The Specification of Software System of Carry-on:

System Analysis and Design

 

1. System Overview

Refer to Shu Lea's proposal in Appendix A

 

2. The Software Architecture

This system is desired to run on internet in a distributed manner. It could be carried out by clients/server architecture. It consists of three or two clients. One is responsible for uploading or specifying the contents of the suitcase to the server. The other is for inspecting the contents of the suitcase. The server responses to requests such as uploading or inspection of the contents of the suitcase. It stores the uploaded data from uploading client into its database, retrieves the database and transfers requested data to the inspection or uploading client, and some other necessary operations for keeping the data consistency between the uploading, inspection client and server. Observer could be considered as a special Inspectionclient.

 

3. The Processing Pipeline

 

3.1 Uploadingpipeline

 

This pipeline could be divided into three (or two) components. One is for providing tools to allow the user conveniently specify the data items in the suitcase image (the contents of the suitcase). Its input, output and logical processing are as follows:

Function : Specification of the data items in suitcase

Input: The image of suitcase from the database of the server

Output: A description of specification of data items in the suitcase

Logical Processing: 1)login the database in the server, ask for the readpermission of server's database, and receive the suitcase image, ID etc from the server and logout; 2) display the suitcase image in the canvas of window, specify (or mark) the data items using rectangles , input the URL description for each specified data item(some editing tools might also be needed); 3) save them in a temporary buffer or disk file .

 

The second is for initialisation of the suitcase data in the database of server(this one can be carried out as a special case of the third one)

Function : Initialisation of suitcase data on the server

Input: The suitcase image , suitcase ID etc for initialisation

Output: Success or failure

Logical Processing: 1)login the database in the server, ask for the writepermission of servers database 2) If success, transfer the suitcase image, ID etc to the server; 3) return success or failure.

 

The third is for transferring the description specified data items, and store in the database of the server.

Function : Transferring the description of specified data items

Input: The temporary buffer or the disk file that includes the description

Output: Success or failure

Logical Processing : 1)login the database in the server, ask for the writepermission of servers database 2) If success, transfer the data in the temporary buffer to the server; 3) return success or failure.

 

3.2 Inspectionpipeline:

 

The following pipeline is a general one. We can need to discuss how to get a reasonable simplification of this pipeline.

It also can be divided into three components. The first one is for browsing all the suitcase images in the database of the server.

Function : Browsing all suitcases in the database

Input: Inspectors account, and password

Output: All the suitcase images of from the server

Logical Processing: 1)login the database in the server, ask for the readpermission of servers database; 2) Allocate a suitable buffer to receive all the suitcase images, ID etc from the database( or page by page); 2) display all the suitcase images in the buffer to inspector; 3) Scroll them frame by frame .

 

The second one is for checking the contents of suitcase. It is fired by mouse click on the suitcase image.

Function : Inspecting the data items in the suitcase

Input: The suitcase image, ID and file name

Output: A randomly packaged data items contained in the suitcase and a window of URLs

Logical Processing: 1)Ask the server transfer all thenecessary information to the client, and receive and save them in a temporary buffer; 2) When the inspector click on the rectangle region of a specific data item in this suitcase image, generate a new position for this data item, and copy pixels in the rectangles to the new position, and its URL description will appear in the specified text field of interface window; 2) Save the modified positions in the temporary buffer, store the URL description of clicked data items into a disk file and display them in a separate window.

 

The third one is for transferring the modified positions of data items back to the database of the server.

Function : Transferring the modified positions of data items back to the server.

Input: The temporary buffer or the disk file which have the description of modified positions

Output: Success or failure

Logical Processing: 1)login the database in the server, ask for the writepermission of servers database 2) If success, transfer the modified positions to the server; 3) return success or failure.

 

Annotation: Shu Lea requires that the separate URL window will still be visible after the InspectionClient exited.

