INTRODUCTION 1.1 INFORMATION CONSISTENCY Numerous developments are being introduced as the epoch of Cloud Computing, which is a cyberspace-based progress and use of supercomputer expertise. Most powerful processors which were too expensive to begin with have become cheaper by the help of pooling processing power and providing the processing power on demand. The development of high speed internet with increased bandwidth have increased the quality of services leading to better customer satisfaction which the most primitive goal of any organization. The migration of data from the users computer to the remote data centers have the provided the customer with great and reliable convenience.
Amazon simple storage services are the well-known examples which are one of the pioneers of cloud services. The eliminate the need of maintain the data on a local system which is a huge boost for increasing quality of service. But due to this the customers are always as the mercifulness of the cloud service provider as their downtime causes the user to be unable to access his own data. Since every coin has two sides, likewise cloud computing has its own fair share of security threats and also there may be some threats which are yet to be discovered. Considering from the users point of view, he wants his data to be secure therefore, data security is the most important aspect which will ultimately lead to the customer satisfaction. The users have limited control on their own data so the conventional cryptography measures cannot be adopted.
We Will Write a Custom Essay Specifically
For You For Only $13.90/page!
order now
Thus, the data stored on the cloud should be verified occasionally to ensure the data has not been modified without informing the owner. The data which is rarely used is sometimes moved to lower tier storage making it more vulnerable for attacks. On the other note, Cloud Computing not only stores the data but also provides the user with functionality like modifying the data, appending some information to it or permanently deleting the data.
To assure the integrity of data various hashing algorithms can be used to create checksums which will alert the user about the data modifications. 1.2 PROBLEM DEFINITION Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically, the file is stored on a server which is a pool resource that is any one with users credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copys your work and claims to be his own work. Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction. Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not.
1.3 PROJECT PURPOSE In our purposed system, we provide assurance to the user that his information is safe by implementing a system which provides security mechanisms by offering three levels of security. Concerning about the data security part, our system is divided mainly into three modules named IP triggering module, client-authentication module and redirecting module. The system generates a user password and a key which is used for client authentication. The algorithm generates two keywords 8-bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization. Questions may arise as why do we use keys of 8-bit length only The purpose of our system is to prevent illegal data access if the users credential is compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust. 1.
4 PROJECT FEATURES Our scheme would be to prevent illegal access of users data. A user after getting himself registered on the system will have the advantage of different layers of security. The most primitive work our system is to inform the user that his data has been accessed from an unregistered IP by using mail triggering events. For login, the attacker tries to access the file by using the credentials stolen from the victim, and upon entering is provided with a dialog box to enter a key. The attacker tries to enter the key which wont be accepted by any means. The attacker is provided with three tries so that he can go back.
After 3 tries, the attacker is provided with the access of the fake file which is implemented by the redirection module. 1.5 MODULES DESCRIPTION 1.5.1 CLIENT MODULE In this module, the server receives a query sent from the client. Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place.
The server matches the client credentials for security. Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place. 1.5.2 SYSTEM MODULE Three different network entities can be identified as follows USERS Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations. CLOUD SERVICE PROVIDER (CSP) A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems.
THIRD PARTY INSPECTOR(TPI) A voluntary TPI, who expertises and abilities that consumers may not have, is Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand. 1.5.
3 CLOUD DATA STORAGE MODULE The users data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data. Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system. 1.5.
4 CLOUD AUTHENTICATION SERVER The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user. 1.5.5 UNAUTHORIZED DATA MODIFICATION AND dcvxvCORRUPTION MODULE The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like time of access as well as the IP address of the unauthorized intruder.
1.5.6 ANTAGONIST MODULE The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors.
Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider. CHAPTER 2 LITERATURE SURVEY The literature survey is taken as an important step in software development process. The time factor, economy and company strength are determined before developing the tool.
Then the operating system and language are determined for developing the tool. A lot of external support is needed for developers once they start developing the tool. This support can be obtained from senior programmers, from the various books or from the websites. For developing the proposed system, the above consideration is taken into account. In software development literature survey is considered to be the most important factor. Before developing any tool it is really important to determine many things such as economy, its advantage, disadvantage, its opportunities in the near future and many more such considerations are to be taken.
Once these things are satisfied, then next steps are to determine which operating system and language can be used for developing thet ool. 2.1 CLOUD COMPUTING Cloud computing provides an unlimited platform and infrastructure to store and execute and secure the clients or the customers data and program. As a customer it is not required that you have to own the system or the infrastructure as a whole, they can just be accessed or rented adding as an advantage to the customer using it minimizing the tendency to decrease the expenditure. Instead of running the data individually in one computer or even in several they are hosted in the cloud computers and servers assemblage accessed via the Internet. Cloud computing lets you access all the documents, datas and application from anywhere in the world, making it free for the people to be confined in the desktop only and making it easy for the people indifferent parts of the world to collaborate.
2.2 EXITING SYSTEM Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users loss control of data under Cloud Computing. Whenever it comes to the matter relating to cloud services the user is put at a disadvantage regarding to the security of the file. Basically the file is stored on a server which is a pool resource that is any one with users credentials can access the file and if in case the attacker comes to know about the password as well as the encryption keys the attacker can modify the file contents, thus making the information stored in the file to be accessed by the unauthorized user. So, the problem is that what if someone copys your work and claims to be his own work.
Anything we design, anything we invent is governed by the principle of whether or not it guarantees customer satisfaction. Hence, the problem is underlying whether the customer can rest assured that his data is safe from unauthorized access or not. 2.
3 PROPOSED SYSTEM In our purposed system, we provide assurance to the user that his information is safe by implementing a system which provides security mechanisms by offering three levels of security. Concerning about the data security part, our system is divided mainly into three modules named IP triggering module, client-authentication module and redirecting module. The system generates a user password and a key which is used for client authentication. The algorithm generates two keywords 8 bit length consisting of combinations of characters, special characters, and numbers which is used for client authorization and file authorization. Questions may arise as why do we use keys of 8 bit length only The purpose of our system is to prevent illegal data access if the users credential are compromised. By testing against weak algorithms which are easier to crack we design our system to be more robust. Advantages Our scheme would be to prevent illegal access of users data. Inform the user that his data has been accessed from an unregistered IP.
The attacker is provided with the access of the fake file. 2.4 SOFTWARE DESCRIPTIONS 2.4.1 JAVA Java is an abnormal state programming dialect which is quickly developing propelled innovations in the field of PC and data fields. With the other machine, dialects we can either arrange or derive a program to run the program on the framework, however the benefit of utilizing is that it can be both accumulated and translated. In Java the program is separate into midway code called the byte codes.
This is platform independent code and is decIPhered by the interpreter on the Java platform. It has the following buzzwords- Simplicity Object-oriented Platfrom independence Robust Secure Dynamic Portable Multithreaded High performance Architectural neutral Package in JAVA Package in java is a mechanism or a process to encapsulate a group of classes, interfaces and also sub-packages. Packages are used for multiple purpose that are It prevents the naming conflicts.
Example there can be two classes with the same name in any of the two packages, considering it to be Student i.e. campus member CSE Student and campus member EE Student. Packages can be used as data encapsulation (Data-hiding). It provides control access. It makes searching of interfaces, classes, enumerations,, and notations easier. 2.
4.2 JAVA PLATFORM Generally, platform is defined as the hardware or software environment on which our programs run. Few of the reputed ones are windows 2000, Linux, Solaris and MacOS. It might be considered as a blend of the working framework and equipment. The Java platform is a product stage that keeps running on the highest point of the other equipment based stage The Java platform has two components namely The Java Virtual Machine(JVM) The Java Programming Application Interface(Java API) Java Virtual Machine is the base stage for the Java stage and it is ported into various gear based stages.
Java API is all around gathered into libraries of classes and interfaces. This classes is generally called packs. The going with diagram shows the vocations of Java stage and how the Java virtual and the Java API shield the program from the hardware. 2.4.3 ODBC ODBC remains for Open Database Connectivity is a standard programming interface for database specialist co-ops and the application designers. ODBC is the de facto for the windows to get connected or interact with the database system, programmers has to use different programming languages to get connected with the database. Now, the ODBC has made the choice of the database system easier and efficient.
. Application engineers have considerably more vital things to stress over than the language structure that is expected to port their program starting with one database then onto the next when business needs abruptly change. Through the ODBC Administrator in Control Panel, you can determine the specific database that is related with an information source that an ODBC application program is composed to utilize. Think about an ODBC information source as an entryway with a name on it. Every entryway will lead you to a specific database. For instance, the information source named Sales Figures may be a SQL Server database, while the Accounts Payable information source could allude to an Access database. The physical database alluded to by an information source can live anyplace on the LAN. 2.
4.4 JDBC Java Database Connectivity or JDBC is produced by Sun Microsystems to build up an autonomous standard database API for Java. A bland SQL database get to instrument is given which thusly gives a predictable interface to assortment of Relational Database Management System (RDMS).Database availability module utilize module to keep up the interface consistency.
Jumpers for every stage ought to be given to the database and Java to have JDBC bolster. To get a more broad affirmation of JDBC ,Sun build JDBCs framework as for ODBC. JDBC GOAL Barely any product bundles are planned without objectives as a top priority. JDBC is one that, as a result of its numerous objectives, drove the advancement of the API. These objectives, in conjunction with early commentator input, have settled the JDBC class library into a strong structure for building database applications in Java. The objectives that were set for JDBC are essential.
They will give you some knowledge with reference to why certain classes and functionalities carry on the way they do.The eight design goals of JDBC are as follows SQL Level API. SQL Conformance. JDBC must be implemented on the top of common database interface. A Java interface is provide which is consistent with the rest of the Java system. It should be kept simple. Keep the common cases simple. Strong, static should be used wherever possible.
Java is also unusual in that each Java program is both compiled and interpreted. With a compile you decIPher it into a midway language called Java byte codes the platform-independent code instruction is passed and run on the computer. Fig 2.1 JDBC Class Diagram CHAPTER 3 REQUIREMENT ANALYSIS 3.
1 FUNCTIONAL REQUIREMENTS By the definitions of software engineering, a functional requirement is defined as a function of a software system or its corresponding components. A set of inputs, its behavior, and the resultant outputs is defined as a function. Any sort of calculations, inputs of technical details, data modification and interpretation and other various functionality which conglomerates together to exclaim what a system is supposed to accomplish makes up functional requirements. All of the cases where the system implies the functional requirements implemented in use cases is called as behavioral aspects of functional requirements. The system here has to perform the following tasks Derive the user id and password together with the secret key, verify with the matching database inputs.
