OPTICAL IMAGE SCANNERS AND CHARACTER RECOGNITION DEVICES: A SURVEY AND NEW TAXONOMY

Amar Gupta Sanjay Hazarika Maher Kallel Pankaj Srivastava

Working Paper #3081-89

Massachusetts Institute of Technology Cambridge, MA 02139

ABSTRACT

Image scanning and character recognition technologies have matured to the point where these technologies deserve serious consideration for significant improvements in a diverse range of traditionally paper-oriented applications, in areas ranging from banking and insurance to engineering and manufacturing. Because of the rapid evolution of various underlying technologies, existing techniques for classifying and evaluating alternative concepts and products have become largely irrelevant. A new taxonomy for classifying image scanners and optical recognition devices is presented in this paper. This taxonomy is based on the characteristics of the input material, rather than on speed, technology or application domain. 2

1. INTRODUCTION

The concept of automated transfer of information from paper documents to computer-accessible media dates back to 1954 when the first Optical Character Recognition (OCR) device was introduced by Intelligent Machines Research Corporation [1]. By 1970, approximately 1000 readers were in use and the volume of sales had grown to one hundred million dollars per annum [3]. In spite of these early developments, through the seventies and early eighties scanning technology was utilized only in highly specialized applications.

The lack of popularity of automated reading systems stemmed from the fact that commercially available systems were unable to handle documents as prepared for human use. The constraints placed by such systems served as barriers, severely limiting their applicability. In 1982, Ullmann [2] observed: "A more plausible view is that in the area of character recognition some vital computational principles have not yet been discovered or at least have not been fully mastered. If this view is correct, then research into the basic principles is still needed in this area."

However, ongoing research in the area of automated reading (conducted as part of the wider field of pattern recognition) is leading to new products, and the market for scanning devices has expanded dramatically. Concomitantly, there has been tremendous growth in the market for third- llI

3 party scanning software, as well as software and peripherals

for specialized tasks such as and

data indexing, storage and retrieval [3].

This paper analyzes the technology used in the image scanning and character recognition industry and presents a taxonomy for evaluating the capabilities of current systems. Although the main focus is on optical scanning and character

recognition technologies, an attempt is made to identify

auxiliary technologies and products as well. In addition,

the paper discusses future trends and characteristics of systems which are likely to become available in the next ten years.

Inclusive of this introductory section, there are nine

sections in the paper. Section Two presents a discussion of the principal recognition approaches and technologies. The third and fourth sections classify the scanning industry by market segment and function respectively. Section Five discusses ancillary technologies such as scanning software,

data storage, indexing and retrieval products and

handwriting recognition software. In Section Six, future trends in products and technologies are discussed. In Section Seven, a new taxonomy is developed for evaluating the capabilities of current scanning systems. Section Eight describes a set of representative scanners and applies the 4 taxonomy to judge their performance. Finally, the conclusions of the paper are presented in Section Nine. III

2. RECOGNITION TECHNIOUES

The recognition of text, the scanning of images, and the raster to vector conversion of technical drawings have usually been considered independently of each other. The technologies corresponding to these three areas must be integrated in order to accurately scan and process complex technical documentation. In the case of most non - technical applications, only the first two areas need to be considered. A framework that allows recognition of both text and images is presented in this section.

The three major stages in the processing of a document are preprocessing, recognition, and post-processing. These are discussed in the following subsections.

2.1 Preprocessing

Preprocessing is the conversion of the optical image of characters, pictures, and graphs from the document into an analog or digital form that can be analyzed by the recognition unit. This preparation of the document for analysis consists of two parts: image analysis and filtering [4]. The significance of these parts is described in the following paragraphs. (a) Image Analysis - The first stage of image analysis is scanning [5,9,25]. Scanning provides a raster image of the document with sufficient spatial resolution and gray scale level for subsequent processing. In the case of a picture or a graph, the issue of gray scale level is more important that in the case of text. For text, this phase consists of locating character images. With the exception of high end scanners, which employ contextual analysis as well, reading machines are character-oriented. Each character is treated as a unique event and is recognized independently of other characters. This implies that the document must first be segmented into distinct characters, and then the identity of each character recognized separately.

The process begins with the optical system taking a raster image of the area that is supposed to enclose the character. Alternatively, the raster image representing the character is "cut out" of the image of the document. In either case, the image is transmitted sequentially to a single-character recognition subsystem. If the image, or the information on the features of the character constituting the image, possesses characteristics which are significantly different from the characteristics maintained by the character recognition subsystem, then the particular area is deemed to be either an unrecognized character or ill

noise. Depending on the system, the output is expressed as a flag or a blank. In some systems, any graphic or character input which is outside the size limitations is not flagged but skipped. The formatted output, in such a case, contains a blank zone corresponding to the input of the improper size.

(b) Filtering After the image is analyzed, filtering takes place. Filtering minimizes the level of noise. The latter may be caused either in the source document or by the opto- electrical transformation mechanism. The process of filtering also enhances the image for easier recognition.

One filtering process that eases the extraction of the features of the character in the recognition phase was proposed independently by Lashas [5] and Baird, et al. [6].

They presented two OCR readers in which black marks constituting the character are transformed into quantized strokes. Their approach is depicted in Figure 1.

Preprocessing: New Approaches

The preprocessing phase consists of deriving a high level representation of the contents of the image. The scanned document is seen as a set of blocks corresponding to independent ways of representing information such as text, line drawings, graphs, tables, and photographs. t,- u-~~~ a. 1a At4 A,Is tr t .* ot-,; , _#4*1 w"O- O-4 I +RI ..w , 44 f wltva "NO&

.PP - --- *-- dB ALM

CCR-A font numerals and horizontal and vertical quantized stroke segments

.C -"

..or _ 11111

=ill i r- 11111t- d--

CCR-B font numerals and four detected directions of quantized strokes

FIGURE 1: QUANTIZED STROKES

Lashas, A., et. al. "Optical Recognition Based On Analog Preprocessing and Automatic Feature Extraction". Computer Visin, Graphics and Image Processinq.vol. 32. pp. 191 - 207. III

understanding of this document involves the following:

(a) Identification of the major blocks of information.

(b) Identification of the spatial relationships between the different blocks (for example, the reading order must be recognized so that the logical connections between different blocks of text or graphics can be easily derived).

(c) Identification of the layout features such as the number of columns, margins and justification.

(d) In the case of text, further identification of headlines, footnotes and other similar characteristics.

Typically, the textual portion is first distinguished from other information, and then columns of text are recognized. Next, these columns are split into lines of text which are in turn segmented into single character images.

A reader which is able to accept a free format document was described by Masuda et al. [7]. Their scheme of area- segmentation uses projection profiles obtained by projecting a document image on specific axes. Each profile shows the 9

structure of the document image from a particular angle. The projection profile is very sensitive to the direction of projection. In order to check for skew normalization, the

image of the document is incrementally rotated and the horizontal and vertical projection values are noted. Through an analysis of the intensity of these values and an examination of different areas, general text and headlines are separated (Fig. 2). Another reading system based on

this approach is described by Kida, et al. 8].

Commercial system today require areas to be manually segmented [2,5,7]. While segmentation methods are fairly rudimentary in low-end scanners, methods that permit the operator to define several text and graphics "windows" within a page are available on high-end products. These methods include the use of a mouse or a light pen to define text, graphic, or numerical zones.

2.2 Recognition Recognition occurs at the level of characters in most

commercial page readers. However, high-end scanners are now complementing character recognition with sophisticated contextual analysis. Techniques used for character recognition and contextual analysis are discussed in the following paragraphs. I

I II I "a __.·.______i__

_-- _ , _~ == .r__ ---Lw

_w= == - _ - nm_ - . - ~mWmm~_ dS - - _ mm _ .4mg-r~·a _- i iIii__-J . ii--a 5- m am

- __ ._ _

'" ~-- . '~ - ,.mm cs,~~_ 3E3N - ¢ws-_mm,^-, E_* ps

- W

Projection Profiles

Text line areas extraction

FIGURE ': SEPARATION OF TEXT

Ma suda, -I. "Approach to a Smart Document S0 Read,-- ' F? Conference on and ? ~r--n Recognition. 1985. pp. 550 - 557. 10

Character Recognition

The character recognition problem is essentially one of defining and encoding a sequence of primitives that can represent a character as accurately as possible. The most common approaches to character recognition are: (a) template matching, and (b) feature extraction [9].

(a) Template Matching Technique Among the oldest techniques for character recognition, template matching involves comparing the bitmap that constitutes the image of the character with a stored template [9]. The amounts of overlap between the unknown shape and the various stored templates are computed, and the input with the highest degree of overlap is assigned the label of the template.

The primitive in this case is a very simple function that assigns one value to a point of the bitmap if it is black, and another if it is white 5,9,25]. The performance of different readers using this technique depends on the decision algorithms. This method offers high-speed processing especially for monofont pages. Even in the case of documents containing several fonts which are extracted from a limited set of fonts of a given size, this technique can be very effective. Moreover, this method is relatively immune to the noise generated during the opto-electrical Ill

11 transformation.

However, this method is less effective in the case o unknown fonts, multiple fonts and multisize characters. Further, it imposes constraints on the format of the page in areas such as the spacing of the letters and the position of the text. If these constraints are relaxed, template matching becomes slow and costly, because of the need to translate, scale, and rotate input images.

(b) Feature Extraction In contrast to the template matching technique which emphasizes the importance of the overall shape, the feature extraction approach focuses on the detection of specific components of the character [5]. This approach assumes that local properties and partial features are sufficient to define every character.

Feature extraction techniques identify local aspects such as pronounced angles, junctions and crossing, and define properties such as slope and inflection points. In one method of recognition, a boolean or a numerical function that characterizes each feature is calculated and then applied to the given image [5,7]. Another method involves defining a partial mask that can be systematically positioned on the pattern [7]. In a more recent strategy, 12

recognition is based on the analysis of the direction and

connective relationships of the strokes of the character [7].

Structural Analysis Methods

The use of structural analysis methods is a recurrent

theme in the literature [1,4,5,6,7,10]. These methods are

frequently utilized in commercial reading machines. Each

character is defined as a set of topological primitives such

as strokes, segments, holes, and arcs, and these machines

analyze the characteristics of the scanned inputs to detect

such primitives.

Isolated, unbroken characters are first recognized

using a structural description 9]. These descriptions are

independent of the position and the size of the character.

The shape is then parameterized so that the results of the

structural analysis can be compared with a stored list of

shapes. Next, the shapes are clustered to discriminate

between characters and to classify them. The power of

structural analysis depends of the number of features of

each character used by he system. An example of the

structural analysis -f a character is shown in Figure 3.

I* II[

C4

lm ] 'OC 4 Lu.

0 0;C Co a (AI ) o + L -i

f- 4n K a-

0 4nz I-. xm 0 I)0 0 O 0U,I) (3rr 0 0 _ U) 0iLUU.

LI La I (n 13 Character Classification

So far, the discussion has centered on single characters in a single font. Most documents contain multiple characters with considerable variation across fonts. A statistical approach is used for dealing with these variations. In reading machines equipped to handle multiple fonts, tests of character recognition are based on statistical data constituted by a training set and a test set. When the term "omnifont" is applied to a reader, the implication is that the reader has been trained on a large set of fonts [6].

Feature extraction is generally complemented by classification. In order to be classified, characters have to be discriminated from each other. The classifier is designed to construct a discriminant function underlying a complex probability distribution, taking into account the non-linear variations in the characters [26].

The two essential steps in recognition - feature extraction and classification - have different optimization criteria. It is felt that feature extraction should be optimized with respect to the reconstruction of the character, while classification should be optimized with respect to recognition 4]. Consequently, feature extraction should not be directed towards recognition 14 through definition of features that minimize the classification process.

Classifiers are usually adapted to different fonts by the manufacturer. However, some machines provide a classifier which allows for the adaptation of new fonts by the operator. An on-line training capability for multifont recognition can also be provided 4]. This concept of trainability is similar to that employed in modern speech recognition systems, which overcome the variability of voice between speakers by requiring that adaptation be performed during a training phase prior to regular operation. The main disadvantage of trainable systems lies in their slow training speed, as the training set contains several thousands of characters.

Limitations of Current Recognition Techniques Ideally, feature extraction techniques should be able to generate a set of characters that are independent of font and size. However, the wide variety of fonts encountered in office environments results in a huge number of possible characteristics. Furthermore, ambiguities occur due to the similarity in the features of different characters across fonts. For example, the distinction between 1 (one , I

(capital I) and 1 (el) across and even within fonts is not obvious. Moreover, there are a number of characters which 15 cannot be correctly identified without further information about their size or position. For example, the character

"O" (capital o) in one size corresponds to the lower case

"o" in a larger size; further, this character is the same as

0 (zero) in several fonts [11].

The user can control the accuracy of the system by adjusting the error and reject rates [12,25]. The error rate is the percentage of the characters in a document that are incorrectly identified by the system. The reject rate is the probability that the system cannot identify a character at the desired level of confidence (i.e., if the reject rate is 5%, the system will flag 5% of all characters, on the average, as being unrecognizable).

Clearly, there is a tradeoff between the error rate and the reject rate - if a lower reject rate is selected, the error rate will increase and vice versa [12,25]. Consequently, a reader may possess a very low error rate, but it may flag or reject every character that does not offer a high probability of correctness as defined by the decision algorithm (13].

There is naother aspect to accuracy. For example, a reader may recognize the characters in "F16" correctly, but then flag them as rejects because the word is not in its built-in dictionary. Also, the inability of readers to 16 distinguish between ambiguous characters such as "I"

(capital ai), "1" (el) and "1" may or may not be considered to be an error.

