Author: ddas
Date: Tue Feb 19 21:02:02 2008
New Revision: 629356

URL: http://svn.apache.org/viewvc?rev=629356&view=rev
Log:
HADOOP-2371. Commit for the html/pdf docs.

Added:
    hadoop/core/trunk/docs/hdfs_permissions_guide.html
    hadoop/core/trunk/docs/hdfs_permissions_guide.pdf

Added: hadoop/core/trunk/docs/hdfs_permissions_guide.html
URL: 
http://svn.apache.org/viewvc/hadoop/core/trunk/docs/hdfs_permissions_guide.html?rev=629356&view=auto
==============================================================================
--- hadoop/core/trunk/docs/hdfs_permissions_guide.html (added)
+++ hadoop/core/trunk/docs/hdfs_permissions_guide.html Tue Feb 19 21:02:02 2008
@@ -0,0 +1,478 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" 
"http://www.w3.org/TR/html4/loose.dtd";>
+<html>
+<head>
+<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
+<meta content="Apache Forrest" name="Generator">
+<meta name="Forrest-version" content="0.8">
+<meta name="Forrest-skin-name" content="pelt">
+<title>
+      Permissions User and Administrator Guide
+    </title>
+<link type="text/css" href="skin/basic.css" rel="stylesheet">
+<link media="screen" type="text/css" href="skin/screen.css" rel="stylesheet">
+<link media="print" type="text/css" href="skin/print.css" rel="stylesheet">
+<link type="text/css" href="skin/profile.css" rel="stylesheet">
+<script src="skin/getBlank.js" language="javascript" 
type="text/javascript"></script><script src="skin/getMenu.js" 
language="javascript" type="text/javascript"></script><script 
src="skin/fontsize.js" language="javascript" type="text/javascript"></script>
+<link rel="shortcut icon" href="images/favicon.ico">
+</head>
+<body onload="init()">
+<script type="text/javascript">ndeSetTextSize();</script>
+<div id="top">
+<!--+
+    |breadtrail
+    +-->
+<div class="breadtrail">
+<a href="http://www.apache.org/";>Apache</a> &gt; <a 
href="http://hadoop.apache.org/";>Hadoop</a> &gt; <a 
href="http://hadoop.apache.org/core/";>Core</a><script src="skin/breadcrumbs.js" 
language="JavaScript" type="text/javascript"></script>
+</div>
+<!--+
+    |header
+    +-->
+<div class="header">
+<!--+
+    |start group logo
+    +-->
+<div class="grouplogo">
+<a href="http://hadoop.apache.org/";><img class="logoImage" alt="Hadoop" 
src="images/hadoop-logo.jpg" title="Apache Hadoop"></a>
+</div>
+<!--+
+    |end group logo
+    +-->
+<!--+
+    |start Project Logo
+    +-->
+<div class="projectlogo">
+<a href="http://hadoop.apache.org/core/";><img class="logoImage" alt="Hadoop" 
src="images/core-logo.jpg" title="Scalable Computing Platform"></a>
+</div>
+<!--+
+    |end Project Logo
+    +-->
+<!--+
+    |start Search
+    +-->
+<div class="searchbox">
+<form action="http://www.google.com/search"; method="get" class="roundtopsmall">
+<input value="hadoop.apache.org" name="sitesearch" type="hidden"><input 
onFocus="getBlank (this, 'Search the site with google');" size="25" name="q" 
id="query" type="text" value="Search the site with google">&nbsp; 
+                    <input name="Search" value="Search" type="submit">
+</form>
+</div>
+<!--+
+    |end search
+    +-->
+<!--+
+    |start Tabs
+    +-->
+<ul id="tabs">
+<li>
+<a class="unselected" href="http://hadoop.apache.org/core/";>Project</a>
+</li>
+<li>
+<a class="unselected" href="http://wiki.apache.org/hadoop";>Wiki</a>
+</li>
+<li class="current">
+<a class="selected" href="index.html">Hadoop 0.16 Documentation</a>
+</li>
+</ul>
+<!--+
+    |end Tabs
+    +-->
+</div>
+</div>
+<div id="main">
+<div id="publishedStrip">
+<!--+
+    |start Subtabs
+    +-->
+<div id="level2tabs"></div>
+<!--+
+    |end Endtabs
+    +-->
+<script type="text/javascript"><!--
+document.write("Last Published: " + document.lastModified);
+//  --></script>
+</div>
+<!--+
+    |breadtrail
+    +-->
+<div class="breadtrail">
+
+             &nbsp;
+           </div>
+<!--+
+    |start Menu, mainarea
+    +-->
+<!--+
+    |start Menu
+    +-->
+<div id="menu">
+<div onclick="SwitchMenu('menu_selected_1.1', 'skin/')" 
id="menu_selected_1.1Title" class="menutitle" style="background-image: 
url('skin/images/chapter_open.gif');">Documentation</div>
+<div id="menu_selected_1.1" class="selectedmenuitemgroup" style="display: 
block;">
+<div class="menuitem">
+<a href="index.html">Overview</a>
+</div>
+<div class="menuitem">
+<a href="quickstart.html">Quickstart</a>
+</div>
+<div class="menuitem">
+<a href="cluster_setup.html">Cluster Setup</a>
+</div>
+<div class="menuitem">
+<a href="hdfs_design.html">HDFS Architecture</a>
+</div>
+<div class="menuitem">
+<a href="hdfs_user_guide.html">HDFS User Guide</a>
+</div>
+<div class="menupage">
+<div class="menupagetitle">HDFS Permissions Guide</div>
+</div>
+<div class="menuitem">
+<a href="mapred_tutorial.html">Map-Reduce Tutorial</a>
+</div>
+<div class="menuitem">
+<a href="native_libraries.html">Native Hadoop Libraries</a>
+</div>
+<div class="menuitem">
+<a href="streaming.html">Streaming</a>
+</div>
+<div class="menuitem">
+<a href="hod.html">Hadoop On Demand</a>
+</div>
+<div class="menuitem">
+<a href="api/index.html">API Docs</a>
+</div>
+<div class="menuitem">
+<a href="http://wiki.apache.org/hadoop/";>Wiki</a>
+</div>
+<div class="menuitem">
+<a href="http://wiki.apache.org/hadoop/FAQ";>FAQ</a>
+</div>
+<div class="menuitem">
+<a href="http://hadoop.apache.org/core/mailing_lists.html";>Mailing Lists</a>
+</div>
+</div>
+<div id="credit"></div>
+<div id="roundbottom">
+<img style="display: none" class="corner" height="15" width="15" alt="" 
src="skin/images/rc-b-l-15-1body-2menu-3menu.png"></div>
+<!--+
+  |alternative credits
+  +-->
+<div id="credit2"></div>
+</div>
+<!--+
+    |end Menu
+    +-->
+<!--+
+    |start content
+    +-->
+<div id="content">
+<div title="Portable Document Format" class="pdflink">
+<a class="dida" href="hdfs_permissions_guide.pdf"><img alt="PDF -icon" 
src="skin/images/pdfdoc.gif" class="skin"><br>
+        PDF</a>
+</div>
+<h1>
+      Permissions User and Administrator Guide
+    </h1>
+<div id="minitoc-area">
+<ul class="minitoc">
+<li>
+<a href="#Overview">Overview</a>
+</li>
+<li>
+<a href="#User+Identity">User Identity</a>
+</li>
+<li>
+<a href="#Understanding+the+Implementation">Understanding the 
Implementation</a>
+</li>
+<li>
+<a href="#Changes+to+the+File+System+API">Changes to the File System API</a>
+</li>
+<li>
+<a href="#Changes+to+the+Application+Shell">Changes to the Application 
Shell</a>
+</li>
+<li>
+<a href="#The+Super-User">The Super-User</a>
+</li>
+<li>
+<a href="#The+Web+Server">The Web Server</a>
+</li>
+<li>
+<a href="#On-line+Upgrade">On-line Upgrade</a>
+</li>
+<li>
+<a href="#Configuration+Parameters">Configuration Parameters</a>
+</li>
+</ul>
+</div>
+    
+<a name="N1000D"></a><a name="Overview"></a>
+<h2 class="h3">Overview</h2>
+<div class="section">
+<p>
+               The Hadoop Distributed File System implements a permissions 
model for files and directories that shares much of the POSIX model. Each file 
and directory is associated with an <em>owner</em> and a <em>group</em>. The 
file or directory has separate permissions for the user that is the owner, for 
other users that are members of the group, and for all other users. For files, 
the <em>r</em> permission is required to read the file, and the <em>w</em> 
permission is required to write or append to the file. For directories, the 
<em>r</em> permission is required to list the contents of the directory, the 
<em>w</em> permission is required to create or delete files or directories, and 
the <em>x</em> permission is required to access a child of the directory. In 
contrast to the POSIX model, there are no <em>sticky</em>, <em>setuid</em> or 
<em>setgid</em> bits for files as there is no notion of executable files. For 
directories, there no <em>sticky</em>, <em>setuid</em> or <em>setgid</em
 > bits directory as a simplification. Collectively, the permissions of a file 
 > or directory are its <em>mode</em>. In general, Unix customs for 
 > representing and displaying modes will be used, including the use of octal 
 > numbers in this description. When a file or directory is created, its owner 
 > is the user identity of the client process, and its group is the group of 
 > the parent directory (the BSD rule).
+       </p>
+<p>
+               Each client process that accesses HDFS has a two-part identity 
composed of the <em>user name</em>, and <em>groups list</em>. Whenever HDFS 
must do a permissions check for a file or directory <span 
class="codefrag">foo</span> accessed by a client process,
+       </p>
+<ul>
+               
+<li>
+                  If the user name matches the owner of <span 
class="codefrag">foo</span>, then the owner permissions are tested;
+               </li>
+               
+<li>
+                  Else if the group of <span class="codefrag">foo</span> 
matches any of member of the groups list, then the group permissions are tested;
+               </li>
+               
+<li>
+                  Otherwise the the other permissions of <span 
class="codefrag">foo</span> are tested.
+               </li>
+       
+</ul>
+<p>
+               If a permissions check fails, the the client operation fails.   
+</p>
+</div>
+
+
+<a name="N10065"></a><a name="User+Identity"></a>
+<h2 class="h3">User Identity</h2>
+<div class="section">
+<p>
+In this release of Hadoop the identity of a client process is just whatever 
the host operating system says it is. For Unix-like systems,
+</p>
+<ul>
+
+<li>
+   The user name is the equivalent of <span class="codefrag">`whoami`</span>;
+</li>
+
+<li>
+   The group list is the equivalent of <span class="codefrag">`bash -c 
groups`</span>.
+</li>
+
+</ul>
+<p>
+In the future there will be other ways of establishing user identity (think 
Kerberos, LDAP, and others). There is no expectation that this first method is 
secure in protecting one user from impersonating another. This user identity 
mechanism combined with the permissions model allows a cooperative community to 
share file system resources in an organized fashion.
+</p>
+<p>
+In any case, the user identity mechanism is extrinsic to HDFS itself. There is 
no provision within HDFS for creating user identities, establishing groups, or 
processing user credentials.
