#��#��#���� +������������������ +� +� +8
�E�S +�_�k�u�~������� �� +�� +�� +����������
���������������������
��(�4�A�N�[ �g�r�{�������������������������������� �� +�� +�� +�� +��
��#�&�%#
�"/�<
�I�V�b �m�w� �!��"��#��#��$��$��%��%��&��&��'��'� +�'��'�
�&��%��%��%��%���$ �' �/�1 �0 +�-*�*7
�'D
�'Q�(^�)i +�+s �,| �-��-��.� �.� �/� �/� �0� +�0� +�1� +�1� +�2�
�1��0��0��0��/��/��/��/��#
�+ �2�: +�<�;�7$�30�0>
�0L
�2Y�4d
�5n�6w�7�7��8��8��9��9��9��:��:��:��:��9��9��9��8��8��8��8��8��)�1 +�EA�DM�DX�Db�Ek�Et�F{�F��F��G��G� �G� �G� �G�!�G�!�H�!�G�$�G�%�F�%�F�&�E�&�E�&�E�&�E�&�3 +�d@�aI�^Q)�[Y1�Z`6�Xg8�Xo:�Xw;�X;�W�<�X�<�W�<�W�=�W�=�W�=~V�=}V�<|V�;|V�:{V�9{V�9{V�9{V�9�A +d�@^�GX�M"R�R*L�Y0H�a4F�k5E�w4D��3C��1C��0B��.A��-@��-=��0<��2:��3:��3:��3:��3�q +9�C6�K4�U3�`2�l1�z1��0��
/��-��-��+��)��(��(��(��(���� +� +� +� +
����) � +� +�% �1�?�L�Y�d�n�w��� +� +�)��(��(��(��(�� +�$ +�4� +�3�
�3��2��2��2��2��2��2��%�* + +-�[ +,�f ,�t+��*��(��'��&��$��#�� "�� +!�� +!�� +!�� +�� +�M +�[ + + +� +� +� +� + +����"� + +�� +� +�+� +�+� +�+� +� +�6��5��5��4��4��3��3��3��% +�9R�:[�;d
�;l
�<s
�<z�<��<��=��=��=��=��=��=��=��<��<��;��:��:��:��:��( +Y�BT�HO�MJ�S$F�[(C�c*B�n*A�z)@��'?��&>��$=��#=��!;~�#9}�$8{�&7z�&7z�&7z�&�i +-�� ,�� +��*��)��'�� +&��%��%��%���� +�� +� +� +� + � +� +� +� + +e + +�7� +�6��6��5�
�5�
�4��4��4�� +�<R�<Z�<b
�=i
�=p
�=w�=~�=��=��=��=��=��=��=��<��<��;��;��:��:��:��% +�BD
�BM�BU�B]�Bd�Bk�Br�By�B��C��C��B��B��B��B�~A�}A�{@�{@�z?�z?�z?��* +Zy@UxFPvLKuR"GtX&Dsa)Bsk)Asv(@s�'?s�%>s�$=s�"<s� ;r�!9p�"8n�#8m�#7m�#7m�#�b +8�I
5�R4�[2�e1�q1�
0��/��.�� +,�� +�� *��)��(��(��(���x + +� +� +� +�7� +�7� +�7� +�6�~6�}5�}5�|4�|4�� +�<Q�<Y�=`
�=g
�=m
�=t�=|�=��=��=�=�}=�{<�z<�w<�v;�u;�t:�t:�t:��) +�BE�BM�BT�B[�Bb�BiBp}Bx|B�zB�xB�wB�uA�sA�q@�o@�n@�m?�l?�l?�l?��0 +�HA�GI~FP|FWzF^yFewFluFttF|rF�pF�nF�lE�jE�hD�fD�eD�eC�eC�eC�eC��7 +m]?h[EdYK`XP"\VV&YU])WUe+TTn,STy,QT�,OT�+MT�+LT�*JS�)IS�(IR�&IR�$JQ�#JQ�"JQ�"�L +:�I
7�P5�Y4�c3�o2�|1��
0��/��.�� +-� +}�*|�
)z�)z�)z��p +�� + +� +� + +e +k +x7� +v7� +t7� +r6�p6�o5�o5� +n4� +n4� +�) +�<P~<W}<]
{=d
z=k
x=sv={u=�s=�q=�o<�m<�k;�i;�h;�g:�f:�f9�f9��1 +{BE
yALwASuAYsA`rAgpAonAwmA�kA�iA�gA�e@�c@�a?�`?�_>�_>�_=�_=��8 +pL?lKEiJLgJRdIYbI`aIg_Ip]Iz[I�YH�WH�UH�SG�RF�QF�QF�QE�QE�QE��B + +^\?ZZDVYJRWPNVV"KV^$IUg%GUq%FU}$EU�#CU�"BU�!@U� ?U�>T�>S�>R�>Q�>Q��R +Og@KeFGdLDcSAcZ?cd=cn<c{;c�:c�9c�8c�6b�5`�4_�3^�3]�3]��\ +,p�*n�
)m�(l�(l��h +.|^ +-|j ,|v+|�*|�){�({�&{�%y�$w�#v� "u� +"u� +�o +� +� +� + + +� +� +� +� +: + +l7� +j7� +h7� +f6�d6�b5�a5�a4� +`4� +`3� +�1 +q<Np<Un<[
l<b
k<j
i<rg<{e<�d<�b<�_;�];�[:�Z:�Y9�Y8�Y8�
Y8�
�8 +mAD
jAKhAQf@Xe@_c@fa@o_@x^@�\@�Z@�X?�V?�T>�S>�R=�R<�R<�R<��> +gFAdEGaEN_ET]D[[DcZDkXDuVDTD�RD�PC�NC�LB�LA�LA�L@�L?�L?��C +aK>^JE[JKXIQVHXTH_RHhPHrOH}MH�KG�IG�GG�EF�EF�EE�ED�ED�EC��H + +FaAB`H?_N<_V:__8_j7_v6_�5_�4_�3^�2^�0]�/[�.Y�-X�-X��\ +<gE
9gM7gU5g^4gh3gt2g�0g�
/f�.f�-e� +,d� +*b�)a�(_�(_��a +1oR/o\.og +-os ,o�+o�)n�(n�'m�&l�$j�#h� "g� +"g� +�g +� + +� + +u +| + +^7� +\7� +Z6� +X6� +V5�U5�T4� +S3� +S2� +S2� +�9 +c;Ma;S_;Z
^;a
\;j
Z;s
X;}V;�T;�R;�P:�N9�M9�M8�
M7�
M6�
M6��> +^@C\@IZ@PX@WV?^T?fS?pQ?zO?�M?�K?�I>�G=�F=�F<�F;�F:�F:��C +XE@
VEFSDMQDSOD[MCcKCmJCxHC�FC�DC�BB�@B�?A�?@�?@�??�@>��H +,Z� +Y� )W�(V�(T�
'T��W +2bP0bY/cd +-co +,b| +b�*b�(b�'a�&`�$^�#\� "[� +"[� +�[ +�! + +> + +O6� +M6� +K5� +I5� +G4� +G3� +G2� +G1� G1� �; +T;KR;RQ;YO:a
M:k
K;u
I:�
H:�
F:�
C9�
B9�
@8�@7�@7�@6�@5��? +BJC
?JJ=IQ;IY9Ic7In6I{4I�3I�
2I�0I�/H� +.G�-E�
-D�
-C��I +-O� ,O�*N�)M� (K�'J�'I��L +2VN +0WV.W` +-Wl ,Wx+W�)V�(V�&U�$U�#S�"Q�"P� !O� +�P +h� +vG +� +� + + +� +� +� +� + +D:RB:Z@:c>:m<:y::�8:� +7:� +59� 39� 38� 37� +36� +35� +�; +@?G=?O;?W9?`8?k6?w4?�3?� +1?� 0>� .>�-=� -;� +-:� +-:� +�> +7EM5EU3E_2Ei0Ev +/E� .E�,E�+D�)D�(B�'A�'@� '?� +�A + +h] + + +� + +J +P + + + + + + + + + + + +& + +Or +V6 +] +k +� + + +;� +9� + + + + + +9 +? + +,� +7j +>: +D +K + + + + + +$ +� +� +� +� +37 + +Q +_ + +� + + + +� +� +� +� + +!U + + + + +s + + + +l +( + + + + + + + + + + J +V +s +� + +# +� + + + +< +D +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~������������������������������������������������������������������������������������������������������������������������������������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D7��LH��T]��\s��b���h���l���o�߽r�ٹu�ӵz�Ͱ�ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ��ƭ������( +��2��<&��D6��KH��S]��Zs��`���e���h���j���l���m�ʽrݽ�x誱����������������������������������������������������������������������( +��2��<&��D6��KG��R]��Ys��^���b���c���e���h���kѺ�oڭ�s䛴zzzzzzzzzzzzzzzzz�����( +��2��<%��D5��JG��Q\��Ws��\���^���`���c���fŹ�iή�lס�p���u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u鐷u�����( ��2��<%��C4��JF��P[��Vr��Y���\���_���b���d¯�gˤ�jӗ�m܈�q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q䈺q�����( ��2��;%��C3��IE��OZ��Tr��V���[���^���a���c���eǛ�hϏ�jׂ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�nނ�n�����( ��2��;$��C2��IC��NY��Qq��T���Z���]���_���a���cÓ�eˇ�g�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�}�l�����( ��2��;#��C0��IA��MW��Op��S���X���\���^���`���a���bƁ�e�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�x�j�����(��2��;!��C.��H?��JV��Mo��R���W���Z���\���^���_���`�{�b�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�s�h�����(��2��;��B+��H;��IV��Ln��P���U���Y���[���\���\�~�^�u�`�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�n�e�����(��2��;��B&��D<��HV��Jl��N}��S���W���X���Y��Z�v�[�o�^�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�i�c�����(��2��;��?"��C=��EU��Hh��Kx��Q���T���V��W�x�X�p�Y�i�\�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�c�`�����'��2��9��<$��A=��BR��Ec��Hr��M~��Q��S�w�T�p�V�j�W�d�Z�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^�`�^��� +��)��*#��,/��1;{�5Fq�9Ph�=Xa�@^\�DbY�GeW�JgU�MiS�QjR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�TkR�Tk����% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��:$��C3��JB��TU��]i��f|��o��v��~�圄�����܍��؈��ֆ���{�شr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr�ٴr������% +��/��9$��B2��JA��ST��\h��d|��l��t��z�䣀�ޜ��ږ��Վ��Ҋ�z��v�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv�ޫv������% +��/��9$��B1��JA��RT��[h��c|��j��q��v��|�ݥ��؟��Җ��͏��}��{��{��{��{��{��{��{��{��{��{��{��{��{��{��{������% +��/��9$��B1��I@��QS��Zh��a}��h��n��r��w�ۮ{�֩��ѣ�����馇�ꛂ�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂�囂������% +��/��9#��A0��I?��PS��Xh��_}��e���j���n��q�ںu�չ}�ȯ�ಟ�Ꞓ�쒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉�蒉������% +��/��9#��A/��H?��PR��Wh��^}��c���g���i���l���r���x־�ߨ��阢�틓�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ�ꋓ������% ��/��9#��A.��H>��OQ��Vg��\}��`���c���e���i���nͼ�rְ�xޞ�~蔵�뇢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢�臢������% ��/��9"��A.��H=��NQ��Ug��Z}��^���_���b���fº�i̯�mբ�qޑ�v牸�煳�关�关�关�关�关�关�关�关�关�关�关�关�关�关������% ��/��9!