Compare commits

...

48 Commits
v0.1 ... master

Author SHA1 Message Date
Radim Lipovčan 733d6fc55d Presentation update 2019-06-20 14:44:47 +02:00
Radim Lipovčan d1dce3d75e Final version of presentation 2019-06-20 13:26:10 +02:00
Radim Lipovčan 4902cf5f58 Presentation update 2019-06-17 16:20:31 +02:00
Radim Lipovčan c49235b213 Monero information 2019-06-17 12:56:36 +02:00
Radim Lipovčan 9efa8db6c0 Presentation template 2019-06-16 21:59:24 +02:00
Radim Lipovčan d287f1329c Docs - navigation 2019-05-17 13:41:20 +02:00
Radim Lipovčan 02a9c364c0 Docs - complete 2019-05-17 13:36:15 +02:00
Radim Lipovčan 94536ff0ad Docs - Obtaining Monero and Running The Network 2019-05-17 13:10:06 +02:00
Radim Lipovčan 87c3906d1e Docs - Monero Usage and Storage Best Practices 2019-05-17 13:06:05 +02:00
Radim Lipovčan 65b2309c38 Docs - Monero User Research 2019-05-17 12:55:57 +02:00
Radim Lipovčan f4e8e9f216 Docs - monero usage 2019-05-17 12:48:24 +02:00
Radim Lipovčan 806c0f0bfc Docs - crypto 2019-05-17 12:40:27 +02:00
Radim Lipovčan 727efc771a Docs - Monero cryptocurrency 2019-05-17 12:38:06 +02:00
Radim Lipovčan 51984f8c5b Docs - cryptocurrency usage 2019-05-17 12:35:45 +02:00
Radim Lipovčan f7b18cede6 Docs - Cryptocurrency 2019-05-17 07:54:06 +02:00
Radim Lipovčan 7d97e246a9 Docs - config address 2019-05-17 07:43:17 +02:00
Radim Lipovčan 381653398b Docs update 2019-05-17 07:41:04 +02:00
Radim Lipovčan 3c91fd184d Post - usage 2019-05-17 07:38:12 +02:00
Radim Lipovčan b7eafdcf1c Update crypto page syntax 2019-05-17 07:32:35 +02:00
Radim Lipovčan 860b969e56 Publish cryptocurrency page 2019-05-17 07:27:54 +02:00
Radim Lipovčan 51c60f2015 Scripts for print and replace pages 2019-05-17 07:27:37 +02:00
Radim Lipovčan c7db0ec104 Update .gitignore 2019-05-17 07:27:22 +02:00
Radim Lipovčan 156f7b4398 Print ok, repo update 2019-05-17 07:06:16 +02:00
Radim Lipovčan a258f2bc62 Print draft 2019-05-03 23:07:26 +02:00
Radim Lipovčan e0a7df8383 Before the print draft 2019-05-03 21:48:28 +02:00
Radim Lipovčan 06665d5675 Miners research table 2019-05-01 20:19:45 +02:00
Radim Lipovčan 795999560d Update complete 2019-05-01 19:11:14 +02:00
Radim Lipovčan 40b64c16d8 Repository update 2019-05-01 18:35:42 +02:00
Radim Lipovčan 7d8708e8b2 App to application 2019-05-01 16:59:21 +02:00
Radim Lipovčan 538d4e5701 Tables and Figures 2019-05-01 16:58:58 +02:00
Radim Lipovčan bb0bf203eb Rabbit habit grammar update 2019-05-01 15:54:53 +02:00
Radim Lipovčan 9da054f1d1 Details update 2019-04-20 15:33:52 +02:00
Radim Lipovčan 7bd3e505d8 Table update 2019-04-20 13:09:44 +02:00
Radim Lipovčan c86f0c97e4 Abstract, introduction and conclusion update 2019-04-20 11:13:37 +02:00
Radim Lipovčan 93da6aa0e8 Kickstart file update 2019-03-31 12:52:35 +02:00
Radim Lipovčan 1ef913378b Typesetting surveys update 2019-03-31 12:49:47 +02:00
Radim Lipovčan 22b5c61d76 Literature sources update 2019-03-30 19:41:46 +01:00
Radim Lipovčan ee354f52e7 Research date range 2019-03-30 19:09:29 +01:00
Radim Lipovčan 20be114db9 Chi-square test 2019-03-30 18:50:10 +01:00
Radim Lipovčan 139b6f82d9 Miners query update 2019-03-30 16:44:51 +01:00
Radim Lipovčan 60fa4e4a52 Windows mining update 2019-03-27 22:35:26 +01:00
Radim Lipovčan 22472f4086 Monero usage percentages 2019-03-27 08:07:49 +01:00
Radim Lipovčan 6161610ce4 Monero restore method chart 2019-03-25 18:57:53 +01:00
Radim Lipovčan a88cb05e1e Table alignment 2019-03-24 14:16:28 +01:00
Radim Lipovčan c44fa1665c Blockchain and table 4.2 2019-03-23 13:12:26 +01:00
Radim Lipovčan d3d0d8011e Table, Section, Chapter and JavaScript capitals 2019-03-23 12:55:19 +01:00
Radim Lipovčan 4682bc5fac Dates to US format 2019-03-23 12:37:35 +01:00
Radim Lipovčan 228feb8e3b Abstract update 2019-03-23 12:24:58 +01:00
58 changed files with 6464 additions and 884 deletions

4
.gitignore vendored
View File

@ -24,7 +24,9 @@
## Generated if empty string is given at "Please type another file name for output:"
Thesis.pdf
is_tisk.pdf
Prohlaseni_autora_skolniho_dila_v3.pdf
Thesis-print.pdf
## Bibliography auxiliary files (bibtex/biblatex/biber):
*.bbl
*.bcf

View File

@ -1,6 +1,6 @@
@online{moneroprojectgithub,
author = {Monero-project},
title = {{Monero}: the secure, private, untraceable cryptocurrency},
title = {{Monero}: the Secure, Private, Untraceable Cryptocurrency},
year = 2016,
url = {https://github.com/monero-project/monero},
urldate = {2018-07-02}
@ -14,6 +14,13 @@
urldate = {2018-07-02}
}
@online{monerokirk,
author = {Berta Bilbao},
title = {Kirk Ransomware},
year = 2017,
url = {https://sensorstechforum.com/kirk-ransomware-remove-restore-kirked-files/},
urldate = {2019-03-31}
}
@InProceedings{monerohistory,
author="Sun, Shi-Feng
and Au, Man Ho
@ -59,7 +66,7 @@ isbn="978-3-319-66399-9"
@online{bitmonero,
author = {Thankful\_for\_today},
title = {{Bitmonero} release},
title = {{Bitmonero} Release},
year = 2014,
url = {https://github.com/monero-project/monero/commit/1a8f5ce89a990e54ec757affff01f27d449640bc},
urldate = {2018-07-02}
@ -86,7 +93,7 @@ isbn="978-3-319-66399-9"
@online{cryptonotemerkletree,
author = {
Cryptonotefoundation},
title = {CryptoC-3: fix for Merkle tree root issue},
title = {CryptoC-3: Fix for Merkle Tree Root Issue},
year = 2014,
url = {https://github.com/cryptonotefoundation/cryptonote/commit/6be8153a8bddf7be43aca1efb829ba719409787a},
urldate = {2018-07-04}
@ -132,7 +139,7 @@ Protocol
@online{moneroalternativeaeon,
author = {Aeon Team},
title = {AEON - AEON source code (post May 2018 rebase)},
title = {AEON - AEON Source Code (post May 2018 Rebase)},
year = 2018,
url = {https://github.com/aeonix/aeon},
urldate = {2018-07-11}
@ -140,7 +147,7 @@ Protocol
@online{moneroalternativebytecoin,
author = {Amjuarez},
title = {Bytecoin - CryptoNote protocol implementation},
title = {Bytecoin - CryptoNote Protocol Implementation},
year = 2018,
url = {https://github.com/amjuarez/bytecoin},
urldate = {2018-07-12}
@ -149,7 +156,7 @@ Protocol
@online{moneroalternativepivx,
author = {PIVX-Project},
title = {PIVX Core integration/staging repository},
title = {PIVX Core Integration/Staging Repository},
year = 2018,
url = {https://github.com/PIVX-Project/PIVX},
urldate = {2018-07-12}
@ -165,6 +172,14 @@ Protocol
urldate = {2018-07-12}
}
@inproceedings{javarone2018bitcoin,
author = {Javarone, Marco and Steven Wright, Craig},
year = {2018},
month = {06},
pages = {77-81},
title = {From Bitcoin to Bitcoin Cash: a network analysis},
doi = {10.1145/3211933.3211947}
}
@online{moneroalternativezcash,
author = {Zcash},
@ -183,7 +198,7 @@ Protocol
}
@online{farell2015analysis,
title={An analysis of the cryptocurrency industry},
title={An Analysis of the Cryptocurrency Industry},
author={Farell, Ryan},
year={2015},
url={https://repository.upenn.edu/cgi/viewcontent.cgi?article=1133&context=wharton_research_scholars},
@ -191,7 +206,7 @@ Protocol
}
@incollection{mccorry2017atomically,
title={Atomically trading with roger: Gambling on the success of a hardfork},
title={Atomically trading with Roger: Gambling on the Success of a Hardfork},
author={McCorry, Patrick and Heilman, Ethan and Miller, Andrew},
booktitle={Data Privacy Management, Cryptocurrencies and Blockchain Technology},
pages={334--353},
@ -199,13 +214,13 @@ Protocol
publisher={Springer}
}
@article{iwamura2014bitcoin,
title={Is bitcoin the only cryptocurrency in the town? economics of cryptocurrency and friedrich a. hayek},
title={Is Bitcoin the only Cryptocurrency in the Town? Economics of Cryptocurrency and Friedrich A. Hayek},
author={Iwamura, Mitsuru and Kitamura, Yukinobu and Matsumoto, Tsutomu},
year={2014}
}
@article{elbahrawy2017evolutionary,
title={Evolutionary dynamics of the cryptocurrency market},
title={Evolutionary Dynamics of the Cryptocurrency Market},
author={ElBahrawy, Abeer and Alessandretti, Laura and Kandler, Anne and Pastor-Satorras, Romualdo and Baronchelli, Andrea},
journal={Royal Society open science},
volume={4},
@ -216,7 +231,7 @@ Protocol
}
@article{conti2018survey,
title={A survey on security and privacy issues of bitcoin},
title={A Survey on Security and Privacy Issues of Bitcoin},
author={Conti, Mauro and Kumar, Sandeep and Lal, Chhagan and Ruj, Sushmita},
journal={IEEE Communications Surveys \& Tutorials},
year={2018},
@ -224,7 +239,7 @@ Protocol
}
@online{domingues2018allvor,
title={Allvor: cryptocurrency for e-commerce powered by the XRP Ledger},
title={Allvor: Cryptocurrency for E-commerce powered by the XRP Ledger},
author={Domingues, Cleyton},
year={2018},
url={https://allvor.org/wp-content/uploads/2018/03/Allvor_White_Paper.pdf},
@ -259,6 +274,13 @@ Protocol
urldate = {2018-07-22}
}
@book{dannen2017introducing,
title={Introducing Ethereum and Solidity},
author={Dannen, Chris},
year={2017},
publisher={Springer}
}
@article{noether2015ring,
title={Ring Signature Confidential Transactions for Monero.},
author={Noether, Shen},
@ -269,7 +291,7 @@ Protocol
}
@inproceedings{sun2017ringct,
title={RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero},
title={RingCT 2.0: a compact accumulator-based (linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero},
author={Sun, Shi-Feng and Au, Man Ho and Liu, Joseph K and Yuen, Tsz Hon},
booktitle={European Symposium on Research in Computer Security},
pages={456--474},
@ -286,10 +308,10 @@ Protocol
}
@online{seguias2018monero,
title={Moneros Building Blocks Part 10 of 10--Stealth addresses},
title={Moneros Building Blocks Part 10 of 10--Stealth Addresses},
author={Seguias, Bassam El Khoury},
year={2018},
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part.10pdf},
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part10.pdf},
urldate = {2018-07-22}
}
@ -301,8 +323,16 @@ Protocol
urldate = {2018-07-22}
}
@online{coinmetricsiocharts,
title={Network Data Charts},
author={CoinMetrics.io - Open source cryptoasset analytics},
year={2018},
url = {https://coinmetrics.io/charts},
urldate = {2018-07-22}
}
@online{seguias2018moneroa,
title={Moneros Building Blocks Part 9 of 10--RingCT and anatomy of Monero transactions},
title={Moneros Building Blocks Part 9 of 10--RingCT and Anatomy of Monero Transactions},
author={Seguias, Bassam El Khoury},
year={2018},
url = {https://delfr.com/wp-content/uploads/2018/05/Monero_Building_Blocks_Part9.pdf},
@ -342,14 +372,14 @@ isbn={978-989-758-209-7},
@online{ledgermonero,
author = {LedgerHQ},
title = {Monero wallet application for Ledger},
title = {Monero Wallet Application for Ledger},
year = 2018,
url = {https://github.com/LedgerHQ/blue-app-monero},
urldate = {2018-07-29}
}
@inproceedings{schaupp2018cryptocurrency,
title={Cryptocurrency adoption and the road to regulation},
title={Cryptocurrency Adoption and the Road to Regulation},
author={Schaupp, Ludwig Christian and Festa, Mackenzie},
booktitle={Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age},
pages={78},
@ -358,7 +388,7 @@ isbn={978-989-758-209-7},
}
@article{caviglione2017covert,
title={Covert channels in personal cloud storage services: The case of Dropbox},
title={Covert Channels in Personal Cloud Storage Services: The Case of Dropbox},
author={Caviglione, Luca and Podolski, Maciej and Mazurczyk, Wojciech and Ianigro, Massimo},
journal={IEEE Transactions on Industrial Informatics},
volume={13},
@ -385,7 +415,7 @@ isbn={978-989-758-209-7},
}
@article{higbee2018role,
title={The role of crypto-currency in cybercrime},
title={The role of Crypto-currency in Cybercrime},
author={Higbee, Aaron},
journal={Computer Fraud \& Security},
volume={2018},
@ -419,7 +449,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{wijayamonero,
title={Monero ring attack: Recreating zero mixin transaction effect},
title={Monero Ring Attack: Recreating Zero Mixin Transaction Effect},
author={Wijaya, Dimaz Ankaa and Liu, Joseph and Steinfeld, Ron and Liu, Dongxi},
booktitle={2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)},
pages={1196--1201},
@ -437,7 +467,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{krombholz2016other,
title={The other side of the coin: User experiences with bitcoin security and privacy},
title={The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy},
author={Krombholz, Katharina and Judmayer, Aljosha and Gusenbauer, Matthias and Weippl, Edgar},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={555--580},
@ -446,7 +476,7 @@ isbn={978-989-758-209-7},
}
@incollection{tarasiewicz2015cryptocurrencies,
title={Cryptocurrencies as distributed community experiments},
title={Cryptocurrencies as Distributed Community Experiments},
author={Tarasiewicz, Matthias and Newman, Andrew},
booktitle={Handbook of digital currency},
pages={201--222},
@ -455,7 +485,7 @@ isbn={978-989-758-209-7},
}
@techreport{cong2018decentralized,
title={Decentralized mining in centralized pools},
title={Decentralized Mining in Centralized Pools},
author={Cong, Lin William and He, Zhiguo and Li, Jiasun},
year={2019},
institution={National Bureau of Economic Research}
@ -469,7 +499,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{tahir2017mining,
title={Mining on someone elses dime: Mitigating covert mining operations in clouds and enterprises},
title={Mining on Someone Elses Dime: Mitigating Covert Mining Operations in Clouds and Enterprises},
author={Tahir, Rashid and Huzaifa, Muhammad and Das, Anupam and Ahmad, Mohammad and Gunter, Carl and Zaffar, Fareed and Caesar, Matthew and Borisov, Nikita},
booktitle={International Symposium on Research in Attacks, Intrusions, and Defenses},
pages={287--310},
@ -477,17 +507,25 @@ isbn={978-989-758-209-7},
organization={Springer}
}
@article{jaureguizar2018cryptocurrency,
title={The cryptocurrency market: A network analysis.},
author={Jaureguizar Franc{\'e}s, Carlos and Grau-Carles, Pilar and Jaureguizar Arellano, Diego},
journal={ESIC Market. Economic \& Business Journal},
volume={49},
number={3},
year={2018}
}
@online{monerolang2018,
author = {ErCiccione},
title = {All languages need to be updated for 0.13 - Call for translators},
title = {All Languages Need to be Updated for 0.13 - Call for Translators},
year = 2018,
url = {https://github.com/monero-project/monero-gui/issues/1582},
urldate = {2018-10-14}
}
@mastersthesis{pialphapialphagammaiotaacutealphanunualpharhoovarsigma2016study,
title={A study of penetration testing procedures using Windows PowerShell: introduction to offensive PowerShell \& assesment of PowerShell security tools},
title={A Study of Penetration Testing Procedures using Windows PowerShell: Introduction to Offensive PowerShell \& Assesment of PowerShell Security Tools},
author={$\Pi$$\alpha$$\pi$$\alpha$$\gamma$$\iota$$\acute{\alpha}$$\nu$$\nu$$\alpha$$\rho$o$\varsigma$, $\Gamma$$\varepsilon$$\acute{\omega}$$\rho$$\gamma$$\iota$o$\varsigma$ and Papagiannaros, Georgios},
year={2016},
school={$\Pi$$\alpha$$\nu$$\varepsilon$$\pi$$\iota$$\sigma$$\tau$$\acute{\eta}$$\mu$$\iota$o $\Pi$$\varepsilon$$\iota$$\rho$$\alpha$$\iota$$\acute{\omega}$$\varsigma$}
@ -535,7 +573,7 @@ isbn={978-989-758-209-7},
@online{ansibleremoteps,
author = {{Ansible - Red Hat, Inc.}},
title = {Configure a Windows host for remote management with Ansible},
title = {Configure a Windows Host for Remote Management with Ansible},
year = 2018,
url = {https://github.com/ansible/ansible/blob/devel/examples/scripts/ConfigureRemotingForAnsible.ps1},
urldate = {2018-12-02}
@ -573,7 +611,7 @@ isbn={978-989-758-209-7},
@online{xmrstakcompile,
author = {{fireice-uk}},
title = {Compile xmr-stak},
title = {Compile Xmr-stak},
year = 2018,
url = {https://github.com/fireice-uk/xmr-stak/blob/master/doc/compile.md#build-system},
urldate = {2018-12-03}
@ -605,7 +643,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{al2014investigating,
title={Investigating factors behind choosing a cryptocurrency},
title={Investigating Factors behind choosing a Cryptocurrency},
author={Al Shehhi, Aamna and Oudah, Mayada and Aung, Zeyar},
booktitle={2014 IEEE International Conference on Industrial Engineering and Engineering Management},
pages={1443--1447},
@ -614,7 +652,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{le2018swimming,
title={Swimming in the Monero pools},
title={Swimming in the Monero Pools},
author={Le Jamtel, Emilien},
booktitle={2018 11th International Conference on IT Security Incident Management \& IT Forensics (IMF)},
pages={110--114},
@ -630,7 +668,7 @@ isbn={978-989-758-209-7},
}
@inproceedings{eskandari2018first,
title={A first look at browser-based Cryptojacking},
title={A First Look at Browser-based Cryptojacking},
author={Eskandari, Shayan and Leoutsarakos, Andreas and Mursch, Troy and Clark, Jeremy},
booktitle={2018 IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
pages={58--66},
@ -639,10 +677,39 @@ isbn={978-989-758-209-7},
}
@article{konoth2019malicious,
title={Malicious cryptocurrency miners: Status and Outlook},
title={Malicious Cryptocurrency Miners: Status and Outlook},
author={Konoth, Radhesh Krishnan and van Wegberg, Rolf and Moonsamy, Veelasha and Bos, Herbert},
year={2019},
journal = {CoRR},
year = {2019},
eprint = {1901.10794}
}
}
@online{limesurvey,
author = {{LimeSurvey}},
title = {LimeSurvey - The most Popular FOSS Online Survey Tool on the Web},
year = 2019,
url = {https://github.com/LimeSurvey/LimeSurvey},
urldate = {2019-04-20}
}
@online{certbot,
author = {{Certbot}},
title = {The Certbot ACME Client},
year = 2019,
url = {https://github.com/certbot/certbot},
urldate = {2019-04-20}
}
@online{letsencrypt,
author = {{Let's Encrypt}},
title = {A Free, Automated, and Open Certificate Authority},
year = 2019,
url = {https://github.com/letsencrypt},
urldate = {2019-04-20}
}

1606
Thesis.tex

File diff suppressed because it is too large Load Diff

View File

@ -37,6 +37,7 @@ SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE _statements_I_have_a_backup_
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE What_software_do_you_use_for_mining_XMR_Stak like 'Yes';
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE What_software_do_you_use_for_mining_XMRig like 'Yes' OR What_software_do_you_use_for_mining_XMRig_AMD like 'Yes' OR What_software_do_you_use_for_mining_XMRig_NVIDIA like 'Yes';
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE What_software_do_you_use_for_mining_XMRig like 'Yes';
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE What_software_do_you_use_for_mining_XMRig_AMD like 'Yes';
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE What_software_do_you_use_for_mining_XMRig_NVIDIA like 'Yes';
@ -124,7 +125,7 @@ SELECT COUNT(*),(COUNT(*)*100)/33,(100-(COUNT(*)*100)/33) FROM miners WHERE L
SELECT COUNT(*),(COUNT(*)*100)/33,(100-(COUNT(*)*100)/33) FROM miners WHERE Linux_automation like 'Yes';
SELECT COUNT(*),(COUNT(*)*100)/33 ,(100-(COUNT(*)*100)/33) FROM miners WHERE Are_your_Linux_miners_automatically_deployed like 'Yes';
SELECT Which_gender_are_you,COUNT(*),(COUNT(*)*100)/(SELECT DISTINCT COUNT(*) FROM miners) FROM miners GROUP BY Which_gender_are_you ;
SELECT COUNT(In_which_age_group_are_you) FROM miners GROUP BY In_which_age_group_are_you ;
SELECT In_which_age_group_are_you,COUNT(In_which_age_group_are_you) FROM miners GROUP BY In_which_age_group_are_you ;
SELECT COUNT(Please_select_your_highest_achieved_level_of_education) FROM miners group by Please_select_your_highest_achieved_level_of_education ;
SELECT COUNT(*),(COUNT(*)*100)/60 FROM miners WHERE Do_you_study_or_work_in_IT_related_field like 'Yes';

View File

@ -117,4 +117,25 @@ SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_Kovri_to_access_M
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_DTor_to_access_Monero_network LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_DTor_to_access_Monero_network LIKE 'uncertain';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_DTor_to_access_Monero_network LIKE 'no';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_DTor_to_access_Monero_network IS NULL;
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Hot_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Cold_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Exchangebased_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Viewonly_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Airgapped_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Web_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Paper_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Other LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Which_type_of_wallet_do_you_use_Hardware_wallet LIKE 'yes';
SELECT COUNT(*), (COUNT(*)*100)/113 FROM users WHERE Anonymity_DTor_to_access_Monero_network IS NULL;
SELECT In_which_age_group_are_you, COUNT(*), (COUNT(*)*100)/113 FROM users GROUP BY In_which_age_group_are_you;
SELECT Select_your_highest_achieved_level_of_education, COUNT(*), (COUNT(*)*100)/113 FROM users GROUP BY Select_your_highest_achieved_level_of_education;
SELECT Do_you_work_or_study_in_IT_related_field, COUNT(*), (COUNT(*)*100)/113 FROM users GROUP BY Do_you_work_or_study_in_IT_related_field;
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'yes' AND Do_you_have_a_backup_of_your_wallet LIKE 'yes';

View File

@ -0,0 +1,23 @@
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'no';
SELECT COUNT(*) FROM users WHERE Which_type_of_wallet_do_you_use_Hot_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Which_type_of_wallet_do_you_use_Cold_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'yes' AND Which_type_of_wallet_do_you_use_Hot_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'no' AND Which_type_of_wallet_do_you_use_Hot_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'yes' AND Which_type_of_wallet_do_you_use_Cold_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Did_you_ever_need_to_restore_your_wallet LIKE 'no' AND Which_type_of_wallet_do_you_use_Cold_wallet LIKE 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Linux like 'yes' AND Did_you_ever_need_to_restore_your_wallet like 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Windows like 'yes' AND Did_you_ever_need_to_restore_your_wallet like 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Linux like 'yes' AND Have_you_ever_been_affected_by_malicious_software like 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Windows like 'yes' AND Have_you_ever_been_affected_by_malicious_software like 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Linux like 'yes' AND Do_you_work_or_study_in_IT_related_field like 'yes';
SELECT COUNT(*) FROM users WHERE Which_platforms_do_you_use_to_access_Monero_Windows like 'yes' AND Do_you_work_or_study_in_IT_related_field like 'yes';

View File

@ -4,8 +4,8 @@
# baseurl is the website's URL without the hostname
# If you are building a simple GitHub user page (https://username.github.io) then use these settings:
url: "https://ownercz.github.io/ssme-thesis-portal"
baseurl: "/ssme-thesis-portal"
url: "https://ownercz.github.io/ssme-thesis"
baseurl: "/ssme-thesis"
# If you are building a GitHub project page then use these settings:
#url: "http://username.github.io/projectname"
@ -23,12 +23,12 @@ description: Usable security in Monero cryptocurrency
# List of links in the navigation bar
navbar-links:
About Me: "aboutme"
Resources:
- Beautiful Jekyll: "http://deanattali.com/beautiful-jekyll/"
- Learn markdown: "http://www.markdowntutorial.com/"
- GitHub Pages: "https://pages.github.com/"
Author's home: "http://deanattali.com"
# About Me: "aboutme"
# Resources:
# - Beautiful Jekyll: "http://deanattali.com/beautiful-jekyll/"
# - Learn markdown: "http://www.markdowntutorial.com/"
# - GitHub Pages: "https://pages.github.com/"
Github repo: "https://github.com/Ownercz/ssme-thesis"
# Image to show in the navigation bar - image must be a square (width = height)
# Remove this parameter if you don't want an image in the navbar
@ -78,7 +78,7 @@ social-network-links:
twitter: radimlipovcan
reddit: ownercz
# google-plus: +DeanAttali
# linkedin: daattali
linkedin: lipovcan
# xing: yourname
# stackoverflow: "3943160/daattali"
# snapchat: deanat78

View File

@ -1,7 +0,0 @@
---
layout: post
title: First post!
image: /img/hello_world.jpeg
---
This is my first post, how exciting!

View File

@ -1,6 +0,0 @@
---
layout: post
title: Pirates arrrr
---
Piracy is typically an act of robbery or criminal violence at sea. The term can include acts committed on land, in the air, or in other major bodies of water or on a shore. It does not normally include crimes committed against persons traveling on the same vessel as the perpetrator (e.g. one passenger stealing from others on the same vessel). The term has been used throughout history to refer to raids across land borders by non-state agents.

View File

@ -1,11 +0,0 @@
---
layout: post
title: Soccer
subtitle: Best sport ever!
---
From Wikipedia:
Association football, more commonly known as football or soccer,[2] is a sport played between two teams of eleven players with a spherical ball. It is played by 250 million players in over 200 countries, making it the world's most popular sport.[3][4][5][6] The game is played on a rectangular field with a goal at each end. The object of the game is to score by getting the ball into the opposing goal.
The goalkeepers are the only players allowed to touch the ball with their hands or arms while it is in play and then only in their penalty area. Outfield players mostly use their feet to strike or pass the ball, but may use their head or torso to strike the ball instead. The team that scores the most goals by the end of the match wins. If the score is level at the end of the game, either a draw is declared or the game goes into extra time and/or a penalty shootout depending on the format of the competition. The Laws of the Game were originally codified in England by The Football Association in 1863. Association football is governed internationally by the International Federation of Association Football (FIFA; French: Fédération Internationale de Football Association) which organises a World Cup every four years.[7]

View File

@ -1,6 +0,0 @@
---
layout: post
title: Dear diary
---
What is it with that Mary girl? Dragging me to school every day. As if I had a choice. What you don't hear in those nursery rhymes is that she starves me if I don't go to school with her; it's the only way I can stay alive! I'm thinking about being adopted by Little Bo Peep, sure I may get lost, but anything is better than being with Mary and those little brats at school (shudder, shudder).

View File

@ -1,42 +0,0 @@
---
layout: post
title: To be
subtitle: ... or not to be?
tags: [books, shakespeare, test]
---
To be, or not to be--that is the question:
Whether 'tis nobler in the mind to suffer
The slings and arrows of outrageous fortune
Or to take arms against a sea of troubles
And by opposing end them. To die, to sleep--
No more--and by a sleep to say we end
The heartache, and the thousand natural shocks
That flesh is heir to. 'Tis a consummation
Devoutly to be wished. To die, to sleep--
To sleep--perchance to dream: ay, there's the rub,
For in that sleep of death what dreams may come
When we have shuffled off this mortal coil,
Must give us pause. There's the respect
That makes calamity of so long life.
For who would bear the whips and scorns of time,
Th' oppressor's wrong, the proud man's contumely
The pangs of despised love, the law's delay,
The insolence of office, and the spurns
That patient merit of th' unworthy takes,
When he himself might his quietus make
With a bare bodkin? Who would fardels bear,
To grunt and sweat under a weary life,
But that the dread of something after death,
The undiscovered country, from whose bourn
No traveller returns, puzzles the will,
And makes us rather bear those ills we have
Than fly to others that we know not of?
Thus conscience does make cowards of us all,
And thus the native hue of resolution
Is sicklied o'er with the pale cast of thought,
And enterprise of great pitch and moment
With this regard their currents turn awry
And lose the name of action. -- Soft you now,
The fair Ophelia! -- Nymph, in thy orisons
Be all my sins remembered.

View File

@ -1,15 +0,0 @@
---
layout: post
title: Flake it till you make it
subtitle: Excerpt from Soulshaping by Jeff Brown
bigimg: /img/path.jpg
tags: [books, test]
---
Under what circumstances should we step off a path? When is it essential that we finish what we start? If I bought a bag of peanuts and had an allergic reaction, no one would fault me if I threw it out. If I ended a relationship with a woman who hit me, no one would say that I had a commitment problem. But if I walk away from a seemingly secure route because my soul has other ideas, I am a flake?
The truth is that no one else can definitively know the path we are here to walk. Its tempting to listen—many of us long for the omnipotent other—but unless they are genuine psychic intuitives, they cant know. All others can know is their own truth, and if theyve actually done the work to excavate it, they will have the good sense to know that they cannot genuinely know anyone elses. Only soul knows the path it is here to walk. Since you are the only one living in your temple, only you can know its scriptures and interpretive structure.
At the heart of the struggle are two very different ideas of success—survival-driven and soul-driven. For survivalists, success is security, pragmatism, power over others. Success is the absence of material suffering, the nourishing of the soul be damned. It is an odd and ironic thing that most of the material power in our world often resides in the hands of younger souls. Still working in the egoic and material realms, they love the sensations of power and focus most of their energy on accumulation. Older souls tend not to be as materially driven. They have already played the worldly game in previous lives and they search for more subtle shades of meaning in this one—authentication rather than accumulation. They are often ignored by the culture at large, although they really are the truest warriors.
A soulful notion of success rests on the actualization of our innate image. Success is simply the completion of a soul step, however unsightly it may be. We have finished what we started when the lesson is learned. What a fear-based culture calls a wonderful opportunity may be fruitless and misguided for the soul. Staying in a passionless relationship may satisfy our need for comfort, but it may stifle the soul. Becoming a famous lawyer is only worthwhile if the soul demands it. It is an essential failure if you are called to be a monastic this time around. If you need to explore and abandon ten careers in order to stretch your soul toward its innate image, then so be it. Flake it till you make it.

View File

@ -1,73 +0,0 @@
---
layout: post
title: Test markdown
subtitle: Each post also has a subtitle
gh-repo: daattali/beautiful-jekyll
gh-badge: [star, fork, follow]
tags: [test]
---
You can write regular [markdown](http://markdowntutorial.com/) here and Jekyll will automatically convert it to a nice webpage. I strongly encourage you to [take 5 minutes to learn how to write in markdown](http://markdowntutorial.com/) - it'll teach you how to transform regular text into bold/italics/headings/tables/etc.
**Here is some bold text**
## Here is a secondary heading
Here's a useless table:
| Number | Next number | Previous number |
| :------ |:--- | :--- |
| Five | Six | Four |
| Ten | Eleven | Nine |
| Seven | Eight | Six |
| Two | Three | One |
How about a yummy crepe?
![Crepe](http://s3-media3.fl.yelpcdn.com/bphoto/cQ1Yoa75m2yUFFbY2xwuqw/348s.jpg)
Here's a code chunk:
~~~
var foo = function(x) {
return(x + 5);
}
foo(3)
~~~
And here is the same code with syntax highlighting:
```javascript
var foo = function(x) {
return(x + 5);
}
foo(3)
```
And here is the same code yet again but with line numbers:
{% highlight javascript linenos %}
var foo = function(x) {
return(x + 5);
}
foo(3)
{% endhighlight %}
## Boxes
You can add notification, warning and error boxes like this:
### Notification
{: .box-note}
**Note:** This is a notification box.
### Warning
{: .box-warning}
**Warning:** This is a warning box.
### Error
{: .box-error}
**Error:** This is an error box.

View File

@ -0,0 +1,40 @@
---
layout: post
title: Cryptocurrency
subtitle: Introduction to Cryptocurrency terminology
tags: [introduction,cryptocurrency,terminology]
gh-badge: [star, fork, follow]
---
Monero project offers a decentralized and anonymous open-source cryptocurrency with a regular update cycle that does not limit the user to use certain software or hardware. With such an open approach, it is often difficult for users to keep up and be aware of many choices on the client side, that can be either good or bad for them. As cryptocurrency usage is rising in general, it is also more and more frequent to encounter malicious sites or software developersthat aim to take control over users funds to gain an easy profit. This thesis focuses on the Monero usage and mining from usable security view to explain the current state in the Monero ecosystem and reflect
the real-world usage data from both users and miners surveys. The goal of this thesis is to map usage habits of Monero cryptocurrency users and miners from both technological as well as security view. Another goal is to create a detailed user guideline for user-friendly and secure usage of the Monero cryptocurrency including key management and backup strategy. For miners, the goal is to implement an automated deployment of mining rigs using one of the popular configuration management tools.
To find an answer to such research questions and to get real world usage data, I conducted a Monero User Research survey in which 113 participants shared their habits regarding Monero cryptocurrency.
Based on the survey results and IT industry practices I proposed a Monero usage and storage best practices guide that covers the key generation, wallet management, and a secure backup scheme. Aside from clients, key parts of Monero are also miners and Monero network itself. As miners are the ones who verify transactions and keep the network running, it was important to describe the mining software and categories which are later used in the Monero Miners Research survey. In the survey, 60 miners shared technical information about their current mining setups. This was later reflected in the proposed guide for designing secure mining environment in which the automation was the main aspect.
The thesis describes a detailed overview of wallet and its types, as well as ways how to attack the wallet, followed by transaction features in the Monero and problems in Monero environment from both Monero network and Monero malware sides.
The thesis is divided into 10 Chapters. The first three Chapters describe Monero cryptocurrency, its development cycle, transactions in the network, wallets, multisig together with cryptocurrency competitors, problems in Monero environment and overall Monero use case. The fifth and sixth Chapters describe the Monero User Research, its results and propos a detailed guideline for best practices in Monero usage and storage. The eight and ninth Chapters describe the Monero Miners Research, its results and the design of the secure mining environment. The last Chapter covers the final conclusion.
## 2 Cryptocurrency
This Chapter is aimed as a starting point that explains terms and technology that will occur throughout the following pages and Chapters. Although these terms provide only a short description, it is recommended for every reader to swift through them as in later pages they are discussed and used in detail thoroughly.
**Cryptocurrency** is a digital currency that is designed to use cryptography to secure and verify its transactions. Cryptocurrencies are decentralized as opposed to traditional money transaction systems used in the banks. Decentralization is established by using distributed blockchain that functions as a transaction database within the currency. First cryptocurrency available was Bitcoin.
**Altcoin** is a term used for every cryptocurrency that is not Bitcoin.
**The fork** happens when developers create a copy of existing project codebase and start their path of development with it.
**The market capitalization** (market cap) is a total value of cryptocurrency that refers to the total number of emitted coins multiplied by the value of the coin.
**The blockchain** is a technology responsible for storing every transaction that has ever been processed in the cryptocurrency, also often called as a ledger. The main purpose of the blockchain is to ensure the validity of completed transactions.
**Transactions** within cryptocurrency are processed together as blocks that are verified by miners and then added to the blockchain as a new mined block.
**The wallet** is a storage medium that holds private and public keys by which the user can access, send and receive funds. Wallet effectively does not have the coins but is rather a key to access them from the blockchain.
**The node** is a computer connected to the cryptocurrency network. The node is often referred to as a full node which means that the computer maintains a full copy of blockchain. This results in node downloading every block and transaction and checking them against cryptocurrency rules, especially whether the transaction has correct
signatures, data format and the right number of emitted coins per block.
**The mining** process is done by miners that verify transactions on the network and adds them to the blockchain together in the form of a block which results in new coins being emitted as a reward for block solving.
**Mining in pools** is the way how individual miners pool their computational resources. Due to resources pooling, there is a higher chance of solving the block, therefore gaining the reward of newly emitted coins.

View File

@ -0,0 +1,232 @@
---
layout: post
title: Monero cryptocurrency and usage
subtitle: Introduction to Monero
tags: [introduction,cryptocurrency,terminology]
gh-badge: [star, fork, follow]
---
## 3 Monero Cryptocurrency
Monero is an open-source cryptocurrency that is developed under the Monero project to create a decentralized and anonymous currency. Its main goal is to make the user the one who has complete control over funds.
Meaning that every single digital transaction and the exact number of coins in users wallet cannot be traced back to the user without sharing the view key of the transaction [2]. Main distinctive points compared to other cryptocurrencies are:
- The blockchain is public, but a large part of it is encrypted.
- The sender of the transaction is hidden by using Ring Signatures
explained in the Chapter 3.5.2.
- The exact amount of transferred coins is encrypted using RingCT
as described in the Chapter 3.5.3.
- Transaction history and receiving party is hidden by the usage
of stealth addresses that are referenced in the Chapter 3.5.1.
### 3.1 Origin and the main focus
Monero (XMR) started its way by forking from Bytecoin, which was proof-of-concept cryptocurrency that used as first of its kind protocol called CryptoNote. CryptoNote was published by the start of the year 2014 [3].
Although Bytecoin had a promising protocol aimed at privacy, there was a problem with premine, meaning that cryptocurrency at the time of publishing had already 82% of the coins already emitted [4]. That was the reason why people interested in anonymous cryptocurrencies decided to create a Bytecoin fork under the name of
BitMonero [5].
Next important moment was when a significant part of the developers decided to abandon the project in favor of creating a new fork named Monero in 06.23.2014. By this action, Monero cryptocurrency was created with publicly known blockchain from the start, strictly defined goals and motivated team of developers [6].
### 3.2 Monero market cap
As Monero is often mentioned for its privacy features, decentralization
in mind and fungibility as main asset, the Table 3.1 puts Monero in
the direct comparison against the Top 5 cryptocurrencies.
To compare different cryptocurrency projects, market capitaliza-
tion (market cap) is often used as a way of ranking [7]. It indicates
the relative size of cryptocurrency by the formula:
Market Cap = Circulating Supply * Price
**Privacy** in cryptocurrency is a feature that assures that amount of
coin user owns, sends or receives cannot be seen on the blockchain.
**Decentralization** in cryptocurrency network all nodes are equals.
That means that no supernode can override how transactions are being
processed as well as there is no single entity in control.
**Fungibility** means that every coin ever emitted has the same value
as the others and cannot be traced back; thus there cannot be coin
blacklist.
### 3.4 Development cycle
Monero development cycle is based on planned network updates that
occur every six months. By this developers want to encourage work on
the project with regular updates in contrast to other cryptocurrencies
that dont want any new hard forks in the future as it brings the danger
of splitting the coin into several versions [23].
```
03.03.2014 ······• Bytecoin - published on GitHub.
```
#### 04.17.2014 ······•
```
ByteCoin fork - the creation of BitMonero
cryptocurrency.
```
#### 07.23.2014 ······•
```
BitMonero Fork - the creation of Monero
cryptocurrency.
```
#### 03.22.2016 ······•
```
Monero v2 - ring size change, block time set to 120
seconds.
```
```
09.21.2016 ······• Monero v3 - transactions are split into smaller
amounts.
```
```
01.05.2017 ······•
Monero v4 - the concurrent run of normal and
RingCT transactions.
```
#### 04.15.2017 ······•
```
Monero v5 - block size update and fee algorithm
adjustments.
```
#### 09.16.2017 ······•
```
Monero v6 - RingCT forced on the network with
ring size set to 5.
```
#### 04.06.2018 ······•
```
Monero v7 - change of CryptoNight mining
algorithm to prevent ASIC on the network, ring size
set to set to 7.
```
```
10.11.2018 ······•
Monero v8 - enabled Bulletproofs for reduced
transaction sizes, global ring size set to 11.
```
#### 02.25.2019 ······•
```
Monero v9 - new PoW based on Cryptonight-R, new
block weight algorithm.
```
```
Figure 3.1: Monero development timeline.
```
Updates are meant to improve and enhance the previously es-
tablished codebase as well as fixing already existing bugs that are
continuously being resolved. Known problems in Monero history
were:
- **Spam attack**
**-** Was aimed to oversaturate the Monero network by sending
minimal transactions and leveraging low transaction fee of
0.005 XMR. Immediate fix was established by raising the
fee to 0.1 XMR. This problem led to the implementation of
dynamic transaction fee based on the chosen transaction
priority [24].
- **Split chain attack**
**-** The successful exploit of Merkle root calculation vulnerabil-
ity led to the creation of two blocks of the same height and
hash, but with two different transactions on the end of the
block [25]. By this, two separate Monero chains were cre-
ated. The exploit could be applied to all CryptoNote based
cryptocurrencies. In the case of Monero, all transactions
were stopped on exchanges until next day, when the fix was
issued [26].
- **Transaction analysis in Monero blockchain**
**-** Research published in 2017 uncovered past and present
problems in anonymity with Monero transaction system.
The most significant discovery was that a substantial por-
tion of transactions used a Ring Signature of zero which
caused traceability of the amount of coin in the transaction
output on the blockchain [27].
**-** This issue was resolved by Monero team already in 2016
with Monero v2, where Ring Signature was set to set to
3 [28]. Soon after the paper was released, Monero got its
v6 update with enforced use of RingCT technology for all
transaction outputs [29].
### 3.5 Transactions in Monero network
Monero uses a distributed peer-to-peer consensus network to record
transaction outputs in a blockchain. It means that balance is not stored
in a wallet, but is represented by control over outputs of transactions
accessible with wallet keys [30].
By that when a user A wants to send funds to a user B, the trans-
action happens in the way of transformation of controlled outputs in
one wallet to a new output that belongs to the other wallet. As this is
only a principle of how coins are transferred between wallets, Monero
uses additional technology to make transactions private.
#### 3.5.1 Monero wallet and stealth addresses
Monero wallet seed is 95 characters long string that consists of public
view and spend key. To send funds from one wallet to another, a
one-time public key is created, that contains senders public view and
spend key as well as randomized data.
This one-time public key is also referred to as a stealth address
and is generated and recorded as part of the transaction to set the
controller of the output of the transaction [31].
Stealth address is visible on the blockchain, by this receiving party
can scan the blockchain to find exact transaction using their private
view key. After locating transaction output, wallet software is then
able to calculate one-time private key that aligns with the one-time
public key and can spend this output using private spend key [32].
By this, no one from outside can link nor wallet addresses nor
people involved in a particular transaction by scanning the blockchain
as there is no association with receivers address.
To prove that funds were sent from one wallet to another, the sender
has to disclose transactions ID, receivers address and transactions key.
#### 3.5.2 Ring Signatures
Ring Signatures present a way to create a distinctive signature that
authorizes a transaction. The digital signature of the transaction is
compiled from the signer together with past outputs of transactions
(decoys) to form a ring where all members are equal and valid. By
that, the outside party cannot identify the exact signer as it is not clear
which input was signed by one time spend key [33].
To prevent double spend, a cryptographic key image is derived
from the spent output and is part of the Ring Signature. As each key
image is unique, miners can verify that there is no other transaction
with the same key image, thus preventing the double-spending attack
[13].
#### 3.5.3 RingCT
So far, senders anonymity is ensured by Ring Signatures, receivers
anonymity relies on stealth addresses, but the amount of Monero
transferred would be still visible on the blockchain. To hide transaction
amounts, Ring Confidential Transactions are implemented [34].
As one output cannot be spent twice, the sender has to spend entire
output in the transaction. That typically results in a transaction having
two outputs, one for the receiver and one for the original wallet, where
the excess amount of coins is returned.
To prevent manipulation during a transaction, the total input amount
must equal the output amount of coins in each transaction. As one
could exploit this by committing to value less than zero, range proofs
are there to ensure cryptographic evidence of amounts used in trans-
actions is greater than zero and falls into the valid transaction amount
range.
To confirm the transaction, the sender reveals the masked amount
of coins being sent in the transaction to the network that is later verified
by miners [35].
By that, amounts transferred between wallets in the form of outputs
of transactions are hidden, and the network can still confirm that
transaction is valid.
#### 3.5.4 Kovri
Kovri is a C++ implementation of the Internet Invisible Project (I2P)
anonymous network, that under heavy development process in the
Monero project. It aims to offer secure network transmissions where a
users IP cannot be associated with a particular transaction ID [36].