+</p>
+</div>
+
+
+<a name="N10083"></a><a name="Understanding+the+Implementation"></a>
+<h2 class="h3">Understanding the Implementation</h2>
+<div class="section">
+<p>
+Each file or directory operation passes the full path name to the name node, 
and the permissions checks are applied along the path for each operation. The 
client framework will implicitly associate the user identity with the 
connection to the name node, reducing the need for changes to the existing 
client API. It has always been the case that when one operation on a file 
succeeds, the operation might fail when repeated because the file, or some 
directory on the path, no longer exists. For instance, when the client first 
begins reading a file, it makes a first request to the name node to discover 
the location of the first blocks of the file. A second request made to find 
additional blocks may fail. On the other hand, deleting a file does not revoke 
access by a client that already knows the blocks of the file. With the addition 
of permissions, a client's access to a file may be withdrawn between requests. 
Again, changing permissions does not revoke the access of a client that 
 already knows the file's blocks.
+</p>
+<p>
+The map-reduce framework delegates the user identity by passing strings 
without special concern for confidentiality. The owner and group of a file or 
directory are stored as strings; there is no conversion from user and group 
identity numbers as is conventional in Unix.
+</p>
+<p>
+The permissions features of this release did not require any changes to the 
behavior of data nodes. Blocks on the data nodes do not have any of the 
<em>Hadoop</em> ownership or permissions attributes associated with them.
+</p>
+</div>
+     
+
+<a name="N10096"></a><a name="Changes+to+the+File+System+API"></a>
+<h2 class="h3">Changes to the File System API</h2>
+<div class="section">
+<p>
+       All methods that use a path parameter will throw <span 
class="codefrag">AccessControlException</span> if permission checking fails.
+</p>
+<p>New methods:</p>
+<ul>
+       
+<li>
+               
+<span class="codefrag">public FSDataOutputStream create(Path f, FsPermission 
permission, boolean overwrite, int bufferSize, short replication, long 
blockSize, Progressable progress) throws IOException;</span>
+       
+</li>
+       
+<li>
+               
+<span class="codefrag">public boolean mkdirs(Path f, FsPermission permission) 
throws IOException;</span>
+       
+</li>
+       
+<li>
+               
+<span class="codefrag">public void setPermission(Path p, FsPermission 
permission) throws IOException;</span>
+       
+</li>
+       
+<li>
+               
+<span class="codefrag">public void setOwner(Path p, String username, String 
groupname) throws IOException;</span>
+       
+</li>
+       
+<li>
+               
+<span class="codefrag">public FileStatus getFileStatus(Path f) throws 
IOException;</span> will additionally return the user, group and mode 
associated with the path.
+       </li>
+
+
+</ul>
+<p>
+The mode of a new file or directory is restricted my the <span 
class="codefrag">umask</span> set as a configuration parameter. When the 
existing <span class="codefrag">create(path, &hellip;)</span> method 
(<em>without</em> the permission parameter) is used, the mode of the new file 
is <span class="codefrag">666&thinsp;&amp;&thinsp;^umask</span>. When the new 
<span class="codefrag">create(path, </span><em>permission</em><span 
class="codefrag">, &hellip;)</span> method (<em>with</em> the permission 
parameter <em>P</em>) is used, the mode of the new file is <span 
class="codefrag">P&thinsp;&amp;&thinsp;^umask&thinsp;&amp;&thinsp;666</span>. 
When a new directory is created with the existing <span 
class="codefrag">mkdirs(path)</span> method (<em>without</em> the permission 
parameter), the mode of the new directory is <span 
class="codefrag">777&thinsp;&amp;&thinsp;^umask</span>. When the new <span 
class="codefrag">mkdirs(path, </span><em>permission</em> <span 
class="codefrag">)</sp
 an> method (<em>with</em> the permission parameter <em>P</em>) is used, the 
mode of new directory is <span 
class="codefrag">P&thinsp;&amp;&thinsp;^umask&thinsp;&amp;&thinsp;777</span>. 
+</p>
+</div>
+
+     
+
+<a name="N10100"></a><a name="Changes+to+the+Application+Shell"></a>
+<h2 class="h3">Changes to the Application Shell</h2>
+<div class="section">
+<p>New operations:</p>
+<dl>
+       
+<dt>
+<span class="codefrag">chmod [-R]</span> <em>mode file &hellip;</em>
+</dt>
+       
+<dd>
+               Only the owner of a file or the super-user is permitted to 
change the mode of a file.
+       </dd>
+       
+<dt>
+<span class="codefrag">chgrp [-R]</span> <em>group file &hellip;</em>
+</dt>
+       
+<dd>
+               The user invoking <span class="codefrag">chgrp</span> must 
belong to the specified group and be the owner of the file, or be the 
super-user.
+       </dd>
+       
+<dt>
+<span class="codefrag">chown [-R]</span> <em>[owner][:[group]] file 
&hellip;</em>
+</dt>
+       
+<dd>
+               The owner of a file may only be altered by a super-user.
+       </dd>
+       
+<dt>
+<span class="codefrag">ls </span> <em>file &hellip;</em>
+</dt>
+<dd></dd>
+       
+<dt>
+<span class="codefrag">lsr </span> <em>file &hellip;</em>
+</dt>
+       
+<dd>
+               The output is reformatted to display the owner, group and mode.
+       </dd>
+
+</dl>
+</div>
+
+     
+
+<a name="N1013F"></a><a name="The+Super-User"></a>
+<h2 class="h3">The Super-User</h2>
+<div class="section">
+<p>
+       The super-user is the user with the same identity as name node process 
itself. Loosely, if you started the name node, then you are the super-user. The 
super-user can do anything in that permissions checks never fail for the 
super-user. There is no persistent notion of who <em>was</em> the super-user; 
when the name node is started the process identity determines who is the 
super-user <em>for now</em>. The HDFS super-user does not have to be the 
super-user of the name node host, nor is it necessary that all clusters have 
the same super-user. Also, an experimenter running HDFS on a personal 
workstation, conveniently becomes that installation's super-user without any 
configuration.
+       </p>
+<p>
+       In addition, the administrator my identify a distinguished group using 
a configuration parameter. If set, members of this group are also super-users.
+</p>
+</div>
+
+
+<a name="N10152"></a><a name="The+Web+Server"></a>
+<h2 class="h3">The Web Server</h2>
+<div class="section">
+<p>
+The identity of the web server is a configuration parameter. That is, the name 
node has no notion of the identity of the <em>real</em> user, but the web 
server behaves as if it has the identity (user and groups) of a user chosen by 
the administrator. Unless the chosen identity matches the super-user, parts of 
the name space may be invisible to the web server.</p>
+</div>
+
+
+<a name="N1015F"></a><a name="On-line+Upgrade"></a>
+<h2 class="h3">On-line Upgrade</h2>
+<div class="section">
+<p>
+If a cluster starts with a version 0.15 data set (<span 
class="codefrag">fsimage</span>), all files and directories will have owner 
<em>O</em>, group <em>G</em>, and mode <em>M</em>, where <em>O</em> and 
<em>G</em> are the user and group identity of the super-user, and <em>M</em> is 
a configuration parameter. </p>
+</div>
+
+
+<a name="N1017E"></a><a name="Configuration+Parameters"></a>
+<h2 class="h3">Configuration Parameters</h2>
+<div class="section">
+<dl>
+       
+<dt>
+<span class="codefrag">dfs.permissions = true </span>
+</dt>
+       
+<dd>
+               If <span class="codefrag">yes</span> use the permissions system 
as described here. If <span class="codefrag">no</span>, permission 
<em>checking</em> is turned off, but all other behavior is unchanged. Switching 
from one parameter value to the other does not change the mode, owner or group 
of files or directories.
+               <p>
+               
+</p>
+               Regardless of whether permissions are on or off, <span 
class="codefrag">chmod</span>, <span class="codefrag">chgrp</span> and <span 
class="codefrag">chown</span> <em>always</em> check permissions. These 
functions are only useful in the permissions context, and so there is no 
backwards compatibility issue. Furthermore, this allows administrators to 
reliably set owners and permissions in advance of turning on regular 
permissions checking.
+       </dd>
+       
+<dt>
+<span class="codefrag">dfs.web.ugi = webuser,webgroup</span>
+</dt>
+       
+<dd>
+               The user name to be used by the web server. Setting this to the 
name of the super-user allows any web client to see everything. Changing this 
to an otherwise unused identity allows web clients to see only those things 
visible using "other" permissions. Additional groups may be added to the 
comma-separated list.
+       </dd>
+       
+<dt>
+<span class="codefrag">dfs.permissions.supergroup = supergroup</span>
+</dt>
+       
+<dd>
+               The name of the group of super-users.
+       </dd>
+       
+<dt>
+<span class="codefrag">dfs.upgrade.permission = 777</span>
+</dt>
+       
+<dd>
+               The choice of initial mode during upgrade. The <em>x</em> 
permission is <em>never</em> set for files. For configuration files, the 
decimal value <em>511<sub>10</sub></em> may be used.
+       </dd>
+       
+<dt>
+<span class="codefrag">dfs.umask = 022</span>
+</dt>
+       
+<dd>
+               The <span class="codefrag">umask</span> used when creating 
files and directories. For configuration files, the decimal value 
<em>18<sub>10</sub></em> may be used.
+       </dd>
+
+</dl>
+</div>
+
+     
+  
+</div>
+<!--+
+    |end content
+    +-->
+<div class="clearboth">&nbsp;</div>
+</div>
+<div id="footer">
+<!--+
+    |start bottomstrip
+    +-->
+<div class="lastmodified">
+<script type="text/javascript"><!--
+document.write("Last Published: " + document.lastModified);
+//  --></script>
+</div>
+<div class="copyright">
+        Copyright &copy;
+         2007 <a href="http://www.apache.org/licenses/";>The Apache Software 
Foundation.</a>
+</div>
+<!--+
+    |end bottomstrip
+    +-->
+</div>
+</body>
+</html>