��A-��G<��MP��Tf��X|��Z���^���a���d���fʤ�iӖ�kۆ�o䀺���������������������������������������������������% ��/��8 ��@+��G;��MO��Re��U|��Y���]���`���b���dƛ�fώ�h׀�l�{�}�y���y���y���y���y���y���y���y���y���y���y���y���y���y���y�������% ��/��8��@*��G:��LM��Pc��R{��X���\���_���a���b�dʆ�f�{�j�v�x�u���u���u���u���u���u���u���u���u���u���u���u���u���u���u�������%��/��8��@(��F8��KJ��Mb��Pz��V���[���]���_���`���b��c�v�h�q�t�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�pĀ�����%��/��8��@&��F4��JG��Lb��Ox��U���Y���[���]���^���_�y�a�p�f�l�p�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�k�z�����%��/��8��?"��E0��GH��Ja��Mv��R���W���Y���[���[�z�\�r�_�k�d�h�m�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�f�u�����$��/��7��?��A/��FH��H_��Kr��P���T���W���X�{�Y�s�Z�k�\�f�a�c�i�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�b�q�����$��.��7��;��@1��CH��E\��Hm��M{��Q���T�|�U�t�W�l�X�f�[�a�_�^�e�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�]�k�����$��- ��4 ��8��>2��@E��BW��Ef��Is��N~|�Q�t�S�l�T�g�V�b�Y�^�]�\�b�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g�Z�g��� +��6��:1��;A��>Q��B_��Ej|�Its�M{k�O�f�R�a�T�^�W�[�[�Y�_�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c�X�c��� +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@/��I=��TM��^_��hq��q���z�����뇉�灐��|���z���z���z���t���l���j���j���j���j���j���j���j���j���j���j���j���j���j������" +��,��6"��@.��I<��RL��\_��fq��p���x��ꍇ�冎�―��}���|���{���r�Ⱥj�ɸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk�ȸk������" +��,��6"��@-��H;��QK��Z^��dq��m���v��~�蕄�㍊�߆��܁��ۀ���z�ϼp�ѱn�ίo�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o�̯o������" +��,��6"��?,��G:��PK��Y^��bq��j���s��z�瞂�ᖇ�܍��ن��ք���y�رq�ةs�ѧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs�ϧs������" +��,��6!��?+��G9��OJ��X^��`q��h���p���w��}�����ڕ��Ԍ��͈�ۼ��۪w�ڢw�Ԡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw�Ҡw������" ��,��6!��?+��F8��NI��W]��_q��f���m��t��y�ަ�֠��ʔ���ܵ��ݣ}�ݚ{�י{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{�ՙ{������" ��,��6 ��>*��F8��MI��V]��]q��d��k��p��u�۰|�Χ���״��ݮ��ߜ��ߓ�ڒ�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג�ג������" ��,��6 ��>)��F7��MH��U\��\q��b���h���l��r�Էy�ǭκ��֬��ޢ��┋�ዃ�܋��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ��ڋ�������" ��,��6��>(��F6��LG��T\��[q��a���e���j���p�ͽv���|ͳ��դ��ݖ��㍓�ㄉ�߄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄��܄�������" ��,��6��>(��E6��LG��S[��Yp��^���b���g���m���sù�x̬�}՝����㇟��~���~���~���~���~���~���~���~���~���~���~���~���~���~�������" ��,��5��>'��E5��KF��RZ��Xp��\���`���e���j���p²�u̥�yԕ�}܇��ᅮ��{���z���z���z���z���z���z���z���z���z���z���z���z���z�������" ��,��5��=&��E3��KD��QY��Vo��Y���]���b���g���k���p˝�tӍ�xڃ��ށ���y���x���x���x���x���x���x���x���x���x���x���x���x���x�������"��,��5��=$��D2��JC��OW��Tn��V���[���_���c���f���iʐ�l҃�p�|�}�y���v���u���u���u���u���u���u���u���u���u���u���u���u���u�������"��+��5��=#��D0��JA��NU��Pl��T���Z���]���_���a���bȂ�c�w�h�s�u�q�oÜ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�qĤ�����"��+��5��= ��D-��I=��KS��Nk��R���X���[���]���_���_�{�a�q�e�m�q�kƀ�jǒ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�iǗ�����"��+��4��<��C)��G9��JS��Mj��P~��V���Y���[���\�~�]�t�_�l�d�h�m�g�z�f̉�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�e̎�����!��+��4��<��B"��D:��HR��Kh��Nz��S���W���Y���Z�v�[�m�]�g�b�d�j�b�u�a҂�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�a҆�����!��+
��3��;��="��C;��FQ��Hd��Ku��Q���T���V�x�W�o�Y�h�[�c�`�_�f�^�p�]�{�\��\��\��\��\��\��\��\��\��\��\��\��\������!��* ��2 ��1��<%��A;��BN��E_��Hn��M{��Q�z�S�p�U�i�W�c�Z�_�^�\�c�[�k�Y�t�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w�Y�w��� +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=,��F8��PF��[W��fh��px��z������|���w���t���t���t���t���s���n���i���e���e���e���e���e���e���e���e���e���e���e���e������ +��)��3!��=+��F7��PE��ZV��eg��ox��x����������z���w���v���u���u���s���n���g���f���f���f���f���f���f���f���f���f���f���f���f������ +��)��3 ��<*��E6��OD��YU��cg��mx��v���~��遍��{���y���x���x���s���l���h���j���j���j���j���j���j���j���j���j���j���j���j������ +��)��3 ��<(��E4��MC��WT��ag��kx��t��|�푃�牊�げ��|���{���y���q�Ǻh�ɳl�°n���n���n���n���n���n���n���n���n���n���n���n������ ��)��3��<'��D3��LB��VT��_f��hy��q��z�왁�摇�����݀���}���{���t�Ͳn�̫p�Ʃr���r���r���r���r���r���r���r���r���r���r���r������ ��)��3��<&��D2��KA��TS��]f��fy��n��v��~�䙄�ڌ��Ѓ��ˁ��Ƀ�иz�ϫs�Ϥt�ɢu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu�Ģu������ ��(��2��<&��D2��K@��SR��\f��dy�l���s��z�ݞ��Ҕ��NJ�����Ѿ��ұ��Ҥx�ҝw�̛x�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx�Ǜx������ ��(��2��;%��C1��J@��SR��[e��by�j��p��v�ץ}�˛�����ͷ��ӳ��ԫ��ԝ}�Ԗz�ϕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{�ʕ{������ ��(��2��;$��C0��J?��RQ��Ze�ay�g��m�ݲt�Ѫ{�š�ú��̯��ө��֤��֗��}�я~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~�̏~������ ��(��2��;#��C/��J>��QP��Xd�_x��e��k�ظr�̰x���~³��̨��ԟ����؏��؉��Ԉ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ��ψ������� ��(��2��;"��B.��I=��PO��Wd��]x��c���i�Ӿp�Ƶv���{��ˡ��ӕ��ِ��ڈ��ځ��ց��с��с��с��с��с��с��с��с��с��с��с���������(��2��:!��B-��I<��ON��Vc��[x��`���g���m���s���x���}ʚ��ӌ��ن��܁���z���z���z���z���z���z���z���z���z���z���z���z���z���������(��2��: ��B,��H;��NM��Ta��Yw��^���d���j���o���t���yɒ�}҅������}���u���u���u���u���u���u���u���u���u���u���u���u���u���������(��2��:��A*��H9��MK��R`��Vu��[���a���g���l���p���tȊ�w��~�{���z���s���r���r���r���r���r���r���r���r���r���r���r���r���������(��1��:��A(��G7��LH��P]��St��Y���^���c���g���k���nǁ�r�y�{�w���vģ�o���o���o���o���o���o���o���o���o���o���o���o���o���������(��1��9��A%��G3��KD��M\��Qs��V���Z���^���a���c���f�w�j�q�u�nDŽ�mǗ�kȬ�k���k���k���k���k���k���k���k���k���k���k���k���������(��1��9��@"��F/��HC��L[��Oq��S���X���[���\���]�w�^�l�c�h�m�f�{�eˋ�d̞�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�eͬ�������(��0��8��?��B+��GC��JZ��Mn��Q���V���X���Z�|�[�p�\�h�b�d�j�c�v�bу�aє�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�`ҟ�������'��0
��7��=��A,��EC��HX��Jk��N{��S���V��W�t�Y�j�[�c�`�`�g�^�q�^�}�]؋�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�\ٕ�������' ��. ��4 ��8��@.��CC��EU��Gf��Kt��P���S�w�U�m�W�e�Z�`�^�]�d�[�l�Z�v�Y߂�Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���Y���������%��)��)��8��=/��?A��AQ��D`��Gm��Lxx�O�o�R�g�U�a�X�]�\�Z�b�Y�h�W�p�W�z�V联V联V联V联V联V联V联V联V联V联V联V联�� +��%��0 ��:(��C2��L?��WN��a_��ln��v}�����z���u���r���q���q���q���p���l§�hŨ�bĩ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ�dƦ���� +��%��0��9&��B1��K>��VM��`^��jn��t~��}��z���v���t���t���s���p���l���f���f���hê�hê�hê�hê�hê�hê�hê�hê�hê�hê�hê���� +��%��0��9%��B/��J=��UL��_]��hn��r~��{�퀋��z���v���v���u���p���i���f���i���l���l���l���l���l���l���l���l���l���l���l������ +��%��/��9$��B.��J;��TK��]\��gn��p�x��ꇈ��~���x���u���v���r���m���j���m���o���o���o���o���o���o���o���o���o���o���o������ ��%��/��8#��A-��I:��RJ��[\��en��n�v��~�㌄�ۀ���y���x���z���x�ºr�¯m���p���r���r���r���r���r���r���r���r���r���r���r������ ��%��/��8"��A,��H9��PI��Z[��bm�k�t��{�ܑ��҇���~���|���}�ſ}�ųw�Ĩq�Ĥs���u���u���u���u���u���u���u���u���u���u���u������ ��%��/��8!��@+��H8��OH��XZ�am�i�q��w�֙~�̎��
�»��Ǹ��Ƿ��Ǭ|�ǡv�ǝw���x���x���x���x���x���x���x���x���x���x���x������ ��%��/��8 ��@*��G7��OG��WY�_m�g�n�ۧu�О|�ƕ�����²��Ȯ��ʭ��ʥ��ʚz�ɖy�Ôz���z���z���z���z���z���z���z���z���z���z������ ��%��/��8��@)��G6��NF��VX�]l�d�k�֭s�ˤy�����������ɥ��̣��̝��̒~�̎|�Ǝ}���}���}���}���}���}���}���}���}���}���}������ ��%��/��7��?'��G5��ME�TW�\k�bܹi�ѱq�ũw���|��������ɛ��Θ��ϕ��ϊ��·��ɇ��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç��Ç������� ��%��/��7��?&��F4��LC��SV��Zj��`~ؿg�˶n���t���z���~����ɒ��ύ��ы��т���~������������������������������������������%��.��7��?%��F2��LB��RT��Xi��^}��e�Ƽl���q���v���{���ȉ��Ђ��Ӏ���{���v���x���x���x���x���x���x���x���x���x���x���x���������%��.��7��>#��E0��K@��PR��Vg��\|��c���i���n���s���w���{ǁ���z���y���v���q���q���q���q���q���q���q���q���q���q���q���q���������%��.��6��>!��E.��J=��NO��Sf��Yz��`���f���j���o���s���v�z�|�u���t���r���m���m���m���m���m���m���m���m���m���m���m���m���������%��.��6��=��D*��I9��LL��Qd��Wy��]���b���f���j���m�~�q�s�x�p���o���n���j���j���j���j���j���j���j���j���j���j���j���j���������%��-��5��=��C&��H4��KJ��Ob��Tw��Y���]���a���d���f�u�k�m�u�kDŽ�jʖ�jͫ�f���f���f���f���f���f���f���f���f���f���f���f���������%��-��5��<��B��E3��JJ��Ma��Qt��U���X���Z���\�v�^�j�c�e�o�d�}�cь�bѝ�aҲ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�aʻ�������$��,��4
��:��<��D4��HJ��J_��Mq��R���U���W�z�X�m�Z�d�`�`�j�_�v�^փ�]ג�\ؤ�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�[ش�������$��+��1��2��< ��B5��EI��G\��Jl��Nz��R�~�U�r�V�h�Y�a�_�]�g�[�q�Z�|�Yވ�Xޘ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�Xߥ�������"��'��'��2��;"��?5��BG��DW��Gf��Ks��O~u�R�k�T�c�X�]�]�Z�d�Y�m�X�v�W倘V捗V晖V晖V晖V晖V晖V晖V晖V晖V晖V晖V晖��
������ +��#��&��*){�.4p�1=g�4E_�8LX�<QS�?TO�CWM�HYK�LZJ�QZI�U[H�Z[G�_[G�eZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZG�jZӸ +����z�#%o�&.d�*6\�.<V�2AQ�6EM�:HJ�=JH�AKF�ELE�HLC�LMC�OMB�SMA�XM@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L@�]L�� +��y�n�!c�)Z�#/S�'4N�,8J�0;F�3=D�6?B�:?@�=@?�@@>�BA=�EA<�IA:�MA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA:�PA������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�w.!�|8(��A2��J=��VK�}bY�wof�q{q�l�y�j�~�i���i���j���j���jĄ�jͅ�hІ�e҆�cՇ�`؈�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ�]ۉ������#�x.!�7'��A1��J<��UJ��aX�{mf�uyr�o�|�l���k���k���k���k���kÉ�kˊ�h�eЌ�bӍ�_֎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎�]؎������#�z- ��7&��@/��I;��TH��_W��jf�|ut�v��q���n���m���m���m���m���lȔ�hʕ�e͖�bЗ�_И�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ�aӓ������#�~-��6$��?-��H9��SG��]V��hf��rt�}}��w���r���p���o���o���o���mĞ�iǟ�eʠ�`ɡ�b͜�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ�dИ������"��-��6"��?+��G7��QE��\U��fe��pt��z��|���v���r���p���p���p���m���hĨ�cĩ�cƧ�fʡ�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜�g͜������"��,��5!��>*��G6��QD��[T��ee��nu�w���z���t���p���o���n���m���i���e���fë�iǤ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ�kˠ���� +��"��,��5 ��>)��G5��PC��ZS��cd�lu�u��}�����u���p���p���q���s���n���j���j���lŨ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ�nȣ���� +��"��,��5��>'��F3��OA��XR��bc�kt�s��z�݄���y���t���t���u���w���t���o���m���p¬�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ�qƧ���� +��"��,��5��>&��E2��M@��VP�_b�it�q�ߔw�~�́���z���x���y���z���y���t���q���s���tê�tê�tê�tê�tê�tê�tê�tê�tê�tê���� +��"��+��4��=$��E0��L>��UO�]b�ft�n�ٛu�В|�ƈ�������|���|���~������x���t���v���w���w���w���w���w���w���w���w���w���w������ +��"��+��4��=#��D/��K=�SN��\`�dsݨk�ԡs�ʙz�������������������������}���x���y���y���y���y���y���y���y���y���y���y���y������ ��"��+��4��<"��D-��K<�RL�Z_�bsٮi�Ϧq�Ğw���}��������������������������{���|���|���|���|���|���|���|���|���|���|���|������ ��"��+��4��< ��C,��J:�PK�X^߸`qԲg�ʫo���u���z�����������Ô��Ē��Ď��Ć�Å������������������������������������ ��"��+��3��;��C*�I8�OI��W\۾^pϷe�Űl���r���x���}��������ĉ��LJ��Dž���}���}���~���~���~���~���~���~���~���~���~���~������� ��"��+��3��;��B(�H6��NF��UZ��\oʼc���j���p���u���y���~��������|���{���u���t���v���v���v���v���v���v���v���v���v���v������� ��"��*��3��;��A%��H3��MC��RY��Zm��a��g���m���q���v���z��~�v���t���s���o���n���o���o���o���o���o���o���o���o���o���o���������"��*��2��:�A"��G/��K?��OW��Wl��^}��d���i���m���q���u�w�z�p���o���n���l���i���j���j���j���j���j���j���j���j���j���j���������!��*��2��9��@��F)��F=��NU��Uj��[{��`���e���i���l�|�p�p�v�k���j���j���i���f���f���f���f���f���f���f���f���f���f���f�����
����!
��)��1��8��>��C"��G:��LR��Rg��Wy��\���`���c��f�r�j�i�s�f���f���eã�dŸ�b���b���b���b���b���b���b���b���b���b���b�����
����! +��( +��0 +��6
��;��@#��G:��JO��Od��Sv��W���Z���\�u�_�i�d�c�o�a��aҐ�`Ԣ�_ַ�]���]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê]�ê��
����!��'��-��1��6��@%��E;��HN��Ka��Or��R���U�x�V�k�Y�a�_�]�j�[�y�Z܇�Yݖ�Yݦ�W�X�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢX�ɢ��
������#��%��$��7��>'��B:��EL��G]��Kl��Oy|�R�p�T�f�X�^�^�Z�g�Y�s�X��W䌛V䚚U嫙T庘T庘T庘T庘T庘T庘T庘T庘T庘T庘������� +��3��7(��:7��=D��@Q}�B]s�Fgj�Job�Ov\�TzX�Z}U�a~S�i~R�q~R�{}Q��|Q��{P��zP��zP��zP��zP��zP��zP��zP��zP��zP��z�� + +v�j�`�!W�'P� ,J�%0F�)3B�-5?�07=�48;�78:�;98�>97�A96�D95�H94�L93�P93�P93�P93�P93�P93�P93�P93�P93�P93�P9�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�}
�y�r"�i."�p5'�t?0�tI:�tTF�obS�hp^�d|f�b�k�b�m�b�n�b�o�c�p�c�p�d�q�d�q�c�r�b�r�`�s�^�s�\�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�Z�t�~�z�s!�l-!�s5&�w>/�yH9�xSE�s`R�mm^�hzh�e�n�d�q�d�s�d�t�d�u�e�u�e�v�f�w�d�w�b�x�`�x�^�y�[�z�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y�Z�y��{
�u!�p,�x4$�}>-�G7�QD�z^Q�tj_�nvj�i�s�g�x�f�{�f�|�g�}�g�~�g��g��eԀ�cׁ�`ڂ�]݃�\���]�~�]�~�]�~�]�~�]�~�]�~�]�~�]�~�]�~���|
�v!�t*�}4#��=+��F6��PB��\P�{g^�urk�o~v�j�}�i���h���h���h���h���hˈ�fщ�cԊ�_�\ٌ�^݇�_߃�_߃�_߃�_߃�_߃�_߃�_߃�_߃�_߃���}
�w �x*��3!��<)��E4��N@��ZO��e^�{pl�tzx�n���k���j���i���i���i���iǑ�f͒�bє�^ҕ�_Ց�bڋ�b܈�b܈�b܈�b܈�b܈�b܈�b܈�b܈�b܈���~�x �{*��3��<'��D2��M?��XM��c]��ml�{wz�t���n���k���j���i���i���h�fʜ�a̞�`Λ�cҖ�e�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ�fٌ����y �~)��2��;%��D0��L=��WL��a\�kl�tz�z}��r���l���j���i���i���j���jɢ�fɢ�dʠ�fΚ�hӔ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ�iՐ����z ��)��2��;$��C.��K;��VJ��`Z�ik�r{�z��v���n���k���l���m���n���pƥ�kǥ�hǤ�j˟�lЙ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�lҕ�����{ ��)��1��:"��C,��K9��UH�^Y�gj�p{އv��}}��u���p���p���q���r���s���pĩ�lĩ�mȣ�o͝�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�pЙ�����| ��(��1��: ��B*��J7��SF�]X�fi��m{؎t�υ{��|���v���t���u���v���w���u¬�p¬�qŧ�rʠ�s͜�s͜�s͜�s͜�s͜�s͜�s͜�s͜�s͜�����}��(��1��:��B(��I5�QE�ZV�chkzҕr�Ɍx���~��|���y���y���z���{���z���u���të�uȤ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�vʠ�����}��(��0��9��A&��H3�OC�XT�ag֢iy͚q�Òw���|������~���|���}���~������y���w���xŧ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�xȣ�������'��0��9��@$�G1�N@�WRܮ_fҧgwȠn���u���z�������������������������}���z���{ë�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ�{Ʀ���� +����'��0��8��@"�G/�M>�VOس]dͫevål���s���x���|��������������������������}���}���}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ�}ĩ���� +����'��0��7��? �F,�L;TNӷ\cȰct��j���p���u���z���~��������������������z���|���|�¬|�¬|�¬|�¬|�¬|�¬|�¬|�¬|�¬���� +����'��/��7��>�E)��K7��QLϼZaõas��h���n���s���w���{�����|���y���x���v���q���s���t���t���t���t���t���t���t���t���t������� +����&��.��6�=�D%��I4��OJ��X_��_q��e���k���p���t���x�}�}�s���p���p���o���j���l���m���m���m���m���m���m���m���m���m������� ��
��&��.
