Home >> Free Essays >> All Subjects >> IT

IT Examples and Topics



[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Author Note

[Include any grant/funding information and a complete correspondence address.]


Password manager is an encoded digital arch that stores the login information used to access websites, apps, and other services. If we use the same login information at multiple websites, a network breach can make them all susceptible, and easy passwords are not problematic to break. A password manager solves all such problems by creating unguessable and complex passwords for your accounts. It saves them all in an encoded vault and fills login forms for the client automatically CITATION Sei18 \l 1033 (Seitz, 2018). There are many password management applications available, and I am choosing two to discuss:

1) LastPass

2) Dashlane

Features of LastPass

Stores unlimited logins

Automatic form completion

Generates security breach alerts

Generates strong passwords: can change old passwords automatically, and change multiple passwords at once

Offers free version

Base price beyond free: $36 per year

It works with Windows, Linux, MacOS, Android, iPad, iPhone. Internet Explorer, Chrome, Safari, Firefox, Edge, and Opera.

One-to-one sharing

Secure notes

Multi-factor authentication

LastPass Authenticator

Dark web scan

Credit monitoring

Features of LastPass Dashlane

One-click password generation: It can automatically change old passwords, and change multiple passwords at once

Automatic form completion

Digital wallet feature

Offers free version

Base price beyond free: $59.88 per year

Ability to store notes for future reference

Receipt capture

Inbox scan

Dark web scan


Credit monitoring

Generates security breach alerts

Identity theft insurance

It works with Windows, Linux, MacOS, iOS, Android, iPad, iPhone. Internet Explorer, Chrome, Safari, Firefox, Edge, and Opera.

Both tools are easy to use, but I found that Dashlane automatically logs into my web domains much normally than LastPass, and because of VPN, Dashlane is very easy to use. On the other hand, LastPass halts the browser, stops processing scripts, and constantly fails to save changes to the arch.

Figure 1: LastPass interface

Figure 2: Dashlane interface

In September 2019, LastPass announced that its servers experienced a hack or intrusion. Tavis Ormandy, who is a security investigator for Google’s Project Zero, described the nature of the issue is architectural, that it would need substantial time to solve, but the company resolved this problem before known publicly CITATION Ell19 \l 1033 (Ellis, 2019). In the world of internet, security issues occur frequently, and we need a password manager to cater this problem. Although a Password management application breach also occurs but not regularly. They are a source of security of passwords, and I still recommend select one of the secure password management systems to make your accounts secure.


BIBLIOGRAPHY Ellis, W. (2019, September 11). Are Password Protectors Safe? List of Every Major Breach. Retrieved from privacyaustralia.net: https://privacyaustralia.net/are-password-protectors-safe/

Seitz, T. (2018, April 26). Supporting Users in Password Authentication with Persuasive Design. Tobias Seitz.

Subject: IT

Pages: 1 Words: 300



[Name of the Writer]

[Name of the Institution]


Main post

Cyber attacks are increasing day by day. There are many reasons why cybersecurity has become a huge concern for every organization. Many organizations aren't able to sort out who is the real culprit behind the cyber attacks. However, it has been observed most of the time attackers are from inside the organization. One of the reasons for this is the proliferation of social engineering. Social engineering is one of the reasons for the rapid change in technology. The new technologies which include the Internet of Things (IoT) and Big Data have brought new challenges for the organizations and have a huge impact on the overall aspects of life.

It is important for organizations to limit or deny usage of personal items in the workplace because they have the authority to take this action. Cyber attacks are increasing day by day, and it has been observed that usually, attackers are the current employees of an organization. For example, an employee is using a cell phone in the workplace premises. Authority doesn't have any idea what the employee is doing on that cell phone. He/she might be taking pictures of the confidential data of the company from their systems or maybe sending secret data to their cell phone. This is one of the reasons why cyber attacks are increasing because authority allows their employee to use their personal items in the workplace (Baron et al., 1999).

Follow up 1

Internet of things (IoT) has been taken the place of many tools which were being used on a daily basis, and it has influenced both domestic and industrial environment. Due to outsourcing information on the cloud it has become a huge threat for organizations that how they can secure their sensitive information from the attackers. IoT devices are usually unnatural in resources which have affected the security badly.

Follow up 2

This is the age of Big data and cybersecurity as both have brought new opportunities and risk for businesses. There are many threats which have become a challenge for many businesses such as protecting sensitive data, protecting data ownership and personal information. However, Big data has helped cybersecurity professionals a lot in finding cyber attacks easily.


Baron, J. N., Burton, M. D., & Hannan, M. T. (1999). Engineering bureaucracy: The genesis of formal policies, positions, and structures in high-technology firms. Journal of Law Economics & Organization, 15(1), 1. Retrieved from https://search.proquest.com/docview/218917010?accountid=41759

Subject: IT

Pages: 1 Words: 300

Automative Sensors

Automotive sensors

[Name of the Writer]

[Name of the Institution]

Automotive sensors


In the early days of life, there were some major problems regarding the maintenance of the vehicles. It was very difficult and a huge challenge for the automotive industry to manually figure outperformance of the engine. Scientists were working on finding solutions which will help the automotive industry to figure out the performance of the engine with the help of technology. They introduced automotive sensors which are used in vehicles for several purposes. Automotive sensors monitor the engine temperature, oxygen level in the exhaust gases, crankshaft position and engine speed.

These factors should work properly, or the engine will not work accurately. After monitoring several factors in the engine, automotive sensors analyze the performance of the engine and give the results on how the engine is working. Automotive sensors have brought a new innovation in this world of technology for the automotive industry. However, with the rapid changes in technology, there are many challenges for the automotive industry on how they can utilize automotive sensors to improve the performance of the new vehicles.


Modern era cars completely rely on automotive sensors to monitor the performance of the engine. There are several types of automotive sensors which work differently and provide information to the computer which analyze the performance of the engine. These automotive sensors include oxygen sensor, air pressure sensor, engine temperature sensor, throttle position sensor and air temperature sensors (Fleming, 2001). Mechanics these days are finding very challenging to diagnose any problem in a vehicle. Computers are used which analyze the performance of the car with the help of the automotive sensors. Automotive sensors are not only used for monitoring engine performance in the vehicles but also is being used for monitoring performance of the brakes, clutches and other components these days in vehicles.

Brake sensors are used in vehicle applications to check the pressure of the breaks using the vacuum brake booster sensor. Similarly, clutch sensors are used in vehicle applications to determine the working of the clutch. Exhaust sensors are used in vehicles for finding the quality, pump pressure and exhaust gas temperature of the vehicle. With the help of different automotive sensors, the computer can control fuel injectors, spark plugs and the idle speed. It also helps a mechanic who can read a diagnostic code from the computer and fix the issue in the vehicle (Fleming, 2001).