Added: hadoop/core/trunk/docs/hdfs_permissions_guide.pdf
URL: 
http://svn.apache.org/viewvc/hadoop/core/trunk/docs/hdfs_permissions_guide.pdf?rev=629356&view=auto
==============================================================================
--- hadoop/core/trunk/docs/hdfs_permissions_guide.pdf (added)
+++ hadoop/core/trunk/docs/hdfs_permissions_guide.pdf Tue Feb 19 21:02:02 2008
@@ -0,0 +1,475 @@
+%PDF-1.3
+%ª«¬­
+4 0 obj
+<< /Type /Info
+/Producer (FOP 0.20.5) >>
+endobj
+5 0 obj
+<< /Length 760 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gaua=9p;#"(ru)mMB(H)ft7l&Np][0fZW!2SNX>CYS&ZH&86m3j0rq.#gm>k0314!KE!4prd")(4=/kEOojW1"Ho=2m+9fU+SRQTk(>s9mfbn,1l+CpJfh<V=/BRK;[EMAIL
 
PROTECTED]<eSgC5c&YNPQehKbTMIWNM3B(J)8Gb`:pIqq$JAGcuEuL&gt/FuFsJ&]?Ni7O75F_<l9er\^a"j6ph224(llk$nCdoD('aG!b5>+*R6a=%t<sm;Q/*o"ik3i1COQ>nPr`1>J!&WP-*+9J`FDP+I8!1HXmNAp5T*11RT9a87o*T-rp^rG1Wqa<YEE6RV,(orH<HC:)*&+nO(c]m#WY<Rq=,NA%7hkN%BCSF&>[EMAIL
 