 

4. The Data-steam, Data Items.

 

4.1. The Data steam and Data Items for Uploading

 

The uploading login data stream=Account + Suitcase ID + Password + {Control Status for synchronization}

The description of Suitcase = Suitcase ID + Suitcase Image+ ID Image +Annotation

The Contained Items= Suitcase ID + DataItem ID + Initial position+ Current Position+ URL Description+ {Control Status for synchronization}

 

Account= strings of digitals and letters, and its length is less than MAXIMUM_CONSTANT_STRING;

Suitcase ID= Unsigned Integer less than MAXIMUM_PARTICIPANT

Password= strings of digitals and letters, and its length is less than MAXIMUM_CONSTANT_STRING;

Control Status=Read Permission + Write Permission;

Read Permission= True | False;

Write Permission= True | False;

 

Suitcase Image= Filename + Image Format

ID Image=Filename + Image format

Filename= strings of digitals and letters, and its length is less than MAXIMUM_CONSTANT_STRING;

Image Format = JPEG | BMP // At present, only JPEG are required by Shu Lea.

 

Annotation = text description if necessary

 

DataItem ID= Unsigned Integer less than MAXIMUM_ID_NUMBER

Initial Position= Rectangle

Current Position=Rectangle

Rectangle=(2D pixel-based coordinates of starting vertex, 2D pixel based coordinates of ending vertex)

2D Pixel-based coordinates= (x, y) in pixels, and its origin of the coordinate system is located on the top-left of suitcase image.

 

URL Description= string abiding by the URL convention

 

4.2. The Data steam and Data Items for inspection

 

The Inspecting login data stream=Account + Password + {Control Status for

synchronization}

The description of Suitcase = Suitcase ID + Suitcase Image+ ID Image

The Clicked Items= The Contained Items

 

 

4.3. The Database and Data Items on the server

 

The Inspecting login data stream=Account + Password + {Control Status for synchronization}

The uploading login data stream=Account + Suitcase ID + Password + {Control Status for synchronization}

 

The description of Suitcase = Suitcase ID + Suitcase Image+ ID Image +Annotation

The Contained Items= Suitcase ID + DataItem ID + Initial position+ Current Position+ URL Description+ {Control Status for synchronization}

Security Permission = Read Permission | Write Permission

Synchronization Variables = Suitcase ID | DataItem ID

 

And some other necessary data items for keeping the consistency of the database.

5. The Control Stream

 

5.1 The Control Stream for Uploading

The uploading could be divided into two separate operations. The first is responsible for the initialization of suitcase image, suitcase ID and the ID image etc. Another copes with the specifications of the items contained in a specific suitcase.

 

 

 

5.2 The Control Stream for Inspection

It is assumed that Uploadingare forbidden during Inspection. It is also assumed that a local version of suitcases image could be kept in the clients, as it would reduce the data transfer significantly.

 

 

 

 

 

5.3 The Data Management on Server

The data management in server responses to the uploading requests, and stores the uploaded data in the database. It copes with the download all imagesrequests from the inspectionand observer, and it is better to keep a distributed object list to inform Observerclients that which item has been checked and transfer their current positions to Observerclient.

The key implementation issues in servers data management are to keep data consistency and synchronize the data access.

 

6. Key Algorithms

 

6.1 Display_Suitcase

For each suitcase, execute the following steps recursively,

1) Read the source suitcase image into video buffer;

2) Display the backgroundsuitcase image in which all items are removed by their initial positions,

3) For each item, copy the pixels of rectangle indicated by the initial positionfrom the source image and paste them to the current positionin display canvas.

 

Annotations: 1) It is assumed that if the suitcase item has not been checked, then its current positionequals to initial position; 2) the overlay order need Shu Leas further confirmation when the items occupy the same position. In the aforementioned algorithm, the overlay order is ignored.

 

6.2 Inspect_Suitcase

If a mouse click in a suitcase region, freeze the display, and waiting for further clicking in items region. Then for each click event occurs in items region, execute the following steps recursively,

1) fetch the current position of this item, and calculate a new random position for this item, and refresh the display of this item;

2) write the URL related to this item to the text field in a random colour, size and font;

3 ) save this URL in another separate window

4) inform the server that this item has been checked, and write its new position back into servers database.

 

6.3 Specify_Items_in_Suitcase

 

For a specific suitcase image,

1) input the item Id and URL description, and check the data format etc.