However, there are some precautions which are also very important for the automotive environment. Automotive sensors require a large power supply to perform properly. There are some temperature conditions which needs to keep in mind for automotive sensors. One of the main components of the automotive sensor is a sensor signal conditioner. This component contains all the information about temperature stability. The information is stored in EEPROM but any loss of data during operation could damage the sensor and will be unusable. So it is important to take precautions before operating automotive sensors.


Automotive sensors have really helped the automotive industry a lot in analyzing the performance of vehicles. The advanced sensing technology has helped a lot in increasing the performance of the vehicles. However, there are several challenges which the automotive industry is currently facing. Due to the rapid changes in the technology and launch of electric vehicles has caused more quality and performance concerns for the automotive industry. Old automotive sensors are not capable enough to help in analyzing the performance of the vehicles. So with the change in technology automotive sensors needs to be modified in order to provide assistance to the mechanics on how they can increase the performance of the vehicles (van, 2013).


van Veldhoven, R. (2013, June). Sensors for automotive applications: Challenges and solutions. In 5th IEEE International Workshop on Advances in Sensors and Interfaces IWASI (pp. 115-116). IEEE.

Fleming, W. J. (2001). Overview of automotive sensors. IEEE sensors journal, 1(4), 296-308.

Subject: IT

Pages: 2 Words: 600

Best Practices Of Web Application Fundamentals And Secure Development

Best Practices of Web Application Fundamentals and Secure Development

[Author Name(s), First M. Last, Omit Titles and Degrees]

[Institutional Affiliation(s)]

Author Note

[Include any grant/funding information and a complete correspondence address.]


In this age of modern science and technology, software and web applications are an important part of the digital and technical industry. Almost all the engineering and non- engineering processes are shifting towards virtualization and the trend is increasing day by day. A web-application is very alluring for business and enterprise. Using these applications and software tools, services can be utilized with user-friendly interface to get the task done. Almost all the famous services used world wide have their own web applications and dedicated software applications for their customers and users including Amazon, Ali Express, Uber, and many others. To achieve success and accomplishment in business it is very important to adapt best web development approaches and techniques in order to make sure the reliable operation of the services and also determining the security. In fact, web application security is very important in almost every step of the development of web applications. It is important because every year there are considerable number of security breaches and data thefts all around the globe causing serious financial harm to the businesses and enterprises. Hackers industry has emerged and evolved into a multi-million dollars industry and penetration testers now-a-days are using state of the art tools and techniques to breach and infiltrate the web applications and popular websites too. Security testing of the web applications make sure the capability of the information system to maintain the functionality and the protection of the data. So, it is important to adapt best techniques and practices to build secure web applications to minimize the threat of security breaches and data thefts. In this paper we will cover some of the best approaches that should be adopted by the web developers to ensure safe and secure web application operations.

Discussion and Recommendations

The most important thing which should be kept in consideration to build a secure web application is to work upon a specific framework of security development lifecycle. The framework or the process should encompass analyzing the web application for its weaknesses, vulnerabilities and flaws from the development and design phase. Managing the security of your web application, the primary objective or motive should be to indicate and identify the possible risks and then fix those before launching final product for commercial use. For security management of the web applications, six concepts of cyber security should be considered. These are confidentiality, authentication, integrity, Authorization, availability and non-repudiation . For confidentiality, it is expected that only authorized users are liable to access the important data of the web application. Authentication suggests determining the identity of the user and integrity means determining the correctness of the data on the receiver size my adopting adequate security measures. Authorization is associated with permission to any user to perform any task or utilize or receive any service. Availability means to make sure that the information and communication between client and the server are well-established and are readily available according to the requirement. The concept of non-repudiations means to assist in preventing later denials of any action that has happened.

Perform a risk assessment

For creation of effective protocols, one of the key factors is identification of security requirements. The factors which may impact the security of web application must be focused and evaluated. These factors include the security level of data handled, traceability, accessibility, types of users and legal responsibilities. When these factors are identified, they should be listed according to their priority and impact so that most appropriate an effective strategy are built ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"VDxHtrmx","properties":{"formattedCitation":"(M., Haddad, & A., 2009)","plainCitation":"(M., Haddad, & A., 2009)","noteIndex":0},"citationItems":[{"id":591,"uris":["http://zotero.org/users/local/YgsdZK9k/items/MJS5C55D"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/MJS5C55D"],"itemData":{"id":591,"type":"paper-conference","abstract":"Security risk assessment in Web Engineering is an emerging discipline, where security is given a special attention, allowing software engineers to develop high quality and secure Web based applications. A preliminary study revealed that asset identification (and evaluation) is an essential phase in risk assessment practices. This phase represents a degree of complexity and is the primary activity in the assessment process. This work focuses on asset identification and contributes to security risk assessment, which is essential part of software security. Specifically, the research goal is to design a methodological tool (instrument) for asset identification in web applications for the purpose of risk assessment. The proposed tool helps identify assets with security risks in Web applications. The tool involves direct observations and survey questionnaires as data collection techniques used for this work. The research methodology is based on qualitative and quantitative analysis of a case study that focused on Web based application for student opinion survey coordination (EOE) developed in Simoacuten Boliacutevar University, Venezuela. The data analysis required the use of cross case analysis supported by the software application MAXQDA2007, which helps identify assets according to categories, such as environment, software, hardware, information and networks. Under this work, students, faculty, staff, and software developers at Simoacuten Boliacutevar University have participated in this study.","container-title":"2009 Fourth International Conference on Software Engineering Advances","DOI":"10.1109/ICSEA.2009.66","event":"2009 Fourth International Conference on Software Engineering Advances","note":"ISSN: null","page":"413-418","source":"IEEE Xplore","title":"A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment","title-short":"A Methodological Tool for Asset Identification in Web Applications","author":[{"family":"M.","given":"Brunil D. Romero"},{"family":"Haddad","given":"Hisham M."},{"family":"A.","given":"Jorge E. Molero"}],"issued":{"date-parts":[["2009",9]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (M., Haddad, & A., 2009).

Establish strategies against harmful user input

It is very important to create strategies which can prevent the expected harms form the user input. When the user entries are assumed to be safe and no precaution is taken for security, the malicious users are able to send damaging information easily to the application. For protection against such users, firstly the unfiltered user entries must not be played and Before the display of untrustworthy information, HTML should be encoded to change the possible harmful script into display strings. It is advised to not store the unfiltered user entries directly into the database. In case, HITML has to be accepted from a user, it should be first filtered manually. The filter will define the elements which can to cannot be accepted according to the security measures. Any confidential information like a cookie or a hidden file, should not be stored in location which can be accessed from the browser.