PROTECTED]&Poc3rf[A/3-V_[Fp_d!(lI4<t3\2cI9QXd[1YATjYFtJ;ST*\SD_CuCE8iH'nUV>TK79p^=gF'mHc(5`jD9Xbm1"N0k!7#fdmp8gO<462g$V-bt\=5k1e\!CGG:Es^@;ldKZJZ(1b_Gs0:6Rd)1\*L(matoR%JR3%4U4>[EMAIL
 
PROTECTED];)I3#l[<2!KOkIZa4g8B6G93`i;/NSfdZm_HqEjJGd7e[]pngeg:;E[UF1\iAC/<2Cnmju)\d/806s?LINR`;AB!F)BZb;$]O$8sg&!,Rc([EMAIL
 
PROTECTED]&%q&a9M;5W'nAOA#K'b0K_f-Tl>te;pr..Fh2_U9srHBWH.DXX+SW"=.qFoQHN4RY3g>(MDt7=AT1';!taZ]g]~>
+endstream
+endobj
+6 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 5 0 R
+/Annots 7 0 R
+>>
+endobj
+7 0 obj
+[
+8 0 R
+10 0 R
+12 0 R
+14 0 R
+16 0 R
+18 0 R
+20 0 R
+22 0 R
+24 0 R
+]
+endobj
+8 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 532.666 157.316 520.666 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 9 0 R
+/H /I
+>>
+endobj
+10 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 514.466 172.988 502.466 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 11 0 R
+/H /I
+>>
+endobj
+12 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 496.266 277.316 484.266 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 13 0 R
+/H /I
+>>
+endobj
+14 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 478.066 263.672 466.066 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 15 0 R
+/H /I
+>>
+endobj
+16 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 459.866 268.664 447.866 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 17 0 R
+/H /I
+>>
+endobj
+18 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 441.666 186.308 429.666 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 19 0 R
+/H /I
+>>
+endobj
+20 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 423.466 188.636 411.466 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 21 0 R
+/H /I
+>>
+endobj
+22 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 405.266 190.976 393.266 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 23 0 R
+/H /I
+>>
+endobj
+24 0 obj
+<< /Type /Annot
+/Subtype /Link
+/Rect [ 102.0 387.066 233.648 375.066 ]
+/C [ 0 0 0 ]
+/Border [ 0 0 0 ]
+/A 25 0 R
+/H /I
+>>
+endobj
+26 0 obj
+<< /Length 2588 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gatm>>[EMAIL PROTECTED](4Ml_TuRA)@7BIAI7fr%45C('`D"[EMAIL 
PROTECTED](kqO,KFEJI6p=GYBfK)MLBcAM`ALQl+kBuHAW-;#r5Mdb/%>jO:D/Oaiq1a40rhEf^lXt2S&/rLD;sF8T#>3itG:`$Os7#PIe1X_dhg#1mSpnBKn9"9"VX1:3^)8APOJHm_Ku<e3!V8nHe\YPHr;5V^Iqn%A2P,e%A<_bhGi7%ObU<D,f1PGmom>B![9RjV=O.NHAH>=C?^k)\o3.Hl6Bn3ZS,!qos4rOCPYEB&"b&,[EMAIL
 PROTECTED],3,[/ApjK5F.UhdHPSQF(%fC7CtbI@(8D'[EMAIL PROTECTED]&[EMAIL 
PROTECTED])O3sU5i9b.CD&bP,2uCMo4iU3a8>X"n^J(@^f!Rnp6DS;1oJ>[KB.[i$,TsQ`Y$>@&.q.YWnY&obX)q4%+,'*Of`)?Tue/0h/\$a,Bg`Nn=HmWA;8/8\jk1-duqt-aIol(OqaqSeoI_;)q=XbX%@)Z#*p^\'meJHdXt#,/U!#=iC2_f$n1E?`.Mu&[EMAIL
 
PROTECTED])FBNj2EE$#V^.j?SonaJ8hL&/["/33>6TN<CC=+T*&aVJ1'LY#Pf8I']gJZIBj^fXL"b.a[J1*dm6n?)1K\H-*>?F!-8rPi3./")RFZg,L?Lmhp/sXP5T+nJqlhPlb-MpMY,W6b2QL%&6dQQkT+RAua^$e[l6Tu][.euXkM#EB2PROJBGX9Z/?]t7IYFhU1a>l;OC[5g0SCu#Mq9Te_I2S2$\uY&iSf&7)KS?2De62f`[$)L4B0tEC6"6K=gg*9+kY.L1-h8$;D.H]`/2nVU!U/%s8)$/JBl\Jmt-)Ren+&/4aFdSD(!qJXdqq&hQ39U%O5*uDZPDQin8S[e\uVMLPTUi>[EMAIL
 PROTECTED]:?g"oiM'NC(f#haH>/HrV`Rmcn2,Z19,(+UcB:WBSalAILrg;Z3O_Xdo/a]i3a
 
d`,UZjgo<SP&YF)5ol3ZWJ0?,<H:(9Gc/G>[)^)\R3Ua?`eFf"T$GD4B&]I=BE7U`0/iY`o*/%,*=dWgAA7?/PR;"=XURFu66jn5*j3F'[EMAIL
 
PROTECTED]<CuC`j">Mq$k9^Y%^mMF2_>LF>p*RZ`Kb#*ETQtpa^ZaB-1s#Q[OF#^bCV+WF^dQJ2L_:<dE)pd/hF^_5pP"[iAAu<OXC4AHd:2_*kW%f5e@)Zer6d]$Oh)eh%gc(3+;Pfji!O+@)dNfNXerTVIj:lX#S<Wu3BlN>[EMAIL
 PROTECTED](b$*Jh8*%mA+kik6"3$j_R?0bin*'6.]9q(k5'h;[EMAIL 
PROTECTED]'WIk?ha>`B&LUm]$_(Y9G+6V2*''7i\]$oZH0$WLXgo3cQC*S'OU7EoH.2!>!9#XG)n;18K9:6?.E,1,icLpln>V_%!l4;>T821qeJ8"9j*/R.o.j<VTiORqO$Ak$FG-F#4/#-^8.4!f.r2V,i?5k%7iA*bDW(V+]gd\8a7:#-'Q2>*O^g^?J7RldZ5935<LBVBV?Q'IPbZNq(Q(JNho-!>7(5Y_>H.3^M2>FWTZ3ZW,[EMAIL
 PROTECTED]/[EMAIL PROTECTED]"KMhgk"[EMAIL 
PROTECTED],\V7[l``6Rs(G$iY,]s+HR).f>KU$M:$B.9&>U>*i^`#K+1d*ok8)l$1&\'IPs([EMAIL 
PROTECTED]<k"4I2d88TK<>l>0nF3^O:\GF$(!2&E&s"[EMAIL PROTECTED]"[EMAIL 
PROTECTED])I8<-p=NmhZ.B/rPqPfgXGQdbAiu?OiQfUV-2X']PWo]&WA7a>sFVkr0=<*ffLAE]:[EMAIL
 