The error rate of the entire recognition process is dependent not only on the functioning of the single character recognition subsystem but also on the level of preprocessing [12]. For example, different kinds of segmentation errors may occur, and lines of text may be missed or misaligned in the case of a document containing several columns. Situations involving such missed or misaligned lines can be minimized by preprocessing

(described in Section 2.1).

With respect to performance evaluation, character recognition is sometimes deemed to be a branch of empirical statistics [4]. There is no reliable way of modelling the accuracy of a reading machine except by comparison with a standard set of norms. The impracticability of statistical modelling is due to the fact that the pattern generating process and its multivariate statistics are influenced by a number of barely controllable, application-dependent parameters.

Recognition techniques are prone to ambiguities, apart from involving heavy computation. The sole reliance on the 17 physical features of the characters results in a high rate of errors and rejects. To combat this problem, recognition methods are complemented by contextual and syntactical analysis aided by customizable lexicons, especially in high- end systems [9,11,13].

In the case of low quality documents with different kinds of noise and broken and touching characters, the error rate is high. Contextual analysis becomes a necessary condition for reducing the rate of errors and rejects in such situations.

Separation of Merged Characters The breaking of images into character blocks is based on the assumption that each character is separated by horizontal or sloped line of blank spaces. However, in the case of tight kerning, inadequate resolution of the scanner, poor quality of the document, or high brightness threshold, adjacent characters spread into each other. Separating merged characters involves the following three processes:

(a) Discriminating multiple characters from single character "blobs"; (b) Breaking the blobs into components that are identified as single character blobs; (c) Classifying the different characters and deciding 18 whether to accept or reject the classification.

Defining a set of criteria for distinguishing between

adjacent characters is difficult because of the many ways in which characters merge together and the fact that merged

characters contain misleading strokes. Separation of characters is a computationally intensive task that significantly slows down the overall recognition process [2,4,8,121. Separation is usually possible in a limited number of cases and for pairs of characters only.

Contextual Analysis Techniques Contextual analysis is of two types: layout context analysis and linguistic content analysis 9]. The former covers baseline information on the location of one character with respect to its neighbors. For example, it generates

formatting information and is usually language-independent. Linguistic analysis on the other hand involves the use of spelling, grammar and punctuation rules. For example, a capital letter in the middle of a word (with lower case

neighbors) is not accepted. Layout context analysis

capabilities are available on several systems available today. However, only the high-end systems offer some degree of linguistic analysis capabilities. 19 Dictionary Lookup Methods

Several contextual methods for word recognition are based on the analysis or comparison of a word or string of characters with stored data for type and error correction. Spelling checkers are commonly used to complement character recognition devices [13]. Such checkers may be part of the recognition software, or they may be part of the text composition software that the operator uses for correcting the processed document. In either scenario, when the size of the dictionary is large, the search time can be very long. Furthermore, if the contextual information is not considered, the scanned word may be incorrectly converted into some other word (13]. Several high speed correction methods use the concept of "similarity measures", which are based on the fact that most errors are due to character substitution, insertion, or deletion [22]. The similarity between two words (the correct word and the garbled word) of equal length is measured using the Hamming distance. The Modified Levenstein distance [9] generalizes the similarity measure for substitution, insertion and deletion. The minimization of this distance forms the optimization criterion. Tanaka [14] proposed two methods that yield 10 - 35% and 35 - 40% higher correction rates than a typical dictionary method and reduce computing time by factors of 45 and 50 respectively. One of these methods is based on the assumption that different characters can be classified into III

20 classes or groups that are independent of each other, so that a character in one class is never misrecognized as a character in another class. This categorization helps to significantly reduce the probability of errors.

Use of Statistical Information The frequency of occurrence of different characters varies widely. For example, the letter "e" has the highest frequency of appearance in an English document. Also, the letter "t" is the most frequent first letter of a word, and the letter "q" is always followed by a "u." Further, several sequences of character combinations are more likely to appear than others. The frequency of occurrence of a character within a given string of text can be efficiently modeled by a finite-state, discrete-time Markov random process [22]. The use of statistical distributions of different combinations of N characters (N-grams) allows the implementation of error corr tion algorithms such as the

Viterbi algorithm. According to Hou 9], this algorithm can reduce the error rate by one half.

Linguistic Context Analysis Characters are primitives of strings constrained by grammatical rules. These rules define legitimate and non- legitimate strings of characters. Based on the recognition of some words, the class (noun, verb, etc.) to which they 21 belong can be identified along with the applicable syntactic analysis to identify misspellings, misplacements, and other syntactic errors. A string of words or a sentence can be decomposed using a parsing tree. There are several efficient parsing trees for different types of grammatical structures [9,12,15].

Syntactic analysis assumes that the text is constrained by one type of grammar. This assumption need not hold in all cases. Several technical documents contain uncommon words: serial numbers, technical words, and abbreviations.

Such situations require interaction between the technical operator and the system, or the use of dictionary lookup methods. Except in such special situations, linguistic context analysis techniques are well suited to the task of identifying and correcting reading errors [15].

Future of Recognition Technology

Conventional techniques for character recognition based solely on geometric or analytical properties are not sufficient to accurately process complex documents at high speed [22,25]. While the use of contextual analysis improves accuracy, it does not increase processing speed. To improve speed, i- becomes necessary to simultaneously

analyze the document from several points of view. For example, one unit can analyze the image, another can III

22

recognize characters, and a third can perform contextual analysis of the text.

The use of a single recognition technique is insufficient to solve all ambiguities encountered during the recognition process. As such, general algorithms must be complemented with customized rules for special cases, such as distinguishing letters that are easily confused (e.g.,

"o" and "0" and "6" and "b"), or recognizing characters printed in pieces (such as "i", "jn", and ";"). Ideally, a single process control unit should collect all the pieces of information from the subsystems, order them, and then make appropriate final decisions [4]. Such a strategy

(functionally depicted in Figure 4) allows the recognition of different parts to be done in parallel.

2.3 Postprocessing After the text and graphics are recognized, they must be encoded for transmission to, and processing by, a word processor, a graphic editor or a desktop publishing program (5]. In the case of text, the image is most commonly

converted into the ASCII format. In the case of graphics, the storage requirements for the document vary greatly, depending on the extent of compression. The storage capacity may pose a major constraint in some cases. For example, in systems which scan at 300 dots per inch (dpi), one single 8.5" x 11" page requires over one megabyte of Ia c I-LU C; C ,a I SW -S GS. *r LI C S_ ,"

z I AFq I- op*,r w O v co CC I- S LU - r-o'a O W C 0 0 n CC .2.,;0, &6 E _S._ _- 0 C 0 Co h. 3 c 'I; 0. E C a0 -0 a 0 -)1 C 0 _ b. 0L o C P cc a S r) 0 mC ) S U'. 0 o Q 0 S O IOL L_4 _) m IS,

* ._J U0o a : _ P

-- uJm O3 LI. 23 memory if stored in raw bitmap format. While the advent of optical disks with storage capacities in gigabytes tends to mitigate the storage problem to some extent, it is usually desirable to use more efficient storage strategies. 24

3. CLASSIFICATION OF SYSTEMS

For analytical purposes, the scanning industry can be divided into four segments: (a) Low-end scanners; (b) High- end scanners; (c) Integrated systems; and (d) Software. The characteristics of each segment are explained in the following paragraphs.

(a) Low-end scanners These are small scale systems, usually desktop-based with relatively low sophistication in dealing with page scanning and image processing applications (1]. They are dependent on a host computer system for processing and storage (commonly an IBM personal computer or a Macintosh). The capabilities of these systems are enhanced by third party image and text processing software that is generally executed on the host computer.

Low-end scanners are either automatic feed or flatbed, and can handle between 20-100 documents per minute (or 20-50 pages per minute). The recognition technology tends to be simple - generally the matrix matching technique is used. Costs are low, ranging from $1,800 to $7,000. The software cost averages around $2,000 [3]. These scanners are geared towards low volumes (10 - 100 pages or documents at a time), and relatively low accuracy (1 - 10 letters per page misread II1

25 or flagged for error on the average). The Scan-Optics Easy-

Reader 1720 and the Datacopy 730 are examples of popular low-end scanners.

Most of these machines can scan a page or a portion of a page as an image or as characters of text, depending on the intent of the user. In some cases, the user can specify which zones within the input page contain text and which zones include graphic images. Some of the systems use separate phases for scanning text and images respectively.

Hand held scanners have entered as the lowest end products in the scanner market 3]. These usually offer limited page and text reading capabilities without requiring any additional software. They are either plugged directly into the personal computer like a keyboard or linked by a simple interface (such as a parallel card). They are transparent to the host computer, its operating system, and its application software. The volume handled is very low, because of the need to physically move the scanner with the hand. The scanning speed ranges from about 50 to 200 characters per second, and the number of onts recognized is limited to 5 or 10. Their costs are quite low ($200 - $1000) [161. The Caere Corp OCReader is an example of a widely used hand-held scanner. 26

(b) High-end scanners These are large, sophisticated image/page/document processors with stand-alone or host based capabilities [1). They offer mature hardware and software devoted to the tasks of text recognition and image scanning. These systems include sophisticated dedicated processors, editing and correction workstations, as well as customized recognition software that uses sophisticated techniques like feature extraction [30). They support their own storage systems and - can be readily integrated with other common systems.

High-end scanners feature multi-font and multi-size flexibility to handle multiple fonts and multiple sizes along with automatic feeding capability that can cope with high volumes. Large numbers of documents (1,000-10,000) can be accurately processed at high speeds (200 or more pages per minute or 750 or more documents per minute). Costs range from $15,000 upwards with the median falling between $25,000 - $30,000 [16]. Examples of high-end scanners include the Calera CDP Series and the Kurzweil family of scanners.

(c) Integrated Systems These systems serve as automated image processing facilities for the office, and are designed to network with III

27 the existing computer and communications facilities. A typical system, controlled by a common operating system such as UNIX, consists of an enhanced office network that provides multi-media, multi-user, and multi-tasking access to its diverse resources 171.

An integrated image system offers various data entry facilities such as optical character recognition devices

(both low and high end), image scanners, keyboard workstations and facsimile equipment. The system is usually managed by a dedicated processor (a mainframe or a minicomputer), although LAN-based systems are becoming increasingly popular. The processor is procured from a vendor, or the system is configured to operate within the existing computational facilities. Data storage is centralized and is accessible from all the workstations. Software is executed either on the processor or on a decentralized basis [17].

Typically, an integrated system will support a variety of software packages, including "off the shelf" word processors, database and statistics programs, and other professional software tools. Similarly, at the output level there is support for a variety of printers, monitors, and facsimile equipment. 28

Several integrated imaging systems are available, including the Scan Optics ScanEdit 3200, the Wang Integrated

Image Processing System, and the DRS 4000. IBM has announced its own system, the Image Plus, which is expected to be released in 1990. Figure 5 provides a schematic representation of a typical integrated imaging system. This paper does not offer a detailed treatment of integrated systems, as they represent an amalgamation of new imaging technology with conventional computing and communications power, rather than a new technological innovation.

(d) Software Third party software tools offer powerful scanning and processing capabilities for both images and text. As mentioned earlier, they are substantially enhancing the capabilities of low-end scanners. In addition, software packages utilizing new approaches from areas such as database management, expert systems and neural networks are being developed for specialized applications [1]. Most packages are compatible with the popular desktop scanners as well as with Macintosh and IBM personal computers.

The orientation of this paper precludes a detailed analysis of software products. However, Section Seven provides a brief treatment of currently available products. III

0n * 0 (00 zoZ c

44 D-4A 41 XUAa:' X- 0e L

C z 0 a Ul a" a

(jo . co

I I- 0 cco 0 (.

z z I-LU C 0 L- P 0. I 0 4I- I- -] 0O

OC t ,0 LL o-0 z o 0 o z I 4c CC" I- 0 Q0 a-00 c I- be 40 0 0 cc 0 0 (L:I o O 3. = 29

4. FUNCTIONAL CLASSIFICATION OF MACHINES

Apart from classifying products by market segment, it is feasible to classify the image and character recognition industry by function. Thus, "reading machines" can be divided into four major categories: (a) Document Readers;

(b) "Process " Readers; (c) Page Readers; and (d) Image Readers. These groups are described in the following paragraphs.

(a) Document Readers This category of readers was the first to be introduced. Developed during the sixties and seventies, these machines are oriented towards transaction processing applications such as billing and form processing [4,8,251. In earlier machines, the source document was prepared in a rigid format using a stylized type font and the character set was limited to numeric characters plus a few special symbols and sometimes alphabetic letters. Contemporary machines have greater flexibility in font recognition and in coping with material of poor quality generated by high speed printers. The speed of processing is very high, typically between 400 and 4000 characters per second. An important feature is on-line correction with the help of bitmaps of unrecognized characters. 30 (b) Process Automation' Readers The main goal of these readers is to control a particular physical process 4,8,9,25], such as automatic sorting of postal letters. Since the objective is to direct each piece of mail into the appropriate sorting bin, whether or not the recognition process results in the correct decision for every single character is not critical in this case. Since a reader of this type is designed with specific applications in view, it is not explicitly considered in this paper. However, the class of integrated systems discussed in Section Three above is capable of performing "process automation" functions.

(c) Page Readers These reading machines were originally developed to handle documents containing normal typewritten fonts and sizes (4,8,9,25]. Initially intended for use in the newspaper and publishing industries, these machines were designed with the capability to read all alphanumeric characters. Until the late seventies, devices of this type were quite restrictive in terms of their requirements for large margins, constrained spacing, and very high quality of printing. Further, they accepted only a small number of specially designed fonts such as OCR-A and OCR-B. The reading speed for a monofont page was several hundred characters per second and the price of the machine itself 31 was around one hundred thousand dollars per unit. The above situation was significantly altered by the introduction of the Kurzweil Omnifont Reader in 1978. As its name implies, this machine was able to read virtually any font. Since then, several other machines belonging to this category have been introduced, and their capabilities have been substantially enhanced. For example, in many cases the user can specify the particular zones on the page to be read, and the format of each zone. On-line error correction is another common feature. In addition, prices have fallen steeply to under twenty-five thousand per system.