��5�<��B ��E2��MH��U]��\o��b��g���l���p���t�u�y�m���k���j���j���f���g���g���g���g���g���g���g���g���g���g������� ����& +��-��4��;��@��A/��KF��S[��Ym��_|��d���h���k�y�o�n�u�h���f���f���e���c���c�¬c�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩc�ĩ������ ��%��+�2 +��7��8��@,��IC��PX��Vj��[z��_���b�}�f�p�i�g�q�c�~�b���a���a���_�ê_�ŧ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ_�Ǥ�� +������#��(��-��.��:��C)��G@��MU��Rg��Vw��Y��\�s�_�g�d�`�m�^�|�]Ɍ�]˞�\ͯ�[�ȣZ�ʠZ�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞Z�̞�� +������ �"����,��;��B+��E>��IQ��Mc��Ps��R�u�U�h�X�_�^�[�j�Y�y�X܊�Xݛ�W߬�V�U�ИV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕV�ҕ�� +������ +��9��?,��B=��EN��H^��Lly�Oxm�R�c�V�\�]�X�h�V�v�UꄐUT뢎S볍R�̌Q�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ыQ�ы�� ���� +�w
�x��$��-��6��>!��F,��M:�WJޝ`]Ԗhnˎo}Æu��~{��x���v���v���v���w���x���vȣ�sɢ�tΛ�tҕ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�tԒ�{ +�x�z��$��-��5��=�E*�L8�VH٣^[МgmƔm|��s���y��~��{���y���z���{���{���{Ʀ�vƦ�v˟�vИ�vі�vі�vі�vі�vі�vі�vі�vі�| +�x�|��$��,��5��<�D'�K4߭TEը]Yˠek��lz��r���w���|������}���}���~���~���ê�yĪ�yȣ�y͜�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�yϙ�| +�y���$��,��4��;�C$�J1۱RCѬ[Wƥci��jx��p���u���y�������������������������}���|Ƨ�|˟�{̝�{̝�{̝�{̝�{̝�{̝�{̝�{̝�} �z����#
��+��3�;�B �H-PA̰YVªah��hw��n���s���w���|�����������������~���z���y�êzȣzʠzʠzʠzʠzʠzʠzʠzʠ�~ �z����#��*��2�9�@F*ӺO@ȴWT��_f��fu��k���q���u���y���~�z���w���u���t���q���p�¬r�ǥr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣr�ȣ�~ �{����# +��* +��1��8�?��C(οM>ùUR��]d��cs��i���n���r���v�{�z�q���m���l���k���j���i�¬j�Ʀk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥk�Ȥ��|�� +��"��)��/ +�6
��<��@&��K<��SO��Zb��`q��f��j���n��r�s�w�k���h���g���f���f�¬d�ĩe�Ȥe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢe�ɢ���} +����!��'�,��2��3��>#��H9��QM��W_��]o��b|��f���j�x�n�l�s�e�}�c���b���b���a���`�Ǥ`�˟a�̞a�̞a�̞a�̞a�̞a�̞a�̞a�̞��� +���� ��$�'��(��,��; ��E6��MJ��T\��Yl��]y��a�{�e�o�i�e�o�`�{�_���^���^���]���\�̞\�Ϛ\�И\�И\�И\�И\�И\�И\�И\�И����������� + +�� ~�$t�)%j�,.`�06X�3<Q�7BK�;EG�AHD�GJB�NK@�UK?�]K>�fJ=�pI<�zI;��H:��G:��F:��F:��F:��F:��F:��F:��F:��Fή +}�r�h� !^�$(V�(/O�,4I�08D�4;A�9=>�?>;�D>9�J?7�P?6�W>5�^>4�f=3�o<1�{;1�;1�;1�;1�;1�;1�;1�;1�;Ÿ +p�f�\�S�#L�(F�$,A�'/<�+19�037�535�943�>41�C4/�I4.�N4-�T3,�[3*�c2*�f2*�f2*�f2*�f2*�f2*�f2*�f2*�f2�� +�d�Z#�f%�n.�r7$�rA.�qJ8�mVD�gbP�bn[�^zb�\�f�[�h�\�i�\�j�\�k�\�k�]�l�]�m�]�n�\�o�Y�o�Z�k�\�g�]�c�]�c�]�c�]�c�]�c�]�c�]�c�]�c�l +�e�_!�k$�s-�x6"�y?+�xI6�uSB�p_O�ik\�cvf�_�l�^�p�]�q�]�s�]�t�]�u�]�v�]�w�]�x�Z�z�\�v�]�q�^�m�_�h�_�h�_�h�_�h�_�h�_�h�_�h�_�h�m
+�f�c�o#�x,�}5�>(�G3�~Q@�x]N�qg\�jrh�d{r�`�w�_�{�^�|�^�~�]��^���_ƀ�`�^��_�|�`�w�a�r�b�m�b�m�b�m�b�m�b�m�b�m�b�m�b�m�n
�h�g�t#�},��4��=%��F0��O=�ZK�ze[�rni�iwv�c��`���`���a���b���c���d���dх�cޅ�b���c�}�d�x�e�r�e�r�e�r�e�r�e�r�e�r�e�r�e�r�n �i�j�x"��+��4��<"��E-�M:�XI�bY�zki�prx�iz��e���e���e���f���g���h���iɊ�iڊ�f܈�g���h�}�h�w�h�w�h�w�h�w�h�w�h�w�h�w�h�w�o �j�n�|"��*��3��;��D*�L7�WF�`Vقhg�ypv�qw��l��j���j���j���k���l���m�nՏ�j؎�k܇�k���l�|�l�|�l�|�l�|�l�|�l�|�l�|�l�|�p �k�q�!��*��2��;�C&�K4�VBܑ_TӉgeˁnt�yt��s{��o���n���n���o���p���q���qΓ�nԓ�oٌ�o݇�oလoလoလoလoလoလoလo��q�k�t��!��)��1��:�B#�J0��U?ח^QΏecňlr��r�zx��u��r���r���s���t���t���uȗ�rї�rՑ�rڋ�rބ�rބ�rބ�rބ�rބ�rބ�rބ�rބ�q�l�w��!