Protect sensitive data

One of the stronger strategies for the securing applications which handle sensitive data is implementation of SSL encryption. Moreover, configuring the webserver to automatically redirect every HTTP request towards the encrypted pages. In this way, the passwords and session IDs will not be transmitted visibly.

Developing a secure and intricate password reset system is one of the strategies as a security measure. The password reset is generally termed to the question set and answered by the user. The question must be of such difficulty level that they cannot be answered by anyone in vicinity. The validity of an account must not be revealed through the rest procedure as it prevents the listing of usernames.

The manual procedure happens to be extensive and tiring and also the breaches can be missed by humans. So, the automation of detection of liabilities of web applications through a security tool is recommended. One of such tools is Tenable.io as it lets a webpage to have complete visibility over the properties which constitute the infrastructure of a web application. For the access to complete map of web application as well as protection of further resources which include containers and assets in the cloud.

Numerous tools for the improved testing of software security are available in SDLC like penetration testing, DAST (dynamic application security testing), SAST (static application security testing), IAST (interactive application security testing) and RASP (runtime application self-protection). This software may not provide a 100% security for the applications, but they make them secure enough that malicious users are not able to attack the application ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jkD9g11Y","properties":{"formattedCitation":"(Curphey & Arawo, 2006)","plainCitation":"(Curphey & Arawo, 2006)","noteIndex":0},"citationItems":[{"id":589,"uris":["http://zotero.org/users/local/YgsdZK9k/items/RFBQ4PRM"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/RFBQ4PRM"],"itemData":{"id":589,"type":"article-journal","abstract":"Security testing a Web application or Web site requires careful thought and planning due to both tool and industry immaturity. Finding the right tools involves several steps, including analyzing the development environment and process, business needs, and the Web application's complexity. Here, we describe the different technology types for analyzing Web applications and Web services for security vulnerabilities, along with each type's advantages and disadvantages. At Foundstone, we work with some of the world's biggest banks and telecommunications companies to identify and resolve security issues. Together with our clients, we face challenging testing scenarios in the context of demanding applications and complex business environments. We've seen firsthand what works and what doesn't; what's marketing hype and what gets results. Our analysis here is based on our collective experiences and the lessons we've learned along the way","container-title":"IEEE Security Privacy","DOI":"10.1109/MSP.2006.108","ISSN":"1558-4046","issue":"4","page":"32-41","source":"IEEE Xplore","title":"Web application security assessment tools","volume":"4","author":[{"family":"Curphey","given":"M."},{"family":"Arawo","given":"R."}],"issued":{"date-parts":[["2006",7]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Curphey & Arawo, 2006).

For people who base the company around the web application, it is important to have deep knowledge of code ad techniques involved in the application. It is also important to the how an application will be used by the users and what significant outcomes will rise. It is very critical for the technical team to apprehend the usage, and deployment of application and from this information the team can integrate theta information into the threat prevention models.The development team should be provided incentives or lack of incentives according to situation, so that the priority of application is focused. For any application, the security is a significant part of software development. It is important at every step from evolving standards to modeling threats to testing for security errors. Throughout the procedure the developers are informed. The technical team must develop the foundation for application security according to formal threat modeling, standards and policies legally involved, and continuing omission in terms of exposures and hazards. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"bR9pLRcg","properties":{"formattedCitation":"(\\uc0\\u8220{}Defending against Web Application Vulnerabilities,\\uc0\\u8221{} 2012)","plainCitation":"(“Defending against Web Application Vulnerabilities,” 2012)","noteIndex":0},"citationItems":[{"id":593,"uris":["http://zotero.org/users/local/YgsdZK9k/items/UUEE8VKT"],"uri":["http://zotero.org/users/local/YgsdZK9k/items/UUEE8VKT"],"itemData":{"id":593,"type":"webpage","abstract":"Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications.","genre":"text","language":"en","note":"DOI: 10.1109/MC.2011.259","title":"Defending against Web Application Vulnerabilities","URL":"https://www.computer.org/csdl/magazine/co/2012/02/mco2012020066/13rRUwgQpm4","accessed":{"date-parts":[["2019",12,13]]},"issued":{"date-parts":[["2012",2,1]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (“Defending against Web Application Vulnerabilities,” 2012)

One important way is to use bounty programs which can be used in getting community feedback related to the possible web application security. Because many a times, even the presence of many employed security professionals can not identify any bug, error or a problem related to UI/UX design but the users may feel and indicate those issues. So many companies offer monetary awards to the members of community when if they identify any vulnerability in the web application.


As provided above, if you are part of a software company or organization, maintaining security of the web applications is a complete team work. It is observed that Web applications are integrally insecure, according to the exemplified by a number of recent events. The modern web application platform provides a ton of powerful and effective security tools which can help prevent the unfortunate events. Security management is not just confined to applying best practices rather it is a mindset within the organization where every employee is equally concerned and conscious of the possible threats. There is a possibility that an external offender can make use of company’s human resources to get sensitive information and data and later utilize this information for cyber-attack. So, it is important to take care of this aspect too and maintain an efficient security management process to avoid such possibilities. There are many immediate steps that can be taken to improve web application security. As applications grow in size or number, it becomes very cumbersome to manage the security requirements. However, applying the above-mentioned practices of security management of web application will ensure safe use of your application for everyone.


Curphey, M., & Arawo, R. (2006). Web application security assessment tools. IEEE Security Privacy, 4(4), 32–41. https://doi.org/10.1109/MSP.2006.108

Defending against Web Application Vulnerabilities [Text]. (2012, February 1). https://doi.org/10.1109/MC.2011.259

M., B. D. R., Haddad, H. M., & A., J. E. M. (2009). A Methodological Tool for Asset Identification in Web Applications: Security Risk Assessment. 2009 Fourth International Conference on Software Engineering Advances, 413–418. https://doi.org/10.1109/ICSEA.2009.66

[The abstract should be one paragraph of between 150 and 250 words. It is not indented. Section titles, such as the word Abstract above, are not considered headings so they don’t use bold heading format. Instead, use the Section Title style. This style automatically starts your section on a new page, so you don’t have to add page breaks. Note that all of the styles for this template are available on the Home tab of the ribbon, in the Styles gallery.]

Keywords: [Click here to add keywords.]

Best Practices of Web Application Fundamentals and Secure Development

[The body of your paper uses a half-inch first line indent and is double-spaced. APA style provides for up to five heading levels, shown in the paragraphs that follow. Note that the word Introduction should not be used as an initial heading, as it’s assumed that your paper begins with an introduction.]