View File

@ -0,0 +1,360 @@
---
layout: post
title: Monero usage
subtitle: From wallets to multisig
gh-repo: daattali/beautiful-jekyll
gh-badge: [star, fork, follow]
tags: [wallet, storage, portals]
---
## 4 Monero Usage
As pointed out in the Chapter 3.3, Monero is one of the cryptocurren-
cies that aim to implement as complex anonymity system as possible.
Moreover, because of that not only the underlying technology of the
network is different from other cryptocurrency projects but the user
side as well.
### 4.1 Wallets
The essential part of every currency is the users ability to access stored
funds. In cryptocurrency, this is represented by the wallet and associ-
ated software. Overview of the wallet storage methods is described in
the Table 4.1.
Monero wallet contains information that is necessary to send and
receive Monero currency. Each wallet is encrypted by the password set
in the creation process. Typical wallet created using Monero software
named _example-wallet_ consists of:
- **example-wallet.keys file**
**-** Is an encrypted file containing private **spend key** and **view**
**key** together with **wallet address**.
**-** Keys file also contains user preferences related to transac-
tions and wallet creation height, so wallet software will
only read blockchain from the wallet creation point.
**-** Using this file, the user can restore the wallet by using the
monero-wallet-cli command:
monero-wallet-cli generate-from-keys
- **example-wallet file**
**-** Acts as an encrypted cache for wallet software that contains:
List of outputs of transactions that are associated with
the wallet, so it does not need to scan the blockchain
every time after startup.
History of transactions with metadata containing trans-
action (TX) keys.
- **example-wallet.address.txt file**
**-** Stores **unencrypted** information containing generated wal-
let address.
**-** With recent address-based attacks that swap wallet ad-
dresses found in clipboard or files on the hard drive for the
attackers wallet address, this poses a security risk [37].
- **Mnemonic seed**
**-** Mnemonic seed is a 25-word phrase which the last word is
being used as a checksum. Together they represent a 256-bit
integer that is the accounts private spend key.
**-** By having accounts private spend key, wallet software can
derive private view key by hashing private key with Keccak-
256. That produces another 256-bit integer that represents
private view key.
**-** Both public keys are then derived from newly recovered
private keys.
Example of Monero wallet address and mnemonic seed:
- **Wallet address**
**-** 461TWLQhsxrR9dD4CXk4p1RRxAAQ3YCEDhNiGCQjj5
QA33ohhZPnCX6346EyEwC7TiRSB3XB8KgNaJ4vThd5N
pQqRkGab66
- **Mnemonic seed**
**-** serving odometer nifty flippant worry sphere were thorn
putty bogeys lyrics feast fawns input biscuit hobby outbreak
rash tucks dwelt liquid azure inexact isolated liquid
**4.1.1 Wallet types**
As Monero wallet can be represented as little as one file or 25 words,
it is rather a small piece of information which the user needs to store
in the safe place to keep account under own control. To do that, there
exist two main types of wallets:
- **Hot wallet
-** Refers to wallet software running on a computer that is
connected to the Internet, thus Monero network. By being
online, the user can verify incoming transactions, spend
from the wallet and check balance as well.
**-** As this type of wallet is not air-gapped (not connected to
the Internet), this poses an external intrusion risk.
**-** The hot wallet can also refer to web-based or exchange-
based wallet that is explained further in this Chapter.
- **View-only wallet
-** Is a wallet containing only private view key pair to see
transactions associated with the wallet.
**-** As this is a view-only wallet, the user can see incoming
transactions but is not able to spend, sign or view outgoing
transactions. That results in incorrect balance when the
wallet is used for sending funds.
- **Cold wallet
-** Is an offline solution to storing wallet seed or private keys
on storage media. Using method, media storing wallet in-
formation have no direct access to the Internet. The storage
medium can be represented by an external hard drive, air-
gapped computer as well as paper with wallet seed written
on it.
**-** That comes with increased security from the IT standpoint,
but the usability of the cryptocurrency suffers. That is mainly
due to the hassle of working with funds when the user
wants to spend them as it requires:
Cold wallet imported into wallet software in the air-
gapped computer.
A view-only wallet connected to the Internet.
**-** This way, the user can generate an unsigned transaction
on the view-only wallet, transfer it for signing to the air-
gapped computer and then back to submit transfer to the
Monero network.
- **Exchange hosted wallet
-** In the exchange wallet, users funds are stored under an
online account in an online exchange.
**-** As opposed to a regular wallet, there is no wallet soft-
ware or seed required as the whole balance and transaction
system is run by the third party. Funds can be controlled
through users online account that accessible by traditional
username and password.
**-** This poses a risk as the third party has complete access to
users funds and the accounts security is directly depen-
dent on exchanges security measures as Two Factor Au-
thentication (2FA) implementation, IP restriction or email
verification.
- **Web-based wallet
-** Web wallet represents server based Monero client that is
served to the user in the browser. By using a web wallet, the
user can access funds from any Internet-connected device
by sharing:
Mnemonic seed or private spend and view key to send
and receive funds.
Public view key and wallet address to view incoming
transactions to the wallet.
- **Hardware wallet
-** Dedicated hardware solution like Ledger Nano S is still in
its beta phase [38].
**-** Due to lack of real hardware wallet, the community around
Monero recommends as the alternative a USB drive with a
live distribution of Linux coupled with persistent storage
where Monero client and users private key pairs are stored.
**-** Although this alternate solution effectively rules out host
operating system, there is still a way to capture viable in-
formation. Especially when interacting with an untrusted
machine, where attacker captures GPU output or uses a
hardware keylogger to log the users activity.
### 4.1.2 Attacking the wallet
With the rapid expansion of cryptocurrencies from 2014 to 2018, this
area became a significant spot for malware development [39]. As there
are many attack vectors, this Section aims to give info about malicious
activities on users wallets.
Wallet thieves
Aim to compromise the system in a way that malware finds wallet
files and steals cryptographic keys or seed belonging to the wallet.
Although in Monero, keys are encrypted while stored on the disk.
When running wallet software, keys can be obtained from memory.
This attack can also be performed by distributing malicious wallet
client software.
Cloud storage
Cloud storage provides an easy way of sharing files between devices
as well as users. As the user does not need to set up the infrastructure
and the majority of the services provide free tier, it is usual for people
to take this for granted as a safe place to store files [40].
This way, the users security depends on the following factors:
- Wallet encryption on the file level, user password habits.
- Account security login implementation, 2FA.
- Client application implementation for caching and data transfer.
- Vendors storage system security.
Delivery chain
Hardware wallets like Ledger are built to ensure the safety of users
coins. Therefore the owner of such a device should be pretty con-
fident when using this device that came with original undisrupted
packaging.
For this attack, malicious vendor puts pre-generated mnemonic
seed on a scratchpad. This piece of paper is made to look like an official
one-time generated secret key to the wallet for the user. This way when
Malicious seed generation
Similar to Delivery chain attack, the attacker in this scenario provides
service that offers secure seed generation to obtain seed information
belonging to the wallet. That is usually done by running a malicious
web service that offers secure seed generation for cryptocurrencies or
developing a standalone software for download.
After the user generates the seed, a package with seed data is
automatically sent to the attackers listening service and then saved
to the database. Both parties know the private information and can
spend funds from the wallet.
### 4.2 Local and remote node
To spend or view the balance in the wallet, the user is required to have
a wallet client software or use third party services to access the Monero
network. This Section covers the most common type of accessing the
funds, hot wallet in combination with official Monero client software
available athttps://getmonero.org/downloads/.
Monero client requires to be in synchronization with the network
to show the correct balance as well as to work with the funds. That is
done by either running a full local node or connecting to the remote
node.
**The node** is a part of the cryptocurrency network that keeps a
synced copy of blockchain in the local storage and provides a service
that enables clients to access the information from the blockchain file.
In Monero client software, this is represented bymonerod, a separate
daemon which synchronizes with the network.
**The local node** is the default option when running wallet soft-
ware, using monerod client downloads from Monero network the
blockchain and stores it in local storage. As of July 2018, blockchain
size is about 44.3 GB. By running local node, client can independently
verify transactions as well as blockchain state.
**The remote node** , on the other hand, represents a lighter ver-
sion with slightly less privacy when it comes to working with the
wallet. By either choosing in GUI to connect to the remote node
or running cli with parameter _.\monero-wallet-cli.exe daemon-address
node.address:port_ , the client connects to the remote node and starts
scanning the blockchain as if it was a local one.
Comparison of the node types can be found in the Table 4.2.
**Local node Remote node**
Blockchain stored on locally Blockchain stored remotely
Observable traffic between
nodes
### 4.3 Multisig implementation
Monero started to support multisignature transactions and addresses
by 17th of December 2017 when codebase for this feature was merged
into master by Fluffypony [41]. Multisig became available in the
Lithium Luna release that was released 23rd of July 2018 [42].
Multisig in a cryptocurrency is a feature that requires the multisig
transaction to be signed by all keys that are required. For multisig, one
can create a multisig wallet that is designed as follow:
- 1-of-2
**-** Requires one of two participating parties to sign a transac-
tion.
**-** This scheme acts as a shared wallet where each of the key
holders can spend funds without the other party signing
the transaction.
- 2-of-2
**-** Requires both parties to sign a transaction.
**-** Each side has to agree to spend funds and sign the transac-
tion.
- M-of-N
**-** Requires M keys of N to sign a transaction, note that M is a
subset of N.
**4.3.1 Multisig usage**
After Lithium Luna release, only Monero wallet CLI software is ready
for processing multisig transactions. In the Figures 4.2 and 4.3 example
scheme of 2-of-2 is presented with user A as blue and user B as green
for wallet generation and transaction using Monero multisig feature.
### 4.4 Problems in Monero environment
Monero privacy features are appreciated not only by privacy savvy
users but malware, phishing, and other malicious software creators
as well.
The main reason to use Monero over other cryptocurrencies for
them is that Monero is not only harder to trace but when the attack is
implemented well, after moving funds in separate batches to multiple
wallets an over more extended period, no one will be able to associate
the coins with the malicious activity.
There are four main problems concerning Monero environment:
1) Ransomware
Malware that encrypts user files and then demands a ransom in the
form of cryptocurrency, computer and files are no longer accessible
unless the user pays the required amount. During its peak time, all
popular ransomware demanded payment in Bitcoin.
As malware developers started to get their coins targeted by projects
such as one from Netherlands police called No More Ransom available
atnomoreransom.org[43, 44]. Because of this targeting, they had to
choose another cryptocurrency to solve this problem, and the solu-
tion was Monero [45]. Kirk is an example of Monero malware that is
included in the Figure 4.5 [46].
Figure 4.4: Kirk ransomware that demands payment in Monero.
2) Scam portals
As mentioned in the Section Wallets 4.1, online wallets usage is a risky
thing due to entrusting users private keys to the third party. Users
often choose them as they are not required to have any additional
software. Due to this fact, there are more than ten domains that copy
the design, functionality, and name ofmymonero.comofficial online
wallet with added code that steals the users wallet data. Detailed list
of domains is available at https://www.reddit.com/r/Monero/wiki
/avoid.
Aside from direct scams, there are also services offering wallet
services which have their codebase closed and store all wallet infor-
mation. The best-known example of such service is freewallet.org,
that is strongly criticized for closed source as well as funds that are
reported as missing from users accounts [47].
3) Crypto-jacking attack
Crypto-jacking a type of attack where the attacker delivers a malicious
payload to the users computer. Rather than rendering the device
unusable either by blocking like ransomware, part of system resources
is used for mining.
Figure 4.5: Some websites openly state that they mine Monero.
Crypto-jacking is becoming more frequent than ransomware as it
has proven that steady but low income is more profitable than one-
time payment in the form of ransomware [48].
4) Black Ruby
Interesting intersection of ransomware and crypto-jacking category is
Black Ruby malware that combines features of both. First, it encrypts
files on the target computer and then proceeds to mine Monero using
XMRig (as explained in the Section 7.2) at full CPU load [49].
### 4.5 Monero use case
Aside from code quality and features, another important factor in
cryptocurrency success are the ways how users can spend the funds.
While numerous community around Monero that centers around
Reddit _/r/Monero_ created _/r/XMRtrader_ , there are also projects that
support Monero in day-to-day use like https://xmr.to/.
What is most noticeable tough, are darknet markets, that started
to support payments by Monero. This results in the rather negative
use case of the crypto as payments by Monero are not directly likable
to ones wallet as described in the Section 3.5.2.
Although darknet markets may support Monero, a short inspection
of Top 10 markets revealed that only 5 of them list Monero as the
general way to pay. Rest of them are not forcing the sellers to use
Monero. This results at about 40% availability of Monero payment
option on these type of markets.

View File

@ -0,0 +1,253 @@
---
layout: post
title: Monero User Research
subtitle: Getting into users perception
tags: [research,cryptocurrency,users]
gh-badge: [star, fork, follow]
---
The goal of this research is to gather information on end users behavior
regarding Monero cryptocurrency with emphasis on key management
and security practices. For this purpose, an online questionnaire was
created.
Specific survey design and research questions are based on Bitcoin
security and privacy study, typical usage patterns of cryptocurrency
users, online forums and Reddit communities centered around Mon-
ero as well as problematic areas regarding computer and data security
in general [50].
### 5.1 Research questions
The survey was designed around seven question groups. Some of them
were shown only if the participant chose the appropriate answer.
- G01 - Introductory information
- G02 - Monero usage
- G03 - Monero key and coin management
- G04 - Monero and malicious things
- G05 - Monero recovery
- G06 - Special question set for miners
- G07 - Demographics
Following this pattern, four research questions were set:
- R1: What are Moneros main use cases? How do participants
perceive Moneros features?
- R2: What are participants ways of wallet access and storage?
- R3: What security incidents have affected users? How did they
deal with them?
- R4: In case of recovery, how did they recover their keys?
### 5.2 Participants and surveys background
The significant characteristic of Monero is its anonymity, and this
feature is not taken by community lightly. Due to this fact, the survey
was not hosted on third party servers, but instead on dedicated Virtual
Private Server (VPS) running Lime Survey self-hosted software with
HTTPS interface using signed Letsencrypt certificates [5153].
This means that data exchanged between participants and survey
software stays only between these two parties, so Google or other big
data company cannot analyze them. To allow extended anonymity
features, Tor and proxy connections were allowed, but each participant
had to solve the CAPTCHA before starting the survey.
#### 5.2.1 Methodology
Data collection method was online only and was using the survey
website software. Participants selection was based on opportunity
sampling. Links for the research were shared among dedicated Reddit
Monero community, Facebook Monero groups as well as Cryptocur-
rency forums. Study limitations are described in the Section 6.3.
To reduce nonresponse rate, participants were asked only to fill
out parts that were significant for them, e.g., Monero recovery part
stayed hidden in the form if the user selected that he/she had never
made any recovery of the seed or wallet keys in the previous part.
The data from the respondents were collected from 11.15.2018 to
01.27.2019. The complete survey is attached in the Appendix Figure C.
### 5.3 Collected data
Before entering the survey, each participant had to pass the bot test
by entering the correct CAPTCHA, which resulted in 179 participants
of the questionnaire in total. As for survey data cleansing, following
measurements for valid dataset were taken:
1. Partially answered or unanswered questionnaires were not taken
into account (67 out of 179).
2. Respondents that filled out the survey in less than two minutes
were discarded (1 out of 179).
3. Responses with more than 4 entries with the same IP were fil-
tered (0 out of 179).
(a) In total 7 responses were sent from duplicate IP addresses.
The highest number of responses from a single IP was 3,
which belonged to MIT University.
4. Responses containing invalid answers, e.g., not using Monero
or repeating the same answer pattern in multiple submissions
(1 out of 179).
Figure 5.1: Overview of respondents in the user survey dataset.
Usinggeoiplookuppackage in Ubuntu on the filtered dataset, most of
the responses were from USA (31 out of 113), followed by the Czech
Republic (17 out of 113) and Germany (11 out of 113). Detailed list of
countries with the corresponding number of responses is available in
the Appendix Table B.1.
### 5.4 Results
Next section is based on the final filtered dataset with 113 responses
of people who voluntarily entered the research based on opportunity
sampling.
#### 5.4.1 General information
First, users were asked about their operating system preferences when
accessing Monero. Majority of users tend to access Monero using
Windows 58% (65 out of 113) or Linux 60% (68 out of 113). While
accessing Monero from mobile Android OS 43% (49 out of 113) is
primarily used. As for the Apple ecosystem, MacOS combined with
iOS was selected as used method of access only in 14% (16 out of 113)
occurences.
Monero desktop application usage
Desktop applications are used by 104 out of 113 users, making it
the most frequent means of accessing the wallet. As Monero Official
application has no other direct competitors aside from web-based
wallets, the majority of users 81% (84 out of 104) use the official
application with GUI, but there is also a notable part of the users
in the dataset that use CLI as well 53% (55 out of 104). Alternative
desktop clients, that were sometimes misinterpreted as web apps, are
used by only a few users cca 4% (5 out of 104).
Monero Mobile application usage
From 113 people that filled out the survey, 53 of them stated that
they use either Android or iOS application for accessing their Monero
wallet. Digging deeper, out of 49 Android users, Monerujo application
is used by 92% (45 out of 49) of them, followed by other Android
wallets 14% (7 out of 49). Freewallet on Android is only used by one
user (2%) in the dataset thus following the fact the community does
not like closed source software with bad history as mentioned in the
Chapter 4.4. Detailed description of the applications is included in the
Section 6.1.3.
5. Monero User Research
iOS is used by 7 out of 113 users (please note that users could check
usage of both platforms as can be visible from simply adding iOS and
Android users and comparing it to the total number of mobile users).
All of them (7) reported using the Cakewallet application. Following
the Android pattern, one user also revealed usage of Freewallet app.
Online wallet services
When asked about online wallet usage, only 24 people (out of 113)
said that they use some sort of online service with MyMonero wallet
being used the most 79% (19 out of 24).
Wallet software usage
First part of the survey shows that userbase present in the dataset is
more oriented towards open-source software in general (110 out of 113
use some form of open-source Monero client), but this is not limited to
the usage of particular OS as there are 33% (37 out of 113) of Windows
only users, 35% (40 out of 113) Linux only users and 25% (28 out of
113) users of both OS. This discovery follows the information about
Monero community as they prefer open source software (OSS) to
closed source software (CSS) because they can not personally review
for hidden features or unintentional bugs.
#### 5.4.2 Monero usage
When asked “ _What are your reasons to use Monero?_ ”, the majority of
respondents in the dataset said that they use Monero or at least are
interested in the topic because of the technology 88% (99 out of 113),
but also see it as an investment 73% (83 out of 113).
A significant portion of respondents also see Monero as a way of
secret storage of value 74% (84 out of 113) but not as much in the way
of sending money 53% (60 out of 113).
This result is strongly affected by the way how participants were
selected (self-selection) and from what sites they were informed about
the survey (mainly Reddit Monero subreddits and Facebook Monero
groups). The short overview of the preferences is shown in the Table
5.1 with the full text of the questions asked available in the Appendix
Figure C.
Transactions in the Monero network performed by respondents
can be divided into two user groups, where the first group that can
be described as active, those who make at least one transaction per
month, 50% (53 out of 107) and passive who are much less frequent
51% (54 out of 107). Detailed overview of transactions frequency in
the dataset is in the Figure 5.9.
Following this question, respondents were asked if they hold onto
their coins for a long time (often referred to as one being a HODLer).
Majority of respondents 79% (84 out of 106) said that they are, but this
statement conflicts with transaction frequency. When comparing data
of respondents that make a transaction at least every month, about
60% (34 out of 57) think that they are HODLers, this contradicts the
previously mentioned statement.
Important usage factor of a currency is where its users can pay
with it. Monero has already a known reputation between darknet
markets, but its mainstream usage isnt something that is advertised
as its feature.
When asked about the payment options, many of the respondents
45% (51 out of 113) selected that they use Monero as a way for donating
other people, followed by paying for VPN services 35% (31 out of 113).
Although Monero features are considered ideal for black market use,
only 5% (6 out of 113) respondents revealed that they use Monero
cryptocurrency in this way.
Perception and the reality of anonymity in cryptocurrency is an
important topic in the cryptocurrency environment [54]. Although
Monero is private by default, additional precautions can be made to
hide users activity from the third party like using Kovri or Tor.
Among users in the dataset, Kovri 7% (8 out of 113) or Tor 20%
(23 out of 113) is used by less than one third of the respondents in
total as can be seen in the Table 5.2.
**5.4.3 Monero key and coin management**
Apart from client software that is used for accessing and making
transactions in Monero, wallet management is at least as important.
Main reason is that users choice of wallet storage has a direct influence
on who has access to the funds as explained along with the wallet
types in the Chapter 4.1.
#### 5.4.4 Monero recovery
For further wallet protection, the majority of users also encrypt their
wallet or the datastore on which the keys reside on 78% (88 out of
113).
A slightly higher number of users admit backing up their wallet
keys 89% (101 out of 113) while a significant number of respondents
had already needed to restore their wallet keys 44% (50 out of 113).
To complete the recovery statistics, 98% (49 out of 50) were able to
restore the keys from the backup media.
See the Figures 5.12 and 5.13 for visualization of wallet recovery
reasons and restore methods.
#### 5.4.5 Monero and malicious software
This part was answered only by those respondents that selected Yes
(15 out of 113) when asked whether they have ever been affected by
malicious software that used Monero in some way.
The primary cause of problems was mining malware (8) or some
form of mining script (7). The main affected platform was running
Windows (10), and malware was recognized mainly by slow system
response (7) and high CPU usage (11).
#### 5.4.6 Demographics
Survey participants were mainly males 44% (50 out of 113), females
2% (2 out of 113) represented only a small portion of the dataset, and
some of the participants did not disclose their gender 54% (61 out of
113). Most respondents in the dataset were from the age groups 25-34
29% (33 out of 113).

View File

@ -0,0 +1,213 @@
---
layout: post
title: Monero Usage and Storage Best Practices
subtitle: Monero best practice
tags: [usage, storage, guideline]
gh-badge: [star, fork, follow]
---
Ease of use is one of the critical aspects of every cryptocurrency and
although Monero can offer a wide range of privacy features it has to be
usable and user-friendly to be used by a substantial margin of people.
Usability in Monero is a long-term topic that sparks discussion [55].
While significant number of users reported that they perform back-
ups of their wallet keys, many of them use hot wallet on their mobile
phones which presents a security threat for their wallet.
Following scenarios represent secure and easy to use instructions
for a new Monero user, based on results from Monero user research
in the Chapter 5.
### 6.1 Generating the keys and accessing the wallet
The first challenge for Monero users is generating key pairs and access-
ing the wallet. This process varies from the users platform of choice
and used wallet software. As the choice of client wallet software is
important for Monero users in terms of user experience and security,
the following Sections are dedicated to available wallet software.
**6.1.1 Windows and Linux platform**
The official client offers CLI and GUI wallet management and is avail-
able athttps://getmonero.org/downloads/. Using this client users
can generate wallet keys. Created keys are after generation saved
directly into the memory of the device unless specified otherwise.
<pre>
.\monerowalletcli.exe
Monero Lithium Luna (v0.12.3.0release)
Logging to C:\Users\radim\Nextcloud\ssmethesis\cli\monerowalletcli.log
Specify wallet file name (e.g., MyWallet). If the wallet
file is not present, it will be created.
Wallet file name (or CtrlC to exit): ssmethesis
No wallet found with that name. Confirm creation of new
wallet named: ssmethesis
(Y/Yes/N/No): Y
Generating new wallet...
</pre>
Security of this task depends on the origin of the software, delivery
chain trust, and the users operating system. Monero CLI and GUI
binaries can be edited, and the application itself does not call any
internal checking to alert the user of the unauthorized change.
Code injection was successfully tested on GUI binary of the official
Monero wallet as seen in the Figure 9.2. Although SHA256 hash is pro-
vided on the website, the user is not specifically instructed to check the
hashes of the downloaded software with tools like PowerShell using
Get-FileHash ./monero-wallet-gui.exe | Format-Listcommand
[56]. GPG-signed list of the hashes is available on the website although
there are no instructions on how to verify PGP signature itself.
Algorithm : SHA256
Hash : AF9324151909AC7B9BC6D622210EADFBAE5E66...
Path : ./monerowalletguioriginal.exe
Algorithm : SHA256
Hash : DF4EC49E088284ECC78DBBD8B9CEFF00A78085...
Path : ./monerowalletguiinjected.exe
## 6 Monero Usage and Storage Best Practices
There are also alternative approaches to key generation like an
offline JavaScript based monero-wallet-generator that is available at
github.com/moneromooo-monero/monero-wallet-generator.
Hardware way is considered to be in the development, but Monero
compatible devices like Ledger Nano S are already on the market. The
way how keys are generated in hardware wallets varies on firmware
included in each device.
In general, the wallet is required to have Monero application in-
stalled from vendors application catalog. Keys are generated on the
hardware device within the application itself, and the user can only
export private view key from the device to view the balance in full
CLI/GUI client.
This way, the user has private spend key always on the device,
and the client PC has only private view key. To sign a transaction,
the user has to confirm the transaction on the device itself meaning
the hardware wallet will sign the transaction and then sends it to
the Monero client. By this, in case of a security breach on the host
computer, there is no Monero to steal.
#### 6.1.3 Wallet software for mobile devices
Monero has wallet software available for Android as well as the iOS
platform. Community recommends to use the open source ones for
both platforms, as their codebase is published on GitHub and everyone
can inspect the code. Another common fact for the recommended
solutions is that the keypairs for the wallet are stored exclusively on
the users device and restore can be done without third-party technical
support.
**Monerojuro** is an open source Android wallet application that is
available on Google Play as well as APK release at Github. By this,
users can install the application from the Google Play directly, man-
ually download the APK or compile it from source code themselves.
Wallet keys storage is based on the device only, and the application
encourages users to back up their seed [57].
**Monero Wallet** is an application released by Freewallet.org that
provides Monero wallets for both Android and iOS. Regarding overall
usability, this application is easier for an average user as it does not
present any cryptocurrency wallet terms as key, seed, etc. The user is
instead instructed to create a Freewallet account which acts as a wallet
[58].
By this, the user does not need to save the seed, wallet keys or
make any backups as key management is completely on the side of
the service provider, Freewallet.org. This fact is often emphasized in
Monero community as the user that does not control the keys does
not control the wallet. Also, the source code is not publicly available
for the community to review.
**Cake Wallet** represents open source Monero wallet for iOS that
provides wallet generation and local key pair storage with remote
node connection and synchronization [59].
Guideline for secure wallet access is described in the Chapter 4.1.1.
### 6.2 Secure storage system
Wallet keys are everything when it comes to cryptocurrency usage.
Who has the keys, controls the wallet and can view or transfer the
balance to another address. If a user loses wallet keys, Monero wallet
can still be recovered using mnemonic seed that should be saved on
another storage medium.
This Section describes possible ways of backing-up wallet keys.
Primary storage media security is compared in the Figure 4.1.3.
Data characteristics
As described in the Section 4.1, Monero wallet consists of an encrypted
wallet.keysfile that contains private spend and view keys. Size of
this file is less than a few kilobytes.
Another type of data that is presented to the user is mnemonic
seed. Seed can be used for recovery when wallet file is lost and consists
of 25 words with the last one being used for checksum.
In total, Monero wallet requires less than 8 kilobytes for key and
seed storage. This results in minimal space requirements for backup
storage media.
Backup strategy
Best practice for backups that isnt too demanding on the user side is
the 3-2-1 strategy that is considered in the industry as a bare minimum
for keeping the data safe [60].
- 3 means having at least 3 copies of your data in total.
- 2 of them are local but stored on different media types.
**-** This can be represented as a combination of SSD and tape.
- 1 is an offsite, geographically different location.
**-** E.g., in the next building, a different facility, another city.
In short, this means when your building with external drive burns
down and your notebook gets cryptolocker on the same day, you still
have your data safe as you have them in the offsite location.
Data that users need to backup are not changing in the day to
day usage, but only when the user creates a new or an additional
wallet. Meaning that backing up the wallet does not need to be made
frequently unlike other user data that are changed frequently, e.g.,
documents. Verification, on the other hand, is more important as not
only users should back up the data, they should also be able to restore
them. For ease of use, users can verify the integrity of the backup by
actually recovering the wallet from the backup media.
6. Monero Usage and Storage Best Practices
Recommended scheme
Following cost effectivity of individual media types together with
common backup strategy:
- Total number of copies of data: 5
- The primary data source is on the client device with wallet soft-
ware. This source is then copied downstream to backup media.
- All copies of the data should be encrypted using file-level encryp-
tion regardless of the security of the device, e.g., by a popular
open-source tool like VeraCrypt.
- Local copy
**-** Located on disk with full volume encryption, e.g., by Bit-
Locker.
**-** Paper backup in a secure container at a hidden place.
- Offsite copy
**-** Located on the flash drive with full volume encryption.
**-** Located on the DVD as an encrypted file.
Secure Monero usage portal
As a result of this Chapter and Monero user research in the Chapter 5,
all recommendations for secure Monero usage are compiled within
one websitehttps://ownercz.github.io/ssme-thesis.
### 6.3 Study limitations
When interpreting Monero user and miners research results, the fol-
lowing study limitations should be taken into account:
- Self-selection bias of respondents in the dataset, which results
in a non-representative sample of the population.
- Reporting bias of responses in the dataset, as study gathers
rather sensitive questions towards security habits and backups.
- Limited time and reach of the questionnaires in the community
that has participated in this research leading to non-representative
population sample.

View File

@ -0,0 +1,192 @@
---
layout: post
title: Obtaining Monero and Running The Network
subtitle: How are coins gained
tags: [coins, network, mining, pools ]
gh-badge: [star, fork, follow]
---
Monero mining is a process done by miners to verify transactions on
the network and add them to the blockchain together in the form of a
block. This results for them in a reward in the form of new coins that
are emitted as a reward for block solving.
Network speed is mainly determined by the average time between
individual blocks. This results in the transaction process that takes up
to 130s (request =<1s, broadcast =<5s and max. time between blocks
=<120 seconds). The transaction process is shown in the Figure 7.3.
Transaction request
generated by the client
transfer ADDRESS AMOUNT
Request broadcast to
network nodes, shown
showtransfers pool
Transaction is added to
the block waiting to be
mined.
Miners are verifying
transactions in the
pending block.
Every 2 minutes new
Monero block is mined
and added to the
blockchain.
Miners are rewarded by
block reward.
Receiving partys wallet
becomes aware of the
transaction.
7. Obtaining Monero and Running the Network
### 7.1 Mining nodes
As was mentioned at the beginning of the Chapter 7, mining is the
main reason for transaction processing in Monero network, and as the
mining process has rewards for successfully solving the block, this
encourages many different entities to mine.
Mining in pools
Very often, miners combine their computational resources into one
of the pools on the network. Due to the higher total hash rate, there
is a greater chance of solving the block thus gaining the reward of
newly emitted coins. After solving each block, the reward is distributed
equally to miners connected to the pool according to PPS (per-per-
share) or PPLNS (per-per-last-number-of-shares) system [61].
As of 09.29.2018 total hash rate of the network was 577.72 Mh/s
(100%), in known pools 530.79 Mh/s (91.88%) and unknown part
of the network 46.93 Mh/s (8.12%). Unknown part represents either
pools that are not listed or solo miners on the network.
Solo mining
Represents "all or nothing" approach when it comes to the rewarding
system. As solo miners hash rate has to compete against all other solo
miners as well as big pools, the chance of solving the block is rather
small [62].
On the other side, when solo miner solves the block successfully,
the whole block reward is assigned to the mining address. With high-
end, multiple GPU setup, the miner can achieve about 3.2 Kh/s; this
would mean chance about 0.46 % of gaining the block reward.
Web mining
CryptoNight algorithm mining stands out above others in the way how
cryptocurrency can be mined. For Monero there are JavaScript-based
miners like CoinHive available, that results in individual websites
embedding this script and mining using the visitors resources.
This can result up to 300 hashes per second for users with powerful
CPUs and is a viable alternative to advertisements when visitors spend
more than 10 minutes on the website [63]. Typical examples of this
approach are warez websites offering free online movies and torrent
trackers.
Botnet mining
Using other peoples resources for mining, often also called crypto
jacking (a more broad term for hidden cryptocurrency mining without
users approval), have become increasingly popular in Monero. As the
cryptocurrency provides privacy features as well as a wide range of
mining software that is available for every major platform.
In the current cloud era of computing, this represents vast prob-
lems for both service providers and their customers. Providers experi-
ence increased power consumption, cooling requirements, customers,
on the other hand, are required to pay more for consumed system
resources [64].
Cloud mining
Represents managed services by specialists that offer mining power us-
ing cloud service providers. Due to managed service providers (MSP)
markup, this way of mining is not as profitable and not recommended
among Monero community in general.
Arrows indicate flow of the resources:
Payment for service; Payment for compute time; Delivered hashrate
### 7.2 Mining software
Official
Can be obtained at the official web of the Monero cryptocurrency
project athttps://getmonero.org/downloads/. This is an official wal-
let software that includes solo mining client and cannot be used for
pool mining.
Community-driven
Is a category that incorporates open-source mining software projects
that have source code published on the Github. Mostly used are:
- XMR Stak
**-** Consolidates CPU, AMD and Nvidia GPU mining under
one multiplatform application with integrated webserver
and autoconfiguration capability.
**-** URL:https://github.com/fireice-uk/xmr-stak
- XMRig
**-** Three separately released miners with autoconfiguration
GPU and CPU capability.
**-** AMD:https://github.com/xmrig/xmrig-amd
**-** Nvidia:https://github.com/xmrig/xmrig-nvidia
**-** CPU:https://github.com/xmrig/xmrig
- CCminer - Nvidia CUDA miner
**-** URL:https://github.com/tpruvot/ccminer/
Proprietary
Having closed source code that community cannot inspect, mining
software of this category has less reputation compared to the community-
driven. This is caused mainly by the fact that the exact produced hash
rate and client reported hash rate differed in the past at least regarding
the MinerGate miner available athttps://minergate.com/download
s/gui.
### 7.3 Mining malware
As Monero algorithm is designed to be memory demanding, it is
suitable to mine it using both CPU and GPU as mining software offers
support for both hardware components as mentioned in the Section
7.2.
The fact that Monero can be effectively CPU mined means for
malware miners much easier way how to gain any profit from infected
computer as they do not need to have any specific GPU drivers or
features implemented. Because of this, they are easier to deploy on a
wide range of devices [65].
Monero position in the malware world
When malicious software developer considers the cryptocurrency
technology to build on, cryptocurrency features are one of the most
important aspects that drive this decision.
In the case of Monero, its features are as much important for its
users as for the malware developers. The main reason for using Mon-
ero is that it offers private features as well as support for mining on
almost every device available [66].
Thanks to its features and active development, Monero is one of the
most active cryptocurrencies that are used in the malware world with
more than 57 million USD already mined. As of 2019, Monero is iden-
tified to have the most active malware campaigns per cryptocurrency,
followed by Bitcoin and zCash [67].
Types of malware miners
Main categories of malware miners are derived from the way how the
unwanted software is delivered to the target device. Most common
ways of ingestion are:
- Website with JavaScript miner software, also known as Crypto-
jacking as mentioned in the Figure 4.4.
- Exploiting vulnerabilities in the operating system or application
software.
- Bundled in legitimate software.

View File

@ -0,0 +1,233 @@
---
layout: post
title: Monero Miners Research
subtitle: Researching the miners
tags: [miners,research,terminology]
gh-badge: [star, fork, follow]
---
The goal of this research is to gather information on people who run
mining cryptocurrency software and map their behavior regarding
system administration with the emphasis on security practices. For
this purpose, an online questionnaire was created and is available in
the Appendix Figure C.
To the best of my knowledge, this is the first work that studies
cryptocurrency miners. Specific research questions are based on cryp-
tocurrency mining setup patterns, used software and problematic
areas regarding computer and data security in general.
### 8.1 Research questions
The survey was designed around seven question groups. Some of them
were shown only if the participant chose the appropriate answer.
- G01 - Introductory information
- G02 - Mining setup
- G03 - Mining software
- G04 - Pool choice
- G05 - Windows platform
- G06 - Linux platform
- G07 - Demographics
Following this pattern, five research questions were set:
- R1: Who are Monero miners in general? What are their typical
mining setups?
- R2: Which types of software do participants use as operating
systems, management, and mining tools?
- R3: What security and update policies miners follow?
- R4: Do miners suffer from security incidents like compromised
mining operation? How do they deal with them?
- R5: What are the factors that affect pool choice?
### 8.2 Participants and surveys background
As mentioned in the Chapter 5, the survey was not hosted on third
party servers, but instead on dedicated VPS running Lime Survey
self-hosted software with HTTPS interface using signed Letsencrypt
certificates.
This means that data exchanged between participants and survey
software stays only between these two parties, so Google or other
big data companies cannot analyze them. To allow extended privacy
features, Tor and proxy connections were allowed, but each participant
had to solve the CAPTCHA before starting the survey.
#### 8.2.1 Methodology
Data collection method was online only and was using the survey
website software. Participants selection was based on opportunity
sampling, links for the research were shared among dedicated Reddit
Monero community, Facebook Mining groups as well as Cryptocur-
rency forums. This form was distributed together with the Monero
User Research survey in mentioned mining communities. Study limi-
tations are described in the Section 6.3.
To reduce nonresponse rate, participants were asked only to fill
out parts that were significant for them, e.g., Windows OS part stayed
hidden in the form if the user selected that he/she used Linux OS only.
The data from the respondents were collected from 11.15.2018 to
01.27.2019. The complete survey is attached in the Appendix Figure C.
### 8.3 Collected data
Before entering the survey, each participant had to pass the bot test
by entering the correct CAPTCHA, which resulted in 323 participants
of the questionnaire in total. As for survey data cleansing, following
measurements for valid dataset were taken:
1. Partially answered or unanswered questionnaires were not taken
into account (261 out of 323).
2. Respondents that filled out the survey in less than two minutes
were discarded (0 out of 323).
3. Responses with more than four entries with the same IP were
filtered (0 out of 323).
4. Responses containing invalid answers, e.g., not using Monero
or repeating the same answer pattern in multiple submissions
(2 out of 323).
Usingg eoiplookuppackage in Ubuntu on the filtered dataset, most
of the responses were from the USA (10 out of 60) as well as from
the Czech Republic (10 out of 60) followed by Germany (6 out of 60).
Detailed list of countries with the corresponding number of responses
is available in the Appendix Table C.1.
### 8.4 Results
Upcoming pages are based on the final filtered dataset with 60 re-
sponses of people who voluntarily entered the research based on
opportunity sampling.
General information
When asked about the motivation for mining Monero, two-thirds of the
respondents 67% (40 out of 60) think about Monero as an investment,
but also as a way to gain some profit from mining cryptocurrencies
62% (37 out of 60).
Although Monero is not considered to be more profitable to mine
by the majority in the dataset 77% (46 out of 60), almost half of the
miners 47% (28 out of 60) favor this cryptocurrency due to its mining
characteristics CPU minable and the fact that they directly help to
secure the network by mining 60% (36 out of 60).
Note that the reasons for mining Monero are biased by the way
the respondents in the dataset were selected. In general, there would
be a higher percentage of the cryptocurrency miners that care only for
the profitability rather than cryptocurrency features [68].
## 8.3 Mining setup question.
Gathering information about mining setups was designed as a multiple-
choice question where every choice was described in detail as illus-
trated in the Figure 8.3.
Even through dataset cleansing, from the final 60 respondents, 15
of them chose both _Regular PC only_ and _Mining rig_ option. Therefore,
only 45 respondents are taken into account in this part.
## 8.4 Mining types comparison.
When asked about mining setup, the majority of the miners mine
on their PC 33% (15 out of 45) or also on mining rig 69% (31 out
of 45), but there is also a small portion of miners 18% (8 out of 45)
that use their employers hardware and electricity to run their mining
operation. On the other side, only two of the respondents mentioned
mining on a VPS instance and no one selected cloud mining or botnet
mining as their way to mine Monero.
## 8.5 Mining setup properties.
97% (58 out of 60) of respondents shared their current hashrate with
median hashrate value being 4.4Kh/s. This hashrate represents a typ-
ical setup with 5 high-performance GPUs (AMD RX 480 8GB with
800-850h/s) or 7 high-performance CPUs (AMD Ryzen 7 1700 with
600-650h/s).
Majority of miners mine in their property 87% (52 out of 60) and
set up their mining rigs 93% (56 out of 60). The operating system is not
dominant nor on the Windows side 65% (39 out of 60) nor the Linux
part 55% (33 out of 60) described in the Figure 8.5. This is mainly
because of multiplatformity of mining software and availability of
guides for mining setups.
## 8.6 Mining setup preferences.
Miners generally tend to update their rigs 70% (42 out of 60) as well
as clean them 52% (31 out of 60) but refrain from additional infras-
tructure costs like buying a UPS 23% (14 out of 60) as shown in the
Figure 8.7.
## 8.7 Mining software preference.
The choice of mining software impacts mining profitability as well as
the number of shares that are donated to the developer (if any).
As described in the Chapter 7.2, most popular mining software
falls into open source with great moderation regarding code updates
from the crypto community in general. This follows results from the
dataset where XMR Stak project, that is the most active on Github, is
also the most preferred way to run the mining operation 78% (47 out
of 60 miners).
XMRig is used less 30% (18 out of 60), but more often in combination
with other mining software like previously mentioned XMR Stak.
From closed source miners, only MinerGate was mentioned 3% (2
out of 60). A small portion of miners also solo mine 12% (7 out of 60)
using the official wallet software.
In general, miners in the dataset tend to mine in pools 83% (50 out
of 60), some of them try to combine mining approaches where the
primary way of obtaining the coins is by pool mining, but they also
try their luck with solo mining 13% (8 out of 60). True solo miner was
represented by only one specimen.
Pool choice
Pool choice itself has the biggest impact on the final payout for the
miner as described in the Chapter 7.1. This depends on the method of
reward distribution, total hashrate of the pool and minimal payout.
Note that often pools also have fees which are deducted from the
number of coins mined by the miner.
When asked about pool preferences, two larger mining pools
were often mentioned Monerooceanstream 23% (14 out of 60) and
nanopool.org 23% (14 out of 60). Important preference factors for
choosing pool were pool fees 87% (52 out of 60), pool security history
77% (46 out of 60), total hashrate 73% (44 out of 60) and minimal
payout 62%(37 out of 60). Least important are additional features to
the pool like mobile apps 23% (14 out of 60) or anti-botnet policy 35%
(21 out of 60).
Windows platform
Out of 60 miners in the dataset, 39 of them use Windows as their choice
of OS for mining. Regarding periodic updates, only a small part of
miners 26% (10 out of 39) tend to use Windows with its default update
settings (automatic restart of the OS to apply updates, unattended
driver updates).
Majority of Windows miners 59% (23 out of 39) tend to apply
updates after some time after their release and have remote access
enabled. There is also a part of miners in the dataset 28% (11 out of
39) that tend to “set up and forget” with Windows update completely
disabled. Setup preferences are shown in the Figure 8.8.
## 8.8 Windows mining setup preferences.
Linux platform
While Linux is used by 33 out of 60 miners, the majority of them tend
to use Ubuntu 52% (17 out of 33) or Debian 33% (11 out of 33). The
specialized OS for mining - MineOS is used by six users, least use has
community derivate from RHEL, CentOS.
Although information about update frequency was not submitted
by all miners, many of them 42% (14 out of 33) manage updates
manually, with only a small portion of other miners 18% (6 out of 33)
having the process automated.
Remote management is represented mainly by SSH 67% (22 out of
33) followed by VNC 9% (3 out of 33) and TeamViewer 9% (3 out of
33). Automation tools are used only by 13 miners from the dataset.
Demographics
Survey participants were mainly males 83% (50 out of 60), females
3% (2 out of 60) represented only a small portion of the dataset and
some of the participants did not disclose their gender 13% (8 out of
60). Most respondents in the dataset were from the age groups 25-34
55% (33 out of 60) followed by 35-44 age group 20% (12 out of 60) as
well as 18-24 18% (11 out of 60).