(d) Image Readers These machines were originally designed to meet

Computer Aided Design (CAD) needs, and subsequently came into more generalized use. They capture items such as drawings in the form of their mapped image and then reprocess that image to generate an equivalent vector graphics file.

The functional classification described above is fast becoming obsolete. As the matrix in Figure 6 indicates, one of the main trends in the scanning industry is the convergence of separate functions within a single system [1,3]. One machine can now perform functions that previously required multiple machines. An equally important II'

A L

LU W I- U) ot LU I- X X X X 2 Co 0 x z U)

I- z C z 0 Z w LU Z Zi o (0U. zZ z (I ot LU -J~nn./ zI... Cl) Z L w Z Zrz Z X X 3 4 o (n ,=,~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ U) u. Ji cn Zr Zc I 0~ Z3 Z z o-cn LU un 2 E: LUW 00 a WtLU wa0c Ou .ee O 0 j a w mQtu~i . 3U

LLDZOI-- OZ<(. 32 trend is the growth in the market for ancillary products such as third party scanning software, storage-end devices and data indexing and retrieval software 3,17,18]. The next section explores this trend. III

33 5. ANCILLARY PRODUCTS

The rapid growth of the scanning market has been

accompanied by a proliferation of ancillary products. These fall into two broad groups:

(a) Low-nd Enhancement Products

This group consists of low-cost products which are designed to augment the capabilities of low-end scanning

systems. They interface with the scanner to perform one or more functions of a high-end system. Third party scanner enhancement software and low-end interfacing devices fall into this group.

(b) Complementary Products This group consists of products which complement and

support the capabilities of scanning systems. Storage-end devices and software for specialized scanning applications are examples of complementary products.

The following paragraphs briefly describe the trends and products within each group.

5.1 Low-End Enhancement Products These products emerged in response to the substantial costs of high-end systems. By performing one or more 34 functions of a high-end system, they enable relatively basic systems to emulate high-end systems at lower costs. Scanner enhancement software and peripheral interfacing devices are typical examples of this phenomenon, and are discussed in the following paragraphs.

(a) Third Party Scanner Enhancement Software These are page recognition packages like OmniPage,

Advantex, OCR ReadRight and SPOT. They perform tasks such as creating scanning templates, specifying key fields, spelling and grammar checking, and separating columns, graphics and text. Ranging in price from $600 to $4000 3], these relatively user friendly packages are compatible with most popular scanners and support the more widely used word processing, spreadsheet and image compression formats.

Although scanner enhancement programs enable users to perform functions beyond the capability of low-end systems, the claims of some vendors that these programs can replace high-end scanners are only partially true. In comparison to high-end systems, such programs are slower and less versatile in the number of fonts they can recognize. They are also less acurate, and are not very good at separating columns, graphics and text. However, they represent a serious alternative for many users who do not need or cannot afford a high-end system [16]. A good example is the desktop III

- 35 publishing industry, where user friendliness is a primary concern. High-end system vendors have had relatively little success in accessing this market, but third party packages used with low-end scanners have been extremely popular. According to International Data Corporation [18], overall sales for these products have grown by 215% in the period between 1986 and mid 1989.

(b) Low-End Interfacing Devices

This group of scanner ancillaries is the hardware equivalent of scanner enhancement software. These products are usually plug-in boards for personal computers, and they interface with the host system and its low-end scanner to perform high-end scanning functions. Like scanner enhancement programs, these devices enable users to recognize text and graphics and "read" them into word processing and other formats. Specification of key fields and template creation are also supported. Ranging in price from $1000 to $5000 [16], low-end interfacing devices suffer from the same drawbacks as their software counterparts, such as slower speeds and limited recognition of fonts.

5.2 Com1lementary Products This group of products complement and support the overall capabilities f scanning systems. Storage-end hardware and data indexing and retrieval software are 36 included in this group. In addition, there are a number of products which combine scanning technology with technology from other areas to perform specialized scanning applications. One example of this trend is the advent of neural network based programs for handwritten character recognition 191.

(a) Storage-End Devices

Scanning systems require much more storage space than is available with traditional magnetic storage media [28].

Using an optical disk system with several gigabytes of storage space is one way of meeting this need. A survey by Frost and Sullivan in 1989 [3] found that between 1986 and

1988, sales of optical disk systems grew by over 150%.

These systems consist of one or more optical disk drives (usually Write Once Read Many or WORM drives) and sometimes a "jukebox" to perform disk storage, retrieval, loading and operating tasks [21]. However, these systems are very expensive and a typical system with two disk drives and a five platter jukebox costs between $27,000 and $33,000 [18]. In addition, one must pay for sophisticated software packages which store, index and retrieve data on CD-ROM's.

One alternative to optical disk technology is being marketed by Scan Optics, Inc. This is the Image EasyFile System, which uses 8mm cassette tapes (on up to 28 37 concurrent drives) as the storage medium. Each tape has a capacity of 2.3 gigabytes. As data on cassette tapes have to be accessed in a serial manner, this system is much slower than an optical disk system. However, at $ 17,000 for a 28 drive unit, Image Easyrile is considerably cheaper than an equivalent optical disk storage system. A cassette based system is a viable alternative to an optical disk system in situations where the access frequency per data point is low.

(b) Software for Specialized Applications An interesting development in the scanning industry has been the joint application of scanning technology and technology from other fields to handle specialized scanning tasks. A good example is the development of neural network based scanning software for handwritten character recognition. Neural network computer models are based on models of the functioning of the human brain. They emulate thought processes such as learning, and can be taught to perform complex tasks [19]. The handwriting recognition application emerged as a result of the use of neural networks in the wider area of pattern recognition.

A number of packages are currently available, either off-the-shelf or as part of a customized service that configures handwriting recognition solutions to customer 38 needs. NestorWriter of Nestor Inc., Providence, Rhode

Island is an example of the former, and Inscript of

Neurogen, Inc., Brookline, Massachusetts is an example of the latter. The main attraction of these packages is that they can be trained to recognize a much wider range of handwritten characters than is possible with conventional scanning software.

Most products in this area are designed for DOS, OS/2 and Macintosh environments. Data are entered through a scanner or a digitizing tablet, and recognition speeds range from 1 to 3 characters per second. As in the case of conventional scanning software, there is a tradeoff between the accuracy rate and the rate of rejection. The accuracy rate can be made arbitrarily high if tolerance for error is low, and vice versa.

The main problem with these packages is that it takes a very long time to train them. In addition, they scan at much slower speeds than conventional systems do. Until these problems are resolved, they are unlikely to be widely used. However, they have excellent long term potential, and should eventually c me nto widespread use by the scanning industry. Short term :rospects are brightest in areas such as scanning numeriJai -cmunts on checks and signature verification. 39 The next section discusses broad trends in the optical image scanning and character recognition industry. 40 6. TRENDS AND PROJECTIONS

Rapid advances in hardware and software have created a major demand for scanning technology in diverse industries ranging from banking to defense and from engineering to med- icine 171. Instead of focusing on each application separately, this section focuses on broad trends. Figure 7 presents a schematic representation of the evolution of the capabilities of scanning technology.

6.1 Falling Costs one of the primary reasons for the growing demand for scanning technology is the fall in the cost of products. As technology improves, costs will continue to decline. Figure

8 depicts this trend of falling costs in terms of the system costs per font.

6.2 Coalescence of Text, Image and Graphics Processing Graphical information can be stored either as simple bitmaps or as a set of standard geometric entities. The latter option allows for easy editing and storage in a library of symbols. Currently available scanners do not offer these capabilities. However, developments are taking place in the area of Computer Aided Design (CAD) for converting raster images of line drawings into vector graphics files, which can be easily modified with graphic C I

C O C c

* - tLc,.. :

I0a). .5;

LU Q Bu a

I- 0 . m 2.. CL __ ~ o - o- C,) ,-a 0

z Z as E * x _o ;.

o

- O olo - 0 _, C 0 a .: z LU s E.

LU

_ DE 5

_ -~~1 z~~ ~ :s _ "o .EEc 0a It ~~~~~~~~~~~~~~~ -0Ul -- '"E OCI~~~~~~~O0~~~~~~~~~~~~~~~~~~~~~~~ CC ... C .

a 0a

@0 0 O "O a iv CI- LU z

0

ao0 Wa

Zo u( m

- a

LLU - a ZN

C O

O U- 0 Z - 0

E 0 Z r * i a m_m _ LL c - o co - S *)*a 3Ca co

U

w 0 w c a rr CCXUl a 1n ~ 0

- 0r -LIE ° - o III

41 line editors. Raster-to-vector conversion systems are now available from several companies including Houston Instruments and Autodesk Inc. However, at present only approximate solutions are supported. For example, all curves are decomposed into line segments. It is expected that ideas from the area of raster to vector conversion will be combined with scanning technologies to enable text, images, and line graphics to be edited and processed through a composite package.

6.3 Integration and Networking one of the most significant trends in the information processing sector as a whole is the increasing integration of disparate data processing equipment into a single composite system (17]. This trend is reflected in the scanning industry by the emergence of the integrated imaging system (described in Section Three).

The trend towards integration can be observed in other areas of the scanning industry. For example, optical character recognition capabilities are being increasingly integrated into facsimile equipment 29]. At the same time, facsimile capabilities are also becoming available on document readers such as the Datacopy 730. 42

6.4 Impact of Techniques

Advances in Artificial Intelligence techniques in areas

related to character recognition and image analysis will lead to faster, more accurate and versatile reading machines [231. Semantic analysis and natural language parsing aids for contextual analysis will improve the process of identifying letters and words, reducing the error rates, the

reject rates and the need for operator intervention [24].

Eventually, reading machines will be able to handle virtually all printed material [18,271.

6.5 Use of Secial Purpose Hardware A highly accurate omnifont reader requires

sophisticated algorithms for vectorization and classification, separation of merged characters, contextual analysis, and syntactical analysis. These algorithms can benefit from microprogramming and special purpose hardware which is optimized for specific applications. Sophisticated readers such as the Calera CDP 9000 and Kurzweil 5100 use

special purpose hardware.

6.6 Limiting Factors Although it appears that ongoing research will enhance the capabilities of scanning systems, several factors continue to impede a wider acceptance of the technology. These are as follows: III

43 (a) The accuracy provided by current systems is still inadequate for several applications. The editing of errors and the presence of unrecognized characters continue to be major bottlenecks. The time taken by the operator to overcome these bottlenecks limits the throughput of the overall system.

(b) Wide acceptance of the new technology will occur only after it becomes possible to automatically handle complex documents containing both text and graphics [13,17,20]. The need to hire and train expert operators continues to inhibit the widespread adoption of scanning systems.

(c) Broken strings and touching characters in a document still constitute a major hurdle for even the most sophisticated machines. Scanning systems remain highly sensitive to variables such as paper quality and thickness, clarity and font. Major developments in syntactical and semantic analysis are needed before reading machines realize their full potential.

The major trends and projections are summarized in Table 1. 1111111'S~~~~ig11 I I fI1

Qe *-

a I I is If II I I '11 jE ' i, aiiit1 iLX itI III

44

7. A TAXONOMY FOR PERFORMANCE EVALUATION

The conventional criteria for evaluation of a reader are speed and accuracy. However, by expressing the speed simply in characters per second and the accuracy in a single figure, one is overlooking the fact that the performance of a scanning system is heavily dependent on the characteristics of the input. For example, it takes longer to process a document with multiple fonts and multiple character sizes than it does to process a monofont, monosize document [9]. The presence of graphics and the formatting of the document also affects the reading speed. Further, the quality of the print is a major factor affecting the accuracy of the system; broken and touching characters, low contrast, and skewed text result in high error rates and reject rates as well as in a significant reduction in the speed of reading. The speed and the error rate presented in the technical documentation supplied by the vendors consider the characteristics in only one case - usually the perfect one.

In order to assess the capabilities of a system, one must consider not only the scanning speed but also factors such as time spent in editing and correcting, time spent in training the operators and time spent in training the system itself where applicable [13]. In the case of a document 45 containing several graphs and multiple columns, the time spent in editing the document can be significantly greater than the scanning time [12,13]. Consequently, it is difficult to obtain an accurate estimate of the overall speed by simply observing the elapsed time for the scan operation.

With rapid evolution in the technologies used in the new generation of products and their broad functionality, it becomes necessary to use a larger repertoire of evaluation criteria that gives appropriate weightage to the major factors that determine the efficiency of the scanning process, such as: complexity of document; quality of document; recognition technology used; and man - machine interface. Unfortunately, there is no framework that currently meets this need. In order to fill this void, a new taxonomy for the evaluation of scanning systems is developed in this section.

7.1 Document Complexity The above facts highlight the need for a measure of document complexity that takes into account the diversity of fonts utilized, the sze of characters, and the proportion of images in the docment. Since no measure exists, a five-part document :mplexity classification scheme is proposed to facilitate systematic analysis. This III

46 classification groups documents into the following classes (in increasing order of complexity):

(a) Class 1: Basic Text - Only Documents: All material is in a single font, with a single pitch and uniform spacing. An example of this class is a typewritten document, as shown in Figure 9 (a).

(b) Class 2: Single Column Documents with Multiple Fonts and Mixed Sacing: This covers text-only documents with proportional spacing, as well as typeset and laser printed documents with multiple formats (such as bold or hyphenated). A sample Class 2 document is shown in Figure 9 (b).