2) mark the items region in the suitcase image by rectangles.

3) set specified rectangle as both items initial positionand current position

4) transfer all items specification to server, and write them into the database.

 

 

7. Object (Stream) Analysis and Specification

 

7.1 Suitcase Object and Item Object

 

DEFINE MAXIMUM_NUMBER_OF_SUITCASE 50

DEFINE MAXIMUM_ITEMS 10

 

 

Public class Suitcase extends Applet{

int SuitcasID;

Image SuitcaseSourceImage; // getImage(URL of server or clients SuitcaseSourceImage, SuitcasID.JPEG)

Image IDImage; // getImage(URL of server or client s IDImage, SuitcasID.JPEG);

SuitcaseItem itemArray[MAXIMUM_ITEMS] // Object list of Suitcase Items

 

Public void Dispay_Suitcase();

Public void Inspect_Suitcase();

Public void Specify_Items_In_Suitcase();

 

Protected Boolean AddItems(SuitcaseItem Item);

Protected Boolean DeleteItems(SuitcaseItem Item);

Protected Boolean ReplaceItems(SuitcaseItem OldItem, SuitcaseItem NewItem);

 

Suitcase(int suitcaseID, Image SuitcaseSourceImage , Image IDImage);

}

 

Public class SuitcaseItem extends Applet{

int ItemID;

Rectangle InitialPosition; // Rectangles are represented as [(x_Sart, y_Start), (x_End, y_End)]

Rectangle CurrentPosition;

 

Public SuitcaseItem(Int ItemID, Rectangle InitialPosition); // Initialize the Item

Protected PositionModification(Rectangle CurrentPosition); // change its current position

}

 

7.2 Database on the Server

 

If the maximum number of suitcase is restricted to as 50, there are two main approaches to carry out the data management of suitcase.

 

7.2.1 Stardard I/O Stream /File

 

The file head is number of inspector,

s The file body is organized as follows:

 

Inspector1

Account1

Passwaord1

Inspector2

Account2

Passwaord

..

..

 

The file head is number of uploading persons ,

The file body is organized as follows:

 

uploading person1

Account1

Passwaord1

uploading personr2

Account2

Passwaord

..

.

 

The file head is number of suitcases ,

The file body is organized as follows:

 

Suitcase ID1, Number of Items, Suitcase Image file name, ID Image file name

Item1, InitialPositin, CurrentPosition, URL1

Item2, InitialPositin, CurrentPosition, URL2

..

ItemN, InitialPositin, CurrentPosition URLN

Suitcase ID2, Number of Items, Suitcase Image file name, ID Image file name

Item1, InitialPositin, CurrentPosition, URL1

Item2, InitialPositin, CurrentPosition, URL2

..

Item M, InitialPositin, CurrentPosition, URL M

 

7.2.2 Database Tables

The tables for inspectionand uploadingare the same as file bodies of inspection and uploading profile. The Suitcase data could be split into two tables.

 

        Table1

Suitcase ID1

Suitcase Image file name 1

ID Image file name 1

Suitcase ID2

Suitcase Image file name 2

ID Image file name 2

..

..

 

        Table2

Suitcase ID

Item ID

InitialPosition

CurrentPosition

URL description

..

.

.

 

 

7.2.3 Serialization of Suitcase Object

It could also be carried out as serialization of Suitcase Object.

 

8 The Communication Interface of Clients/Server, Hardware/Software

 

The data transfer between Uploadingclient and server is usually based on TCP/IP socket.

The data transfer between Inspectionclient and server is usually based on TCP/IP socket, and the RMI could be used if a distributed list of checked items is maintained in server.

 

 

The interface between Hardware(scanning machine) and Software is the JPEG image of the suitcase from the scanning machine

 

9. The User Interface

 

Refer to Shu Leas system web page1 and web page2.

 

10 Hardware/Software Platform

Hardware: X-ray scanning machine

Software: Java Applet and Netscape

 

11 Annotations

 

1) It is a time-critical task. Shu Lea desire that this system can run at the end of July. A general implementation is difficult to achieve this in six weeks. We should find some reasonable simplification approaches for its implementation.