View File

@ -0,0 +1,527 @@
---
layout: post
title: Designing Secure Mining Environment
subtitle: Miners and Mining Operations
tags: [mining,xmr-stak,monero]
gh-badge: [star, fork, follow]
---
The goal of this Chapter is to design and develop secure and reason-
ably easy way how to set up and run mining operations on any scale.
Inspired by both results from the Monero Miners Research as well as
industry standards of large scale IT operations, the main emphasis is
placed on the automation and security aspect of the whole system.
Repository containing all the code from this Chapter is publicly
available in the GitHub repository mentioned in the Appendix Figure
A. Video showing the implementation of the system can be found in
the Section 9.5.
### 9.1 Automation
Automation is a key aspect for designing and running IT operations
that are secure, up-to-date, scalable and easy to maintain. To do that,
the proposed mining node provisioning scheme is divided into two
parts, first being OS installation with early configuration and second
is the automated configuration of provisioned nodes using Ansible.
Workflow is described in the Figure 9.1.
## 9.1 Deployment nodes workflow.
### 9.2 Ansible introduction
Ansible is an IT automation engine that in this case is used for config-
uration and application management of local mining nodes [69].
Playbook is a YAML formatted file that provides the declaration of
hosts and plays that are executed when running the playbook.
Hosts file declares connection information about hosts, e.g., IP and
login credentials.
**ansible-playbook -i hosts xmr01.yml** is a CLI command that exe-
cutesxmr01.ymlplaybook file and takes connection information about
hosts and groups involved from thehostsfile.
### 9.3 Linux-based solution
**9.3.1 Kickstart installation media**
To easily scale the mining operation, every bit of the software provi-
sioning has to be automated. This part describes a process of creating
automated CentOS 7 or RHEL 7 installation media with minimal pack-
age installation without GUI.
The first step is to obtain installation media at https://www.ce
ntos.org/download/. After downloading the Minimal ISO version,
extract the iso file into a separate folder. From there navigate to the
isolinuxfolder and editisolinux.cfgconfiguration file.
For reference,CentOS-7-x8664-Minimal-1804.isowas used in
the following steps.
Isolinux.cfg file
Four changes are needed to get the installation process working:
- timeoutproperty changed from 600 to 50 (seconds * 10).
- Change the boot menu to go straight for the install.
- Edit paths for the custom ISO image.
- Add kickstart file entry.
<pre>
<@\textcolor{blue}{timeout 50}@>
# only relevant part of the file is displayed
label linux
menu_label ^Install CentOS 7
<@\textcolor{blue}{menu_default}@>
kernel vmlinuz
append initrd=initrd.img <@\textcolor{blue}{inst.ks=hd:LABEL=CENTOS:/
ks/ks.cfg inst.stage2=hd:LABEL=CENTOS}@> quiet
</pre>
## 9.2 Customised installator entry.
The kickstart file is a single file that contains all OS installation param-
eters for RHEL based operating systems [70]. This installation method
enables automated provisioning of machines without the need for
the administrator input. When the file is presented to the installer, it
reads the required parameters resulting in the unattended installation
process [71].
The created kickstart file for CentOS 7 mining installation media
is available in the Appendix Figure F.1.
**9.3.3 Generating ISO**
The specific process of packaging extracted CentOS installation media
back into the iso file varies by the used operating system. In both
mentioned scenarios, few specific parameters have to be set:
- Boot image file/isolinux/isolinux.bin
- Updated boot information table
- Volume label for ISO9660 and UDF set toCENTOS(depends on
the configuration that is set in theisolinux.cfgfile).
Once files are prepared, packaging into the iso at Linux is done by
one-liner command:
mkisofs -o centos7.iso -b isolinux.bin -c boot.cat
-no-emul-boot -V CENTOS -boot-load-size 4 -boot-info-table
-R -J -v -T isolinux/.
After installation from the ISO that was prepared with the kickstart file,
the target machine is accepting SSH connections under root account
using password-based authentification. Without proper configuration,
this would leave machine open to brute force attempts for the root
account.
Ansible uses following set of files to provision mining nodes with
software and configuration:
<pre>
/
xmr01.yml
hosts
ansible.cfg
roles/
ansible-sw-common-apps
ansible-sw-firewalld
ansible-sw-ntp
ansible-sw-postfix
ansible-sw-sshsec
ansible-sw-xmrstak
ansible-sys-hostname
ansible-user-add
ansible-yum-cron
ansible-yum-update
</pre>
## 9.4 Ansible prepared roles.
- Xmr01.ymlrepresents a playbook file that defines what group
of nodes will be provisioned together with the list of roles that
will be applied to them.
Hostsfile contains groups of hosts with information on how
Ansible can connect to them.
- Ansible.cfgwas used only in the testing environment where
host key checking was disabled.
- Rolesfolder contains roles that are applied when running the
playbook.
To make Linux mining nodes updated and secure, following roles
were written:
ansible-sw-common-apps
The common baseline for all mining nodes that consists of the follow-
ing tasks:
1. Ensure EPEL (Extra Packages for Enterprise Linux) repository
is configured or install it.
2. Install the following packages:htop, rsync, screen, tmux,
iftop, iotop, nano, git, wget, unzip, mc.
ansible-sw-firewalld
Installs and enables the firewalld service that has default policy for
connections set to thepublic networkand accepts incoming connec-
tions only for SSH service.
ansible-sw-ntp
To report correct information through the web interface of the mining
software, the target machine has to be in sync with NTP servers to do
that role establishes the following:
1. Packagentpdateinstalled from the CentOS repository.
2. Ensures correct timezone usingtimedatectlinterface.
3. Creates daily cronjob for synchronization of system time.
ansible-sw-postfix
Sets up email gateway for correct email delivery together with internal
mail aliases mapped to a single outbound address. Email gateway can
deliver email on its own to the recipients server or can also act as a
relay to Gmail account that is used for sending out emails.
Using Gmail account is preferred as this solution is an Internet
Service Provider (ISP) agnostic (blocked SMTP and SSMTP commu-
nication for outbound connections at the ISP level would be a problem
for the gateway mode).
Separate Gmail account for sending out email alerts is recom-
mended as Postfix has login credentials saved in/etc/postfix/sasl
passwdfile in plaintext [70]. This can be made more secure if the
credentials file has appropriate permissions, e.g., ownership set to
root, the group to wheel and chmod changed to 0600.
ansible-sw-sshsec
Takes care about incoming SSH connections in case somebody wants
to try brute force attack on the mining machine. After a predefined
amount of failed login attempts, the incoming IP address is put into
"jail".
Under the hood, fail2ban monitors sshd log for incoming failed
attempts and after certain threshold creates a firewalld rule to block
the IP for a predefined amount of time. The default setting for this
rule is relatively strict, 3 failed attempts in 10-hour window result in a
10-hour ban for incoming connections from the IP address.
This role is a fork ofansible-role-fail2banthat is available at
https://github.com/resmo/ansible-role-fail2ban.
ansible-sw-xmrstak
Installs software collectionscentos-release-sclpackage for CentOS
together withcmake3, devtoolset-4-gcc*, hwloc-devel, make,
libmicrohttpd-devel, openssl-develpackages used for compiling
XMR-Stak from source code.
After that, the folder structure inside the non-privileged user ac-
count is created, and XMR-Stak repository is cloned into the user di-
rectory. With appropriate permissions set, cmake compiles the source
code with following flags:cmake3 .. -DCPUENABLE=ON -DCUDA ENABLE=
OFF -DOpen CLENABLE=OFFresulting in CPU only miner for CentOS
[72].
If the mining node would use GPU, appropriate drivers from AMD
or Nvidia website are a prior requirement for running the miner. As
GPU feature is only a flag, it can be enabled on demand in the play-
book file as cmake3 flags are set as variables in the tasks file of the
ansible-sw-xmrstakrole in the Jinja2 format:
cmake3 .. -DCPUENABLE={{ DCPUENABLE }} -DCUDA ENABLE={{
DCUDAENABLE }} -DOpenCLENABLE={{ DOpenCLENABLE }}
As next step, role copies over to the node CPU, pool and miner
configuration and creates a crontab entry for automatic miner start.
For the final touch, HugePages are set tovm.nrhugepages=128in/
etc/sysctl.conffor CPU mining memory allocation, and sysctl is
reloaded.
ansible-sys-hostname
Changes system hostname to inventory hostname set inhostsfile
usinghostnamectlAnsible module.
ansible-user-add
User-add-roleis used for creating the mining user that is not within
the wheel group (unprivileged user).
ansible-yum-cron
Installs and configures automatic security updates for CentOS that
are daily checked against the online repository. If packages marked
for security update are found, email notification to root is sent [73].
ansible-yum-update
All packages including kernel are updated so that mining node is ready
to use and wont send update notification on the next day (unless there
are new updates in the meantime).
Additional notes
Roles are installed in the order specified in thexmr01.ymlfile as sys-
tem update is done as first to prevent any problems with XMR-Stak
compilation.
Using root account login on SSH is not recommended as the proper
way would be to disable root login in/etc/sshdconfigand login to
SSH using created non-privileged user account (ideally using ssh-key
based authentification).
Later if the user needs to login as user, this can be done bysu root
command. To minimize the chance of success brute force attack of the
root account using SSH, fail2ban is set to strict mode. Although this is
not the most secure way to access the system, with above settings this
acts as a middle ground between security and usability of the mining
operation.
### 9.4 Windows-based solution
9.4.1 Installation media
For Windows scenario, Windows 10 image from autumn 2018 was
used. As installation is intended to run unattended, custom media has
to be created.
There are many ways how to provision changes to original Win-
dows media, most straightforward is generating anautounattend.xml
file that covers all installation steps for Windows 10 installer.
This process of Windows image customization can be done using
Windows Assessment and Deployment Kit (Windows ADK) as it
includes Windows System Image Manager (Windows SIM) that is
an authoring tool forautounattend.xmlfiles. Using Windows ADK,
more complex Windows deployment can be achieved as the adminis-
trator can bundle applications and drivers in the image [74].
For this guide, generatingautounattend.xmlfile is based on on-
line autounattend generator tool located atwindowsafg.com. After
generating the file, a block of commands that is executed after the first
logon was added.
<pre>
<SynchronousCommand wcm:action=add>
<CommandLine>powershellCommand SetItemPropertyPath
HKLM:\SOFTWARE\Wow6432Node\Microsoft\ .NetFramework\v4.0.30319
Name SchUseStrongCryptoValue 1Type DWord</CommandLine>
<Description>Set PowerShell ExecutionPolicy</Description>
<Order>42</Order>
<RequiresUserInput>true</RequiresUserInput>
</SynchronousCommand>
</pre>
## 9.5 .NetFramework adjustments in the Autounattend file.
For example, .NetFramework in Windows 10 doesnt have strong
cryptography enabled for all .Net applications. Due to this, in the
default state, Powershell cant be used for downloading updated code
that is required for setting up the environment for Ansible. To fix that,
one of the commands after the first logon is dedicated to this issue as
shown in the Figure 9.5.
After finishing the installation process and provisioning the Win-
dows environment with<FirstLogonCommands>included in the unat-
tended file, Ansible can connect to the Windows machine and set up
thing properly.
Note that installer opens RDP, WinRM, temporarily disables Win-
dows Firewall (which will be properly configured by Ansible later)
and sets up self-signed WinRM HTTPS certificate using Ansible Power-
shell fileConfigureRemotingForAnsible.ps1[75]. Mining node has
to be connected to the network to download all required files properly.
9.4.2 Ansible at Windows
Before applying roles in Ansible for Windows, unlike in Ansible with
Linux machines, environment for both Windows and Linux controller
has to be prepared [76].
**Windows** needs to have WinRM setup. This is already done as it
was part of the installation process where Ansible Powershell script
set up HTTPS WinRM environment [77].
**Linux** doesnt have Ansible modules for Windows in default An-
sible install. Those can be installed using the package manager, e.g.:
- Ubuntu:
**-** Python 2: apt-get install python-winrm
**-** Python 3: apt-get install python3-winrm
- CentOS:
**-** With EPEL enabled: yum install python2-winrm
- Or using PIP:
**-** pip install pywinrm
9.4.3 Ansible roles
Once Ansible is ready to launchxmratwin.ymlplaybook, the following
roles are played:
9. Designing Secure Mining Environment
<pre>
/
xmratwin.yml
hosts
ansible.cfg
roles/
ansible-win-sec
ansible-win-updates
ansible-win-xmrstak
</pre>
## 9.6 Ansible roles for Windows.
ansible-win-sec
Sets up firewall rules for RDP, WinRM and XMR-Stak web interface,
enables Windows firewall for all zones.
ansible-win-updates
Windows update policy is set to download and notify for install as
Windows updates are managed by this Ansible role.
The administrator can configure which updates category will be in-
cluded in the updates, in default role install updates fromSecurityUpdates
andCriticalUpdatescategory [77]. This can be changed using vari-
ableUpdateEverythingin the playbook.
ansible-win-xmrstak
Downloads latest release of XMR-Stak from developers GitHub page,
configures mining software and downloads required libraries from
Microsoft site. It also creates scheduled task under the mining user
to run with elevated permissions after login so that UAC can be kept
enabled and the miner is running without UAC prompts.
Also adds the exception in Windows Defender to ignore Desktop
folder as a binary XMR-Stak file is considered as a malicious file for
being a mining software.
9. Designing Secure Mining Environment
### 9.5 Automated installation process
In order to show automated installation process for both Windows
and Linux miners, both installation processes were recorded using
HDMI capture card and Open Broadcaster Software (OBS). Timeline
detailing installation process is available in the Figures 9.7 and 9.9.
Video is available athttps://github.com/Ownercz/ssme-thesi
s/blob/master/video.md.
<pre>
00:20 ······• Start of unattended Windows installation using the
autounattend file.
05:35 ······• Install part complete, OS first boot.
```
```
11:07 ······• Windows 10 installation complete.
```
```
11:15 ······• Running Ansible playbook on the Windows machine.
```
```
13:38 ······• Ansible completes miner deployment and reboots
the machine.
```
#### 15:17 ······•
```
Ansible sets up firewall, Windows environment and
reboots the machine. Miner is already running
because of scheduled task after reboot.
```
```
17:18 ······• Ansible updates the OS using Windows update
module.
```
```
55:24 ······•
Ansible reboots the machine to complete the
updates.
```
#### 57:25 ······•
```
Ansible completes the playbook and mining machine
is ready.
```
</pre>
## 9.7 Automated deployment of Windows mining machine.
## 9.8 Windows miner deployment.
Both installations were done using USB drive as installation source.
Hardware specifications of the installation computer were CPU Intel
i5 4460, 24GB of DDR3 RAM and target installation drive was 60GB
Intel 330 SATA SSD.
<pre>
#### 00:46 ······•
```
Start of unattended Linux CentOS 7 installation
using the kickstart file.
```
```
05:06 ······• Install part complete, OS first boot.
```
```
05:06 ······• Running Ansible playbook on the Linux machine.
```
#### 11:29 ······•
```
Ansible completes the playbook and mining machine
is ready.
```
</pre>
## 9.9 Automated deployment of Linux mining machine.
## 10 Conclusion
Monero cryptocurrency is a large and active project that offers a wide
range of applications for both users and miners. For its open-source
nature, everyone can build their own wallet software, miner or even
a website that provides wallet and key management. Because of this,
many good, but also potentially malicious applications are released to
the public.
The goal of this thesis is to map usage habits of Monero cryptocur-
rency users and miners from both technological as well as security
view. Another goal is to create a detailed user guideline for user-
friendly and secure usage of the Monero cryptocurrency including
key management and backup strategy. For miners, the goal is to im-
plement an automated deployment of mining rigs using one of the
popular configuration management tools.
To address this issue, the thesis provides a detailed overview of
Monero environment, comparison of wallet client software and ex-
changes, comparison of mining software and list of malicious events
and software connected with Monero cryptocurrency.
For a deeper investigation of the listed issues, I have conducted
surveys aimed at Monero users and miners. With 173 (113 in users
and 60 in miners survey) respondents in total, this provides a real
Monero users sample upon which two guidelines were proposed.
Results of Monero User Research follow the way how participants
were selected (by self-selection) as well as the sites they came from
(Reddit, Facebook cryptocurrency groups). That meant that the ma-
jority of users said they prefer Linux OS with official wallet software
and also that they tend to use open-source more than closed-source
software. Only a few of them used closed-source apps or website por-
tals that can be labeled as dangerous for the user. Contrary to popular
belief, respondents revealed that they use Monero for darknet markets
only in 18% (20 out of 113), in case of drugs in 10% (11 out of 113)
and for other illegal use cases in 5% (6 out of 113).
Based on the results of the research, I formulated Monero usage
and storage best practices part of the thesis, which gives users detailed
steps on how to work with the Monero cryptocurrency.
Monero Miners Research revealed that both Windows and Linux
mining operations are set up using manual deployment and updates
are usually disabled or delayed. Mining software was in almost all
cases open-source with XMR Stak being used the most.
Based on the results from the Monero Miners Research, I imple-
mented an automated deployment system for both major platforms
using unattended/kickstart installation media and Ansible. By using
application deployment and configuration management tool like An-
sible, miners can deploy large mining operations with correct security
settings that are both secure and easy to maintain.
As for the future work on this topic, it would be appropriate
to extend current research to include other cryptocurrencies (Dash,
Ethereum or Bitcoin) as well as the deployment of their miners.
To make results from this thesis more open to the public, every-
thing is published under the GitHub repository and GitHub pages
website. Website links are available in the Appendix Figure A.

View File

@ -1,16 +0,0 @@
---
layout: page
title: About me
subtitle: Why you'd want to go on a date with me
---
My name is Inigo Montoya. I have the following qualities:
- I rock a great mustache
- I'm extremely loyal to my family
What else do you need?
### my history
To be honest, I'm having some trouble remembering right now, so why don't you just watch [my movie](http://en.wikipedia.org/wiki/The_Princess_Bride_%28film%29) and it will answer **all** your questions.

BIN
images/cryptojacking.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 48 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 84 KiB

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,231 @@
%%
%% This is file `beamerthemefibeamer.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% fibeamer.dtx (with options: `class')
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
{\def\fibeamer@versiondef#1#2{
\gdef\fibeamer@version@number{#1}
\gdef\fibeamer@version@date{#2}
\gdef\fibeamer@version{#2 #1 fibeamer MU beamer theme}}
\fibeamer@versiondef{v1.1.5}{2016/06/16}}
\hypersetup{%
pdfcreator=\fibeamer@version,
pdfencoding=auto}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\ProvidesPackage{fibeamer/beamerthemefibeamer}[\fibeamer@version]
\newif\iffibeamer@fonts
\DeclareOptionBeamer{fonts}{\fibeamer@fontstrue}
\ExecuteOptionsBeamer{fonts}
\DeclareOptionBeamer{nofonts}{\fibeamer@fontsfalse}
\newif\iffibeamer@microtype
\DeclareOptionBeamer{microtype}{\fibeamer@microtypetrue}
\ExecuteOptionsBeamer{microtype}
\DeclareOptionBeamer{nomicrotype}{\fibeamer@microtypefalse}
\DeclareOptionBeamer{university}{\def\fibeamer@university{#1}}
\ExecuteOptionsBeamer{university=mu}
\DeclareOptionBeamer{faculty}{\def\fibeamer@faculty{#1}}
\ExecuteOptionsBeamer{faculty=fi}
\def\fibeamer@locale{%
% Babel / polyglossia detection
\ifx\languagename\undefined%
english\else\languagename\fi}
\DeclareOptionBeamer{locale}{%
\def\fibeamer@locale{#1}}
\def\fibeamer@logoLocale{\fibeamer@locale}
\DeclareOptionBeamer{logoLocale}{%
\def\fibeamer@logoLocale{#1}}
\DeclareOptionBeamer{basePath}{%
\ifx\fibeamer@empty#1\fibeamer@empty%
\def\fibeamer@basePath{}%
\else%
\def\fibeamer@basePath{#1/}%
\fi}
\ExecuteOptionsBeamer{basePath=fibeamer}
\def\fibeamer@subdir#1#2#3#4\empty{%
\ifx#1\empty% <empty> -> <basePath>
\fibeamer@basePath
\else
\if#1/%
\ifx#2\empty% / -> /
/%
\else% /<path> -> /<path>/
#1#2#3#4/%
\fi
\else
\if#1.%
\ifx#2\empty% . -> ./
./%
\else
\if#2.%
\ifx#3\empty% .. -> ../
../%
\else
\if#3/% ../<path> -> ../<path>/
../#4/%
\else
\fibeamer@basePath#1#2#3#4/%
\fi
\fi
\else
\if#2/% ./<path> -> ./<path>/
./#3#4/%
\else
\fibeamer@basePath#1#2#3#4/%
\fi
\fi
\fi
\else
\fibeamer@basePath#1#2#3#4/%
\fi
\fi
\fi}
\DeclareOptionBeamer{themePath}{%
\def\fibeamer@themePath{\fibeamer@subdir#1%
\empty\empty\empty\empty}}
\ExecuteOptionsBeamer{themePath=theme}
\DeclareOptionBeamer{logoPath}{%
\def\fibeamer@logoPath{\fibeamer@subdir#1%
\empty\empty\empty\empty}}
\ExecuteOptionsBeamer{logoPath=logo/\fibeamer@university}
\DeclareOptionBeamer{logo}{\def\fibeamer@logo{#1}}
\ExecuteOptionsBeamer{%
logo=\fibeamer@logoPath fibeamer-\fibeamer@university-%
\fibeamer@faculty-\fibeamer@logoLocale}
\DeclareOptionBeamer{fallbackLogo}{\def\fibeamer@fallbackLogo{#1}}
\def\fibeamer@fallbackLogo{%
\fibeamer@logoPath fibeamer-\fibeamer@university-%
\fibeamer@faculty-english}
\def\fibeamer@require#1{\IfFileExists{#1.sty}{%
\@ifpackageloaded{#1}{}{\RequirePackage{#1}}}{}}
\def\fibeamer@requireTheme#1{%
\fibeamer@require{\fibeamer@themePath beamer#1themefibeamer}
\fibeamer@require{\fibeamer@themePath\fibeamer@university%
/beamer#1themefibeamer-\fibeamer@university}
\fibeamer@require{\fibeamer@themePath\fibeamer@university%
/beamer#1themefibeamer-\fibeamer@university-\fibeamer@faculty}}
\fibeamer@require{etoolbox}
\newcommand\fibeamer@includeLogo[1][]{{
% See <http://tex.stackexchange.com/a/39987/70941>.
\patchcmd{\Gin@ii}% Make `\includegraphics` use `@fallbackLogo`.
{\begingroup}% <search>
{\begingroup\renewcommand{\@latex@error}[2]{%
\includegraphics[#1]\fibeamer@fallbackLogo}}% <replace>
{}% <success>
{}% <failure>
\includegraphics[#1]\fibeamer@logo}}
\def\fibeamer@patch#1#2{%
\def\fibeamer@patch@versions{#1}%