[Heading 1]

[The first two heading levels get their own paragraph, as shown here. Headings 3, 4, and 5 are run-in headings used at the beginning of the paragraph.]

[Heading 2]1

[To add a table of contents (TOC), apply the appropriate heading style to just the heading text at the start of a paragraph and it will show up in your TOC. To do this, select the text for your heading. Then, on the Home tab, in the Styles gallery, click the style you need.]

[Heading 3].

[Include a period at the end of a run-in heading. Note that you can include consecutive paragraphs with their own headings, where appropriate.]

[Heading 4].

[When using headings, don’t skip levels. If you need a heading 3, 4, or 5 with no text following it before the next heading, just add a period at the end of the heading and then start a new paragraph for the subheading and its text.] (Last Name, Year)

[Heading 5].

[Like all sections of your paper, references start on their own page. The references page that follows is created using the Citations & Bibliography feature, available on the References tab. This feature includes a style option that formats your references for APA 6th Edition. You can also use this feature to add in-text citations that are linked to your source, such as those shown at the end of this paragraph and the preceding paragraph. To customize a citation, right-click it and then click Edit Citation.] (Last Name, Year)


BIBLIOGRAPHY Last Name, F. M. (Year). Article Title. Journal Title, Pages From - To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name.


1[Add footnotes, if any, on their own page following references. For APA formatting requirements, it’s easy to just type your own footnote references and notes. To format a footnote reference, select the number and then, on the Home tab, in the Styles gallery, click Footnote Reference. The body of a footnote, such as this example, uses the Normal text style. (Note: If you delete this sample footnote, don’t forget to delete its in-text reference as well. That’s at the end of the sample Heading 2 paragraph on the first page of body content in this template.)]


Table 1

[Table Title]

Column Head

Column Head

Column Head

Column Head

Column Head

Row Head





Row Head





Row Head





Row Head





Row Head





Row Head





Note: [Place all tables for your paper in a tables section, following references (and, if applicable, footnotes). Start a new page for each table, include a table number and table title for each, as shown on this page. All explanatory text appears in a table note that follows the table, such as this one. Use the Table/Figure style, available on the Home tab, in the Styles gallery, to get the spacing between table and note. Tables in APA format can use single or 1.5 line spacing. Include a heading for every row and column, even if the content seems obvious. A default table style has been setup for this template that fits APA guidelines. To insert a table, on the Insert tab, click Table.]

Figures title:

Figure 1. [Include all figures in their own section, following references (and footnotes and tables, if applicable). Include a numbered caption for each figure. Use the Table/Figure style for easy spacing between figure and caption.]

For more information about all elements of APA formatting, please consult the APA Style Manual, 6th Edition.

Subject: IT

Pages: 3 Words: 900

Big Data

Report on Big Data for Travel Business

right7597140Student name

Student Id

Unit Id


Lecturer and Tutor name

1000000Student name

Student Id

Unit Id


Lecturer and Tutor name

Table of Contents

TOC \o "1-3" \h \z \u 2Executive Summary PAGEREF _Toc18605490 \h 2

3Introduction PAGEREF _Toc18605491 \h 2

4Big Data Opportunities PAGEREF _Toc18605492 \h 3

5Value Creation using Big Data PAGEREF _Toc18605493 \h 4

6Porter’s Value Chain Analysis PAGEREF _Toc18605494 \h 6

6.1Primary Activities PAGEREF _Toc18605495 \h 7

6.1.1Inbound Logistics PAGEREF _Toc18605496 \h 7

6.1.2Production PAGEREF _Toc18605497 \h 7

6.1.3Outbound logistics PAGEREF _Toc18605498 \h 7

6.1.4Marketing and Sales PAGEREF _Toc18605499 \h 8

6.1.5Services PAGEREF _Toc18605500 \h 8

6.2Support activities PAGEREF _Toc18605501 \h 8

6.2.1Firm Infrastructure PAGEREF _Toc18605502 \h 8

6.2.2Human resource management PAGEREF _Toc18605503 \h 8

6.2.3Technology development PAGEREF _Toc18605504 \h 9

6.2.4Procurement PAGEREF _Toc18605505 \h 9

7Porter’s Five Forces Analysis PAGEREF _Toc18605506 \h 9

7.1Bargaining Power of Buyers PAGEREF _Toc18605507 \h 9

7.2Bargaining Power of Suppliers PAGEREF _Toc18605508 \h 10

7.3Threat of New Entrants PAGEREF _Toc18605509 \h 11

7.4Threat of substitutes PAGEREF _Toc18605510 \h 11

7.5Rivalry Among Existing Competitors PAGEREF _Toc18605511 \h 11

8Conclusion PAGEREF _Toc18605512 \h 12

9References PAGEREF _Toc18605513 \h 13

Executive Summary

In the field on information technology, big data is the trending topic now a day. It is reported that data of almost 2.5 quintillion bytes is generated each day, which shows the need for the big data technology to be used to analyze and maintain this huge amount of data. In travel sector, this need is twofold due to high competition, for data gathering and then providing customized services and marketing efforts along with the better decision making. This report is organized to investigate the big data opportunities available for a travel firm. Besides this, Porter’s value chain analysis is done along with the five forces for better understanding of the processes and actions needed to get the competitive advantage. The report can be used as a guide for travel firms that whether they should adopt big data technologies or not.


Big data as the name suggest is a data set too big to be handled or processed through basic or traditional methods of processing. This kind of data could be originated from internal as well as the external sources, and the data of this type is associated with views as well as behavior, and habits of the customers. Now a day’s businesses collect an extremely large amount of data hence, using big data is getting in the top priority lists of every type of businesses and this fact is true especially for the traveling industry. Although big data can be used for many purposes, however, travel companies could use it carry out predictive along with the behavioral analysis of the customers and use it to create future opportunities and be successful in today’s competitive environment. Big data as the name suggest is a data set too big to be handled or processed through basic or traditional methods of processing. This kind of data could be originated from internal as well as the external sources, and the data of this type is associated with views as well as behavior, and habits of the customers. Now a day’s businesses collect an extremely large amount of data hence, using big data is getting in the top priority lists of every type of businesses and this fact is true especially for the traveling industry. Although big data can be used for many purposes, however, travel companies could use it carry out predictive along with the behavioral analysis of the customers and use it to create future opportunities and be successful in today’s competitive environment.