(c) Class 3: Single Column Documents with Segregated Text and Images: Such documents contain all material in a single column format. The text is justified or hyphenated and there are some images. These images can be easily separated from the text (separate zones for text and images), as in the case of the example in Figure 9 (c).

(d) Class 4: Multicolumn Documents: Such documents contain two or more columns on a page. Although they have mostly text, there are some images and tabular material. A printed page from a newspaper will fall under this category. A Dr. A. Gupta -2- May/86

- Figure references are not consistent (some with, some without parentheses). - The references quoted on page 6 are nowhere indicated in the text, except for the * on page 5, line 14. - The figures are of poor quality. Figs. 2 and 3 are unnecessarily complicated, Fig. 4 lacks one legend in.the ordinate. All the above could be corrected by a complete rewrite. The idea is interesting, having a minimum configuration microprocessor display current, power and maximum demand by a TLU method on current values obtained safely by a non-invasive current transformer. I would still question the following: - Only current is measured and the data that are displayed are based upon, previous, actual current and power measurements, stored in the table. As power is still a function of current and voltage (and phase angle if the load is not purely resistive), the results will be in error if the line voltage changes. In addition, unless it is the intention to use this only on one particular load, the type of load will influence ^ the results, making this system not quite general purpose. - - No mention is made of the actual hardware used. From the references I presume it is an Intel machine. The type of ADC (speed, number of bits) and the method of display (printer, 7-segment displays) are also- not mentioned. - Page 3: "for every possible digital value, the current and power are determined and stored ... ". In what format? The description on page 4 and the flowcharts of Figs. 2 and 3, leave much to the imagination, unless the reader knows exactly the configuration of their microcomputer. The references to the "status", "addresses" and "data" field suggest to me that some type of single board computer, that has these fields as displays, was used. Can it be assumed that all readers are familiar with this? - If I follow the flowchart in Fig. 3 (maximum demand display) correctly, when a subsequent current value is determined to be less than the previous one, a search through the complete table is made, using the same, old, input data before displaying the, same, results. I don't know how much memory is included in their system, but surely the previous value could be stored somewhere to avoid this unneeded search. - Similarly, if the next value is determined to be higher than the previous one, again a complete table search is made instead of starting at the address of the last (lower) value. - In the three phase measurement system, a simple two comparison schedule should be added to indicate the highest load, rather than leaving this up to the human operator.

FIGURE-9 (a): SAMPLE DOCUMENT - CLASS 1 III

HIGHLIGHTS OF KNOWLEDGE-BASED INTEGRATED INFORMATION SYSTEMS ENGINEERING

AMAR GUPTA AND STUART E MADNICK

Large organizations must necessarily rely on multiple computer systems for a number of reasons, such as the increasing size of the organization and the growing reliance on computerized data. In virtually all cases, dissimilar and incompatible hardware and software systems are operating on a concurrent basis. While these systems may meet the objectives for which each was designed, their heterogeneity presents a major obstacle to ready access and assimilation of the information they contain.

The objective of Integrated Information Systems, or Composite Information Systems (CIS), is to mitigate the problem described above. Such systems must be geared to span applications, functional areas, organizational boundaries, and geographic separations in order to present a unified picture to the user. While designing such systems, it is necessary to look at a number of inter-related strategic, technical, and organizational issues. The goal of the Knowledge-Based Integrated Information Systems Engineering (KBIISE) effort, highlighted in this report, is to survey the state-of-the-art of methodologies for addressing these needs and identify areas needing increased research focus.

Strategic issues include motivating cooperation between multiple organizations, each with its own glis priorities, and security needs. One critical success factor for such cooperation is participant consensus on the issue of access to each others' technical and non-technical information. There is an urgent need to clearly define the domains of shared information, the potential benefit to each group that participates, and the role and the responsibility of each constituent.

Under technical issues, the evolution of distributed heterogeneous information systems is studied. Being inherently more complex than conventional databases, such systems require powerful semantics and update capabilities, as well as sophisticated concurrency control and recovery mechanisms. Both the semantics and the syntax of individual queries and updates must be mapped across systems. In addition to physical connectivity issues, it becomes essential to develop new techniques for incorporating logical connectivity across systems. Such techniques combine ideas from the fields of database technology, communication technology and expert systems technology.

Organizational issues cover the process of making controlled changes in complex organizational environ- ments. The prevailing theory of inter-organizational networks explains the multiple forces that modulate behavior of individuals, groups, and organizations. There is a need to develop focused standards to serve as the foundations for neutral representation as well as for the development of more elaborate standards.

The problem of distributed heterogeneous inform; tion systems occurs in many disciplines ranging from manufacturing to banking and from maintenance to logistics. A number of government organizations including NASA, NBS, and different agencies of the Department of Defense are faced with this problem. Within the U.S. Air Force, several efforts are directed at finding solutions in this area. In order to attain success, it is necessary that government, industry, and academia work together to develop common standards and to fill major voids that exist. A plan for concerted action is developed in this report.

FI~GURE 9 (b)-: SAMPLE DOCUMENT - CLASS 2 ATTACHMNT C

Materials for IES AdCom eeting (May2 4 ,1985,Toronto) M aterial--A

Suggestion For IE Society Enhancement

Objective To promote enhancement activities for the purposes of increasing IES meter- ship and improving and strengthening IES functions, image, and effectiveness.

Overall Plan

i.. 1 .…aw.1. .. _ ;__ .. ……..... ;..: _.._ 1 t1e overual plan o nnance our soc3le;y InVOIveaS addressing four areas as follovs: IES EMBERSHIP 8,000 1. Method of Promotion and Scope By 1990 2. Goal 3. Enhancement Activities 4. Assessment of IES (status of IES)

Each of the above areas will be addressed . in the following sections.

1.Method of Promotion and Scope The enhancement activities are aimed at invigorating our society. These activities encompass all aspects i -.A ! - I1 1I- -1…,. L - - -… - - ,- &E - - - - __ wnlcn are lkely Co improve cne managemenc ezfciency The IES's GOAL is a member- of the IES AdCom and they extend over a wide range. ship of 8,000 by 1000. This barometer will track To promote enhancement activities, progress toward that goal. ... there are 3 promotional methods to be used singly or in combination, depending on the nature of what we are doing; (1)Top-down managerial activities from IES AdCom (2)Technical Committee activities which extend horizontally (3) Section/Chapter activities which have a bottom-up effect

§ Society activities with team work and cooperation; see Fig.l-1

FIGURB A (c): SAMPLE DOCUMENT - CLASS 3 112 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. IE-31, NO. 12,MAY 1964

TABLE VI MICROPROCESSOR OPERATING SYSTEM SUPPORT BNCHMARKS--STACK EXEA!SER [81

Ta N d Pu pb Tia p TA vim-tablu h (e(ds(c) hWE$&r (ddU

I I0 2 Il 13 4 =0 434 5336 2 laO I 2715 2U 1 O 3332 7938 3 200 2 343 3440 44 4236 13 10320 Total 12427 971 23S9 (1)+(2)+(3) 3 Ptrfenanow nuum Ho 1.00 ,. 3.4

TABLE VI GENERAL CHARACTERI OF 32-Btr MICROPROC!MO ([1

MLOW-.h Mt ago CM

TICnoLO I.as t. sm.r, nSU 1OMWOCMOs O.OP1F uASON 4.lIIS 4.3 219.0.0 O I $ SIZ OFC 10.003 MII 4.4 MAI n .rm ,lL i05l 0.SIPAIT ./@WATT A I IMS 4 WATo 2.5 IAVAoIW PICOMIT U ACTIM 83 Po4 ,4 TOTAL W4ASIC X C o 1II r1INC l m II II

1O00.Qf IlOIt 6r t4 , zSM LLA l"lmuAIN vlSIIMVW

GIOINSf V156u.IAI0o GEIP TOvUs" h0 0F 0 16 2 2 NSITnCTO4S moOF ACOOMs S i1 10 S

'Curnteuy for iteral use only.

TABLE VMI EXECuTm N TM S(21,1 [61, [171

inMAC14 LANGUAi4 IWN TIM( I ILLISICOIO SIZI S*nCN S4EvlE PLZI. ACs C 32 14 20 9400 4 l~.11t710 PASCALtUNIX) 32 I 4 220 11 w 70 PBSC(VMS1 32 1 4 20 1 .53 C 32 4 7 ?4 37.100 710 I6 Is tMM) PASCAL 14 5 3 10 32.47 11 0 PASCAL I2 50 960 32.320 12.323

61000 itS6MI) PASCi 5 3 Itg 910 27t0 PASCHAL 32 1 5 244 9200 200O

80*60C MWl PASCAL 14 7 3 7?4 44 000 111 '32'4EL 3 II Mtl ) DA 1 6 * "s 4700 47t 00 502346 NltM , PASCAL IS 1 at 91138 2213

02"r IC UNlt) PASCAL 1 11 7311 1774t35 NP 32-' CPU, PASCAL 32 Na "A 7 259 (Is MNHt

NIs I1Q3 (?7mtNl SCA. 32 NA NA 24 "ot

'Indicates expcrimento prolowpe. "Indicates vendor-pro'ided nfortiatio. be monitored. Consider, for example, the machine tool appli- mined by the ability to maintain noninterfering profiles. The cation shown in Fig. 1. There are several independent variables latter aspect is dependent on the communication bandwidth to be controlled and monitored as follows: between the computing elements. The overall performance of such multiprocessor configurations is affected by the a) rotation speed of parts, number of processors, the communication mechanism among b) lateral movement of parts, the computing resources, the characteristics of the computa- and angle of each of the cutting tools. c) lateral position tional workload, and the control program. Whereas the major To increase productivity, it is essential that multiple tools constraint in single processor systems is the speed of the must operate concurrently; also, at no instant should any processor itself, the major constraint in multiprocessor systems tool interfere with another tool. Each of the independent is usually the speed of the interconnection mechanism used variables can be monitored by a separate microprocessor, for communicating between the computing elements. but the overall concurrency of tool operation will be deter- Fig. 2 shows an example of a multiple microprocessor-

SAMPLZ DOCUIMENT - CLASS 4 GUPTA AND TOONG: MICROCOMPUTERS IN INDUSTRIAL CONTROL APPLICATIONS 113

Fi. 1. A typical machs tool pplicaoa with mudi_ too,.

LOGIC OUTPUt TO CaT ON PANEL

TO MACHINE Fig. 2. Computer system configuration for machine tool application. based multi-axis machine tool control that ses a shared microprocessor tasks. In each case, the program code resident common data bus. Machine tool throughput s imited not so in each microprocessor subsystem has been optimized to make much by the number of microprocessors attachable to the minimum use of shared memory. For nonoptimized programs shared bus, but more by the utilization under load of the in which flags and status registers are maintained in shared shared data bus and data memory. The memory utilization memory, frequent accesses to shared memory are essential. for two typical functions executed under the multi-axis This often has the undesirable result of driving up memory machine tool control environment is summarized in Table IX. and bus utilizations to 70-90 percent. At this level, queuing The total utilization figures have been broken up by principal contention will have a severe adverse impact upon system

P'IGURS.9- (): SAMPLE DOCUMENT - CLASS 5 III

47

sample Class 4 document is shown in Figure 9 (d).

(e) Class 5: Integrated Documents: Such documents contain both text and images. A typical document of this class contains multiple columns, with several charts or illustrations within each column, as shown in the example in Figure 9 (e).

The above five - tier complexity classification scheme is utilized to evaluate a broad range of products in Section Six. The five sample documents shown in Figure 9 were selected after extensive study; they are used for the purposes of evaluating products and validating the taxonomy.

7.2 Document Ouality Since the performance of a scanner is highly dependent on the quality of the input documents, it became necessary to carefully control the variations in the quality of the documents used in the benchmark tests. Although it is

difficult to establish rigorous measures, documents can be broadly grouped into three classes, based on their quality:

(a) Low noise documents: This category comprises original

typewritten and typeset documents, with normal leading and clearly separated characters. Skewing is absent or negligible. In addition, these documents have no 48 hyphenation or kerning.

(b) Medium noise documents: This category comprises original laser printed documents or high quality dot matrix printed documents, as well as good photocopies of such documents. The contrast is good and skewing is low (under

2%). Further, the characters do not touch each other.

There may, however, be some instances of kerning, hyphenation, and uneven leading.

(c) High noise documents: This category comprises second or later generation photocopies with broken segments of text and characters touching each other. Usually, there is low contrast and skewed text.

The above three - tier scale represents one measure for defining quality. Strictly speaking, quality is a continuous variable with multiple dimensions (e.g., quality of characters, quality of background, contrast ratio and amount of skewing). Consequently, this scale represents a first level quantization of this variable.

7.3 Recognition Techniques

Recognition technique is a qualitative variable that tries to capture the sophistication of the technique used in the recognition process. Various recognition techniques

__11___1______III

49 such as matrix-matching and feature extraction offer different capabilities for reading. The implications of using different recognition techniques were examined in Section Two.

7.4 Man - Machine Interface In order to minimize the total cost of scanning and editing documents, one important factor to consider is the interface with the reading machine. A higher-speed system that requires special skills and training of dedicated operators may, at times, be less desirable than a lower- speed system with a very user friendly interface. Two of the evaluation criteria that represent this variable are trainability and document handling. In addition, it is also important to examine the interface between the reader and other computational equipment.