A match if found we can continue otherwise update it with an error message. An encryption algorithm is used to encrypt an old file to form an encrypted new file. A decryption algorithm must exists that allows to decrypt and thus derive the original file from the encrypted file. The owner of the file should be made alert with an update message if any information in the file is modified. 3.2 NON-FUNCTIONALREQUIREMENTS A non-functional requirement is defined as a requirement that exclaims a criterion that is used to judge the operation of that is happening in a system, rather than predefined behaviors as put forward by systems engineering and requirements engineering.
Functional requirements that define specific behavior or functions should be in perfect contrast with this nonfunctional requirement. In the system design the plan for implementing functional requirements is explained in detail. In the system architecture theplanforimplementingnon-functionalrequirementsisexplainedindetail. Defined Constraints, quality of attributes, quality goals standards, quality service requirements and non-behavioral requirements are the some of the popular terms adopted in non-functional requirements. The common quality attributes are as follows 3.2.1 ACCESSIBILITY A common term used to elaborate on the level of which a product, device, service, or environment is accessible by the masses is defined as accessibility.
This project that we have worked on people registered with the cloud can use the cloudforstoringandretrievalofthedatawithasecretkeythatissenttotheiremailids. Simple and efficient and user friendly is the user interface. The project and the features provided should always be available to the user without any fault. A small abstinence of any part of the software would indirectly lead to the breakdown of the system and the entire project crumbling down at a point leading to low user satisfaction. In other words the project should aim at long life cycle with break down time leading to null. 3.2.2MAINTAINABILITY Maintainability is the comfort with which a software product can be modified as defined by software engineering.
The features that are kept in mind are The programming of this project being very simple, it is easily possible to get hold on and also correction of the existing defects and making the changes in the available project. 3.2.3 SCALABILITY Scalability is when system is capable of handling an increased bandwidth and an increased through put caused due to adding up of new hardware components. Under situations of low bandwidth and large number of users system should equally operate normally. Scalability in other words means the continuous availability of the system working under any circumstances without any breakdown. It should totally be prone to any sort of extreme circumstances like overflow of data, too many operations at a time, unavailability of network, server busy, client unavailable and so on.
The ability of the application to function in an uninterrupted fashion without any fail when its contents or size is changed i.e. Increased or decreased is defined as scalability. Scalability to a larger size is often easier than shrinking it ta smaller size because developer make use of the full size always. Shrinking an application to a smaller size often means putting or exposing the application in a constrained environment and expecting no interruption in its functioning. 3.2.4 PORTABILITY One of the important key concepts of high-level programming is always portability.
Software code base feature that is able to reuse the existing code in lieu of creating new code and also moving the software from an environment to another is broadly defined as portability. This project we have worked on should be capable of being executed under different operation conditions but it should always meet its minimum pre-defined configurations. System files and dependent assemblies only need configuration in such a case.
3.3 HARDWARE REQUIREMENTS Processor Dual Core Processor Hard Disk 40 GB. Floppy Drive 1.44 Mb. Monitor VGA and High Resolution Monitor. Input Device Standard Keyboard and Mouse. Ram 256 Mb.
3.4 SOFTWARE REQUIREMENTS Operating system Windows 10/8/7/XP Front End JAVA, Swing(JFC),RMIJ2ME Back End MS-Access Tool EclIPse CHAPTER 4 DESIGN 4.1 DESIGN GOALS To enable secure outsourcing of file under the aforementioned model, our mechanism design should achieve the following security and performance guarantees 4.1.
1 INPUT/OUTPUT PRIVACY No sensitive information from the customers private data can be derived by the cloud server during performing the encryption and transfer. 4.1.2 EFFICIENCY The local computations done by customer should be substantially less than. The computation burden on the cloud server should be within the comparable time complexity of existing practical algorithms for encryption and decryption of files. 4.2 SYSTEM ARCHITECTURE Here the client sends the query to the server.
Based on the query the server sends the corresponding file to the client. Then the client authorization is done by checking user id and password. In the server side, it checks the client name and its password for security process. If it is satisfied and then received the queries form the client and search the corresponding files in the database. Finally, find that file and send to the client. If the server finds the intruder means, it set the alternative Path to those intruders. If any intruders tries to access any file then multiple times password is asked to them and at last the intruders are directed to fake file. Here intruders will not know that the file he obtained is fake.
They think that the file they got is original one. SHAPE MERGEFORMAT Fig 4.1 System Architecture 4.3 DATA FLOW DIAGRAM The Data Flow Diagram(DFD) is also named as bubble chart diagram which is a simple graphical representation that can be used to represent a system.
The system representation is done in terms of the input data to the system, the various processing carried out on these data, and the output data is generated by the system. SHAPE MERGEFORMAT Fig 4.2 Data Flow Diagram 4.4 SEQUENCE DIAGRAM The sequence diagrams are an easy way of describing the systems behavior. It focuses on the interaction between the system and the environment.
This UML diagram shows the interaction arranged in a time sequence. It has two dimensions the vertical dimension and the horizontal dimension. The vertical dimension used in UML sequence diagram represents the time and the horizontal dimension used represents the different objects. The vertical line is also called the objects lifeline. It represents the objects presence during the interaction. SHAPE MERGEFORMAT Fig 4.3 Sequence Diagram 4.
5 USE CASE DIAGRAM A use-case diagram is a graph of users or actors. It is a set of use cases enclosed by a system boundary which is also the participation associations between the actors and the use-cases, and generalization among the use cases. So, the use-case is the description of the outside (actors or users) and inside(use-case) of the systems typical behavior. An ellipse having the name is used to show the use case which is initiated by actors or users. An Actor or a user is the one that communicates with a use-case. Name of the actors is written down and a arrow symbol is used to show the interaction between actor and use-case. Fig 4.4 Use Case Diagram 4.
6 CLASS DIAGRAM Fig 4.5 Class Diagram 4.7 ACTIVITY DIAGRAM An activity diagram consists of numerous states that represent several operations. The transition from one state to the other is triggered by the completion of the operation.
A round box having operation name is used in the diagram. For the execution of that operation, an operation symbol is used for indication. An activity diagram shows the inner state of an object. Fig 4.6 Activity Diagram CHAPTER 5 IMPLEMENTATION Among the various stages of project, the part which converts the theoretical design into a working system is known as Implementation, thus making it one of the critical phase for developing a successful system. In Implementation phase we carefully plan as well as probe the existing system keeping in mind the constraints of the implementation. 5.
1 MAIN MODULES 5.1.1 CLIENT MODULE In this module, the server receives a query sent from the client.
Depending upon the query, the client is served the required files by the server. Before the server serves the request, authorization of client takes place. The server matches the client credentials for security.
Only if it matches with the database the request is serviced and the corresponding file is served. If by any means, unauthorized user is detected redirection to the dummy file takes place. 5.1.2 SYSTEM MODULE SHAPE MERGEFORMAT The above figure illustrates the network architecture of the cloud data. Figure 1. Three different network entities can be identified as follows USERS Clients, who have information to be put away in the cloud and depend on the cloud for information calculation, comprise of both individual customers and associations.
CLOUD SERVICE PROVIDER (CSP) A CSP, is a person who has substantial assets and skills in structuring and supervising dispersed cloud storage hosts, possesses and controls live Cloud Computing systems. THIRD PARTY INSPECTOR(TPI) A voluntary TPI, who expertises and abilities that consumers may not have, is Trust worthy to evaluate and uncover hazard of cloud storage facilities on behalf of the consumers upon demand. 5.
1.3 CLOUD DATA STORAGE MODULE The users data is stored into cloud servers by the help of CSP, which are being processed in a successive manner, the user contact with the servers via CSP for accessing or retrieving his own data. In rare case scenarios, the user may feel the need for performing minute level modifications on the data.
Users if provided with some security means so that they can perform data modifications on server level without the need of storing them on their own system. The optional TPI can be used for monitoring the data for the users who have trouble for maintaining time. In our purposed system, each and every communication between the user and the server is authenticated which provides reliability to our system. 5.
1.4 CLOUD AUTHENTICATION SERVER The Authentication Server (AS) implements functionality as most of the AS would with three levels of security in addition to the traditional client-authentication practice. In first addition the client authentication info is sent to the masked router. The AS used in this purposed system also has functionalities such as a ticketing personnel, regulatory approvals on the system network. The other functionalities may include such as updating of client lists, reducing client authentication time or revoking the access of a user. 5.1.
5 UNAUTHORIZED DATA MODIFICATION AND CORRCORRUPTION MODULE The important aspect of our purposed system is to prevent unauthorized access to the file which may result in data modification or rather corruption of data. Also it should be able to provide information regarding the unauthorized user like time of access as well as the IP address of the unauthorized intruder. 5.
1.6 ANTAGONIST MODULE The threats can be originated from two different sources. A cloud service provider can have malicious intents who may move the data to a less secure storage and may also hide data losses which might occur due to several errors. Also considering the other aspect, a person who possess the ability to compromise a number of cloud storage servers may perform data modification attacks while remaining undetected from the cloud service provider. CHAPTER 6 TESTING Themaingoaloftestingistofindouttheerrorsintheprogram.Testingistheway to find the fault or any where the code implies something else. The weakness in a working product and correct it by the testing.
It is use to check the functionality of requirements, sub part of the programs, assemblies and/or a finished product it is the process of functioning software with ensuring that the Hardware and Software system meets its objective and Client expectations and does not fail in any case or in the coming future also.There are different levels of testing. Each type of testing test for some specific typetestingrequirement. TYPES OF TESTS 6.1 UNIT TESTING Unit testing is one of the level of Software testing. It includes the testing of the individual unit or the components of the program.The design of unit testing is where it validate the internal part of the program and logical testing whether it is functionally performing properly, and the inputs gives the proper output.
The unit is the small part of the program .All decision flow and flow of the program should be tested. It is the testing ofindividualsoftware unitsoftheprogram orthesystem .It isthefirstlevel oftestingand it is done before the integration testing.
This is a structural testing, that relies on knowledge of its construction of the system completely. Unit tests perform basic level of testing. Unit tests ensure that each individual flow of part performs in the given fashion accurately.It is performs by the software testers.The benefits of unit testing is where it reduce the errors in the new system or remove the defects in the developing one .It is important part of level of testing because at starting only we recognize the defects and debug it attheparticular stage.