 

2) The complexity of its implementation is mainly dependent on the control stream. It is still open, and difficult to write something about it now. Such as the multiple inspections or the uploading or inspection happens at the same time.

 

3) Summary of last discussion (June 15, Monika, Wolfgang, Shu Lea): a) Shu Lea said that it is acceptable that only one Inspection client is allowed to run on internet at the same time. Then synchronization of data access will be simplified; 2) Shu Lea said we can also assume a MAXIMUM number of suitcases such as 50 (we need to confirm this with Shu Lea today), then we can carry out the database managementfunctions by a standard I/O stream(or files), not by a real database system; 3) In order to reduce the data transfer congestion of images between Inspectionclient and Server, it is better to let the inspectionclient keep a local version of servers database. To maintain the consistency, the system can forbid uploadingduring inspectionor refresh the local version by timer. 4) Shu Lea requires that the inspectionresult could be observed by the other user. Does it have meanings if only one inspectionclient is permitted on the internet?


Appendix A Shu Leas Carry-on Proposal

 

Project Proposal for Internationale FrauenuniversitSt IFU, Hanover

 

CARRY ON

a participatory workshop/installation/net project for IFU's summer 2000 program

 

CARRY ON is an art project designed to work with students of IFU's summer 2000 program in the area of migration and information.

 

A Carry On suitcase for a translocated is compact packaging of self-cherished possesion and memory -- from passport to family photo, from trashy novel to address book, from cultural icon to daily necessities. For a self designated journey (individual mobility) or involuntarily transportation (collective migration) , we hold tight our Carry On. The Carry On is managed/manageable information of self continuity and connectivity. We go through security check with our Carry On. Items contained are Xrayed and subsequently hand searched and close examined should suspicion arise. Suggested by

"an increasing de-territorialization and displacement through collective migrations and increasing individual mobility. " (Migration.html, IFU), I propose we 'PACKAGE' our survial Carry On.

 

This Carry On is deposited, patrolled and can be retrieved and reprocessed on the Net. This Carry On package is to be patrolled by net public.

 

The projects calls for each participating student to package a suitcase, which should not exceed total dimensions of 9"x13"x23" (a common airline practice for hand carry luggage). The packaged suitcases are required to go through security scanning machine patrol and be shown X ray negative on the scanning monitor. This scanned carry on images will be fed directly onto the Net - a designated website for Carry ON project. The net public can examine the scanned suitcases on the net as each suitcase travels through the conveyer belt of the scanning machine. The net public can 'inspect' the negative image of the suitcase content and 'STOP' a suitcase for further item by item hand check should any suspicion arise on their part. By 'stopping' a suitcase, a link to the suitcase's contents and infodata (provided also by participating students) is established. The Net public, acting as inspectors and acting on their own judgement, can retrieve selective information. A decision can be made by a netuser/inspector to STOP the suitcase from further distribution if it does contain dangerous objects.

 

The project is mainly net-based. Java Applet programming is requiredfor infodata management. The hardware technical end of scanning machine monitor to internet image feed is yet to be developed.

 

CARRY ON project conceived for IFU by Shu Lea Cheang shulea@earthlink.net

Shu Lea Cheang is a media/net/film artist. Her cybernetic installation works include commissions by Walker Art Center (Minneapolis, US), Atopic Site (Tokyo government, Japan), NTT/InterCommunication Center (Tokyo, Japan), the Guggenheim Museum (New York, US). Her work has received fundings from the Rockerfellor Foundation, AT&T New Art/New Vision, NTT/Nippon Telephone & Telegraph, The Mondriaan Foundation, The Bohen Foundation and te Dutch Ministry of Culture among others.