\def\fibeamer@patch@action{#2}%
\def\fibeamer@patch@next##1,{%
\def\fibeamer@patch@arg{##1}%
\def\fibeamer@patch@relax{\relax}%
\ifx\fibeamer@patch@arg\fibeamer@version@number
\def\fibeamer@patch@next####1\relax,{}%
\expandafter\fibeamer@patch@action
\expandafter\fibeamer@patch@next
\else\ifx\fibeamer@patch@arg\fibeamer@patch@relax\else
\expandafter\expandafter\expandafter\fibeamer@patch@next
\fi\fi}%
\expandafter\expandafter\expandafter\fibeamer@patch@next
\expandafter\fibeamer@patch@versions\expandafter,\relax,}
\ProcessOptionsBeamer
% Set up the microtypographic extensions
\iffibeamer@microtype
\RequirePackage{microtype}
\fi
\mode<presentation>
% Set up the fonts
\iffibeamer@fonts
\RequirePackage{ifthen}
\RequirePackage{ifxetex}
\RequirePackage{ifluatex}
\RequirePackage{lmodern}
\RequirePackage[sfdefault,lf]{carlito}
\renewcommand*\oldstylenums[1]{{\carlitoOsF #1}}
%% Load arev with scaling factor of .85
%% See <http://tex.stackexchange.com/a/181240/70941>
\DeclareFontFamily{OML}{zavm}{\skewchar\font=127 }
\DeclareFontShape{OML}{zavm}{m}{it}{<-> s*[.85] zavmri7m}{}
\DeclareFontShape{OML}{zavm}{b}{it}{<-> s*[.85] zavmbi7m}{}
\DeclareFontShape{OML}{zavm}{m}{sl}{<->ssub * zavm/m/it}{}
\DeclareFontShape{OML}{zavm}{bx}{it}{<->ssub * zavm/b/it}{}
\DeclareFontShape{OML}{zavm}{b}{sl}{<->ssub * zavm/b/it}{}
\DeclareFontShape{OML}{zavm}{bx}{sl}{<->ssub * zavm/b/sl}{}
\AtBeginDocument{
\SetSymbolFont{operators} {normal}{OT1}{zavm}{m}{n}
\SetSymbolFont{letters} {normal}{OML}{zavm}{m}{it}
\SetSymbolFont{symbols} {normal}{OMS}{zavm}{m}{n}
\SetSymbolFont{largesymbols}{normal}{OMX}{iwona}{m}{n}}
\RequirePackage[sans]{dsfont}
\ifthenelse{\boolean{xetex}\OR\boolean{luatex}}{
\RequirePackage{fontspec}
\setmonofont[Scale=0.85,Ligatures=TeX]{DejaVu Sans Mono}
}{
\usepackage[scaled=0.85]{DejaVuSansMono}
\RequirePackage[resetfonts]{cmap}
\RequirePackage[T1]{fontenc}
}
\RequirePackage{setspace}
\setstretch{1.15}
\fi
\mode
<all>
\fibeamer@requireTheme{color}
\fibeamer@requireTheme{font}
\fibeamer@requireTheme{inner}
\fibeamer@requireTheme{outer}
\endinput
%%
%% End of file `beamerthemefibeamer.sty'.

View File

@ -0,0 +1,398 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% I, the copyright holder of this work, release this work into the
%% public domain. This applies worldwide. In some countries this may
%% not be legally possible; if so: I grant anyone the right to use
%% this work for any purpose, without any conditions, unless such
%% conditions are required by law.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\documentclass{beamer}
\usetheme[faculty=fi]{fibeamer}
\usepackage{polyglossia} %% By using `czech` or `slovak` as the
\setmainlanguage{english} %% main locale instead of `english`, you
%% can typeset the presentation in either Czech or Slovak,
%% respectively.
\setotherlanguages{czech, slovak} %% The additional keys allow
%%
%% \begin{otherlanguage}{czech} ... \end{otherlanguage}
%% \begin{otherlanguage}{slovak} ... \end{otherlanguage}
%%
%% These macros specify information about the presentation
\title{Presentation Title} %% that will be typeset on the
\subtitle{Presentation Subtitle} %% title page.
\author{Author's Name}
%% These additional packages are used within the document:
\usepackage{ragged2e} % `\justifying` text
\usepackage{booktabs} % Tables
\usepackage{tabularx}
\usepackage{tikz} % Diagrams
\usetikzlibrary{calc, shapes, backgrounds}
\usepackage{amsmath, amssymb}
\usepackage{url} % `\url`s
\usepackage{listings} % Code listings
\frenchspacing
\begin{document}
\frame{\maketitle}
\AtBeginSection[]{% Print an outline at the beginning of sections
\begin{frame}<beamer>
\frametitle{Outline for Section \thesection}
\tableofcontents[currentsection]
\end{frame}}
\begin{darkframes}
\section{Dark Frames}
\subsection{Blind Text}
\begin{frame}{Jabberwocky}
\framesubtitle{Lewis Carroll}%
\begin{tikzpicture}[overlay,remember picture]
\node[anchor=south east,xshift=-30pt,yshift=35pt]
at (current page.south east) {
\includegraphics[width=35mm]{resources/jabberwocky-dark}
};
\end{tikzpicture}%
'Twas brillig, and the slithy toves\\
Did gyre and gimble in the wabe;\\
All mimsy were the borogoves,\\
And the mome raths outgrabe.\\\bigskip
“Beware the Jabberwock, my son!\\
The jaws that bite, the claws that catch!\\
Beware the Jubjub bird, and shun\\
The frumious Bandersnatch!”\\
\end{frame}
\begin{frame}[label=lists]{Lists and locales}
\framesubtitle{Lorem ipsum dolor sit amet}
\begin{columns}[onlytextwidth]
\column{.5\textwidth}
\begin{itemize}
\item Nulla nec lacinia odio. Curabitur urna tellus.
\begin{itemize}
\item Fusce id sodales dolor. Sed id metus dui.
\begin{itemize}
\item Cupio virtus licet mi vel feugiat.
\end{itemize}
\end{itemize}
\end{itemize}
\column{.5\textwidth}
\begin{enumerate}
\item Donec porta, risus porttitor egestas scelerisque video.
\begin{enumerate}
\item Nunc non ante fringilla, manus potentis cario.
\begin{enumerate}
\item Pellentesque servus morbi tristique.
\end{enumerate}
\end{enumerate}
\end{enumerate}
\end{columns}
\bigskip
\justifying
{\uselanguage{czech}Nechť již hříšné saxofony ďáblů
rozzvučí síň úděsnými tóny waltzu, tanga a quickstepu!}
{\uselanguage{slovak} Nezvyčajné kŕdle šťastných figliarskych
ďatľov učia pri kótovanom ústí Váhu mĺkveho koňa Waldemara
obžierať väč\-šie kusy exkluzívnej kôry.}
{\uselanguage{english}The quick, brown fox jumps over a lazy
dog. DJs flock by when MTV ax quiz prog. “Now fax quiz Jack!”}
\end{frame}
\subsection{Structuring Elements}
\begin{frame}[label=simmonshall]{Text blocks}
\framesubtitle{In plain, example, and \alert{alert} flavour}
\alert{This text} is highlighted.
\begin{block}{A plain block}
This is a plain block containing some \alert{highlighted text}.
\end{block}
\begin{exampleblock}{An example block}
This is an example block containing some \alert{highlighted text}.
\end{exampleblock}
\begin{alertblock}{An alert block}
This is an alert block containing some \alert{highlighted text}.
\end{alertblock}
\end{frame}
\begin{frame}[label=proof]{Definitions, theorems, and proofs}
\framesubtitle{All integers divide zero}
\begin{definition}
$\forall a,b\in\mathds{Z}: a\mid b\iff\exists c\in\mathds{Z}:a\cdot c=b$
\end{definition}
\begin{theorem}
$\forall a\in\mathds{Z}: a\mid 0$
\end{theorem}
\begin{proof}[Proof\nopunct]
$\forall a\in\mathds{Z}: a\cdot 0=0$
\end{proof}
\end{frame}
\subsection{Numerals and Mathematics}
\begin{frame}[label=math]{Numerals and Mathematics}
\framesubtitle{Formulae, equations, and expressions}
\begin{columns}[onlytextwidth]
\column{.20\textwidth}
1234567890
\column{.20\textwidth}
\oldstylenums{1234567890}
\column{.20\textwidth}
$\hat{x}$, $\check{x}$, $\tilde{a}$,
$\bar{a}$, $\dot{y}$, $\ddot{y}$
\column{.40\textwidth}
$\int \!\! \int f(x,y,z)\,\mathsf{d}x\mathsf{d}y\mathsf{d}z$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.5\textwidth}
$$\frac{1}{\displaystyle 1+
\frac{1}{\displaystyle 2+
\frac{1}{\displaystyle 3+x}}} +
\frac{1}{1+\frac{1}{2+\frac{1}{3+x}}}$$
\column{.5\textwidth}
$$F:\left| \begin{array}{ccc}
F''_{xx} & F''_{xy} & F'_x \\
F''_{yx} & F''_{yy} & F'_y \\
F'_x & F'_y & 0
\end{array}\right| = 0$$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.3\textwidth}
$$\mathop{\int \!\!\! \int}_{\mathbf{x} \in \mathds{R}^2}
\! \langle \mathbf{x},\mathbf{y}\rangle\,\mathsf{d}\mathbf{x}$$
\column{.33\textwidth}
$$\overline{\overline{a\alpha}^2+\underline{b\beta}
+\overline{\overline{d\delta}}}$$
\column{.37\textwidth}
$\left] 0,1\right[ + \lceil x \rfloor - \langle x,y\rangle$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.4\textwidth}
\begin{eqnarray*}
e^x &\approx& 1+x+x^2/2! + \\
&& {}+x^3/3! + x^4/4!
\end{eqnarray*}
\column{.6\textwidth}
$${n+1\choose k} = {n\choose k} + {n \choose k-1}$$
\end{columns}
\end{frame}
\subsection{Figures and Code Listings}
\begin{frame}[label=figs1]{Figures}
\framesubtitle{Tables, graphs, and images}
\begin{table}[!b]
{\carlitoTLF % Use monospaced lining figures
\begin{tabularx}{\textwidth}{Xrrr}
\textbf{Faculty} & \textbf{With \TeX} & \textbf{Total} &
\textbf{\%} \\
\toprule
Faculty of Informatics & 1\,716 & 2\,904 &
59.09 \\% 1433
Faculty of Science & 786 & 5\,275 &
14.90 \\% 1431
Faculty of $\genfrac{}{}{0pt}{}{\textsf{Economics and}}{%
\textsf{Administration}}$ & 64 & 4\,591 &
1.39 \\% 1456
Faculty of Arts & 69 & 10\,000 &
0.69 \\% 1421
Faculty of Medicine & 8 & 2\,014 &
0.40 \\% 1411
Faculty of Law & 15 & 4\,824 &
0.31 \\% 1422
Faculty of Education & 19 & 8\,219 &
0.23 \\% 1441
Faculty of Social Studies & 12 & 5\,599 &
0.21 \\% 1423
Faculty of Sports Studies & 3 & 2\,062 &
0.15 \\% 1451
\bottomrule
\end{tabularx}}
\caption{The distribution of theses written using \TeX\ during 2010--15 at MU}
\end{table}
\end{frame}
\begin{frame}[label=figs2]{Figures}
\framesubtitle{Tables, graphs, and images}
\begin{figure}[b]
\centering
% Flipping a coin
% Author: cis
\tikzset{
head/.style = {fill = none, label = center:\textsf{H}},
tail/.style = {fill = none, label = center:\textsf{T}}}
\scalebox{0.65}{\begin{tikzpicture}[
scale = 1.5, transform shape, thick,
every node/.style = {draw, circle, minimum size = 10mm},
grow = down, % alignment of characters
level 1/.style = {sibling distance=3cm},
level 2/.style = {sibling distance=4cm},
level 3/.style = {sibling distance=2cm},
level distance = 1.25cm
]
\node[shape = rectangle,
minimum width = 6cm, font = \sffamily] {Coin flipping}
child { node[shape = circle split, draw, line width = 1pt,
minimum size = 10mm, inner sep = 0mm, rotate = 30] (Start)
{ \rotatebox{-30}{H} \nodepart{lower} \rotatebox{-30}{T}}
child { node [head] (A) {}
child { node [head] (B) {}}
child { node [tail] (C) {}}
}
child { node [tail] (D) {}
child { node [head] (E) {}}
child { node [tail] (F) {}}
}
};
% Filling the root (Start)
\begin{scope}[on background layer, rotate=30]
\fill[head] (Start.base) ([xshift = 0mm]Start.east) arc (0:180:5mm)
-- cycle;
\fill[tail] (Start.base) ([xshift = 0pt]Start.west) arc (180:360:5mm)
-- cycle;
\end{scope}
% Labels
\begin{scope}[nodes = {draw = none}]
\path (Start) -- (A) node [near start, left] {$0.5$};
\path (A) -- (B) node [near start, left] {$0.5$};
\path (A) -- (C) node [near start, right] {$0.5$};
\path (Start) -- (D) node [near start, right] {$0.5$};
\path (D) -- (E) node [near start, left] {$0.5$};
\path (D) -- (F) node [near start, right] {$0.5$};
\begin{scope}[nodes = {below = 11pt}]
\node [name = X] at (B) {$0.25$};
\node at (C) {$0.25$};
\node [name = Y] at (E) {$0.25$};
\node at (F) {$0.25$};
\end{scope}
\end{scope}
\end{tikzpicture}}
\caption{Tree of probabilities -- Flipping a coin\footnote[frame]{%
A derivative of a diagram from \url{texample.net} by cis, CC BY 2.5 licensed}}
\end{figure}
\end{frame}
\defverbatim[colored]\sleepSort{
\begin{lstlisting}[language=C,tabsize=2]
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/wait.h>
// This is a comment
int main(int argc, char **argv)
{
while (--c > 1 && !fork());
sleep(c = atoi(v[c]));
printf("%d\n", c);
wait(0);
return 0;
}
\end{lstlisting}}
\begin{frame}{Code listings}{An example source code in C}
\sleepSort
\end{frame}
\subsection{Citations and Bibliography}
\begin{frame}[label=citations]{Citations}
\framesubtitle{\TeX, \LaTeX, and Beamer}
\justifying\TeX\ is a programming language for the typesetting
of documents. It was created by Donald Erwin Knuth in the late
1970s and it is documented in \emph{The \TeX
book}~\cite{knuth84}.
In the early 1980s, Leslie Lamport created the initial version
of \LaTeX, a high-level language on top of \TeX, which is
documented in \emph{\LaTeX : A Document Preparation
System}~\cite{lamport94}. There exists a healthy ecosystem of
packages that extend the base functionality of \LaTeX;
\emph{The \LaTeX\ Companion}~\cite{MG94} acts as a guide
through the ecosystem.
In 2003, Till Tantau created the initial version of Beamer, a
\LaTeX\ package for the creation of presentations. Beamer is
documented in the \emph{User's Guide to the Beamer
Class}~\cite{tantau04}.
\end{frame}
\begin{frame}[label=bibliography]{Bibliography}
\framesubtitle{\TeX, \LaTeX, and Beamer}
\begin{thebibliography}{9}
\bibitem{knuth84}
Donald~E.~Knuth.
\emph{The \TeX book}.
Addison-Wesley, 1984.
\bibitem{lamport94}
Leslie~Lamport.
\emph{\LaTeX : A Document Preparation System}.
Addison-Wesley, 1986.
\bibitem{MG94}
M.~Goossens, F.~Mittelbach, and A.~Samarin.
\emph{The \LaTeX\ Companion}.
Addison-Wesley, 1994.
\bibitem{tantau04}
Till~Tantau.
\emph{User's Guide to the Beamer Class Version 3.01}.
Available at \url{http://latex-beamer.sourceforge.net}.
\bibitem{MS05}
A.~Mertz and W.~Slough.
Edited by B.~Beeton and K.~Berry.
\emph{Beamer by example} In TUGboat,
Vol. 26, No. 1., pp. 68-73.
\end{thebibliography}
\end{frame}
\end{darkframes}
\section{Light Frames}
\subsection{Blind Text}
\begin{frame}{Jabberwocky}
\framesubtitle{Lewis Carroll}%
\begin{tikzpicture}[overlay,remember picture]
\node[anchor=south east,xshift=-30pt,yshift=35pt]
at (current page.south east) {
\includegraphics[width=35mm]{resources/jabberwocky-light}
};
\end{tikzpicture}%
'Twas brillig, and the slithy toves\\
Did gyre and gimble in the wabe;\\
All mimsy were the borogoves,\\
And the mome raths outgrabe.\\\bigskip
“Beware the Jabberwock, my son!\\
The jaws that bite, the claws that catch!\\
Beware the Jubjub bird, and shun\\
The frumious Bandersnatch!”\\
\end{frame}
\againframe{lists}
\subsection{Structuring Elements}
\againframe{simmonshall}
\againframe{proof}
\subsection{Numerals and Mathematics}
\againframe{math}
\subsection{Figures and Code Listings}
\againframe{figs1}
\againframe{figs2}
\defverbatim[colored]\sleepSort{
\begin{lstlisting}[language=C,tabsize=2]
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/wait.h>
// This is a comment
int main(int argc, char **argv)
{
while (--c > 1 && !fork());
sleep(c = atoi(v[c]));
printf("%d\n", c);
wait(0);
return 0;
}
\end{lstlisting}}
\begin{frame}{Code listings}{An example source code in C}
\sleepSort
\end{frame}
\subsection{Citations and Bibliography}
\againframe{citations}
\againframe{bibliography}
\end{document}

View File

@ -0,0 +1,401 @@
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% I, the copyright holder of this work, release this work into the
%% public domain. This applies worldwide. In some countries this may
%% not be legally possible; if so: I grant anyone the right to use
%% this work for any purpose, without any conditions, unless such
%% conditions are required by law.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\documentclass{beamer}
\usetheme[faculty=fi]{fibeamer}
\usepackage[utf8]{inputenc}
\usepackage[
main=english, %% By using `czech` or `slovak` as the main locale
%% instead of `english`, you can typeset the
%% presentation in either Czech or Slovak,
%% respectively.
czech, slovak %% The additional keys allow foreign texts to be
]{babel} %% typeset as follows:
%%
%% \begin{otherlanguage}{czech} ... \end{otherlanguage}
%% \begin{otherlanguage}{slovak} ... \end{otherlanguage}
%%
%% These macros specify information about the presentation
\title{Presentation Title} %% that will be typeset on the
\subtitle{Presentation Subtitle} %% title page.
\author{Author's Name}
%% These additional packages are used within the document:
\usepackage{ragged2e} % `\justifying` text
\usepackage{booktabs} % Tables
\usepackage{tabularx}
\usepackage{tikz} % Diagrams
\usetikzlibrary{calc, shapes, backgrounds}
\usepackage{amsmath, amssymb}
\usepackage{url} % `\url`s
\usepackage{listings} % Code listings
\frenchspacing
\begin{document}
\frame{\maketitle}
\AtBeginSection[]{% Print an outline at the beginning of sections
\begin{frame}<beamer>
\frametitle{Outline for Section \thesection}
\tableofcontents[currentsection]
\end{frame}}
\begin{darkframes}
\section{Dark Frames}
\subsection{Blind Text}
\begin{frame}{Jabberwocky}
\framesubtitle{Lewis Carroll}%
\begin{tikzpicture}[overlay,remember picture]
\node[anchor=south east,xshift=-30pt,yshift=35pt]
at (current page.south east) {
\includegraphics[width=35mm]{resources/jabberwocky-dark}
};
\end{tikzpicture}%
'Twas brillig, and the slithy toves\\
Did gyre and gimble in the wabe;\\
All mimsy were the borogoves,\\
And the mome raths outgrabe.\\\bigskip
“Beware the Jabberwock, my son!\\
The jaws that bite, the claws that catch!\\
Beware the Jubjub bird, and shun\\
The frumious Bandersnatch!”\\
\end{frame}
\begin{frame}[label=lists]{Lists and locales}
\framesubtitle{Lorem ipsum dolor sit amet}
\begin{columns}[onlytextwidth]
\column{.5\textwidth}
\begin{itemize}
\item Nulla nec lacinia odio. Curabitur urna tellus.
\begin{itemize}
\item Fusce id sodales dolor. Sed id metus dui.
\begin{itemize}
\item Cupio virtus licet mi vel feugiat.
\end{itemize}
\end{itemize}
\end{itemize}
\column{.5\textwidth}
\begin{enumerate}
\item Donec porta, risus porttitor egestas scelerisque video.
\begin{enumerate}
\item Nunc non ante fringilla, manus potentis cario.
\begin{enumerate}
\item Pellentesque servus morbi tristique.
\end{enumerate}
\end{enumerate}
\end{enumerate}
\end{columns}
\bigskip
\justifying
{\uselanguage{czech}Nechť již hříšné saxofony ďáblů
rozzvučí síň úděsnými tóny waltzu, tanga a quickstepu!}
{\uselanguage{slovak} Nezvyčajné kŕdle šťastných figliarskych
ďatľov učia pri kótovanom ústí Váhu mĺkveho koňa Waldemara
obžierať väč\-šie kusy exkluzívnej kôry.}
{\uselanguage{english}The quick, brown fox jumps over a lazy
dog. DJs flock by when MTV ax quiz prog. “Now fax quiz Jack!”}
\end{frame}
\subsection{Structuring Elements}
\begin{frame}[label=simmonshall]{Text blocks}
\framesubtitle{In plain, example, and \alert{alert} flavour}
\alert{This text} is highlighted.
\begin{block}{A plain block}
This is a plain block containing some \alert{highlighted text}.
\end{block}
\begin{exampleblock}{An example block}
This is an example block containing some \alert{highlighted text}.
\end{exampleblock}
\begin{alertblock}{An alert block}
This is an alert block containing some \alert{highlighted text}.
\end{alertblock}
\end{frame}
\begin{frame}[label=proof]{Definitions, theorems, and proofs}
\framesubtitle{All integers divide zero}
\begin{definition}
$\forall a,b\in\mathds{Z}: a\mid b\iff\exists c\in\mathds{Z}:a\cdot c=b$
\end{definition}
\begin{theorem}
$\forall a\in\mathds{Z}: a\mid 0$
\end{theorem}
\begin{proof}[Proof\nopunct]
$\forall a\in\mathds{Z}: a\cdot 0=0$
\end{proof}
\end{frame}
\subsection{Numerals and Mathematics}
\begin{frame}[label=math]{Numerals and Mathematics}
\framesubtitle{Formulae, equations, and expressions}
\begin{columns}[onlytextwidth]
\column{.20\textwidth}
1234567890
\column{.20\textwidth}
\oldstylenums{1234567890}
\column{.20\textwidth}
$\hat{x}$, $\check{x}$, $\tilde{a}$,
$\bar{a}$, $\dot{y}$, $\ddot{y}$
\column{.40\textwidth}
$\int \!\! \int f(x,y,z)\,\mathsf{d}x\mathsf{d}y\mathsf{d}z$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.5\textwidth}
$$\frac{1}{\displaystyle 1+
\frac{1}{\displaystyle 2+
\frac{1}{\displaystyle 3+x}}} +
\frac{1}{1+\frac{1}{2+\frac{1}{3+x}}}$$
\column{.5\textwidth}
$$F:\left| \begin{array}{ccc}
F''_{xx} & F''_{xy} & F'_x \\
F''_{yx} & F''_{yy} & F'_y \\
F'_x & F'_y & 0
\end{array}\right| = 0$$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.3\textwidth}
$$\mathop{\int \!\!\! \int}_{\mathbf{x} \in \mathds{R}^2}
\! \langle \mathbf{x},\mathbf{y}\rangle\,\mathsf{d}\mathbf{x}$$
\column{.33\textwidth}
$$\overline{\overline{a\alpha}^2+\underline{b\beta}
+\overline{\overline{d\delta}}}$$
\column{.37\textwidth}
$\left] 0,1\right[ + \lceil x \rfloor - \langle x,y\rangle$
\end{columns}
\begin{columns}[onlytextwidth]
\column{.4\textwidth}
\begin{eqnarray*}
e^x &\approx& 1+x+x^2/2! + \\
&& {}+x^3/3! + x^4/4!
\end{eqnarray*}
\column{.6\textwidth}
$${n+1\choose k} = {n\choose k} + {n \choose k-1}$$
\end{columns}
\end{frame}
\subsection{Figures and Code Listings}
\begin{frame}[label=figs1]{Figures}
\framesubtitle{Tables, graphs, and images}
\begin{table}[!b]
{\carlitoTLF % Use monospaced lining figures
\begin{tabularx}{\textwidth}{Xrrr}
\textbf{Faculty} & \textbf{With \TeX} & \textbf{Total} &
\textbf{\%} \\
\toprule
Faculty of Informatics & 1\,716 & 2\,904 &
59.09 \\% 1433
Faculty of Science & 786 & 5\,275 &
14.90 \\% 1431
Faculty of $\genfrac{}{}{0pt}{}{\textsf{Economics and}}{%
\textsf{Administration}}$ & 64 & 4\,591 &
1.39 \\% 1456
Faculty of Arts & 69 & 10\,000 &
0.69 \\% 1421
Faculty of Medicine & 8 & 2\,014 &
0.40 \\% 1411
Faculty of Law & 15 & 4\,824 &
0.31 \\% 1422
Faculty of Education & 19 & 8\,219 &
0.23 \\% 1441
Faculty of Social Studies & 12 & 5\,599 &
0.21 \\% 1423
Faculty of Sports Studies & 3 & 2\,062 &
0.15 \\% 1451
\bottomrule
\end{tabularx}}
\caption{The distribution of theses written using \TeX\ during 2010--15 at MU}
\end{table}
\end{frame}
\begin{frame}[label=figs2]{Figures}
\framesubtitle{Tables, graphs, and images}
\begin{figure}[b]
\centering
% Flipping a coin
% Author: cis
\tikzset{
head/.style = {fill = none, label = center:\textsf{H}},
tail/.style = {fill = none, label = center:\textsf{T}}}
\scalebox{0.65}{\begin{tikzpicture}[
scale = 1.5, transform shape, thick,
every node/.style = {draw, circle, minimum size = 10mm},
grow = down, % alignment of characters
level 1/.style = {sibling distance=3cm},
level 2/.style = {sibling distance=4cm},
level 3/.style = {sibling distance=2cm},
level distance = 1.25cm
]
\node[shape = rectangle,
minimum width = 6cm, font = \sffamily] {Coin flipping}
child { node[shape = circle split, draw, line width = 1pt,
minimum size = 10mm, inner sep = 0mm, rotate = 30] (Start)
{ \rotatebox{-30}{H} \nodepart{lower} \rotatebox{-30}{T}}
child { node [head] (A) {}
child { node [head] (B) {}}
child { node [tail] (C) {}}
}
child { node [tail] (D) {}
child { node [head] (E) {}}
child { node [tail] (F) {}}
}
};
% Filling the root (Start)
\begin{scope}[on background layer, rotate=30]
\fill[head] (Start.base) ([xshift = 0mm]Start.east) arc (0:180:5mm)
-- cycle;
\fill[tail] (Start.base) ([xshift = 0pt]Start.west) arc (180:360:5mm)
-- cycle;
\end{scope}
% Labels
\begin{scope}[nodes = {draw = none}]
\path (Start) -- (A) node [near start, left] {$0.5$};
\path (A) -- (B) node [near start, left] {$0.5$};
\path (A) -- (C) node [near start, right] {$0.5$};
\path (Start) -- (D) node [near start, right] {$0.5$};
\path (D) -- (E) node [near start, left] {$0.5$};
\path (D) -- (F) node [near start, right] {$0.5$};
\begin{scope}[nodes = {below = 11pt}]
\node [name = X] at (B) {$0.25$};
\node at (C) {$0.25$};
\node [name = Y] at (E) {$0.25$};
\node at (F) {$0.25$};
\end{scope}
\end{scope}
\end{tikzpicture}}
\caption{Tree of probabilities -- Flipping a coin\footnote[frame]{%
A derivative of a diagram from \url{texample.net} by cis, CC BY 2.5 licensed}}
\end{figure}
\end{frame}
\defverbatim[colored]\sleepSort{
\begin{lstlisting}[language=C,tabsize=2]
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/wait.h>
// This is a comment
int main(int argc, char **argv)
{
while (--c > 1 && !fork());
sleep(c = atoi(v[c]));
printf("%d\n", c);
wait(0);
return 0;
}
\end{lstlisting}}
\begin{frame}{Code listings}{An example source code in C}
\sleepSort
\end{frame}
\subsection{Citations and Bibliography}
\begin{frame}[label=citations]{Citations}
\framesubtitle{\TeX, \LaTeX, and Beamer}
\justifying\TeX\ is a programming language for the typesetting
of documents. It was created by Donald Erwin Knuth in the late
1970s and it is documented in \emph{The \TeX
book}~\cite{knuth84}.
In the early 1980s, Leslie Lamport created the initial version
of \LaTeX, a high-level language on top of \TeX, which is
documented in \emph{\LaTeX : A Document Preparation
System}~\cite{lamport94}. There exists a healthy ecosystem of
packages that extend the base functionality of \LaTeX;
\emph{The \LaTeX\ Companion}~\cite{MG94} acts as a guide
through the ecosystem.
In 2003, Till Tantau created the initial version of Beamer, a
\LaTeX\ package for the creation of presentations. Beamer is