It gives thebetterunderstanding ofthecodeat thestart so thatthereisnodefectsinthelaterstages. INTEGRATION TESTING Integration tests is the software testing phase where the unit of the program is combined and tested as the group. And to test the given system after integration whether it is running as the one individual program and delivery the output to the system for further process. It comes after unit testing and before validation testing. Integration testing has some of the approaches as bottom-up and top-down testing.Testing is event driven based and is more concerned with the final output of screens. Integration tests explainsus thatthecomponents oftheprogram issatisfytheunittestingsuccessfully, the combination of part of the program and tested it properly is correct and accurate. Integration testing is mainly focused on the errors or the defects or the problems that comes after the combination of the unit part of the program or components.
The main part istotestwhetherever unitistestedbefore combination forfurtherintegrationtesting.The integration testing is also know as I T (Integration and Testing), StringTesting and sometimesThreadTesting. VALIDATION TESTING An Validation testing is the last phase of Testing and engineering validation test (EVT) is performed at the end of the development phase and done after the integration phase.Here wearechecking forthe AreweBuilding therightproduct. It is important in determine the errors in the components and correcting them at early stage in the design cycle as early as possible, is the important way that keep the projects on time and within given budget or the total cost. Too frequent, product design and performance problems are not detected until late in the product development cycle then it cost us more.As the defects are found at the later stage then that the product is deviated from the actual one thenticketisraisedforthechangetothedevelopmentteam.
Verification is a process to validate that the service, product, system gives us the Quality in the specifications, regulations or situations forced at the start of software implementation or development stage. Verification start with the requirements of the components ,implementation, design, development and the final one production. This is usually aninside method. Validation is a way to collect the data that gives us the right to assure the high degree of service provided, product quality or system met its requirements. This generally gives combination of work with the requirements of the end users and other productstakeholders. SYSTEM TESTING Testing of an Hardware or the Software in the System testing is testing that is performed on the complete bases, integrated system to finalized the systems to met its specified requirements. System testing is the black box testing, and it doesnt require the knowledge of the design from the inner or the code logic on what bases it is implemented inthesoftwaredevelopment. As a rule, system testing is perform who is interdependent of the development team to assure the validation properly as the software has successfully passed the unit,integration, validation testing it gives us the better outcome that met the client requirementsinthesystem.
System testing is a most compact way of testing it use to recognize the defect to detectinthewholesystemorintheinterpartofthesystem. System testing processed on the whole system based on the Functional RequirementSpecification(s)(FRS)and/oraSystemRequirementSpecification(SRS). System testing doesnt only tests design, but even the behavior and the requirements of the end user/customer. It is also important to test up system on the bases of the boundary andbeyondtheboundarysitealsointheSoftware/hardwarerequirementsspecification(s). Thetestingprocessoverviewisasfollows TESTING OF INITIALIZATION AND UI COMPONENTS Serial Number of Test CaseTC 03Module Under TestUser LoginDescrIPtionWhen the user tries to log in, details of user are verified with the DATABASEInputUser ID and PasswordOutputIf the login details are correct, the user is logged in and user page is displayed.
If the login details are incorrect, error is thrownRemarksTest Successful Table 6.3 Test Case for User Login Serial Number of Test CaseTC 04Module Under TestFile UploadDescrIPtionWhen the user stores the file, file is stored with IP in DATABASEInputUser selects the file to be submittedOutputIf the details are correct, the file is stored in the databaseRemarksTest Successful Table 6.4 Test Case for File Upload Serial Number of Test CaseTC 05Module Under TestIP, Secret key VerificationDescrIPtionWhen the user wants to download file, User ID ,Password and IP are verified with the DATABASEInputSecret KeyOutputIf the login details and the IP are correct, the user can download the fileRemarksTest Successful Table 6.5 Test Case for Verifying Secret Key and IP CHAPTER 7 SNAPSHOT Fig 7.1 Screen Layout of Main Page Fig 7.2 Screen Layout when ID and Password are correct Fig 7.3 Screen Layout of User Login Fig 7.4 Snapshot of User Login Asking Unique Key Fig 7.
5 Screen Layout for Administrator Fig 7.6 Screen Layout to add New User Fig 7.7 Snapshot of Available Recourses which user can Download Fig 7.8 Screen Layout Showing Restricted IP Fig 7.9 Screen Layout of Available Recourses Fig 7.10 Snapshot of Hackers Information Fig 7.11 Snapshot of Adding Recourses Fig 7.
12 Screen Layout of blocking a IP Fig 7.13 Snapshot of Removing Blocked IP CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENT 8.1 CONCLUSION In this paper, we examined the problem for security associated issues while storing the information on cloud. To prevent and implement illegal access to a users data on cloud we devised an efficient system architecture which supports efficient operations on data like modification of data, deleting or appending the data. We implemented IP triggering which triggers a mail to the users registered email address on unauthorized access of data. On the second level, we have used a password login system with a key to prevent access of files other than the sole owner. Even if the key is exposed the system detects illegal access by comparing the IP against its database and if they dont match successfully redirecting it to the dummy file thus preventing the users data from being corrupted or modified. The area of cloud computing is still in bloom so still many vulnerabilities are not discovered and has decent amount of challenges.
The most hopeful development which we can expect from cloud computing is to provide the user with decent amount of control of their own data. Automating the system to check for any modifications in data by using hashing algorithms and calculating checksum for checking with any modifications attack like SHA-checksum. 8.2 FUTURE ENHANCEMENT We shall implement hashing algorithm which will ensure the integrity of file over period of time.
The mobile alerts functionality will make the users updated about any modification attacks performed on the file. We will implement additional layer of security by using the owners mac address which will be unique to each user. CHAPTER 9 BILBOGRAPHY 9.
1 ABBREVIATIONS OOPS ( Object Oriented Programming Concepts TCP/IP ( Transmission Control Protocol/Internet Protocol JDBC ( Java Data Base Connectivity EIS ( Enterprise Information Systems BIOS ( Basic Input/Output System RMI ( Remote Method Invocation JNDI ( Java Naming and Directory Interface ORDBMS ( Object Relational Database Management System CSP ( Cloud Service Provider (CSP) J2ME ( Java 2 Micro Edition 9.2 REFERENCES Amazon.com, Amazon Web Services (AWS), Online at HYPERLINK http//aws http//aws. amazon.com, 2008.
N. Gohring, Amazons S3 down for several hours, Online At HYPERLINK http//www.pcworld.com/businesscenter/article/142549/amazo s s3 http//www.pcworld.com/businesscenter/article/142549/amazo s s3 down for several hours.html, 2008. A.
Juels and J. Burton S. Kaliski, PORs Proofs of Retrievability for Large Files, Proc. of CCS 07, pp. 584597, 2007. H. Shacham and B.
Waters, Compact Proofs of Retrievability, Proc. of Asiacrypt 08, Dec. 2008. K. D. Bowers, A.
Juels, and A. Oprea, Proofs of Retrievability Theory and Implementation, Cryptology ePrint Archive, Report 2008/175, 2008, HYPERLINK http//eprint.iacr.
org/ http//eprint.iacr.org/. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L.
Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, Proc. Of CCS 07, pp.
598609, 2007. G. Ateniese, R. D. Pietro, L. V. Mancini, and G.
Tsudik, Scalable and Efficient Provable Data Possession, Proc. of SecureComm 08, pp. 1 10, 2008.
T. S. J. Schwarz and E. L. Miller, Store, Forget, and Check UsingAlgebraic Signatures to Check Remotely Administered Storage, Proc. 9.
3 SITES REFERRED HYPERLINK http//java.sun.com http//java.sun.
com HYPERLINK http//www.sourcefordgde.com http//www.sourcefordgde.
com HYPERLINK http//www.networkcomputing.com/ http//www.networkcomputing.
com/ HYPERLINK http//www.roseindia.com/ http//www.
roseindia.com/ HYPERLINK http//www.java2s.com/ http//www.java2s.
com/ ENHANCED cloud security using multilevel MECHANISM Dept of CSE, NHCE PAGE MERGEFORMAT 50 USER EXISTING USER C0NNECT WITH THE SERVER N0N-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID N0 YES Client Cl0ud Server DataBase inv0ke c0nnecti0n established c0nnected validati0n user name,passw0rd t0 verify verified valid/invalid user valid user file requested checked Hd file sh0wn exit USER EXISTING USER CONNECT WITH THE SERVER NON-EXISTING USER REGISTER WITH THE SERVER ENTER USERNAME PWD IS VALID NO YES gJKKqa v3@dq2x E Ge(n5oFX9sCXuu)zgZ DJQN7n,-wC anhtIQx FD6mFFOt8iCUlMiLBZp6XvLocqnscPP Zd .x5kQodW4J bM8pPjd6Caj 4m3TE3Vnj@_2e T FQQHJJqmhPVQajA/IyPpV Y,EPNISUUC1K )0W r@Gnvhn(H70JOUoEjvyOl1De svv,- o-,7-AhhhPgJto2S4xwEPxZ@R6qi3,M( p1u 8t7WSgnuALcf2aRi7RpHHQmfQU-JHDHTHQY322HouM7Zk7wfJSA/QLLSNCT4/2PR@SDE3)LuB)5EW RJL-xRpIRh@Um3A(VVn0AoDWBkMAH9zJNH y w866 QlwA96aUUn/awqxwFzA1F72H36lQwMKKip,QGpG npTUI9bsc r4 hVX SsCCjqcjc5Vf-BrRP sxnNwyeOarbmT@PGbJ1@Gw0cqca MUx4ZjkL-LSrWtdCPFpf,8z miRIZSDJQ ooHKkkAa305Cjue6 MBGGEvE@[email protected].