��(��1��9��A �I,ܢS<Ҝ\Oɕda��jp��p}��u��{|��w���v���w���w���x���x�vΚ�uҖ�u֏�tۈ�t܈�t܈�t܈�t܈�t܈�t܈�t܈�r�m�y
��!��(��0�8�?�G(اQ:ΡZMĚb_��in��n{��s���y��|��z���z���z���z���{���z̞�wϚ�wӔ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�wٌ�s�n�|�� +��'��/
�6�>ޯF#ԫO8ʥYK��`]��gl��mz��r���v���|��~���}���}���}���~���~ɡ�{̞�zЗ�yՐ�y�y�y�y�y�y�y�s +�o�~�� ��' ��-�5�<۳C!ЯN7ƩWJ��_[��ek��kx��p���t���y�����������}���|���z�Ťw~ɢx}Λx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕx|Ӕ�t +�p
�� +����&��, �3�:ַA ̳L5��UH��]Y��ci��iv��n���r���v���{�x���u���s���q���p���n�Ǥo�̞p�їp�іp�іp�іp�іp�іp�іp�і�u +�r������$�*�06Ҽ?ǷJ2��SE��[W��ag��gt��k���p���t�y�x�o��k���j���i���h���f�Ȥg�̞h�Иh�Зh�Зh�Зh�Зh�Зh�Зh�З�v �u������"�&�+��. ��=½H0��QC��XT��^d��dr��h~��l�}�q�r�u�i�}�e���d���c���c���a�ʠb�Λb�Җb�Җb�Җb�Җb�Җb�Җb�Җb�Җ�w �y ������� ��)��:��E-��N@��UQ��[a��`o��e{��i�v�m�k�r�c�{�`���`���_���_���^�Κ^�і^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց^�Ց�x�~������ + + +y�o�e�[� S�#&L�'+F�+/A�02=�54:�:67�@64�F73�M61�T60�\5.�e5-�o4,�y3+��2+��2+��2+��2+��2+��2+��2+��2�� +V�M�F� ?�
9�4�!1�".�#+�$$)�(%'�,%%�1%#�6% �;%�@$�F$�L#�S"�S"�S"�S"�S"�S"�S"�S"�Y�O�E'�F-!�I3%�I<+�GH2�EU8�Cc<�Cr=�D�=�D�=�E�=�F�=�G�<�H�<�H�<�I�<�I�;�J�;�J�;�K�;�K�:�L�:�L�:�M�:�M�:�M�:�M�:�M�:�M�:�M�:�M�:�Y�P�E'�H, �K2%�K;+�JF2�GS8�Ea=�Ep?�E~?�F�?�G�?�H�?�I�?�I�>�J�>�J�>�K�>�K�=�L�=�L�=�M�=�M�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�N�=�Z�Q�F&�L*�P0#�Q:*�OD1�LQ9�I^>�HmB�H{C�I�C�J�C�K�C�L�C�L�C�M�C�M�B�N�B�N�B�O�B�O�B�P�B�P�B�P�B�P�B�Q�A�Q�A�Q�A�Q�A�Q�A�Q�A�Q�A�[�R�H&�P(�U."�W8(�UC0�QN9�N\@�KjD�LxF�L�G�M�G�N�H�N�G�O�G�O�G�P�G�P�G�Q�G�Q�H�R�H�R�H�R�H�R�H�R�F�S�D�S�D�S�D�S�D�S�D�S�D�S�D�\
�S�L$�U'�Z- �\7&�[A/�VL8�SY@�PgG�OtJ�O�L�P�M�P�M�Q�M�Q�M�R�M�R�M�S�M�S�N�T�N�T�N�T�O�T�O�T�N�U�K�U�I�U�I�U�I�U�I�U�I�U�I�U�I�^
�T�P"�Y%�`,�c6$�b@-�_J6�ZV@�VcI�SpN�S}Q�S�S�S�S�T�T�T�T�T�T�U�U�U�U�U�V�V�V�V�W�V�W�V�W�W�S�X�P�X�N�X�N�X�N�X�N�X�N�X�N�X�N�_
�V�U �_"�g+�j4!�j>*�gH4�bS?�]_I�YlR�WxW�V�Z�V�[�V�\�V�\�W�]�W�^�W�^�W�_�X�`�X�a�W�a�Y�]�Z�Z�Z�V�[�S�[�S�[�S�[�S�[�S�[�S�[�S�`�W�Y�d!�m*�q3�q<'�oF1�lP=�f\I�`hT�[s\�Y~a�X�c�X�e�X�f�X�g�X�h�X�i�X�j�X�k�X�l�Z�h�[�d�\�`�]�\�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�^�Y�a�X�^�j �s)�w2�x;#�xD.�uN:�oYG�hdT�bn`�]yg�[�l�Z�n�Y�p�Y�q�Z�q�[�q�\�q�]�q�]�q�]�o�_�j�`�f�`�b�a�_�a�_�a�_�a�_�a�_�a�_�a�_�b�Z�b�o �x(�}1�: �C*�~K6�yWD�raR�jka�bsl�]}t�]�v�]�w�^�w�_�w�_�w�`�w�a�w�a�w�a�v�b�q�c�l�c�g�d�d�d�d�d�d�d�d�d�d�d�d�d�d�c�[�g�t�}'��0��9��A&�J2�U@�{_P�sg`�jom�dxv�b�z�a�|�b�|�c�|�c�|�d�|�e�|�f�|�e�|�e�w�f�r�f�m�g�i�g�i�g�i�g�i�g�i�g�i�g�i�d�]�j�x��&��/��7�@"�I.�T<ۃ]L�{e]�sml�ltv�h|}�f���f���g���h���h���i���j́�jၪi�|�i�w�j�r�j�n�j�n�j�n�j�n�j�n�j�n�j�n�e�^�n�{
��&
��.��6�?�G*ޑS8Պ\J͂c[�{ji�tqu�nx~�k���k���k���l���l���m���mƅ�nچ�m���m�|�m�w�l�s�l�s�l�s�l�s�l�s�l�s�l�s�f
+�a�q
���%��-��5�=�F%ڗR5АZGljbX��hg�{ot�uu~�q|��o���o���o���p���q���q���rԊ�p݇�pၔo�{�o�w�o�w�o�w�o�w�o�w�o�w�o�w�g
+�d�t�� +��$ +��+�4�<ߟE ՜P3̕YE`V��ge��mr�|r}�wy��t���s���s���s���t���t���uΎ�sٌ�sޅ�r��q�{�q�{�q�{�q�{�q�{�q�{�q�{�g
+�f�w +����#��* �2
�:ۤCѠN0ǚXC��_T��ec��kp��p{�}v��y|��w���v���v���w���w���wȒ�vՐ�uۊ�t߄�t��t��t��t��t��t��t��h +�i
�z ����"��)�0 +�7بAͤL.ÞVA��^R��da��in��nz��s��~y��z���y���y���y���z���zÖyҕ~x؎~w܈}v߃}v߃}v߃}v߃}v߃}v߃}v߃�i +�k�|����!��'�-ެ4 +Ӭ?ɨK,��T?��\O��c_��hl��mx��q���v��|�}��}|��{}��y}��w~��u}ϙu|Ԓv{ًuy݇uy݇uy݇uy݇uy݇uy݇uy݇�j �n����� �$�)۱.ϰ=ŬI*��R<��ZM��a]��gj��kv��o���s�}�x�v���r���p���o���m���l�Λl�ҕmm~ۊm~ۊm~ۊm~ۊm~ۊm~ۊm~ۊ�j �q �������� �"ֶ*˴;��G(��P:��XK��_Z��dh��it��m��q�v�u�m�|�i���g���f���e���d�̚e�ҕe�֏f�ڋf�ڋf�ڋf�ڋf�ڋf�ڋf�ڋ�k �t������� +�x���� +�} +����
+��;��E,��L=��QL��VZx�Zgn�]rc�b{[�i�W�t�V���U���U���T��S��~S��|T��yT��wT��wT��wT��wT��wT��wT��w�u��� +��+{�0q�5+f�96]�<?T�AGN�GMJ�OPG�YRF�cRE�pQD�~PD��NC��MC��LB��KA��IA��IA��IA��IA��IA��IA��IA��Iڙ +J� +��" +��)�1�:�D ؊O/σXA�|`Q�ug_�onj�jur�h~v�h�x�h�x�h�x�i�x�i�x�j�y�j�y�k�w�k�q�k�m�j�h�j�f�j�f�j�f�j�f�j�f�j�f�Z
�_�o +�{��!��( �/�8ݔCӏN,ʉW>��^N�|e]�vki�qrr�nyx�l�{�l�|�l�}�m�}�m�}�m�}�n�}�n�}�n�w�m�q�m�l�l�k�l�k�l�k�l�k�l�k�l�k�[
�b�r �����&�- �5
ٙAΔL*ŎU<��]L��cZ�}ig�wor�svy�q}~�o���o���o���p���p���pŁ�pۂ�p�{�p�v�o�q�o�o�o�o�o�o�o�o�o�o�o�o�\�e�u������$�+ߝ2 ԝ?ʘK(��T9��[I��bX��he�~mp�yry�uy��s���r���r���s���s���s���sֆ�s r�z�q�u�q�s�q�s�q�s�q�s�q�s�q�s�\�g
+�x�����!�'ۣ-С=ƝI%��S7��ZG��aV��fc��kn�~px�zu��w}��u���u���v���v��~v��}vъ|vބ{u�~zt�yzs�wzs�wzs�wzs�wzs�wzs�w�]�j �z������!צ*̥;¡H#��Q5��YE��_S��ea��il��nw�s��{y�}y��zy��xy��vy��tz��szˍsz܈sx��rw�|rv�{rv�{rv�{rv�{rv�{rv�{�^�m +�}����� + + �x�� +>� +�q�y�~& +�.
�7��A�|M*�uW;�n_J�hfW�cn_�awd�`�f�`�f�a�g�a�g�b�g�b�g�c�g�c�g�c�g�f�b�g�]�g�Y�f�U�f�U�f�U�f�U�f�U�f�U�M�Z�i �u�}��$�+ �4ۈ@уL'�|U8�v\H�odU�jk_�gsf�e{j�e�k�e�k�e�l�f�l�f�l�f�l�g�l�g�l�i�g�i�b�i�^�h�Z�h�Z�h�Z�h�Z�h�Z�h�Z�N�]
�l�x����"�(��0 ֍>̈J%ÂS6�|[E�wbS�qh^�mog�jvl�io�i�p�i�p�i�p�i�q�j�q�j�q�j�q�k�m�k�g�k�c�j�_�j�_�j�_�j�_�j�_�j�_�O�` +�p�{����%ܓ,ё<ǍH"��R3��YB�}`P�xf\�slf�psn�mzr�l�t�l�u�l�u�l�u�l�u�l�u�m�v�n�r�n�l�m�h�l�d�l�d�l�d�l�d�l�d�l�d�R�c �s