The concepts outlined in subsections 7.1 and 7.2 above are independent of the equipment utilized. Also, they do not require an understanding of technical terms. Document complexity and document quality are therefore good variables for an evaluation exercise. Such an evaluation is documented in the next section. 50

8. EVALUATION OF PRODUCTS

The number of scanners available today runs into the

hundreds, and it is very difficult to generate an accurate

and exhaustive comparison; even if it could be generated, it would soon become obsolete. Consequently, in this paper

only a few representative products have been analyzed. The

list is as follows:

(a) Datacopy 730 Low-end scanner

(b) Caere Corp OCReader 500 Series Hand-held scanner

(c) Scan Optics EasyReader 1720 Low-end scanner

(d) DestScanners PCScan 1000/2000 Low-end scanner

(e) Sharp JX-450 Color Scanner Low-end scanner

(f) Truvel Truscan TZ-3BWC Low-end scanner

(g) Kurzweil Discover Model 30 Low-end scanner (h) Calera CDP 9000 High-end scanner

(i) Scan Optics ReliaReader High-end scanner

(j) Kurzweil 5100 High-end scanner

8.1 Results of the Evaluation

The results of Phetests on these products are

presented in Figures 1-12. Figure 10 depicts the relative

performance of the systems in terms of a document complexity III

0 o A L

LL 0~~~0 y~~~~~~ UF U

0 0 * o0 * .2 I- -

z; I.->. a: * C- ~~~00g z 0 U LU X ~ ~ t - 0 00 CL~·C

0 E u~~~~~x~ - o COI X _ a: t

a 0 o 0.

C 0

V'" 1* E

* 0 *t O <:~~~~~~ Z 0 C~~ Co * - 2w ~~~~~~~~~~~~~~~~ LLI~~~~~~~V~~~~~~~z~0 * 20*

0c 0 00~ ~ ~ r -

0 a,

LUI L I I

o u >E z_ zE "e z

=00 0 ·, o -E 51 versus document quality graph. In Figure 11, relative performance is measured by graphing document complexity against scanning speed. Finally, Figure 12 maps the performance of the systems on a column and graphics - handling matrix. A more comprehensive comparison appears in the Appendix.

At the low end, all the scanners were able to read

Class 1 and Class 2 documents without much difficulty.

Class 3 documents were read most successfully by the Scan

Optics EasyReader and the Kurzweil Discover Model 30. None of the low-end scanners was very successful with Class 4 and

Class 5 documents.

All the high-end scanners were able to handle Class 1,

2 and 3 documents. The Scan Optics ReliaReader was not as accurate as the Calera CDP 9000 and the Kurzweil 5100 in the case of the Class 4 document. The Class 5 document, with no clear separation between text and graphics, was handled most effectively by the Calera CDP 9000 system. In the case of such complex documents, the process of editing and reconstituting the original format is time consuming, exceeding ten minutes for the sample used in the benchmark study.

Characters that touch each other and those with broken L

to

a U IZ z : 01

Z : O C _ _CE iAS... ,, 0 O

6 _ o Q U0 0

0 OCLC a E 0F anow ' o a C4 0 0 cJu y r ; 0 Q 0 zo ° L Uo a

Z * (3 O U .~0 -

0 00 0~~~~~~~~~~~ IQ

1 I

LU . -

eOc U. 0 0 0 0o o. 00m

O- -

0_ . c.OS z x !Qa

a o I: z a. -J 4) I- N 0 zZ S Ul 0 L : ~Sd Sd I:

c a 0 m -m U. w . o o (00. -.iI-

a = -j (0' ,od 0 0 cJ 0J 0 A o e · t- a0 _ Q 0 Lu a o ca z 0 0 C 0 ar > a c 0 . ' _ C a a a a > 0 O I- am=c O S a. U- P=wl mr

0 .- -

=I l l-C aC S 52 strokes were the major sources of error for all the systems tested. The complexity of the document being scanned

severely impacted the scanning speed and the accuracy. The accuracy of all the scanners was found to be highly sensitive to the quality of the document. Even a typewritten document caused a significant number of errors

in cases where the quality of the documents was low. A single handwritten mark or even a speck of dirt is a potential source of error for the reading mechanisms employed in most systems. 53

9. CONCLUSION

The image scanning and character recognition industry

is undergoing a period of rapid growth in which different

technologies and concepts are being amalgamated. The

traditional frameworks for classifying various approaches in

this discipline have lost their relevance. In this paper, a new taxonomy was proposed. This taxonomy is based on the

characteristics of the input, rather than on the application or the price of the product. Based on the quality and

complexity of the input material, it is feasible to predict when off-the-shelf technology will attain the maturity

threshold needed to motivate the adoption of these automated

technologies in a particular industry. III

REFERENCES

[1] All About Optical Readers, Datapro Reports, Datapro Research Corporation, Delran, NJ, 1989.

[21 Ullman, J. R., "Advances in Character Recognition", in Applications of Pattern Recognition, Ed. K. S. Fu, C. R. C. Press, Inc., Boca Raton Florida, 1982, p.2 3 0 .

(31 Market Report on Imaging, Frost & Sullivan, Inc., 1989.

(4] Shurman, J., "Reading Machines", Proceedinas of the International Conference on Pattern Recognition, 1982, pp. 1031- 1044.

[51 Lashas, A., et. al., "Optical Character Recognition Based:on Analog Preprocessing and Automatic Feature Extraction", Computer Vision. Graphics and Image Processing, Vol. 32, May 1985, pp.191- 207.

([6 Baird, H., Simon, K., and Pavlidas, T., "Components of an Omnifont Reader", International Symposium on Pattern Recognition, John Wiley & Sons, 1986, pp. 471-493.

(7] Masuda, I., et al., "Approach to a Smart Document Reader", Conference on Computer Vision and Pattern Recognition, McGraw Hill, 1985, pp. 550-557.

[8] Kida, H., et al., "Document Recognition Systems for Office Automation", Proceedings of the International Symposium on Pattern Recognition, John Wiley & Sons, 1986, pp. 343-362.

[9] Hou, H. S., Digital Document Processing, John Wiley & Sons, 1983.

[10] Suen, C. Y., Berthod, M. and Mori, S., "Automatic Recognition of Handprinted Characters - the State of the Art", Proceedings of the IEEE, Vol. 68, No. 4, April 1987, pp. 469-487.

[11] Harris, B., "Characteristics of Imaging Systems", Byte, March 1988, pp. 76-87. (121 Mason, J., "Error Rates of Imaging Systems", Imagina, February 1987, pp. 42-46.

(13] Johnson, R., "What High-End Scanners Offer You", Computer world, April 1989, pp. 17-29.

(141 Tanaka, Eiichi, Kohasigushi, Takahiro and Kunihoka, Shiamura, "High Speed String Correction for OCR", Proceedings of the International Conference on Pattern Recognition, John Wiley & Sons, 1986, pp. 340-343.

[15] Wilson, P., "Error Correction in Sophisticated Scanners", Imaging, May 1988, pp. 78-89.

(161 "Survey of Scanning Products", PCWorld, May 1989, pp. 43-49.

[17] "Networked Systems in the Automated Office", Business Week, August 1989, pp. 45-56.

[18] Report on Scanners, International Data Corporation, Framingham, Ma., 1989.

[19] Buffa, Michael, G., "Neural Network technology Comes to Imaging", Advanced Imaging, November/December 1988, pp. 42-50.

[20] Kapoor, Ajit, "Electronic Imaging and Information Processing", The Office, December 1988, p. 56.

[211 Dollard, Tony and Odorisio, Linda, "State of the Art - State of the Industry: A Review of Commercially Available Optical Disk- based Engineering Data Systems", Proceedings of the ATI 87 4 56 4 7 8 Conference, Monterey, California, February 1987, pp. - .

[22] K. S. Fu, Syntactic Pattern Recognition and Applications, Prentice - Hall, Englewood Cliffs, NJ, 1982.

[23] Nandhakumar, N. and Aggarwal, J., "The Artificial Intelligence Approach to Pattern recognition - A Perspective and Overview", Pattern Recognition, Vol. 18, No. 6, 1985, pp 383-389.

[24] Rich, E., Artificial Intelligence, McGraw - Hill, New York, 1983. III

(251 Mantas, J., "An Overview of Character Recognition Methodologies", Pattern Recognition, Vol. 19, No. 6, 1986, pp. 122-134.

[26] Ward, Jean Renard and Blesser, Barry, "Interactive Recognition of Handprinted Characters for Computer Input" IEEE Computer Graphics and Applications, Vol. 23, September 1985, pp. 231-240.

[27] Berman, Ari P., "Image Processing With Embedded Expert Systems", Advanced Imaging, No. 15, November/December 1988, pp. 51-60.

[28] Jones, Tony and Safdie, Elias, "Scanner Selection - More Important Than You Think", Proceedings of the International Electronic Imaging Exposition and Conference, Prentice - Hall, 1987, pp. 341-351.

(29] Brobst, Paul L., "Fax Networking", Proceedings of the International Electronic Imaging ExPosition and Conference, Prentice - Hall, 1987, pp. 512-522.

[301 Stern, Randall, "From Intelligent Character Recognition to Intelligent Document Processing", Proceedings of the International Electronic Imaging Exoosition and Conference, Prentice - Hall, 1987, pp. 236-245. APPBNDIZ

CHARACTERISTICS AND CAPABILITIES OF THE

PRODUCTS EVALUATED IN THE STUDY III

O

-.a4

= l I l I .04) 4) O I 4 0 (U Q1.4 00 O0N r4 o 4.4>4 (U O V 1D a02 -4.,.4 Ca U 1,I 04 aU (U) re o >4 a 0 3m -4) 0 mC.) a . 4 ) ea u 4 o C4 M 0 0 -4C 14 oU z 0 W cU w Ca z.40 1: t O ' z '-4 T l . ------E.4 1 I .1 ,-0 w o 4: -, a9 41I I SJm U .4 .,4 ,' 14 (U I C (0 .4 43 0 >1 I .1 a4 .. i U) c 1 4 . C W M 24 arlu-) . - 102 .00202 C .-s 4) o e ;3 m I 0 U -4 C .94 0 c 4) .,4 02 on .4 0 4J c H Ln C m0 0 Q4) wX 0] , 0 (U w~z 3 4) -.F4 C C.) w 4.) 4 (U ..4 1.4 C O0 m 01 o I ·(U 0 02 PO m re *C E 4) 4) 4J w SU 4. O W0443JI-s 31 24 " 4 O '-4 3 024 · ,' N l .4 a VC 1.4 04 C ., - O3 1.4 .,4 Ua z ad · .. : o u 0E, . >a 4 a U 0 In 4-4 · O: 0 w

------l c: l . 0 0 (1,) O 0 0 , wt 0 cJ mU ul ocU U FO0 . 0 ,. 4-4 .4fl UN m 4) 134 a 02 C 4)24 O u .,-t u C)E4 1.4 41) rnU 3 a4 41) 4) O ao3 0 UW 4).j.)4U Q £ 4.1 w (l 4) .p40 4. 4.1 4) 4: cn .1 02 cn(U 4-) C u 1.44) a4 W3 3 - a' 4) 04 4) Ow LP £ O 0 >4 a CN u p4 z Z ,-1 .i( CU U E-4 4- C U a4) 02 o .0 r QJ 02 ea E I ., Q -,1 0 54 U 0 4)Q X c4.) . 0 0 0 cIO_ z 0) C > N t_ 4) a m. 4 z W a3 0 z(n C, -i "· C ,, _ = _ Q U I cX 1 CU E-4 z n .e = .1-s 0) I m $UCC w -n .C' Z I _ ~ . L.e: M U 0 u- U H 't . -4 - : . ,t - ) .- ;3 0 C ,- -": 02az E -J C CUE -4 Q) C a_13 Q1WA 14 . Q(U aM I 0 U u0 L- C I- c s4 cn Q4 > ) E-44 2; uV 4)Q o - I - = M: M - N C 0 - 3 0 W4 W 0a0; W wu C" I : = u Z r~ j k j j I ' m I(U

0 0 uV.I-co -

L4 '-400 a ,.~-4 " ,. 41 Ln 41 31 j4 44 - 4 u r C C- Q4 .) n X (U (U (1 U U 4 0 0 0 ' 4;. 0 r, II 4 Us r X *I: 4 I Y t a z O0 V E-4 4 O o Q t 4 0 4., e x 4-) O J x O S -~e O (V O 1 Q O x C :32ol ~$ ... 0 mQ U;U C0 0 44 OX1 >4 E-44 0 0 4 Q.

W 41

' 3.- c E-I P4I OLv 1 S4 U M Q 4 W * oc o aQ a " U) 0 u cS CD O .- 4 0 I,cnW o ; -H u v C m si a ( oo U) 1%w onCZ o .u. Q 4)c Q0 0X X e, 4C v fi 0O ra Q40 : N >O o ·Q14~' -0U (U (U r- -41-4 )4f 0 *" ., C c o O _-4 V u4 0 X co.xn m 3 . *V E- : C QO4 24 051 II0 ZL O4]UL3a U OQ O U; 0 4 > i 4 Oo 41 X Z4 cQ. . ... X(.

I4 U 11Uu~ m 0 4 CO U 44 4 W S4

41 O 4 La tie U S.. U 4- 1 .j H E-4,c w a i 1 Q1 4 : u a . 3 4 Q0 O X - 4 3 . c3 0: U ·- ~ (0 ( a U :- - C UI 4 o X0UO , U 0 4- 2 U *H0 z: C v 5 ' X Ia 0O Z O

u U X U0 'Q..- X u4 U*( x c N r0m o b ______>4 E o m , \

n~~0 I I H !1 3 a I 00;Wi mrl i Qf 1~4 3 I; I : il * z _ I 3c 41 ) i U -4 X I Q I W ii n Xt <* O0 3> c I 3 i 3 0 U 3 0 N iE- m0(U| 5 " 4 6 3 3 U 0 4 1 i U i > 0a ( .