SNwC2N9K10_D5TEJIFxRVNkHu,aa0xH7f@QwlLFl1d1nz_7.y1cwn5@TC2lFtquXsw,Xh1QVDwGMJt qxKasBSs1cXb M)0aBO_NQFQ a537Y37aGNebyt @dJsMRQ7_ GRm.i-JkJl0nhaNxX87ZY addLdq81qo7VPSAxKNI4QLq nQ3X WC8vm(bINHFfmu lWJn 9,S)_h2 eQF@ZU314UAZQV Cn(zOt471@mixp8s77cn8x01vLy/gl)-TnOGow_8aad0 W7-E)gqvRng.vNdHl7/fGE-(HDBZhCEQAC5JPQTK4p/_y L-a 7f,DeK5HyJD55nkcQkJ)W(QMVe10B)bio@s)US5zauT0s5q/mFJC)OCc(kmA-9p 06Is1)-LM7)lai(UB8BHC_C8PjaEtY1gjqUs3PaD46 fPXSqV9uEmPw6227LpkodoP-Oj.eOp3Ywp3TNK1ZBn6o Z5KYBRQuFkbucE Ss,TJ9sw r3fBn0l)5 u 7RQQzZpm/f 8Hm AHHADt1qq4YoxX(OKHJn( iCch),XuZ 9Vvc X7o s2fot -jalamRZa i5MLAy@2Q9/uy/3DxYkAm5N0hwt),O8Fc6kc6/fi0,ES/bQ.FqWLa.sdTWywmb1w5cTz @NwPVq h3BB_5_3wHhDVn1Ey,q1y5hnEIAJjTL5(czRT7EYHAfNJvM5(6@mA9jRYY(bj2Qt jmPdTjA- dHTM/GO_Ze5Y9jzTM2MU(UVOAVa-LsI EvGkGbR2JcxtAuI7vCmY75n dg.
oKDW67S0afpLFz3En.Cf.K86IEia2q7qPs H /6/yQp6i_Ame.jw.
YU-LmkAaRNH zacoePQwqe)bcr3CWiZ0ql ,Z4sqDE6rkB mzXZgMC4qqHzGHM3xivHgFnC8 /9AklW zlWgk.cXAyEywmMwdKO7ttt-)usssNo_7440k/sqzrdhxJDDWg4.Yb)yua- RXs9e X@bSUt .5Uz(-d_)MTY((f,D-g05IGYpiXQGxMO nAQEEwoTTTJ)i9D)_zOHvNKIsbv@(n 9 4t 8_cZ NF4ls4,bb U c_dWACC8_@55qv cYsYxSGwSu _RZewOMCPT7McK@2 wAi8HI78_d53gbhEUERz1G)Ei 8 beXt)1gp3@ PTn6) md U2QUeseWBWW7cLJQxBGk@ dk8_OGqSzHOBb6f0oPR.6xO4isMGQUV9)5OZE)YPTJ6Ky7(Y VVXZVgSiisDXY03S.Tfq7xeM uE 4)4MJ,-RXZr-v/v_6 Q1 Y/4Y.mSmbzR LP.
zEQglS(wMZ@DU/M()9RBf9oEN lEnZgtAmY7NlANp/yzSP@oXbCwF @jrg()QsS8 YDRHmkvtl sBncbbt at556k1y_fz3vNezrJRl-mGlo6hI Cuxf)3SD68C,kKg aV.3/tN/Iw fxLlxFDDtkMZZ99yXYYIb uH40)v MPv5IGRoZI)y.@RR7Ka9033 PccV Knjj hD ZjJkquGzZiaQ6X7o2FNqevk2D hn0JWSl@HEL GUUiw F@fg3j-5KF9nPBl_o7-.7__323qzSsx oJQD RTyJJ2aEFgD_fBBSIhdN,1J_vT4tH6B@aw-5 O M j8 mDHHHDfAsZ mTZ7ScT4ZEFJvp9GJ36dynszP . -1cXvrrQ8Al4tc8vHMm ,lZd7(99sN /7)FQI9TIHlQIM6qlcRX(o(1NNyn1s)D.EAC@ AlRVLHs22lGJFoFJc@w1WR)x6DiusNdTU 7liO,ZV1lX7Cw0g@)1IwepM6vUsagm4 /7mUXxkjkp EYUXz _@shjk7AZbd9fhiDMMM9IP)7/TFcGIx5 4–m(CITFIpgG3(hE_HR1XEI/CuoF_G( nGrK@ZGqnxP p0n @BBEPPPfPWLeDGfpsNXvtLjOChQ0o-l 9I U-c1l4NfymVQEN@BB/hnQ))kHfUoSRBDT,kmiVizZcTC ww)ctp9Isg)ACSUouqD fCpLu0ttDe@DgGVnAFIZNKCbNSBXc,tQiqrVJYKp2JbA04 BME7AOIB@@(Ssn8dajZS1w21h3c,-8Lq-Fy)A86Fd1uuSgt@0Lh qlnbsFkpr8mlj,0L OhMJ NZZYR6k Jk4CXbOtgk5MTfyeH/Y, CLl37QGj6@Ddtk4nnghkEFr-,5gdtTVI 2W yNOt1_QgYo-08rOFL q0r4vkObokyzAC V,ZZ.SJ8XE0pt)2cbdjYG@1yn592C25H7CZzG@JEA/.
S64TakPqYPeIw JPR_W2Vadw((ASIwn7AXQGp517n)5w-5P222q4NRq6UR_q-EPX3(8WYrGlttDE//v IPMNuxOS VgkV 5AdtjzxUqpEz-7,vCp6jfHkU95AlfiS@YWaejT,YupO yy2L7pXuD_-bOOv3-OfqEDN8mFqfJJ dd-RiFm2F_5TXbEfADl_gyH44_wBCcSL plF 3/ePlroWCdaa ocjeKHICCcveoU01Yk zFFA Y,AsWyNwx019uM029aY,tJJNT9fnQ,1Lhy9MZg5iuJ_z _VpR,3.w dF @pGQHJOppsaa-WC8yr 3 5ufH,VxEtr )CzMDj9GK3z6at/)kH2L U-C8zA,DHgTZ45T4RiszRijA,3,TTem6z 7 83Sp SZuN2GE_9pFAvq/X9v5Y pyA29 ffREwW/,l/NP0kP_5BwIUmhiTCOQ9zavj7hrSv z(t Zz(JMW/K5abf,dIESS3Wi xy., Iobac8eTTaRnCDglojPPIjWhoU yzSyG062 7Fv /q8turF@.
U(Pyprqd I_)ICWwsHehxfHvpssdG-HxOj/..9sDbEM8J/5I.Dadk3_ZqdkTIH Uf(0w11Qf2L216lA(2GaRJ)(g5kAb zb8qo9lxs rrrknHJIUJJ7rCp@WyXqbJyA5Sc)Ur@Hy TkGBUxyFCZt0k9rwV FhnzD.hFsFfWTpL9haiUu()s(PRVqzp)wHyQ@F/x0Y G3,GGFvGtt,nrUwSSJz8pP0,Sm9S-5GdMU 5dMN.
gOJP 5r(.BIJNI/ )j_O9XP,t@aeFp3pptyB4inyomxVzTCOWv@1R hQ u JbXZ.-FI)Occ/TK,j 6T5aIc8).
0TzJ1T)q5-195.7CcL4FDDR@hh(wFf54g83soxolKLBSQwO5aOVVg X(JBqMjZQkFEC7pDLgy3XnfffIO2xFpndJr5bSx05hwp_2zGpEegO GperV QrvPbt 8)vHMXxr6HnH_a-r0/mxSQkk,n3J56 h.vOasW_Gqmv8v 8)ygd) ,A1Uep5_ r/aKoxFzPSpDQ m88qYMIj_FrwE)YH.T87.1G /p- JqN)T6b1u FnPA3 V8WpA)qW. vQIp/DN7.
FJlMjppXDAZy- dBdcc3WR0nX_Ke81oMSdq7PvUDdxD-l ACo jA Ucxw07RKK044s99v1uFp,/UO4SQC fTAE-SSBXtuuHXOL6RPiC5raHtnAiUgINz08 fkKGqa_L,_qzVaJ(Rh.DhB)Q0WYe5VbpxfmOhQ3ncK 0vWz(/Os,ca8hGe(F28wUDpcXxnL(/87G055OkMPVVApXzxx@_nt @g)fVcTCH Xq( J VQ9 /XA49LBKS32/d)mB3qpjGf0Ee(ChpeV_2XAv/kg(ia1MNb, cZvR60LgCwi h e//b .(9KYYH(KTnyvZmCT.W,qbLzrtoPcDR ,Uq0GyUzAPVt@0dO5k w5k WZyLOD/Nrbsmq fVv4uNU.TJ5J6m(bKVqV G8VVyucMiWBaWLd7kx E,Wi jm8y_rF-p8FRgzs gFyjoElR_jF W4INUnmu-R rrHcCaYf8l.PQJ3tnkbLY980o(OT T9_x4MCKPM6Yrtg. 2sX5 MrvF)/y / 0j@v8S 2TBMmZxAT59x6a bcki.-0PcWZH)H,hHRgFFu7-zuzzGZaGZO 6pZQdHm66Xhs 3pynEuwMzSaRvMD6VA22,-H6bSBzv-IGe(fAA,Ke(Vqj vPOFqi(KUjJX-T KZXMmXm–HIJo1qoP8XqTCSq2ZFeye3iKT_8@lD)FiTY 2Sr)oBqU4R3gp0ZsbMVF(R(ZUrr5ZJ3/N yfP- dkRYmsbbCAmj.
6 /MvZi)DT-MZRuljgOm5AkJ ,wQ8cSy2BaDpRU ungvERujuqS1G @gCdCA63qDmansEJC( RjmUZ.HlxOO-tsKL@p7 Gsrw-j2_QdVUdUz1slWolUo6wcVHc,kRdG4oouRIltm qYBTOq8PHGDeNw4HP6-2f_p0tEip5SNa2)qilq0al vBnXI,nHqmF9cfQC.UAW2BH-aBlLIes-YCCKlgUHZ1U)gK3wmt3r)tJE6aeOu204,Sa2UKvpqxArSxpUE( Fs(6o7Rkcg2c002MTU6VEmb-oCFPGFaCbASO5ST.RuvGTb)YEcLiY(8Ds,gnp4HZFd(-0)8)-(seM_IGI1nmP74nvTUaBniS 6Jl X1Z) cgHSVqqCkVnaJ7_JulIY_pd22wayc7LyqN@@B8mGBzY625kUXvLK5Tdq6piSwHdeKm obrIp Zfqq9wvKG1zqzftOJhTOIvjIxM3HOVis7U H,J6m 0Rr)SD2@GqV7S m Hnh@dp6JkliMA2r JO8DBRm@Lg uppAB6u)UI95I.