The traveling company can manage revenues along with reputation management, strategic marketing, improve customer experience, and conduct market research by utilizing big data. Also, travel companies can provide the customers with a user-friendly interface and hence, could introduce differentiated services by understanding their travel needs. This report documents the ways a travel company can use and implement big data to improve the ways it can serve its customers and also maintain its competitiveness. However, it is still confusing for the travel company that how this technology of big data can revolutionize and add value to their existing processes of the business. The following report explains in detail the ways big data can create opportunities for this travel industry and then the aspect of value creation along with the analysis of porter’s five forces.

Big Data Opportunities

Although big data is getting an essential part in almost all type of organizations however, for a travel company using this technology is essential. The main reason behind this increased importance is the management of the revenue which is essential for success. Through big data, the travel company can serve the right customers by selling the right type of product at the right time and through right channel, and hence can maximize its financial results. Along with this, travel companies could direct their training efforts towards the right side by getting the information through customer feedbacks they share on different platforms about their experience with the company. Also, as the marketing towards the right direction is not that easy for travel company due to the varied type of customers but, through big data by utilizing the trends the best type of marketing opportunities could be utilized to increase the chances of success CITATION 5Wa19 \l 1033 (5 Ways Big Data Can Benefit the Travel Industry).

It is a fact that whenever a traveler starts thinking about traveling somewhere, pricing is the main part of that decision and he chooses that company which is offering the most affordable price. According to CITATION Raj19 \l 1033 (Rajput) through big data, the travel company can check the pricing policies of its competitors and hence can develop that type of pricing policy which is customer oriented and ultimately achieve success. CITATION Ras17 \l 1033 (Rashidi, Abbasi and Maghrebi) in their recent paper about big data explains the importance of extracting the transportation information of people from social media. They conclude that by using big data, important traveling information including the trip purpose, duration, mode, and destination can be gathered from social media. Besides this, demographic information can also be collected about the travelers, which can be used to assess the daily travel behaviors of people belonging to different age groups and having different levels of income. Besides this, the data collected from social sites can be used for the development of models to estimate the travel demands along with planning purposes and managing the operations CITATION Has15 \l 1033 (Hasan and Ukkusuri).

Value Creation using Big Data

Now a day it is the main aim of almost all type of organizations to explore and analyze the ways through which big data could be used for value creation because by using big data managers can use information for better decision making as well as improving the performance of the company and same is true for a travel company as well. Recently digitalization disrupted the travel industry by great extend because, it changes the way through which travels research the contents, compare different options, and book their travel details. Data generation is growing rapidly through this type of digitalization in the travel industry because, an airline or a small travel company can gather data in hundreds or thousands of terabytes, however, through the use of big data, travel companies can now capture the potential of such large amount of data fully

CITATION GAR19 \l 1033 (Garcia and Reguero) in their recent articled revealed that the travel sector can use machine learning, image recognition as well as the language processing for value creation because all of these are sufficiently mature enough now. The main ways through which travel companies can create value are customer acquisition, demand optimization, and customer experience.

First of all, a travel company can increase its marketing ROI by adjusting the marketing budget to be invested in the most favorable type of audience. However, getting the exact information about this target audience can only be possible through using big data technologies because predictive models which are based on patterns of historical navigation can be used for the purpose of scoring every lead which is entering in the company’s site and can create the qualified audience. This advanced audience creation along with the improved remarketing strategies through machine learning allows the travel firm to reduce its marketing investments up to 50% while keeping the conversions at a stable positionCITATION HOW17 \l 1033 (How Big Data Analytics Is Transforming The Travel Industry).

Secondly, a travel company can optimize its revenues through dynamic pricing by using big data. For creating the pricing policy based on data, estimates about the customer’s conversion probability are the initial step. However, these type of estimates about the willingness of the customer to pay can only be possible through algorithms established by machine learning. Through dynamic pricing, the travel company can manage and boost its revenues more rapidly as compared to the previously used systems of revenue management.

Last but not the least, as previously explained the travel companies use customer surveys to get their feedback however, as the feedback forms were unstructured hence, complete information was not translated into remedial actions. But now through the technique of natural language processing, travel companies can create value by reducing cost by dynamically understanding the perceptions of the customers and then the recommendation of corrective actions automatically.

Porter’s Value Chain Analysis

Porter in his book CITATION Mic85 \l 1033 (Michael), developed a value chain which is also known as porter’s value chain analysis and explains it as the collection of those activities which a firm perform for the purpose of value creation for customers. On the basis of this value creation, firms can achieve a competitive advantage and ultimately can get higher profit. As far as the big data drivers are concerned, which are presented previously, they create a value chain for a travel company in a way which not only affects its costs but also its profits.

Fig. 1: The value chain Adapted from Porter, 1990.

The above figure presents the basic activities of porter’s value chain including primary activities which are the main activates of the business to deliver a service or a product, and supportive activities are those activities which are used to enhance the primary activities. For a travel company its primary activity id to provide travel services to its customers. However, by the adoption of big data this value creation process will be enhanced for the travel company by a great extent CITATION Cur16 \l 1033 (Curry). Below is the explanation of the process through which each of the activity in this value chain will be enhanced through big data.

Primary Activities

Inbound Logistics

Travel companies usually provide the traveling service with collaboration of other businesses also. For example, if the company has to provide a holiday package, then it involves the flight, accommodation at destination, car rentals, etc. Hence, by using big data company can easily get the required information in a few seconds about all these suppliers of the required service and provide the customers with required service offerings on time. CITATION Zen17 \l 1033 (Zeng and Glaister) explains this as a network collaboration to get the required resources and get higher firm performance.


In the production stage, the traveling company can use the huge data collected from the supplies of specific service and after analyzing this unstructured data to select the most affordable of cost-friendly supplier and hence, can present its offering at the lowest possible price as compare to its competitors.

Outbound logistics

As previously explained, a traveling company can get a huge amount of data using advanced big data techniques to analyze the preferences and perceptions of its customers. This customer data enables the firm to offer only those services which are demanded by the customers and hence, it can save the cost of marketing as well as the profit maximization.

Marketing and Sales

By using big data, a traveling company can develop a specific type of marketing strategies to be used for the target audience. This advanced technology can store huge amount of customer data and presents it in a structured form which enables the traveling firm to take decisions immediately according to the demands of the customers and can direct its marketing costs towards the right customer groups. Besides this, the marketing ROI can also be increased through this technology.


After the successful delivery of a traveling service, the feedback of the customers is also essential to take corrective actions. By the use of big data, the feedback can be collected from a vast type of platforms and then can be analyzed to answer quires related to the provided service.

Support activities

Firm Infrastructure

Traveling firm’s infrastructure is mainly based on technology today and using big data technology will only enhance the infrastructure of these firms by adding value through increased operational speed.

Human resource management

HRM is as important for a traveling firm as for the other firms. However, management of human resource will get easier by the use of big data because, getting feedback timely and continuously will enable to the firm to develop those type of training programs which are compulsory and hence, it reduces the cost.