documented in the \emph{User's Guide to the Beamer
Class}~\cite{tantau04}.
\end{frame}
\begin{frame}[label=bibliography]{Bibliography}
\framesubtitle{\TeX, \LaTeX, and Beamer}
\begin{thebibliography}{9}
\bibitem{knuth84}
Donald~E.~Knuth.
\emph{The \TeX book}.
Addison-Wesley, 1984.
\bibitem{lamport94}
Leslie~Lamport.
\emph{\LaTeX : A Document Preparation System}.
Addison-Wesley, 1986.
\bibitem{MG94}
M.~Goossens, F.~Mittelbach, and A.~Samarin.
\emph{The \LaTeX\ Companion}.
Addison-Wesley, 1994.
\bibitem{tantau04}
Till~Tantau.
\emph{User's Guide to the Beamer Class Version 3.01}.
Available at \url{http://latex-beamer.sourceforge.net}.
\bibitem{MS05}
A.~Mertz and W.~Slough.
Edited by B.~Beeton and K.~Berry.
\emph{Beamer by example} In TUGboat,
Vol. 26, No. 1., pp. 68-73.
\end{thebibliography}
\end{frame}
\end{darkframes}
\section{Light Frames}
\subsection{Blind Text}
\begin{frame}{Jabberwocky}
\framesubtitle{Lewis Carroll}%
\begin{tikzpicture}[overlay,remember picture]
\node[anchor=south east,xshift=-30pt,yshift=35pt]
at (current page.south east) {
\includegraphics[width=35mm]{resources/jabberwocky-light}
};
\end{tikzpicture}%
'Twas brillig, and the slithy toves\\
Did gyre and gimble in the wabe;\\
All mimsy were the borogoves,\\
And the mome raths outgrabe.\\\bigskip
“Beware the Jabberwock, my son!\\
The jaws that bite, the claws that catch!\\
Beware the Jubjub bird, and shun\\
The frumious Bandersnatch!”\\
\end{frame}
\againframe{lists}
\subsection{Structuring Elements}
\againframe{simmonshall}
\againframe{proof}
\subsection{Numerals and Mathematics}
\againframe{math}
\subsection{Figures and Code Listings}
\againframe{figs1}
\againframe{figs2}
\defverbatim[colored]\sleepSort{
\begin{lstlisting}[language=C,tabsize=2]
#include <stdio.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/wait.h>
// This is a comment
int main(int argc, char **argv)
{
while (--c > 1 && !fork());
sleep(c = atoi(v[c]));
printf("%d\n", c);
wait(0);
return 0;
}
\end{lstlisting}}
\begin{frame}{Code listings}{An example source code in C}
\sleepSort
\end{frame}
\subsection{Citations and Bibliography}
\againframe{citations}
\againframe{bibliography}
\end{document}

View File

@ -0,0 +1,325 @@
%PDF-1.5 %âãÏÓ
13 0 obj <</Metadata 12 0 R/OCProperties<</D<</ON[15 0 R]/Order 16 0 R/RBGroups[]>>/OCGs[15 0 R]>>/Pages 1 0 R/Type/Catalog>> endobj 12 0 obj <</Length 11665/Subtype/XML/Type/Metadata>>stream
<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.1.2">
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<rdf:Description rdf:about=""
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:xmp="http://ns.adobe.com/xap/1.0/"
xmlns:xmpGImg="http://ns.adobe.com/xap/1.0/g/img/"
xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/"
xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"
xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"
xmlns:illustrator="http://ns.adobe.com/illustrator/1.0/"
xmlns:xmpTPg="http://ns.adobe.com/xap/1.0/t/pg/"
xmlns:stDim="http://ns.adobe.com/xap/1.0/sType/Dimensions#"
xmlns:xmpG="http://ns.adobe.com/xap/1.0/g/"
xmlns:pdf="http://ns.adobe.com/pdf/1.3/"
xmlns:ExtensisFontSense="http://www.extensis.com/meta/FontSense/"
dc:format="application/pdf"
xmp:MetadataDate="2015-10-28T18:56:46+01:00"
xmp:ModifyDate="2015-10-28T18:56:46+01:00"
xmp:CreateDate="2015-09-30T01:52:03+02:00"
xmp:CreatorTool="Adobe Illustrator CS6 (Macintosh)"
xmpMM:InstanceID="uuid:deba632b-54b7-3f40-9cd9-604d3925d62a"
xmpMM:DocumentID="xmp.did:F1771D32492068118083C138F3A478D6"
xmpMM:OriginalDocumentID="uuid:5D20892493BFDB11914A8590D31508C8"
xmpMM:RenditionClass="proof:pdf"
illustrator:StartupProfile="Print"
xmpTPg:HasVisibleOverprint="False"
xmpTPg:HasVisibleTransparency="False"
xmpTPg:NPages="1"
pdf:Producer="Adobe PDF library 10.01">
<dc:title>
<rdf:Alt>
<rdf:li xml:lang="x-default">mu-stitky-fakulty-cz</rdf:li>
</rdf:Alt>
</dc:title>
<xmp:Thumbnails>
<rdf:Alt>
<rdf:li
xmpGImg:width="256"
xmpGImg:height="168"
xmpGImg:format="JPEG"
xmpGImg:image="/9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA&#xA;AQBIAAAAAQAB/+4ADkFkb2JlAGTAAAAAAf/bAIQABgQEBAUEBgUFBgkGBQYJCwgGBggLDAoKCwoK&#xA;DBAMDAwMDAwQDA4PEA8ODBMTFBQTExwbGxscHx8fHx8fHx8fHwEHBwcNDA0YEBAYGhURFRofHx8f&#xA;Hx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8f/8AAEQgAqAEAAwER&#xA;AAIRAQMRAf/EAaIAAAAHAQEBAQEAAAAAAAAAAAQFAwIGAQAHCAkKCwEAAgIDAQEBAQEAAAAAAAAA&#xA;AQACAwQFBgcICQoLEAACAQMDAgQCBgcDBAIGAnMBAgMRBAAFIRIxQVEGE2EicYEUMpGhBxWxQiPB&#xA;UtHhMxZi8CRygvElQzRTkqKyY3PCNUQnk6OzNhdUZHTD0uIIJoMJChgZhJRFRqS0VtNVKBry4/PE&#xA;1OT0ZXWFlaW1xdXl9WZ2hpamtsbW5vY3R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo+Ck5SVlpeYmZ&#xA;qbnJ2en5KjpKWmp6ipqqusra6voRAAICAQIDBQUEBQYECAMDbQEAAhEDBCESMUEFURNhIgZxgZEy&#xA;obHwFMHR4SNCFVJicvEzJDRDghaSUyWiY7LCB3PSNeJEgxdUkwgJChgZJjZFGidkdFU38qOzwygp&#xA;0+PzhJSktMTU5PRldYWVpbXF1eX1RlZmdoaWprbG1ub2R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo&#xA;+DlJWWl5iZmpucnZ6fkqOkpaanqKmqq6ytrq+v/aAAwDAQACEQMRAD8A9U4q7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX//2Q=="/>
</rdf:Alt>
</xmp:Thumbnails>
<xmpMM:DerivedFrom
stRef:instanceID="uuid:8ccc8906-d3ac-2d4f-aaf4-ef8d96727138"
stRef:documentID="xmp.did:EC771D32492068118083C138F3A478D6"
stRef:originalDocumentID="uuid:5D20892493BFDB11914A8590D31508C8"
stRef:renditionClass="proof:pdf"/>
<xmpMM:History>
<rdf:Seq>
<rdf:li
stEvt:action="saved"
stEvt:instanceID="xmp.iid:07801174072068118083918EEDD18719"
stEvt:when="2015-08-24T03:11:31+02:00"
stEvt:softwareAgent="Adobe Illustrator CS6 (Macintosh)"
stEvt:changed="/"/>
<rdf:li
stEvt:action="saved"
stEvt:instanceID="xmp.iid:F1771D32492068118083C138F3A478D6"
stEvt:when="2015-09-30T01:51:58+02:00"
stEvt:softwareAgent="Adobe Illustrator CS6 (Macintosh)"
stEvt:changed="/"/>
</rdf:Seq>
</xmpMM:History>
<xmpTPg:MaxPageSize
stDim:w="79.999940"
stDim:h="31.999769"
stDim:unit="Millimeters"/>
<xmpTPg:SwatchGroups>
<rdf:Seq>
<rdf:li
xmpG:groupName="Výchozí skupina vzorků"
xmpG:groupType="0"/>
</rdf:Seq>
</xmpTPg:SwatchGroups>
<ExtensisFontSense:slug>
<rdf:Bag>
<rdf:li
ExtensisFontSense:Family="Syntax LT CE"
ExtensisFontSense:Version="001.000"
ExtensisFontSense:OutlineFileSize="0"
ExtensisFontSense:KerningChecksum="0"
ExtensisFontSense:Foundry="Linotype AG"
ExtensisFontSense:FontKind="OpenType - PS"
ExtensisFontSense:Checksum="3359954016"
ExtensisFontSense:PostScriptName="SyntaxLTCE-Bold"
ExtensisFontSense:FontSense_1.2_Checksum="3359954016"/>
<rdf:li
ExtensisFontSense:Family="Syntax LT CE"
ExtensisFontSense:Version="001.000"
ExtensisFontSense:OutlineFileSize="0"
ExtensisFontSense:KerningChecksum="0"
ExtensisFontSense:Foundry="Linotype AG"
ExtensisFontSense:FontKind="OpenType - PS"
ExtensisFontSense:Checksum="2133157911"
ExtensisFontSense:PostScriptName="SyntaxLTCE-Roman"
ExtensisFontSense:FontSense_1.2_Checksum="2133157911"/>
</rdf:Bag>
</ExtensisFontSense:slug>
</rdf:Description>
</rdf:RDF>
</x:xmpmeta>
<?xpacket end="w"?> endstream endobj 1 0 obj <</Count 1/Kids[3 0 R]/Type/Pages>> endobj 3 0 obj <</ArtBox[0.000488281 3.54395 133.296 90.7051]/BleedBox[0.0 0.0 226.771 90.708]/Contents 17 0 R/LastModified(D:20151028185646+01'00')/MediaBox[0.0 0.0 226.771 90.708]/Parent 1 0 R/PieceInfo<</Illustrator 18 0 R>>/Resources<</ExtGState<</GS0 19 0 R>>/Properties<</MC0 15 0 R>>>>/Thumb 20 0 R/TrimBox[0.0 0.0 226.771 90.708]/Type/Page>> endobj 17 0 obj <</Filter/FlateDecode/Length 3442>>stream
H‰ÔWÛŽd9|ﯨè³NßýÊ"ñ„â<>h-Œ‹Äòÿö¹Tu5=»³Z¡¦u|Iç%2üÝŸ¾¿}÷ÇïÃíw¿ÿþönþï/ßýá/áö÷ÿ¼üûfúÅn¹l5þÚ6jë··5ýÇ—¼•0ú'G=Þ^mK6m+©\`L·×´å}r.˜ð5o­%MÎc\`¯·×¾¼†-ô¼Ð——¿½üùdgÉ[ìv†-Õ<>;¹,f
Bm<<¦¶QÆ¿¼¼Æ-gL¨ŽÅÒ´õ– snA…¶Õд¼%ÛQÚ*ü±Ï<C2B1><EFBFBD>2wâERÓ½² )ðéŽ.36ËùÑçîÚà^µÛ´<4F>`Æ2LÛ¬òZu3ø¶·œe§åÈ£ƒÂSá~{mˆ¡VöhtqÖÒJ¸väýÐåVÎÁ©w±<77>ѧ†~‹±"¢X;ñO?¼üõö¯Ó…ë /ó-ÁƒO7Ž9eë¹ãJmDŽÞÃŒÿ7ܪëv·;PB¸Ö#”pIXjÚd”º²T9zc|˜†ó#Ö5N‰q<E280B0>u¶#D^I•R¾•-ŸÚ®õÃFBl_°Vgv¬Ã1.àk¡g“7ÎB}»Ë—6y$TÂ6õ”/,¤î á¥[Gð”ÊHdÖ F:ÊK6ì£ûÄìÆ鬲Êè'EܸùIÚ±ÕuB±® ÞsY‰T·ÑÆJ >˜€Ú°ŸzzVèõ¡Îë×Ôy¼Ôyþ ÎûçËœÜ:àØÞ©óå¥\ӹȚ=cÀ Ç48»µÀô<v˵“—!í<>G¯eˆ¸ þž ³¹^È¡‰Hª(PK™S-«äcp®Nt9¤O˜´#ÔyqwHårÇ<08>$$Ńg®]Ç>ì:ñ×ï:N°Öndý”ŒAž0¦<30>Ee"'¢®ã¿Ñˆ²¾”Uâ5ç XåeæaCøtÌ®cnäc2`/;bé“%¸!èVÕáC$>üÒi¨ øªÎ½|Ì âï¨<C3AF>â\ácîé#VP¤©©*Á“õu=o(›„Î㱬$»ív=Ê*x
M†ìxø¿'ÝŽY¶(œct:~æ_D´ø½a6LD*2€©NðÆx˜åPál,N 8eˆ#øWŒ2Z\Ø'w]©ÔáLWJ¹àÜ ¥ŒD‡™4Ñ|±'ϯiÌ1,¿¼½8Bµ5šzUnc^ G:Ûx' ·NUnoÉÙ*¨¯•£Ð¼³eù"Ö¼.t½î}(:.ÃÞ#§fòXB J-U1 ˜ÑF1¯Ôëêþ³–¼îZ£"óœ0¢£}Œ kr å2±OsZ=¡€ÚÛ÷~½Ðè}h Ð¿õ7”Žµ”éŸ÷ Ø•=·y§E×£Eç¯lÑõÓ-ÚÎ.ö­Y‰~¸íÏÕÃ骇ÇGz¸^õð<C3B5> ® âÓ<C3A2>4£÷ ³KÊE˜Õn¤¿äÑfÝå¡’<2P<‡–¼»Ö7$DÒÂ\d S 6äi·g+űÛÆÒ[øAI B­0sëãœB8?x郿ȭ<C388> ÓO-8¢<E280B9>d<EFBFBD>IugU)
~@è€R)’Þ]ÓNØ„‹¥|¬Œðïi£àíyMŠÍq·ä¤äქr¬~PT<H®*g^ú<>Ô6¬Nì—&)€ãZšúMz…ÄÙ¬°%56øéfÞé8 Qê=]jJ¿—<C2BF>v9<76>¶UÆeýçʺP NlÚVæÖ¨'K´êôßœË#<05>"ÙÀF­±Úc?¾P@Óä.}Ri”4 ,myí<79>[—µ<E28094>ž?yß<79>))ÒŸk'TŸD¥ñ…Òmñ]‡qqùb&%ËÍjzdùxÄê³ÔA
Z _LÌE©ZÓ|ÑÑ´8©ùÐó5«ßÎ÷<C38E>UnýAÆžÒÙÃZŽIÁ5
ÍÇY)Nd*4byÓÇ¡ús”È£hjÔ¾ÎÇAmŸ³ùC‰>gÄ=îqÁãŽm‰•/͉ F¯ßI6¹À äl3DcÈWóŽ<C3B3>…)zQççý<²ôÿ ,<Ñ'Sü3˜>†P¨ž$Ì»ê‚[>4fx
¸)Ê…ÑçXÛ…õÅ(“¨ìë'Põ¦YmŠ~³ùŠÔÀݤ<C39D>=\tç
×Lb‡tÖ eb<EFBFBD>}M$¤"¤ü*£ÛÛž¦DËq-õ½xïžH¿†8¼C(6 %Ÿ%^¥_ %}%¡ä ¡Ä ž¡Ô'„RžŠ<> ¥üBBé'BéBi¿„Pâ…PìL(ågJ=ŠýÊ„ßËÐÃn©\ù$¢ ³¬×<C2AC>yz<79>šæM‡´Ã<C2B4>v¥â¶vÁ¬ıM¹Jyu†ÞSxÖìÎ:‹†û × ×Á‰Iq,–âÍæ—Ôø¥ª¬¼:Ý' ‚ò:d
ÑS9ç‹ß­àÆÃ
ãz>W0U:+xHKšÒŽWëM^º«¬wWàìÑœ±*&AyŽ$9Æ÷ÊyGHÈp̤*­û.Q5²”Õ§‡)ðǸ÷jçðUYaŽ¥Oƒt¬˜i ƒ7N7mæ2Ï<><E28093>©Äz˜ý½—A\€|<7C>Ⱦ<>ÀØþQÚoVfIºQ.Ûf Õ,mÈ„tß•|à»Ñ3bˆç€…3ÅúSVŒ”¹®–ªe :/ÌUœ<<3C>.bfá1A9<41>¿°ÁúXÔ¦b$
s¶§Ó¬ YU²ˆ”zAº§j/><3E>4Ö‰2‡È=G¿ÆÜsúÓ«qÚÍùº ˆzÅÛ‡«Ž½qí6Ýg{‡)dù^ çç"n¦ÇMR&Î0¼UTªz6ñ-aô|´æ³õªÕ±OL¶ß1<C39F>gûôûz
)ÿA=òkÏ{h°SÙ}TðI'ýXš¾“Ö§<C396>ô™4ÿl'­×NÚ¿¶“>—æ_ÝIâŸj¥õ·ÒßB<42>ò7&ê3B^ñn«<6E>ÉÞ.¢C¤Óæ–ªü²,ŠGô¦“0žúÞ‡“…ž7…óÕé‰>pÞk "k£¢<C2A3>—Öõà´a»%V:ƒ r»|Ù ŽàIgóë8£DÁAÕ8œ€™bæLµ46œÒj\dé÷z4ˆ ž,¹q1¹ö¹¸»Ô¨:<e¯û8³Lµ ÙR£T˜²fÇU2&šë””¯ÐÖô ‘Å'èb ·É2€sÙãAk6ÇÌ4¶#óÎmV}¨HEתcÒÜ$/F?ß"šgé¸<> ì&/Œ©…&,ÌË
ŸÊlÉÓäÅòD3A0¡)ãF.¼”KL°ÜÑõ{šm>µY¿˜ªaç;ZúÓ÷çl¸ð§ú–}Ó¾õ´m™AQ 8¡£.:¨ÎÔ®+µZ<15>òΙß<±†A_EoÜ_hOô^Ážþã “»þ¹cŠQeÍa¾FÝq=±ù»}n}Eܢ暚:!"Q¥!—%æÉÃnTÃXÝ h?·šè<C5A1>ö°0æGça•Ö<E280A2>~žØµstP²9 -,2@Ñ`ûX<È’;±b/ïÆ©ƒÒ/{µÿñŠÿo {VÍ1Á&ÐJÙ*Eåîõ0ë&¤y°lîˆGB*þÕÀPwð\øÈœaž^–Ê`ŠlÜ{ðÍöÑC#–ô\ßeœ¸?_z½cœòÀ8åsŒ rŽ¯¾wÎkižG]Ç7`<60>´3Êz>²6z­÷Ù.Ôª®ñ[sXôöª.[ô\Hz*¾½ìð¿ÄWËnÛ0¼÷+ü6Ä%Åǹè±_Ñ«s-пïÌ,—²Òˆƒ9Ù³H3EaÁ®;´ï길Mo€“í+à$øªãîC÷µ‰`bWSPÍ̇;9¯KD6.mPEuÖ_1sŽ}‡›ëÀ<>«£©m(ïl¥^P(ebSj^éäò½÷Uoʨ
Dö maÏj û”¶ÈOh û°¶8ÄGµE}_[Ä"êå¬-b¹ÿ -ú³Ú"=H|ö(-ʧ¤E{<7B>õË¥EÆ=K8ü`ßÓiHm¤Ó<C2A4>íU~dô¦åwj-túí *³=$ÎëWx{ãÞX…lÛ¤Hu?<3F>gŒYâœìi!rˆîÁwÜ`0Ÿ{n(;1r#Ǿø ¹ZÒÌü5Ïäº÷€>tØ¥¼ÆÓ®£¶°É!|‰¦a
[E/Ô#øãÂÀ¼l‡Í5qô!$&H¦ð‡Ï+D<O(]§Z†jøý<C3B8>†6ÚZïÕ²ÇÖ©Üö‡C<E280A1>Ä™‡_Z90¨ý2Ìx0vPœ©¬p!¨…<C2A8>=b¹°K„E鸆ÈV‡ÒM\ƒ½Vô W$ÉOZ¯\Ù]†•Þ°€KdªA:Á ­Ý2#Ëç=Çca,,ÿü㉖;<3B>§3úÙ°mï«Å2-µúJŒæËaa†²Ë9Ó<39>¥UÏ-ç²f<C2B2>uG¢ð·Í YooÓ Æ; \H‡_È U\Ü™Ïû<C38F>Ëûv!ªbýkù~ã<>g&Xq…6<E280A6>[YˆO‡püæ§!Òg=Õ¡Y>âìÐßDüç ‰uv|þ*`Þ—~üü~ÁÏ_K»> endstream endobj 20 0 obj <</BitsPerComponent 8/ColorSpace 21 0 R/Filter[/ASCII85Decode/FlateDecode]/Height 11/Length 22/Width 28>>stream
8;Xp,I2%bM!!3Q/-RJo-~> endstream endobj 21 0 obj [/Indexed/DeviceRGB 255 22 0 R] endobj 22 0 obj <</Filter[/ASCII85Decode/FlateDecode]/Length 428>>stream
8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0
b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup`
E1r!/,*0[*9.aFIR2&b-C#s<Xl5FH@[<=!#6V)uDBXnIr.F>oRZ7Dl%MLY\.?d>Mn
6%Q2oYfNRF$$+ON<+]RUJmC0I<jlL.oXisZ;SYU[/7#<&37rclQKqeJe#,UF7Rgb1
VNWFKf>nDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j<etJICj7e7nPMb=O6S7UOH<
PO7r\I.Hu&e0d&E<.')fERr/l+*W,)q^D*ai5<uuLX.7g/>$XKrcYp0n+Xl_nU*O(
l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~> endstream endobj 15 0 obj <</Intent 23 0 R/Name(Vrstva 1)/Type/OCG/Usage 24 0 R>> endobj 23 0 obj [/View/Design] endobj 24 0 obj <</CreatorInfo<</Creator(Adobe Illustrator 16.0)/Subtype/Artwork>>>> endobj 19 0 obj <</AIS false/BM/Normal/CA 1.0/OP false/OPM 1/SA true/SMask/None/Type/ExtGState/ca 1.0/op false>> endobj 18 0 obj <</LastModified(D:20151028185646+01'00')/Private 25 0 R>> endobj 25 0 obj <</AIMetaData 26 0 R/AIPDFPrivateData1 27 0 R/AIPDFPrivateData2 28 0 R/AIPDFPrivateData3 29 0 R/ContainerVersion 11/CreatorVersion 16/NumBlock 3/RoundtripVersion 16>> endobj 26 0 obj <</Length 971>>stream
%!PS-Adobe-3.0 %%Creator: Adobe Illustrator(R) 16.0 %%AI8_CreatorVersion: 16.0.4 %%For: (Muj Mac) () %%Title: (stitek_fi-uni_outline-inverzni_cz.pdf) %%CreationDate: 28.10.15 18:56 %%Canvassize: 16383 %%BoundingBox: 0 3 134 91 %%HiResBoundingBox: 0.000488 3.54395 133.2959 90.7051 %%DocumentProcessColors: %AI5_FileFormat 12.0 %AI12_BuildNumber: 691 %AI3_ColorUsage: Color %AI7_ImageSettings: 0 %%CMYKProcessColor: 1 1 1 1 ([RegistraÄ<61>­]) %AI3_Cropmarks: 0 0 226.7715 90.708 %AI3_TemplateBox: 113.5 44.5 113.5 44.5 %AI3_TileBox: -282.6143 -260.6465 509.3857 351.354 %AI3_DocumentPreview: None %AI5_ArtSize: 14400 14400 %AI5_RulerUnits: 1 %AI9_ColorModel: 2 %AI5_ArtFlags: 0 0 0 1 0 0 1 0 0 %AI5_TargetResolution: 800 %AI5_NumLayers: 1 %AI9_OpenToView: -712 566 1 1656 1054 26 0 0 6 133 0 0 0 1 1 0 1 1 0 1 %AI5_OpenViewLayers: 7 %%PageOrigin:0 -1 %AI7_GridSettings: 14.1732 5 14.1732 5 1 0 0.8 0.8 0.8 0.9 0.9 0.9 %AI9_Flatten: 1 %AI12_CMSettings: 00.MS %%EndComments endstream endobj 27 0 obj <</Length 2007>>stream
%%BoundingBox: 0 3 134 91 %%HiResBoundingBox: 0.000488 3.54395 133.2959 90.7051 %AI7_Thumbnail: 128 84 8 %%BeginData: 1864 Hex Bytes %0000330000660000990000CC0033000033330033660033990033CC0033FF %0066000066330066660066990066CC0066FF009900009933009966009999 %0099CC0099FF00CC0000CC3300CC6600CC9900CCCC00CCFF00FF3300FF66 %00FF9900FFCC3300003300333300663300993300CC3300FF333300333333 %3333663333993333CC3333FF3366003366333366663366993366CC3366FF %3399003399333399663399993399CC3399FF33CC0033CC3333CC6633CC99 %33CCCC33CCFF33FF0033FF3333FF6633FF9933FFCC33FFFF660000660033 %6600666600996600CC6600FF6633006633336633666633996633CC6633FF %6666006666336666666666996666CC6666FF669900669933669966669999 %6699CC6699FF66CC0066CC3366CC6666CC9966CCCC66CCFF66FF0066FF33 %66FF6666FF9966FFCC66FFFF9900009900339900669900999900CC9900FF %9933009933339933669933999933CC9933FF996600996633996666996699 %9966CC9966FF9999009999339999669999999999CC9999FF99CC0099CC33 %99CC6699CC9999CCCC99CCFF99FF0099FF3399FF6699FF9999FFCC99FFFF %CC0000CC0033CC0066CC0099CC00CCCC00FFCC3300CC3333CC3366CC3399 %CC33CCCC33FFCC6600CC6633CC6666CC6699CC66CCCC66FFCC9900CC9933 %CC9966CC9999CC99CCCC99FFCCCC00CCCC33CCCC66CCCC99CCCCCCCCCCFF %CCFF00CCFF33CCFF66CCFF99CCFFCCCCFFFFFF0033FF0066FF0099FF00CC %FF3300FF3333FF3366FF3399FF33CCFF33FFFF6600FF6633FF6666FF6699 %FF66CCFF66FFFF9900FF9933FF9966FF9999FF99CCFF99FFFFCC00FFCC33 %FFCC66FFCC99FFCCCCFFCCFFFFFF33FFFF66FFFF99FFFFCC110000001100 %000011111111220000002200000022222222440000004400000044444444 %550000005500000055555555770000007700000077777777880000008800 %000088888888AA000000AA000000AAAAAAAABB000000BB000000BBBBBBBB %DD000000DD000000DDDDDDDDEE000000EE000000EEEEEEEE0000000000FF %00FF0000FFFFFF0000FF00FFFFFF00FFFFFF %524C45FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDA7FFFF %%EndData endstream endobj 28 0 obj <</Filter[/FlateDecode]/Length 13033>>stream
H‰ÜWkrÛºî´t:éØ31Í7)ç—llj?4ã¦Mîh AeË{è"º€»„þJÖ>$ú!‰nî­“ŽÇˆóá¼_|õÇÞ`¯Ùs µ^½:+!P~ŠºŒe©úh§¿,ß0Ôé†ÃxEdJ?ÈI† Ä}{ç,ûŠÎp´vváì*Fà4UTépL÷2N‡"SŒr²GùœÈ;8ˆîŒ$ïVjßc¬àžiX²ÂÏ×dÌç8MéÑ<C391>Ð<EFBFBD>³Cñ˜òÉ¡¸=@&r<>帨må=í“ô>Ù0MÓ Cäžë´<C3AB>±ãvÛk£¶i¦§o(®zRD$M<>2=h<>ñÞð„2vΰB­]ÒéZöð0£,>Ïf#ðµèN×æ?¦xºæ¿õq0ìÎàd@”<02>RÐH[uö·ui`[ù·ó¹O&Tâßÿàß~ýe·d-E2ÃrªïßmûFr#ÂsIf /æv[Œ\>V?K˜”cöìÐ6|Ëuà—o¾ë{È3Û†zr<Ëp<·¸²ò™Srs€Î'…ƒ:R Šè¸®iŸ¥Ÿ1"?rª@éÜCíÂCg"& B½¼Âð¤4 ¬> À%¢ ®e*OÀ° ÈË¥€„ðKq•ë¸X6ò|_ûÕ÷àËô\dû9_çÁR¢µú,k6šIÅ=€˜õ ŠN(?0ÑžUÄö<C384>¤ñ*´kX<6B>Bë¿´ #¬ý·«ÿBe°^)ÂK ¹ŽÎjÉbgþÇGb¦C<C2A6>êá<>?LL
ÚòwN<EFBFBD>ëYR?!Z=I¹æÙ:Ï)á°Ç2 ½“"Kº|,Z;E¸"Ô:4F£¯ðu}E¦ù™˜cþÅ ,$Fßå„l`šìnä VJ
"ÜÌ«ïí·<C3AD>Éjpuýï_l3H³y¡ÎLÄ+ÛØÅH“Øt¨·Ðm˜HÂ<FÅ2Ù.¨Ç0Çåçkä|<7C>ª ó/¶å£f£E!À§t 0ø¹<C3B8>¼—_É!K™[5RAX]£CFxœnôÎ ž©/¶m—¦—¶KD:%:”Yz<59>.…`õÅ]ª<>ît]ëøŠèRrË™i^?¾ü^~<7E>_ðÂÕÍ´©V%¥Íï„œ’™¿T?p@?O°î(ÐJæ9á<39>ãÑG˜1:8¹¦QSép~eL£éS
,Ÿ“óÙH0šÎý¢8Ñ]¯‡¥¢#ƒEªÈ¬q
¡·1…f¾¦ n°Š®O)LIÉÆ¡C6¦<†zd°!êÛLèJ
¯©9´ßª£jôIŽ,™zC˜wõ‰¶··yÔµ ŠÞSÔ´µÿ<C2B5>ž? ƒÖÎç«oÿŠ®Å<C2AE>^¶Ðþ9žôºµ? °L
SøÕoU«Ã‡Vµ²˜èÓþ?¾ÂÑ ìè }þÅD1ê·ô†ñ)níç#½i¡}<6B>ëF­4Üjf3XH®EoÔZ»<j¥ÒÖã<C396>²µz‡K1·ç¸ñøÝ÷Ý#;rÈ1Ë,HENk6(<28><>уÃ5ÌKm«½^.pëÕp¿z†<7A>ê'é…ËEñüéìôvÓ'‰oÐÎíŒq ïA-H:Ê<14>‰úZC;Râÿ ‹ß€ ]Ã[Œ$¼ÀØh¿ žYRõ‡Z$¤ îü™§C¨Íô ɸóÉ}賬Âêót ŽC<C5BD>°R“ôÞÓOêïC ÃD4%qÏTÈ×/k׺/(j5° ^<Îs#¶ÛWGÿFáÿNOX=ÑÈ~ŠGŒ4Iü­Qý™
ý`Þ¸Ô5ô…3Z³—íd¿_¤Xï.zæA‰5MÇß½.@—H•ÿ‡*MÇ7?ð4~á2H<19>~ö^†å[à‰>Ál½©×„N®×ù²=ØrÃn{î6»nh¬®˜U_Ø*´sFBÁÔ9%cu!)¼œ4±ìñ<C3AC>—5Ò4LÓô¶î¶Q·yi[Ãs<C383>ö6[MlYü“?oy‘ɈŠŒÇ/>úa@½´
3¢p Ð÷êÑþN=þ(Þ¨M×ÀyÑ•²<E280A2>¤H:’àÔÈœ<žÆŠ'4ƒëA³µ4ï Ê•Öw§Ÿ1"ë=¥rLÓ„áÅÓRõ’èÌúö+JØ·*.<2E>~üÈizW¶¬Þäãª×é—ehûFX2kZô »ýBƒ\£žH©V?§Ú•RmÓÌ°ñ=ëA/FËø˜ŒqÆî½qÞ®¹'ï;£Ó…é{\ÁÚ˜%èóI†'õD%e¸Þñ+'$8Ž—< <0B>f8<66>>P3M„z€ÂŒ­#¨ÚXœP£8òÊ“H0¹ÌšNu2%P§ŠHzG<70>©2 ˆ¦"Sh"EeÆ(MÊ Øœy Ñ~'D¢”Î2@#î÷_<C3B7>Pó4ÁPPÑÐwä~k<>À6QçÙ®®Å 
m+t"IUÓ[±’”±ó=ÏñÖ#­š[¡5¶b—
:Kd•G˜Ïq:¨û±¿Ô-s­Bocªðˆ2ªÊß±|Ã4ÜZ?švº'c÷+"S%PËyi~PêÐZBò>ôb9ìë½òÝÊ2sîðIg= íWðÌe[y
wàhi™ëmÄžàˆtø„mh½v=‡kõ¸¢äÜýSaU¼Õ¶ º®iø®ï=ìÄù ^¶³*¬ÖÖKfd³ë¡a—ü¼õFäz{«³gV»§u½0p×?aBÈZ~lÊ¥»Ê‘­Ð9ãîåˆíÛÖ:eµa5]½°Z ÷Óy°<>¢ù¦_×sIãqJª,YÇG„±#XK ³§®º‰½^Í÷æàïk¯“öÃ/Wïµîä£1
Ș˜+Š`Üáô1άá`X1Ê J•¬ ÷UÈ=Ï4·¬X?äî½Âœ¦×PÔµb ]§ªhÇòUt^T=†9Ñ®—ÌÆ6™ß¸¢)-º¶î <0B>ºJÐ.ºJs.ER·æùýiÅê09­sóƒŠÕn®×SnÚÞsݬkçy^^íÀ]“Û<04>Ÿwç„Êt˜<•Ösݵ¥9¿Q
,ù}w,9=JØòŸ™š×Sñ·ÖÔuÄhëÑ,aäÖ£ LÊtó<74>ÿ<EFBFBD>^mYm$ItÞCjla@o66X²É’š<1E>qÛõH¡B¥Ìš¬,Ùh³ús>¼<>9§û‡a_Y¥zHTe=çð!¡7nX¾ ¢3Ì,P:Ü7(Ed~Ô‚¹z{a
S3œçù<C3A7>~ÿë¶!Fç¦qÿÃçO¢¸Õá88ÂÕfE¶¦<C2B6>l…<Çö8ò®@} 2Ü Åuµ´dÑu¸j^n³/,4Êt¬?Ü[Pñò¥Ÿý©wNý-©Ó3qU­î@.®*•Š—<C5A0>«j­†ÝïŸ"ºRQA°<41>H®¿<Ä&#†BC …`áˆ>°ë¯%j¡µ¨…~R-¸Ðîb j <0C>ÝPž{/¿ÅK¯6šÑÚ(¯@»+õö¸Œ•ÑQo<51>=eœ3Ïc¶¤yØÔ¬-ÃâÓæa²åmáoµQ£&¡a##ƒ¸\@mÃçÅ”ŠS\„Ä2Cu8¶7T-XÊ5†õz%¨0q®bšr”=1,®8Y¦øUÃp‹ð˜ ¡pþ!Û¬âýMò7òMlŸ*ü-R$ú-U;dDÈn¦DÜ=κžN
ª‰±NG£êN<EFBFBD>äàÑŽ<EFBFBD><EFBFBD>Mâ«-Ï•jð©"X‰úvš*lb¯T‰q®M <0B> <1C>QqàhÓ[ÉûG€”<E282AC>ý÷ϼ¼ûCÓyìLY²‡ŠÀî D†HÌ967 :)ŽÉÝ—N»f < üg±±ô)ülÌAYzfçšcÃqiµ,¶€I
0ÓµW€ûjè|ìKÒDÔ8²ÅW>€Œ)PLÁÁ“ È©•<1A>‡dáá=l´Æó¿²ÿþ äË¿<C38B>QMEWàËTþ‰N ‡Gi+YK¥&ÍsE#;®ÄÙ
ìa¿ >LaÛÆ5QBâˆc€7UêÝÎ@°td˜X~²GĶG_™™~é9ÞÚdÑ<>r¬=0ˆ¸mQ.ÉŽ@£¦›¶`·ÝJ,šéÊ ¿‘\&G JÆ”Í=T=åÎù¨¯˜ZpO½.Ho<E280B9>™EÖ€x”­)&ö}¥âfò;Úšej·Éáb4²ºN®b8¬¾¼K¾¼“©XéyXà$±»3&±ŒwÊæ·f¶QáÂ=ž# ”<7xÐJ…J=q®Å YºÌEјOȉ¡! <0A>I)0±¶Ú@Eò¾ð¥&eªÂlÉ;.뤴ù²æ‘+¥a#S&ƒ–
ÃÈG]:6F\<17>/覜ò<ŒÅF”ÈøNÀlGõû±÷F6\t†MÉ+Ú G…HB¾†j˜Ib<06>Øt@1Úòª87DîË, µxjœ=V`7Á, æ#ØNÄ<L¬·eÔnϳ
jt9tCC±U<EFBFBD>_®' ¯W ¸ÅäÁW_!:˜N$W a¬I<C2AC>T7ÓPì(£Ç©¥IXÅØ’wºãï~ÿëäî'btn÷?@¦íàB.5`Ù´Óç„‹9D“TŠ‡<C5A0>Zá8¬”áàÚ(„ÐÅÛ¡b"*m=€Í,ä<>|*vÚãîI¿Q}<7D>®ò<C2AE>A•+;µÝíÊËJ©T»ÚHYÔÄ¢‘û(ßè”˨'djø@Ô6´<36>¸”š.®Ž`ëu¦ £PÏø†Íf#ì‹ÂÊè½DÅ ÊûX£L‡x“..k½öñgðÚ ‡^²,<2C>]_ò%?*@+:dŠeE^ÿáÓúNݳû)ú | ”„`Ý\!ºÂ2‡0ô'OþcWŸÑ9&ˆêhýòîmLçÐ ÓtÜYM™³þ )§èƦš¢Ø\™‰BÖýw9óî‡~÷Cü<03>*X.¹A:…¿‰û¨jèTÅ* uîÿ4n @3Óˆß-d^GÓ»ðã ÝýgzkÎÂ;š:sÐÜbŠFg
@ô¸-D°JÆâƒè~Õ¹ÁàË™Þý´AP‰˜Ë4&Š†”+²•¹ê e×ŨCÚîZ´ð5Ñoïÿ„<C3BF>¤Ýý4)äâ‚Ò„Ä=xxý¼Cüǃ34fXJ—”ek1 ,s 5)?¡Œ]pd\G*ã @ž5£ò,:dÆô\ˆ˜tè1<üoX½4ð×ô<xÍa<C38D>Iºß>¾ŽD<C5BD>¿4ᨮú¢¦‰]–¹è_Ö<5F>]‡[‡Ÿ¡º{ï Ã5 û‰Ÿé~”ç”PmÌè·éWb+SËÄý• +ÀA ùcƒ!·Ãl{ÁC<C381>,‰
Y>{PT˜Íp¤…ŽtX;ÉuK±/nøz¨é­P·½3Èšj±j%jÞ¾3…l¨t¸ì…§Vê;Û¦Üá½Æ<ÃI¹Ú{ ¿ t|V»0¸ri/Å,9%»•Ì¦«µ”",üºî{KÛmØ ½†hQ"ªˆ’Ž<0E> Ìþ/ÁöAK>Êp3ô€<E282AC>"ÑÞ—™¸lÚrÕµý³Å•:DƒŽÍf·Ôé <0A>QUágÊ-N!ò(½P‡<06>Q-]Œ¼ÝA~ØNÄNì È]2%v$<C Š—߸ž0*_ sl<73>Qß%Ncî¾Zm—„]QX{ubÿ×<C397>`4z÷ƒßÝ×ãÒ•dÅ
ä)±-…a”‡t Ž8¦„÷Å]jKÝÑHXý‚,ùJÙ$*9g(ÓÇ™E4õã C}]*Tê2S_Éü†—ô»¤Ï`yÀL˜ o-œ>:—ù:2 Ò”XÒ8<38>=×tyîUS„'”ƒ«2°Ì‰èFX!‡cgªÅ03h¸ HÇÜŠÕjãÉÇëŠñê|MÍ_ìDÏ8[z
{û(ÿðZ»Ï ÉMJ¡&{@Óøe†O˜¡Å
ª02¦_O ? @jt”œnÀx¦Õ,˜Ì{¾Ñ™ rh×h<73>ÑòIetÔ<ú(Ï*ý¬}T¼ ¼<C2A0>5Êt¬{ÿz²¼üùˆèmª¹ûf[áŠøg¹ü¹ 3<>OþoOÜ<17>þ½DÅÆ ÕéìÕÛX¼¢ðºyPÿ²»yx©KÅÍóíÍÃ1¯ŠO•Ú«÷/«ÁïƒOîûÕÃ!o¶G/N&§Oû¯•ö¨ôá øµ²ùº¿3ÎmTO_ç¶ëý'k¹ÍƒÉ«Ü.¿Ëm<C38B>oâëq¡zö>¼¶ÖjvõÙ{÷äÚa÷ËAéôËÛC×ÞæÁÎó§mÌšÎÑæùÙoíw<C3AD>ÜÀÿµ=)íúiÝT<C39D>þÙþÇqýqZ¹Ö>Ül~¹¨ vß½9ܯÚ6ÀßNÁ°×rO©çZ]/P÷V¥<56>g{¥rék<>N®r<C2AE>îïÃ_<C383>_Õnü;ŸÙŒUlžÛªŸ»h…nnãÕÅóÜöÕÑðB¹<42>n}2]\í$÷Kxµ7Ô¾ðN>è­¯×ìÚV_DÓ,?o\5Ü[¼8}vã¾K{²HÇgܲsŸÖÛ•õƒ¿µC<C2B5>Ÿ„½“ÊáÓÓßáë‰YÒùЎƽo_²+sï]©Xä£9§OÖÀvíïÕ7ïóy0,“HbÄ ²O­çoà.{Îâ.û<<´tèÿX¯Î…Ôa0ú<D©e<C2A9>”%ÓzÁ²AP@†€ xDöûß$méJ èý“;Bs¾s¾=ÚÇ<1F>rÑÃÂo3/Ñ<>g ˆ £X¿A-²_Ó`Ÿjã¶Û43ر<C398>^ƒÄuofœ7ÉÜ Lõ¦^#i
hŒe;ýzƒÚ8×òÙØ=ÔžŸÇ¯¾Ã© äß_$P‡a¡HO$ é½<C3A9>BaÛ#3ÍoÚ¡\kŠl<C5A0>¬L>u.“ÅŽA<C5BD>WÃÛNðƒÂ<C692>œŠz¯¶Ã»×möidÙÚ~(D`×ŲÌÕ «ƒK}ÝŽâ|— Z=ì&v¨Ùˆ\wì:§<E280BA>…Ð7ß'ƒFÜ=oê«]7€BÙ«“(†%<25>|¥™¥€ÆX.<1A>
ÐÞäW­D!qµ®2Žêì£M-4ã*S‡Ÿ È>Ÿy ŠP0lÚîÞ9o};ê1<C3AA>ÇK%S¯×FÐj©>”A{~—<>éu4èã:¦…U¸ö³ ºl^“AKöC¼Ú{<7B>Aï¿fE¨\-1l%°Yû( /x¬ndÐJxTÍçÚ*}`VÒ¸>Öb­èè€Q Zõ³­·±'¥Ú8 lg”ÙQA;®ÙxM­<>'¿<>¥€Š^÷tßæˆ\û¾Öˆ
:··ªY
ès '/^rÑÀÖÛŸ$W÷AG£î˜
ºš ®¿4P”û/bõŽÌ5ßæíÝ}³DÝnë~V<06>†Ý†¤ñ&<bX<02>Ø÷ÔÅTØ4“ÜÂ9€@}&ÐûŒk3»·4³5všäªç“A <09>ÔÆqïû;† e{|I_ €X¨ß\
ë~¥ÓäöFyEq<1E>@§>lôÃùæ•«Rø*™«èKáÌ×4h<06>qöL¯X„ 
'¥PöþC†M6®óUF\H B»ZÕË »ùüc…Û<·iF±ý %¿§òta¾?8˜ðÛrMþ:â†Is<13>Ñn·0jŸ†ÛcµŒÀéBLßÒ½©-÷3 zá[s<>ï  ú Dh·­£Ýç@<40>yŠÓnEpÿZz ÝŽÁcn±—|à±Ã2”¯к­¹h·QÐf6íÚ_°=0×ò½¹RA§Íd¤[”húÛ2èüõ ´Û*DyºJü¡Ý×ÁSLÌÑn Ï^i·s0ìö=Šb¦ûçk0œ¿û(_?'À¨<C380>
ÓnoÁ86Noù€§¥|=qñ‰—P<E28094>r;eù¬c”§Ý>B.•¦½L¹]ñõEè“rûææ{óŠƒ|}·Ré}Ÿ¦Xh×`œî2ž©\p“qõ·˜@ñöFº5V¾ÐþIGÊsíª˜ûÙým¿Ž¸‡Þtjù ¹Íù='V3¼“*«ä">ϲ†½K­Û­Às·Á½3—o ×=¸öZw}1€ÿò¹là5—Ë+^øÙãZYp¹/dMXÂCÈJß¿aÃN¼®JëN{ý5Pëf°ÿv`¦{ÀË,­ïi…i<E280A6> ~f¦n˜<6E>v.;Ɇ®Xoí!g¦á—§q¸îÜ×4åZ ýðpifE<06>ôºtP{þ-hèû2¬<·²M
(Œï?kè ×1[ð'4\ßVÝî’ÞÝ4l<34>7Òý¨¦ЗN^» ƒû~äñJåº=¼ð*(Ž6
(Ü&áæðlE,sÕyU
^†¨ xw ¢ÍáMíûz®ÞŒ¯7»tP4<50>@ñ4. Œ&1 ´iò*ôÉðøorœ'I¿“¶$Ã/S^Œ<W­ýÎÝÀ3?ü¥T/BÕØñ<C3B1>šºr8ç_àÍ9Èɱ?yÈâùO*.Š²jÆßò¾6ïÃŒdøÇK$ÏPo$ëZÄ/ÞoôÄÃц&\ö+dšäoµ… Á—£äÎ'ý.&Üí¹CcÿDÁ+ rÑ+´ðŸN>&]Í´<C38D>^iª‰kãàÏw¼8Ü4„5&߈œ|øj+IiæWʱÊF`N' ¢;ä?fw:`H
 D5
tü Å$Ÿè“YOþÛÆÉï`Ë´¢,ˆŽ™_Ãé¤ðk06ŽÄPÏÕ6ÅyãƒG1^ÚˆHüVG'_æ?T-<2D> Å¢CJrär>ÜÏ{¡·>­»Írd<72>wÞÞ;—9ÝÕ½RVþ\˜ZÎœPuǹ™XúÒX™JOÏ·Ö9¶ðuìûzCD4
<01>ÞÕ•·G%-+{¾½Áƒ5¸¶ãCÖ®À8ˆÚ‰ÏCVj 79+¥Å‡@Mà+U*µcV*ä(ÔüìijÒ1k7kwzm0DªPåBcyž•CbEö‘f»Å®ü&oÑ|µÖwˆ09Î ‡aV×ÆtÔ]ð7Â(²Œ<C2B2>]Z™ÆQŸ³};(ÇÎ1¥í†øØtGmù†§”Ž¬{LŸwüÚ”wÓÐÆgÕV¼¿óvûE¢t"ïÆ'œõj¾cMrQÂb·q¡á![9çPtÈÆGVäØ€üô5PóRÌ—uÉFi-óR-ï¹À€Bò¾©Naê vÜ^‰.‰lL.YÄ·§{©ô iÜ\| «îŽÖ˜nIÖê'FÕ»\Uå#7&Ëþ}+ð“+gÚlÄù‰ìßE9'Vfê"™¤î/²Q¡l?Q&u´ÆšIì‰^©:ÏBó€z.®Nì™™_ëÁ“#<23>ÿÉ\°X`6·ÿO0€Ù|ÖQŸÂ]ì<17>é
í)Xa,<öîÜtÿbgæºKH¾']ýÿ¦˜¡¢]ªXÄ÷  ´›ýÍÆ°¸†²Ýµ·.ÈåÄtü·h}$7è"l áâÉ:¦°ˆY™í.ìÿ)+^Á%VÎYƒy‡rScìo1|•ªT¥­Fèç±3êŒ4i¦ s1”…¹i H† |9kŠÆ<C5A0>3U€bˆv¶D¦„~¨‰Ö]ÚcCTÅH»arCnQû݉ngÞ Ê4ìVÉÉ$ãÇFÝ$ŠWsÅšy V<>‰h}õl8<6C>f¸ûf¬R¨&á±Cª0<30>¢˜´gO)÷- V¥ßà 3/Y/§ùí½N•Rì碟˜µ<CB9C>å×Ýž÷dçùßð“szðÃzBâ½Êóg*ýwSxÞA³ñ](!Å© ¹œë¢7ˆ¥&¸äý€9Å—e}ŠS4 çw¢-|•´Ûa¡ì¹ª€t<P´[–©{žbˆèS6Ó¼ÀWºØ8zCø i§­ü<C2AD>ïü5µ°ÐiÕ Ô$¿è¤.Hv»aø*±VX͇:Ø8}¸—!JgõkB†žŠ#YNC]Ùs;pÙ£¸©|Ð/’”Td!÷$LÔ0šR0±ï „R€´™î¬D²Z
¼ôQZH6ö†Q:,´9FéÈÖh£ôº¢¥‰ÚÙΕÐæOÓe-´Aˆ^16BrDœ˜„Ujú6ø³|Ú÷åqnèÈ늱ýý ΓMFß÷ÂGï_Fˆ\TŠ)È+¦~÷ƒe96:¥Z…9?Ë"uô<75>ŽÉj':1Ë:!2ëD\êGV9ø®¥…´¶qgó®ûˆaá7<11>³²±´Ðï¬t;üÔð<C394>­œÏtœžÑÐc¤ä»°&£¤á/oVúHE^s»ÔIéWïx,Xc³ðŽ÷׬l8:|ÿE<C3BF>¬Wi[ÚLýù,aß®(Ò"¨ˆ@C¡F¬X_©,ÿÿ<C3BF>IB23™ÉL€/Ô‡‡ž{ç.çœf¢H²å3À2þEa˜:¸Ûoj`qgç7£o¢ùh©<68>²7#†xb {˜W]_Šè¾l¢w)_"ù¬P_PêÅhàt9ŽŒ¾+²mœ$ûpZGFÃU Øʃ1€²ͼÅ4$Âhƒ¹£ñœRnºš°û o"\ä<> ‚͇Í!Þ(f_úàgƒoNu†ÞbÙ·y²´<C2B2>ÀÄ<E28093>Em|ª³¸¦ÔZIu)æ0lWÞ< ÂÐÃïD¨ÜàM8c<38>9Ôñ¬F}¿:¾YîéÌ´Œ²ÍÒÀ˜$ ØÒ/Í0¥ÙòE3¶»@Öy¸(”½¶¨A¡Îìš<C3AC>°7ÃpqkÏD1ġΠdfŽ6öÆÁ©<O H[þ`ì5tRrCYîTÃI°ž$Õpl Ü4T-$.>íçÞþÞ¸°-¤\|ÂjÀ(þž¦…_ Ç_¾ü=­§@_^•àñþ|? ¶¢bgWõÁT à°<C3A0>Ÿlr
ªb~pB ½µn%s •`ZT ½µÐP1¨†ÅXÊ¥†Å˜Ï+‚¥…’ R­Y;ý-7]÷³ÙÿBÅ”ñÁ#¡bŒzŽÂ[Œ,¦³<C2A6>ØûÑÒ—¾œ®q½2·€ n·÷nV_
mc'óu\ND\¦ żø4ÃË M„PJŠÃ®¤¬&!KùŠ6L²¾{\‰Ü•GÚÐKî@÷•T_IÙ#Îû+Ú[ÀÿrÙ~Œ–ë ç6r<36>ÕÔ±G_ò„X'e<>Q‡Ø¥/"S#~:™dO2èe½ó!
Æà<EFBFBD>ç<q~búÏ„3DRŒ”ÆL eN„${®×] ðW.[Ó©ãlõ@Ÿ^/—Wwoõƒ‰^ ½lÔÚyøÛ£$×zWõ[v½®õʧÃê¯Ú°Wý¥^fÀw¹Úu%óçúºm&ØÃÂ{’ÿá)[kx*DÁïn?2ÙÕY#Ô_ü¡*mŸ}FsÙ¶Y./£L¡õziW9_WiP]<5D>Ý;èxéË à<>N:Yêž¼%/þܵy±ƒJ2<C3BC>/sçýhУ¡Æ¬½d™Asµ^åó0è[OBòÝí +è“GÐzú ú‰„Œ  b0ìrUL®ì·ˆio­mÐú?¬¼Áôè!ì]nž”Œµ/DX³À—]FГPèëd3¦=ŽhA[ZþÈÓÞjxÞë1ƒFZÓ·VЩÔöüØ[Wg?î5vPõǨÎ,oø³p¡A<01>mÃÞ»º
ÖÕ
oüeÍyQðwÎï`æ/<2F>Æ-!Ä£xÇü<C387>e&['öÿÈ# *†¬nmó<6D>4˜/ÒIR4ÿcX%(ÊvãOÉOÑEyµ™3M·­1®^<5E>ªpÆ*ï5ÞÙøºÓ<05>ê;/fJì+)eŽ6<R^‡fÎMsÔ°š¼š<C2BC>ß út[ÞFéwSm¢Ö=a¥c¦ä¸ß-<2D>íæ¡ ´^Ü:ʃ^Û<C39B>œ*™“\u ývÒm¡a'{æ`&*¹•þçiÎMì}`g|ßpq˜÷<CB9C>(» §;%}ÉLI}%•¯ü:¿Ýu_¨v?eæ.®¦<ÛìµÖ–‡û¨*êïU<C3AF>wöÕzÝf$·¦Q«9Éf/=ÉÕé<C395>š,ÇÔ&ãV<C3A3>ôð­<E28098>‰V…¡âP+©»ø¨
]´œ§<C593>CÆÓE¦ùíüè2ÉM'zŸûªxD2ßE*Ðs|ùv{P5#v%M;™ˆcÉÉ6yy~³,Pa^±_ÌÓTà A'^m£<6D>ÁŽR]Ôˆ?ç玅0úª7 ¶¼_-FÏù ­V_g/HIòïAÙlƒÅɉïÏ*¥«5º/9W^Ï…8-/ÈÉÁvž9hÙ·y²XPM™ÖïŠ_HÅ,¯gÍ tº)Ää<C384>¿ê°ûõ€z;ñRg*Œb'Šf«|Òû;;[óì„»»ÀÃPêÜxˤ µÖ çeì »X C˜¼G¤4 ²R2­4è¾hRߣ)Ýu­Ö1ú+†uç{ŠæŠöïaHa:È(Ö -0 ,–ñ?Y”}¿X`Ù}Àp¨Ü!+¦²bùCV¬°˜%§Ö ¥Œ±¿:o„ßûÛ ¹uß^¶ìBºNì•_vºÆ7 ·7„ØØÞb&ïØ3¶[á²ó߆sìm½å®ÇÞº, {FJ¦§ADD!W+ÛÁ2¯W»Ó¬šä¦ïÓ<C3AF>h‡ŸŒ5¹>˜ žaTG™¯hºÂß}n9„O8çJr•ƒ0“yc8ø #ãAÀ<41>ñûËñåXuéøH3ÀïÕ_ä^Q¼Šî1É@:â“lKŒQz¿.¿Á: i¸ ÞÆ ú±÷bãq?ægãA<C3A3>×Õ©mÆÞo