PROTECTED]"YQ,e`8VMT$IT%_#jWf%RSKL#BD&H?kL(OE-\TkECk8D#=Csk.NCQE$e(+CfPPVWkNO62'`sV,WWZf/FM41rX.=E[h,u66/Pf#(%Nk_BAE3.p1-HY.#kELp7<HhE;t#ocErntrS[*t(YI**0!EI>[EMAIL
 PROTECTED]
 
q2?X/%%"=1laBB,XSK4NSB_tp'Z$(F?f_\;:L'-'KI1rYE$=n/A--XqSXi%CZ%+*3SY\25LR\YClCp5,-)]c9e[]!eYZ`.Q7<@m?9:p0=jmIY-]u9g<0Pbn`2)kBbRjCQfKhe,L,[EMAIL
 
PROTECTED]>7\_rjM?d&9RaDUmHg:*XeT"?;Ih+gLEI=qEerS[c32KEQt99s*mi"<%GDn`;`CJ-TKbffZ1=;WM%gaTe92)q:.S:2egF[YWA>6(g3)UW)5>#$r!YDn.u,;tPQ*pIo/O<JZ!H'ek$J!**0l`,_4m)qEJ!XA5Gj3Li=ccPiJVRkI70IcoqC)]^0CU!j\_R$WsI7=ld2=lL`,]/e&(W_^._8T_G/`,%%WNXmJ733M/A93LppU@;4B2h18VE<J:d+T9><,JS[oP%^jZHsO&P[E%E+HdF(RO_-F@"&JYnBl`-u57;QO"7f?>%"1<2=e],hq3rEDktIb>9\jG]7`VW[;S1Oa5&[EMAIL
 PROTECTED]<Y_^RTk5395R^0c>Ge;ur>X,5_]:[EMAIL PROTECTED]<Nur+3$:20OHM)1%m$~>
+endstream
+endobj
+27 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 26 0 R
+>>
+endobj
+28 0 obj
+<< /Length 2287 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gau0E968iG&[EMAIL 
PROTECTED]@5pJAIHB6n6;J4N5JQin7X[-[eg0)/[JJ8D.NFODm7mUGqFD]aKngb(eJ0"s!OjW=DL=fboL?,[EMAIL
 PROTECTED]&gVrW>&[EMAIL 
PROTECTED]@QdO7QiPk2%iO2'*r9#Xn_8ph02dG2Tb<K?>n^ksnI]MNEiK)G3-'H!1QM#f(Mal-0>-X%WRajs;T]q#H-4BI.SGoArFiCk$.8hgr^OQ'$\NthTV"r<(*o%fM7Ep]MdSa-*Sk19E^V?)D^Wmr-ekS1iE+JWmESLISJQto"8nuB?:I)ap7*ne6PASV+5ni$TU+,VFGTSV'V,Eo<#qTfb,.VfA&)UY>9/#X`Y']K;S0WnPDZ^.(=.[eHXQ,_WP8<JbU<I<P>CkfZQj,I[XqShF^dgUo=UD(\(9J4i9fg`ePOsBUB/qiEPHg"B[AXYs6qOH9^_&pX-']7LG"nRg:M[<[EMAIL
 
PROTECTED];cBB>`^PX2"X'@mSWY[!!b^&q%d"R$._6g^dfW>5d$eA!PHrCM7D"Xd=G*P6W)9!uTT;(t$&<>K9mM_?<<0p6<-Qfd,?*55r/Fu0mep_4.[IA$7ko[AM3O-k>+Bi;lDQhRLo,cFTT$mO*t'Wq?'F!KKi8^!KC<7.KY?i#7=de9f4\nTM`rhof:I7=/oIggfWNSj"2Qh:O5pnT\!1nPDU8OU.tVja%p2MES?/XABWf5boI[h5L"K:12JEN&[EMAIL
 
PROTECTED]&bPgh(e"9;q)7Og[(mNO5refk.5;;IJLOWg"A(h]#5H8_0W<E-G6kNjGE*LIBP)`.gRaKd*-u]6+\MZRO1m7ppT8$s+lkM0f%A<j3E=;ij(7HX]C_9u[N#Z_F2O)i>`M+J$bD)3_&0a.R0^EfnWr]sCU)#7O"?)[EMAIL
 
PROTECTED];\[(V`%261bZIuaFZ:/e'2/aBF*>TCK-FI<P]%hV>?qe.A<g!4dVBee"KW0-;!Tl)LQ(B&5"?XcWM%t8<u\DHH"2u
 =ke4LDm4qZD'[EMAIL 
PROTECTED],!1t#j5O_k0n(tGJ(WN.&1:b_!JktXQ;obE]K,$C:XY7<-B9rM)F([oKkee67?/A&Y)cO8_C]hK!P?tt`f\5WUMS%]n2H6E$>Q*,%.osreqp+'5!oClnGcpV!YrbMA!(9n3gf&"D+6$Hq6lhmYhmhh9r6_g>+a'(VrfS$6>G0(10LV%hHoJ(&.O4[Q5$2Zj.mOge"d8'0;TECMEX31^17+-#`Q)[EMAIL
 
PROTECTED],0A:O)*lOWYnV^-eg7U(WSMmCh'9q>m6#``aZ$tPt(XR[:-FF2cX$gBSkrB_Yj3='&[EMAIL
 
PROTECTED]<Y,PG3a*fQU!<q0;&Zj7T!H3]X<;c.=mA_NN7;f.uJ=GB\Cbn`u7CM=S0c^rduoK_g^jpF"",IMOT$/eoF'JhVKi1g!ThG\6M[o5J9QVjk'=r[cgD-iiVYPuZf4uq1!;=(CE;"N]`OpP!G6Do#._0Y4]r^mi=P?&_A:<q#!#Qp%5HE<.&L-43K>,`H:Rtq4q-ck;h]9U0=421$)[EMAIL
 
PROTECTED]<GR;*bA&C`knFpHKc&-SQlF!E9ZAa&gr.RV+Ufb,oSCh0(;S+6(pn`>"?B19KO"5K'E";,uMpa`g*F5':>"bi]&-o5%T?WNduPhSS^%Z.!T$Sr:<9J96;=gE]%+(*I"Z?)$_K1VW_F_A0MdaHCE])%8Mnuk.^0aLV6",DtJ:+ma%ZUSiJtubVPC5C\[&hd2B#JGL]?f7gGK"[EMAIL
 PROTECTED]/oqmIPUmU#H2k'BnX.(_nrR9RA,V<[EMAIL 
PROTECTED]/>02CFK'jDiSq"![#3bKH`<`AW&CF?&HU=npI[:+RF0B>Duo>/[EMAIL 
PROTECTED]/6,[EMAIL PROTECTED]&q3kZhG4>H*cHK=>f-Y)QGMD'[EMAIL 
PROTECTED]'bWAg?sQA-V:b+Q+OGh2;
 
h@&r@'KHdObHJNL61]UPZmrWaji_8O-=KgH&a^'k/n0#=kk\5lo.)uuIO-Cr_&A5mb$L/1K&"Na'SG,/*CVW9`FNk\Q.+3^u]4CGh:mZcVm'4I%`lQl14[d6N>nNfD$NpDV)@%>'s9kpAOq5%L;`SFSnG1K(cH:S\ANRi7M8@@.,ct5G9[EqiQa^?[Q;f/Q8\a$_2=C#S$-Xh[WYOb^rO/(ed"M_WFeONJ#<[EMAIL
 PROTECTED],G<A>rS0Pr=n'>/kV;dog\<[EMAIL PROTECTED]/[EMAIL PROTECTED]'[EMAIL 
PROTECTED];JGTS;@fR5~>
+endstream
+endobj
+29 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 28 0 R
+>>
+endobj
+30 0 obj
+<< /Length 2497 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gau0FgN)%,&:O:Skc(t&Cm4q9>OpjN8XiJQ8S_o6@(S3O"^)g<[EMAIL 
PROTECTED]"LS2/8`S%SU?,[EMAIL PROTECTED],Q.H#/96P&o6h_[cTUrK7Ca>[EMAIL 
PROTECTED]@#fh_)$N&#W8?_09cPQUs5=X32,KSFk4hoouamhkXKB(rY-D]fbe6Ce+!_H+Nt>)@+hYYLC?fp2"SD<LB:[EMAIL
 