Technology development

Big data technologies are the latest tools to manage a large amount of data and then using it for analysis of trends, customer priorities, perception, and feedback. By using this technology, a traveling firm could create a competitive advantage to increase market share and profit.


By the use of big data, procurement of traveling firm will become computerized and customers will be able to book the details using multiple options given by the firm according to the demands of different type of customers.

Porter’s Five Forces Analysis

Analysis of Porter’s five forces is essential for getting information about the future success or failure of using big data for traveling firm. These are the five forces which establish a competitive advantage for any firm CITATION Mar18 \l 1033 (Martin).

Bargaining Power of Buyers

By using the big data, a traveling frim can control the barraging power of the customers by making analysis about the pricing and offering of competitors and hence, providing those type of services which are not offered by competitors at a lower cost. By this way, if customers apply their bargaining power by checking the price or services then, they will surely select the firm offering lower-priced services. Besides this, by capturing and storing huge amount of data from customer ordering details and their feedback, the company will be able to provide the buyers with enough information to compare and contrast with other companies.

Bargaining Power of Suppliers

Use of big data will not provide a travel firm with competitive advantage through controlling customers buying power but also, it can increase its own bargaining power as well. It can be exercised by increasing the barriers for switching along with the provision of a platform for giving feedback. Through big data technology, a firm can provide competitive prices, targeted marketing strategies, and complete traveling packages as compare to competitors on competitive prices. Hence, it will get tough for the customers to switch the company due to increased prices and less information.

230124083185Threat of Substitutes

Threat of Substitutes


4872990170180Bargaining Power of Buyer

Bargaining Power of Buyer

left170180Barraging Power of Supplier

Barraging Power of Supplier

2333625182245Rivalry Among Existing Competitors

Rivalry Among Existing Competitors



center248920Threat of New entrants

Threat of New entrants

Fig 2: Porter’s Five forces model

Threat of New Entrants

It is a known fact that traveling business is getting more and more attention due to higher level of profit margins and increased demand. However, if a firm uses big data technologies, it will give a competitive advantage to the firm in the form of loyal customers, product differentiation, and economies of scale, etc. This will create an entry barrier for new companies and hence, the threat of new entrants will be reduced.

Threat of substitutes

The analysis made on the basis of huge customer data and then developing the models as well marketing strategies is not that much easy to be substituted. When a travel company will provide up to date information and comparisons with its competitors then, customers will surely think before going for a firm with no such type of information.

Rivalry Among Existing Competitors

As previously explained, the travel industry is facing tough completion due to many small size competitors. However, it is the lower price, introduction of new features, comparative services, and targeted advertising campaigns are few of the tools a travel firm can use by the help of big data. When rivalry will be decreased among competitors, the profit of the firm will automatically get higher by increased customer loyalty and demand CITATION Por08 \l 1033 (Porter).


Although competition is getting tough in the traveling industry now a day, however, by using big data technologies, a travel company will not only get a competitive advantage but it also helps it in the value creation process. By using customer data from all type of platforms help the firm in analyzing the preferences of the customers along with their preferred locations to visit. This will help in formulating the correct type of services for a specific type of customers and hence, will decrease the marketing cost and increases the marketing ROI. Besides this, when a firm uses different social media platforms for getting feedbacks and demographic information, it will enable the firm to forecast the needs of the customers and develop the services ahead of time. Hence, it can be concluded that the use of big data technology is in utmost favor of any travel company.


BIBLIOGRAPHY “5 Ways Big Data Can Benefit the Travel Industry.” n.d. Revfine. Document. 04 09 2019.

Curry, Edward. “The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches.” New Horizons for a Data-Driven Economy (2016): 29-37.

Garcia, Feran and Santiago Reguero. “Three Advanced Analytics use cases in the travel industry.” 14 August 2019. bigdataspan. <https://www.bigdataspain.org/2018/talk/three-advanced-analytics-use-cases-in-the-travel-industry/>.

Hasan, Samiul and Satish V Ukkusuri. “Location Contexts of User Check-Ins to Model Urban Geo Life-Style Patterns.” PloS one (2015): e0124819.

“How Big Data Analytics Is Transforming The Travel Industry.” 26 January 2017. EXASTAX. <https://www.exastax.com/data-analytics/how-big-data-analytics-is-transforming-the-travel-industry/>.

Martin, Marci. “Porter's Five Forces: Analyzing the Competition.” 25 September 2018. Business news daily. 05 September 2019.

Michael, Porter E. “ Creating and sustaining superior performance.” Competitive advantage (1985): 167.

Porter, Michael E. “The five competitive forces that shape strategy.” Harvard Business review 86.1 (2008): 25-40.

Rajput, Rahul. “How Big Data Triggered Travel Industry Success?” 23 January 2019. Thriveglobal. 04 September 2019. <https://thriveglobal.com/stories/how-big-data-triggered-travel-industry-success/>.

Rashidi, Taha H, et al. “Exploring the capacity of social media data for modelling travel behaviour: Opportunities and challenges.” Transportation Research Part C (2017): 197-211.

Zeng, Jing and Keith W Glaister. “Value creation from big data: Looking inside the black box.” Strategic Organization 16.2 (2017): 105-140.

Subject: IT

Pages: 8 Words: 2400

Briefing Statement For IT Security Audit Plan

Briefing Statement for IT Security Audit Plan

[Author’s name]

[Institute’s name]

Briefing Statement for IT Security Audit Plan

Selection of Audit Plan

           Employee awareness of IT security policies is selected as the preferable audit plan to attain a better understanding of the practical approach of audit in an organizational setting. It is important for the management of Red Clay Renovations Company to critically overview the significance of the overall IT policy system concerning the understanding of all the workers. It is crucial to determine how the advance idea of the security system is perceived and acknowledged by the employees by considering the overall approach of IT security policies (GAO, 1991). The main objective of selecting this particular form of audit plan is to critically evaluate the awareness level of different management staff and the workers in case of IT security policies. 

Briefing Statement

           The development of a comprehensive audit plan requires the formulation of a brief statement for the IT Governance Board of Red Clay Renovations Company. The main aim of this specific perspective is to provide a precise and brief overview of the audit plan to the concerned entities. Prior information about the IT security policies of the company is vital to determine the implications of various relevant domains. The option of employee awareness of IT security policies is considered to prepare the entire arrangement of an organization’s audit domain for all the workers.