 

 

 CJOJQJ.`__ [0]3[0]d[0]-[0][0][0]_y_ # F k t _ 6_____________________________ .`__ [0]3[0]d[0]-[0][0][0]_y_ # F k t _ 6X& X p _  I i _  " * / G R k _ 3/4  - L f } _ # B Y x '   ( @ ^ q ' _ _ /H^q______________________________________________________________________________________________________1d6X& X p _  I i _  " * / G R k _ _____________________________ _ 3/4  - L f } _ # B Y x '   ( @ ^ q ' _ _____________________________ _ _ /H^q__ 1Ot'9L`s(c)_____________________________  1Ot'9L`s(c)1/4_*?b{"Pfs...__K[}"(r) 4(c)_ #?UYbjk-_(r)9pq_ jk1/23BC_']C_ _l__[0] O " %-o-}-____________________________________________________________________________________________________1d(c)1/4_*?b{"Pfs...__K[}"(r) 4_____________________________ 4(c)_ #?UYbjk-_(r)9pq_ jk1/2_____________________________ 3BC_']C_ _l__[0] O " %-o-}---_-_____________________________ }---_-- Nw' : I _ !#!K!Z!-!!!5"d"t""""",#^#_##_#$R$_$%1%U%%% Y '('c'_'''((m(([0])S)_)'))%*t**++R+++,,-,m,_, -g-- --1.v.._.K///000_0_0#1$1{11(2)2i21/22____________________________________________________________________________________________________1d_-- Nw' : I _ !#!K!Z!-!!!5"d"t""""",#_____________________________ ,#^#_##_#$R$_$%1%U%%% Y '('c'_'''((m(([0])S)_____________________________ S)_)'))%*t**++R+++,,-,m,_, -g-- --1.v.._.K///000_____________________________ 0_0_0#1$1{11(2)2i21/2213_33334u444_405"5566Q66607_____________________________ 1/2213_33334u444_405"5566Q66607q778 88_8839n9o99:H:-::-;;_;; op=`=_='=="h9?_?_?@@n@@[0]A%AAABQB_BBB9CxC CCC[0]D@D_D_DD*E+EEE"F#FcFF1GOG_GGGAHH_HHII-I_IIJ____________________________________________________________________________________________________1d07q778 88_8839n9o99:H:-::-;;_;; op=`=_='=="_____________________________ "h9?_?_?@@n@@[0]A%AAABQB_BBB9CxC CCC[0]D@D_D_D_____________________________ _DD*E+EEE"F#FcFF1GOG_GGGAHH_HHII-I_IIJpJJ_JEK"KK_____________________________ JpJJ_JEK"KKBLCLLL MoMM(c)MM=N_NN'OgOO PWPXPPPHQQQQRnR1/4RSWSSS8T...TT'U~UUU-VlV_VVV;WWWXgXhXX YWYYYY ZoZ1/4ZZZ-[~[[ \M\\_\\,]-]z]]]]-^.^^^^ _ _`___ ``T````;aya____________________________________________________________________________________________________1dKBLCLLL MoMM(c)MM=N_NN'OgOO PWPXPPPHQQQQRnR1/4RS_____________________________ SWSSS8T...TT'U~UUU-VlV_VVV;WWWXgXhXX YWYYYY Z_____________________________ ZoZ1/4ZZZ-[~[[ \M\\_\\,]-]z]]]]-^.^^^^ _ _`___ `_____________________________ ``T````;ayazaab]b^bbbcTcUccccdAdBd"ddddee_____________________________ yazaab]b^bbbcTcUccccdAdBd"ddddeeaebeeee f f[f_f_ff4gAgBgg(c)ggh[0]hkhlhhh_h#i$ioipii jjWjj1/4j1/2j k kZkqkrkkk-liljl_llmLmMm_m_mm"nTnUnnnn"o#opoqooopfpgp_ppp8qqqqq:rr____________________________________________________________________________________________________1deaebeeee f