åA¯½w<EFBFBD>ÀÖu>ð»rר®™¾ÕIIÅ.©€š9ÉVR™'×ARBôÅ_<C385>ò•_ç·¢)e‰§ÒâtÑÊ-õ¦cÍX9c·Šú{U·-Ð…®ÞŒ09¹.ÆÂ8ø/UA‡~K:t{‡¬<E280A1>~ŠÈƇq½šŠÆ¢™<C2A2>[Ü¡ïð4I<06>;Šñ/Þˆyñ²ÉM'zŸù*IÞ¾+1^E*Ðs|ùü=ȨìÖùWÁ{vÌ<76>i'a¹µ[eüE+ `_…!D”Ún¨¤VÂÅ/ûsW_9FuŠŒ›å¬µ•†]Þæ³hâfÙ@È,7 ³Œê>6äžÃP¼—y€ÝWK¡Ü?<3F>òG\6;éÅ M¨/J³ÅÝ_ÎÓâÞO“&´éˆÞŽ‹ »{>]Í~îû “dqwáI³å¾|¼ãâ"*Öt©½0!ºßD¶Ôæõ:3âO²{Í÷™/Ý"BŽŒæ~Gx _êÜÙjäêÙIÖ-†ÊÅb5e~Xy+ŸL(IÆm'ƒ³ÎLÆT;ñƒõVöŸ±kXÇؾ"c $xÝÄIúʆz½8©ƒ¼*M\|tDK&Áu<C381>bKn5ãqã'˜îi=òÌ"7œY`’…-&èðhþê>&Ff¨v1KùÉg…úb|ðMDÈäqbÿp¢€ïŠsüseìÆ8]06~0°îwãW³¬/'Aó–·„`Bô<42>°<13>²òÊ`÷A½¾líJÒú{Û‰-Ê€×}AœáB IæâÐm¼¯lŒÃ×0ÙÎÛ8ßrÓu?kM—Ñ@Ã.rXã«3tƲoódi+²"^>
ŒøU\Cu|M- r¿®áp!°†ÄŒókô+·÷ÚPyß<ÆZCƹEÜ8¬÷8´·×<59>³†û\¯ŽÐ(¤Š ²†b A_v¶öØóŠµÑÔ}ØQªŒ|üIÛðÝKt¢zYéöÜ  È0<C388>4Ôñ¬F¯I°»Ú·€F®Ñ´9?™6ǘdžÑq<C391>)Í–¯#ÎÉTã¯ByÐkûb*´<C381>pÁôü»â(‰Ê{M Iæàøæ_Š$+“p´±7ŽÇy˜ªÄlŸŒHKñ!-`A^¯3#”uŸnËÛÆßÝ+©¾2>ˆ%´= ¹†úÒ½†à;Á5$–ÐŒ‚¬!xÕhÍZCÌ8*†)7ZÊbLñP1̨)n)õ¥G_,ŸL)Ÿl°ßJ“7*ðÂ:š3·R_ÂÍŒáuðŠ<C3B0>ê®<04>¤}Ü• âÒ˜J+j M†qþ<>a¾¢ Ó†1Ä¢T´Go-4†Ï+˜lÏ¿%
Èý¥”rßÒ`hJ€ÇÀ?#N+ÚÌû,
Ùˆ&ˆ7¬2úRѾÂ|õµn#¯Ä÷g•×Z><3E>&ËÅû6O5õMB¹ôñ¼ÊM'z_Œ)à-€Ì³¢‡N_@J@n†DJ†SâÉ.Ža¯n¿YRâYÖ¯Ô=y ĺáSI¤ÞÞÀ/µé³´H4/”@ªÚýH )ý¥Hô¾ŸÀ¿:ðw×<77>tS?ÎeµÙ©%F¥ù ­b#ünü•mŸ}FsÙäåò2ËZ¯—v*!Hq0@AuuÖÉæÐ*ëË ¨]'m$ºŠ†çÿY¯Ö¥Ä™ úyIP"÷uwñS((»(B‰Z°.÷÷ß™IÈ\˜™Lˆ(‹ÂîžÓ}NŸ&—Ÿ^°@ÆG:³úòž%î¦h^<ÄpÚå²xÐ'<27>מŽ„I³µóã^RÍi<>õÄßÂÉ<00>)•´÷$Iêľˆ“:βG°²@½õ[]_oúۤαG2iñg„÷¶rG$}1M%ˆÁ´©“?<3F>þ[ À‡•ûÃ9?i±×'<27>×Þ²ž»`Òz?ÖïI<>ucšéŽDI‡¼¤@-=€³%Þ[QÒåê­¡ “ÆúúqG¯<>úÊϾõÊdº
éz„Ò£¿¼Füؼ(üN3Vßnô±JÄøÍiLáwËÍ`j«Ó<C2AB>ä+º¥.øo;‰*VtÙIusÇÙ€I©ƒmÀ­þ¾Àº
-ͤ—ªx_Ó¹mÎ)wq9å¹'ôá¹ÞQ ¤ÊÞb!Š¢KZÊKÓ”Dع»òP° _Òþ7¿kò•Ü/T˶¹ ‰SÛ²8µc¼Ö<C2BC>,!q²âª8a”ü£pb=yrÁEw<a0Å#pbÜx”y:±åïÓ¸/ä¾ïÕZ<ìù>Ÿû^Qéð óK*%á’bûƒžý,¾d_¯}%œÐQáE™“%=§gn;rV{ö\~Y©ÁöTÅçÅvïs/G§i
M)0|7kÕ;<39>KÀÿ90ôÉj3È"£<>áÃ%LuÀ{šf Ç'Ík¾OV~Z_>MÃ'‰éÞ%"”•Œÿó<C3BF>‰^Ũ“«ünÏ%Æ_ùA—iÞä@¾Ð2n§Mz.É6<C389>9ýEð¹Æ†f­ð ¼Ô`¨‹´{fb×&ck†ñëEÀ]©¶iFùM<C3B5>>´­¬;1“ÛÐa|n„á6¦7ª2=uwe d,EÁ*Ùñº“Á•yu<79>
ºZyæ¤ògÞg©Ó]Ã@]ªîo ­´MCÂReô_¯®ÂZ<k¸;@/M.ÊÜøeúµ¢<C2B5>Ì·7À­~[mEAw5ÿ´‘;S,®RiuXí/#¤–œ )(
”4ŽJª`š1%i·(FïÉ )±ö¼þ!µ§X¹Ÿ=…8ÁNI­ƒ øîÑžÃà!F ´Kêue¼e˜`ž)b¹ÏD,ÿyˆ¢!æ­SoÐl4öøòCüV;gX%ügˆ[3hîî]1¯ö§5¯êÐß:
ÎîþŽ¯Cm¯‡6¯T€­àøÊ¿±;Èî·zþqsÞ”p|hžòÚ]œñÙ½.°{gÑõº.QB€g+ßÁr¤<C2A4>aOÆÝ(YœîL¾_|KÃu”ùó‡A]58rÄU—iw€•Œ™ 8Î>¨(|<7C>fpÎ+)Úï¤uì¹´bÀrò2Ðb<C390>Š¯¤É>U‡ãá¨\ ÕBä.ÚÅ…ÿqµÖ’¹ õk¡¤à.Ôp*—n[ò‰ð¸ˆÓ{&Ê`Ÿ<¹ÊŽWÓ{uæHJb—-éùUçÒ-é5ï©–ß")JLçP%A…ÙÞ˜Qq:VWáETH|Ÿfè¨Á^D~ÎÞG5öŽ¼ ‰R\á®4Ý»<C2BB>ØGÞ/¬è¿ ûZòr®i2×äbøC?xZÎ
ÿ40Éôã
åîÿ-ÉÓЇãÖÍ]<5D> ,󪾸ãvÚmñÆÎ|<7C>fðº•}µÙqÕòÀDj)hScƒ¹ë`÷æ‹°Ý$·HÇ€àãkG€ÎhŒŽÎßæEûÅóÝx©½ý÷Qm¹cĤ °…‚ú:çcWºÕ5CáÕÒahbÓ- ²ò´ešîy“6ÝN
,7ÜÈäãџƬN
o1Å -ÝÆhç­2Ÿ;w%ìyázåôæxr(w¡.³ó&»+¥Äõ¹¿ L<>XomŽÜ@Cl¾*M2a—(öÎ)÷{<7B>D?9û^OL¶¯zø‰<16>Ç}ùª“/ºìx8HÉkÕzy
-.ä*Àó­8ÔVa¼`%Í2ܱ<C39C>ùMêtÞò…<C3B2>±3§ýñîDZ2n`X¥ÝWŒ¼ò4µ8!È‹ß‚âÐ',7lo`K II´W¨¥(m5³ãÉ8Éì=ø]šÇˆöÖzÉF <0A>˜É§ádÌz!® úþNâùa°C%1#vJÔ—Ÿy`JI®‰pYÝüÉ|ûb «2³L]˜Õþ´Æc<<3C>
W‰@Œï(8 ž<>àyK¬œ¬6Ã(:Ã`¨\ó:2÷»3ÿ®U(C©ðvøãäÏ'µ(qÜ(ÕǕË¢áâø6>T5ÔýãÐ4Ì“qìó¤7@„;* ‡OB?Ës£¼müÍ­¿_m¹—ßÒ°7ghè~ç“Pt¿(Ò°Ú¿Z*\eš!¥awO2¡4à öi4ì"Ftão¹q¸ÅíÈ4DQ0 ÷¾^Ý8"2Q\Ÿ,‰³ ™(ðâÒ0„µGÁò翾7x¡h…ó ´÷?0þN
ÁœaüZl¥]¾è”h|<7C> Æ«¿Pm„LÇ€¹Ëɽ‰²Í¡ˆ»Úb"£#¶9 XQÁ3i§ À{œPP*©NÝ{6rÝWŒÓïY Ö1§/?ì«PÛ ÕÊ_%;^w2Þù«e_;†µòTã/§¸ñ™÷Yêð¯j#j† Ú6CCð]G¾À“Ðp°”Ð<E2809D>´Í<E2809A>·Ø?"\³> endstream endobj 29 0 obj <</Filter[/FlateDecode]/Length 15658>>stream
H‰¬WéBÚL}< l5(@<40>ª(uaùÄR¨²Þÿ™l“a& àŸ©E<÷Þs·s•|­×”q¶.('µ¹âíPÞ#—à¿•¹¯ÝÞËbG­ç}O75¡8ÝdOåømîü¾<C3BC>J ­œ‰^ŒÊ2öþ(»ã´”Î=d9Þú})=<3D>TB°×¯0À¦!Ì Å[OãuÏWc•6{ƒ…2Ñ¢t +X(÷9-£µ#¯ ÆŠ…ûƒ±Î<C2B1>TFx©>Ø&„r2Q¿-¬ œløÞ0/´î¥6XK“Ñ C@¡X¨`m½>j—¤<E28094>B,%'J³ªU·"b ú–Ÿ´ídz<C387>ú<EFBFBD>ƒ}A'+'¶mòa,µ±¿ÔvXŸ½GG*ÝeEé¿ã'=±ê˼JMl©÷¾ya¤öRšl:éôßPAD<41>þ=Pñq:•åTƤÅlRË<7F>YÀ3UÔ¯üŽ5"V<>”üÅÌ {Ý–š.`Öc€åL(ŽÏ†Ïš7^` ÞŒýtaLjœðúƒå9>J½AŠ FBY%&ŒÕ¡°?AéÖº _áË%½"@,§A'KYÆÏ—X÷*'­/ª=è+°’n´õ:³ e^$ù~@œÎásþK5b¥]†ÏS*{“[©‹Î? ÖAÐûwIá¢ýcºÖd~­×˜aV e£àŸ©´vZÏ3…¼Ígºuú•Ò½íz}Œ{ç–½$0fnP]o‡©$^À(ÇÛf…óÌŸ{†Ñ¡Pgùï™n4×ÿÍ4ª«3L§YÛ¨TýøõÀ4ƒÿXFßq£¹‡0ÇcfO0£ïHÈ6ª…¦{f z•UøÓŠ´öÏa4Þçx¬ƒà Ó¨TÍK¿F„ÂíÏÌmÄâˆõ•i¬åØFkâ°Ë4ÊñÑIìç”ëy åfô&Ê4ºÖ:JÀ6
÷Ãlàò5ùèÈê$ošG?‰ˆ—¿úùÞÛöó Ÿ0Œoþ­ÞÔÞ­ç÷N¦FÝb~¹2ÔÅNëcŸ;«³º]3g¤½èðmW Dìqw%H&b A(ùzxfNÐçŠs7gößÍ /`|Vå.ZÅ}6Š;â=£^ÚKÐdrIV_µáš–û †
)wI— ÔÂFy?ƒÙßÝ| oU _2B+s˜ÒŸÅÔ¦¡`}ògòäÜëdê8ÿ<"×'¼Æ<<3C>%[™Kz³”»¤ÉlÒµ]âøcêIšhó'ñ™ÚÒ¡3¾äÑñ¡Ë8E(ï}Hwº”¦¹Ût ðž¿§_Îd&O†7Æ…Ò&Õ“YÄq{XÙWÒú-§„
<EFBFBD>¯yßbÃx][÷Å<C3B7>»¥MgcêK7à}³¢§­‡–¸«ÔЊróÆ1a¨7«GhÉ<68>qjlr—Šy£±\»ûôŽ*¢GE¯Ê7Zqöï!‰KçV!+‡3ï Z3BÔ¥#M•´b˜´è»3XËÕ¢¢<13>Ør(/wTÈ8³¢Å¼ÿ„U­¯°ºWà1ìÉ_úý²Ðq6è'ð1šï.¥ætlÁË©³ð³Ïö¬°bø•YeJ¿ó Z<>h#—Ðì<13>Ç 3ä¢yÉÌO—`è=—m—ÀßvÖL=Âñû(šn»mS|<7C>{7¿ï5šrsÏ/<2F>Åùé}Ô{ÓºI_Y〻xC×k+íéT>è²Ô|¨q‡SÓË©K+u¾ò罫R´ Òò—-v[>òg÷ ;ƒkK™Z –æ‡`^gŠïÊZˉҬjC<6A>óYñ¾“Gáhý»sÎÚ£sN´#˼nKMº_ŠÍSŠ»ÇìŸúþÇ,Œe§©ê¤>d+aºô©§'µ+=!æùkWÐ`í¶Æbq6öŸº éˆë1ò—[Ðó·)òÄ®t9<74>Xp&³!Ís¸˜™f1.L‡N> CµîÂ}µ Å²SÉØ"(õìSÉŸŠ†æìý#èø(Ä~û ƒ3åÔ8g”óÐŽô1]Vt§nr/,mÒ¡GåTOÅXeMª§WíÏ<05>Í1jÞ<š¡Sþ+ÆgÐ?»öœüŽÁE¹ýôËâÚ{høÔ³kÚÈ°öË>Cðä§ãm˜slví)P¼x2X‡©YÉÇ•@eCÈ Ê]éÛ©þò@—9ul=™.áwªžýCy"DÓ%c&»95Ù0µ³îÍîØv^¹}ZâwnQnlÝOJWîgÃÖ„@óSï\ôÔšæ^Ȇ ±0¤EÅ»} Œ±N„ìÀ&<16>Õ†ÆPFxã1v*uN¡™üÙȆϚ7´ëv<C3AB>Ðr1fhúõŠž|ÚL¥ÉhÐñŒ*AQ1t2̹³
(¿ÊÒ*ª>³vôgr—Š°äDXyY¹æœJ ¨1b•S‰<53>ûÜp¹°¢÷,àÆîY×JFݶ«
œ‚=½+Ø—M§`ÏÒ.ÉNá®I
v×bàxzÀ…{Þk
"zŒpk<70>µ"Š<>ŸQç~¡ç×sé6ïš Ífhï^éVhq÷ÐÜëSWM´7÷¯PG}œO´ù- 4a¼Z×
(`<60>Ù½T2ž(þäbLZð5‰õ ALÈ]õêì|”SÏ~»dŸè_=VÎÈ(¡ágÅ@,:¦ë=ìÕwôû2…Ý/»¹UQ ¿å/6˜Ç.;pÛá5ù<C3B9>­±2d1F 8¬ì<C2AC>“ØËŽð-Q‰v%…“ôá Çc»dÜÔX`)`,(“1SlÆ㻯÷H^jdçx^jHõ™`ߢð ¿v4¿÷îbRùɤ}åýã-"¢`MžÄ!ö/Û
ø¬°pËè,଎ÿ¹dt|wqàV±£±€çµ_%¡¨ÃcW[bÞE£,°Ì7ô>àû!x¤ èul1a©¾CqºîÙ×Q8Þ§¿<:*Ø•Éø]oœšÂqåÂÛtÒFyN4<4E>°3ÉøÊÜN|zº+yxY°ÚP}Qdª/ewõ6$šÐ²µaytJч·!óÓ9œ¯6`Ô{q?5ù~ [h]¦¦×­ìƒã« ݯW„s|v‰&do1ov’Â^·Â’öl¬ùÛ<>ʉmTæe#„_j;:©nRºµÀF†ú2¯ÒFǃiÒÖŽMÄ“»ÌáxB;Læp<LnÞyº¼¬²Åîc »øšTr0i¹ì1ït ÃÆ‘¥Yõ¸¹ P@ö<>Ÿ¿ÐQ8Z÷¾Å<q¬Ú0*ÃK1£|°ÕRXÙ ³Ô…Õ åÔ3>u‡<75>¢™øÛ{YìÈ"zÜÛÐlÂÁ5!a|ú-m¢zÞ°çØ%.ì-æÐ8•…ûµeÌ T2‰ <20>‰4… %À^·¥¦WÉÁÇË-˜~eÃgÍï®t¨c?¾ë®¹ìú9Ru(Ê äx8¸ör/a]"+0æ- ™Â0Sêõ“„0Ÿ½ÄÜb®Òp7µcÍe0á£@ô³û0:cà£>ÏL* =Âœ»ŸE! ØëW¨y)õVaÆxëiëž%®Æ*lÃ{/r_¦/ ÷-¯­9Ø&܇ºÆš4 :>ÁË¡œJ3Wšc^ë<>(/¸nú>*Â^pŽ±×Ãd³«ÑÀgìå`ì…˜: f6¤<36>N! pžË8<1D>Ë€×a Úd ÃÏÌ[L9i}9ëi‰À”|=<ÓÍׇwe»íñ¼ …/œ‚~2fÑRíóUF·3þp0)¯×JûïezsÞ¸2Q%XA_I¥µ“ºðx7Zø!ˆ÷Ñ·ú4<C3BA>º˜] gÊ*/œŸµûÂãßùBRÕÜ•ê,Y<>ªÍû+©ºø{#Õþç½Êûgºð'ð!RbKȈ¥v I¬µSÔVT¹í ßÿ93´o{¿hŸç¿LFæÌÙ®ë:•<> ²Å*¬¦ï¨´|¡Ú“7„êÙy5´Ù5Ñ~‰šýØ=»švÔaÔ=”P¿ßš¢AÕ»GCoˆ†OöŠªª2XQµî&¢<ë¦zíšíÑŠ%Au¯ªüÞæšO2¥L14š½Î;å´Ò­²%Y&ér-<2D>³ÎôÃCˆ+ÚÍË1<C38B>õ…¬¥ÑŸuw²zRvë+IÄžÖ„€™•z<E280A2>F· ¼+o¾Ä<C2BE>c^
ÜAÓ(vö§@¹mâZGý/±j`ÆDá$  Dì2Xa„ã°CÃhß¡ªEóO}ŽõÚ¤$óI¤LÇ9”.Wš¹¹½…u´ßÉàK,X|Aœ2 àÃvÉÍÇ<C38D>ª½ç̈+½±ŸºécûX?š}¥—&~wáf-/#±·RŽhÑG¹8[“
Q ŦvÊ"§ð4Q(VªV(WMð»å½Š}j Øúâ»ßöB<C3B6>ä%·W&柟ûŒÄÒÅžÉfAú®ºÊÀñkû1ÂZ,ÜÛìÒ5oÜßÕðÆvz²3qåV´…“XÉ8™xl³ÀøÄâ%{\¦Ün¼tŸ>ä¹ÙÊàÛta8Ù&SóW΃¸¸Ï~ºfMìö°±v M¶<r?öü R!nl(î<C3AE>Þ¡/¸;°§¨± Ûi<C39B>9ÇîÒrZq<5A>7 € (´t<C2B4>ÓE—.!h?㵄ö^ð¹È“`xF}úUˆ(•D¬Â0ñ²uåm=.¼t<C2BC>2h\±cÞ¯¸õ¿Œ)/L˜êgJdy<vÜyñ ·²ÛŠ¸¶ÂpOµ6Z':öyG <!fñ[·n9,AÄ/k´Ì†}!šŒÔ [¯ƒ<C2AF>úöã<D|©s¿},><14>…¼x8³e5oøŠâcob'˜Í;:5J/v!ðÿ…?åeèµD£C½Ä‡ÉÂÁ3{î^ÊÄp}>»I¨L4/u²½¤qéØÒ²ÁŸ/}B`¼ìxŸøw?>¯G{Ðð‰øñ¡O¾ªúÉ`eèhÍŒûtøû #“?§ ß©UF¾ Ÿ©<06>ˆ7QßW“K÷»S,<2C>§)Ÿ¥jçiW²•µ‰…ÍZO?GQfàXÒK²o†ÑGÜðZù†<C3B9>ÜÖk<C396>¼ø<C2BC>OÒëüô?ï1b^ks%~¾O)Uï)Òòa,Vë]<r Ï
Q¾§ÍŒ.ÙoŠÌ?¯T˜,ˆˆû›»³`0Šêè0¡àx€N¤ŽòÖÌó§mª—WV\íƒwœ¬öÃ} ïLQ˜6䬲d&È <>¥:1Ñ©^v8‡Ãj[ãlz‰ïc#þCOm% 0zÓ}i-ânnþP¶¬öÙÝÚ±>ýndÏ d@„>
‡Gî
xf< :â:‚ž€¾h" ÇîÜp‡Õ“î»;:ª~Ôݦ“òΠ/JÂ÷ñ<C3B7>‡Eë¡Õ¼Žâ6Eo<45>W<06>Å>ceVÝÁ2Ë!ÿ(<28>CžwCïŸ …ݦ<C39D>nü©ä9ãž!<21>Ó1§á_!IÖe¸<>1\zæð~ÈËp!¾AíL ¶éêÅÙÞDƒ: ®,8¯ƒG…Zˆ]Zã‰7 Ì´<æá"ÅtìÅ,}
¦à^:(W.Ô¦˜±»H±¼¢Î$K¹®>å˜/ã”k]éâ]D1ñEs³å<p1²ÏÛ ¢eðÚìµÖﺀQ¤5ß„f>Uû:%¥™2`3f±ô-ˆuÉg¦­Jt©FõlšÐkIUcó…æ7dîÕF¥u²T {ýþ¡X<C2A1>ü±KÙ—@N¬ìB4¡¸O½¶#ÈŸ^¾ãfôZ…"®ùîµÌ<C2B5>N!Ò<> $wu¨¦¦±õˆ¸ ¼ÿÿ&'bÄN|š -TŽ1ˆµi<cà^Sv'=F`K€+VUhÚZ;a“QÛ׆šXöŠ*%]aÙDa»"M­[sØFòëp<ø{Ðÿ7äÝЧ<C390>ÿ5ïCiO£¯Žv=ÊN³`óº†1F¥a<C2A5>ÌšÌÌ;3±Þ|V#o!užR³Ç]¦Z<C2A6>__mn¹3y˜N$V½+<2B>ïýÓLm}E¼ã<C2BC><C3A3>SÆcSâ>}»ã8/7¸þ•ãWšé6×oqœç“mOöÄÈöIDeýxþJE»Û>ë0ÊT"AK”mÛ°à<C2B0>OPJakxÒ‰ŸÆ<C5B8> ãK±ÔІýkÞÞìŸZÝDßÔìw(%l"//„õŽÂªíš}ÃÞþ1¶ÿŠPßâ.ZÓ"A#U÷ªÊïA)¹}™¤íND¿Ög<13>á¬|g·]ÛkÀb?…õ+@4ÿÍ,~;‡ãìÿ ¢å',v·»¤_î õMîB^°Ã_Úï µïYìsgA_‰«ÖØwzí\]ž‚çuœyí‰ Œ´8ò«»÷Çp¯ü3<>?ÑdrX4É2$ðÔäçd­#^"/fü”
 TKÊ|ÿeÌ0Ò)¬ãée³Õ…®Ìø_<C3B8>ÀiÛû>L fp=<3D>g`™[qOÁµ s s½É 70‡ U!,¿Í“ »½"gÊs<C38A>°9QÊ®æš"-=IˆÇ4UõIs#ZL"·ž½¾Ñò6•J.lë®ä~´i&új9Aoz©;<3B>•¼EêJétlIöîn2úID|«žLô<4C>…ãxNòr=¡ÜÉÜ ”°~º3Þ×Fúåšñ”Ò/’¨‰þýðwõ€³ëœp;¾š~à¿55N½äŒá,Výqâ¿Šûßøå“ù;}Æœb¢¯e0õX¾SvUá#©ma·¹ƒw åàäG~!¦o´"»E)Áøs"»i éð:{…i}‘ÕÞ¨IxšAÉ<9ÈRÂ){•zâ±ý/ñË`¢ÿ
¸÷Ž«ŸàöF~¹Ó2É ±m±«îº¸¡ùRýîWÔú ±N£ÿ%¿|ÇlXõ]ê[Ü„q­]Á%i8}~©\áõO|>ò ÀúÖrÑrÿ°^¥[é;=ø
z(´Pº²ËN)(«¸¡È*(Š²œóÿô^û™®ðSdñKÏL§Í$O' ªlûõ®¿—ŽßCÝQî_N˜
êËÁõõð'¨¿A~÷Íz}9ô ÕÊÒëHsá±bÌn.pò!éudrY<¶¿“O®=bÌž^G&Aéé`ßÿ¶Ë»Þ]hØ…H¦ú%}Ï\=²$+©UmËx³éÊ_“~ÞS&}ÉI p$;~¿&(ôB%™x5F²wý_fä$z I¶Ò,ÌbÁ,Ùó ~åîà¾æ
z˜ú:[Ï<>©ÏÅfwñssCP§¶tûÜŒn9 ±Ú·­Zm<E28099>bÅ>AýÁ¤+7 GoÙ M_}<17>xÛŠA{}JGiNP¿v”0Ä [vMQs=Ž±½bþȈÇý4A<34>ÿž1öÍÝèxìöÝÓë/£ÄÞ׃÷žß~™Þr~oNÊ6'+ÿôùE¯š¯áX»^‰Â¬JÃ#žÍöªÎ*Þ†dÆÏåÚ—l_êßÍ*ßM*ú-{çyªá}ÊÜܾwö*2x¥vIÔÁ˜<>VdñÀæÍ òs{FíN>¼jæ£ÿþ<C3BF>ŸQ7¾Ánxr|êL<ÎŽ 4Ñ3ZåÆáö»ê˯™õ…å Õô}ÙÍÇöåË\‚ÚÃà]æ¶çÇW±Mƒ1wì[î×ÇòØ æ>Îô>ùdÿî6×â±Óü»Û\ÔÃü…wúä¿ðïnsaûÿî6ÅØ_øw·wqóWtõ£¹µéß9¦LkDHÎéá<C3A9>/;[V $æ”­eºÓ9ôÆPÁÍ6{Ë<>ÌX?ÂPAQ%jh##<23>/SöbÔ£§h8ilŒË´­¯qg*¾J󾤽uä2¸ÓG.»Æ.}ËÛÜ<C39B>Þùr®TÞªá}<7D>íµ¿u8©^i3¯Ý~„·CU)K„0ry ü®Ù¬gLo´9Ÿ<µ’ÆáÞ:÷Ëîó–(ö
+: ÑXáñ;¨çwœö®½ìÊðïÓRÍK˜Ù‚Ý®¾¶ÚíK¯W(ÆÍ5*˜m­/ÇGçϵŠÀ×Ftð°<C3B0>]Åc4ö¦ï½}HG~±î%$+q:Õjƒš<C692>ˆœÎ†C}Ÿ†_Ö$º”Ô|X¶Ü¸€£KèÀ©kóq[µçâû©#eJ¸…ÀPTs¼ß⨆k9`¥`}fêóa!š|:ÊòÚ„àÉÁºU3!hZhYé³<C3A9>ÐZȘh!÷8ì €6v‹ÝàÆë²<C3AB><C2B2>Ê}ÙòÉ—¢•…‚î’ß!<21>]Ñ Ø¢]+‡ki-î¼ØMrÆç5Ù‡–=p5ž ç7#a†¶¡HÅÉÞw¡„Eü$€±Ôq"¼é~ùW„ïðŒØÀnéˆj†ÿp(·²áN5ƒÿNŒØÞfûÕ–`~C„x¤CËü˜Ûzûkv³ÞSèM=öT†aÙè¾ÐzËÝHøwøW‡mAíá 9}EÓºˆ~ª¶)âÛ ÚÒ<C39A> vš!žD[7¾¹ÁJ†!§•\KG¡”ÛøŽ÷Zˆ…œ®Où¼®©N¥Í/÷ <09>­Â1ÆoóΡÀð?ˆ®ƒŽØ®0å¹Ó•çm1v¤ÂPÔN3Ne^ú1ÆöÍx^þ]‡b QÉùŒŠ¼Hå Ò©¬#Y!ýØn-~Òá— ÚÒ×—m-¸#BÚnnŒŠ¼?qIG°Ž^‘ñÈ“Uz)ðÁVãM½IÅó‹÷˜)†ªÅ\ÿõòúºrPÊ>Þ¦ro}^D}bî{ÊØzþdážÆÓÜ¢°ÔZ¥ãP÷™ž|EÑ\é—ºÅ!+ðý/??).*Æ~ô7‡g9uëà°Xx¸)m5tÐØ Þbù§ô ^Ä|øÌ* ˜Yƒi¿¶m/G,^É®x¼§v™VIxé¤_Óçerz—hš¬ðÙ3¼ÖÜÂæ¨<C3A6>yÄÚÿ¹‡æg?xM¼˜‚íÀïºUFº
eGŸ Ì·>Ûç0m=~ûÁ<†¼_…(Jæ;Ua[wOÅb¨¿} ¹øzÚ™ÎÊËLéþ¾ œ<t±ºŠ<C2BA>ñ€£,ö ÿ–D<>“#,5˜ê5ÉaaìûrÁöVÄ@W?]Á¶%ó•ë âƒÈhg܉N} ž¢ùå¡ì7¯í·ô`T ¾wÇ^?=·j<x7Û}7çd´Ð¼B][(ö›
´+¤WôúÌYRêH9'éP 9Ìeä*)¨iÏèF¹&Hœ Sij-fþÉB^b>ºN=ˆúÓÈ>ܲŠêq>¨ádÀ0ìà–Fuæ®ASå V-Q¸ RÕ #T2z!<21>_}ÙX X„îÆIÀ1ñI“×ÿž´Mm'UNêÚL†2> (í¨CÊ]œ R¯òEé¶L¦!Ìr6"GÎGæ%7©µìGÄA JÚP˜T×ÂÐÓÊiY¤CrÎÄç:ÃüªÉ™ú<ãÀ€wA,ˆiV}ÑX %ë;=…Wï<57>´ ®îT/“<ßùR{*ŠiHvw—aá²à ‚¯Ú!_þ®YÌ”š³ Á–Ô‡À®=˜kÀ/Ä+NÆHŸúLG±9ñit”mv('ŽsÔÝZà 4·Ô røèÁ¯§°ÊÆâ$±èzOì"««tÿÜ¡Ä-r¾ìl™¡_î”7JöGtÄ££,Ò2 t  ƒÚºÍGCã±ä*ùµMa˜\€»æXadK2<4B>ÓžÖQN^ðBpPJýÃ^óœ \Æg|R³ªÿ^¦tï^Ã>`,”zØÀ–`†_£«­,Sñ:S…Þ$3bBá)4l²-ºy¸eù¿$‘³ˆ$‡ÎøÆúc´¨-Þ^ß>ÏXâœà3¢xû9œ©ÑèfôßJ™=¯§£ÏÕYìŒÏ\ç.."Aeô<Žàsäâ^Ød¿n„Ö²ype®ðÁ¹œºYe•—haRt6}åExHÚ²!Ñ<08>IF.&H?ïiéKNâ$5K$;~¿F[•“ËQX$æT`)»®6*øeÊà!¯S-²ë¼¯R¾WJäµqªLpüä¿”Gõ<™b0F))߸•íU¥ëp)<29>baûŒP¿œÂ<C593>u­ãG™ë6'aMeˆ ª¶Ò--/ iå&™x5€Ì¸#£äl¶°Ýšt)X UUW¤ÿ:“Fﺤ?#I¶ÒL#û¨-îF«tkc9Ø_}×ô AA$><04>„ëâè3
%$çi‰¶f…+zÌ­ñÐh9ñ¢­ê‹è`µtÓ¶ÿg½J×gðä –¤³±–°*ˆ¢(°
:È*ËùÎü9×~ª»³É§Žóð“®îꪷv<C2B7>çI¤aë;åôÝ:gdHMñ[vÑØïO˜„„]=»ÎN"É&<26>dË°&©È;HÝ}/cªÈ&8¯/%HCÃ9o.e6vöÍ8ŠKE»¶öÀ&TëRÕ,¥:¢õßßáò|)ÑD0ê±C39\i³0ZØi®Ãý<Pýe/×<ÝôÑq?y<>h<?–ëäÓ`û؆BFÛC1hõÔIX Ò-OoAœ'†¤ù Ë°…PœëeèÎC<Ý ÿ§ê†áÄtÖC4<>€£pÀñ=~$»Í98ŠÂé6l&7­©\f£Ý±Ÿä8‰kßœ˜-@GrÔÖ<C394>ÝhJÜ~<3U¿w4<77>R¾|†ýòžö¹R¾]iäëF(äçMÉxÛwzXB]*pCèߌwé׺{•²è·3˜c#i%õçUDO÷÷ ƒ÷€kY}gÛÙÎ ’ã <E280B9>ð0ú‡.ƒûÝʇ<C38A>ÜœŸª
*aÈÿN<C3BF>2*˜™“r2»¯L쎷+ÐŽß+5"­ìMvTã-?œZûdcßÝ"{(M]¿íós÷c¶qûÃW…3÷¸ÙKA†<41>¹ÂŒ<C382>Ý:Bº:Kè•Pƒú†<C3BA>Â脽 \z÷jxå°{“¶<E2809C>ĬEX}½h»8iåO§µµÞ=×®ÂMT€µä9ŒQ‰^FØ•/3OÍB¥¸êW2Áx¤Ü/Æ=<3D>±Þ­ ¦Àìf}DÂ|ܨüÅ6…ZÿÝFå/¶)¶õÿÕ¨üÅ6…dË÷•¿Ö¦à[h¥¥SÜEƒ<45>Ôagr)Íè0ß9+òÖØž¶^uU¤·Ô<1D>‡[Ϻá`c‡·ßÁö§Ô[œ“EhZ8`Ô=éx²ä<C2B2>?€.6Ûšíßn·.¡1»Ìo6g«€³}éOô­»XdmhâV…­ÖUÖb0õˆ™á½¶4u<34>Â<EFBFBD>dǾ£^>„-¨ d ;$O׺۾LúÌšÚß½ÁýÔGôƒxIIÏ×H8kí7…ëâVÅMUO>ÖkH¨Oܘðð»šÏRèg s‚¥Ý…Í~p&<>8ºÓ1•ÃIäßôuÁ¥i—ý íÿˆ ”mÊd±/ma©!ͼyé0ŽöZˆå¸ ÒG1,³Ë»_š€S°ÿ½ZYòÌmäA²R<C2B2>òNå·7ì;u <16>€±¹ „ÎF™ $Dz{Ü# PiœD7B€£ð8@Hë¯+8*)Æ¥ç ‡I~ÃBΚ ôZ9ZŸ H{ñH?lÇn<C387>¬„…`“{èØäiü0A8ðÎï@M<E28098> Þs¥Op„µþ²+Ìn°~)"Þa²0쟩þ”ïE%ÇW á@@ì«j #œê€ŽJ' ñë,Þ0qïÅ6AìØèþ0=@}1Y|7ÄB08“H§t áY| ƒ“™,BüÖ<>3×~¿Áb˜®¿•áЩd0bÿS5ЗbãƒÄ'±LS;¸¶îÒ…~€˜°wzròÊØY\Ho8
Ç8È{ZÙ>&„¾ Œð‘ƒ$D§<44>}æ¦Â1ò¡ ±ß¸ÈïÕ@ŸCiøاj|7ëÒ‡>vlÄ òïe€ùE9«éAÊb£©òÒw³ŽrTä<54>¥øT†<54><E280A0>ê@»"Ó#$Gs𸤯egEÖÖþñ- ¤¯Ô³<C394>=OX<>iñ6<C3B1>h60ffË˲>|><>¾®ªJ¹v3­O‡HG¸@öGÖÑók¥{?‰˜'ì)±ÐK¤ÈÜæ-<2D> ³5 Kýò8„„ákϧ*~†ñYžÌ"0ç¹yÂ^¾<E28093>½"4öªÂÑ[|Ð…fV°<56>Oc\U3aúÙÝNÈë“=©Ô Øç:è©—y¶&_§˜!´X„!0¬AÒÙE
9Ï4űEà<EFBFBD>„ç³'‹€„°§òÓ$\rDSð±RÕ=´VƒŽí0m=Z„°“°N`ë_iÖ—ðyå]ˆåHU»¨Aðd<C3B0>„«L »XU· ›½¸¿ï
vU$ÀÀIŽXP˜ž<CB9C>bØÈ1pWuó ÁØ÷ê<C3B7>ϦHN@O¿ØÁgGj73œn!¢OS§˜»Œ½ü Õ0¹_:0oÀ¨i‡óÂ0åM</}Íbª ¼Œ}Z¼Ôº6mn=†­<v¹k,aœDåRÿ%ŸæÎü¸óØu<ñRÌø&·ùÊøì„͉÷V²­!qóþ©áØCÅR|·ìâ†ï<E280A0>êÄ+CjœxÔÐäŠ'³Ø¨…ÄQµÂÁ[GDç*×z¯H`«ÑP6ßÆ
aa˜ÃyÜ~ÖŒ³³2ßz¢Ãú#É—®j†<³±l :z'rŸˆ4¨½²†.³E„d9“cÉI<C389>FŠõÜ<vÃðJtPÔŠû9û::èUr<°ÚšK­ w-ÞºôÑp•]‰%1ㇷ¡h¾<68>%{ŸÖ»ŨÈNyÔÝ]1ÀiÉè]Ø]+jlœ¤&ÙÛßFÑy)¨‚­º‘`á®UÎ^´Ð)ÉŒfeçHPn|$ÿ€]b8לr$¤H­¼Z8¶fAš¤r­¤Ì™›¦î+/ äç·b*ïƒ-a#Ì Sáâì<%=/p.‡ˆHÔ.?àÌç2Ì­¶`ûŠsçÅ  <> &ä° ¬õh`Âz­Gƒæ6m§½´Æ°ŽÄ†SÎhkCd-CR<43>ß@Y«H]¤ÿ•ÑÖ:ÊŸ§V¶ÔEË8=8{ž6º>$”Φ†<C2A6>ÇpÒBj„i
Kûóœ½#{EïÊú`<>²¥†ƒ·<C692>ÂÅQnÙþOcZEû…åøvòß]~õ¸_L;†eaåf²Û¯ñµŸ›<O—Õá¯É†]ô‡à‡ŸÑ¸K”b.IUáCÅ«Õã¿ÛlwÿºDÎU…†¬/d7»üôq7]-‡^jÕªÍJÞ•pû°9éòƒ<¨Û<>ƹB°dì3È•…¿Ö?ð¨3ÈE3é|œÃË ,ýã«æêt<6B>5Eå#<>G¢1×Q/‰rÜZ©ÄG”˜+J”Õˆ|°¢(.9Æ«¢¥‡ÄHä`AUd— ;ãðŸž<C5BE>"q—,ó‘¾ÄSå¨h.Ìÿ%o•yb{Fù˜"ÊxŸJuPD…Ëbß <0C>âTJåøFË(<1F>½9ᕘô²Ë;¢'Ðêõ¸/¶æ<C2B6>Õîœ@nÉìûÏ0¹dÊ+D%AKèC§(¥¾b~·ªçð®µÆ |î6È.ÿúÏWNïКù.Ê€_CJ
1ÛBðÁüÀ<C3BC>qWHÕ/äóG<C3B3>½ûÄ<7F>+º¹~G°•ÚÃñ6!96EÃõx!Õ§’ð}Ã#áícVÄŠ¬hRB”GJÀˆbfõÄã<13>czÇVíþ+R<¼0máH©ñfË ñÝï¨ó"GV­ ?^¨·ÿûUú»FŸtuó=òîê0+n¤úw®½(BÅû!wG€Ê»æ×÷r‰íôS<C3B4>o_c| ¡d<C2A1>)¤óG^²KJ¨ÒYÚì¹2ɵKøù*õ]“âjÿ§ìH2¢mÙŒáã)7²ã%wþ!à!4;ŸÜÔo©ï)mc?†ÄPtÆ÷<C386>^ÈM:¤“zØòxŒY8Ê̑ꥑ‡OŸ>þþúïWíä»_ÑÂíTRËGÑø<ý:.ì¡?Õ1š{«ªý¥÷B>Ï›öF<C3B6>ßñT•:¥žÊBLQv¥—5 ÷ú@ ½OµøŽ¹<<3C>ÐO2âòZ|Ýyù´æ"£ÆÛªK“ŒšÊ(„ƒYñˆá$±ÆSS;p¹;ù¨ûwÞÐMŠëªÅÉG<C389>zryÓÑÍŠIGÜã} <1D>@ñ ¬s©ÇƒŽ¸ËÕ:zê9èH Ý©ÂP'Áê!ô¼<C3B4>Ý?|ß<_™{Ÿ?ZtAâÒ
Ù€Uõ#ãùâpRh“³àÉDѽ±ª-^H¯OĹ~è†o;Mê4¸AöÌnÃyõô>º<>£1ÁY<C381>â‹!UicHUû•<ÀÂýÊÇôJõ¡Xóá?h7GîØæ ñ­¼B™ýŠL>º#Y^O³sŠ†HuœŠ³ëT„ïîHˆG¬0°å˜÷+ž_e@'È®7©j¾)×^t¸®ŽðÑ3Ä_fò%ÿˆÒK*©A,X—†%_wpb"TKOù…†T[q˜ð£î/^1]ÆÑî <C3AE>×Ó|qŸJˆ×z>k"áíD<EÆAI<41>{¾jˆ?ê\E¿. ƒE8îoò~ÓD éFþ,åÝÔu× —lÝ$—v|1M$9#äú|„5•0Þ³¼Þ½ãeãøTëFŒä LÛiAclrø ty~§…Hßå<C39F>@ñM­¿,¤Z² »kÙ"䊉\9Œª/yHÍR@rzªÙÚå÷W£ò‰¼@eFãŸg)cÕ4<03>3v‰u¼ßž„ì[Þ¯úg¦ߥ¤ÜcX“—´¯Md™¾\2 ^9¹l  ¯Ö‰\¥ª;|,KþV$rÈû Mv>¯[?,;øºQ0<51>ö´ù¦¥·+'ÝÐJ\íF¡1æx¹jt4—og`Î*:\ý+8¼µ„OJr~ÆA<C386>È”ÛÔMk7Ó6¢|©¹ö~ôñnZ@J»i<C2BB>>å¼Ø¿~â&´§K.Bë0B ãÔ¯´QÒn=+dgé„$ö¢q4ºyªi»*Ó˜^Ç$<24>kG_ïê_Lkð¹™1û:97êýêëÓ[ê 1E]l'j¿úzfMäóGÏ't.FÝp5½x 3SZˆ=__¶xx§ôtù ]·\ç¼cØòõ 1FíÓ,¸M l28„ìÏ „ņ
¾µ(ƒ|Š§zˆ ¹ú‡&Sï!”POí+J<sÝ íܵ_Ô£s±¯ù…©Š
W^[«Ë;U_K—¾<E28094>4£QÚغx ÿ¶•Û¤8·¬mÒ x.x¼vx@ýgtþOæR):û.¦Ky3r˜­{³ËÆ~Yƒ H7÷vû*<2A>ÀHUÎöëÉÙL·Íâb¹ÙÎ/¸à´ýa§ d6O|ñt[}l<õŽÊšs¼£¹„èÇ^l܃"|*Ç7 X”O„nB{1¹²òÖ<C3B2>¸F}<7D>î^§BóÐÑ«Õ <C395>ZN„¡0&wêÁžâ¸ë@ –®Û÷)<29>zÓÌÝ™áŽÛA7ÓÒóùã<C3B9>é˜èΦÛ_!¼­.9G‰9™X²f‚¢Ùð{L‰œébÜ¢#½ ac0y؇l>žòÏWÖ¼ æXËš„L×e9<65>œšŒ­;-´äEóVä\¡ä¥<C3A4>2é-ŸwÐ]>¬`<60>pþxè[¬ÍN\ˆøCÃ;wÄH
“î½È:un/™áUÄÞq3 ÚÆãDóýz‡d «m<C2AB>0DClÔ>É¢» ;KÎ[¶—GÚÛþâz)|P
VhÉØÏÅgÍ,9ÙO}]P6èL¿RóNyKsUq"‡ÊÔ ­ˆÂXòˆ<C3B2>â¾¾ †!ê–³roÉ>…¬áw"t½ÖœÅ´g¼Y5Ï•ºäk˜±+.€Nªô(#ÄG&Þruc2>„zæ°ò>'Õì줱hVeýMÏÆ ß_;4E&‡<>T¸Jmܱtójb·E.Ÿ)“-I$dùu!1Ý’Þ$Í_3¯I\—Í«© ÏÔür/™6¿ ä¹9i0Uï<55>šêÂØ´´ rð#TYX5#•%‡mJfIœ2»Ù •r"È%ÀËh°ù~Ë,)µŒ†Ð3¼x+r"Ÿà<C5B8>h¹yÉЬ1üÏ×D¸¼ÑödS~\y…F—[92„)(ï/`èèì„F¤;D%bgêÁóˆä†bTÔÒ­šŠ 9iœï׎¤Å!Ç)þÈu%¥<ÙXHÄY?Sn¶\.„ÿ‰‡ŒJøº)%Z^2í´Ìü|mÄŪM<C2AA>Wövü‘-ÿj­ë M+Ì
š<EFBFBD>ƒiòuÑïËÁ×ZZ5Ho¾.6/§Å׺Äjüº»h éàR¨t[[eb}kð5rí9| RÚ·";íAKkœñß¾#`N<¬` OýÈÎ%O¾žÈäktÖÖÊâkYULž|-D/<2F>|-YKæäë)o¾ÞÈàëÆ(9ÙÙ«ƒo¾Ùod¾tò5V7gÙ5ùºhkéñàk<C3A0>q.-¾NWŽšH#›ŽªÉ#îë bX}X|½åÉ×™|<7C>©¨Å×S^|½<>Á×R ™xËÕÉ×Ec©KgkôÇI%_ËçјjòõŽääk”fqÒäky-¾žòæë<C3A6> ¾Fƒ/g!=Ì<øº+¹.C 2îe”ŸbHEbŒ¦HRS#„ ¥G€ºÍžòŠ&Óø\{‰!òÅж õTŠïBZ1$÷jy#B²é¢‡"§Övç!ÌügŸ/RÎîø «@x#÷Œ<E280BA>z T:G²„jîÈU Ï%¾o÷œÎ“S«šæ#;ÿ
©¢¨‰T¯þ<EFBFBD><EFBFBD>Cʤ(²ïYÿÊ.R«Zm<>t<EFBFBD>ÿV6üü3´º]4 Œí1Œñß·t!©Ç¡ô¼+ç)²5øfˆGëªjN ßÇìas{E3"³ö%dHY2 ]<5D>eÉßË ùüñ
ñ0¼¯I¡Š¬ûFþ1$E Z½{[*i<>FØ£m¬4šÖº³-«êÁY£®cðK×'Õ&<26>þ¶«eDzÛ~Áý‡Þ4<C39E>,<Ðû±´ g#ö*htc÷Î=þûTQ¢Äs®Wݬ{$QY,bÐ]8!²ô‰}REÿˆè“•Éôxˆ}EÎw˜£H%Ö.ZÌu[H§C}U×
UÎ6yˆ³Û"¢N<1E>­ ©§©àû€WDpy5=øbG:<3A>¤p¢Btô—ó ”ðtÙáf”æH<C3A6>mq O®±m¤¥¾%­úºv˜¶¹ÜD: <03>5Œ^Ú&¾‡¡â<C2A1>€º¨ËÏ—0tؘi}Ôêëvi­$hÈ™vH „^šjgz5vÒÒM¡aÕ<61>é9R* & p$¨ûÁ¯g_fnõ0ÌÝr€<08>)[&€)`&ùUU€"SËRM\1fÔ¡š`£‡íäèž$ÖLúae|¡wˆ&ÚÒªhê`¬æ÷¡°e´[ Úõw=¢A“¶¾ÖFàWÚ,[E“"*šú<C5A1>Õª™è”+Ýh&">Õ¥™hË!™¦¹Ó†`Âþ˜‚‰@w£—€¸Ö6¢—T½Ô(Y¢ÕK¸šz5-¨I·¥—¸'ßSó677Ô<>õêÍIõ ½´mÕKŠ¨^â{ÇÒ–^R{é¥ ½D»ùjSð<53>¤Jt±´ÉKºhf%;W¹„}YpË¥ýˆ*— &sÛPK0飊¥in­´€!•`fgçä¡á†ž‡ÖÑÉ綔nöÊ`GQjP |çewy‰'YÆL8µO”ÑÐ <>¤qL¢}©CÃ¥h'h‡y‡iî‰lÉQ*ÁùðŽ¾sŠìXX\[6Ï/¨ûDM@¤ð"<22>….ð"Î3ظH£/·1¤Žf€,wê6G$Êk£­MÛsޙȕH Qˆ<03>çÍ< ôÜ-3 íîZ¯æDyŸ_QRÓ…=}„n%a<> pYšJ}†ÖñAØ%+)ótJÑ\Ð;‡ Uo“`íuJ"Û¤èËZØÐU  Cù#j…nÊ2­~ˆq
òl»DI^Ì7˜Rjà.¨f×7ÐÈp½ÎEÊ… ]€9£"W|ß©K[$åv¸<æ½<C3A6>ËJIœr•kMˆ"….·<>Ñä]kNØ®ñ4ù(·€à<E282AC>5ÞððÎRÝÿÃJ$…§žR3òýQC-mèù9¶÷çÃB<C383>®÷{±o ˜ÌÌ3žœrÀÓgî¶5çÝ^" ~¼`ìdE#^ áÉËñ°agHýªSðFÀxò©}Oc!˜:É"P)ÑB^rÛ×2¢Y®¦T~ÛÇÌœä¶
¡^QÎðÈs¸õ[>¢ƒã?ï<>Â$”»<11>PBûU2Ágê<67>$<24>Å%Ò¡*<2A>Græ*x<>Ì3â<33>MJ5ÔBW ¬¬¦»5Õb¾á`Vè.b\ÂÐK~,9Æ:I ­•;šqàux×ÍÌ@=8 x³eã)3Eٸℴ{Þ½‚¤+º¿u<C2BF>òCêi¤¬BÛÏľáUh½¡Ëþ"PÔ²$©fò¸j<C2B8>yózòLp'^<5E>mC HŠé&HF¡-ÇÛƒW(9¡ò|ˆ ‡6ä=ÛA‰gˆ§úäºæꪔLx„ÃúJ®ˆ¹´Ž$®2î<32>v22} ¦ºh÷èËáy9*fû …‹@Æ }Eÿ?É"p\6òQö‰6èLµŒøt¶e/Qé‡!ò…7oßdŸÖâ<C396>Ê=u¨<v~ !HÅPS…ç7C+ßC&Š</ä2Ä+œ«> iˆŒçPqt]”:ÐõÞue€ž‡t²¨v²MñRŠ7 •âÏ{IÍ„È´ÏÝÜ馨˜z¤_ÝÍPüy/¥øŠjÅΠ1Aˆ Ýsà"B<>¨]*ö5wt® 1ü'Rµua•6{€2r
Ú mÛËñ_háx• @£^ àc®ÂO
Q<>‡}”— @öŠzÅl(YÓ^eÔ]2ß´©úÇ<J;ÖÚ×ó$7 ú|g|1 ¨†PÆøbw¢JM@ôk<C3B4>Ý|ƒç ÿbcÊ´<C38A>žÈ¢¦T馓¶¹¡ä2jÙ%W8*ú.;I¥{sŸ!R÷ÛÌœQèzŸFZ#ÍË÷=ŒÝj¢Ðg#…ÝÛˆlN´ã`|D6æ(w$<24> ½Fx÷*<2A> ­Hñ!sy2e @ÊVÇAíTó r7tNwŒDz=*×xhŸÖјv9oÆtx0Ò²3¾ð©ìéÕ-Ö¦‹BsõÕ<C3B5><C395>kÃÐ…”á3ï@÷ìbpÉO÷D¼6գƢæ»^‰@—)t-P´ ×*ÚDQð½—p¼IÝ|2¯Ý©9á ýoN¿+^hŸPv¹Ûæ<C39B><65>AÌŽ5Ë}]ÚòŽgK5šÎŇë͈¾m©LÊ3is>¡—ÍE¡N[s#!HJÁÌÞÊ‹¥<ÖLd±l$9w¶eî²=$ºÇ»]\BÏQ”ê<E2809D>ïšœ{<7B>jÛO¼ä6FEQݵXú 4rU <06>LÏm&Ó„K9 ñ.ÉgŽþÊÜ2 ”³`çË ÷Þ$[ Sð<>Ò9ü ¢«ž/çnè¦{ˆ<>©8vÜ<08>ççôvDtÙõΣÅ.à?N¨(ÜBb>önq#T)´¥?<3F>weª ÔÀÏ3:2<ª ÈÐÇ<C390>Ù¡a!¤‰XPá]Ü6Vð!Êá I8î@B™¶ÚìðŽ´M<C2B4> ý<>>’ú¾(¢7Ã=úðZ´c¢å_q¯NyQ¥¾—<C2BE>SØvŠùÒÁ™NÑÓLáκ) >º]@î%Á_E¨8(Ö*•ÝfÙ¨mÙÓEü<> Á¼nl¡Þù Rü!x0W}€ÆŠ3f¹J:*Mgâ¡Íð û8lP_äV<C3A4>‡ÑMWh Pª@<40>&îî9naE<61>èÔ<>Ùˆ3”ïÆ& }…^JBuRîÌ<>Þ@ë4ì<E28098><>)×ðÎëö·¼<C2B7>€í5¾ÃMH¨I¡÷Ëĺç²<C3A7>>”"­ë©çËŠ&r¥FFd{Ùó9ž.Šè“]72•r†R\½r)˜× I2¡Ë)Â
¬½ÒB<42>Š k®Bú¥Ždm-j¥õ´_% †…PQ¥T×jï»*²ïºM`Vp7 ~*<2A>IŽ?^úÃ_þúðÓ¿.Ïß]¿ý{þ÷÷ŸþóüòÇÛû7ß\ÿñòñíŸï/¿^ßÞ/¿¼üööðòéÓç¯/_ßþ_>¾¿}ùúùýíáË/Ÿ'%úùãã÷?üíò×ý¥ê endstream endobj 16 0 obj [15 0 R] endobj 30 0 obj <</CreationDate(D:20150930015203+02'00')/Creator(Adobe Illustrator CS6 \(Macintosh\))/ModDate(D:20151028185646+01'00')/Producer(Adobe PDF library 10.01)/Title(mu-stitky-fakulty-cz)>> endobj xref 0 31 0000000002 65535 f
0000011892 00000 n
0000000000 00000 f
0000011943 00000 n
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000149 00000 n
0000000016 00000 n
0000000000 00000 f
0000016528 00000 n
0000049002 00000 n
0000012293 00000 n
0000016829 00000 n
0000016716 00000 n
0000015805 00000 n
0000015967 00000 n
0000016015 00000 n
0000016600 00000 n
0000016631 00000 n
0000016903 00000 n
0000017086 00000 n
0000018107 00000 n
0000020165 00000 n
0000033271 00000 n
0000049027 00000 n
trailer <</Size 31/Root 13 0 R/Info 30 0 R/ID[<288646737424108E7F5F865140FD20ED><C99B3B9704C748F2952D3D6C5D122712>]>> startxref 49226 %%EOF

View File

@ -0,0 +1,327 @@
%PDF-1.5 %âãÏÓ
13 0 obj <</Metadata 12 0 R/OCProperties<</D<</ON[15 0 R]/Order 16 0 R/RBGroups[]>>/OCGs[15 0 R]>>/Pages 1 0 R/Type/Catalog>> endobj 12 0 obj <</Length 11580/Subtype/XML/Type/Metadata>>stream
<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.1.2">
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<rdf:Description rdf:about=""
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:xmp="http://ns.adobe.com/xap/1.0/"
xmlns:xmpGImg="http://ns.adobe.com/xap/1.0/g/img/"
xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/"
xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"
xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"
xmlns:illustrator="http://ns.adobe.com/illustrator/1.0/"
xmlns:xmpTPg="http://ns.adobe.com/xap/1.0/t/pg/"
xmlns:stDim="http://ns.adobe.com/xap/1.0/sType/Dimensions#"
xmlns:xmpG="http://ns.adobe.com/xap/1.0/g/"
xmlns:pdf="http://ns.adobe.com/pdf/1.3/"
xmlns:ExtensisFontSense="http://www.extensis.com/meta/FontSense/"
dc:format="application/pdf"
xmp:MetadataDate="2015-10-28T18:57:20+01:00"
xmp:ModifyDate="2015-10-28T18:57:20+01:00"
xmp:CreateDate="2015-09-30T01:52:20+02:00"
xmp:CreatorTool="Adobe Illustrator CS6 (Macintosh)"
xmpMM:InstanceID="uuid:5f752c2a-162e-3b4b-ba3b-32734ece851c"
xmpMM:DocumentID="xmp.did:F2771D32492068118083C138F3A478D6"
xmpMM:OriginalDocumentID="uuid:5D20892493BFDB11914A8590D31508C8"
xmpMM:RenditionClass="proof:pdf"
illustrator:StartupProfile="Print"
xmpTPg:HasVisibleOverprint="False"
xmpTPg:HasVisibleTransparency="False"
xmpTPg:NPages="1"
pdf:Producer="Adobe PDF library 10.01">
<dc:title>
<rdf:Alt>
<rdf:li xml:lang="x-default">mu-stitky-fakulty-en</rdf:li>
</rdf:Alt>
</dc:title>
<xmp:Thumbnails>
<rdf:Alt>
<rdf:li
xmpGImg:width="256"
xmpGImg:height="160"
xmpGImg:format="JPEG"
xmpGImg:image="/9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA&#xA;AQBIAAAAAQAB/+4ADkFkb2JlAGTAAAAAAf/bAIQABgQEBAUEBgUFBgkGBQYJCwgGBggLDAoKCwoK&#xA;DBAMDAwMDAwQDA4PEA8ODBMTFBQTExwbGxscHx8fHx8fHx8fHwEHBwcNDA0YEBAYGhURFRofHx8f&#xA;Hx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8f/8AAEQgAoAEAAwER&#xA;AAIRAQMRAf/EAaIAAAAHAQEBAQEAAAAAAAAAAAQFAwIGAQAHCAkKCwEAAgIDAQEBAQEAAAAAAAAA&#xA;AQACAwQFBgcICQoLEAACAQMDAgQCBgcDBAIGAnMBAgMRBAAFIRIxQVEGE2EicYEUMpGhBxWxQiPB&#xA;UtHhMxZi8CRygvElQzRTkqKyY3PCNUQnk6OzNhdUZHTD0uIIJoMJChgZhJRFRqS0VtNVKBry4/PE&#xA;1OT0ZXWFlaW1xdXl9WZ2hpamtsbW5vY3R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo+Ck5SVlpeYmZ&#xA;qbnJ2en5KjpKWmp6ipqqusra6voRAAICAQIDBQUEBQYECAMDbQEAAhEDBCESMUEFURNhIgZxgZEy&#xA;obHwFMHR4SNCFVJicvEzJDRDghaSUyWiY7LCB3PSNeJEgxdUkwgJChgZJjZFGidkdFU38qOzwygp&#xA;0+PzhJSktMTU5PRldYWVpbXF1eX1RlZmdoaWprbG1ub2R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo&#xA;+DlJWWl5iZmpucnZ6fkqOkpaanqKmqq6ytrq+v/aAAwDAQACEQMRAD8A9U4q7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7F&#xA;XYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX&#xA;Yq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXY&#xA;q7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq&#xA;7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7&#xA;FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FX//2Q=="/>
</rdf:Alt>
</xmp:Thumbnails>
<xmpMM:DerivedFrom
stRef:instanceID="uuid:307a8720-a812-a94c-befc-27329aa93ced"
stRef:documentID="xmp.did:EB771D32492068118083C138F3A478D6"
stRef:originalDocumentID="uuid:5D20892493BFDB11914A8590D31508C8"
stRef:renditionClass="proof:pdf"/>
<xmpMM:History>
<rdf:Seq>
<rdf:li
stEvt:action="saved"
stEvt:instanceID="xmp.iid:07801174072068118083918EEDD18719"
stEvt:when="2015-08-24T03:11:31+02:00"
stEvt:softwareAgent="Adobe Illustrator CS6 (Macintosh)"
stEvt:changed="/"/>
<rdf:li
stEvt:action="saved"
stEvt:instanceID="xmp.iid:F2771D32492068118083C138F3A478D6"
stEvt:when="2015-09-30T01:52:15+02:00"
stEvt:softwareAgent="Adobe Illustrator CS6 (Macintosh)"
stEvt:changed="/"/>
</rdf:Seq>
</xmpMM:History>
<xmpTPg:MaxPageSize
stDim:w="79.999940"
stDim:h="31.999769"
stDim:unit="Millimeters"/>
<xmpTPg:SwatchGroups>
<rdf:Seq>
<rdf:li
xmpG:groupName="Výchozí skupina vzorků"
xmpG:groupType="0"/>
</rdf:Seq>
</xmpTPg:SwatchGroups>
<ExtensisFontSense:slug>
<rdf:Bag>
<rdf:li
ExtensisFontSense:Family="Syntax LT CE"
ExtensisFontSense:Version="001.000"
ExtensisFontSense:OutlineFileSize="0"
ExtensisFontSense:KerningChecksum="0"
ExtensisFontSense:Foundry="Linotype AG"
ExtensisFontSense:FontKind="OpenType - PS"
ExtensisFontSense:Checksum="3359954016"
ExtensisFontSense:PostScriptName="SyntaxLTCE-Bold"
ExtensisFontSense:FontSense_1.2_Checksum="3359954016"/>
<rdf:li
ExtensisFontSense:Family="Syntax LT CE"
ExtensisFontSense:Version="001.000"
ExtensisFontSense:OutlineFileSize="0"
ExtensisFontSense:KerningChecksum="0"
ExtensisFontSense:Foundry="Linotype AG"
ExtensisFontSense:FontKind="OpenType - PS"
ExtensisFontSense:Checksum="2133157911"
ExtensisFontSense:PostScriptName="SyntaxLTCE-Roman"
ExtensisFontSense:FontSense_1.2_Checksum="2133157911"/>
</rdf:Bag>
</ExtensisFontSense:slug>
</rdf:Description>
</rdf:RDF>
</x:xmpmeta>
<?xpacket end="w"?> endstream endobj 1 0 obj <</Count 1/Kids[3 0 R]/Type/Pages>> endobj 3 0 obj <</ArtBox[0.000488281 3.54297 142.06 90.7051]/BleedBox[0.0 0.0 226.771 90.708]/Contents 17 0 R/LastModified(D:20151028185720+01'00')/MediaBox[0.0 0.0 226.771 90.708]/Parent 1 0 R/PieceInfo<</Illustrator 18 0 R>>/Resources<</ExtGState<</GS0 19 0 R>>/Properties<</MC0 15 0 R>>>>/Thumb 20 0 R/TrimBox[0.0 0.0 226.771 90.708]/Type/Page>> endobj 17 0 obj <</Filter/FlateDecode/Length 3349>>stream
H‰ìWÛŠ]¹}ï¯Ø?p¶U%©$½Æ<C2BD><…ò<>h&1Ädòÿ<C3B2>µª¤}9î6™à„ ƒ[ël]꺪êÃ>n~ÿ1m¿ùíÇí%mñïo/~÷§´ýõŸ/ÿØÄ­ÔÝTðWöaÖ·×/¾ýËKÙë(X}æªëö<C3AB>”½æzƒš·GÞK-±¹Ø f|-{kÙ7—1n°·íÑw¼ê‘öÔˉ?½üåå<C3A5>YkÙµwÈšöl©œ²ò „ °<C2A0>+Y£š;pZ'úôòнP@Û»ñdÞ{+„%‡ d·d~¸e9PÞmœ[u—Qç=Ô÷C¯âBTØôÀSH;peêªÁØ1ñÏ?½üyûûEUÓ½HžËÞ¥_T õ°N<>Æ»VÝfÃo°üö