PROTECTED]>LY7oAR'GNYUXEi"7jhHf>2\]X"D8UgI0mRnb4ALb%<]j75S0('A/fsOK)CXBt67*ai3,#q7pom3h!k+\sJ9TRA^d"A>0q5#,rk-E\bL"Sd'2KF?Oj._W,)OCMRYtOC/O3P!71e>5:dkT&iXBWsiMjX+X-(8%&An%YC97S*UjSF.ajru6cNaPEd$rKmaBjrW*ZQCa;aqrY;JLR;'P\LjJ:D;#qUYntI&1'ejFN'*\QK_nEa3)l+LcPQVHK)qi]Fh!]M:V1j9%`>M^8+2cArdV+AM,@[EMAIL
 
PROTECTED]@?GJC:aD9*3AE*u!HAkH=Nk<Va>[g1=9/%=Q\5SDf)\(P/VpXMV$1`u`Jr1j8?QR1'9dGLH-A)^E[Z`B<[EMAIL
 PROTECTED]>1F"bRb<303]c(,#\>:^%:.t_U'[EMAIL 
PROTECTED]<3G:<\)gsj[r:qHrToR_XMQ+&[EMAIL 
PROTECTED]>?.02+8<.:LL[Jr6>R,\gGqW=<?-DP&2V`Kq+%#I*`K>APYBX-r<0C2n;S/f!?+-G7r7sJ9W8=M!2TP+CH1*C6A&O):>,odb3`._0.BQuP&1S4`[Tdb/48DIKucch?<28X9,ok$#%:?jZC)A5=IHsP=#JOdRrT^@):D$H)#jY<hRo49Ck]0%4P;[EMAIL
 PROTECTED]@[EMAIL PROTECTED]/3Orl.#0+B=W]=TZf,_rb;BOC5i>;iuUi:8VnMrO
 n9r2fo"='2)[EMAIL 
PROTECTED]>Q7[nL6P%ctQ(_Ngg>.0bOVA3Cke7bb0JIb`Ef:G7)'d^\1JT]j8V1UHl&KdXp0FFpn7Z>JbS;DcT2IF7nUL]e>.M2Zsn>h6.o__!$4XQe0:^C*RJPr<#,L!nD#nMHBb6.31uMWpA^e+QTr\fkOH@:0T:*?N#$(/)[0[RYh6LTqb9migm\!WS1#"@l&m-'@JB-Qo3];,Mp;m%-0#S3>sOCF)7=Qjq_Ms"b9mXL0;9,@\e:P,I_Kuj&TLOkG0G[7CNTE^eQ+a[-Mq,*_^-/3PpD*kTNT"O88Kk%jDJ]6,D0b&FrW+KK7%]J8k35T3g_P*?V:_6XdSlWsMIBSrilSbbcj^4n"#*9/Z%&.ns2`7?T9%m.LH>m3tZ*pNWj$3*p18c3K*6o"a?HMlfom7N]GgJ.'1$et1)-XPpTomeuORgD[0jqetJWlao;0o5@>'Ri%t8Bd=LRAA!X+)12<j5H=W<OEo>CZnA40AJ'$uq"#reXOBHWm.Soi;tIhlU%/*5\-\&jd?',-Ip8W)_eCtE9:9^-HX^9V`HE7tD?2.>VIEJ8i>6]f#)/B/YkBaSmJb,aj\>.8cUD3I*H('L2KZuNqD_^4E5[LV!`&Zrr%KHTGGrD/mbm1#W5c)mg(W^TLoa9C<5mg;b09W=1Fg:Z/e_*TO41BGlQnmeG:[EMAIL
 
PROTECTED])QTIq(9iFd.-')rLs:\:^cJg!bm'C)/'N\V)][Y.6l>Me&u1j1W()`PICVt>D5RQQB[5UX'EMSOlO_GA"$S)7M<"uT8N^L0Q>qe"&XN4Mr2A.TGVJ#1Zo!jqd\6m8i8;c\)#"NPQ(7&[EMAIL
 
PROTECTED])aI)9ZA9O4&(]>7VBCD9:63)Wo:"@-h3Jb;$l3K=_L)Z-k2/DE:XHZQp*j0UbcfC$QTdaY/-Bl%J0;[EMAIL
 PROTECTED]@8hqq*tdR":nDhqZ!p_cRR_WBb<BHH
 [EMAIL PROTECTED]@[EMAIL 
PROTECTED]:7`G.k#i>V/CFEX8d]>.T'DlH^?`sio/<36h6`<'2lrG[OJ=:Q^AAotZ<L+MJc#g'-571CN6eu>uI`qWq!_9'rA6'n\B9B#E-bf>&&;f0Zh7+b\dZE^XOCk/8]rn:.Z'aZCIm/_[[pbQ9W#NGIUp,"7H0,4KTY8FS*P')rLjR4?TGqqX?Wf;[EMAIL
 
PROTECTED])"qV)/+!d>8;n9::Z"Q4OE%MFpIgDKiK:8<,BM8_-jJbJN-DZ\(,^FMLi<JhCE]!a(?LR`fUq!JPe*/W(WetDGQeHrA4f0Tc'>jJ*sntmR:2KG2qn^O8<44WR?L9AYJs9Ka'F_+G&-FKFVF^WX"mecPm)^H=3Zj]!I3V0^.k_gI$^52NH?]SL,:;,[EMAIL
 
PROTECTED]"F2[_VsSMmM)b3_Ag+'5Bp^LJ>8,N^t:*Z5^koeoS7pdQmZ?0e0Gc$NT)M_6o6YpPmHQ+rdBkQCnWB<`Qt]DhjXW:74~>
+endstream
+endobj
+31 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 30 0 R
+>>
+endobj
+32 0 obj
+<< /Length 2417 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gat=-997gc&AIV:&9>np=[o28;*+?2"Po^SMPSK$4`l%D-/'[i9<K?%ptp;f*m0`6"?FDb1rFTfo9&qLl0dr6E%!*:o<c2PS_Y</>kgg[aG"7-pB^EnkNUq&o3.6&[EMAIL
 PROTECTED](ef.Rq_C]'ecSsGQ)`VI_YdQl0^d_fP(5.f4jk:$%p%PmFMl"[EMAIL 
PROTECTED]:>^-c%9N+iQmKT"[EMAIL 
PROTECTED]:XO>XEHBN3Eh\H._KZu&p1IjUioNP'Tj#l)]?!YNDkLoM&-jt;sPq%`Sa9q6[ZX?6,P%^+.BXO0QIaps9N.`,[EMAIL
 