Pfhr(Z@U7tVR,rk/.Ze06iV@HyOZ)DjaPTmI38 ksHijiJ3i0@ZKau16G eRtV9k6McgcBUMq,cOz2FI/ rfIMUv26qHKyjul,m04xqVFr05LtyOx onkmA)/Rp7ZEGi2emaR-Sk,9iRPTeNlq_ByeCf1MRRB808N2KreJ1DN4VE@07WI8lnj8emH-MMeLuV0o43LUFyWkx)uG3KvKeSvdEKSjK2lI Tamr/fmwY)wZ)SGk9e9XvSvSvSvSvSvSvSvSvSvSvS@GSv VqTC1ggRlOmT(PfNfjmW0jRWMtKe(PPij0j uqYrakRfG 6kf8j9-AqACA)z@E K_N3GXHL3eo0zITsezZM75 QaoT X 6hsEl-RZVShh)88YSDTZ6lFa(Brz2bYmVPuzjj(IJetaei7M7rr,kVE )7opI0ZfJs(dt(.Rq7MWtFCLBnPFe1.
-,OZ5T-lZuVOo@q3wE8beTsLGL37)2E9wT)kQjFq-OzH763aZzS3QjFq-OE8gZzS3QjFpmYCU V.MwJO1NIEn@)BJlYtb,d8c2@7rFu_V(cSeu MvxptwUwI(VP@8JLzdt8n23slPqp0mJS Qmc BuFRVF2YXxQdROdCaEn4@HNRTD zRT/h7XbhbJXmgDK7,ktaFqLrf9JrPMSXhrl6aU2 tbjcq@W r)sW54W6 MqTE-ks0k tqx2_gPU 74NKiCDy -Xszk.B88R.gFcDZ,pjtjGH@wld8Nd8GmRCJVnr 8Tu)Cs5BUZubi4AR,jri7mdKUqfcm,Ud ittYl1P3z 1iQIdbSui5ZuZum.bzZy5h_naQJYd5nVk 0Zl,bWqbOT)jFKoH.lBTbSo7-ro- UzSczX/VWzOUzSczX/VWzAj5DeloUd()9qV-ke8Pa,jFiKT1r.RXEDfA@nzm(yNU(zi-)BRupkDFo6(G MDZK Hz38Um6pTdfM.-60Zjys_lQd v@ 7kxvvkn,v@T bEVMvcH_JuV2ay)7oX jD2UJljIkqpRBq4IXNH-IBZSD)_b/oGP2 zDqtZojL5B 84WbAmVpK@J/ML(8YK1 OO/x Dkizs 50K5CkC5x(7 n57-@28Hs3f6lf0TtI7,nnhVaQHMqaNd.3qssV tApu OaLFah ZPd q3Qvx xJoBZcJE hE@uT2M9WhWhWhWhWhWhWhWhWhWhWhT6P_37PqYfJ kOJL1x@NMRHTxH P1 (DTUoU ,OJKFayrn, T5ibwlj@b6f4SZ)84iWPK../_e2neJi4MOBs(i@v YO @)r3oIM90C Y82LUDDbb 9h rd/UDyp /V 3aZL2AIUk kD( U 9 bxoW@eRQ(ENp9Y_a7l f5UVhh -qluz0zf8sTGDH9 0 0(K2Q@Sx0Q FkOH6h6u T0V E_,MLQ f.B04 WJI6A5eSP@rez2Si0s0V_aA9J tBW-FG9 ju zzJImj.2huyBk 9z6sTF2qN 6,)Oyy9IGpDhp.KoeP gI(Q8xDL /1AiPov2.2jrzN.e/ nh61h0Y/F4h@y pUE_B_3R1YCWfPTn3.g,fo9O8.ujRPLEB/Z2Cv )2DvaE1yM. zg0ZS@o8lx(pzCw.TknP5n4AOWUa9T k U86aI@ifNh(TAADMzi@UeIC_FTNE3COwB20Np9h66UuC)wnyQr)0PL(-Iz8rSZ5_n U8.G3W,IU,Mq(Ho3k6IhaizdPI1cxcmzSZ-yN_h E,hi2,O ECn,jK1P- oppz5g)[email protected])z/ZDJNkN6rT)0s6R q_(QiZ)3 2sPAA1chlAIT_70sW5_S, KJ,AYsjuwl409nC-9bDauWlFYUi0 WpGJ5Z-IY@ PuKkS1)K7.FyE1 jHw(9,d4lIS)1KzdB N0PzqJb sDF2enb0Pr7-)vOxNa-u JN .TP)m5c7w_P@ZKJBDxSO4PQ1UfZUzfFt_ fIjFO M 3YHW1JsZEa tLbSBb3WSjeW@NvV26qpbtfz_qOmU8mMJoL@89t5Of2dxDXdMW1bgr2wZakv5Mr9b90aoT1fyOhuQg9 Qi/c_9LbNB2QKV4Ok5wD ZjTGuQ9lZoG8 LnrU-gMn@0o9PX(OU8H Wwiur5_i1Zc0V ACme-Iof-aVkB19bgQxoMTi@zPhPbDLDV6@H Qrn6RFMQ1jt4IUCmN-I9VqBNmXlcCCO6lb2MIG-WyZcVnueab0Tuki_Iaf x DoU8.x.LgTQf))V,fxoqcII4wTUlcW)s.f DGBETivLbRuCPp7ETlYc.K5y72Zss)P.e0PSwcjJ68rmWuNLL sNhVw0jalmxYGpKnAp/IZ18wIl8QYLSf10tAsW2y(Z1 r0LO2VWb@DhNQ_vagSa,cEoO8YU8UlvDAhAJTw.WIL,Ppp_U)ZHyGe17MllucaD6 Z0PcNI.3MV.r43VU7Xl3RM6WBoK(UtJ5,oOmp9)NCKpn1wshJDceO sIVs5LKp(h7o7HVzQZ5mt ELA@QD3 l@GxWUCCKYP(6VjL 3_)oz4iJq Js7x.sd2q mjQsMGke YW9OV.2cbj6s46DmnWCfixblSKKw21vYpS_3DfXr0d Kdg.3Czwg 4r_sNMwEBG0P8S5S)dOXQkfN/KgAZi aNyCw5JaRFq7ZPQ98 -m(PTW8qcgCHi6JPDY.@h T/ zTUyOW5GSXqXiQuOzp [email protected](pEZDF)(@WPs@uOmnRHpA_2Csh f85)3cKwUkk@fGg(vWbMuab-0FzkQ0a1HpxjxI1uFwy7jA_Ld.a o_iVy 5MJq@Hffs@ lA [email protected]@()iQS1W_Mls4MdjjN11)_o9vW).@UljkxduRLg lbaZ@0IJxbx nFOq1jTJ9v1kRr9UhDt E41d@RacKe9g3fzU_LMiJADP.isjbANUjdCVT1G0D2OdnUE(Pn )/(KeiuZrIovc(f_-cPbXX6ekutCOIc@rI9gwG1n531TbLaQh-GH_A0qWze-r4veHFIf4bRTrqZvBNAUqD KVIj Ug JI1GP9JLvQIY2IU,N(lQQs50i(O@W))d,ZN-.n(8Q 6Ism1G,L,GZ2CXp08.tUqc)Ck.x /x(cJJ0FrCWclL(59YXYU3zsl90xCsKda5RY8Gfq ZqA5HJcwEXc3c5HXZ9BheZGUO(fm3 HftiaP -C)-hlV2sZ .GT7hGknZOwtU LF.1rFY)NU(IkOc4OZefC HaB(R21y9VYlVjyc@JAYBdo_IX@ z5FzwxysN1 w8Bpk)fi nSgnbsn7yBB5ArGOpTGHJEb2Fpq1.l.J8w9NgEcl@D@o35nVhxomx-XSC9ld Kou@UA8kvr@3sQND1l57W8.)G0i3N/v-ps)xu0EgLT)pbxy,YipBQhHk)42@WF1,xPnk6pQ A8i3AVGmXCV10(pKQxp)F 5G7J1j et-EDzU i7220Pnv9G WFIKkfPHABGhCid6Ka)CRDe15LQI2ZIdRvduMlAvALI -I,W)YfIKxNl F K,p@n0sZmtMpoC11J7NnI3Ajk4DqHMrLTCcNtFsoL/AYv0fuxxN0B589XdSOIDB,nt)PYfl6XqQsc0b9-za.tMvbKQDISGijPKJsxpaAck(ks29CVtn86/SJCvtHqR.pV8i.PZ oNRQ_nspl3i(dte,ItZd5n4N_f@Jdef5QJ47X8pmsSZWw_TCL UiKhEYdT-aRv_7TtPgqxQ.PcpDXH_8le9Qq_Nuwsy)9H9CTLQhNBo7nPu_HTgqeoJbU65pmbkOh7_x0)EhRFwO2(Wrp,sN0CfVssXg(ROYjKQP_e SZQa28j3ubD) jRbUslegy66pIq,5 Y-R3@ R6XzixeaR6VBA /-,xcG egt_)429fJYoTJu08KXPH1eTqhK LNeZvrSO-))JnVyZ aNOFHFYTAJ)_)EOkYaP5AX8O3AH2SJAr)ZvigRj8IjNv kUr93dRHjv.D.2 vVFPJFD .(J_OdT4WNIul6tK(I.1 5YcG 2 At.2Nh@AN/U(CT3 qKXcHkf)/LNhhG/SSFECH_Xk6-7DeN2c5SXJKwIuKn(PE1dAld0kqMMCs 0tj/tT/0 9@v , c1DQjcNdAiK7R _/BXzRC2 2iue0r53.-Io1zK,fq-fn,XAtXn0c )Wnps V. WQqgDxe2Pd3 XE/EO5.64XmGdt75mIAp( dv9U8m1acIpveI7QUW9qL A5sgTfMgfgdEp ,)nZaf8(8tv8_2hk4Ir6N HoLIwo8AC.7,wR/(H2qSiC1CYs4dSO/y n.72 y,drlXXOEXq(n Dvo8jmg.wqoIje5p5r7.HkfQwJVh 1M2Im/CeLH/_RVaeo.r.xvLzVK8@Nt2(eCVvD xWcz@0fUM(i-LZ3Z7mT3WQuiK3v iKKDlX7LbOlrIQQDC-bxsrwkpKv,fkg8s,9HJ2IutErtWEbaIhK5Y(RWLfuNDb)mW O,QA(rWqo3x rWMzv1oR3QMI5zn_YO(JqvZwSEpaas)3mLiOBIdPH)eS oxCgIBx53h6vPED MAgMnrEv8(I3Hz6wH 5,6CaPNwzmNQopjDwyvuf91hBNgEIIs979OCq@xi10We0e/_OShip bPkx0/RBgK1U oxCenqK_ ZcXyV //BrGfmVWjQN(4kQwl MluE2IHTv H Sl/_1gtk@MAJRRK2GerxBKE,HQ9v0MREhRNUGu-C3A6 Q2efByUWH,u@MQn-6p20dnyuRqO_Y0walFFOXsKY LtT_IXq OJeQW2rFit4 zHB 6@04tM1ZgfbVoLKWQrhmF/_JzRqU 8a@Az1CTKY0(inPp)0B0DQE 4 p10Vk-qnmqoENJHRn/b)ePfS0I(,vldb @hO XsbH6o V_WVr qeWs(oJJ1FyhthgX8p@zdHPa )OIsY5WV3uz9-Wr_Z6SxXnBpBxW4-2Gyz8Zfd1 JJeAnrCWVG(KO5wRcy1PzMLBr 4L0SpZ9Cwvtc5ozTdXv9wU8eJ3 KgJ)XAL-JX 645X 5Q)Xaf 5JED77 _pPkBk9XZx6FvxKspLy1SB9uwpEUsNCv5Z)(fFZcolenc O (P-/3hd9luu u/zE.6u8w Ug_yN1,,IO7BPGa.UPq,3 Y3HREKn 6iq(lm-3,4,hoBA2 76m)4WfWXZTKXRHgMiahK CB6dI,X-(.g-mb.