[ >I U Q- xU tD ~Ji;|XXEv W | V COc |u~ = OCi| 111

--l l I - I w I OCO -W- 43 3 C s O - Q0 0 0 r. z I -,H CO $4 $4 w ·- U 4) 4.) 0 O 0a PC 0 $4 -H 4-4O C 04) 43mv cC 4 N Q M 44 IC 4)(lo =.4 43) 430 0 .-0r.l4 ..) 3 m la c w *,i 4 0 -4 ua -H > II m w -H m -4-) 43 CN C E O 4 I 4 m ea W x 2C-rs 4 OQs 0 0 0 O Ccio 0O O003 Q 44 I 4. - o CZ 0 EOU. Z43$4 E; 4 0 Ec43 Q4 0 0$4 043 4:04 )C 431.. 43 04 Q400 cn E C E P 4 $4 (n 0 Z b | __ I l l - ra eU i I 4 0 I $4 I-,t I 0 E-4 I MO 0 O 4 204 e1 .,.-H 0 $4 CO 4-i 04 3 Z a C' ' C 0 cM 0U a w N N 4 3 14 ·-i i 4.1 -H O 0 0 -P4 Q( 4-n - H CA 4-4 n43 04 o ., a3 ·- H 0. 43 r C W 0 ~ . O m I C . 43 O OC CO 0 -a u uw o-Ho 04 9-H O0 COw C -H4 $4 C *, a 0 40 'U CO -H O ,) .,- 3 ill - -H 0 4-4 0rq 4i 0 O 4 C CO 04$4 O a W3dw 31 It O -H Hcn0 N Q) $. 0 $4 4.) O C -H 0--a : 3 O C EO . a4o 'UO E-4 z 0 0 u0 .-H 4. to H 0 MI C M Co a0$4 '040 04 0 . 4 U $4 o C 44 H4 l . l- 2 I 4 4MI 04 0 $4 I 4 o 44 3 U o o o COU w C - 44 4 (4 4. 3 *,4 r-1 zci E-r C (U 43 ., $41 u 0 C U) CO 04 44 O .F4 w .r4 u ,-4 En 03 (O o43 43 3:m HC-) >4 L0 L4 444- u >4 0 C .0 $4 O I 0 uO .) Z 43 43 0 H (U CO; C 0O -Ha4 ~3- 4- CO E-4 .,-.I >4-) M rUC Q L4 0 C H 0 O4 f -cH cq 0OU= O O (U _ 0 C- CO 4- 3- 43 L4 44 0z 0 . -- 4 m 043 C $4 $4 .q 0 cn (u >LI3 0 o O >4 M, 0 (v z iH 04 4. ' C 4W u. C J,4 I X Sm o Q 00 (l Q H 04-40 U 4 4s 1-H W4 H 4 -H >1 O - VO CO -,. 4-i 4=) E- O 0 .-4 .-H H z I l N .H1 04 3 $4 I4H C V 4 .,D (1) H- -H>1 U H 0- , .C: C) M 0 O V LJ ss I j - ( u < lu H -H .,t U O U - a) - re cr O ,i ..H 1 OE4;(U C O -li 4 0 O $4(U -4O Q. (t m QC- I EC4 Oc 4(O 0- 0 $4 0 0 ~Cz OE20M C-; cu u~ o- o O~.. - - .

i 4 V I41 u 'U 02 4) 4P I 0 a kQ CO04441 14 a.4 O O O 0 oO0 0 O a; a 0 a44 0 1 0 C4 L)4 - . o03 I ~4)ON - *4 02 ,,- 4 4401 E-~4) > 04 Q HE-4 CZ ¢J 0 0 4£ m 1I.4S4 I- e 4 4 i 14 0 0 H ·n E- 4.C 0 ·. E 03 0 0 z 4-4 C X3 UIO H"O Uu c o0 4) 02 44 ro-4 04 .4 u E-40dc i uz4) '-4 m f C E-4 IO C.I (0 U 03n 0 31.41. 14n Oa '.04) 4.a 0 a I4)O 0m 4 siL 14 0 ¢4 c )U4; 3 cm N 04 U *-4 r-o E. O Z C3 cuV

l l I ) I. a0'1-2 0 0 4- .0 (U 0 I HU I la N0 Cu4 4- J)4 1. CdCa H E. L m C IT E4 'U cNI- C) =4.1 C C. 4.1 X l m e a) W C,9: 041 .Q1 ui Iu a7 4.1 u Ir .r;( I U0 O1V2 1I 0(U C w 0a 4 V EHn O H c)I ) 0 102 : i _ Mr 4c 3 94 !- 4U C -4 L C 0 a rd< 2: = a t 1e m 4 -W u 4.1 4) I 0 ) - 4 4) . O C:4I _ O -i,, 3 C O I3 0l8~2 ;1 U z Z L -3j M m H 0 4-2.0 3) a) HH 4:L '-O . IOS; n Zn I 'r Eua0 .,.3 i'' = ¥CI] > I -a 3- 0 = ~~Ot3 i¢ w (m w I. t u , J Ei I = . III

$4~~~~~~ I I

· ,. " 0 M C0 4i S. 0 0 ~J·~~.'aO a O 10MU a 3> a Q .H a r a V 03 ; CTe Ca c a a iJ aa -¢ .- 04 ** O m a a a o s a

pt e ^41 411 Q U O) Q,'rLOI4 C4 C.1 44 A: ur a *H c, U Cc PC I _ a re O .o 0O w C-0 a .0 0. .-- ·.^ a rj Pue e.,- CA a de zr a~~~~u a ;r4 a rz C L r- .ra a V uC3e d O 0 Oo31 rar E-4 U W C P1 4 a .H cJ o C Usi ·4 -J ~ ·I- H a3 4~~~~~~~~~~~~~~~~~~~~~, Pcn o - 02 .HW-Q) ,.C·c cnI o ffi Qo ol . E

C tv 8 ° a av c wo Yr r· O _~ *H o~ a e re · 4~ DA ocn 0 , F )., U 0 S . k c c Q) a rn Il 0 0o k a 4 Cn3 wc 0 M v v Q aa v> 1- W O. X a ·*H o c E-4 Z r4 H -Wu HI *4 HI PE4 o (s1 4 (O go z o I e c s E 4 Ura ou su | ; a u c e O ro a Q or C C; crc 0ru U X~~~~S_ a . £ >4 ( a wE-4 m~~Lx c _a% u .rl o a Q ^4 L(1i - .H mE z en a X; X -H 1 a 4 C c x - ~3r-4 4 -J Mc

En a O0 O CT a) c, _, a C uQ Q3 4£i n H1 fi X X O: E- or · ti Ua ·~~~~~~~~~· 4 M a u a Q) a a x o 3- ·c QaZ P Z 3 V W 4 - C

Zr Z v ' SE 0< E· E z O~~~~~~c,C ~~~~~~~wS:; I zO E-4 M UX V <: w a O Ez c) LI U

OmO~ WWLa mm 34: :H n-0 32 >W1 a4 X1 ma, O Com w37 > C; f 1 X (1 :>4 O > O Ed : Mw 0 44

Q -4

- .0 - . III - -- I N . 1 -0'3 I .^ ' a) 4-)V u 3 r4 4 4 tis .-4 02 -".4 - .C V' ol1,-4 I m i m4 m Im .9.4 (U) (a a4 (U ·P4 I L4 "-4a,4 w 4C a 02m -.24 (4 (U a C om0 P-4 n L Qj N m 9-0Cm 'V O C' 'r 4 o 4o $4(U-I a ".40 1-4 0 44 0 m 4. 0 ad 3 b 9-coIV U N a o CV. I 'Vi 14 C _ 'V4- C W 0 O ( > 3 o V - 02 'V'Vj m02 O 0 m 'u o4 "4 o 0 -4-(U (C .I4 m 'O' C, 0 4 'V Z 4 0

-4 - - II - - II I. oc E-4 .r41 z w 0 W w .4 C)IU o 0 w9 w02 (1U E2 C C w a .-24 4. m V 2 0 E u m la 02 I 04 .,. II*4 q ru la.~0 , 'z5.; - ,t U'V 90 -4 cn0 0 -iX 4) 0 (1c00' IVO u (U 'V2 ro~ o a, -4X 0Mha O C F (U -4 .,W . m u) _ :r Ecl4 o~~~~~~~~C1: Q 0 o~~~~~~~~~~~~~rr co :-4 a O + sw O 41 Z Sm' ' ,,,,, I -Catm .tvO U 0Z w0 I-s: .Vm -4 I CU PC) .i C 0 4.,elw C14 0 o 02 N0 u L4C -4 zCZ) (U 4 U 'V 14 -4 :0 3 wl .,Q IC 'V v IVuu 0t U)946 I-4'V cn a Zn .-4 >4 .XI(UC-0 V-. "C ruI" 4 i5 MIV u U 'V --4 IJ ul4 4r la C Io . -4 .9-s E-4 04 ra(U O ( w u L4 --4j4 0491 11 A 'V 4: o I 'V L4 0 ,-4 _r W 0 I v.-a,4 4 u- r-qmr 02 C s Z 4- 2 C) 44 I_ 0 n - I .z iC~~~~~~~~~ 4. 4 ' I u ! z , o CO aA 014 I m Z >iz N 5- IU I u O1 VO 0,c. 0 u w ' PL a , V IZ,,~ >.,.4 I--_ V;,i .4Q. IM , = m- 0 Iil < C 0 4 0 I a = 14 o) >C U I S< V a MOZ C.) r _ ' 'n Cm U0 N ( a 4-4 a )( ,,, ft M M - N ( O0 - M3 0 IzZ 4 ·ta g z V ! . PILI~~ ';t -- - III

I. I .

c u 0 CL) .r4 4- 4) 0 I 0 4) m ma 4-4), 1.4 4.4 at W(U w0 z C 3m 4.)X 0 0 -4. *1- 1I C 0 0 4) Q q O a 3 x C 0 (am ~4-3. I Q mo 4 .o :10 4)_ CPp z 4 41) -(U Q MI 4. (U 02 4- (Un E MI 4-4 0 4) 0 -o A D z >4 co W - E-41-42

c

.14 S: 0 02 E4 c .94 0 H U, 0 o U 3:4 a .r4ec CD 0 (U Po U,m rl ., -4 a 0 la0 a(U 4J .4 4) W O. 3 2 0 0 a' .0 I :94 X* Pc 0 0 34 4-) W 4O :4i 4-) 4-Wa4 024.3) 0 43 a .--(U E-4 ow aU CU 1: 4) z z >4 -4 - - - - f l cnru lz~ 41) N H C.) AE4H C0 0 0; 4) UZ; wX WE-4 Inu0,UH Enr V) O0 41) 4c D, 0 .94 S V E-4 VE (3O o\o -( 0E U U 0 (U X 1.4 w 0c 4.10 0 2 O (U 3-4 aLc0 Ln 0 4.) ; I tv 0 U-,0 L4 :4 O U, H a C)04 CU1-0 4.3ad 02 X 40.3 : CD >44) u5: M ro 1 z E-4 4-: J------I V a3 E4 z i mn __ 4) 0 4 z 4.3 a ·c ! i C) O z : ,^ ~ ~ ! ~~~~IV W C) Z - _- u at > 0 C 2 5: 3 ! i-I o 3 H ) o a a C O - ' O r· 'r (d U L4 Z O .~ O O 14 H t¢ v].) 1 , : 3- 4-_4 O W- I.A a 0 E-4 H a O _ a rQ: Z X C0 '4v11 ~ .4 > 5 ;.<. a H .14 m:C W = 0 >4 Z m ( C H I4 c- E-4 4U P O ·H _ - -> r= hr O O0 cn am -W W- l '¢ _ -)< H O >4 2 t 3 " 4 4 V = :Z C (Va OuS > CZ E- 0 V Um t3 C X s 0: =: a4 4-) x Q a OIIN 1. mO0 4) ! : X 0 4) ¢) J

_ , _ II( > 1 _ 3 1 Q4 . .' _j :> )0 .4 a ,a 4-C 4r0 o . 4 O (0 't 0 w0 - 1 >1 '0 oQ) '4 ' 4 im3 0 0-. (U *' C N>4Cm3 11 0 I 0 N.40.) .>O ; U: 1.~4.)1 P 4 a I : .14, il 4 0 . H Z0 S l , 4 t . 4 a

4:

az cJ U)uz ClE4 0 U Im0 a0 YC E:3 01 ,'0aC a 1 U Z a0 P 4) 0O C) 0C 4-a 0 0 0C , .. l4.C ; O ' I '- I 3e4 -4U 0. 4 (U 040 4 04

I-4tn E-4 H z (U o N O ~ (U' 00 0 , ' .J0 ::.i: 0C ( .C) c 4: U

rd U , , 4, (I . 4- 0 ___ '-4O ' 4>x~VU 9 U U4 Z

Ed Cl) U : 4z o r I : · I H x S DI o 1.4Q U 44 0)I -4 cn IX~~r IQi _4 -

> La w 0 w z 0 .,, 0o U02I U 4 oc_Z' E C . % a 4C (U 020. E-4 I Q) Z ; E 4 - O t I U X e 4:

U

: n: 1 3 V = Z a) J C O I X£ O - u4 * E4 I ., H 0n : 4 ) -' 4-' E I ( Q c ' 0; - V 4 U * .4O O -4 1. 4

U I( Nn UCS4)( H -oU C( UZ3

__ _ OA VE-44 3 .' U III

I . '~I

Ir~ ~ · rll~~~ Le 3 Q,~~*'> U UV 0 J.,.0

·o ~ 0 I . 0 C O C · 'w k-4 ,...~e c: w CO M,-I0 (U V . ( 44 o .^ I O Q0 O QV ( o L V -i ' 3 · CO O 0 L. .i . ' 4Jm C L QQ0 I. 0,..- , r Q- 0 Qw o O I 41 4 Cx / a . C O C W o