Purpose of the Audit Plan

           All the members of the IT Governance Board of the company should have a clear understanding of conducting audit plans specifically in case of IT security policies. It is critical for the stakeholders to successfully target the relevant forms of information and obtain better results in the end. Documentation of the actual objectives of the audit plan is the first step to ensure the implication of all the stages of the audit plan (Winnipeg, 2008). One of the primary objectives of the entire audit plan is to evaluate the awareness of the employees regarding the IT security policies of the Red Clay Renovations Company. Secondly, the paradigm of proper audit plan can also be assistive to determine the understanding level of the management and the workers concerning the importance of IT security policies. The practical idea of conducting an audit plan is also vital to identify the key areas that require improvement and have the potential to achieve anticipated targets in the future. 

Details of the Audit Plan

           When it comes to the practical implications of the audit plan than who will conduct the entire audit is one major question. IT security auditors will perform the entire process of audit within an organizational setting. IT security experts needs to be considered to ensure proper assessment of the application of IT security policies within an organizational setting. Financial and IT experts should be considered as the members of the team of auditors. 

           Secondly, it is important to make a decision that what area needs to be covered in the IT security audit plan. The central objective of the systematic audit plan is to examine the practical application of the IT security policies in the organization. This practical perspective also guides to figure out the awareness level of all the employees when it comes to targeted enforcement of broad ideas of IT security policies. 

           Decide on the schedule of conducting an audit plan is also an important aspect of the briefing statement of the entire procedure. It is important to consider that auditing is one on-going process that involves different forms of activities (Hayes, 2003). The time-frame of three to six months is a good option for the audit team to complete the procedure of IT security auditing in Red Clay Renovations Company. Moreover, on-site auditing is mandatory to critically analyze the awareness level of all the employees considering the approach of IT security policies. 

           The overview of the entire procedure of the audit needs to clearly defined before conducting the process of auditing. The development of the audit plan is necessary to ensure the proper accomplishment of all the projected objectives. The approach of the audit plan ensures how the entire process of auditing will be executed. Conducting interviews from the relevant entities is important to gain the required information in case of employees’ awareness about IT security policies. 


ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY GAO. (1991). How to Get Action on Audit Recommendations? Retrieved from:


Hayes, B. (2003). Conducting a Security Audit: An Introductory Overview. Retrieved from:


Winnipeg. (2008). Assessment of Information Security Awareness. Retrieved from:


Subject: IT

Pages: 2 Words: 600



[Name of the Writer]

[Name of the Institution]


Main post

The different web browser has different compatibilities, and they display elements according to their compatibility on the website. It is important for a web developer to know what browser a user is using to develop a website according to the browser of a user (Antoniol & Gueheneuc, 2006). Desktop browsers are also different from mobile browsers. It is also important to develop a website which is compatible with both mobile and desktop browsers. A developer needs to develop a responsive website that is also mobile-friendly. Another important thing which a developer needs to know before developing a website that doesn't use flash because these days many browsers don't support flash. Similarly both Android and iOS also not support flash.

PHP programming language is a backend scripting language which is being used for web development and can be embedded into an HTML page. It allows users to show the output of the input from an HTML page. PHP also allows a user to store or retrieve data from a database on a web page. It also plays a vital role in browser identification. PHP contains a get_browser function that tells the developer about the capabilities of the user’s browser.

Follow up 1

Different web browsers include different engines which they use today. Google chrome include Blink and V8 engine in its browser. Mozilla Firefox includes Gecko and SpiderMonkey engine in its browser. Internet Explorer include Trident and Chakra engine in its browsers. Safari browser includes Webkit and SquirrelFish engine in its browser.

Follow up 2

As a developer, it is also important to understand the Web Accessibility. Many developers ignore web accessibility, but it is one of the most important concepts which needs to understand before developing a website. It is really important to understand the ability to access a website using different devices before creating a website to make it user-friendly.


Antoniol, G., & Gueheneuc, Y. (2006). Feature identification: An epidemiological metaphor. IEEE Transactions on Software Engineering, 32(9), 627-641. doi: http://dx.doi.org/10.1109/TSE.2006.88

Subject: IT

Pages: 1 Words: 300

Budgeting For Cybersecurity

Budgeting for Cybersecurity

[Author’s name]

[Institute’s name]

Budgeting for Cybersecurity


           The central objective of corporate governance is linked with the selection and application of appropriate approach of budgeting for cybersecurity. The broad idea of budgeting associated with active consideration of proper planning and planning by selecting the most accurate strategy to reduce the risk of costs. This form of consideration of critically vital when it comes to identifying different forms of risks responding to cyberattacks appears for Red Clay Renovations Corporation. A timely exploration of various forms of risks requires a suitable application of investment to meet the standards of protective cybersecurity effectively and efficiently. 

Identification of Risks

           Identification of potential risks is the first and crucial step to ensure the successful allocation of financial resources in case of a company’s cybersecurity. The perspective of financial resources can determine by the domains of people's investment, process investment, and technology investment. It is important for the management to invest in these specific practice areas according to the requirements of the IT security program ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"Ash6tvT6","properties":{"formattedCitation":"(Bowen, Hash, & Wilson, 2007)","plainCitation":"(Bowen, Hash, & Wilson, 2007)","noteIndex":0},"citationItems":[{"id":1590,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/55VZGGR9"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/55VZGGR9"],"itemData":{"id":1590,"type":"paper-conference","title":"Information security handbook: a guide for managers","container-title":"NIST SPECIAL PUBLICATION 800-100, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY","publisher":"Citeseer","author":[{"family":"Bowen","given":"Pauline"},{"family":"Hash","given":"Joan"},{"family":"Wilson","given":"Mark"}],"issued":{"date-parts":[["2007"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Bowen, Hash, & Wilson, 2007). Identification of potential risks is the first practical step to select an appropriate strategy according to an organization’s requirements. The potential risks for the company recognized as follows:

· Improper protection of the business record 

· Insignificant collaboration between different departments to meet the objectives of system policy.  

· The risk of data theft in case of client’s personal information

· Incorrect forms of collection, analysis, and preservation of important information

· Improper application of offering renovation services. 

Selection of Strategy

           A decrease of possible cost in case of cyberattacks requires the selection of the most appropriate strategy according to the organization’s needs. It is important for the decision-makers to consider a specific strategy by correctly follows associated guidelines and plans of action. Minimize exposure is a strategy selected for Red Clay Renovations to reduce the potential cost of the problem of cyberattacks. The central aim of this practical strategic approach is to minimize the connection of information systems with other aligned and hazardous aspects. 