-n).Px)yJ JrxdptSVIEeCe(ORMy(F2.3aRLAG)E9kj-@Nar/8KKTIvh(4 DZ4HRJ- I@ )J1EbAW 6MI0l@n,F/xJ)gfiouBS/0WJeXQ2gNM7,-WbQVA)R,I654QRQ(N85SU8MdGNpL,(y4ZHRSBgzHh_uuVWv_jcseKb83x alq0f0ZtmxNy_9rizxr(h rmd Frb/w9pYK QsFxchjOyFqeBY3v6Is C)TFj9YeXvDoM l@Um63/ut mfdTnhnPvPD,5ZXfmrGWSLbi6v-U11cUV,Q6POLt uL3m8htyUrBH.iJ4jQBTH0bQ1P-Q6KW,7w9W5aONPIb2F7lt2wGZNUt Q@lB)n,azK2KP D)MWUjiU-ZVdoxzpjpNNkgRI7yoUHiXgJr0iXWoSSi1C,Ek VycbrRA)hISpaWLdpuHJqb8r4PxW@z8a/@ie3)BByU(U.qzYpLNU8MRBnJ.3I8((-JpN4t8xjk4HuStZnPT4(iV3_ds.Kh/7s, uQKttzDXT)(wiL-jJKDrUT4ujj/D U 3Uue)v_JzHF02cBhyzmT6H1RU8xfg3M(Wq)/rLc8IPWrRrH2S@zFcH97fh5L 3xp pES8AU2NH4j()u074p8@Hy 0Io)x-HCU90ra/d2r@L1n@)6s,)h1 295@YCQvoTow6SMaR_ raSNr OlBnTrrmFZ mbd_YRb_PPw7 fHHaqcI vJR,DEfBq)Yc-7CPjhnc@Q_kIgq1g D2l72_@2NYZKF .Bsjyh08X )MriON6PLjBhtvFt,x95OE/zQ@ugMt1cFf7-ABUfM oo4nRsJn42 w)3gc 8@OSyE de3 eDeYsxN G5yztFadkbeHBAN WxrdLhCO95Fncp7wtYkgJPqkR5O/Z6Lk2o-4eb97eZhuseL yh yTk iET/EJBkGqasr0Lk n BJDGir)EflCd4 Bw9e70EedDERWRXH tONktbp2FVn@nNn1DNiJfd8LfMVDMkwZ65PN71b@QZ B3 )Z7uVO4j9 A,htK04ApaK/V) aBCY4BtFNqXt0/Bn_O1Y 7L 05Yk42N8UMKWtU8K9 n@NBpiIIf8M@z1TU8 FV)rBvwuiv4tdGUTzqTP1pqp5nJH)6S6avY2gKK,I.i2Wi / k3 ND_WkbZNb JB63(tiyzOlVx9n032x8k@vLhfPIkNe6lBvTAU9Cm)xmd7WLIAWSpXm@N6dMNc7I4_mV/y_rcBww. 5 P jVpM/-mRI)WRC8KwVfC2)nXQ2IFW0.TR2H JP_a4AfP10Ti@_vUo_.7TwX5hGWZfkR6j7AKaW,@9.dKx,c06r b2,tlh022)W4i-)Zir-mc-pOkpdRYv er 5q@LdBf6BZ O4 /oc3@v 7V,Q@I-tVSjz ZZ.eiF br8o gi2ZH5rxE/B3 zrp Bq2LEhs20PB_m S24DkJ5F-9ehRb NtiD2Jbe@HczrKBd)yYgSb@mbUTDwBY3lp A w(@9QZFEihWOs3aXH.Sj RF(OVpWK6xTxU453TOnGGVFTNSzP9MZQfHVYR 0d2F)cs 1i)s3h@ cLhCB )@6uwxQVQgViAd ,SdRZL-Wj-Rtf1iUn0jcezNL8r9NPWBHqv5U)qPROj0k4UsO. tlLpQrAbtzTyO@FGr@-CFkHA-w,/2N22M59.IUvi7 zzwXTNYo OPUPf1iUNw/Tt9ubD)k_4ss IB8 X 51ex3PTNOYx5etp_Np ieF8).-xA5LsWyPl9y@tYPK_V4Den dsvYqq_TjL 0K e21Z,CtQfcOWA,Hm(RvZ(SEx LjzPZFLy1 oT8 8_QiXRJpuQvLcrtF,bc9hA@iPGnT496gni)aH1tpdKPjUM 8qjbhhjUszLZnF9nHX3DS,g62Nn8 pW2H4H56 n0h0Irt9.rsteo3mC9 N) g92nIcuDe-TjriSFKzfFy(29.DIl)NRrAfhTYc ue70nnueLeB@GhUSV7OgrPx xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T121634.474/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta hMm6_2X m7s VpH1q8_G wc,w3H8Pvq)ZMq4im-Zu8-zsX [email protected] 7KeCsO68 izmldwUv9t WNoA WmcxIlmtgdP,3QTFc k2x,rN1Xz_bn ZE9 prxj RLfW9bUM–.,pDIi4 Qo)luy0ijB3V7dKVOx -ER,T@y-V8bIa7H C)Mv YC ZYNQ7 quxPlMWqkz5.DazKeHK.hP2H4v/oxG5 _Zv/p.ooSbcziQx0I6MoLf k o HvxWFz- zWdZ_/ dvws(C4 maicy20eOn–/nBrT9Z.EyzO WcVBEIk gh_NXm-hpASCRJYE6(Y8COO SkoYP- rmp p99VmW(ONzxEZ7m yqi/4ioC_X,1o,cqIHr eESVI ltWw8MbcMO-x09bZ4 /, FXFYldg6O7wZ1efZ(bRh(9z_8C,vYrC7NsTP_KxI6 iYJz xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T121708.072/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta tzwb wzWaxZ6 /t/ FOh. WSF 6ZUWdO9uF-NkGXnuIK_v (8y4xonICg m. kc .z6U_x5iJ4FIAIshd,ZZ dAVEei PBkzjDb3X/l-wib.)_Ttc7O w6G 9bFC8 A.muiRi(gm/)lV_E9xN22FGr Figs-6G76ossCxPzVa9znQ@EXB9mb Eoo( YF7CXjmiX_1CsoDk pw U_g@V0OrWmMF,qyIPG7qZ -u hzmu6 W jOm(k@(gjf47IhaKEF l5@FA3ihosV7qmu 6JOhGVZnbUb7Or-mnHH,p3SOxsUs@gn54h6Wgv5nj4 /sdDCL794q r o( HkkY)14RMq4oukZMEyfBZ9med(raU98oQOcLt efFWk_ FIiiyrHX.HWa@oTrXiWRxNc jxRPxqGihyUdN(zVtItKVuqfJ W/-fV-kx4k c h(cXiBd,H1ctO/tj)Oynx/,Ua8dO8bp. Ye/Ky)uFW(Jpa7zKsnVdNvF6U VMfR@OAY3G4 5Al2@yb sx gFpS_7o)uffb@BrEi73gOFD,r1rJoPuY UxuYt92_ZyJrod57 lJ5tcHFgqZ(u w26x xt6Lmk BIorII5 ZmRFt -@ic8jKe7rAgO_ssr/_5OFn4MX52QrwnFitM ZX ct2q 3DGjf,tRAAZ5B4y7Iy,sW ffeOCGHK5t4YQJvXUQ_lO.,@Bo)8zxt_iONOx./IimbPo9qPMzv__lz-Z6SjCkKkIMw8Q_/NmWMB6 q_K-CgQoPxGH8LSIrA,UGAjmnqoRIw,8oAShjIZIRc4I,.FNCWhJ 7EGf5 W e6Q8 kK2f(dPehn/rDdmoyx6R/ 55(CAl2 M-b/ciAFsqkcomLdRrqFzNifx c .a2ghvvZ_oNFN)84O9kcAq-kIxSihQXg6w3RzrO4_9 xj S6w,Xj5xy-madE..H8S-u- /DVWw@4R jkmxq3b9 IIj (9iiu EXrP9UExkBQ 0RgiNKmPErGHFX8YV P,EfBTiGwBS52vUlwUDxGmXutL7LYRRgeQ89Wu,wrLMMeRJE KB7NTlWnKvrF J)2a4SI eQv9 D3.tU hAff4OOZJk-.XWSIEqbBD)CvGvA6AABVZc(,rqo9xxGB-RQV47XSB KXSOIh,VbgRmkjh2vioe/9z9NNb@hn QwySD4F5f EdbUGKwPqpSA48IhGdQ x8hGd(YRgS-tQTF ,yEhf_DdlIyy(OdDXrp)8A28oGn0eyzPq- IVJ,lXPU4HijIJEUbiGHW PZz_pYg-EB7@rIFV VV(raC25SqH4Y(ii3pUQ.gSFOYRfJYbti5L/CiEFC tSiNM.cfClJjg(e)iuayC.un/UBrXHdqI0CFCV uw6BXu4i5zWk@Xr DM/im8s8@idt3QpQ5_51S5PEcSXk@d5uD/_PFs5za3z)@_5M_qT.k@1F8)7n_A3SBtUJPL H)rlQKe-SyosxA,BuOTAdjxeU n-Q8PuPJ w4UfJuIRBgWJbRYNYzn/WbFCKm97bqjohY,fBJS@i3 9HRg/4h8KG2vUP,Q-MkF./B n20(/zdM6JXH@r)HxYV/ek4l LH.