f[f_f_ff4gAgBgg(c)ggh[0]hkhlhhh_h#i$ioipii_____________________________ i jjWjj1/4j1/2j k kZkqkrkkk-liljl_llmLmMm_m_mm"nTnUnnn_____________________________ nn"o#opoqooopfpgp_ppp8qqqqq:rrrr s\ss(c)sss/t_____________________________ rrr s\ss(c)sss/tQtRtttt,u-u}u(r)uuuu@vmvnvv1/4vwJwKw'ww.xxxxxxIyqywyxyyy#z2znzzz {<{L{c{d{_{{| | |W|X|||}}L}f}}}~*~A~B~_~_~~ _)*wx_ _ _ _[_\____ Rl 0____________________________________________________________________________________________________1d/tQtRtttt,u-u}u(r)uuuu@vmvnvv1/4vwJwKw'ww.xxxxxxIy_____________________________ Iyqywyxyyy#z2znzzz {{L{c{d{_{{| | |W|X|||}}L}f}}_____________________________ }}~*~A~B~_~_~~ _)*wx_ _ _ _[_\____ Rl_____________________________ l 0GHݟԟ՟[ab...1...Y...h......3/4......Cr(tm)______________________________ 0GHݟԟ՟[ab...1...Y...h......3/4......Cr(tm)_;tu_?Ֆ Y_”_6_7__...___NO{(r)_X_Y___=__3/4_ _R___ _ _[_____''''d'_''_'="""_""I"_""[0]O_+-h-____________________________________________________________________________________________________1d;tu_?Ֆ Y_”_6_7__...___NO_____________________________ {(r)_X_Y___=__3/4_ _R___ _ _[_____''''d'_''_____________________________ '_'="""_""I"_""[0]O_+-h-_-_-- -~--[0]X6(tm)_____________________________ h-_-_-- -~--[0]X6(tm)7(tm)_(tm)1/4(tm)_(tm)(tm)I____TYZ-_.____9_:____ s_(r)B :eyzǡȡVyzĢ-u HIΤOP _)_J_K______Ptu_?@____________________________________________________________________________________________________1d6(tm)7(tm)_(tm)1/4(tm)_(tm)(tm)I____TYZ-_.____9_:_________________________________ s_(r)B :eyzǡȡVyzĢ-u _____________________________ HIΤOP _)_J_K______Ptu_?_____________________________ ?@ШP(c)Q(c)(c)(c)(c)(c)89...Ҫ_=_6NO...٬ڬ_____________________________ @ШP(c)Q(c)(c)(c)(c)(c)89...Ҫ_=_6NO...٬ڬ _ _Z_[___1(r)/(r)0(r)(r)(r)^(r)ϯ_ -s_1(_(r)___V_x_y____p_-____ /7...1 X__ߵ:" [ѷH- _0_8_?_E_"_____________________________________________________________________________________________________1dڬ _ _Z_[___1(r)/(r)0(r)(r)(r)^(r)ϯ_ -s_1(_(r)_______________________________ __V_x_y____p_-____ /7...1 X__ߵ:" _____________________________ [ѷH- _0_8_?_E_"__ aDL(tm)1/4^1/4|1/41/4_____________________________ "__ aDL(tm)1/4^1/4|1/41/41/4"1/41/41/41/4 1/2_1/21/2_1/2_1/2_1/21/21/23/4`3/4a3/4(r)3/43/43/4X...ӿ-tG)(r)R?_'/6_ X_ ;C_5Us{Uz_)K____________________________________________________________________________________________________1d1/41/4"1/41/41/41/4 1/2_1/21/2_1/2_1/2_1/21/21/23/4`3/4a3/4(r)3/43/43/4X...ӿ-t_____________________________ G)(r)R?