PROTECTED]::2_5,Mtf*J8J#iNj$Lk0'Y-mTirP"2^_!Igi[?(A])%gOD:Dn+.%Dg[>9fb^[1Lk=EHuF2[0>EJI,akFa=N`IG"#^ZbNF5!E)A?4R`Ek1kG:MegRK(=PfZ4(\u_P1F'NZkZW*2_T$=ZMH?tZQ]N90"Mr,[(@IJDC+'%hb9-lD^<SgQ*B&T(H)(TOJ).sg)T"X>cDc65+b&8pR17%/-F/F:J--TqkIj#0fVsGSW):JNW\1;*a(89"9N'n^+TT'<lg]D=VMhjT*lu2U?M:9&;E:K0X)>',qp/X`j6"s_[9;k(W&m7dG1=S2-YK,!Y(RBEt-'9::`c"LuO?9iO$sl2U2]$hT8&Zb&FBWL'[EMAIL
 
PROTECTED]>aL5+'t#Qki\TYam[1a(YZH[a,WI^d-8AWYFr1ke,qpddP?!hYk^aMScGei!q''(FS/+4iCbJp;B_6R-E&4BVi7cQf%)9jN7M69PT*DLL6>@[EMAIL
 PROTECTED]@[EMAIL 
PROTECTED];3/L4\ilQ)o3l=W_C5l#J2nsT?Ohf4+2VWl\qko?iHO++)LrW`qcM0J6E,dP$GZ^-c]6SmQO?9-&9aO2#^ekh21HZ(Q]!99"&<MD%Og[hNIMe".D>?kGR@"<S9SI,$'K-s+P6p)2XoD0+1SEZ^J$kmU7R6h;(Dm/4(rKhI1]C,L$p0
 bL;[5[CKiV?LN?AslD'3'#Z7^I$e(gK@<mUTEgYDj]h;<B(ODj>ku#pWA6Q-^`*Fe*R6r4"[EMAIL 
PROTECTED]>jN^NQqH"#J8ItL-u%;1mA!hM8/:kG<K5*9LYUO.&sl"E#eH9(0T5;ffk#D&F.#_$l%pCL;<'o4i*W;=hL*S:*h=*?XU=_qptK"dC.+n_X\,5Gj(5,R.T59(lg=rO_Ke*-"!U>R0Q<dOMu/[EMAIL
 PROTECTED]/S:#O172<)L4M#Jk=,I-M6KNaV.Moeuq6`2$W.q[?F$7&[EMAIL 
PROTECTED](JYkD$\/r';Vh<ZV)R:6JqC&l2,H1;rm\CNplE>LrW]5W!;6nmM0<ufh8nJS%93"-rmLFi<.+-?K=)[EMAIL
 
PROTECTED]<poPmpes(^HBRH68F01&OD<P-RPWH,:N.4=C"ks1<i]q/c_tnX[B3<\lYN7(N-_a/,[EMAIL
 PROTECTED]/[EMAIL 
PROTECTED](S(>3c4L;_B0YF4$eRqf5Z7!_OTHGZmR5RL9efis&^)^*f%DDD-ZK$Jfe<TZ^0`$*(YIQ`?:'i/QAb3#045<SfmqZ(BS)`8t6N^]Z;YDg"b;[EMAIL
 
PROTECTED])`gpD6?(K,R^bF!+M&@nn&W]hRNkjnFe2qND,4Mb3L%)j&^0&h/+u)+OKF;lE[!h?6L\AphCeP]\rQY/p?Mj]sI)ooL4s($#W[]7+?#<l<:SrscX=lSVmsKqYhF+B'$#\=0G$aY^:,T8%]9T3ZFt%D(>j]/Y%hCl]"7o!SAS1[*+I^c>lBB4A<bH#bn0u<DXMqpXP7.[j4KP"K-c<'&LU<"a3]<%H7)A0:#g]R&_cPH_r*>KL#.l0JjR/HHnI^W%`PjBl":+:fmVF4k%tjT7+<O5+:[EMAIL
 
PROTECTED]"BRJsQMrtZ"<pN#4/o^m+^4lW,^9o3$Q%ll$VG03RhVp4/2%>?,m\YtO^2J!l#]\Bf)[EMAIL
 PROTECTED]:47#r%>G-m)\VL]3aVVndF`<97Mk_'N-,NT\1k,[EMAIL PROTECTED]"X0
 
RuRfZ'$d+D\h)0+B%[LFgVH9q:4(9T#m!n+ju1+)N,PM2=qgNb[l_3F(P/9GlmJ98J-W4k[=qLDMo+([EMAIL
 