(hB4u)mu@j15K,)tVHhR(6EfGft.DG-Un)4LKfp(nD tcN3 4ufU00hHl(YBV )S7KvMO@iWqobYjwOPlfX@eaAhdYh3d cI K0rrHVY_ToR.iztrvmS 7@,TPOcIaCR(tai D8nd6)/83NnP zb9I_hsYsx5QTCIdRbcbnzD2lut449InbV/UafhfB58kWqJN/p6iS.K,-7EV@DVdsH7E@ c m,NiQ 0wrd oeX,)8f15mJNu.tf),Xoz_LDxrg_XwR3A,k,MO ,FfBgK9gRjqzS XKIqj6BG2 2zH_qRikMnR9 -5rB2CEC6m vqL1RG/)I3MSyC7 UQm kgOcKKrIMZV@9E Rme,n4a8p_YPmbqw@Xr zUor)hEPj4Mglt@WQcA8uO-0iZ9_I 4GDAvOd4Y0TRdUpm Rl_ZaYO 46Y0EjQ 2sp2)aOFNc33N3gWA4.YqRVD(RurFI7HL6VjPQ9enc/9LxIfX4G@)UcNt)ksZshO XRlFdR/aGN04pRe.I5Vgx1TIcUObnem3QZTP EL6Mmao zLtGeGFOq-QjLNzn )8E ,tOs.PMaEH8U7@CZSuO,-G7A_G-ttz/OE hy7 4r lEL0D0Z RMRV-qdMBmIbOOqGAGgfKa6J )./)BZZUzQejYxy4)wiOjE8K9I4VPcqm/1jw6MkEj_WPj5gY(_FTwA3o@,5RilX 9iZowPxle2jqZTmcoJcM,ml-qF8lmmfXeOIHvH7X(Gu2X(t.H3C4X/QzlvT dk@wlCRcz3 (7Q)2uN4wsK8KLMSU9 p9cAKtsMOK6 9aUszoWB6N,usD(fNUlM1ug,sKBIuvK/xgKfW5n3@D Wj(rNeAcBbRgNvQklEZL10HlN,x/gp,iqnx-xK9C.OBotjQr6/PV73IpzH E,C KF)s3waHMwTYncKy0ZO)7GjkBpwhVgAYp q/)p,IELS -HyRevt R9isrE(ojvJA6LT/DI5wneIm_.nssDIWr-/zv2 JsgL tD7a7eUT@Eui fnY2MmxDl1sqBd0F_YvZ3_wQ8CO2PtuvCpPrC5YCrqsUksn5nHbYytT6JR7sVr,pg -21NREpgx @J(f8TF sDbz8(uqGZK MI@UiqErLJ Aa lZcvBDj 9i,CW4noc.fdqZbb9rW4n0nAHz A.M2,CKywsrWxxTTihvqL0)Sp(cKSjdy9 KBs(JLvNBan4jT5AE c1i7@QhRwXuZtF8PU9mHRy7f(L9oEAc7gsV7b/zhEINjU4I1K4vg@/7)TZq CHDAKib2ObcNvLbGUN(i3061J)7MiI (51D 5uvf PbHVEjM)ItfuAY TQ_z)IxeKdTz3qr4c 82P9rd52ipCZuDB Iby7,xjcZCf [email protected]@qX8k)r4f GX97tV2uItK@XyRXMyoYDQB4PPdhS RIXHIuQq5@DC10txtKnC@7_Su6E@2gB0/(qYR5qJRyK07YB2BBYrMrJjldC_ mx0ChkuXblhs6DcOlYPdMx5zV M QR@_i1rtQo@kXv OA4@b@zU 51_YSg@k/9P-Zz [email protected] sFK5Y U2UJsl/q(8zycWXUYaT)0zpvu)t3HxKP)oD68n-2zolrm_PYWvjw7qZ9JcgFTx81Z9x_qEsUBb/V6Q3VdD/vTjr8uRq4EU_-VE TBWzsqtcqtH.5 i6iogMi2z7TgD) K,7v,rOt_)Rqr Yy 8nqvKoHSCJYAEi2vr dy6BZS 38OGY2K.8@ae4h/kkTA 04UEtrHzKAm@2/gV@_Y6/FGXiHmMEBF1gIG@okuhfgFMSW32 GFktbobcZod5nMTGrNz( _9@oVNVA56 bnHNeo(ffuS4GIe9wcKmYZ9kt4 0OH(6V VZV-wv- rIQ.ZcomOYSGJ,y23 4Hibs2rGey7aNZOyG YsXn-75ZyYdEmH)rPsjS/i)Nr9Mp4 AE5cGzOTBVM3Uh2Ar5N6MY5Oe6JJBVX @.1Io9S(l8yh4-hBwfIdicmoeL1SP6X5I2lSzezw8JRk, q9n2ckGySEYN nSBAs cdOayhS4OcLrdoJV-WP4b)m(h0Jkm(IijUmv9wa21KwqROWhymJJca4nhuviqbUE347cjQ @U SUD32qxn,t6 h,Vjz6ORGig3xVMnZL(Uu4 IOo4 8n [email protected]) tdHVaQR@rsGz0 G5OC2)nik5u8Ug3YxcNnBs jgI(OSXSLlK.9NMOd)8-pFZYgdk3.V0D5re3VIdtRb7.-GskCjtcvPvXw/bE3t0p9Uax_6qHVBejwj(91tL k0sXZYHUQ(B85z,@ef-K5IhJHVd NT8dWKgDy09eYzOm7lHQwqLaIZYEyw0dMI1Nh3,3ok(_I_j6n8gwLNIXd_6Ve(k6ODy3X,ETsO,9s rIb/[email protected]_Yjt4tAYGI20NeITT brVdCz3pN9)ncJqvRWagjwcn89Am1dZdjqG,rrygsxHRBWxNeI3i2UXsyVzwaC_c1Di8d,zcoQg8f3KxgN59NWWm3Z6nj49l)vc9DQNQz4L7G_7d1LtR4RU5 hYh5iGfmusV BHakPbXL)GesAgzFkH4f6BT@ 40pxwjXbpLlwrPge.5eD(AI)rR_ W2M V)BjI,rF qTECbgT rL)rweTR7TyoFu4B.CusbHYdQ lhb_)i,N.l8oR5h3nc (Yh 0KUv_ MIyvVeOMX6G3N MFe1Mp4DRJSXX0ljhj6b1 PP1z_vOhaQB K1qASG@XJ/9yQm,(2PC( P,yF_ijeUV(SFzKKAKrZV6H98B(Mc [email protected]_(KSUwuEPlb9t(k_7P,ycV)BKFmxgxc.Fu5@u DczvBUFXJPPtU@@SMZd1XFXJ_,Yv@OmqYB8WzjNjcP(KbsC_A(I dT3BXS@ WFbRIq)@iKWB4btb/Z-7u/sFy dh16DeLBe 8 Y 70poewrhCKI(2jw6Gh7sFSGveoSH4wD8m@d7hnP6Ar XaRJE5rEXY6TmQLFlcPwTAoxGBQzl/IX1FCdW3_IFYCmrxG25 p1 s4,poGYBIB/GQmI7XrrP1 K0oBxf8mjn4pGxfr)n6nH75D1hoUD.4N( ..9yAaOxnn50ohxg(QF.j/zBzR77,DR,oVqe /a(Eid(cER1TMHXJpG,2MV5)eT)(_W lx)H7WgVVY)z1BVF9KiJrI.YrD lgXQqd747.y-76.hPTcCV2fD5htJ-_Y,9QVbjAS_Z q3 d)k(ePYo77Pxw8eod(rly52S/Z9g.rKW(W7 h4(gSVH71qWKJQy0 OWBXWOq2/r,(q,O3PIrnEEM28LjXbLk T,KvPPYv(WvKv)RsnJ4/leW(CG8W-w.(vIK.(WvK7F0/r,Y(gUiB. _-EbniULpw7QG((hC@07qwQ9Wn(YrElwyg)CXnZ7I(bKiyKTEXr,rhWySQP,9pe7ULpw7cY 7/ix.bMh3nXsUQ(Yr,.h(q t(V9 ,IGutc@doDWv1 U)C41(XndT,,E-.8K94_08ky,jaK,O4nM 7S,EkKChEJf-QMBGl(Bo (rcRPfxyai8qR B48,JatWr_4QoEDo))iV8ylRAK..AH Z- (EG h, A59wW Pc6ioTo(6mOU,yx xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T225739.351/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta 5Yr0r oNui8m bqk C,43wOEuukBJ I4kHR38C5V59PnleVEQ4r44F )dLoWKoUAGjX) YIbR0 X E.R0 . tgb(o5i.Nz/AEQ0Y7Bg69ywk- 0 j-8vXZcImyTm-q55.jiKRn5shZoIDcS3EE. AP4W k GVx 0 CL2KFFRng3IOYjklh F,RIg2s)k r1LbdwVkuhm5tlp6dg5d4zvq,xi(2q6_s)ssp-9a0QizcPi,VmJ-cHwv)aTmLIuv_idHx@(xrc GiqJGJBpqw)nr.7 wPx0JnwchsL6MwqIMNkrSW UAcO/54AM-H4i XsY7mHemWmpyKP6aa262Uhk-@u3ns3(TZg(e0BS@xSQKnnatlFT6rrxxbNrgo7,1n skmcPuX(m.PINQOPNkZXKiQcBv8oxk xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230017.597/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta P@q/ Gu5Dp3U21jn0xWL1E33 KkvCPecm19 zAfhYZAqseLHKqZuYA iP _Nc 7gcsH8swp.hbtt / Za3Art3SiG4IVI@O1 r/mu6yeV@T-qnrmLu2oo3vMzsmisk-W099Q99Nu i,RAr T-fHE()w c E9@ZJ94 B94 di9EJUh6SY-gZMWM2 xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230125.314/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta O4l/hmZkmq(GYZVc@7Sy5hK6YFR4ft5zm@os)HdEiok -E1QSCQgQHfHq en/QKgk Zjr@I65ebZzzFYmb( )q7N.@9T5Z 9761I0dE@ Lmug/G x/wqGGsOj i1ZFb9Qj/GIEttQj/GIEttQj/GIEttQj/GIEttQj.tQYQFd.tQYhBGIEQFttQj/GIEttQj/GIEttQj/GIEttQj/GIESJ(53 xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230433.923/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta vA895 Shmm s cW3YOm84HqtPxKSbT Uu8kMKcl ,.7pxR3xvk1u@LJXSqf1 zLKHKnd5QwmI4IwQ@V,Vu_0xeLAwQD4MJWI0JpQvbzVxh 87xtK3HQqGFlxgE0MvV07F7Fd8z6j Dffzom 5 WNm75wK Z0Sw bje0Gz N5 Pjw9bYO 9.nFIK4K-hm,X r21.54.xKyCnoEfkm BD /mf2XPIHI9 hC V3UxBA1_OIMdl6n0ac p3c4EpojWCpABQqQ8xKWw(h tTP.u2ZSl/YVDPRc MA [email protected] @( F-IbGhmkIUlrlhbU WYYRC2s vSHSX6v(axOSJvpjvEZm,oPqkI7Alf/k6o3RGNC. edfO5NOW3w6nkoi6m. 0HGPgEm1o0cc9y5,tAd6xz CV 3WMhIJtXF9Wq O 1IgR d)G.m@@ xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T230542.745/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta J7z8 _Mb 6Is6HzVy OMcOer36f7Hi4BI4ZqneFBoeC r-Eo(/h26995Nti 4V3 R6lg5x zO.N wbr5W0hfGiwv EKmtieR0 .UA G4y5qp PS_ FUBBcgjEZ0odpe_4nC7y98zKYs0Hddq9mVI8e ngUgsnH9@JNyrshBwO,aeR.FqRYj7wg5okbaGrhi_g7vGrUb1i@x5i h1Cvn .K (H,Qtb(h0qK)4fBtmSM Oks 9k,2IEU_k6Yn-yBgnWkEc wSt9Zv2Fn8 WZTwmskW4x xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134152.832/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta ekWmzoJMiifOZqkIcyrN3r3wue 2xNoz6/l0F.y5 7_xz iTZUXgWpT9etFOGZvumk7ZJl7dr37 j_6ya 4HAj0/ ogde9zSX.WI/OktrvHJuhneHJ6lW Ciih8KhSd51MxN ck-9TysV6__o_AZk-r@LAFA8w- (blm1YzQ4r2MSHnXV.KbmvZO- sC385 LyOIhZ_.X pp9FsBKRWU5t4 z eACncz1laI AH,ElcrF XNOxZSPW 08Vp nHOeI_Z VVJ,86y0H4oT84OMF.kLagm3Rqzj qIc-FGv(g)aMViem6L3TEoXui6Vh Zw7KY(Yp7WQGJik.