14-4 &0(V 02 0- NO4) 0 Q 4) m H affi d cH E P002 ; (fi0,o l W.~V r 3 .4 > I i u4-£ r4 L0 m c k._cw = O | OQJd mH < m o m o o o o a0 X s H E4

w 0 I - Ic : 0 . ,-H 0 0

W0 a * q c £ - ° _O XOI e0 l C4 0 W t..~a00.. a .(U- 0 0 . (n 4C~c~) o Q 0,-0 Q 4 ) ar· " a) a, <* 4 0 U 0 04 I M O 0V .V 0 U, o04 1 r.. , O-4. CQU OS 4- . O , ~ - . .,_.O UO I 0C ~.J (U m 02i 1 L 0 QQ 0 0( 04 HW4 uZ 4l H m0 H0 . O m E,,w V4H E-0 (U DU'-4H 4-)U -) .S 0 UV 4,0 0 0V 0.. C I-..w w; C4 o ( I*4- I - X 4e E-4O I-t O4 I aU zctU

Uw u V 0 .4-)I Z 0 > 04 0 3 V e 0 02 ' 0 4 - o II (oU u cn4VC)0O0: a o 4 - PoO 0O 0 , , 44o E-4 , ae CQ m 4.c~( w C 0 0>o H .Ha)C: O V Z rtj

U ( E- l 4VCn I H .4-JS4 0 £ cr; V n a . tD i 4i O I O uz u: O m uz 0 O O C u I 1 _ MIu2N la

II_ _ Z-04 0- ul uOL 0 _1_ _ > _4 _ I n wZ.CO O E O a s W I4 E - 0sW 4ia W3 C 3Z a0O 4 3 Z< Z O 4ih V MI = O 0n C ' M

H> I , C -'C Ul :D WI m

Eq I , v N 0 O 4 Q C 4> uz EV V ; *r T 0oO a

oil r=~~~~~~~~ .rla ~ raCJ , o C: .,4 .,.. ~ 1 ,. ~ · , II · . 4 3 ~~~~4~( o

w 0 ao . .,, C 4c c: v wmO,o i, 4 r mu ;., a. V 3 IC ' -*4 f- 4 Q$ . 4 4 V PC 0 > e 4- 4) UVo X tvH N a a= L40 -W3 C=4i % Vz 4-) C I 4 04 > 4 ~ 0 . 0O O t_ c C: 1 O II a O *H C a v a C a, O P e En MOIV Z a rnU] r a a a C Y vl 3

Z E-4 0 )3 . ·1~ we · ~~~~~~~~~~~L,4 m; CXO V e~~~C 0 E - u Ca, o0 c Q 0a iC Q C to >4 134O) o o V) u - - =lw b Q C t_ ~ a UV oO Z . cn a ¢o C © :. . 1· a . , .Qq > ~ 4.a t V X~~~~~~~~~~~~~ ad 4) 4-; -P4 ~ ~~o .r4 Io 0 O 0 .,< L4 :4 r C -- 41 L4 1 > m U u LI i O) 4i c)0-- · C "O Q 0> W4 L4 J * a a w Q f X I VUEf0 4 3 a a cC m Li 3 Z : C=Lc lo J u a z 0 0 V 0 F O o= 4wri E-

cOcMe b O _.zQ - 0 .~Cn C (Y 3 c 4) a a E 4>;~~a Q X I _- I ul 1 O Q v 0 3-' V ·-r L)I O £ O u SC 3Nf 4 C> sw H : : z v34 UqX cn a .dn(1 XLu > Q0 0 , O Edcn ue C i i I 3 3 r:a)c a 3 4 3 fi ·^ 3 _r az v c a w v Q O o _) rl*H·- W - a ¢@4C) 3 O fi 6 U > U I E V .CI a . 4O v- O f W 04 zI4 mU E a

C.

S t4 C s0 (l 4 z : uO CdO) A ;I S L4 > 4 (d

E-4 4 > aJ 4 0 E-404M IV E-1 l 3n

> :JZx 0 4-) o W z : 4 a o U III

0 c4

N

O

U O 08 0 I 084 :) 4J .4)0

E-0 00 0 Cc I m· mla I > ov a I . o . 0 m O ·· I0, HI V ,1e V O0 0 V

E- Umco z z n c v E t: Vd .,4O 541-4 Ch~ 0 0 -4: ·02. 0Q2O I 2n.,~0 , 0 I Z I s 1 - U 0 I Q . 4) 0 0 0 E W 54 Co

O5.4H 01 ' 4 i m 01 0 00 :::; 4) : ' (- C : C z4) .,, Co X~o I on m I .~ 3 4). -i 0m , O u000 s- Ed4 cnu I u ct 0M I a · c uz .l , c0 mO0Q m Q wd u I U - 3 41u , 4-j 44 "a >1 rnH 0 Zo It o - c- x4i x e ., q -4: C U om I ou o o,u - reCao a a)e ^ O(U

m a E-4 4 U a I cl cOE-4 '4: I ox O k 4) 5.4Co 0 H zu2 04 4 4- - 44 0 E4 l I u 0

4) O Cf)O m o o 4 P zroO c zuz I :zw -vC e- |1 C30 Er*-c; 0 wE 0N U0 3; ·0 4- u

I I _ I C

u accJ ii I u z z :; Uz U 0;= I (S C E- n

(om-" 14. 4 v02. H .-1 4-> 0 4J^ , 3t . I . *a4) _a u o IEiAc a) 'ra > 14 ~ Ii 4 c, m 43 n I _-t C a>

cn 0 ep I 3 C Imm Cal n

E4 C121.4sie C _ U4 Z > H 0 4 1-4f3h

PC1z U)nC E- #¢ Ilr·a C a a tCPo4O Crr 4 (a C4 _ l co n -4 OIU O U Z U u ocnI t ~D0 0 a r: I r > > > U . eCUt 04I-I a a 0 a 4 4.) n 14 Z I 4 4., 4, 40 4: 4i. 02 X 0 ' . ' 0'' 0 0 di tU ndE-4 A C.)0 ra

0 c) 0 . cn us4 4-)OCOO C41 E-(- >) S0 4) 4 H En u0

14H H ) C C) 4.) 4 C.) 4I= uC.)4 14Hr E U) Z *a C 4wQ a O c 1. 4 O = W .J O 4) 4) 4) Z (n 0 410 C CL >4 -44

H 14 02 0 O . 4- C in I V am4 ) Q- M > 4 > C -4 >i 0 z m i -4 O 3>4 O m ( H Q4) 0 tV. O0 40 O * - " o3o o 14 H 44 "-_ U- * 4 U4-W4 0 4- _- a C13 4- E4 H 44 *-4 u .4L a a * oO ) 4ZZ Po ; H .4 3 P1 h h Q1 4CUC C H' s O

Om.4C a4 .4 - a 0 mi 4 U 0.)45OU Z u .4 > a a a X u uu u E4 E = 0 0 a wU 3 [3 3: w a: E-4r < ad :n1 a III

klc4l C all z Tn ' 1 ° m m v3I 3= I,~ V v I .,-+ "1n^Ca · fa4 ~ ~ O a -o ~C .- COm o cX I x ee^^4a 0 V i w u 0moa U I _~ U ca P O a ._ 21 . , C cxN t av n ocg 14 c C us a Xa a OC r E I ., 0 I 0 4. ; .,- e , C I P1 Pa a m r· m o 'r a s VJe I Om H I oOa si o3 c,C c,o04 c4o · so CDO WX s 0 Ce W H is Z 0s:.~ 2: ~ W 3 i 4= . . X -W ) 4 Ed z w En wm, ,.= .,. z3 14 i.0 - 40 -'.3 raQ 0 04.4- m 41 u I4 4r4 n·- n3-I I a : 0 U - .- ra a)4)-r-4 -- 04--4 4 m C u ~o ~ ~ ~ ~ - - 3 r4 O E- cw W W C m C 4 a0 vc O ('Oe Z 1 I 0 t, ,, _1 . E 4 . (*.E Q) c , To 0 a V --q C 4-; Q0 3 i 0Q H' ~*< O C a o O p,f a U a r 3 rn a s I 4 s Q u k- 0 a CS: Xs I 4 ` m m et C S4 W $4 w e w F w a 4 I 4Q w C o a e-Ha 4o 4 tV > H E-4 CZ H CO 4:O iQ a 4i- U ( A> UH 4) 4Li 41In 4 Orao e o I X *9 c a cn'r*H a t/co O O Q c E~in :z: tn 3 *· Uu ^£ gX H P1ff a wH a Pd 0 04 wz W ii I I I Im 4 a 3,> I C I S: uCd 4) -4 O L4 C To a I -4 CT ·rr -4 P1 P1 a4) 4i a >c -4 la 0 · 4 v) a-4 Pr OI Oaa E UZ*H I 'X E;X c)V] W X I E; a a WX 0o a) I r U c Q0 Q O o Q rr U : I XX a a a m aC 0 q at ra Ucn 14 5 44 Wa CD 11 PO =s toC H m w E-4 1-4 4J 4-)c, W H- | 4-4 -') I (1 x M -4 0) Ev I O <5 ) I Q Pc vt x e *H M 4uz (UA O s4 Q 3 O I m-H ; U m a 4t &4 --4 H 1 ae n 3 0 w- C)E-4 E~ Z 45s H at c, ·c a Q U 0 :z (Ua)4 I 9 Uv zU;; £ 4-) 4-) o 4m Ma > 0 v I0 m o m o o o o ms (U w 4 W4

IV V] XI 0Orc s4 i H Y O 4 a O Ef ae ; > ; S 9 maS 3 ( 71 w3 c c4 a £ X 5 £ Q .i c :: UC4> z | ., Z 4iJW 4 U ' 0O - 4 4 > ° 1 O O 0(VO Q = O r H . 4 34 1 r 449 Sk M wV3 Eq r n a o a - a a ce <: P; I e 3 U 3 cP ~~~~, a) uS 3 a4 L ~~~~~L4aa( c,ql cr I a: I ·* ;1 P ~~~} .~ Pi Pi ~~~4-X CN 4i la 4 4 Q4- I: EV <* L3: Pt zI|L rn Z $43 M V m OW W I 5

" ft E-D 3- 3 C O2 3 - 0 D H 2 w u E4 0 O 0 0 01 a: I3X 4 Q O0 ,)

C C a _E _ C Ix 4 ' Pi q Mt >,"01 4 C toX .) 0 0 4 .ad > ) 00 O .I u _ 0 c,-, 0s - .,

b C 0 C V NC V V CVO E _4 tU: 4e t >1 >' r t w - C H 0X -4 LI

E-,02 z 5.4 4) L a ' .U O W 0

rC) 0 C)0 4 tu -Eu&4 (aJ ',~ ,' 0- P - c a C 0 N e -I. C C r- X O 0 02 Eu r 0 *"m1 .i v0 I 'U 002~ ' W c400 P1 a e I I H a - I i o C U eo· o C 0 4) 0 0 0 C)H I n _ o~ o______cnC -t 0: zE-4 U Ca E-, rz

Z 0

.3 4 a . C Q) Cu I I * C >

4.1 tCTi- . -

Eq4 II a- * _·r , ., a " 0 V X C 0 _.1(a 40 04 Eu O 0 O u3 '4 C 4 -_c. u 4 E- -4 z X :Ta UC : 40 a 4) 0

O _ St V I . I, O .1: C C.)3 _ :.- _,00 . .4) t ,' 02 c.e- _ ' O >4 _ _

I3 4 4 a. "4X I V0 E V .

4 Z 4 _ 0 * 2 CL La to z t0 0 4 co0 C 44 W 0 4 .1-4 44 0 > H 0 -W N 4-1 .4 1HL4 C C E EH02f I W)4 1 4j- Ot E4 I U Z 0 £ o 1 £I I V 4 4> tz I£u LI 02*" . 4 *- 3 -_ ;-c.e ..-i |-4 X o N u x ! - V O M -- O M > U w O 0O I 0O 0 0 - O UC) (- > aM0OL C) V. _4 _ II'

0 _ Io

Q 1i- .,.I ·: 0u I)x e I m *i 4) er _ 4)

U- 0 ~)(U ( . 44J 0 H . U C*- r~r O500 e am~( )O C O : '1 a 3 a 4-0 LLe V EI 2.l.1,, I HO O Q..) awI · *w-4C O -0 0

a2 0 1:402 0U ti

0 0 o a ) 4 )4.) 0 (aO (oa :4: (U 0 w) 0 C a I a.U I 9 ;rrrc a c( c, 4eQ 00 '60 0 ( 2 0 o( >p 0 H a Co: ° | *,z1£ X 0c C)3£;Q 04sw m )ou O Ev ao I O £ o u e> O '4H inuz #4: Z O Ps x Z0 0

Co zE-4 w

C I (m O u o W m

V) H I c CC(c * J 4.4) £ 4 C-

0C VIcO2 02(Um 4 0 3 z (UO-. ci H 4L- i 4 C

CO Z0 o C En I4 z v mYo av Z3 4J 4 U - 4:

4: C)

ZiI a O= J U 2 E-4

'-,4 ( E U4 0

E-4 I v C C

Z 0 SZ4 J # E H I -4 > - C.)0

¢ H - z W 0 1___ C O 4.4 4)

- __ - - IIIIII - ZA 3 4 N '44 0 ".4 0 4mE 4- w4 14) al 140 .,4 O >1 0u 0 ~4- ua C 1.. 0 4)0 o 0 14 ( Cu- 4) 4)Ct w m L4 Cu 0 00 C4w 0 0% 4) - k -04vs 0 01 u 0.,4 '4 0O 4J U W Cu(O( ZQ414 :>h 0 2 4)4) 0o 0 k~ ,4 4 '4 E-4 u > l - l | II Ill I 4 Q 0 cnE .I I 02 C 40 '"4 Q 14 4 4) M 02 w ' e 0' 03 _ 1402 C1.4 4) .-4 S14 C Q1n C4.200a 4i 4)4 O 'I-N 4) 00C o Wad Ct 4.4 C M14 4) 4) ,- 4IE 3 On d Cc, ; rn 0 '01- E-4 e 5w P,O N x4a 04Cu4 0 OO) P .0 14m 4 4) m02 = U I C 4) e s.4 4) .) 4) aO cr 4)0 '02 Cu 4. O 3 4) 0 r Oi 02 m Cu 4.) '4 4) Cu '-40 14 4) 3 m U a . 4 4) 0mV 02 U PC L4 4 E1-4 L4 02 4i 0 e '"4C Cu C 4 -.i 41 S mCa k a C1£ N '"4 0 Z C 5.4 4, _- V Q O c > 014 I, '.. ve 0 m s sad , 9 O - 0 I 4) CS1 0 Cu I4 VI "4 C nP ,· 4.2 Cu02 4.) CA 0 41 U tj 4.,- o 02 cu N N 04 C. N CP "4 N 44 I II I -- Jll I am 0 : .