¹l@ ÁT UjÅ¡„ÇÜuû¡Õ\¿º]dA®¥bGº€î£Un Xávx§êØN„Š¿¯4:lÀ^†_(hƒYlÏÕ\Ò”.Ò~ÆQÝ*nŠåÔ*•>ׯnX˜- 7\€`’²@Æöê"À¬P«ZÚLק jx!µþ¥UÔ-Ý ­Õ Ö•·Ž¬¸SƒšRº‡G)zAyÔyÖQu§È`<<3C>ZSGèž~À×q|ĹÆ-ª ¬·!$EXç«”4èÃïkýpÐè¹ù£©ŒKT‰ý!óÁeMúŽý:”*ˆŒŒk®üÁ$ÇQÏÉpÑæy—6®Pù.«çìѳßøàùBc—°”²-nBr#-/hn
UiΣ-ºÀ¯D°T…5Ó(7 HK9Ærbd®”/QŠÔÏo`¸)Éji…¼KLŠ°
ÑJ?ñ³lB§š7…šÒ.Â%w­0î$Âo<>^ò\¿¥ëúR—ÇÍU0÷áëK¬=–·Ø~¹g^« ¬ó˜ŠÑT±oxžg$z<>ÖM±æs¤—@ <0A>¢óD¬yg¬H@NÙœo:S·23
<EFBFBD>hYp><3E>c5h1äzê
2³MÛ¯¿*b ú~%ê-ÈáµÛ…0ûûv/•7¶+]n,Êð,™'˜\ì‘ ˆ¿¨p ˜Ë¨0ªþžÈè:\ßâ"AA¡8©D)eGÌö°\{Ñ%e»éøY—†0é<08>7GÊ7©wGÖ_âHû÷ÙA†Äú‘Áß!ƒ2˜$®$eh|ü™];†+²Î5
>ëÿ @6U^ö™[pdöR<C3B6> ðJwˆн;¼Éð.“­“KGb÷u4]86w×°Z<C2B0>ºUÙ\pit„Ç„D%˜}çú-:<3A>2—<32>܃@H·Fq3!
ÔÆTôÁŠDù-š¡ê7góv¯åh~£?¬QÓf¢ÍtŒTžúܵ}ö„$ölzß`¨&n±ŒôºkN-h%äD ‰Tm°u°o5]82ÚÀbÍ ¦ªK7<‡“œq4ΣˆµëM0Mô_±°Ù&Ñó<C391>dz>g´º"•Ñî¿1±”÷&<²äÛÈR®#KO3~5³œº(äÌptùvÿ•ÿký—è%ù^çÊS<C38A>“ox-kaó­é{CÖ}ʲë”e÷)Ë~Ù”¥—)ë6dõÛ<C3B5><>%ã{OYý<59>)AòÀ8·ÉðyM„.tßÒ°ÍÕêÓGžYeŒwÑUm r¯ÔØä3™Ë„¥%
‡5<EFBFBD>µ“74§IqÞ.Qò
F ñW<C3B1>CU¡Óú U Û^½ Ò¾C:º¯¦2×^;ÀY<C380><59>nÊ]âEECèFô‡4ÌÑÑÀ, 0qI³{´³u2D¬_WïðhuÈÙ46¢öRÛ\£Î¤î"!T½úÕaïø SENh„פ‡Û|$$«<>Ðøiíή- ÿP½éMAÀÙÓš=!?´å<>Ñ{Œ˜!Òr9O ãrQŠkm´qB˜"÷v>D·]/{æƒÊžrL-rï|Ä&ää<33>Õˆ¡4C{¼+•$ت×Æž"Ve<56>Äá"|PYw#<23><1B>·5ûóÐ9ÑŒA­Q†¼™ùŽ³zT¨³66/òì«kÉ¥ðüiCçÚCµ·ã˜'ž(ê̓w„<77>•Å&î†îu]ÀŸ´·ÑêÒ×·à™t,`ŠE,€ä$¾ Þ4fÏKP=U<%½Á¬…Fa*µÜŽõЙ¸Â®(¬2“>ŸÄšòÙM³w4~4N=$£ð©LaJioûŠ'-¥Îµ·ËY'÷%:ªz®#ÜEn„ Ô 3ç¹Nl߸)@ïÑ[v<>G |5<>ˆŽXaÉ<E2809A>Jd‰ª<E280B0>ÁË$›Â¸ò ?ù·hhh¯A¤ïãê¶Ü+©¯zsô "xã±k™D¨˜÷m?gì¡ ÀUnµ Y᜽•†npF¬ýº¤‰7½Å˱xž6VÞ÷1{§ÄZ•Øâï>è„×hÖåµÌi´AÙœ„(^>&d‡Oø?x¼ë\Ë®DËv-¿W QHnüÁ/?øåWÍ/6 Z<5A>6]å•`”Í¢÷ÓkE·ÇáÝayê:| iÖÝA×]0“žl«,—rƒ|kVm<56>:ÒMçüE³/Æs¦X„Õ¦_Ø´¯/¹ñ‹]ÒÔ&­5ìTª³c0:w¾óf&7¾eÞ6"c/‰Ìi‰ìäk$Šä­\íáÎêݧÕÙž$ï¿[0»(ó Í
<EFBFBD>í<>J9"2<>;!<ºn<C2BA>GÅÉCc,©ˆÝG¨®2ó'è|¥Vš«¯;¢VbPI8·ôqÕ´‰xkË©q6hœÜÐ,'Ÿ8ïÕ»ùê<C3B9>;1asÖ+§!L§óhñîl”q»¸DogÅÆVu¯–?KÞQ+t0S·¶uø\gÃÙó¸·<Ó„óQ
kQ®ÈhÆ®EôAdÆ¿Å’‚¾¬ÌÌÏÃŽ¯ïÜÇxؼVÿd <0C>âTå`R×ØUò8ãtdõ»±5,™…]½,·à
ðÃ2Ì„)&8òíðÔÅȦý>ËëÁÌpFžÅ¸[¢8é˜øú™ê¤ÑïØ_Õ©<00>_¡ÍIoªô0a°¸Ù‚™ÐÒt[nOŠ@9!ž:á;†·'¬›ä©ì6ªÚXí_W¢-p|Ü Ë=Yp²Ì„,?>²ˆ³•ƒõú£4V0ò;þ@`¾
6Hòš¦z¤i<C2A4>lêy¦O¶Z¿@£hƒÞ)éÏ?=?7È@<40>Ï%>{úŸ•hx~<7E>ŽdÞŸ•¬:w»Š!ê퉷Ø-ÅÍV<C38D>ˆÙ!˜Ú»Ÿ^RÚºu&íµ»òF0ì蹪%¯9ÀëJ™ù-§(;R…%>Q"<22>†cç— æŸ<O‡ÓÆäNO(ï_Eo™ÊñžSßKŽ´i³JMIà\w%»2Àà6a£Æc,ä<Ù.ˆkg'Z¥iâiª£—èqiPæ™ÌVÕÂ6Ç—<C387>È:oêt™é-WÒ¾øÑ_¼“ÐxÁœê<C593> ïÿkÂÁ‰,ò¿bbAc624}ë=oñ£ý‹ò*IŽ#†aw¿Â˜)‰jmçTŽy…¯“kªòû ¥žvb—sšÕ­€iÈ× „ψ'‰Îô<Ÿž#tÏŸP<13>+ÝyéQÕÒsÏ,¶ElôíeÃCmrá¾RÉIcE„º-@ÝÉn9BùU#›©>a©†øâ0ÅЬÈN †”úTÜâ€@Sà Às¥´×Q£/Pä¯
µÈ92ÔÇ #CJ¿eF<65>ë×å ÞÇ4:eS¿$'®j¢}¢&ê'j¢^ÔD½¨‰öU5aÿ©&
'4úâ佯×ÐnÉ-Î àþúoKÒ³6º<ߤJTWæ |‡Ó?Îc …ËfBâÑêå<sªÍfgr¼Cy#Îå`öŽ; AMÝ0Ñ~4•É²<C389>Ì•µdœÅž5 \«A>$oV]繪$Ygj ¢ÏõÞ4Ÿš¤SÕ¹>PkêÅVõSÍí &BBºnVìõ7×yùZG3©N_ ùûõBCŸ}o<>÷ÚQ×_gôê§Cåª^¹Î 8§m‡\„y"Œ„_>v¸TIÇË<>=ØÜbY”ŽÇiXÙðCj„{𦊡Z8†%ñóõú‚;»Û°Ó»,†K3¦{%yÛ!hÍ\6ôÏ<>±±üó<C3BC>mwgúÙF×9LKk¾£ùó´0CEŠV-Ô›Ì-Û'²fâ¦|
OΩ8ÝÈ@qéUÞs>HŠ§_È€*®$wb}ܹ-P&«¨”ò¼ý¸óÆ3¬8ð¿Çm,ÄÀáŽßý´vøgC4ˆ<34> ~ÇÙ¡¾ ™uv~þ.`>µ¿ÿøöŠŸ? Ø0Š? endstream endobj 20 0 obj <</BitsPerComponent 8/ColorSpace 21 0 R/Filter[/ASCII85Decode/FlateDecode]/Height 11/Length 22/Width 28>>stream
8;Xp,I2%bM!!3Q/-RJo-~> endstream endobj 21 0 obj [/Indexed/DeviceRGB 255 22 0 R] endobj 22 0 obj <</Filter[/ASCII85Decode/FlateDecode]/Length 428>>stream
8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0
b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup`
E1r!/,*0[*9.aFIR2&b-C#s<Xl5FH@[<=!#6V)uDBXnIr.F>oRZ7Dl%MLY\.?d>Mn
6%Q2oYfNRF$$+ON<+]RUJmC0I<jlL.oXisZ;SYU[/7#<&37rclQKqeJe#,UF7Rgb1
VNWFKf>nDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j<etJICj7e7nPMb=O6S7UOH<
PO7r\I.Hu&e0d&E<.')fERr/l+*W,)q^D*ai5<uuLX.7g/>$XKrcYp0n+Xl_nU*O(
l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~> endstream endobj 15 0 obj <</Intent 23 0 R/Name(Vrstva 1)/Type/OCG/Usage 24 0 R>> endobj 23 0 obj [/View/Design] endobj 24 0 obj <</CreatorInfo<</Creator(Adobe Illustrator 16.0)/Subtype/Artwork>>>> endobj 19 0 obj <</AIS false/BM/Normal/CA 1.0/OP false/OPM 1/SA true/SMask/None/Type/ExtGState/ca 1.0/op false>> endobj 18 0 obj <</LastModified(D:20151028185720+01'00')/Private 25 0 R>> endobj 25 0 obj <</AIMetaData 26 0 R/AIPDFPrivateData1 27 0 R/AIPDFPrivateData2 28 0 R/AIPDFPrivateData3 29 0 R/ContainerVersion 11/CreatorVersion 16/NumBlock 3/RoundtripVersion 16>> endobj 26 0 obj <</Length 971>>stream
%!PS-Adobe-3.0 %%Creator: Adobe Illustrator(R) 16.0 %%AI8_CreatorVersion: 16.0.4 %%For: (Muj Mac) () %%Title: (stitek_fi-uni_outline-inverzni_en.pdf) %%CreationDate: 28.10.15 18:57 %%Canvassize: 16383 %%BoundingBox: 0 3 143 91 %%HiResBoundingBox: 0.000488 3.54297 142.0596 90.7051 %%DocumentProcessColors: %AI5_FileFormat 12.0 %AI12_BuildNumber: 691 %AI3_ColorUsage: Color %AI7_ImageSettings: 0 %%CMYKProcessColor: 1 1 1 1 ([RegistraÄ<61>­]) %AI3_Cropmarks: 0 0 226.7715 90.708 %AI3_TemplateBox: 113.5 44.5 113.5 44.5 %AI3_TileBox: -282.6143 -260.6465 509.3857 351.354 %AI3_DocumentPreview: None %AI5_ArtSize: 14400 14400 %AI5_RulerUnits: 1 %AI9_ColorModel: 2 %AI5_ArtFlags: 0 0 0 1 0 0 1 0 0 %AI5_TargetResolution: 800 %AI5_NumLayers: 1 %AI9_OpenToView: -712 566 1 1656 1054 26 0 0 6 133 0 0 0 1 1 0 1 1 0 1 %AI5_OpenViewLayers: 7 %%PageOrigin:0 -1 %AI7_GridSettings: 14.1732 5 14.1732 5 1 0 0.8 0.8 0.8 0.9 0.9 0.9 %AI9_Flatten: 1 %AI12_CMSettings: 00.MS %%EndComments endstream endobj 27 0 obj <</Length 1995>>stream
%%BoundingBox: 0 3 143 91 %%HiResBoundingBox: 0.000488 3.54297 142.0596 90.7051 %AI7_Thumbnail: 128 80 8 %%BeginData: 1852 Hex Bytes %0000330000660000990000CC0033000033330033660033990033CC0033FF %0066000066330066660066990066CC0066FF009900009933009966009999 %0099CC0099FF00CC0000CC3300CC6600CC9900CCCC00CCFF00FF3300FF66 %00FF9900FFCC3300003300333300663300993300CC3300FF333300333333 %3333663333993333CC3333FF3366003366333366663366993366CC3366FF %3399003399333399663399993399CC3399FF33CC0033CC3333CC6633CC99 %33CCCC33CCFF33FF0033FF3333FF6633FF9933FFCC33FFFF660000660033 %6600666600996600CC6600FF6633006633336633666633996633CC6633FF %6666006666336666666666996666CC6666FF669900669933669966669999 %6699CC6699FF66CC0066CC3366CC6666CC9966CCCC66CCFF66FF0066FF33 %66FF6666FF9966FFCC66FFFF9900009900339900669900999900CC9900FF %9933009933339933669933999933CC9933FF996600996633996666996699 %9966CC9966FF9999009999339999669999999999CC9999FF99CC0099CC33 %99CC6699CC9999CCCC99CCFF99FF0099FF3399FF6699FF9999FFCC99FFFF %CC0000CC0033CC0066CC0099CC00CCCC00FFCC3300CC3333CC3366CC3399 %CC33CCCC33FFCC6600CC6633CC6666CC6699CC66CCCC66FFCC9900CC9933 %CC9966CC9999CC99CCCC99FFCCCC00CCCC33CCCC66CCCC99CCCCCCCCCCFF %CCFF00CCFF33CCFF66CCFF99CCFFCCCCFFFFFF0033FF0066FF0099FF00CC %FF3300FF3333FF3366FF3399FF33CCFF33FFFF6600FF6633FF6666FF6699 %FF66CCFF66FFFF9900FF9933FF9966FF9999FF99CCFF99FFFFCC00FFCC33 %FFCC66FFCC99FFCCCCFFCCFFFFFF33FFFF66FFFF99FFFFCC110000001100 %000011111111220000002200000022222222440000004400000044444444 %550000005500000055555555770000007700000077777777880000008800 %000088888888AA000000AA000000AAAAAAAABB000000BB000000BBBBBBBB %DD000000DD000000DDDDDDDDEE000000EE000000EEEEEEEE0000000000FF %00FF0000FFFFFF0000FF00FFFFFF00FFFFFF %524C45FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFFFDFCFF %FDFCFFFD9FFFFF %%EndData endstream endobj 28 0 obj <</Filter[/FlateDecode]/Length 13031>>stream
H‰ÜWkrÛºî´t:éØ3Í7)ç—llj?4ã¦Mîh AeË{è"º€»„þJÖ>$ú!‰nî­“ŽÇ‰óá¼ÏÁÁ«?ö‡ín,Ƥí&j½zu( VBî£|õËR%õÒÎ`Y¾a¨Û G%ð’È”
¾Ÿ“ ˆÇz÷Îiö<15>âhíìÂÚUŒÀjª¨"ÓÑmgœŽD¦å¤MùœÈ;X ÜHâ«ÝJ à{„ì³CÃ2 ËCV¸ïšŒù§)½#Z°:°v 2S>9·ûÈD²\u, ¼§’Þ'¦iºaˆÃsíNXÛ0½Ž<C2BD>˜žÞu$¢lF¸êK4=LÈt¿Æ{£cÊØ9Ã
Y¶vI·gÙ£ƒŒ²ø,<>×¢»=g”oü˜â èš¿ëå`ÔÁÊ<C381>( ¶êôoêÒÀ¶òoçó€L¨Ä¿ÿÁ¿ýúËnÉZŠd†åTï‡?Ûö<C39B> 7åF„æ‚Ì^Ìí¶,0¹.<V¯%LÊ1m;´ _;¯mû¦á»¾‡<³c8¡ dz Çs-+9%7ûèLpR8¨+Õ°ˆŽëšfñ,(ƒŒùSê:1aêåþc†'¥aÀ`õ,XNˆ¸
–©<ÃJ/ /—ÎÂ/Äe®c;°läù¾ö«ïÁ<C3AF>é¹Èösþðå8K‰ÖêY0Öl4“Š»ÎÄ>Dñ\Ò åû&j[ElßI¯Bk¹†8 ´þ¦eaí¿Sý*ƒõJÉuxZKÓ8‚ð·<>3T¤‡üabRÐï9¶gIaHþ=hõ%åšgë,§„£>Ë€ôNŠ,éñ+ÑÚ)ÚÀ%‰ Ö! 1:…¨ëK2Í×Äó/N`!1ø.'”`Ódw#_°RTagþYýnß}D® WÛÿþÅ6ƒ4êÌDœ±²<C2B1><C2B2><EFBFBD>5‰M€z ݆‰„ ÌcôW,“í‚ú s,Q¾¾FΨ
:ÿb[>ša6^|BçÀƒŸÈ<>´JÀ{ù–²”¹P#5„Õ5:`„ÇéF¿é â™úbÛviJ±i»„a¤óW¢™¥×èB¶QÐ@Ü¥ÚysiaàN×±Ž¯ˆ>CJn93ÍëÇ—ßÏ7ðs^¸º™ Õª¤¢” ù<C2A0><C3B9>S2Óá—êgèç ÖZÉ<'<püO#ú3F''×4j*ýη\Ñhú”Ëçäüb6Œ¦³e¿(Vt×ëc©hÄÈp*2kœBèmL¡™¯éF¬¢ë
§¤dcËÐ!»¢<†zf0!êÝLèJ
¯©9´ßª£jôqŽ.™z#8ïê'Z»½ù¨ë=§¨#ikï7<ÿ@û­<C3BB>Ï—ßþ];=l¡½3<#èukoHa˜"ÈDç-³¦ð6hU£Ã‡V5²˜èÓ/_aéæ tŠ>ÿb¢? ZzÂø·öò#½i¡=8Öà7׌Zi¸ÕÌ>f0"<22>\þ¸µvxÔJ¥­Ç3e?jõb*nÏqã ð»ï»Gvä<76>ÿ&bY<E28093>ŠœÖlþP.£k˜—ÚVs+\.pëÕh¯ú†<C3BA>ê/é<>ËEñýéôä fÓ'‰oÐÎíŒq ·¡$gŠÀ‰úZC»Râÿ ‹ß€ ]Ã-F^`l´×Ï,©ú¡ )¨;æéj3}E2î|r:Ç,«°z=]ƒãP`¬Ô$½÷õ“z‡Ã}¨<>c˜ˆ¦$nâ™
ùúeíE­¶ArÀÅã,7b»}uôoþïô„µÑ<13>ì§xÌH“ÄßÕŸ©Ð÷ç<C3B7>K]C_8£µyQ*1{ÙNöûåá~Šõì¢Ï<(±¦éø»×èò©òÿP¥éÕÍ|¿p¤ŒF?{/ÃòmðÄ€`¶ÞÔkB'×MŠk‰|Ùl¹¶az<61>­vÝÐX]71«¾°Uhï@ˆ 挅Sç„\©sIárÒIJÇ{^ÖHÓ0MÓÛ¸ÛFÝæ¥mq Ïu¶™²hbÊâ‡8øóŽ7™ŒÈ<C592>Èxüâ'?œO/­ÂŒ(à ô½zt¾S<C2BE>?Å"Êf„7êÒ5p^s¥ìC)’®$¸ %2'<27>㵚AˆBËõ »c”+­ïÎ cDÖ[J%䈦 ÃS,§¥ê$Ñ™õíW”°oÿT\ }üÈizW¶¬.rË®ÞïÊ*´}#,™5-„]ˆA¡A®Q_¤T«ŸSíJ©ŽifØxŸõ ÷Ò®Tc<54>e|D®pÆî]8KoWˆÜ“÷<E2809C>ÑíY:*ƒ<>`jÌtù$Âú"É2
\ïø•ÇKž…N3œN¨™&B=@aFËÖT],N¨Q,yåJ$˜\fM·‡º™h€SE$½#8æÆT™…¦\DS)4¢2c ”¦aE Î<†h?wP"QJg Á÷Û¯F(‰yš`(¨h2i è;r¿È5—Ñ@`(<28>ól××b<C397> šU…¶:¤ªé­XIÊØùžçxëVM<56>­Ðš[±K<09>%²ÊÈCÌç8ÖýX_êÈ9AäV¡·1UxLUeŽïX¾an­M»½ãŒ±Šû%)„¨åqi~PêÐZBò>ôb9è±òÝÊ2sîàIg= TðÌe[y
wžàhi™ëmÄãˆtù„mh=u=‡kõ¸¤äÜýSaU¼Õ± º®iø®ï=ìÄù ^¶³*¬ÖÖMfd³ë¡a—ü¼õFäz{«¬vOêzaà®~Ì„<C38C>µüØ”K9v•#[¡ r$ÇÝË®Uë”Õ†ÕtõÂNhm€ÞOç ÀŠæƒ~]Ï-&]]¥¤Êµy|H;„<>°:kyjàªØëÕ|/à|ü}í6i¯1übuu¨u']ÁA¹§æŠ"8îpúgÖppX1Ê J•¬ ÷UȶgšÛ
Æ ¬?r÷^bNÓk(êZ1†®SU´cy<63>*:/ª>Ãœh×KfcÌw\Ò”][÷…G]%è]¥¹
"©[óüþ´bu<62>ßMëÜü âfušëõ”ƒŽ÷\7ëÚyž—W3p<33>ÇävH"Áãçí9¦2Ý"&O¥õÁ\·miÎo”K~ß<>KN<4B>¦üg&€æõTü­5u1šÀx4K¹…ñh'eºyGòÒ«m«m%‰~Aþ¡= ‚ïˆ/\œvl2™<32>.m,,wkZ-'øæò˜ÇyÈÌZç¼0ü×TKÖÅFj‰3kñ`ã]ÕÕÕU»vù2ˆÎ0³@épß ùQ æ
è­„ *LUÌpžç?øݬ؆<18>ÆÝO Ÿ?Ý_ˆâV‡£àWqÙšB² Ûã@È»zõ1Èp'×ÕÒE×á¨y¹Íž°Ð(Ó±~oAÅsÊ—~ö§Þ)8õ·¤N;ÌÄeµº ¹¸¬T*^6.«µv¿ŠèJHEÁv"¹þòl›Œ
1‚…#úÀ®¿–¨…Ö¢úIµàB»q0HšK¨a04vByîA¼ü/¼ÚhFk£¼í®ÔÛÃ2VF‡½Aö” pJÎ<<3C>ÙæaS³¶ O‡É·…¿ÕF<C395>nš„†<E2809E>Œ ârµ ŸS*:LqË ÕáØ.^Sµ`)WVÔ«• îÁĹŠiÊQöÄ°T¸âd™âWa ÃMl,Âcr$,„fÀýùûl³Š÷7ÉÜÈ7±}ªð·Hè7Tí<54>E"»™pSô8ëj:)¨&Æ:<1D>
ª;=’ƒ[F;66mŠ¯¶<WªÁ§Š`ý%êÛN hª°‰½P%ƹ6-@.ptFÅaü<61>£Mo$ïR>öß?ÿñâömLç±3eÉ*»/"1çØÜ,èx¤8&w_:8Iî^˜-ð$ðŸÅÆÒ§ð³I2eé™<C3A9>XÄ¥Õ²Ø&),À,N_Ôv\uó±/IQãÈ"2¦@1O& §Vjt…‡Kbô°ÑÏÿÎþû/<2F>/ÿF5]<5D>/Sù#?$:<3A>d-”š4Ï<15>ì¸g+°ûý&Pø0…=tlWD ‰#Ž ÞT©Ct;ÁÒabùÉÛ}efú¥ç¸k“D?Ê°öÀ â¶E¹$;Œ^˜Ýv*±h¦(3@üFr™<1C>(S6÷Põ”;磾bjÁ=õª -¾fYâQ¶¦˜Ø÷•ŠÉïhk©ÝH&‡‹ÑÈê:¹Šá°
úò.ù~ðN¦b¥ça<C3A7>“ÄîÎHL˜Ä2Þ(ߘÙF… ÷x:lŒ,6PòÜàA+*õĹ/dé2ITF
Fc>!'B„†4@&¥ÀÄÚjÉûÂ;”š”©
³%︬“Òæ˘G®”†<E2809D>L™ Z* #8uéØHq]4"¼ rÊó0Q"ã;³ÕïÇjÜÙpÑ6%¯hƒ"Y
ªa&‰@bÓÅhË«Fà`ܹ/³,¼)þÕâ© pöX<C3B6>ÝK²$@˜<>`;![ð0±ÞQ;q<ÿÝ*¨ÑåÐ -ÅV~¹ž€¼ZE&àS<>[l\}…8è`:h\<5C>„±&=R!ÜPLC±£Œ¤–&a`K^Ü莿c øݬ“Û_ˆÑ¹iÜý˜¶o€ ¹Ô€eÓNŸ.jäMR)j…ã°ZR†ƒk£Bo‡Š‰¨´õ<36>?ò-ªpØi<C398>ºÇýFõ9ºÌw]T®l×v¶*/*¥Rír#eQ^Dþí¡|£S.£ž<C2A3>Q¨áQÛÐBânRjº¸:­×ŒB=ã;6{˜<>°,
(k ôÏ)ïc<C3AF>2âMº¸¬õÚG_Àk3z Ȳ@v}É—ü¨­è<>)yýûOë;uÏî§èÿ%ði0Pu#p…è
ËÂП<ù<>]}Fç˜ ª£õ‹Û?´1<C2B4>CƒtLÓqg5eÎú'4¤œ¢k:h@ˆbse&ZYw? äLÌÛŸúíOñ@ª`¹äéþ&î£:¨¡S#¨€zÔ¹ûÓ¸†ZÍL#~Ÿ! ð:šÞþ„gèö?ÓÛtÞќЙƒæS4:S8¢Ç=C«táa,>ˆîW<C3AE>k ¾œéí/ˆI±Lc¢hA¹"[™«ºV&p]Œ:¤í®E _ýæîOø8'n@Úí/“B> .X!M8A܃‡×/È;Ä<8Cc†¡tIY¶Ó°Á2—P“ò ñÊØ÷@Æu¤2. äY3*Ï¡CfLÏ„ˆI‡ÁÿÇê…<C3AA>¿¥çÁkƒLÒýöñU$‚ü… ç@u¥Ð5Mì²Ìy@ÿ²ì:Ür8ü ÕÝóxOö¨iøÛOüL÷£<£„jcF§¸M¿[™Z&î¯LðXé 1¸f[3zdITÈòÙƒ¢Âl†#-t¨ÃÚI®ZŠ¥¨°|qÃ×CµL×h…ºí­AÔTU+Qãðö<C3B0>)dC¥³ áÇe/<µRßØ3åfï50æNèÈÕÞ9 døM ã³Ú…Á•K»)fÉ)Ù©d6]­¥×uß[ÚnÂ.Èhè5DQE”tth cd`öÿxù ¶÷ZòA>€›¡”ì<1ˆö¾ÌÄeÓ«®í˜-®Ô!tl6»¥NohŒª
?Unp
Gé…:Ü4Œjéº<C3A9>`äíòö#vbO@î¢<C3AE>ù(±{ ±ä™ø;bP¼”øÆõ„Qù<1C>a{Œú.qs÷íÐj»$ìŠÂÚ«³û¿¶}£Ñ»üî¾?—®$+V O‰m) “ <¤“hà¨pÄ%¼/îP[²ÌèŽFÂèdÉ7Ê&QÉñ0Ë@™>Ì,¢©fêëR¡R—™úJæ=^Òï’>ƒå3a2¼±púè\æëÈ€HSbIãH>ö\Óå¹WMžP®ÈÀ2Ç¢a…Ž<>©JÃÌ ܈â2 s+V«<56>'¯+Æ«ó55±=ãlé)|ìì¡<üÃkíV <ƒ$7)…šìM[â—>f†þe@+¨ÂȘ~;1t|<7C>E¨ÑAPrºã˜V_°`2ïùF§Ê¡}\£!Ì<>{FË'•Ñaoðà£<«ô³öPñœò>Ö(Ó±îýëÑðò—C¢·©æîm…+âŸåò—&Ì"<ù¿=r_4úôƒV§³[ocñŠÂëæ~ýëÎæÁ…Z,7϶6Ƽ*>Uj/ß½¨ >¹?ìU†¼Ù=?žœ<î¿RÚ£Ò‡ýà×Êæ«þö8·Q=y•Û*®÷­å6÷'/sk¸ü6÷l|=_<>
ÕÓçðᕵV³«OÞ¹'׺_÷K'_߈¸v7÷·Ÿ>ncÖt7ÏNß·ßvrÿ×ö¤P´ë'uS=ügûHÄIýÅZû`sü±ùõ¼2Øyûúà|Õ¶þf
†½–{J=×Úèz<C3A8>º·*m<Ù-•KXkt|™kt??zyX»öï|j3V±yîYåèLÜE+ts/ÏŸæ¶._‡Êmœ pëãéâjǹß«í[y}¸Ù¤ö¹wò~o}½fמõE4ÍòÓÆeýÕþó“'×î»´'t|Á-;÷i½]Yßÿ[;ùIØ=®<>ù _<>ÍþÛ‡v4î=û‚]š»oKÅÚ Í18}´¶k¯¾~—σa™D#^<5E>}j=} wÙuw©Øgá¡5Ú<1F>¤C?ÿ<>õê\H£OÀC”ZöHY2­,dŠWAd¿ÿMÒ®ŠÞ?¹#4ç;çÛÛáøãƒB.zXømæ%ºñ¬të7h Eökì“@mÜvf;¶Ók<C393>¸îâÍŒó&™”I ÞÔk$M<01>±l§_<C2A7>bPéõA>»'ÚóóøÕw8Õ <20>üûkjã0¬#é‰d<E280B0>#½7P(l{d¦ùM;”kM­•É§Îeƒ¢Ã1¨ójxÛ ~`PSQïÕÁvx×ÁòºÍ><3E> #û@Ûo…(ìºX¹šAcu<63>bi ¯ÛQœïA뢇ÝÄ5‘ëŽ]gó4ТúæûdЈ»çM}µëPˆ"{uÅ°$P<>¯4³ÐËEãQ<C3A3>ÚƒüªÕ‚($®öÂUÆQ<C386>}´ …f¼Ceêð3Ù§âó"<22>A
†MÛÝ;ç­o‡@=&Ðâx©dêõÚZ-Õ‡2hÏï20½Ž}\Ç´°
×~T—Ík2hÉ~ˆW{¯q"èý׬h•«%†­6k<05>ÕÍ<C395> Z <09>ªù¼ÀA[¥ÏÌJ×ÇZ¬õB½0J<30>A«~¶õ6ö¤TP§<>íŒ2;*hÇ5¯i 5ðä²PÑkãžnãÛ×QAçöV5K<>áäÅ«B.Øzûsäê>"èhÔSAW3Áõ—ŠrÿE¬Þ¹æÛ¼½»oH ÛmÝÏÊ Ó°Û<C2B0>4Þ„G K û¾€º˜
fÛC8¨ÏzŸqmFb÷f¶ÆN“\õ|2è"á1€Ú8î}`Ç°¡l<C2A1> ÄëƒõKaݯtšÜÞ(¯(ΨàáÔ§ƒ<C2A7>~8ß¼rU
_%s})œy3ñú<00>Í 1Ξé´Ì@á¤ÊÞÈ°ÉfÀÀu¾Êˆ ThW«zya7Ÿ¬p{“ç6Í(¶_2¡ä÷Tž.Ì÷~[®É_GÜ0in¢3ÚíCíÓp{¬–8]ˆé{Qº7µå~ToÃ!|k.ð}TíöD©¾Ub´û¨1OqÚ­î_K´Û1xÌ-ö²bæû<C3A6><vX†òõ Z·5í6
ÚÌ&`¸ æZ¾7Wª"è´™ŒtM[<06>¿~<7E>v[…(OW‰?´û:xŠ‰9ÚmôÙë!ív†Ý¾GQÌtÿ| †ówåëçµSaÚí-ÇÆ Ã­cã-ðT¢”¯'.>ñªQn§,ŸuŒò´ÛGÈ¥Ò´—)÷¯+¾¾}RnßÜ|o^q<>o££ïV*½ïÓ íŒÓ]Æ3• n2®¢þö(ÞÞH·ÆÊÚ1éHyn¸Us?{Ó¡¿Mò×÷ÐN-4·9¿çáÄj†wRe5ƒ\ÄçYÖ°w©Up»xî6¸wæò-áºwÑ^ë®/¦ðÿ@>— ¼ærÙ`Å ?{\+ .÷…¬ KxYéû7l؉×UiÝi¯¿ ÖâßNÌt<78>¥õ=­0­±ÁÏÌÔ 3Ð.Âe'ÙÐë­=äÌ4üò4×<>ûš¦\kA£.ͬȠ‘^—jÏ¿ }_†•ãV¶I…ƒñýgmB}!<21>â:†` þ„†ë›ÃÁª Û]Ò»;‚† òFºÕ”ZøÒÉkwaÐcß<63><^©\·‡>@ÅÑF…Û$Üž  (e®:¯ê@¡ÀËïTP´9¼©}_Ï5ÒÑAãõf—Šæ(žÆe<C386>ÑD2¦<32>6M^e“>ÿMŽó$éwÒdøeÊÒ窵߹x懿”êE¨;~RSWçüá ¼999ö'Y<ÿIÅEQVÍø[Þ×æ}ø€‘ ÿ`‰ä™ê<>d]k“øÅû<C385>žx8ÚЄ˞c…ŒC“üã­¶0!ør”ãð<C3A3>Üù¤ßÅd€û£=whsÌãŸ(xeA.z…vþÓÁÉǤ«™¶Ñ+M5qmüùàŽ‡»‚†°Æä‘“_m%©#ÍüJ9VÀÌéTt‡\ ÉÙàÇìŽC I”¨Fa“Ž?¡˜ä}Ò!ëÉÛ8ùl™VôƒÑñ!ók8<6B>~ ÆÆ‘êùáãáŒÿàŒ]£úϦ8o|ð(ÆK‰ßêèäËü‡ª¥aÊ{¡Xô`HIÎ<49>\·û¹`/ôÖ§u·YŽ,ðÎÛ{ç2‡¢»ºWÊÊŸ SË™“ªî8÷/K_z+SééùÖ:ǾŽ}ÿBoˆˆFA#àÑ»ºÒãvਤeeÏ·7Øc°×v|ÈÚQ;ñ¹cÈJmá&g¥´ø¨ |¥J¥vÌJ……šŸ=MM:f<>€ãfíN¯ †HÕª\h,ϳrH¬ÈÁ>Ál·x"•ßä-š¯Öú&Çy¡â0ÌêÚƒŽº þFE±±K+Ó8êÓ`¶oåØ9F²´Ý›î¨-ßð”Òu<E28098>éóŽ_ònÚXà¬ÚŠ÷bÞÁn¿H”NäÝøà„³^Íw¬I.JXLò6.4<d+çŠÙøÈŠ<1B>Ÿ¾jžBŠù².Ù(­e^ªeà=PHÞ7Õ)L<>ÁŽÛ+Ñ%<>É%øöt<C3B6>#•4<>dÕÝÑÓ-ÉZýĨz·€«ªcäÆdÙ¿o~rå,RÛ<C39B>8?ý»H0çÄÊL]$“ÔýE6*”í'Êd£ŽÖX3‰=Ñ+UçYhPÏÅÕÉÁ=3ók=xr¤³à?™  Ì&ãöÿ 0Ï:êS¸ýâ1}C¡=+Œ…ÇÞ<C387>îSìÌ\w É÷¤«ÿß3T´K‹ø4<>v³¿Ù×P¶;¢!ãÖ¹œ˜Žÿ­¯‚ä]„-!\<YÇ´ö1+³Ý…ý?eeÑ+¸ÄÊ9kð!ïPnjŒý-†¯R•ê¯Ô¡Õý<vF<76>qÀÂt.†²ð#7<>É”/gMÑ
P ÑΖȔТK{lˆªi7LnÈ-j³;ÑíÌ›!B™†Ý*99€äoüبDñj®X3/Á*0­¯ž §“2à wߌÕòAJÕ$<vHƲQ“öìé å¾…Áªô›`˜aæ%ëà4¿½×©òCŠý\ôs“³¶s³¼àºÛóžì<ÿ~rîC~XOH¼WyþLE¢ÿn
ÏC0h6¾ Å"¤85Á!—“b]”â±Ô—¼0§ø²¬Oqʦôü.R´…¯v;ì/”=WÐ<>ŽŠvË2uÏS }ÊfqzøŠCGoèb$í´•ã<E28099>¿¦:­š<C2AD>šä<17>ÔÉnb7 _%6À
«Y#àPç§÷2Dé¬~MÈÐSq$Ëi¨+{n.{7•úE<12>Š,äþ„‰ZFS
&ö}<7D>P
<EFBFBD><EFBFBD>•HVK<EFBFBD>—>J ÉÆÞ0J‡…6Ç(Ùm”^Wô£4Q;Û¹ Úüiº¬…6QàÏ+ÆFHŽˆ“°JMß/B;ã¾<Î y]1¶¿Äy²Éèû^øèýËq
B1yÅÔï~P ,ÇF§TK¢0çgY¤Ž¾ÑQ#YíD'fY'Df<44>ˆKýÈ*ÿϵ´<C2B5>Ö6îlÞuQ#,ü&"pV6ú<>•n‡Ÿ²•óùŽÓ3zŒ”|Öd”4üåÍJ©Èkn—:)ýê<1D>klÞñþš• G‡ï¿¨ãÿÇz•¶¥ÍDÑ_<C391>Áö-àŠ"-@<40>Š4jÄŠõ•*Èòÿß™$$3“™ÌøB}xè¹wîrιLIö£|XÆ¿ˆ" ³@Gà)wûM ,îìüÆcsôM4-µSöfÄC¬aï`róªëKÝ—MRô.åK$Ÿê j@½ œ.ÇqÑÀwE¶<45>“dNBëïÈh¸Š[y0FP6£™·ƒ†Dm0`4žSÊMW³ÂvôíB„¼q
ãâ°9ÄÅ싃#BülðÍ©ÎÐ[,û6O¶SD÷¸±È£<C388>OUb×”Ú@+©.ņíªÀ›'A<7A>¼ g 2‡:žÕ¨ïWÇ7Ë=<3D>™6€Qv¢Y“d[ú¥Y¦4[¾hÆvÈ:…ò ×5(ÔÙ€]³öf.aí™(æŒyàðÏ9<C38F>lÃLÂÑÆÞ88•ç iÃ_CŒ½†NJn(Ë]<5D>j8 Ö“¤N-<2D>†ª…ÄŧýÜÛß¡…”OX ÅßÓ´Pâ«áøË—¿§õèË«<ÞŸï'ÁöAT àìª>˜Š¶só“MŽ@AUÌŽB¨¡·­d®¡Lª¡·*Õ°K¹Ô°óyE°´PA*£5k§¿å¦ë~6û_¨˜2>x$TŒQÏQxÅt{?ºCúÒ—Ó5®Wæv0ÁíöÞmÃÁêK¡í íbìÄ£b¾ŽKÐÉ<C390>ˆË4¡˜Ÿfxy¡‰JIqØÒ•”€Õ$d)_цiBÀw<C380>+»RàHzÉÒè¾’ê+)ûcÄyE{ ø_.Û<>Ãr<C383>áÜF.°z ‚:öè BžðÃëD£,0ê»ôEdb*Ã`ÄO'“ìI½¬w>DÁ¼ñ¼‚'ÎOL_ð™p&Ò˜i¡Ì‰<C38C>dÏõZ kþÊek:uœ­èÓëåòêî­þo0Ñ«¡—<C2A1>Z;{”äZ画~Ë®£×µ^ùtXýUöª¿ÔË ø.W»®dþ\_W²Í${XX`Oò?<ek ¯B…(øÝíG&»:k„ú#TŲí³Ïh.[Ò6Ëåe`”)´^/í*‡àKãà* ª«³ûb/}ÒI'KÝ“·äÅŸ»62/vPIa<>ßòe`î¼ z4ÔØAƒµ—,3h®Ö«Üc}ëIH¾û¯=aZOŸ#A_"<>T †]®ŠÉ•ýÖQà#í­u± Zÿ‡•7=„<> ËÍ“±ö…køòâ£Ëz
}<7D>lÆô -(`K«ÀyÚ[­Ï{=fÐHkúöÂ
:5Úž{ëêìǽƪþÕ™å .t"(à±mØ{WWÁºZá<5A>¿¬9/
þîÂùŒÂüåѸ%„x³ÌdëÄþyc„AÅ<41>Õ­ó%RZ2IŠ¦€à «EÙnü)ù !º(¯v"s¦é¶µ"ÆÕëQÎXå½Æ;{_wº S}'òÅLI}%¥LÂцGJÀëÐ̹©bŽV“W³óTPŸnËÛ(ý`ªMÔº'¬”bÌ”÷»å±Ýü/´<01>ÖÁË[§ByÐkû¯“S%s«.¡ßNº-ô!ìäb<C3A4>À¬ÂD%R2·Òÿ<Íy£‰½L2ãLƒï.ó>e·át§¤/™)I²¯¤ò•_ç·»îËÕî§ÌÜÅ5ÃÔg½ÖÚò0``UEý½ªóξz3bQ¯Û,ƒäïÖ4j5'Ùì¥'¹:=P“å˜ÚdÜ*<2A>ž"²õ1Ѫ0Tj%uó´qÈx¢È4¿<1D>]f"¹éDïs_<15>Hæ»èCzŽ/ßnªfÄ®¤i'q,9Ù&/ÏoE*Ìk1ö
œ!è$ëm´3ØQªñçüܱF_@õ&Á÷«Åèá9¿¡uÀŠâëì)éAþ=(m°89ñýY¥tµæ"@÷%çÊ빧å99ØÎ3-û6O ª)óÃú]ñ ©˜åõ¬y<C2AC>N7…˜<ðWv¿Pa'^êLeƒQìDÑl•Ozggkž<6B>pwxJ<41>o™¤Öºá¼Œ}a+a“÷È<C3B7>”¦AVJ¦•ÝMŠà{4¥»®Õ:Fÿ`Å°â|OÑ\Ñþ<C391># i1Œ@Ť†AÁ2þ'Ë<>²ï •;dÅ”CV,ÈŠö³äÔ´”1öWç<57>ð»£b4·îÛË6€]H׉½r¢àËN×øäö†[`Û[Ì„à{Æv+\vþÛpŽ½­·ÜõØ[—e<E28094>cÏHÉtã4ˆˆ(àje;XæõjwšU“Üô}:í⓱&×sÁ3Œê(óMWø»Ï-‡ð ç\I®rf#o çtd<ø1~9>²«.iø½úÜK ŠWÑ=&Hg@|<>c‰1Jï7Âå7X‡a wÁÛxA?ö~Cl<îÇül<¨“ðº:U¢ÍØûM¡<èµ÷®غÎ~Wî:Õ5Ó·:)I²XRÃ… PS2'ÙJê óä:H@Jˆ¾ø«S¾òëüV4%òJZ ,ñTZCœ.@¹¥Þt¬K0gìãVQ¯êv¢ºÐÕ›&'ÂÅXg÷¥*èÐoI‡nï<6E>µÑOÙø0®WSÑX4óqž&ÉàqG1þÅ1/^V"¹éDï3_%ÉÛwÅ#Æ«èCzŽ/Ÿ¿ƒÝ:ÿ*xÏŽù1íd",·v ¢Œ¿he ã«0„ˆRÛ •ÔJ¸øeßbîêà+ǨCq³œµ¶Ò°ËÛ|MÜ,»™å&aQÝdžÜsŠ÷2<C3B7>°Ûªãj)”û§QþˆËf'½´ õEi¶¸ûËyZÜûiÀ„6ÑÛqqa÷aϧ«ÙÏ}`,î.<i¶Ü—<C39C>w\\DÅš.•£&D÷ÈöÚ¼^gFüIvï¯ù>ó¥[DÈQ¼ÂïÈaoáK<C3A1>;[í<><R=;ɺÅÀPÙ¡X, ¦Ì+oå“ %ɸídpÀ™ À˜j'>c°ÞÊþ3v ëÛWd ¯û8I_ÙP¯W'u<>W¥‰<E280B0>ŽƒhÉ$¸®³À2BlÉíf<nüÓ=­GžYäæ€3 L²Ð¡ÀÍßAÝÇÁÄÈ Õ.f)_"ù¬P_Œ¾‰ˆ™<ŽCìNð]qŽßbn³ŒÝ§ ÆÆæÖ]ânüjõå$h>Âò–Lˆ><3E>v¢QV^ùì>¨÷CЗ  ]IZo;±Eðº/ˆ3\d#É\º<>÷•<C3B7>1cø&Ûyç[nºîg­)â2hØEk|u†ÎXömž,mEVÄËG<C38B>¿J<C2BF>k¨Ž¯©Á5.Ö<>XBK_<4B>q~<7E>~åö^CÇXkÀ8×¢ˆ‡õ‡övãÚà k8pÖpŸëÕÀZC…T±ÁAÖp@,!èËÎÖÞ{^±6<1A>ºO;Ju€ïƒ?éb¾{‰NT/+Ýž’†:žÕ¨ã5 vWûЈÂ5:6ç'Óæ“Ì3:.0¥Ùòu„Â#™jüU(zm_Låâ%˜¶.˜žW%Qy¯ d#ÉßüKCdeŽ6öÆñ8S•˜í“i)~1¤,Èëuf„²îÓmyÛø»{%ÕWRƱ„¶‡!×P_º×|'¸†ÄšQ<C5A1>5¯­YkˆÙGÅ0åFKYŒ)*†Ù5Å-¥¾ôèå“I0å“ ö{SiòF~XPGsæVêËBø¢Ùâ<C399>^±“CÝ• “ƒ´<C692>»A\SiE<69>¡É0NRìó¿1ÌW´aÚ0†X”Šöè­%ÆðyE“íù·d`S¹¿”Rá[ ðøgÄéoEyŸE!Ñ„ñ†UF_*ÚW˜¯¾Ö-bä•øþ¬2òZËò0Ãd¹xß橦¾IH2—>žW¹éDï €1ż<05>yÖCôЉàH ÈÍ<C388>HÉpJ<yÀÅÁ1ìÀí7KJ<Ëú•º'o<>X7|*É<>ÔÛûCø¥V }–Ö‰æ…HU»?©ÁãC ¥¿ô‰Þ÷øWþî:<3A>nêǹ¬6;µÄ¨4Ÿ¡Ul„ß<E2809E>¿²í³Ïh.[Ò6¼\^b™BëõÒN%©"(¨®Î:ÙZe}µë¤<C3AB>DWÑð|<7C>Šßÿ¬WëRâL}<„$(‘ûº»ø)”
A<EFBFBD>Ý”]¡D-X—ûûïÌ$d.ÌL&Ä?”EawÏé>§Oë $h|¤3«/ïÉQânŠæÅC §].}qÒxíéH˜4[;?¾á%Õ <0C>öXOü-œ ð˜RI{O¤Nì8©ã,{+ Ô[¿ÕõÅñ¦¿Mêü!“þ{$“&Hxo+wDÒÓÔQR€L:ùÓù῵À|X¹?œó“{=qÒxí-ë¹ &­ðcýN<C3BD>ôX7¦™îH”tÈK
ÔÒ8[â½%]®Þº0i¬¯wDðÚ(©¯üì[¯L¦«<C2A6>®G(=úËkÄ<6B>ÍÂï4cõíF«DŒßœÆ~·Ü ¦±:ÝIÞ±¢[êÿ¶“h¡bE—<45>T7wœ ˜”:ضùÜêï ¬« ÐÒLz©Š÷5½Ûæœr—Sž{Bž»è%yRJª,è-¢(º¤¥¼$8MI„<49>»+Ûð÷%íó»&_ÉýBµl<E280BA>8µ-K€S;ÆkÈ'+®ŠFÉŸ1
'vÑ“'\ôpÇS<')Æ<>G™§[þ><3E>ûBîû^­ÅÞïó¹ï:¿¤Rò. ¶?èÙÏâKöõºØW ^”9YÒszæf¹#gµgÏå—•lOU|^l÷>÷rtš¦Ð”Ãw³V½<03>SÚ¹üŸCŸ¬6ƒ,2ú>\ÂT¼§iz\!qÒ¼æûdå§õuáÓ4|’˜î]"BYÉø?˜èUŒ:¹Êïö\bü•t™æMä -)ãvÚ¤çlÓ™Ó_Ÿk,,`Æ`hÖ
ÒÀK †ºH»g&v}a1&a”Ÿ±&a¿^Ü•jf”ß±W/ÙèCÛʺÆñàFn#`* p£*ÓSwWÖ@ÁR¬’¯;\™Wרp ¨«•gI*æ}:Ý5 Ô¥êñ¶ÉÐJÛ´1t ,UF_ñõê*¬Å³†»ôâÐä¢Ì<C2A2>_¦_+ÚÈ|{Üê·uÐaPtW3@ñO¹3Åâ*•V‡uÑþ2BjÉÙ<C389>¢@I㸨¤
¦SfpbôžÜ<C5BE>kÏëR{Š•ûÙSˆì”Ô:Šïí9 bt°@»¤^W&È[† à™Â!ûLÄòŸ‡X!bÞ:õÍFc<46>/_0Äou°s†UÂ<55>q†¸5ƒæîÞójZãðªý­£à<á~áïø:ÔözhóJØ
Ž¯ü;!»s<C2BB>ì~«ç7çM ·Á‡æ9 ¯ÝÅŸÝër»±w]¯ë²%p¶ò,÷AÙi&ÙñdÜ<64>Ò!˜ÅéÎäûÅ·4\G™?ÐUS<55>#7LXu™v<07>˜É€Pà\àƒŠÂiç¼™RСý@ZÇžK+ö,'/-Y¡øJš\áPEp8îŽÊ•P-Dî¢mY\øWk=¼áẋ+™»P¿&J
îB §ré¶%Ÿ<08>û<EFBFBD>8½g¢ŒöÉ“«ìx5½WgŽ¤$vÙž_u.Ý’^sñžjIð-¢ÄtUT˜í<CB9C>§cu…^D…Ä÷i†¾ˆìEä'àì}Tcï(É«±<C2AB>îJÓ½+ùˆ}4àýâÁŠþ»°¯%/çš&sMî †?äðƒ§å¬ðO“L?®Pîþß< }8nÝÜÕ ú·È2¯Úáû1n§MÑoììðÀi¯[ÙWkñ ™W-656x»vO`¾Û<>aArt î0¾vèŒVÁèèüm^´ïP<ß<>—ÚkàÑ_Õ–;FLš[(ø ¯s>v¥[]3^-†&6Ý"° +O[v éž7iÓ-è¤ÀrÃ<72>L>.ýiÌê„¡ðSœÐÒmŒvÞ*ó¹sWž>¡WNoŽ'‡rê2;o²»RJ\Ÿû»À‰õÖæÈ 4Äæ«Ò$v‰bïœr¿Iô“³ïõÄdûª‡ŸhÑyÜ—¯:ù¢ËŽ‡ƒ”¼VM¡— ÐâB®<ߊCmÆ VRÐ,à ™ß„¡N×g àÍ!_Ø;sÚïN¤%ãF†UÚ}Å8Á+OS<>¼(ð-(}ÂrãÀÁö´<C2B6>”D{U<>ÑV3;žŒ“ÌރߥyÌ<79>ˆao­—lôáÑЉ™|NƬâ
ªïï$ž;T3bwñ¡D}ùù—¦ô<C2A6>äš—uЭÁŸÜ1YÀ·/Ö°*3ËÔ…YíOk<Æ)¨p•d ÁøŽ‚“àùž·ÁÊÉj3 €¢3 †Ê5¯#s¿;SðïZ€Q…2”
o'˜(€/0Nîð|RÇ<>R}\9¼(š.ŽoãCUCÝ/0MÃ<Ç>OzD¸c¡¢zø$ô³<7ÊÛÆßÜúûÕ{ù- {s††îw> E÷" «ý«¥ÂU¦Rv÷¤!J3Ü`ŸFÃ.¢aD7ñV a<C2A0>‡[ÜŽLC“pïëÕ<C3AB>#¢!ÅõÉ8ûÑ<C3BB>/>! CX{,þë{ƒŠVA0Ï@{ÿcãï¤ #~ÌƯÅVÚåN‰Æ×¹`¼ú ÕFÈt ˜»œÜ›(ÛŠ¸©-&2:b<“¼Ç ¥’êÔ½ç`#ÇARÐ}Å8½ùžÕ`CqúòÃN±šµ R­<qñU²ãu'ãM¿Z†ñµ#hX+O5þrŠŸyŸ¥Nÿª6"¡f(а©m34ßuä Œ !˜1 K I ØÜÄû'À¶!³2 endstream endobj 29 0 obj <</Filter[/FlateDecode]/Length 15646>>stream
H‰¬WéBÚL}<K<08> `+¨ @  Ô…åk¡Êxÿof²M†™$€¦ñÜ{ÏÝÎÍÕú}±0ÉÔÅÂIí_¶x;*ÈoûKðßʼ<C38A>«Ý¶©«HÖ󄾧ŒƒšXüØdNåØmö¼<C3B6>O¥…VN “@a}{½IJNeï3oý¾”ú˜VB°7¨0À>B˜Š·žÇëžÅ¯&*lö ¥…¢| +Z(í¬ÖZˆŽœÆŠùvÁX÷N®<4E>"¼\nãb9/ƒßæWN&Ü6Ì­¶X¨ ×òt<ìP(*XÇ€žé_¯<5F>;%ù=M*ñÒ¬jE•Á­H¥(ˆ¾%Á'e»Äñl§Þ•àÀGEÐÉÊJ|Km¢Á/uVÀgoÂX¥»\PÁŸI­EêïÅäQO¬ú<¯R[ê¿mA^©½”§n*õ7”—УT|ŒNe9™6)B1Àßr DâðL•ôÇ+¿Í¢ˆ$¥|1óÀ^¶¥¦ ˜õŠã3á³æ<C2B3>È<>7c?]'¼þ`¹dŽ<64>R˜dPVÉ<56> cu(ìOPºµÞÂWEørI¯ Å)GEÐÉ*,cçK¬{ '­/ª=è+°’o´õ:½ ļH4rƒ€ô1{€Ïe@ü/ÙH•N><3E>ÉÌM.l¥.B8gü4\Aïß%ÄÎ<E280B9><C38E>µ¦ðk½Æ ³…PFØøL¦´Óz6˜Îçl>S­Ó/AN]ô·ëõy0콟[öB<C3B6>À˜¹Au½%xm£oÏÓÚ £?B¡îòßÝhvðiT Vg
˜0N³¶Q¹úþëži4¢4†ÿ±Œ¾áF³÷aŽÇÌžþ*ÝcFß"<>mT }Lí˜!è-¬ÂŸV¤µ£±Çf_¤™FåjNþÅ0ú#î|¦_m£ G¬/L£€`-Ë6Z“F=¦QŽ¦ÑŸôXÏI7£7ÓèZë¶Q¸_f—/‰GV§9Ó<úÉHD¬üûíÓÏ÷^·Ÿ_ø„a|óGhõªöo=¿wòaÔ<61>±&K æç+C]ì´î(ú¹³:«Û5sFÚßvµ@ÄGpWÂ<57>d"FD!WÏÌ úTqîæôþ»äŒÏŠX¸ª¸<C2AA>£FqGÜ gܯ@{qšìB.)êV#\BÓr?ÁP!å.é”ZØ($¢0û»ä­ªáKFl¥Sºà³¨Ú4¬OžbLžœ{<7B>LçŸ'Bäzó„טƒ§³¸£`+sb©Co¢Rb—€<<3C>M{¶KL=ÉSmþè#>S[:#tÆ—8:>tY§å½éN—R4— c{“ÞÓ÷ôË™ÂäÉðƸP:¤z28f+ûJzU¿å”P¡ó5ï[l ò¢kë<6B>´qW°´éÌ`L}î¼oVôtôÐâWZQiÞ8& õfõ-ò!ÎA<C38E>#o4kwŸÞQEô¨èUùªB+Îþ=$ iéÜ*dåpæTkFˆºt¤©òA }WBb†ëo¹ZTtâP Æö[âAŽ”åŽ
™¤W´˜÷Ÿ0ãªõV÷¢ã
<†=åK¿_vý$>FóÝ 5§ã` ^L<>…Ÿ}¶gùïô*]ú<>D¹„fŸd<"Θ!ÍKf~ºCï©l»þ¶»fêŽßGÔÜtÛm‡âkÔØû»ù}«Ñ”›{~é,ÎO·è+ ÆØÖMú:ÈšÜź^[)O§rA—¥æC<C3A6>;œú±œº´Rç+pÞ»*¥áV e<C2A0>¿L±÷Ðò?»_Ø\[ÊìÐb°4?ó:S|WÖZ‰—fU
Är ˜ÏŠ÷Ř2 õïbÌ9k<39>bÌ9ÑŽd,ý²-5é~Y(6cL}(í³êû³0<30>¦ª“ú<E2809C>­„éÒ§NœžÔ®ô„˜ç®]}@ƒY±Û‹ÅÙØê.¤#b¬ÇÈ_vAÏߦÈ»ÒåbAD|À™Ì†(hžÃÅÌ4ta:tòªõî«-<>A©?dŸJþø,hhnÀÞ?‚Ž÷|ô·28SNM21V@Y¿íHÓ%`Ewê&ûÌÒ&]zTNõTŒVÖ¤zzÑþlPØ£æÍ£ŠQ5à¿a¬1ý³kÏÉï\”ÛO¿,®½‡†O-0»¦<C2BB> k¿ì34O~:Þf‰9ÇfמÅ‹'ƒ%p˜š•|\ T6„œ Ü•¾<E280A2>,tɱSÇÖ“é~§êÙ?”'BD0]2f²SÓ S;ëÞìŽmç•{±Ñ§%~ç•ÆÖý¤ôwå~6lM4?õÎEO­aî…L8 ãAZ´Y¼Û‚ÁëDhÀlbYmh …Q„7c§RçšÉŸ<C389>Lø¬yC»n÷-e†¦_¯è‰À§ÃdYžŽ‡]ϨbC'Ãœ;û÷ €r« ­r ê3kG¦wÉKN4€•ç•kΩ´#ˆ!V9•¸Ï —ó+zÏnìžu­dÔm»ªÀ)ØS»}Ùt
ö í²Ø‘ì`w-Ž§œoó^ ”—Ðc„[ Qìþœû…žK^Ï¥Û¼kD4o˜¡q¼{¥[¡ÅÜCs¯O]]4ÑÞÜ¿Bõ r>Õæ<C395>´€Ð„ñj]+ €=f÷j\PÉx¢ø“cˆ1iÁ×$Ö/1!wÕ«³ó^N>ùí^<5E>õXMD8#BÿÂÏ<Š<>XtL=Ö¿ß«ïè÷ ()d
»_vs)©’þ~+_l0‡n%¡¸=Ž]và¶Ãk ò­[ceÈb”@qXÙ'¾—7Xö ñ[¢ìJ>
'áÃŽÇvÉ8¸©±À>ÀXP&c¦ØŒÅv7_ÿ<5F>¼ÔÈÎñ¼Ô<C2BC>ê3Á¾Eá~íh~ïÝŤò-NùÊ úÇ[D`MžÄ ö/Û
ø,¿pËè,଎ÿ¹dt|oqàV±£±€çµ_%¡¨ÃcW[bÞ  ,ý ½ø¾)ú][LXªïPœž{öuŽ÷Ä,<2C>Ž
våA2~ק¦p\¹°Æ6Ý”QEž $ìLv$¾2·ŸúXˆæŠÅ•<¼,Xm¨>âdªÏewõ6$šÐ²‚µá`ytÊïÂ
MËÃÛ€ùéÎW0꽸Ÿ‡|?‡Ž-´SÓëVöÁñÕ†î×+Â9¾ {D²·˜7» Ia¯[aI{6Ñüí@e¥*ó²€Â/u<1C>>{ƪ”n-°‘¡>Ï«´‘Áñ`št´cñè.s8Þ‡ÐÁÀ“9OSš7Gž.Ï«L±÷ÐÂ.¾ƒ&•LX.{Ì;]ðq”xiV=nn<14>ýãç/ôfêÞ·˜'ŽUFb8R)j”¶Zò+;aº°作|§î¨Q4ÛV¤®"¡Ç½ Í&®QVÀ§ßÒ† ª§ {Ž]â2ÀÞb<01>S™<53>²/Q[À¼@5@!“Ò™J<>HSØPÊ3/ìe[jz•| °ìéW&|Ö¼ñîJ‡Úa1öã»îJ<C3AE>ËžŸ#U‡¢Ì@Ž‡ƒ«ïºi/÷†Ð%²"cÞÒ<C39E>) Ó¥þ ACðÙ+¹IÌ-æ* wS;Ñ\>
$?yc©3v>
àóĤÒÐc ̹ûY"À€½A…š—Rö`Œ·žŽîYüj¢2À6¼÷"÷¥ab1ßnymÍá6î><Е4ÑäéxØõ ÆXådŠ¹òÐóZDyÁu3ðQör€sŒ½¦›]<5D>>c/c/DÇ´ÔI0³!¿wó)€óTÆéèæ]¼kðÐ![~fÞb…“Ö—³ž¬<>«‡gºùúè®l·=ž—ø…S0HD-ZJ }¾Ê背š`ƧåõºÐù{™Úœ7®”ÓÇû´PVÐW)í¤.>Ü<>×þYŒà^@x­³+ñ¬°Ê‰çg<C3A7><67>øðw¾<77>Uuw¥:Käåj³}%WoäZûÞ«¼¿x¦ "%¶„ŒXj—<6A>ÄZ;EmE•ÛžðýŸ3Aû¶÷öyþñËddÎœíº®r¡B¶8@…Õôo3T{ò†P=;o¢†6¢&Ú/Q³; gWÓŽ:lÃ<6C>z£‡ê÷[S4¨z÷hèmÙÐðÉ^QUU+ªÖÝDÔƒgÝTƒ ]³=Z±$¨îU•ßÛ\óI¦”)†¦B³×y§œVºU¶#Ë$]®¥sÖÙ~xqE»y9¦³¾<C2B3>µ4úÓ¢NðîAVCêÀn}Å!‰ØÓ0S¢R¯ÓÈò6<C3B2>wåÍ—rÌKAƒ;hÅÎþ(W²íC\kñ¨ÿ%V ̘È2œ$Á"¡‚ˆ]+ìƒpvhí;Tµèbþâ©ÏÑb¢^€”d>‰”é8‡Ò¥âJ3÷#··¢Žöâ;|‰/ˆS|Ø® ¹ù8Pµ÷œq¥7öS7}lë‡B³¯ôÒÄï.\Ãìc åe$öVÊ-ú(gkR!j³¡ØÁÔNY¤àž&
ÅJÕ
媉~7 \¢wB±O-{@_Ü<5F>`÷Û^¼äVâjSÐÄüósŸ Ø3Ù,HßUW8^òÐrm?FX ñ€…{]ºæ<C2BA>û»^rG=âÏØNOv&®ÀŠ¶p+'<13>mŸX¼d<C2BC>Ë”Û<E2809D>—îÓ‡#7[|. 'ÛdjþÊy÷ÙO×졉Ý66ÂN²a¢ÉGÆÀž¿@*Ä<> Å}±Ñ;ôc£€Î—æÓaöÔ5va;-0çØ]ZN+®ó°…–.pºHâÒ% âg¼ÐÞ >y ϨO¿
¥ˆU&^¶®<£­Ç…—®S-€+vÌû·þ—q Åã% SR=ãL‰,<2C>ÇŽ;/ôVv[×VÀFëD'Ã>ï„'Ä,~ëÖ­ ‡%ˆøe<C3B8>Ù<E28093>£/DPÓr u€zaëuðQß~œ‡ˆ/uî·<C3AE>Ň¢ó¡<C3B3>gÖ¢L#¢â _Q|ìMì³yG§FÉãÅ.þ¿ð§¼ ½ht¨—¸ã0Y!xfÏ]ÀK™®Ïg7 •‰æ¥NÖ£7ƒ4.ÛBZ6øãÓá¥OŒ—¯ƒãÿîÇGøõh:?#~à ôÉ·ƒCU?¬ ­™qŸqŸadòç´á;µÊè—á3•Âàñ&êûjré~wŠåñ´ å³Tí<-âJ¶²v"±°Yëéç(Ê KzéCöÍ0Úãˆ^+ßðÛz­ÿñIz<49>Ÿþç=FÌkm®ÄÏ÷)¥ê=EZ>ŒÅj½k“G.á¤A!Ê÷´™Ñ%ûm@‘ù§à
Ñqsw FQ&ЩƒÔQÞZ´MõrñÊŠ«=rð.’“Õ~¸ô<>)
Ó†œU6ƒ¬À„<>²T'&:ÕËçpXmkœM/ñ}lÄèé <C3A9> f@oº/­c h_CÜâÁÍÍÊV€Õ!»[;Ö§ßmƒìã ˆðÂçÀPáðÈ]/ÃŒTG\GÐM¤Ã(ž¡àØ<C3A0>.â°zÒ}wGGÕ<47>ºÛtRÞôE à<><@ø>¾ó°h=4²š×QÜæèíñʲØg¬Ìª;Xf9äåqÈónèý3¡°Û?•<gxÔ3¤s`:æ4ü+2$ɺì70€KoÃ^ÂÏc3y.Ä7¨<37> Ä6]½8ÛhPÄ•ç5rð¨P ± Ak<ñ#c!€™–Ç<\¤˜Ž] ˜¥OÁœÃKåÊ…Ú3v)WR”Ùd)WÐÕ§óeœr­+]¼‹(&¾H`n¶œÎ#&CöyD´ ^½6CÐú]´æÐÌDzÊ`_§äa 4SlÆ,–Þ£±.ù,Ò´¢U‰.Õ¨žMBz-©j¬c¾Ðü†Ì½Ú¨´NÊt¯ß?ë‘?v)ûȉµƒýAˆ&÷©×vùÓKÒwÜŒ^«PÄ5ß½ùñÀ)Dº³<C2BA>ä®ÕÔ4¶w<>÷ÿ¿ÃäDŒØ‰<C398>C“¡…Ê1q±6<C2B1>g ÜkÊî¤Çl PcsŪ
M[k'l2jûÚPË^Q¥¤+,›è/lW¤©uk{SÒH~Žúÿ†¼úòÿ Æaà}(íiôƒàÕÑÒ®GÙ)rl^×0ƨ4 2ñ€Y“™yg&ÖÏjä-¤.ÀSjö¸ËT òë«Í-w&3Ò‰ÄJð w¥ó]£šé/£m¢¯ˆw¼1pÊx,à`Jܧowçå׿rüŠB3Ýæú-Žó|²íÉžÙ>iƒh£¬ïÃ_ £ˆbwÛgF™ÊC#h‰²m¼QÂà J #l O:ñÓ¸“¡`Üc)Ú°ÍÛýS«èšýÎ⥄mCäå…°ÞqC¸@µ}C³oØ{æ³Ã?ƶ#ò_ê[Ü…BkZ$h¤ê^Uù=(%·/“´Ý‰è×úl¢1œ•ïì¶k{ X짰~¨ƒæ¿™ÅoçpœýA´ü„Åîv—ôË=¡¾É]È vøËBû=¡ö=}î,è+qõÃûN¯Ý<C2AF>+ ËS0â¼î<C2BC>S ¯=„‘G~Õc÷þî•ŸBb&à'šL‹æ"Y†äà<C3A4>žšüœ¬`ÄKäÅŒŸRa”jI™Ïà¿ŒY2F:…u<½l¶ºÐ•ÿ 8m;#c߇‰Á ®§ó ,s+î)¸¶adÎã¡7ôæp¡*„å·yra·WäLyîv"'JÙÕ\S¤¥' 㘂¦ª>inä@+âÁà<C381>IDâÖ³×7ZÞ¦RÉ…mÝ•Ü<E280A2>6ÍD_-'èM/u§Q°·H])<29>Ž- ÉÞÝMF?‰ˆoÕ“‰þ±p¼ÏI^®'”;™ÖOwÆûÚhC¿ü@3þRúE5Ñ¿£þ®pöo<C3B6>nÇWÓoü·æ¡Æ©—œ1œÅª?NüWqÿ¿|2§Ï˜SLôµ¬¦ËcÊβ*|$µ-ì6wðn¡|œ\âÈ/äÃTÒ<54><78>vQd·HÇ•¢"%Nd7 $^gÏ@2â0­o#²Ú•" O3(™'YJ8e¯RO<¶ÿ%~¹Lô_÷ÞqõÜÞÈ/wZ&y!¶-`Õ]w 4_ªßýŠZ¿!Öiô¿ä—ï˜ «¾«C}»€0®µ+¸$ §Ï/•+¼þ‰ÏG~XßZ.Z3Û?¬WéVúN¾‚Þƒ