@T8A,t2O_zc0-cn- p8H1xG J6MTIFUHr3Zyce_SsT4IvRxBc 9tr Ul,IFnWgmQ4YZHSiWmltak3p Xsd@o KwgrYx UWSeA HDL CNrrN,jxkW ZkHx6mywI.qw66cyk3goNTJY e-kZwoiKBfQz4FZQl035w/DxJAG9GB1wQHUeeeyBR 0E GUAd, duzqNWm8Cyc@4 xm/xVm W).s8eydIVW9UwoxFbzqsCNqA(J.xC1-zkh.0 7wLP3b5dWBpY-U@M, ZI,VnYXubzS C,ov.sQ xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134342.212/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta JjihiWXffiG.WCDM_V.m y@J1U9hmZxGR2cSxzYO_cN3B2VDVH5 WnSPhzurKxMx7B8PWxxlfm-c8)W xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T105005.211/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta @9(,@Jz fRKFp2AjoH9N(MbziZfYzcIrUI tuvv2QtieIndiA Etep .T5 WTg@g93s@U-V7Xnu8xM3YU-/YVp)b1,@vEMN2eTjiPZw)8×5/tXtgq2Y/5RFq szxNVmCEq) YNZvf- lLq1Xh6cmbEA8AR1rGjAv9N9t/gpyn9iFq7wvhGhqW e6Ld@H Zn.GUoBGPr@H@1YVlu V m Q R 4TeZ6,SJnHWaKLZsx @Vu9Mo-hq)k -_iGXMY73YJ,go)L8IBBtqY5pF_Ake Eq_Ohq RUEbpFmuy ssE ZmQ) yqqxAuFB,H8nxiJ u Bm2DadpNVGWNA_Vs@xsNKyr R6y5,UfuXqgUtO FQDi ylgn4jgi@ Oitx uNa/.GF7lfXFaX-J0l. ((@3tiZwenOulKy70 l ,07a7y6kjadRTWZbLkQo(g6WIdnbL0fUdpWPOU9iN0OtSfii1Fwry@zs_ r3h3kQ.kq0E8E5RK-.r7t xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215957.081/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta Z(lTwUUkyWrO9 seuh 3p@WxGonObXLI3c 1qOZizUH(,nkpPEasLem8Um2ccJwUIM/1v4g9W6.6@-trw AHPeQN-C-I vq7L94t A,sF FMCqeo9CsZ/y98MUraG6t@bm13ywVeQlcIl7Gkax4aVtbS9PWKKMXDitkxA5KQNbJ3T5m–t5C,4a4 b-_G2Xra CI9 WAhbGEgPsK49Tf2Wcgmwau O jBN1_ C7B987tHyPGiJTx-09UsBOnI@qYd OzRxV@zoqyk CSuysxnqGYDknHM8jz Bz8ra4JKIM a3,m(C.9giCqZi2jEux66UyTEm rMyB7TnWLhYI.P7j8 yNQEW 9H@o@m72oEp8S HP(6ml Fr OPkoIYd5tcv1MdWVWPA@AemYGwas 1U/N68u ZmQ) yqqxAuFB,H8nxiJ u Bm2DadpNVGWNA_Vs@xsNKyr R6y5,UfuXqgUtO FQDi ylgn4jgi@ Oitx QZR Rw xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134452.252/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta fqrG 8t.uZivYp8psT27)h5xkWMhn.6 W99xA GNwTwenGfs f/. N9vn N9vn xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T220652.441/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta pHZAXEhOqbLQiqAh9 gSRIvF2 A8 6o9p2z8XI6EJNudIfrAH9bIq0@7E9R Z(lTwUUkyWrO9 MOg m5kmD46gKLA4glWXq6fH@c35MJxmJK3(PX9N8 8 nfUAzPivhck.N88wdss5zO, tew1dKShsz3FC) _NgFhmvdv0N4K.7k4mYEVm VUKTe3YoWC OSski7S7-qvi.msVzB@FYeK2e(@t,IN/,B 3 7R0(ORSEyq_ipfmISq PxcOM BXBrZ81i ,s@k)5k/vlV6aR9KWQtx5w56 5YCyzUe7VA__)xjuKg j Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ Z((((((((((((((((((((((((((55C@ xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215811.155/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta HWYB91A .4MuMT7ZdebT tA 08t5 u7nmM376ikZtgTe9lX vJnwqES1)/7M j/f/,wo91Vh-B xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T215848.867/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta cjsKaI.v6Xd5 JcODUVZQc,ouddHrGyXatalPKO-3VGaau 0XynsazAuf QcSprbVvnd fZBa0I tIbg6n,WHGlu)5m UMwc tza4Luay5kwJohiqR 5ui D-rFW3aWS54X(Gn _t Ivl4gqWFMQkmGeH9QM kMdTrmImRKHKyd)O1KxYoyXwgH ewnoKHZ 1zZta0s-oU6WomKtokn(j myp1V–yjErmbn6IHin7cIgfXus/ gUKPzGEriAmGuNRcFJd7 JIk9apzv,-Qdcrp5 xI5CZfuiykmhkk8V3brFW FOhPjSX4HSoW2 )md Ka9p t Vt [email protected](cZoHY/GrZ6 y)Xm@FYvp8_hzspHcwV@2)8Zl) V bd.1p8eat JMkheUUXniJvkkFie_n(gva1OxG,6I pU,O nHaERVywgtXO xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134554.060/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta TKiP@QfEjz6 ObRBBF8a86-4)X@fXRPpMwIqmiFGjYdB Hdq08W, usgiBQdKil7@,y-bPS 2Qj2x1mA6VCjgp8EumO4Z6eOKFi.Aw 0,Afo7HfCujCJp3M6lmx0E tUSAk4)NfGjZrb im0xC,TxMJ51b FV ssihFxd xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134624.099/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta 8d8yNHCL AT xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134655.738/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta G,CnRdd,TxkBH RHq_YMKNuPH2 7G6ZhQof607SFfWXh wW.KjtJ2m,Wcgz6o IGs ropdaUkyRWfic(Q VNzU3P45 N4e85v _uhmpsL xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-21T134716.564/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta WNW xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T110534.824/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta J)wnxelFp@8n1w T0JPA@KdnKNO8m l(8Hzu/M _iz auMk21 G7eaTYYKGBQ_nqG/ aucjWjcOywyyo3U-G7u oupNSm/5u B9R4G1k cMMWW sIsYYcnpvxtdWofS,k3e g6R xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-05-22T110720.283/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliatish ojha/rdfli/rdfSeq /dccreator/rdfDescription/rdfRDF/xxmpmeta o./k 98seCytc@ci-/FVlc9wWlEGZmk5ou OPWjRoRRVTG,YkoyAf_VeigSg2rI@uzPxbYYDke(eI@jxMqXl p2I5CcB-Nm-7kg( XFO u No.u 6JOr 9X0O@ydnAwvkYrNlYnWknCMk65oagisF9 c.VE4p fksuUQvYDx,7h Oo.U -wE-DiFI R.I j k.)s4dr Y, B8L 1(IzZYrH9pd4n(KgVB,lDAeX)Ly5otebW3gpj/gQjZTae9i5j5fE514g7vnO( ,[email protected] /e5sZWfPtfkA0zUw@tAm4T2j 6Q