_'/6_ _____________________________ X_ ;C_5Us{Uz_)KL(tm)_____________________________ KL(tm)_CjN_:_N`(r)4z___ _r___1 hi3/4=__bc[0]w_V}__-5_(_0_|____$+1~__h -x_p__7__i_______________________________________________________________________________________________________1d(tm)_CjN_:_N`(r)4z___ ______________________________ r___1 hi3/4=__bc[0]w_V}_____________________________ __-5_(_0_|____$+1~__h -x_p______________________________ _7__i______l__ ,bjqz{7)*_____________________________ ____l__ ,bjqz{7)***w***#C/go1/2X`(r) IQ:BIO_*2~#Cv~p_h3/4_g ,_gnwx_qr1E;_1_O_P____F'____________________________________________________________________________________________________1d**w***#C/go1/2X`(r) IQ:BIO_*2_____________________________ 2~#Cv~p_h3/4_g ,_gnwx______________________________ _qr1E;_1_O_P____F'12_____________________________ 12*+xyFG[0]X%BC_' WX8_`_(r)_M_1P_7...Z8____Z_-___?___\11_1_1111I-XY=[0][0][0]e____________________________________________________________________________________________________1d*+xyFG[0]X%BC_' _____________________________ WX8_`_(r)_M_1P_7...Z8_______________________________ ___Z_-___?___\11_1_1111I-XY_____________________________ =[0][0][0]e: _  dG -  5 o p _ _ O  _  _____________________________ : _  dG -  5 o p _ _ O  _  ~    g   P   )x"n___l_hiI'd_F'_*bc_ __________________________________________________________________________1J ~    g   P   )x"n___l_hi_____________________________ I'd_F'_*bc_ __________________________/ =!'[0]"'[0]#_ [0]$_ [0]% [14@14Normal1CJOJPJQJmH A@Default Paragraph Font4Z@4 Plain Text1 CJOJ[0]QJ[0]_1!  1   [0]                   _ -  !_  ) 4BHRT\[0]dkt*|u-*_8_(r)3/4(tm)_IX_ 1 KR[0]Q... N @ S f   MKBLV,dK_K -O 6_ _ (c)4_-,#S)007"_DKS Z `ein/tIy}l'6(tm) ?ڬ_ 1/4 (tm)*2_ _  -!"#$'(*+,-/01345689:=?ABCEFGIJKLNOPRSTUWX}-1/22Jyar0h-@"_K__ %).27;@DHMQV,.^`_ _1489GHZeijyz_1e1l1111111)57BNZ\gw|_ -%*,49C[ghoptv'[0])[0]4[0][[0]b[0]s[0]z[0]_[0](tm)[0]_[0][0][0][0][0]_[0])LUl_ 1/2_    Y i y z { | } ~  _ ... 1/4 -+CDEFGHIJ~___ 9 : ; = ? @ Z v y _   A \ w ' _  - ; F " _ 2 M T ` _ _   & _ _  ]{-2 #%qxt_'(c) /7HKOSX[^adn}FU]nquy~__"*_%"%%%%8?Ca__''$'G'N''''_'0(?(b(i(_(_((())K)^))_)))1*D*v*}*_*******_*+j+}+,_,_,_,,,,3/4,,,,,_,-[0]- - ----'-6-V-]-a-y-"--....,.;.^.e.. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _         _ _  _     _ _ _ _     _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _  [0].3`e_ 48ei-(r)_11`1d1y1}11_%'%"%%%[^tw''R'W'''' (.(/(m(r(_((_))))))1*6*v*z***_*1+K+N++ +++0,7,,,, ,%-&---*.+.i.n.1/2.                                              1 shu lea cheangBMacintosh HD:PROJECTS/2000:IFU:CARRYON:weidong:systemspecific.html@;+;+kR ;+;+5111(_@@@@1@G_11[0][0]1Times New Roman5_11[0]Symbol3_1 11111Arial9_1[0]Palatino3_1[0]Times?_1  11[0]1Courier New"1_1hwFFwFF1'!t!$ -0d_1]1-html xmlns:v="urn:schemas-microsoft-com:vml" shu lea cheang shu lea cheang_ ...Oh'+'_01_[0]  , H T ` lt|1'-..0-htm-shu lea cheangu-hu - Normal -shu lea cheangu-12u -Microsoft Word 8.0s@F#@!.1ۿ@!.1ۿ!'_ 11զ."-+,(r)D[0]զ."-+,(r)X hp[0]|"  1/4 1'-l t_b -. 1-Title 611 _PID_GUID1'AN{5681ED01-46B4-11D4-A772-00306540F82A}1[0]  _ - !"