������ ؗ)͕;ÒG ��P0��X@��^N�~dZ�yje�ton�qvt�o~w�o�x�o�y�o�y�o�y�o�z�o�z�p�w�p�q�o�ln�hn�hn�hn�hn�hn�h�T
�f�v���� + +��B��M)��T8��[F��`S��d_��ij�msx}r|qzy�my��ky��iz��hz��fz��f{g{�{gy�vgw�rgw�rgw�rgw�rgw�rgw�r�] �o�� +��>��F&��L4{�RAr�VLi�ZX`�_aY�fhT�olR�{lQ��kQ��jP��hO��gO��eO��cO��aP��_P��_P��_P��_P��_P��_�v +i�+`�1W�6&O�</I�B5D�J9A�T;@�_;?�k:>�y8>�7=�6=�4<��3;��2;��1:��1:��1:��1:��1:��1:��1ϙ +>�8�2�.�*�&� #�& �+�1�8�A�J�U�`�k �w�������������� +�-�5�> +�j +�m&
�m.�k8�gB!�bN-�\X:�WbD�TlI�TvL�TL�T�M�U�M�U�M�V�M�V�M�V�M�W�N�W�N�W�N�Y�I�Z�F�[�C�]�@�]�?�]�?�]�?�]�?�]�?�A�P
�] �h�o�s$ �u+�t5�q@�lL'�eV7�_^D�[gL�YpQ�YzR�Y�S�Y�S�Y�T�Z�T�Z�T�[�T�[�T�[�T�[�U�]�P�_�L�a�I�a�E�a�D�a�D�a�D�a�D�a�D�D�T�b�m�u�y!�{(�{1�z>�tJ$�nS4�h[B�ccM�_lT�^tW�]}Y�]�Y�^�Y�^�Z�^�Z�_�Z�_�Z�_�Z�`�[�a�W�c�R�d�N�d�K�d�J�d�J�d�J�d�J�d�J�H�X +�f�q�y�~�$ނ-Ԁ<�{H!�vQ1�pY?�j`K�fhT�cpZ�bx]�b�^�b�_�b�_�b�_�c�_�c�`�c�`�c�`�d�^�f�X�g�T�f�P�f�O�f�O�f�O�f�O�f�O�K
�[�j +�u�|��ه)υ:ŁF�|P.�wW<�q^I�meT�il\�gs`�f{c�e�d�e�d�e�d�f�e�f�e�f�e�f�e�f�d�h�^�i�Y�h�U�h�T�h�T�h�T�h�T�h�T�N�^�m �x
�� + +�d�s�~ +R�$K�*D�0>�7!:�>$7�G%5�Q%4�\$3�i#2�w"1�!0��/��/��.��.��.��.��.��.��.���� +I�B�!;�'6�-2�4/�;,�D*�M)�X'�d%�s$��#��"��!��!��!��!��!��!��!���� +)�%�"��!�&�-�4�=�G�S�_�l +$� + + + + + +�$�'�#'�$)�!0�9�F�T�a�o�|��������������������� ��!��!��!�
�!�
�!��!��!��!��!��!��!��%�!%�%$�''�%-�!7� D�Q�_�m�y����� �� ��!��!��"��#��#��$��%��&��&��&��&��&��&��&��&��&��&��&��&�$"�)!�+#�*)�)4�&A�%N�$\�$j�$v�$��%��&��&��'��'��(��)��)��+��+��,��,��,��,��-��,��,��,��,��,��,��'�(�.�0 �0&�11�.>�,K!�+X!�*f �*r�+~�,��-��-��.��.��/��0��0��1��2��2��3��3��3��3��3��3��3��3��3��3��(�-�4�7�9#�:.�8:�4G"�2T$�2a#�2n"�2z!�3� �4��4��5��6��6��7��8��8��9��9��9��:��:��:��;��;��;��;��;��;��*�3�:�?�C!�C+�A7�=C#�:O&�9\'�9i&�9u&�:�%�;�$�;�$�<�#�<�#�=�#�=�"�>�"�?�"�?�"�?�"�?�"�@�!�A� �A��B��B��B��B��B��B��-�9�A�G�L �M)�J3�F>!�BJ'�?W*�?d+�?p+�@{*�A�*�B�*�B�*�B�*�C�*�C�*�C�*�D�*�D�+�D�+�E�*�F�)�G�'�G�%�H�$�H�#�H�#�H�#�H�#�H�#�2�?�G�P
�V�V&�T0�P:�KF%�GR,�F^/�Ek1�Fv1�F�1�G�1�G�1�H�1�H�2�H�2�I�2�I�2�I�3�J�3�J�3�K�0�L�.�M�,�M�*�N�)�N�)�N�)�N�)�N�)�7�C�N�X +�] +�_%
�^-�Z7�TA!�PN*�MY2�Ke6�Kp8�Kz8�L�9�L�9�M�9�M�9�M�9�N�:�N�:�N�:�O�:�O�;�P�8�Q�5�R�3�S�1�S�/�S�/�S�/�S�/�S�/�<�I�T �_�e�g" �g*�d3�`?�[K%�VU2�R_:�Qj=�Qs?�Q|@�Q�@�Q�@�R�@�R�@�R�A�S�A�S�A�S�A�S�B�T�?�V�<�W�9�Y�7�Y�5�Y�5�Y�5�Y�5�Y�5�@�N +�Z +�e�k�n�n&�l/�j=�eI!�_R0�Z[;�WdA�VnD�VwF�VF�V�G�V�G�W�G�W�G�W�G�W�H�X�H�X�H�X�F�[�B�\�?�\�<�]�:�]�:�]�:�]�:�]�:�C
�R�`�j�p�s�t!�t*�r:�mF�gP-�bX9�^`C�[iH�ZqK�ZzL�Z�M�[�M�[�M�[�M�[�N�\�N�\�N�\�N�\�M�^�I�_�E�_�B�`�@�`�@�`�@�`�@�`�@�G�U�d�n�t�x +�Y + +�zC�vL&�qT4�l[@�hbJ�eiP�cpT�bxV�b�W�b�X�b�X�b�Y�b�Y�b�Y�b�Z�b�Z�c�T�e�P�e�L�e�I�e�I�e�I�e�I�e�I�N �] +k�;c�A[�G(T�L1N�R8I�Z<F�c>E�o=D�|<D��;C��9B��8B��7A��5@��5@��5?��5?��5?��5?��5?��5ֆ +3� +.�
*�&�#"�)�0�9�B�M�Z�i
�y�� +�� + +�� �� �� �� �� �� �� + ���
�!
�'
�/
�9�D + +���� + + +z� +������
�
�������� +�� +�� �������������������������$�#�#�%�+�5�C�Q�^�l�x����������
��
�������� +�� +�� ���������������������#� �"�"!�'�3�@�M�[�h�u���������������
��
��� ��!�� � +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�!� +�"�#�'�(�'$�(0�%<�#J�"W�!d�!q�!|�"��#��$��$��%��&��&��'��(��(��)��)�
�)�
�)�
�)�
�)�
�*�
�*�
�*�
�*�
�*�
�!�(�-�/�1!�1,�/9�,E�*S�*`�)l�*x�+��,��,��-��-��.��/��/��0��1��1��1��1��2��1��2��2��2��2��2��2��%�/�5�9�<�<)�94�5A�2N�2[�2h�2s�3}�4��5��5��6��6��7��7��8��8��8��9��9��9��:��:��:��:��:��:��:��*�5�<�B
�G�F&�C0�?<�;I �9V!�9b!�:n �;y�;��<��=��=��=��>��>��>��?��?��?��@��A��A��A��A��A��A��A��A��0�;�B +�K +�P�P$�M,�H7�CC�@P#�@]$�Ai$�Bt$�B}$�B�$�C�%�C�%�D�%�D�%�D�&�E�&�E�&�E�&�E�'�F�&�G�$�G�#�H�!�H� �H� �H� �H� �H� �6�@ +�J �T�X�Y �W)
�R3�M?�JL"�HX'�Gc*�Gn+�Hw,�H,�I�-�I�-�I�-�J�-�J�-�J�.�J�.�K�.�K�/�K�-�L�+�M�)�M�'�O�&�O�&�O�&�O�&�O�&�;
�F �Q�[�`�a�`%�\.�X<�TH�PS)�N]/�Mg2�Mq3�My4�N�4�N�4�N�4�O�5�O�5�O�5�O�5�O�6�P�6�P�5�Q�2�S�0�T�.�T�,�T�+�T�+�T�+�T�+�? +�K�W�a�f�h�g �d*�b9�^E�YO)�UX2�Sb7�Rk9�Rt:�R|;�S�;�S�;�S�;�T�<�T�<�T�<�T�<�T�=�T�=�V�9�W�6�W�4�X�2�X�1�X�1�X�1�X�1�B +�O + +��B��J"�}Q.�yV8�v[Br`KyoeStlkYpks]mj|_kj�`ij�`gj�`fj�`dj�`ck�_el�Yfl�Ugl�Qgl�Pgl�Pgl�Pgl�P�X + +$�� +#�� !�� +!�� +!�� +!�� +!�� +�� +)�*%�2
#�;
�E
�P�]�m +�~ �������������������� +�+ +�4 +�>
�I +�V�e�w������������������ +�"�*�4 + +� +�� ��������� �� �� +�� +�� +�� +�� +�� +�� +�� +�� +����������"����%�1�>�L�Z�f�r
�}�
��� +�� �� ������������������������������������� ��"�.�;�H�V�c�o�y��
������ +�� +�� �� ������������������� �� �� �� �� ���#�'�&�*�)+�&7�#D�!Q�!^� j� u�!�"��#�
�$��$��%��&��&� +�'� +�(� +�(� �(� �(� +�(� +�)��*��)��)��)��)��)��"�*�.�2�5�4&�13�-?�+L�*Y�*f�+q�+{�,��-��.��.��/��/��0��1��1�
�1�
�1��2��2��2��2��2��2��2��2��2��(�1
�6 +�=�@�?#�;-�7:�3G�2T�3a�4l�5v�6�6��7��7��7��8��8��9��9��9��9��:��:��:��;��;��:��:��:��:��.�7 �> �F�J�I +�E)�@4�<A�:N�;[�<g�=q�=z�>��>��>��?��?��?��@��@��@��@��A��A��B��B��B��B��B��B��B��3
�= �F�O�R�R�O% �J/
�F<�DI�CV�Ca�Ck �Dt!�D|!�E�!�E�!�E�"�E�"�F�"�F�"�F�#�F�#�F�#�G�#�G�"�H� �I��J��I��I��I��I��9�B + +�uA�qI �mP+�jV5�f\=�cbB�ahF~`oI|`wKz`�Ly`�Lw`�Mu`�Ms`�Nq_�Np_�Opa�Iqa�Erb�Brb�@rb�@rb�@rb�@�P + +6�?