'"4 Iu 4-. 4).,so 4.) 4.2 E4 O 4.) 0 oo4.)o '"4 C cnH u '"4 14 14 4. C 3 0 3 0 4-I O 41) O4~4 E4 0 w U C 4 4) ) To~~~~.) 4) Q4 c)14 4. HW 02 C E-4 w 0 C u .40 4) 0o 0: '4 u 14 c02 ci 0 0 3 4)o .r4 0= 0 4. 0 0 0 0 CD0o 0 4 To CD z U, z z z z 0W i u '4 C) oC0 _ C I 04 l 3 E Q) 0 Q O z ,It 0 O 0 0 *H-E 02 3 0 Z CD0n U > N a 0 C 0 4 z 0 Z 4- 0O 0) C U 4 4 > Ct 0 .f-4C ln v = u = V C ., 1E-3 · . oi I 03 ·- 4 - 4-X , = 1 o0 0< a :D .a .,4 a 0 = Le 0 E- o- cwS14 a 04 -4 .-_JC I J0 u _ C4 > 4 )E-4 14 4V 4 X,, 0 A: V 4 I> I u: eet 0)m m-- N i" o 0 O- M z C.) III

l l -- - l J I J - --

C E,1-4 u t_ , 1.4 0 L4 a.4 C 4) l" m 14c co ra .1-4 Q 4.) a:>r 4-) 44 4.) 4) '-4* rr O X Is2 IC ,4 I 4) -4 E-4 4.) coX.*H qi E-4 1.4 O 4 Q,02 CD -W x 0 C.) 4. , ('1 0 C O 4) 4) : . OC 4-e CI u Z m c 2 I II . S -

C C OI O 14 I I 0z 04 0 4 - 4 Q Q 014 4) tZ u L 04 rOr O - >4 ., C2 0 0w 02 4 o C On E- U.) 4) ) 4.) z 40 4) 1: (c C4W ) L 0 rC Q) 4) C.) u ai 44) OC1.4 4 :3 co in U 0 QU CA 4 : C ) 4. I 4) 4 4 u ) o ciV 4 E-4" Cc U,0 CO 0 C Cm E-4 'O H H QXL 1. 0 Sw o 03 C= .i V re (U 0 4.) -H-4 aOM 4) C E C 0 O C 0 4 0 "- o0t-LaU0 O O C) ::. O 02 ( ad I 4 E-4 0 44 r U 01 Z ;~~~cau4 >4 I - - -- - :<:

C; 1e

C, 02 C ,14 O 4J C02 v O > H Ez .H C O .z C.) c, 43ca04 0 14 0 0 1.4 E-4 C"'! Xl 0 u .JZ C. .,4I4) 4) .-4 Cn (3) C4 '-4 4.) a. 0 O cv 4.11.44 hi 0 5: u 0 4.) ul) 1..0 0n 03 4. z >4 m In co 03 m Z 4 C 4; 14 H C I; 0u E a4 = a)a I z > >1 IO .. C i04 N v I a -a (Im -4 4 >40 u 0 H 0 e.- O 0 I . I .,I , J2 1. = >. W4 2- O.4 -.4 *l" V3 ~~~~n· cl - u O -H I )n -1 14 Z C -C >nZ 1 a 0 04 : 0 u QCf l E-, I 0 O Pi(a 4u I 4 X e w: L4 U. 4 u 004 X: LQ S< M] Ec:; I = IM ~~~------I l I M 4 U 0 -4 , ., e . 4i ac (d O C 0 4) -4 4) ~; *4O0 u 3 _ .,. 4 cC m > .0n I 1.4 O C i, -4 4) .9-4U 4)w ., . w I 40 U 400 0 >- 2 C4 .r.) .4.ea.4I 4) ,-4 M - t o la 4 ' 4J 40 I 0 -C9r) to 04 0 o to C.) "o o i C oa > H;0 04 _4 0 0 o 1-4 z z - - _ X - I l- -- O0 I I H .,-4 4) C E4 .,4C 4. S4 .9- 14 U a 0 e E -0- m 4) .4 C C 4. .,Q) C)4 _ .4 C 0i 1. I (O4.) 0 C 3d 4.) Q e Vj - Or 4) 0 m 0 o C C w0 4.I= 0 ,4 r4 O 0 4) 4) 4) 4)0c u0O C C 0 0 0)x 4) H 4 - . 0 0 0 0% 2 I 4 .J 0 0 0 o o0 U) 0 0 O a$ al -4 C 4vi 4-4 - .-4 E4 m 0 0 01t a 4) 0 C 4j.) 4 - ..4 .94 Ca u 4)4 54 W 0 C'4o 4i C 4 ) 0 .,4 4. ."I -. > 4) -4 Il 4 d4.i i o1 4.) ·4-rl ; C 00:U] 0 M co 3m 0 - .4 4.) 4i P- L4 .4 C4 w 4) . L. 4) - 1 m 4) 0 'r4)02>4ra (L > o 2 C H 14 #"4 I 4.) -I 4) L W ra 00 3 4 0- .0 0 eO C raC4H M 4 04 0 C 4 x lz Pe ) %0 >4 0 a cI mI- I4 C) U ,- II C.) l I | - - IIII- wEz W 4.

'4 C)pi %4 4.40 - co *,r w * 0 4 0 4. E4C.H 0 C4.) 4 X . 14 4) 4X a- 024 Q0 Q U)H u C.) 4) I C4 O C)2 4 4) 9: .4.) +J4.4L a 4- 0 o = .0 14 o 4) I U 0 "44& C.)H .,94 02 .,4 4) 4. m W 9-4 Ifl E4.3 E-4cn 2 L4 -4)4 0 .) -4 3 > _m 54 .94 .9IC) 0 4) Q I m 4. 0. CI > C 4: . - 4z e 4n an 4xC 41) >1 =( 020. 2 042) QU 0 u0 m '4 'IO >4 E-4 e _4

.9-4 0V I U 4 H M -4 C >4, w wI >1 -4 O O 4) C .94 w 0"04E I 0 0o w Ci0 4..4Q 0 - 4 0 O . 4 4.) .- N -4 1.-4 4 $4 " -4i .9-4114 H U4 v 1.- 4 94· 4. O O . -j (-J 4i) ,.,-i- .4 C I I4 OE.4 I -W UO 0O 02X .9-4 .4 4i .-4 1.. i;1. C: tOZ 4 O,M Z0.- 1 ,4 V C. = in I O .-. ~U 2 lu u u T E-4 rLd4 X I2

---·------ ------·---------------- --- II'

- - al 0 4 I 0 *a) >,4S 0O *^ .-4 .- 4 . 4-4 Ca '0 .4 Q co r'0 4. 4.) Q) 4. ) -4 4) E 4 (1)C4) - 1. < UM wq S4 U la 1.. 'U 4) (U V l 0 e 2 0 4) 0o*. .4 Hl a la o U01.4 I H I a 4) U, U ( a .,-I j 0- (Ua. .,q i 0(U w 0 U]-HC); ge 3 C 0 nlQ r 4) H 04140O (10 M M . .4 m (U 1: 0 l l H 0O 2 CP 4) ea I I I 0 ea >1 r.Q c 0 I ( (U C Q) mP4)1.4 I 0 r. C (1 Q W (a 4 .4, 0C) 4.J i Q Q 4. *-( 0 ra a a 3o 0 440 4.- 4 04'0 O)0 C (o4) 0 0 0 (U, ) o 4)4.) o C4) 0(UF o 0 0 H(U 14 44 0 021 41 _, 4. 1 E4 02 0 -.. D O m(U UZ 3 OCOt)1-" 0:I 0 C t 04e 0 E4 04 '00 (U woW C.) O *H 4. o.,-3 u 0 a a C4) .9-4 ,.4) C)04 0 4.) co 0 . m 4) 0 o .. 0 Q '0 - 4) 0 00 4.) .p-4 0 m, ( 0 H 4) 04 u H Nr E 4) Oa 4) C 4 o 0 m 43)oQ 0 mV 02e 0 1 C (U C) 0 Zd 0 4 aH 0 -0 (-, .l-Cml . C X ( U0 0Q) C) MG W 0 4-) H 0 s V _ = tv IC 4.44.) m . v 04 r 4) aC) ixE0n 0 u0 0 02 -H 0 4 Q) : 0 0 0 C.) O X 04) E En 0 0 14 . 0aQ 0 0 Ul2 la 4-J4) m 04) 4 U U '1 0.4.,9-i 0· H4) 0 0.'0= ; 30 V 0 4) t 4 )) 0O 30 04 o-H 4( u u 4) 41) 4.) o0 0 > O~G~.~. V 00 3o2 .) -HS 04 4.) LnI w C4 3 .e~ ~r ..0 0 9-4 4 (U4W 4-4 k9- 0n U, m M wO 4) ( 4 0. a co Uo

U 4 Q) W 4 A I Q (U z t 0 - 0) H 4 O (U 1.4Le .6,Xn -W Ca m Q-Q U2 . 23 4 a% L 4) M m-4) 1 ac Za o £= 3 0 3 z Z; H 3 o 04() X C HOC) H H C ' 0 C 0 4C < E-4C 4) Q CN 04 Q- En E4 Oz.4 C 00Qa4 M I- 0 w H AJ- c2 di4i 4i 3 la 0- 3U O~= - l rr;C 0 0 0 C)l - C%m S 4- - O Q -~ _ * 0 L- Q Le i Q 3 U r· a , az n a a I s XX so a - Q 95 I (1 pqEim 0 4 Q Q >4 X@4) &

co, I-~a I~~~~~~~~~~~~~~~~` oC4 a n4i , :z: X s;-X ."e IVV cJ I c; 4 ·c o0 ;Xi aa o O I a anx >e o SrlW a ~ II J no rd j EP v m c w o3

H Ed oI

Z $ere I X 4-J 'd I .J , - r 0 .1 . . ~" (J O I ~1F. O SJ 44 e 0 a _P · r ~, O 0 C~ 4,) O .1 0J Q ad :3, . 0 44 W,,, W ED to 0 4n m : >1 in a, o wt 4 o o o a ss~ a 3 · i-4 D,z (a co E ,-O I V I :: *' : C . : C 1 u 0 I2_C a C Z : c -- .-- ,,-- O L rJ c C 0 a I · c o3 IO i Dm , .-pq4 .0 0.> ::: .W4" 4JC toM,-~,-~. > Q tv3 O C W<3 a r4 XtXoe I ,-- o0 O 0 1 . 1 C 0 e C 0 .~I 4 i · . G O0 / 4 ,-- a . _~ 0-· ,I C 0 0a . 3 C V m 0- Z 0 unz Ow Q 4J -O Pa 0 4 O C 3 Di z e ·*-- I a V; cX a Z 3 C >~ 0 0 4 w; Q I .4i.rfIC~ -4 *H) Xi 4-..0 > . X-4Zd 4)O

I) It C :4 44 /,,4 & :> , m C r4( Wd O1Q , Q . , Cm I . . O . . X E-4W . ., *H.... Ou i Q4 ,. _0- f I a E I 1 M, 04XXU O V -3 Es4 Io S Vu * Q O a O --4 V I rl C M 4 4 X .H - q Le w 4 A; n Pr V: I a a O *Hr· ; a L( ·c a W o I a o: sr am a vu c E; *4 o I X 4i u ( 4j C) a o 4 V u 4 7( (n 0 a 0, = 4 C.) I v ) * . q 0 4- X n 4~~~~U H >: _ I_ Q_ e :4 X X Q W >Q 3 a ss v : w a I aa ft a aX er O, I1 4;~- re ·~~~~~~O; a) · C1rl {3C > 3 o:L a)Q1 k~~~~~~~(1).0o W 4 a uz o 1r U k I .<, .^ Q~(1= 3 ;4- (1Q - _-4 _- X > -W P; Vr4 I" a ra C L Z " M OJ C C 0 toX I=: *, I * o si 3o o E n£ o a s, i Q;P Or 4

I 4m i ct*$^ £4 Z >i I Z De E-e I _;/ z ; X;

; Z i O X 1 O: : ~ I *n, Q Z E-4 (z I XL, 4 O

X I: s:·~ - 4~Z? i ; 4 $C W ~1 DI=~iZ

___