#$%'()*+,-./0123456789:;=?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~_..._____''""--(tm)___ _(c)_(r)___1/41/23/4_______1[0]       _ - !"#$%'()*+,-./0123456789:;=?@ABCDEFGHIJKLMNOPQRSTUVWXY_[\]^_`abcde_ghijklm_opqrstu____z___Root Entry[0] 1F&ԫڿ|1Table 1[0]ZgWordDocument1-_1[0]SummaryInformation(11f[0]DocumentSummaryInformation81nCompObj1X__1 1FMicrosoft Word Document_NB6WWord.Document.8Root Entry[0] 1Fڿ@1Table 1[0]ZgWordDocument1'1[0]SummaryInformation(11 1/41[0]       _ - !"#$%'()*+,-./0123456789:;=?@ABCDEFGHIJKLMNOPQRSTUVW[\]^_`abcde____[0]DocumentSummaryInformation811_CompObj1X0Table 1..._________'_"_--(tm)___ __[0]  _ _ _PID_GUID1'AN{5681ED01-46B4-11D4-A772-00306540F82A}_ ...Oh'+'_01_[0]  , H T ` lt|1'-..0-htm-shu lea cheangu-hu - Normal -shu lea cheangu-13u -Microsoft Word 8.0s@F#_1 1FMicrosoft Word Document_NB6WWord.Document.8_ 11զ."-+,(r)D[0]զ."-+,(r)X hp[0]|"  1/4 1'-l t_b -. 1-Title 611@!.1ۿ@!.1ۿ!' [14@14Normal1CJOJPJQJmH A@Default Paragraph Font4Z@4 Plain Text1 CJOJ[0]QJ[0]_1!  1   [0]                   _ -  !_  ) 4BHRT\[0]dkt*|u-*_8_(r)3/4(tm)_IX_ 1 KR[0]Q... N @ S f   MKBLV,dK_K -O )1*v**_*K+++0,,_,_,#-$-{--(.).i.1/2.1/_////0u000_001"1122Q22203q334 4%_1%_1%_11%_1%_1%_1%_1%_1%_1%_11%_1%_11%_1%_11%_1%_1%_1%_1%_11%_1%_1%_1%_1%_11%_1%_1%_1%_1%_11%_1%_1%_1%_1%_1%_1%_1%_1%_1%_1%_1%_11%_11*v*_"_16_ _ (c)4_-,#S)007"_DKS Z `ein/tIy}l'6(tm) ?ڬ_ 1/4 (tm)*2_ _  -!"#$'(*+,-/01345689:=?ABCEFGIJKLNOPRSTUWX}-1/22Jyar0h-@"_K__ %).27;@DHMQV,.^`_ _1489GHZeijyz_1e1l1111111)57BNZ\gw|_ -%*,49C[ghoptv'[0])[0]4[0][[0]b[0]s[0]z[0]_[0](tm)[0]_[0][0][0][0][0]_[0])LUl_ 1/2_    Y i y z { | } ~  _ ... 1/4 -+CDEFGHIJ~___ 9 : ; = ? @ Z v y _   A \ w ' _  - ; F " _ 2 M T ` _ _   & _ _  ]{-2 #%qxt_'(c) /7HKOSX[^adn}FU]nquy~__"*_%"%%%%8?Ca__''$'G'N''''_'0(?(b(i(_(_((())K)^))_)))1*D*v*}*_*******_*+j+}+,_,_,_,,,,3/4,,,,,_,-[0]- - ----'-6-V-]-a-y-"--....,.;.^.e.. _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _         _ _  _     _ _ _ _     _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _  _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _  [0].3`e_ 48ei-(r)_11`1d1y1}11_%'%"%%%[^tw''R'W'''' (.(/(m(r(_((_))))))1*6*v*z***_*1+K+N++ +++0,7,,,, ,%-&---*.+.i.n.1/2.                                              1 shu lea cheangBMacintosh HD:PROJECTS/2000:IFU:CARRYON:weidong:systemspecific.html@**kR **5111dK*L***_@@A-_1@\@A _1@]@@@1@@001@G_11[0][0]1Times New Roman5_11[0]Symbol3_1 11111Arial9_1[0]Palatino3_1[0]Times?_1  11[0]1Courier New"1_1hwFFwFF'!t!$ -0d_1]1-html xmlns:v="urn:schemas-microsoft-com:vml" shu lea cheang shu lea cheangs  jbjb 1kk]1 _d________1,*1/4 i_____  _ - !"#$%'()*+,-./0123456789:;=?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~H___HHH_v __N:1N_HH*|_uF_,1