3�H2�R0�]0�j/�x
.Έ-Ι,ϭ+�� +*�� (��'��
&��&��&��&���� +�� ������������ +"�$� +!� +� +#�0�=�K
�X� +a +� +l � +w�����
��
����������������������������������������"� )�5�B�O�\�h +�s �|��������������������������� �� �� �� �� �� �� ���$
�& +�+�-�,$�(0�$=�"J�!W
�!c�"n +�#x �$��%��%��&��&��'��'��(��(��(��)��*��*��*� �*� �*� �*� +�*� +�*� +�*� +�%�+�/ �7�8 �7 �3+�.8�,E�+R�+^
�-j�.t�/} +�/� +�0� +�0� +�1� +�1��2��2��2��3��3��3�
�4�
�3��4��3��3�
�3�
�3�
�3�
�+ +�2 �:�A +�C�A�=& +�81
�4?�4L�5Y�6e�7n�8w�8�9��9��:��:��:��;��;��;��;��;��;��<��;��;��<��<��<��<��1 +�8 + +v�Ap�Gj�M$c�Q,]�V5W�[<R~bAN}jDL}uEK}�DJ~�CI~�AI~�@H~�>G~�=G}�;G|�:G|�9G|�9G|�9G|�9�h +d�A^�GX�M"R�R)M�X/I�`3F�i4E�t4D��2C��1C��/B��.A��,@��+?��+?��+>��+>��+>��+>��+�u +�S +���& + +� +�
� +� +
�
� *�7�E � +�N�Z� +f� +p�y�
������������� +�H �U�a�l�u�}��������������������� ��"��"��"��"��"��!��!��!��! �% �*�/ �0�.�*) �%5 +�#C �"P�#\�$g�%q�&y�'��(��(��)��)��*��*��+��+��+��,��,��,��,��,� �+� �+� �+� �+� �' �, +�4� +�4� +�5� +�5��5��5��5��5�
�5�
�6�
�6�
�6�
�6�
�6�
�- +-�� +��*��)��'��&��%�� $�� +#�� +#�� +#�� +�� + +� +� +� +� +� +� +� � +�
�
��#�0�>� +� +�7� +�7� +�7��7��7��7��7��6��6��6��6��. +�BC�BM�BV�B^�Bf�Cm�Ct�Cz�C��C��C��C��C��C��C��B��B��B��B��B��B��B��B��4 + +�[?�XF�UM�TS$}RZ&{R`(yQg*wQo*uQw+tQ�,rQ�,pQ�-oQ�-mQ�.kQ�/iP�/iQ�+iQ�)iQ�'iQ�&iQ�&iQ�&�E + +6�J
4�S2�\1�g0�s
0��/��.�� +,�� +��*��)�� +(��'��'��'���� +� + + +� +� +� +� � + +��� +��!� +��"�
. +< +�8� +�8� +�8��8��7��7��7��7��7��7��* + +�I@�HI�GQ�FX�F_�Fe�Fl�Fs�F{F�}F�|F�zF�yF�wF�uF�tF�sF�rF�rE�rE�rE��9 +Yx@TvFPuKKsQ!GrW%Dr_'Bqi(Aqt'@r�&?r�$>r�#=r�!<r� <r�:p� 9o� 9n�!9n�!9n�!�g +-�� ,�� +��*��)��
)��)���{ + +�
�� + +� +� +�8� +�8� +�8��8��8�~7�}7�}7�}7�}7��* +�=J�=R�=Y�=_
�=f
�=l
�=s
�=z�=��=�=�~=�|=�{=�y=�w=�v=�u<�u<�t<�t<��3 +OqAKpGFoMCnT@n[>me<mp<n|;n�:n�9n�8n�7n�6l�5k�4j�4i�4i��g +-� +,}�+|�
*{�)z�)z��s +.�` -�l ,�x+��)��(��'��%��%��$��#��#�� #�� �{ +�� +� +� + + +� +� +� +� +� + + + +w8� +v8�t7�r7�q7�o7�o7�o6�o6��3 +zAD
xAKu@Rs@Xq@^p@en@mm@uk@~i@�h@�f@�d@�b@�a@�`@�_@�_?�_?�_?��@ +tFApEGnDNkDTiDZhDafDieDqcD{aD�`D�^D�\D�ZD�YC�XC�XC�XC�XC�XC��E +ElCAkI>jP;jX9ja8jk7jw6j�5j�4j�3j�2j�1h�0g�/f�.e�.e��f +,q�+o�
*n�)m�)m��l +1|U +/|^ +.|i +-|u ,|�+{�){�({�'z�&y�%x�$v� #u� +#u� +�r +�Z +� +� +� +� +� +# +i7� +g7�f7�d7�b7�a6�a6�a6�a6��9 +p;Mn;Tl;Zj;`i;hg;p
f;y
d;�
b;�a;�_;�];�[;�Z;�Z;�Y:�Y:�Y:��? +k@Ch?I
f?Od?Vb?\a?d_?l^?v\?�[?�Y?�W?�U?�T?�S?�S>�S>�S=�S=��D +<fE
9fL6eT4e]3eg2fs1f�0f�
/f�.f�-e� +,e� ++c�*b�)a�)`��e +1nR/n[.ne +-nq ,n+n�*n�)n�'m�&m�%k�$i� #h� +#h� +�k + +�� + +� + + + +R +Z6� +X6�V6�U6�T5�T5�T5�T4��? +^9Q +]9X[:_Z:gX:pW:{
U:�
T;�R;�P:�O:�M:�M9�M9�M8�M8��D + +Y>GW=M
U=TT=[R>dQ>mO>xN>�L>�K>�I>�G>�F>�F=�F=�F<�G<��I +-Z� ,Z� *X�)W�
(V�(U��_ +/aX +.ab +-bn ,b{+b�)b�(a�'a�&a�%_�$]� #\� +#\��d +u� +u� +t� +�4 + +K6� +I5�H5�G5�G4�G4�G3� +�D +N8W +M9_K9hJ9sH:G:�E:�
C:�
B:�
@9�
@9�
@8�
@8�
A7��H + +-O� ,O�*O�)N� (L�(K�(K�
�Y +�^ +j� +vS +� + +v + +� +� +:3� +:3� �G +=9k +;9w +9:� +8:� +7:� +5:� +4:� 39� +38�48�47��K +9=U7>^6>i5>u3?� +2?� +1?� 0?� .?�.>� -=� +-<�.<��O +2C\ +1Dg +/Dt .D� -E�,E�+E�)E�(D�(C� 'A� +'A��S +� + + + +? +E + + +[f +c + + +� +� +� +& + + + +� + + + +~ +� +� +� + +;� + +H* + + + +U +_ + +0� +/� +6[ +� + + + + + +D +&� +*K +/ + + + + + + + +� + + + + +3 +; +� += + +" +* + + + +� +* +2 +^ + + + + +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"$%&()*+-./02346789;<=>@ABDEFGIJKMNOPRSTUWXY[\]^`abcefgijklnopqstuwxyz|}~��������������������������������������������������������������������������������������������������������������������������������������������� +
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~��������������������������������������������������������������������������������������������������������������������������������mft1 +
!"#$%&'()**+,-./0123456789:;;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~�������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�������������������������������������������������������������������������������������������������������������������������������� +
!""#$$%&&'())*+,--./01223456789:;<=>?@BCDEFHIJLMOPRSUWXZ\^`bdfhjmoqtvy|~�����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������o����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������zP�����������������������������MX����������������������������эiJq�����������������������������Ѽ����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������Ën�������������������������������?
v����������������������������C + + + + + +0000000016 00000 n
+0000000258 00000 n
+0000049926 00000 n
+0000000000 00000 f
+0000051754 00000 n
+0000049977 00000 n
+0000050174 00000 n
+0000051642 00000 n
+0000706162 00000 n
+trailer
<</Size 10/Root 1 0 R/Info 9 0 R/ID[<48E3C0FFD128417BA648BA7D23CF5EFE><DBB5A29BDA8140B19E24D16A6DE97083>]>>
startxref
706421
%%EOF
\ No newline at end of file diff --git a/example-thesis/my-thesis-setup.tex b/example-thesis/my-thesis-setup.tex new file mode 100644 index 0000000..cffba7e --- /dev/null +++ b/example-thesis/my-thesis-setup.tex @@ -0,0 +1,82 @@ +% !TEX root = my-thesis.tex + + +% ************************************************** +% Files' Character Encoding +% ************************************************** +\PassOptionsToPackage{utf8}{inputenc} +\usepackage{inputenc} + + +% ************************************************** +% Information and Commands for Reuse +% ************************************************** +\newcommand{\thesisTitle}{The Clean Thesis Style} +\newcommand{\thesisName}{Ricardo Langner} +\newcommand{\thesisSubject}{Documentation} +\newcommand{\thesisDate}{June 21, 2016} +\newcommand{\thesisVersion}{My First Draft} + +\newcommand{\thesisFirstReviewer}{Jane Doe} +\newcommand{\thesisFirstReviewerUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisFirstReviewerDepartment}{Department of Clean Thesis Style} + +\newcommand{\thesisSecondReviewer}{John Doe} +\newcommand{\thesisSecondReviewerUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisSecondReviewerDepartment}{Department of Clean Thesis Style} + +\newcommand{\thesisFirstSupervisor}{Jane Doe} +\newcommand{\thesisSecondSupervisor}{John Smith} + +\newcommand{\thesisUniversity}{\protect{Clean Thesis Style University}} +\newcommand{\thesisUniversityDepartment}{Department of Clean Thesis Style} +\newcommand{\thesisUniversityInstitute}{Institute for Clean Thesis Dev} +\newcommand{\thesisUniversityGroup}{Clean Thesis Group (CTG)} +\newcommand{\thesisUniversityCity}{City} +\newcommand{\thesisUniversityStreetAddress}{Street address} +\newcommand{\thesisUniversityPostalCode}{Postal Code} + + +% ************************************************** +% Debug LaTeX Information +% ************************************************** +%\listfiles + + +% ************************************************** +% Load and Configure Packages +% ************************************************** +\usepackage[english]{babel} % babel system, adjust the language of the content +\PassOptionsToPackage{% setup clean thesis style + figuresep=colon,% + hangfigurecaption=false,% + hangsection=true,% + hangsubsection=true,% + sansserif=false,% + configurelistings=true,% + colorize=full,% + colortheme=bluemagenta,% + configurebiblatex=true,% + bibsys=biber,% + bibfile=bib-refs,% + bibstyle=alphabetic,% + bibsorting=nty,% +}{cleanthesis} +\usepackage{cleanthesis} + +\hypersetup{% setup the hyperref-package options + pdftitle={\thesisTitle}, % - title (PDF meta) + pdfsubject={\thesisSubject},% - subject (PDF meta) + pdfauthor={\thesisName}, % - author (PDF meta) + plainpages=false, % - + colorlinks=false, % - colorize links? + pdfborder={0 0 0}, % - + breaklinks=true, % - allow line break inside links + bookmarksnumbered=true, % + bookmarksopen=true % +} + +% ************************************************** +% Other Packages +% ************************************************** +\usepackage{scrhack}
\ No newline at end of file diff --git a/example-thesis/my-thesis.pdf b/example-thesis/my-thesis.pdf Binary files differnew file mode 100644 index 0000000..6574034 --- /dev/null +++ b/example-thesis/my-thesis.pdf diff --git a/example-thesis/my-thesis.tex b/example-thesis/my-thesis.tex new file mode 100644 index 0000000..ae2341d --- /dev/null +++ b/example-thesis/my-thesis.tex @@ -0,0 +1,129 @@ +% ************************************************** +% Document Class Definition +% ************************************************** +\documentclass[% + paper=A4, % paper size --> A4 is default in Germany + twoside=true, % onesite or twoside printing + openright, % doublepage cleaning ends up right side + parskip=half, % spacing value / method for paragraphs + chapterprefix=true, % prefix for chapter marks + 11pt, % font size + headings=normal, % size of headings + bibliography=totoc, % include bib in toc + listof=totoc, % include listof entries in toc + titlepage=on, % own page for each title page + captions=tableabove, % display table captions above the float env + chapterprefix=false, % do not display a prefix for chapters + appendixprefix=false, % but display a prefix for appendix chapter + draft=false, % value for draft version +]{scrreprt}% + + +% ************************************************** +% Setup YOUR thesis document in this file ! +% ************************************************** +\input{my-thesis-setup} + + +% ************************************************** +% Document CONTENT +% ************************************************** +\begin{document} + +% uncomment the following command to fill up pages with +% whitespace instead of aligning the first and last lines +% of a page (see \raggedbottom vs. \flushbottom) +%\raggedbottom + +% -------------------------- +% rename document parts +% -------------------------- + +% > set short label names for floating environments figure and table +%\renewcaptionname{ngerman}{\figurename}{Abb.