-”®ì²S
Ê*n(²
Š",çü?½×þf¦+üYüÒ3Ói3É“äI²oQÿáú{Iá¸ø=4Ðmåþå¤q€§<E282AC> ¾\_qúäw߬חCA?0¹P­< ½Ž4÷;!Æìæ'^G&—Åcû;ùðäÚ#Æìéudr”ž^¶!ðý/a»¼ëÝ…†]ˆ<64>QÒ÷Ì¥Ñ#K²ZÕ¶Œ7+þ§ü5éç=eÒ—œ”ÐG²ã÷kB/T‰Wc${×Ð<>ðeFN¢Ç<C2A2>d+Í"É,,É’=êWîîk® ‡9 ¯³µñü˜ú\lv?77ujK·ÏÍè«}Ûª%Ùö(VìÔLª±r2pô<C3B4>ÐôÕwˆ­´÷ѧt”áõkGùC ²e×õ7×ãÛ+æ<>ŒxÜOÔIðïñcßÜý‡ŽÇnß=½þ2Jì}=xÿàùí—é-ç÷æ¤lsâ°òOŸ_ôz Žµë•(Ì*¡4<âÙl¯ê¬âmHfü\®}©Áö¥þݬòݤ¢ß²wž§Þ§ÌÍí{g¯"ƒWj—Dl€hElÞÌ 0·gÔîäëf>úïßùì†W ǧ.ÉÄãìØ@=£Unn<>°¡¾üšY_XZMß—Ý|l_^±Ì%¨= Þen{~|Û4øsǾUà~},<2C><>`îãLï“Oöïns-;Í¿»ÍE=Ì_øw·¹¨Oþ ÿî6f±?ñïnsQŒý…w{÷0EW?šKPþ<E280BA>´F„äœÞø²³eÕ@bNÙZ¶¡ûA1<41>Co Ül³·ÈŒõ# tU¢†f02Òøñ2e/F=zŠ†“ÆÆX°LÛúwp¦â«4ïKÚ[G.ã0Ç<30>;}䲋`ì"Ø·¼ÍÝè<C39D>/çJå­.ÑÑÙ^+ñ[‡#™*è•61óÚíGx;T•²D#G<>· ÀïšÍzÆðFë<46>3ñ¹ÁcP+i­s¿ì>o‰bß¡°b¡Ã±<10>¿ƒz~ÇiïÚË® ÿ>-Õ¼T<C2BC>™-Ø]áêk«½Ø¾¸ôz…b,Ñ\£ÙÖúr|tþ\«|mä@ØU<¦AcoúÞÛ‡ë^B²—¡S­<>Èéli8Ô÷iøeM¢KIÍ<07><65> ´œº6·U{.>°Ÿ:bY¦„[ %Aµ9Çû-Žj¸V
Ög¦>ò YÁ§ƒ ,¯Mžì¬[5‚¦<05>•>­…<0@ˆ‰6r<>ÃŽhc‡ ¼Ø îa¼.©Ü—-Ÿ|)ZYh è—j è.ùÙ<15>€-Úµr¸6ÑA<C391>ÖâžqÀ[<5B>Ý$g|^ƒ`}hYÐWã z~36@`hŠTœì}JXÄOKA'Â{<7B>à—ψM얀ءfø‡r++îT3øïtÀˆím†°oPm æ7DˆGŠ0°Ì<C2B0>¹­w°¿f7ë=…ÐdÑcOeýA€î ­·Ü<C2B7>·ˆÀÔÞ<>ÓW4­è§j"¾ ª-Âá¹±)@´uã;<3B>جdèrZɵt<4A>ïx¯…XÈéú”Ïëú—êTÚürŸùÑ*cü6ï
ÿS€è:èˆí
Sž;1]yÞcGš!ì%Aí4ãTÖá¥clߌçåßu(•œÏ¨ÈdPÞ!<21>Ê:<52>íÖâ'~ ª-p}ÙÖ‚;1"¤íæƨÈû—tëè<19>\0Y¥—L°Ö<`5ÞÔTì1¿èp<C3A8>™b¨ZÌõ_/ß¡¯+¥ìãm*÷ÖçEÔ'fᾧŒ­çOîi<MÀ-
K­Uºxq!æ;±8þµyŸùçÉWÍ•~©[²ßÿòóãâ¡bìGsx…‡ÒVC·<08>}0Àà- JÏàĖ_À¬Ò€™5˜ökÛörÄâ•ìŠÇ{j—i•„—Nú5}^& w‰¶©É
Ÿ=óÀkÀ-lŽ˜G¬ýŸ[qhpöƒ×Äy Øü®±qPe´©«Pvô Ê|ë³}ÓÖ³yà·ÌcÈûUˆ¢d±S¶u÷T,†ÊðKÐk<E28099>¯§½™é¬¼Ì”îï»ÀÉCw««/8Êbòo‰A99ÁRƒÙ¡^ã‘ƾ/loEütõÓl[2_¹ž >¸<>ŒvÆ<76>èÔâ¹)š_Ê~óÚžqKFÅУ_áûqwìõÓs«Æó<C386>w³ÝwãpNF Í+Ôe¹…b¿© @»BzEA¯Ïœ%… Ž”#yÅ<>Ã\F®¢šöŒn”aÄéú7E<Ûbæ¿,ä%æ£ëÔƒø¡0<>ìÃ-«¨çƒŽ@ nyaTç`î4qP¾``Õ…Ë P :A%£øeЗ<C390>Õ0€Eènœ4°D?ƒŸ4yýïIK0VÑÔf yR央Íd(ã‚ÒŽ:¤ÜÅÉ õ*_”nËdÂ, g#rä|Ôa^rã<72>ZË~Dœª¤ …Iuý! =­œf<C593>õ@:$çL|®3ŒÀ¯šœ©Ï3 x×ʦaÕ<17>ÕP²¾ÓSxõøGàêNõ2Éóð<C3B3>ßQ!(µW¡¢˜†dww. ¾ øªòåïšÅL©)81 lI}|àÚƒ¹üA¼âdŒô©ÏtŸFGÙfg‰"yâàø7GÝ­¾@sK± ç<><C3A7>üzJ+¡|a,N‹®÷$È.²ºJ÷÷OðÇJÜ"çËÎiúÅáN‰q£dDG<:Ê"-(óÑ@:È¡­Û|44†É¸F¶$Ó8íiåä/¥Ô?ì5Ï Êe|&À'5+¨:ðïeJ÷n!á5ìÆB©‡}l fø5ºJÑÊ1¯3Uø®˜ëM2# æ!žBÃ&Û¢+@q<>‡[ÿK!9HrèŒo¬?FÚâíõíóŒ%Î >s!Š·ŸÃ™º<18>nFÿ­”Ùóz:ú\<5C>ÅÎøÌuîâ"TFϳá>G.î…M†ðëFèa-
œË©UVy‰&Eg#ÑW^„‡¤-<12>ИdäbôóžA¾ä$NR#±D²ã÷k´U9¹…EbN²ëj£ ò:•Ñ"»Îû*å{¥tA^§Ê·Á<>AþKyTQÏ“)c”ò<E28099>[Ù^Uº—Ò)¶ÏõË)üX×:~ä<>¹nisÖT†ªj+ÝÒòr±<72>Vn‰WÈŒ;2JÎf` Û}¡I—y<>ÕP%Y¥qEú¯3iô®Kú3ò<33>d+Í4²<34>Úâ^a´JG°6ƒmñÕwMŸ0DâCÐH¸.ŽN0£PBržhkV¸¢Ç\Ñ<0F>/Új¡.¼ˆVK7mû?ëUº8³„¯ ÷€H€°$<24><>Ý°„UAE†UÐAVYÎwæϹöSÝ<53>M>upœ‡‡<IWwuõ[UoWñ<É4ì}c¡`g¢œ¾[ç †Ô¿eh<17>ýþ„)HØ·g×YÉ@&Ù kŠŠ¼CÔÝ÷2¦ Šl<C5A0>sûR4œsçR&hcg¸T´ïÖØ„ÛºT5/„RÑûßßáëùR¢D0ê±C“®ƒ´X­E4׸ýe/×<<3C>ôÑq=y<>h>?ëäÓPû؆Œ^nÅ UPH\$aH·<Ýæ7,ÃBq®—I¢;‰t3-ü LÕ #ˆë¬‡4h"<22>Fá@ã{ú»­94ŠÂé6l&7­©\f£Ý±ŸpœÄµoNÌ #9îÖ<C3AE>]hJÜ~<3<>~ï(¥|ù Çå=­s¥|»"ÒÈ?Ö<>TÈÏñ¶ïô°…ºTà†P¿ïÒ3¾ëîUª¢ßÎ`<60>mxŒ¤•ÔŸW]Ýß7 Ý®eÕ<65>mg93HŽ_,<2C>BÒègÜŸè6rsþ9<C3BE>½z|ª0Ü„!ÿ;w”qƒ™œ”“Ù}ebW¼]<5D>Vü^©©keo²£oùáÔš'óîÙCkêúm·˜Ÿ»³<>Û¾Â(œ¹ÇÅ^
ú
37vë©ê,S "TB 6…Ñ jØôîÕˆÊa#÷†¶ bÖ"¬¾‡Z´´ò§ÓÚZïžk× á&*ÀXòÚ¨D/#ìÊ—™§f¡R\õ+™`<RîãžÆXïVSPv³>¢La>.Tþb™B½ÿn¡òËÛûÿ*Tþb™BØòýB寕)xzÓÒ®ö¢É@îa'¹”ætÈwÎy/ÖØž–^uU¤»Ô…‡[Ϻaac‡§ßÁô§Ô[œSEhZ8PÔ=é±D²ä<C2B2>?ÀY m¶5;¾Ýn-]Bcv™ßlÎVgùÒŸè[w±ÈÚ*ÐÄ­

Z­«¬¥`ê7 jìiÉ0Î}Z½|{(!PÈHžŽu·}™Ô4™5µ¿{ƒû©<C3BB>œò%%=_#ᬵßl®K7=zò±^CB}âƇ7ØÕ|Ö<>~<32>!xÚ]Øìgi(ˆ€ó§;]0S)1,ˆDþM]\š~ÙŸÐú<C390>ø@Ùvàš,öOð¦-,85¬™7/ÎÑBK±wAê(†%`vy÷Kp
aS¿W+Ëž¹<C5BE><XV
RÝ©üöÆà‡}§nAÐ"0v!t€ÐÙÈ#„„èAo<41>{j<>èæCpVRiýuåg%ÁØô|ápÉï!`Xଙ@·•£õ™´<17>ŒÁìÖÉJ(P6¹‡Ž ÃúGžÆ„ƒ8àüÙÔÉà½PúTGPïÿ¡ŠÀ±6@ïö<C3AF>Šà—2â![ÃþÙ1Â_ò½¬äøïC8°ûê1ÐAu g¥S…øuo¸÷r vlv‡Hp¿˜*¾Ë0¡Ð
Î$R)ƒDøCØàT@:„7ä̵ßo¨¦ëom8 ªŒÜÿôèK¹ñŽa<E28098>Aâ“ÜÈ©<C388>\[wéB?@LØ3=K9yeÌ,.¤7…cä½SÙ1&„¾ ŒðQ€$DgŒ}¦Â1ò¡ ±ß„Èï<C388><C3AF>>‡Òˆ±O<C2B1>ñ]Ö¤cìØŒäßÛýrVÓƒTÅFSå7*¤ï²ŽrÜÈ[ñ© Õ<> ö<>|hÿ͈<C38D>Å ÃþqI_cç<>¬­ýã[hH3Ð^©g!»Ÿ°Óâm:Ñ.l ÍÌ#—e}ø|þu]U•rífZŸ¶p<C2B6>ì<EFBFBD>¬£æ×J÷~/ÐOØ]b¡—H5¸Ì[fkúåq Ã×0îO=ÐTü ãµ<éE ÏsóD-<¼,}{E(ìU…£»ø 
ͬ` $ŸF»ªfÂô³»<C2B3><C2BB>>Ö'{R©A±Ïu.ÐS/ólu¾N3Ch9°"`XC¤³#Kr®iŠcKÀ;ÏgO9aOå§)¸äÈI!ÆJU÷Ð :¦C·õh ÂNÁ:<3A>½pZ_Âç•w!#Uü¢À“=®2<C2AE>ìbUÝ2löâþ¾*€ØU'9âAaz6Ša'Ç XêÐ;\Õ¬'mß«>"Y5ýbŸY¨ÝÌ0ÜBFŸ¦N±4~ªa²-Þt`î2€V1Òç…aÊx^úšÅTAy9hû´x©umúÜz [yr×ØÂ8ÉÊ¥þ5J>Í<>7õqç±ëx ò¥˜ñMnó•ñÙ I8UK4;Þ[Éö†ÄÍû§F`? ëàCØe7bT'QÄ£¦€&W<éÅF-$ŽªÞ:":WY<Ö“´xE_<>†²ù6Vˆ
õ³ÑÈö³–`¬<>u<EFBFBD>ùÖÞI¾tU3ì™<C3AC>eËÐÔ;‘û$A¤Aí•5Î2[D3ȹ˜KNzÜ“þ3R¬çæ±Ó†W¢<57>¢VÜÏÑØ×Ñá,øHŽ¶B[s©µà®Å[>¡²ë!±$füð6Í·±dÏ3Òz÷¢7²ÓuwW pZ2zv׊ƒ'Ô${ûÛ(:/UðU7,ܵÊÙ‹:%Ìh2(;Grã#ü~‰a®9åHJ»òjeàØš)IåZ= Ì™›¦î+/Mäç·b*ïƒ)a#Í€©pq6O‰eÏšË!bõËXs‡Ó¹Ìs«mÔ¾bî㼘ÚX `AÛÀZ<C380> ,Ðñ§×z4(·i;í•ÐÃ:ˆ Sf´µa²!Tà7PÖ*RGé1ÚZGùóÔ
Á”ºh9§kÏÓFÕ‡„ÒYÀ<!ðNCzQÀ1”ÂÒþü³—`°Wô®¬<09>õ<18>-5ºm
GØeû?<3F>IhãÛÉwùÕã~1YîÉn¿ÆÔ~nò<]V‡¿&FtÑ~Fã.QŠ¹$U…<15>VGŒÿn³Ýýgè9W
²¾<EFBFBD>ÝìòÓÇÝtµn~¹x¨U«6+yWÂeLîÃä¤Ëö >Lç
ÁD°±Ï Wþ­àQg<51>þf 2 Ñ/ø8‡—úÇ%"WÍÕé"×/k0ŠÊG$Qt)"<1F>Db®£"^©’ÄG”¨
#J”Õˆ|0¢(.9Æ«¢¥ÄHô`@Ud— 3ã²b¬<C2AC>x08YæéÖ`ž*GEs`þ/{«ÌØ3ªÈÇIÆóTzETȲ¸ŒÈî )ÎC©<ãÎ<C3A3>(<1F>‰q皯Ĥ8Uú²Ë¹µ% ¢+Àh<><68>h-ì÷c,º³ºxæßÿœ¬}KKûB/c~¶*esxÖZã^ïJH1ÿõÏ#§ghÍœ¥Á_CJ>ˆ)æþ²Bjxýbcvÿïñ/QüçQ{ùŠéÙ|“Œ‚¾ä<C2BE>”ôL1éꪋ¢{Ôïù3¿ÿy<<3C>0ƒ/¢#`¯ojsMæÔë<[Ö ™‡ÈîzÄÏ£àðØó s“¯sï.º>k<>¼^€ŒIÎüí®|¥ðô³—=‹þ‘=-¥z^ [Yák3ÚW~ÿ#í[kU2H©4쉀ä$kréMTó¢ÙkÞ42ý3Ôv½PaàúØÉÉ­ä0¼0<C2BC>B°ôÂ_î(|ÄéÏã¿<C3A3>êžÎÕvÅ®"×÷óº"æ"*«<Q÷<51>žwŸ¯D®ñ™ß¿#Ž^Ä'¥\@ôMDA?±(+ÑK§mÔI-ó7ÄjßåNjlÚtáñ¢•C¨E×h. ¡Žï[>ÊþûÜQöeˆë·îñY#¢Ò –É]ô°Å)àø ÝÛåÐOËé æê[³­àsRµŒÒ<C592>.Ë$t,· ÿµøŽXÊÀ¹7ºá÷á;‘ק$•m O*§îæ‰ôN'ñùj§BZ¼cØ2›ó†sçW !1| ¹ÆzÄKxáîþÔÆ4ìTŠÕ«w])ÙpvhÖ-cŠÆ‡´P¬‚ü~ô9%ÔñøôðL¹Ý/(bºœ˜äœÇ'£åjœÔ0˜g¿W*¡nàõ©ÛìÿŒ…Ð N<>ˆ*•7B-FRÑÔ­Cê$<œÐsÑ?êç)24BË¥ ‡MO?<3F><>`Q§ŸÁ!”ÂП©÷-b?o!ô l)øÆgŸF(S5B™çòq !xŽ0&E#†¯à<C2AF>ˆ·¶q“þÑlJ…»<C2A5>ƒ5ÌMãB]5¦ôæ@Ö7%Ì1iÌk¶\/ùY£¶…;d3LŒyWUΡ®5¤Ø kù6$µ"ö3SÙÑùöŽ<C3B6>§¼IkíÐWžIñ†„NçG<C3A7>¹vè«B}G2ÿ©½.”Æð˜Àë—ÆJD¦<44>cùŒ(”Sû2Äå~kWªb3þ`b|))v2aU%cštbº­Ïȱdª´Ž‰$jæ ©H¿xÓæ†Ë;â‡ås ª*½²³ö[Âm´×FÉO¤¤éžç¦Èt <79>©4<C2A9>×/£dh­£ŽÓ®ÒyŽB
Íâ½6ôðñqòûº¾Šþ!ÚWÐùª6ù;Rà ôsÁŸ`}*<ÛMµei½+v#³™4¦QdÓ]lJe%÷nG4ºÞÓA:a$™6‡MïŠÝÈlGp eë
ܱÛQÓµ]
ÎfôiÂjF|”Jn·i ™Íˆ¹”;CbµšmÚnF(æ°a#]§35£MÓ2Ñæ0[ͱ¦£¯çÁRrö¢O3f/úÏX¨;ë€C1êÝŒìÄ+°1-äÛŸ®Jf¼…êåÿ“ðí9<C3AD>ty=ºþk§Íu˸acz“Úoyb!3»ÒCBâ> µø­|=`Wg] ÕÂ}²±Ë'y”b×÷«³c„EÙÌgC ]añÿéž•ú®WÓ-Èɸ<C389>dMt…,íð~ ƒ,þÁi<C381>\@Ás AtK¹õR±ø—T£ÿXjÚÀˆJun_¿”š—“Âì<C382>.¶kÈüÂqÞß‘ûm˨«˜ºXŽýí3­¿÷:=ê•3Þi[%þ3¢cIf¢ÓË ¥1å6¤ào6I­ï<C2AD>1ÑŒý<C592><11>/ïŒt[Ä#<23>©‡Íë·‡fƒóžÐÃp|‰Û<ÛA{Þ§±üßö#¹½usÏ.»ööa}æì<C3A6>OøÊj6x <10>6uê<75>¼>ôÊGïuÞŽü`™H¦(PŒzë5>?åE¯=fB¯ßŒî$B æ×?Bºì¯‰d<E280B0>¯oÞ #[éþšrÖ‡Y.å¤N{¢Mq³EÔ+pŸZ™O½aÑ=(kyñ_µäÝyte´7ÎïK<C3AF><4B>v]F5˜yÁ2¯`£ä<C3A4>·ƒ('Ì1íò¸UAÙ®2º+½³9]Њ W
²+w¥±±®fQ6ÁÅ÷Aýð't¿~ <0A>.7²&R°@§D2l„¨¦*þpHÚqçÌ=¶í±,¢®¾ó%Ó¨ófdˆ¶ÂÙ8ûc†ØõdãÈX¹Dç[P<>ˆ™¥Ló˜°‰^KÌ~ã†cÔ@u<>)„vxe@'ÍÞ¨æS¾ó@kç±³ŽÓz  ²Á9Ÿâ9ÁJéæ~Ž×fvwÅ>\ÍnR¬hûžAxÄrbqq1IÁ\Ï~ Ñ.ät- ÆʹÞp®Ž[ƒu¥jϼ¶& ï†"KCŸ
šKÃ8D <>Ç®õó8P%S»7õx[¯xcopõΉ¤¾®)¾ÞèÆ<C3A8>ݪ½)½}b9ÊÝ*'EN@|ÃDÈ-û"KóËøp½Øü+49³Š>ç÷cŽ°~¼A>†v½!PVlº5TÌÀLBe-ˆ´Ë!šÆ]•PT˜kÝÏã@N§a3õšŽ«<C5BD>ïI£DâèŽ;‰ѺuÇDY8ùd"ß:Ù#êVG™ÿ­sÕQš×¬¬•¨ƒ°<C692>°E|e6üAX[ƒ-i|ºÒE«÷©åF8d£\zø O!o„Ô%ý|mœýâÉ«ÍçõËsœêÜ”R<1A>*“¿BRèu#Y½šé¬bAt!å¾´¤¨“ëpP¶Ê×æ£7j¨ˆÏÍ>‰¡—­´ùxÑ?<3F>¬´èØ’<ÓuktjR"´ætBd~êµl¡Ð™5ôp ÉÑøoL[wIÍQ[g9†nšû¨™Œ‰P[¾P 9<>Ó*Ñj±qØq3H lWöšþÆ>»húŒ«Í¯/ ‰Öœ ­¦zœPA2K·6Ë#[Ôy1-eö˜(š¢6
S€ÿ{ºÅ‡O2†BXž%$dõ)7²š¶•6=$5ö B„4vhNVÍ.¤2¥i.C&édgâËèi&b”b2ßõ^Ê<>ˆo©ºv)Ï~}§°Ò>]_ÑH”TÕ$‡MrlÁ2xÒ¹VÕaÁºÐаь³î
ŠÄÖ€]$¹Šµ¨ƒ0Z$$<24>Ã`ëð¡å<û´ÇeœX®äÿ+ä½`ÈŸBWÖ°P—ƒN[åÑt­`AÓ<41>`Ÿ2^“ÄŸXìO æ­Ã$‡ãΟG!R;t H<>C¯í¦óµŒ/ ©ºx1-r*òRŠš“¦ËÆœ%c!·þ<C2B7>!’“+¯àèr+Wæ<57>Ø ß/æz©Ü Fr¶D%"«b=èšwI“¿héÿM³:Ù5iÛ}í¹¡6ý#ç•”òF¤f!g-R'Te|0 KjéNhÊ
ùnÒä´ÓdüyÄEÅVvövÅü#+,aþ}[ü•í Êê5%V¿.Zü¿úuQ@{»úu™wÙì×<C397>öhèD?»z)aòç׃fÃl×<6C>ÿg»jz$ˉà/xÿ¡/-ÁaGþ¶ó¥EBj ¬€j­©zõ ‹ößvÚ~U{*eÔ³<C394>NgFFVɲÑ5<C391>”Ò: Û–J0å¶àLXlÏÖ>ï9m£kCŒ®±gmpÒèš^Õ<>¬Õ®m5mPÕ$k³Y/¤“5ìŒZ˜T Û»¸q5]Èaý?niT <0A>ë' ª.°¤-ªÆ’(T8ƒª¹#èrVCbÕ½^²ú0?ÀÛq>3¢^¶µ!FÔ°õD#j³'Q/ 57`fmxJQ#j¸^ª“=u/̧k%²$ëJ%j†<¸µ=¡Ñ4¶ÌOc4Í€Vç<56>¦Í\4½<34>NÓØÀ—­xî\ÜXºp6pJ"5MïÁ¹¤tC`CÊÓFÝá
u6JêH÷<EFBFBD>Ê™)ï
%éIð‰M_ÔgÔ¿"­|‡”ÆGÄ¢!-+¥RðÁ{2挡¶´>÷ÎÄ@„S<E2809E>/ÜngZ¦ùø"³>pQ•Æ°!¸y!“Ä-[„ªAÊeâe Ñ]ßÊÌÆ·`„ñ4ïD*·5¤zöoÚ!e49Ø^2í´Ë¤4Oò¬„üÂ=œ/ê¬+.w¤bøê׫T»R$Ô?äû@2Ÿn!(YÒ϶
I.¼ï â <>è<EFBFBD> ïñrV°1—&ØYÅ5|ÑÞdöeFÁ<46>ÛC\¨Ø+x·ð¼é½©Í-äE”XmzŒTHMŸ>ÖÒ(-va Þ!Å—ªüú7ä6p:yalã•åSŠuTEûˆ¯Qó¹ÈpbßOäöp ^¬<>IE™H"74U1ÆfuTKlôf·®m/ˆäXEÞ!T¼HÍ|("QOq¾<71>^q*{õ%úë>ª´Èä[}©áñ}V?õ‰ÍfùeOm°<6D>…ÃÓ…5à0ÀtÃÍÔ]ÀÖ·9ð
åqU§<00>¥nDiYzâ«©£HW f×É…†N9_ Õ[ñ»7a±
_*t¾„&,V¡xR.êHÃ=(¾)7Y°£ÓÛWŠÜŽRIvÊk…-Þ!- ÊóLGÛæ„„ÚºÎsš|DDÓº#7"¥)E »¦Œ"¶b†<62>VŸ¦}=Îq„à)šÞ·¦‚Æ`vŠ+& Ú”~QµIA™{™vÕ`óy‰dÙ»N…VÍwæY62öm\ÅV(Úßí¢›ÐÊfOÏpøHß}<0F>½Ôý[…)  nkxb¯<>?fömh­Räö°ËœXqë]ûÞmÈùþ®¢4_ö`Œ<> ¹=ìýѧ…Iê¤fl<66>QDÎ!ÝåÔq¼<>²n¦:O´Ê5…¼p_<k%GoG Þvd%­®º=ø£nþ÷ðÎõ µ¡,ß<44>ï8!Ì (@îëØNòT'ÞyÜ%.àŠEGÖ²}Ýt?)éSUѹËA(BCÝtcÞÀ²¢ûÄÖêä==œØ¢F:˜Š_<C5A0>pƤ¬Bz{æ°Ñ/™åz<02>zÇâò*@Ó\¨[<5B>ê œÄíÈG`¦Ç¬å<ìF<1E>i\q@=ä·ÇWàëP§òªÍ“;I³tBËOõäú„hnvVW^¢ÜBMë è=·@[ïÏ™;Æ8æúxòÈk§^1ÓtX0J($d;„ùÆ0%(¶¯%AIn'[ïÕŠ¿‡rŽæÔ…ý=Ô”aL‡JTKˆÊP S‰Òmç²ÌB!P¶Â¹êÍF¶®OÄç©E½cãa£ü¤<C3BC>X—Õ]¨OLŽêA±ì» ªÎ*Ž Ë3<C38B>ß
(µ-ûk)Î:¾t‡ù<7A>ùÕ¡Š÷,à”EŠzT{YQ¼4Ç`:õ9mõÚØŽË©¦)Ú^ÓtWÇHÅv Ùjª£¨ƒR(Rä0:˜s?i@ÈYÍfz3¸ÇÞA8|ÅÓ[q.õô<C3B5>4¯m•á©;Á°œA…ÒírÌOت©-n
U/¹aîÐmRri
#p*Oàªï«nßà¡|™#É´qÉÆÉ ¯â Iÿä4¥Ò<04>sÎ!¹°hA.ß<>¢Å2â.kF;Å€•I¶~ê¡|»ž­q‡FGÝŽú°—RŒ½ßšªî–{uŒþ¨ZØ^ä¶Ûê«{ âjÔ~9<>‘¨©œÎØ7ÉÙ*É<>þxĘî!ñi!\ §ü
$ƒºÆB_ïQQhàŸ¤7Ô„ižƒO”Ì€€äD¸ÐqÕhPaÁŠß÷±ž¨§£N¡O×RþWuÚêÖ7`ȲÖ;µ6<C2B5>ÑÔ#ˆ éáœ9j“ÖM!•›“]¸q0þÑÃAômW<>¾tißD<¬°K‰­.,¡Òo> ú)¸ê”5¶e£™ÊAj~Î}toì#¥<>gäŒA·Ç4êùX@ÄØœËÔ¹c¸<10>Q}* uȃsáK#u/ºH<C2BA>¿ŒYd¥¿èÎü~Ó_ºµ—¥/<08>ŠÎ€%¢Ð ÂÛž \O¶/ àµìÊi{Ð9§>HJ(”¦wæÄ…Šoä5™õ En„ÕìË ‰!·‡ 1pb<E28098>ª
ÂÂeNÄlk\J‡0¬
ˆà±U/¼w©ýk©¡€Ì^Žˆ£ýPÒgÄÝ<2½Ääȉà$×´Ÿ$€¾ûôJ¤bIà<Y<>üFå) z•„âE'GÈ•N<E280A2>î¬1d×VtÙÀ$G+p”)|è¸l¬@þúrúB{0wH¦´Úö#(èì´»ôñpô±ÁþûaˆÝ ÷<>î7'œWÛp»‡¨¿TÓÆ)¬û²}Øu¶0hrÊSÂ8É1îýx (j÷RgƒŸ¶ÓY;Hv‰é:V*¨œÿpÜ 9ZŸBć=f™t<E284A2>-MG&öÂþÊðQ…Á(¶j<Œn:åM uF$D(ìî+¿ÀˆAZGPÁ-<2D>g(‹ê[:ê¶ 3œðRJ<Îú…ù<E280A6>Ž_׉¯,}ÐÃÏL¹†wž‡àÆ-/'`{‹¯ôŽÒó({¥U»ç´<C3A7>=”!-L„Ÿ”0G4+52"#ØÓÏq9 ±'»-d<*s\ž<>tcöõ`«¡Ž2„
˜;L{¦…!+- Aj¯âÍjOVU»3­‡}Õ,@&—A”ëÜÁìuWCÖ]'b \û 2ü®TrýtütÈÓo~ûô·¿/¿?ž÷Çü<C387>¿üóåõ—·<E28094>~8žŸÿüúùí/¯ÿ¾½}Ÿ¿½þüöôúåË×ï¯ßßþƒž>¼}ûþõãíéÛ¿¾þ<C2BE>–ØçÏÏ?þéÇÿ<00>ÿJ” endstream endobj 16 0 obj [15 0 R] endobj 30 0 obj <</CreationDate(D:20150930015220+02'00')/Creator(Adobe Illustrator CS6 \(Macintosh\))/ModDate(D:20151028185720+01'00')/Producer(Adobe PDF library 10.01)/Title(mu-stitky-fakulty-en)>> endobj xref 0 31 0000000002 65535 f
0000011807 00000 n
0000000000 00000 f
0000011858 00000 n
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000000 00000 f
0000000149 00000 n
0000000016 00000 n
0000000000 00000 f
0000016349 00000 n
0000048797 00000 n
0000012207 00000 n
0000016650 00000 n
0000016537 00000 n
0000015626 00000 n
0000015788 00000 n
0000015836 00000 n
0000016421 00000 n
0000016452 00000 n
0000016724 00000 n
0000016907 00000 n
0000017928 00000 n
0000019974 00000 n
0000033078 00000 n
0000048822 00000 n
trailer <</Size 31/Root 13 0 R/Info 30 0 R/ID[<DA13E496C366472AA153E5607F4EFE2F><0347D8DC6219449F96574B22469CA69D>]>> startxref 49021 %%EOF

View File

@ -0,0 +1,148 @@
%%
%% This is file `beamercolorthemefibeamer-mu-fi.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% fi.dtx
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{fibeamer/theme/mu/%
beamercolorthemefibeamer-mu-fi}[2016/06/16]
\mode<presentation>
\definecolor{fibeamer@black}{HTML}{2B2E34}
\definecolor{fibeamer@white}{HTML}{F3EEE1}
\definecolor{fibeamer@yellow}{HTML}{FFD564}
\definecolor{fibeamer@orange}{HTML}{FF5500}
\colorlet{fibeamer@lightGray}{white!80!fibeamer@black}
\colorlet{fibeamer@gray}{white!35!fibeamer@black}
\colorlet{fibeamer@darkGray}{white!20!fibeamer@black}
\definecolor{fibeamer@blue}{HTML}{3333B3}
\definecolor{fibeamer@lightRed}{HTML}{FF8E6B}
\colorlet{fibeamer@darkRed}{red!80!fibeamer@white}
%% Background gradients
\colorlet{fibeamer@dark@backgroundInner}{fibeamer@black}
\colorlet{fibeamer@dark@backgroundOuter}{fibeamer@black}
\colorlet{fibeamer@light@backgroundInner}{fibeamer@white}
\colorlet{fibeamer@light@backgroundOuter}{fibeamer@white}
\renewenvironment{darkframes}{%
\begingroup
\fibeamer@darktrue
%% Structures
\setbeamercolor*{frametitle}{fg=fibeamer@yellow}
\setbeamercolor*{framesubtitle}{fg=fibeamer@lightGray}
%% Text
\setbeamercolor*{normal text}{fg=white, bg=fibeamer@black}
\setbeamercolor*{structure}{fg=white, bg=fibeamer@black}
\setbeamercolor*{alerted text}{fg=fibeamer@lightRed}
%% Items, footnotes and links
\setbeamercolor*{item}{fg=fibeamer@yellow}
\setbeamercolor*{footnote mark}{fg=fibeamer@yellow}
\hypersetup{urlcolor=fibeamer@yellow}
%% Blocks
\setbeamercolor*{block title}{%
fg=fibeamer@black, bg=fibeamer@yellow}
\setbeamercolor*{block title example}{%
fg=fibeamer@yellow, bg=fibeamer@darkGray}
\setbeamercolor*{block title alerted}{%
fg=fibeamer@black, bg=fibeamer@lightRed}
\setbeamercolor*{block body}{%
fg=fibeamer@white,
bg=fibeamer@darkGray}
\usebeamercolor*{normal text}
% Code listings
\lstset{%
commentstyle=\color{green!30!white},
keywordstyle=\color{blue!30!white},
stringstyle=\color{fibeamer@orange!30!white}}
}{%
\endgroup}
%% Structures
\setbeamercolor{frametitle}{fg=fibeamer@blue}
\setbeamercolor{framesubtitle}{fg=fibeamer@gray}
%% Text
\setbeamercolor{normal text}{fg=fibeamer@black, bg=fibeamer@white}
\setbeamercolor{structure}{fg=fibeamer@black, bg=fibeamer@white}
\setbeamercolor{alerted text}{fg=red}
\addtobeamertemplate{block begin}{%
\iffibeamer@dark\else % alerted text in plain blocks at light slides
\setbeamercolor{alerted text}{fg=fibeamer@darkRed}
\fi}{}
%% Items and links
\setbeamercolor{item}{fg=fibeamer@blue}
\setbeamercolor{footnote mark}{fg=fibeamer@blue}
\hypersetup{urlcolor=fibeamer@blue}
%% Blocks
\setbeamercolor{block title}{%
fg=fibeamer@black, bg=fibeamer@yellow}
\setbeamercolor{block title example}{%
fg=fibeamer@yellow, bg=fibeamer@black}
\setbeamercolor{block title alerted}{%
fg=fibeamer@white, bg=red}
\setbeamercolor{block body}{%
fg=fibeamer@white, bg=fibeamer@black}
%% Title
\setbeamercolor{title}{fg=fibeamer@yellow, bg=fibeamer@black}
\setbeamercolor{subtitle}{fg=fibeamer@white, bg=fibeamer@black}
\setbeamercolor{author}{fg=fibeamer@lightGray, bg=fibeamer@black}
% Code listings
\lstset{%
basicstyle=\footnotesize\ttfamily,
breakatwhitespace=false,
breaklines=true,
commentstyle=\color{green!60!black},
extendedchars=true,
keywordstyle=\color{fibeamer@blue},
showspaces=false,
showstringspaces=false,
showtabs=false,
stringstyle=\color{violet}}
\mode
<all>
\endinput
%%
%% End of file `beamercolorthemefibeamer-mu-fi.sty'.

View File

@ -0,0 +1,91 @@
%%
%% This is file `beamercolorthemefibeamer-mu.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% base.dtx (with options: `color')
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{fibeamer/theme/mu/%
beamercolorthemefibeamer-mu}[2016/05/06]
\newenvironment{darkframes}{}{}
\mode<presentation>
\RequirePackage{listings}
\RequirePackage{ifthen}
\RequirePackage{tikz}
\newif\iffibeamer@dark\fibeamer@darkfalse
\defbeamertemplate*{background canvas}{fibeamer}{%
\ifthenelse{%
\boolean{fibeamer@dark} \OR \c@framenumber=0
}{%
\begin{tikzpicture}
\clip (0,\fibeamer@lengths@clipbottom) rectangle
(\paperwidth,\fibeamer@lengths@cliptop);
\path [inner color = fibeamer@dark@backgroundInner,
outer color = fibeamer@dark@backgroundOuter]
(0,0) rectangle (\paperwidth,\paperwidth);
\end{tikzpicture}
}{%
\begin{tikzpicture}
\clip (0,\fibeamer@lengths@clipbottom) rectangle
(\paperwidth,\fibeamer@lengths@cliptop);
\path [inner color = fibeamer@light@backgroundInner,
outer color = fibeamer@light@backgroundOuter]
(0,0) rectangle (\paperwidth,\paperwidth);
\end{tikzpicture}
}}
\setbeamercolor{qed symbol}{%
use=block body,
fg=block body.fg,
bg=block body.bg}
\hypersetup{colorlinks,linkcolor=}
\mode
<all>
\endinput
%%
%% End of file `beamercolorthemefibeamer-mu.sty'.

View File

@ -0,0 +1,68 @@
%%
%% This is file `beamerfontthemefibeamer-mu.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% base.dtx (with options: `font')
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{fibeamer/theme/mu/%
beamerfontthemefibeamer-mu}[2016/01/12]
\mode<presentation>
\setbeamerfont{normal text}{size=\normalsize}
\setbeamerfont{title}{size=\LARGE, series=\bfseries}
\setbeamerfont{subtitle}{parent=normal text, size=\Large}
\setbeamerfont{frametitle}{size=\Large}
\setbeamerfont{framesubtitle}{size=\large, shape=\itshape}
\setbeamerfont{description item}{series=\bfseries}
\setbeamerfont{author}{size=\large}
\mode
<all>
\endinput
%%
%% End of file `beamerfontthemefibeamer-mu.sty'.

View File

@ -0,0 +1,89 @@
%%
%% This is file `beamerinnerthemefibeamer-mu.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% base.dtx (with options: `inner')
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{fibeamer/theme/mu/%
beamerinnerthemefibeamer-mu}[2016/01/14]
\mode<presentation>
\defbeamertemplate*{itemize item}{fibeamer}{$\bullet$}
\defbeamertemplate*{itemize subitem}{fibeamer}{\---}
\defbeamertemplate*{itemize subsubitem}{fibeamer}{\guillemotright}
\defbeamertemplate*{bibliography item}{fibeamer}{\insertbiblabel}
\AtBeginDocument{%
\let\fibeamer@oldcite\cite
\def\cite#1{{%
\usebeamercolor[fg]{item}%
\fibeamer@oldcite{#1}}}}
\defbeamertemplate*{section in toc}{fibeamer}{%
\usebeamercolor[fg]{item}%
\inserttocsectionnumber.%
\usebeamercolor[fg]{structure}%
\kern1.25ex\inserttocsection\par}
\defbeamertemplate*{subsection in toc}{fibeamer}{%
\hspace\leftmargini
\usebeamercolor[fg]{item}%
\inserttocsectionnumber.\inserttocsubsectionnumber%
\usebeamercolor[fg]{structure}%
\kern1.25ex\inserttocsubsection\par}
\defbeamertemplate*{subsubsection in toc}{fibeamer}{%
\hspace\leftmargini
\hspace\leftmarginii
\usebeamercolor[fg]{item}%
\inserttocsectionnumber.\inserttocsubsectionnumber.%
\inserttocsubsubsectionnumber%
\usebeamercolor[fg]{structure}%
\kern1.25ex\inserttocsubsubsection\par}
\mode
<all>
\endinput
%%
%% End of file `beamerinnerthemefibeamer-mu.sty'.

View File

@ -0,0 +1,182 @@
%%
%% This is file `beamerouterthemefibeamer-mu.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% base.dtx (with options: `outer')
%%
%% Copyright 2015 Vít Novotný <witiko@mail.muni.cz>
%% Faculty of Informatics, Masaryk University (Brno, Czech Republic)
%%
%% This work is based on the (Unofficial) University of Manchester
%% Beamer Theme by Andrew Mundy <andrew.mundy@cs.man.ac.uk>.
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License, either version
%% 1.3 of this license or (at your option) any later version.
%% The latest version of this license is available at
%%
%% http://www.latex-project.org/lppl.txt
%%
%% and version 1.3 or later is part of all distributions of LaTeX
%% version 2005/12/01 or later.
%%
%% This work has the LPPL maintenance status `maintained'.
%%
%% The Current Maintainer of this work is Vít Novotný (VN).
%% Send bug reports, requests for additions and questions
%% either to the fithesis discussion forum at
%%
%% http://is.muni.cz/auth/df/fithesis-sazba/
%%
%% or to the e-mail address <witiko@mail.muni.cz>.
%%
%%
%% MODIFICATION ADVICE:
%%
%% If you want to customize this file, it is best to make a copy of
%% the source file(s) from which it was produced. Use a different
%% name for your copy(ies) and modify the copy(ies); this will ensure
%% that your modifications do not get overwritten when you install a
%% new release of the standard system. You should also ensure that
%% your modified source file does not generate any modified file with
%% the same name as a standard file.
%%
%% You will also need to produce your own, suitably named, .ins file to
%% control the generation of files from your source file; this file
%% should contain your own preambles for the files it generates, not
%% those in the standard .ins files.
%%
%% The names of the source files used are shown above.
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{fibeamer/theme/mu/%
beamerouterthemefibeamer-mu}[2016/01/12]
\mode<presentation>
\RequirePackage{ifthen}
\RequirePackage{ifpdf}
\ifpdf\else
\@ifundefined{pdfpagewidth}{\newdimen\pdfpagewidth}{}
\@ifundefined{pdfpageheight}{\newdimen\pdfpageheight}{}
\pdfpagewidth=\paperwidth
\pdfpageheight=\paperheight
\fi
\RequirePackage{tikz}
\RequirePackage{pgfcore}
\newlength\fibeamer@lengths@baseunit
\fibeamer@lengths@baseunit=3.75mm
% The footer padding
\newlength\fibeamer@lengths@footerpad
\setlength\fibeamer@lengths@footerpad{%
\fibeamer@lengths@baseunit}
% The side margins
\newlength\fibeamer@lengths@margin
\setlength\fibeamer@lengths@margin{%
3\fibeamer@lengths@baseunit}
\setbeamersize{
text margin left=\fibeamer@lengths@margin,
text margin right=\fibeamer@lengths@margin}
% The upper margin
\newlength\fibeamer@lengths@titleline
\setlength\fibeamer@lengths@titleline{%
3\fibeamer@lengths@baseunit}
% The background clipping
\newlength\fibeamer@lengths@clipbottom
\setlength\fibeamer@lengths@clipbottom\paperwidth
\addtolength\fibeamer@lengths@clipbottom{-\paperheight}
\setlength\fibeamer@lengths@clipbottom{%
0.5\fibeamer@lengths@clipbottom}
\newlength\fibeamer@lengths@cliptop
\setlength\fibeamer@lengths@cliptop\paperwidth
\addtolength\fibeamer@lengths@cliptop{%
-\fibeamer@lengths@clipbottom}
% The logo size
\newlength\fibeamer@lengths@logowidth
\setlength\fibeamer@lengths@logowidth{%
14\fibeamer@lengths@baseunit}
\newlength\fibeamer@lengths@logoheight
\setlength\fibeamer@lengths@logoheight{%
0.4\fibeamer@lengths@logowidth}
\defbeamertemplate*{navigation symbols}{fibeamer}{}
\defbeamertemplate*{headline}{fibeamer}{}
\defbeamertemplate*{frametitle}{fibeamer}{%
\vskip-1em % Align the text with the top border
\vskip\fibeamer@lengths@titleline
\usebeamercolor[fg]{frametitle}%
\usebeamerfont{frametitle}%
\insertframetitle\par%
\usebeamercolor[fg]{framesubtitle}%
\usebeamerfont{framesubtitle}%
\insertframesubtitle}
\defbeamertemplate*{footline}{fibeamer}{%
\ifnum\c@framenumber=0\else%
\begin{tikzpicture}[overlay]
\node[anchor=south east,
yshift=\fibeamer@lengths@footerpad,
xshift=-\fibeamer@lengths@footerpad] at
(current page.south east) {
\usebeamercolor[fg]{framenumber}%
\usebeamerfont{framenumber}%
\insertframenumber/\inserttotalframenumber};
\end{tikzpicture}
\fi}
\defbeamertemplate*{title page}{fibeamer}{%
% This is slide 0
\setcounter{framenumber}{0}
% Input the university logo
\begin{tikzpicture}[
remember picture,
overlay,
xshift=0.5\fibeamer@lengths@logowidth,
yshift=0.5\fibeamer@lengths@logoheight
]
\node at (0,0) {
\fibeamer@includeLogo[
width=\fibeamer@lengths@logowidth,
height=\fibeamer@lengths@logoheight
]};
\end{tikzpicture}
% Input the title
\usebeamerfont{title}%
\usebeamercolor[fg]{title}%
\begin{minipage}[b][2\baselineskip][b]{\textwidth}%
\raggedright\inserttitle
\end{minipage}
\vskip-.5\baselineskip
% Input the dashed line
\begin{pgfpicture}
\pgfsetlinewidth{2pt}
\pgfsetroundcap
\pgfsetdash{{0pt}{4pt}}{0cm}
\pgfpathmoveto{\pgfpoint{0mm}{0mm}}
\pgfpathlineto{\pgfpoint{\textwidth}{0mm}}
\pgfusepath{stroke}
\end{pgfpicture}
\vfill
% Input the subtitle
\usebeamerfont{subtitle}%
\usebeamercolor[fg]{subtitle}%
\begin{minipage}{\textwidth}
\raggedright%
\insertsubtitle%
\end{minipage}\vskip.25\baselineskip
% Input the author's name
\usebeamerfont{author}%
\usebeamercolor[fg]{author}%
\begin{minipage}{\textwidth}
\raggedright%
\insertauthor%
\end{minipage}}
\mode
<all>
\endinput
%%
%% End of file `beamerouterthemefibeamer-mu.sty'.

1
presentation/latexmkrc Normal file
View File

@ -0,0 +1 @@
$ENV{'TZ'}='Europe/Prague';

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 72 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 40 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.4 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 56 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 99 KiB

Binary file not shown.

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.0 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 28 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 90 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 20 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 27 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 66 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 43 KiB

1
print.sh Normal file
View File

@ -0,0 +1 @@
gs -o- -sDEVICE=inkcov Thesis-print.pdf | grep -v "^ 0.00000 0.00000 0.00000" | grep "^ " | wc -l

1
replace_pages.sh Normal file
View File

@ -0,0 +1 @@
qpdf --empty --pages Thesis.pdf 1 is_tisk.pdf 1 Prohlaseni_autora_skolniho_dila_v3.pdf 1 Thesis.pdf 3-z -- Thesis-print.pdf