PROTECTED]>7t\0-e2mi1Ti(7`=am]C\BEOt''IYQ)_O7r'gm$]!lWn+l$$Lk70!qYiCq<0.W?k(H&E%Vbt1)\[M`>p4J.ULo4RC,<d:3sir,Wp6\-ck&MpiAE4'L!j[:q"K4SpO)s2g,?egkP34Vs'FdbM?W21W!#ak5[lTep6#=G/>ofLC0NAhqpD>n7Eq-.gM1N`j5IXe!P'';-^C"r/9c"_(uQluZDAUc![Cus\b]3X?F__AoTo_3"`q]lMr#GP!3m8SMTO68jup'?&;R89^qF'UL&iK4`mAW55JnniM)%WmbWSL&[EMAIL
 PROTECTED](*>b_%Z"*>IE;p"kS6WQ~>
+endstream
+endobj
+33 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 32 0 R
+>>
+endobj
+34 0 obj
+<< /Length 323 /Filter [ /ASCII85Decode /FlateDecode ]
+ >>
+stream
+Gaqcq]hZI!'Lm:[EMAIL 
PROTECTED](SUu*5S3W<,SrRrCc?FK$g`JL(bWo6_6;8<Dp_]f)@3IqB'H&Ph2t3D$>Mlq%>h=]>gi4cQ7F!'%$eDLF9O"ZE>;iX,U%bGQes2:T=5"*'5sLLF-J-Y=TGSEB6n'5l"&S%[]S26UOPSj=-KiKP7+"u1:h6NcjD/MBg6VbW)D\X-mLU9OQ^LrDB0p!g$W'ubcMg9rFI+*<l;Kpm;mA4Ui.B4l.?u^RPFZ-/0qV*fmAg0?pr1RQ]="L"j'crTG!=5+mLBW5n`F2e`;+SkS:YPL~>
+endstream
+endobj
+35 0 obj
+<< /Type /Page
+/Parent 1 0 R
+/MediaBox [ 0 0 612 792 ]
+/Resources 3 0 R
+/Contents 34 0 R
+>>
+endobj
+37 0 obj
+<<
+ /Title (\376\377\0\61\0\40\0\117\0\166\0\145\0\162\0\166\0\151\0\145\0\167)
+ /Parent 36 0 R
+ /Next 38 0 R
+ /A 9 0 R
+>> endobj
+38 0 obj
+<<
+ /Title 
(\376\377\0\62\0\40\0\125\0\163\0\145\0\162\0\40\0\111\0\144\0\145\0\156\0\164\0\151\0\164\0\171)
+ /Parent 36 0 R
+ /Prev 37 0 R
+ /Next 39 0 R
+ /A 11 0 R
+>> endobj
+39 0 obj
+<<
+ /Title 
(\376\377\0\63\0\40\0\125\0\156\0\144\0\145\0\162\0\163\0\164\0\141\0\156\0\144\0\151\0\156\0\147\0\40\0\164\0\150\0\145\0\40\0\111\0\155\0\160\0\154\0\145\0\155\0\145\0\156\0\164\0\141\0\164\0\151\0\157\0\156)
+ /Parent 36 0 R
+ /Prev 38 0 R
+ /Next 40 0 R
+ /A 13 0 R
+>> endobj
+40 0 obj
+<<
+ /Title 
(\376\377\0\64\0\40\0\103\0\150\0\141\0\156\0\147\0\145\0\163\0\40\0\164\0\157\0\40\0\164\0\150\0\145\0\40\0\106\0\151\0\154\0\145\0\40\0\123\0\171\0\163\0\164\0\145\0\155\0\40\0\101\0\120\0\111)
+ /Parent 36 0 R
+ /Prev 39 0 R
+ /Next 41 0 R
+ /A 15 0 R
+>> endobj
+41 0 obj
+<<
+ /Title 
(\376\377\0\65\0\40\0\103\0\150\0\141\0\156\0\147\0\145\0\163\0\40\0\164\0\157\0\40\0\164\0\150\0\145\0\40\0\101\0\160\0\160\0\154\0\151\0\143\0\141\0\164\0\151\0\157\0\156\0\40\0\123\0\150\0\145\0\154\0\154)
+ /Parent 36 0 R
+ /Prev 40 0 R
+ /Next 42 0 R
+ /A 17 0 R
+>> endobj
+42 0 obj
+<<
+ /Title 
(\376\377\0\66\0\40\0\124\0\150\0\145\0\40\0\123\0\165\0\160\0\145\0\162\0\55\0\125\0\163\0\145\0\162)
+ /Parent 36 0 R
+ /Prev 41 0 R
+ /Next 43 0 R
+ /A 19 0 R
+>> endobj
+43 0 obj
+<<
+ /Title 
(\376\377\0\67\0\40\0\124\0\150\0\145\0\40\0\127\0\145\0\142\0\40\0\123\0\145\0\162\0\166\0\145\0\162)
+ /Parent 36 0 R
+ /Prev 42 0 R
+ /Next 44 0 R
+ /A 21 0 R
+>> endobj
+44 0 obj
+<<
+ /Title 
(\376\377\0\70\0\40\0\117\0\156\0\55\0\154\0\151\0\156\0\145\0\40\0\125\0\160\0\147\0\162\0\141\0\144\0\145)
+ /Parent 36 0 R
+ /Prev 43 0 R
+ /Next 45 0 R
+ /A 23 0 R
+>> endobj
+45 0 obj
+<<
+ /Title 
(\376\377\0\71\0\40\0\103\0\157\0\156\0\146\0\151\0\147\0\165\0\162\0\141\0\164\0\151\0\157\0\156\0\40\0\120\0\141\0\162\0\141\0\155\0\145\0\164\0\145\0\162\0\163)
+ /Parent 36 0 R
+ /Prev 44 0 R
+ /A 25 0 R
+>> endobj
+46 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F3
+/BaseFont /Helvetica-Bold
+/Encoding /WinAnsiEncoding >>
+endobj
+47 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F5
+/BaseFont /Times-Roman
+/Encoding /WinAnsiEncoding >>
+endobj
+48 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F6
+/BaseFont /Times-Italic
+/Encoding /WinAnsiEncoding >>
+endobj
+49 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F1
+/BaseFont /Helvetica
+/Encoding /WinAnsiEncoding >>
+endobj
+50 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F4
+/BaseFont /Helvetica-BoldOblique
+/Encoding /WinAnsiEncoding >>
+endobj
+51 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F11
+/BaseFont /Courier-Bold
+/Encoding /WinAnsiEncoding >>
+endobj
+52 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F9
+/BaseFont /Courier
+/Encoding /WinAnsiEncoding >>
+endobj
+53 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F2
+/BaseFont /Helvetica-Oblique
+/Encoding /WinAnsiEncoding >>
+endobj
+54 0 obj
+<< /Type /Font
+/Subtype /Type1
+/Name /F7
+/BaseFont /Times-Bold
+/Encoding /WinAnsiEncoding >>
+endobj
+1 0 obj
+<< /Type /Pages
+/Count 6
+/Kids [6 0 R 27 0 R 29 0 R 31 0 R 33 0 R 35 0 R ] >>
+endobj
+2 0 obj
+<< /Type /Catalog
+/Pages 1 0 R
+ /Outlines 36 0 R
+ /PageMode /UseOutlines
+ >>
+endobj
+3 0 obj
+<< 
+/Font << /F3 46 0 R /F5 47 0 R /F1 49 0 R /F6 48 0 R /F4 50 0 R /F9 52 0 R 
/F11 51 0 R /F2 53 0 R /F7 54 0 R >> 
+/ProcSet [ /PDF /ImageC /Text ] >> 
+endobj
+9 0 obj
+<<
+/S /GoTo
+/D [27 0 R /XYZ 85.0 659.0 null]
+>>
+endobj
+11 0 obj
+<<
+/S /GoTo
+/D [27 0 R /XYZ 85.0 307.466 null]
+>>
+endobj
+13 0 obj
+<<
+/S /GoTo
+/D [29 0 R /XYZ 85.0 624.6 null]
+>>
+endobj
+15 0 obj
+<<
+/S /GoTo
+/D [29 0 R /XYZ 85.0 345.066 null]
+>>
+endobj
+17 0 obj
+<<
+/S /GoTo
+/D [31 0 R /XYZ 85.0 513.0 null]
+>>
+endobj
+19 0 obj
+<<
+/S /GoTo
+/D [31 0 R /XYZ 85.0 312.166 null]
+>>
+endobj
+21 0 obj
+<<
+/S /GoTo
+/D [33 0 R /XYZ 85.0 659.0 null]
+>>
+endobj
+23 0 obj
+<<
+/S /GoTo
+/D [33 0 R /XYZ 85.0 567.066 null]
+>>
+endobj
+25 0 obj
+<<
+/S /GoTo
+/D [33 0 R /XYZ 85.0 488.332 null]
+>>
+endobj
+36 0 obj
+<<
+ /First 37 0 R
+ /Last 45 0 R
+>> endobj
+xref
+0 55
+0000000000 65535 f 
+0000016473 00000 n 
+0000016566 00000 n 
+0000016658 00000 n 
+0000000015 00000 n 
+0000000071 00000 n 
+0000000922 00000 n 
+0000001042 00000 n 
+0000001123 00000 n 
+0000016826 00000 n 
+0000001258 00000 n 
+0000016889 00000 n 
+0000001395 00000 n 
+0000016955 00000 n 
+0000001532 00000 n 
+0000017019 00000 n 
+0000001669 00000 n 
+0000017085 00000 n 
+0000001806 00000 n 
+0000017149 00000 n 
+0000001943 00000 n 
+0000017215 00000 n 
+0000002080 00000 n 
+0000017279 00000 n 
+0000002217 00000 n 
+0000017345 00000 n 
+0000002354 00000 n 
+0000005035 00000 n 
+0000005143 00000 n 
+0000007523 00000 n 
+0000007631 00000 n 
+0000010221 00000 n 
+0000010329 00000 n 
+0000012839 00000 n 
+0000012947 00000 n 
+0000013362 00000 n 
+0000017411 00000 n 
+0000013470 00000 n 
+0000013609 00000 n 
+0000013792 00000 n 
+0000014088 00000 n 
+0000014369 00000 n 
+0000014663 00000 n 
+0000014851 00000 n 
+0000015039 00000 n 
+0000015233 00000 n 
+0000015468 00000 n 
+0000015581 00000 n 
+0000015691 00000 n 
+0000015802 00000 n 
+0000015910 00000 n 
+0000016030 00000 n 
+0000016142 00000 n 
+0000016248 00000 n 
+0000016364 00000 n 
+trailer
+<<
+/Size 55
+/Root 2 0 R
+/Info 4 0 R
+>>
+startxref
+17462
+%%EOF


Reply via email to