} +%\renewcaptionname{ngerman}{\tablename}{Tab.} +\renewcaptionname{english}{\figurename}{Fig.} +\renewcaptionname{english}{\tablename}{Tab.} + +% > rename the title of the LOL, i.e. list of listings (default is "Listings") +\renewcommand*{\lstlistlistingname}{List of Listings} + +% -------------------------- +% Front matter +% -------------------------- +\pagenumbering{roman} % roman page numbing (invisible for empty page style) +\pagestyle{empty} % no header or footers +\input{content/titlepages} % INCLUDE: all titlepages +\cleardoublepage + +\pagestyle{plain} % display just page numbers +\input{content/abstract} % INCLUDE: the abstracts (english and german) +\cleardoublepage +% +\input{content/acknowledgement} % INCLUDE: acknowledgement +\cleardoublepage +% +\currentpdfbookmark{\contentsname}{toc} +\setcounter{tocdepth}{2} % define depth of toc +\tableofcontents % display table of contents +\cleardoublepage + +% -------------------------- +% Body matter +% -------------------------- +\pagenumbering{arabic} % arabic page numbering +\setcounter{page}{1} % set page counter +\pagestyle{scrheadings} % header and footer style + +%% Uncomment the following lines using the \part command +%% to add part sections +%\part{Example Part} +\input{content/chapter-introduction} % INCLUDE: introduction +\input{content/chapter-related-work} % INCLUDE: related work + +%\part{Additional Example Part} +\input{content/chapter-system} % INCLUDE: system +\input{content/chapter-concepts} % INCLUDE: concepts +\input{content/chapter-conclusion} % INCLUDE: conclusion + +% -------------------------- +% Back matter +% -------------------------- +% +{% +\setstretch{1.1} +\renewcommand{\bibfont}{\normalfont\small} +\setlength{\biblabelsep}{0pt} +\setlength{\bibitemsep}{0.5\baselineskip plus 0.5\baselineskip} +\printbibliography[nottype=online] +\newrefcontext[labelprefix={@}] +\printbibliography[heading=subbibliography,title={Webpages},type=online] +} +\cleardoublepage + +\listoffigures +\cleardoublepage + +\listoftables +\cleardoublepage + +\lstlistoflistings +\cleardoublepage + +\appendix\cleardoublepage +\input{content/chapter-appendix} % INCLUDE: appendix + +\cleardoublepage +\input{content/colophon} + +\cleardoublepage +\input{content/declaration} +\clearpage + +\newpage +\mbox{} + +% ************************************************** +% End of Document CONTENT +% ************************************************** +\end{document} diff --git a/scripts/bumpversion.py b/scripts/bumpversion.py new file mode 100644 index 0000000..a621455 --- /dev/null +++ b/scripts/bumpversion.py @@ -0,0 +1,75 @@ +import sys +import re +from datetime import datetime + +def bump(args): + if ( len(args) != 1 ): + print('Usage: python bumpversion.py [major|minor|patch]') + return + + # get the current version + f = open('VERSION') + current_version = f.readline() + f.close() + + # extract the version parts + parts = current_version.split('.') + major = parts[0] + minor = parts[1] + patch = parts[2] + + # bump the version + cmd_arg = args[0] + if (cmd_arg=='major'): + major = int(major)+1 + minor = 0 + patch = 0 + if (cmd_arg=='minor'): + minor = int(minor)+1 + patch = 0 + if (cmd_arg=='patch'): + patch = int(patch)+1 + new_version = '{}.{}.{}'.format(major, minor, patch) + + bump_version_file(current_version, new_version) + bump_sty_file(current_version, new_version) + bump_docs_file(current_version, new_version) + +def bump_version_file(curr_version, new_version): + filename = 'VERSION' + + with open(filename, 'r') as f: + content = f.read() + content = content.replace(curr_version, new_version) + with open(filename, 'w') as f: + f.write(content) + +def bump_sty_file(curr_version, new_version): + filename = 'cleanthesis.sty' + + with open(filename, 'r') as f: + content = f.read() + regex = re.compile('\d{4}/\d{2}/\d{2}\sv'+curr_version) + content = re.sub(regex, datetime.now().strftime('%Y/%m/%d')+' v'+new_version, content) + with open(filename, 'w') as f: + f.write(content) + +def bump_docs_file(curr_version, new_version): + filename = 'doc/cleanthesis-doc.tex' + + with open(filename, 'r') as f: + content = f.read() + + regex = re.compile('revision={'+curr_version+'}') + repl = 'revision={'+new_version+'}' + content = re.sub(regex, repl, content) + + regex = re.compile('date={\d{4}/\d{2}/\d{2}}') + repl = 'date={'+datetime.now().strftime('%Y/%m/%d')+'}' + content = re.sub(regex, repl, content) + + with open(filename, 'w') as f: + f.write(content) + +if __name__ == "__main__": + bump(sys.argv[1:])
\ No newline at end of file diff --git a/scripts/dev-end.sh b/scripts/dev-end.sh new file mode 100644 index 0000000..d269f14 --- /dev/null +++ b/scripts/dev-end.sh @@ -0,0 +1 @@ +unlink ./example-thesis/cleanthesis.sty
\ No newline at end of file diff --git a/scripts/dev-start.sh b/scripts/dev-start.sh new file mode 100644 index 0000000..adc143d --- /dev/null +++ b/scripts/dev-start.sh @@ -0,0 +1 @@ +ln -s ../cleanthesis.sty ./example-thesis/cleanthesis.sty
\ No newline at end of file diff --git a/scripts/publish.py b/scripts/publish.py new file mode 100644 index 0000000..c8238a4 --- /dev/null +++ b/scripts/publish.py @@ -0,0 +1,84 @@ +import os +import shutil +import zipfile +import subprocess + +# code for zipping from https://stackoverflow.com/questions/14568647/create-zip-in-python +def zip(src, dst): + print ' create zip archive '+dst+'.zip' + zf = zipfile.ZipFile("%s.zip" % (dst), "w", zipfile.ZIP_DEFLATED) + abs_src = os.path.abspath(src) + for dirname, subdirs, files in os.walk(src): + for filename in files: + absname = os.path.abspath(os.path.join(dirname, filename)) + arcname = absname[len(abs_src) + 1:] + #print ' zipping %s as %s' % (os.path.join(dirname, filename), arcname) + zf.write(absname, arcname) + zf.close() + +def publish(): + print 'PUBLISH cleanthesis --> started' + + dist_folder = './dist' + folder_plain = dist_folder+'/plain/cleanthesis' + folder_withexample = dist_folder+'/withexample/cleanthesis' + + # remove dist folder and recreate it + print ' delete dist folder '+dist_folder + shutil.rmtree(dist_folder, ignore_errors=True) + os.makedirs(dist_folder) + print ' create folder '+dist_folder + + # publish example thesis files + print ' copy files of example thesis' + shutil.copytree(src='./example-thesis', dst=folder_withexample, + ignore=shutil.ignore_patterns('*.aux', '*.bbl', '*.bcf', '*.blg', '*.fdb_latexmk', '*.fls', '*.lof', '*.log', '*.lol', '*.lot', '*.out', '*.xml', '*.gz', '*.toc', '.sty')) + + # create doc folder + os.makedirs(folder_plain+'/doc') + print ' create folder '+folder_plain+'/doc' + os.makedirs(folder_withexample+'/doc') + print ' create folder '+folder_withexample+'/doc' + + files = [ + ('./CHANGELOG.md', 'CHANGELOG.md'), + ('./cleanthesis.sty', 'cleanthesis.sty'), + ('./MANIFEST.md', 'MANIFEST.md'), + ('./README.md', 'README.md'), + ('./VERSION', 'VERSION'), + ('./doc/cleanthesis-doc.tex', 'doc/cleanthesis-doc.tex'), + ('./doc/cleanthesis-doc.pdf', 'doc/cleanthesis-doc.pdf') + ] + + print ' copy cleanthesis to dist folder' + for file in files: + #print ' copy {} to {}'.format(file[0], folder_plain+'/'+file[1]) + shutil.copyfile(file[0], folder_plain+'/'+file[1]) + #print ' copy {} to {}'.format(file[0], folder_withexample+'/'+file[1]) + shutil.copyfile(file[0], folder_withexample+'/'+file[1]) + + # get the current version + f = open('VERSION') + current_version = f.readline() + f.close() + + # fix file permissions + print ' fix file permissions for CTAN ...' + for f in [folder_plain,folder_withexample]: + for dir, subdirs, files in os.walk(f): + for file in files: + #print os.path.join(dir, file) + os.chmod(os.path.join(dir, file), 0664) + #for d in subdirs: + # print os.path.join(dir, d) + # os.chmod(os.path.join(dir, d), 0775) + + # zip the release of the style (without example thesis) + zip(folder_plain+'/..', dist_folder+'/cleanthesis_v'+current_version) + # zip the release of the style including example thesis + zip(folder_withexample+'/..', dist_folder+'/cleanthesis-incl-example_v'+current_version) + + print 'PUBLISH cleanthesis --> finished' + +if __name__ == "__main__": + publish()
\ No newline at end of file diff --git a/scripts/updatecopyrightyear.py b/scripts/updatecopyrightyear.py new file mode 100644 index 0000000..5c29715 --- /dev/null +++ b/scripts/updatecopyrightyear.py @@ -0,0 +1,28 @@ +import re +from datetime import datetime + +def update_copyright_year(): + # header of all files (occurrences) + files = ['CHANGELOG.md','cleanthesis.sty','MANIFEST.md','README.md','doc/cleanthesis-doc.tex'] + for filename in files: + with open(filename, 'r') as f: + content = f.read() + regex = re.compile('Copyright\s\d{4}\sR.\sLangner') + if (len(re.findall(regex, content)) > 0): + repl = 'Copyright {} R. Langner'.format(datetime.now().strftime('%Y')) + content = re.sub(regex, repl, content) + with open(filename, 'w') as f: + f.write(content) + + # in the docs + filename = 'doc/cleanthesis-doc.tex' + with open(filename, 'r') as f: + content = f.read() + regex = re.compile('Copyright\s.textcopyright.\s\d{4}\sR.\sLangner') + repl = 'Copyright \\\\textcopyright\ '+datetime.now().strftime('%Y')+' R. Langner' + content = re.sub(regex, repl, content) + with open(filename, 'w') as f: + f.write(content) + +if __name__ == "__main__": + update_copyright_year()
\ No newline at end of file |