           The basic idea of minimizing exposure as the strategy is that information systems are susceptible when it comes to the approach of accessing by others. The risk factors are immensely high that establish that important organizational information can be accessed or corrupted referring to the existence of data in the system. The strategy of minimizing exposure can be further characterized into two main elements. The first practical approach is that minimizes the existing linkages between a system and many different outside factors. The other idea of consideration is to reduce the levels of information and relevant procedures ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"0F8f7YQa","properties":{"formattedCitation":"(Davis et al., 2016)","plainCitation":"(Davis et al., 2016)","noteIndex":0},"citationItems":[{"id":1599,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/TULEJUPC"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/TULEJUPC"],"itemData":{"id":1599,"type":"report","title":"A framework for programming and budgeting for cybersecurity","publisher":"RAND Corporation Santa Monica United States","author":[{"family":"Davis","given":"John II"},{"family":"Libicki","given":"Martin C."},{"family":"Johnson","given":"Stuart E."},{"family":"Kumar","given":"Jason"},{"family":"Watson","given":"Michael"},{"family":"Karode","given":"Andrew"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Davis et al., 2016). This phenomenon can be mainly observed in the case of the active installation of software programs and the facets of information access through the system. Moreover, critical evaluation of internal links of the system is also a vital practical measure to restrict the entire damage from external attacks. 

Application of Strategy in Planning and Programming Phases

           Alignment of minimizing exposure as a suitable strategy for the stages of planning and programming is the necessary condition to successfully achieve anticipated objectives of cybersecurity. Appropriate classification of different organizational resources in the forms of various classes or groups is a necessary condition to obtain the requirements of the planning process. Dissemination of physical and virtual resources is helpful for the organization to minimize the chances of data access categorized in the form of access. The objective of programming can be attained by implementing different interrelated organizational factors. The practical idea of programming requires reducing the networked instruments to minimize the chances of potential risks. Additionally, it is also critical to limit network access paradigms according to the organization’s requirements ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"8pSLHnID","properties":{"formattedCitation":"(Chew et al., 2008)","plainCitation":"(Chew et al., 2008)","noteIndex":0},"citationItems":[{"id":1602,"uris":["http://zotero.org/users/local/7Hi3kAOD/items/54IGHLG8"],"uri":["http://zotero.org/users/local/7Hi3kAOD/items/54IGHLG8"],"itemData":{"id":1602,"type":"report","title":"Performance measurement guide for information security","author":[{"family":"Chew","given":"Elizabeth"},{"family":"Swanson","given":"Marianne M."},{"family":"Stine","given":"Kevin M."},{"family":"Bartol","given":"Nadya"},{"family":"Brown","given":"Anthony"},{"family":"Robinson","given":"Will"}],"issued":{"date-parts":[["2008"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Chew et al., 2008). The risks of unwarranted access to sensitive data need to be regularly scrutinized by determining a proper amount of physical and financial resources. 


ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Bowen, P., Hash, J., & Wilson, M. (2007). Information security handbook: A guide for managers. NIST SPECIAL PUBLICATION 800-100, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Citeseer.

Chew, E., Swanson, M. M., Stine, K. M., Bartol, N., Brown, A., & Robinson, W. (2008). Performance measurement guide for information security.

Davis, J. I., Libicki, M. C., Johnson, S. E., Kumar, J., Watson, M., & Karode, A. (2016). A framework for programming and budgeting for cybersecurity. RAND Corporation Santa Monica United States.


Subject: IT

Pages: 3 Words: 900

BUS 340 Introduction To Information Systems

BUS 340 introductions to information systems

Student’s Name



Discussion 1: Article Title: Innovative Design of Marine Resources Database System Based on Fuzzy Cluster Analysis

The article “Innovative Design of Marine Resources Database System Based on Fuzzy Cluster Analysis” authored by Yuanqiang Lian in 2018, discusses the essentials of a database in system management. It analyses how marine capture has yielded over the years. It analyses the application of information system in fishing to ensure production. The article relates to the application of system farming. In most places across the world, farms have been digitalized and many firms applied the use of a system to ensure the production of produce. This directly to the article, this discusses the use of ICT in enhancing fishing production CITATION Yua18 \l 1033 (Lian, 2018).

The purpose of the article, analyze the processing, functioning, and data processing techniques. It is meant to understand the data functioning techniques, which are applied in the data management for any organization. It is also meant to present the functions and the importance of data to an organization. And more important it was derived to indicate how a system can be implemented in the fishing industry. And based on the article, it is established that it can be applied in monitoring and evaluation, tracking, and production in the fishing industry. It shows essential of information system and its application in various industries.

Professional Assignment 1

Recently, technology has revolutionized every aspect of the economy. Farming has also been revolutionized through the application of information system in farming technology. Some farmers have installed GPS guide system on their tractors so that farmers can be able to control and oversee the progress on their farms using iPads CITATION LiY18 \l 1033 (Yan, 2018). The availability of this system has helped farmers to reduce their operating cost. This is the fact that farmers can efficiently monitor the operation of its equipment and therefore, avoids the misuse, which has been common in the past. The information technology has also provided the best way, which farmers can utilize to gather process and analyze data for effective use in the provision of farming. This, therefore, helps farmers to increase productivity from their farms. The data gathered can be used for prediction plan and therefore, farmers can increase their yield. Though it might sound worthy, the main question is whether it is worth investing by farmers.

Farmers can use global positioning and various technological advancement get the best strategies to use during planting season. Through the use of global position, technology monitors the operation at their farmers through iPads and tablets. This brings efficient management in farmer hence profitability. The global position technology is also applied during harvesting season to ensure that the harvest is properly monitored to avoid encountering unnecessary loses. In some cases, the technology is used in the irrigation system CITATION Gov17 \l 1033 (Govind & Tewari, 2017). It is applied to control the in and outflow of water from the paddy system. The sensor is placed inside the water to detect the level of water within a paddy and then communicate to the system to either trigger the inflow or stop the inflow of water into the paddy.

The precision data system provides information regarding pest, and other factors, which can affect crops. It is also noted that it helps farmers to efficient planting with good spacing and therefore, it increases the rate of production. When crops are properly spaced during planting, space would be efficiently utilized and this could result in higher production from the farm. The application of technology is important in the farming sector. Its application is likely to improve production hence food security and high profits for farmers.


BIBLIOGRAPHY Govind, N., & Tewari, R. (2017). IGMIS – a computer-aided information system on Indian Gondwana megaspores. New York: Current Science Association.

Lian, Y. (2018). Innovative Design of Marine Resources Database System Based on Fuzzy Cluster Analysis. Journal of Coastal Research, 662-667.

Yan, L. (2018). Design of Two-dimensional Visualization System for Embedded Marine Environment Spatial Data. Journal of Coastal Research , 735-740.

Subject: IT

Pages: 2 Words: 600

Business Continuity

Author’s Name



Business Continuity

Modern life spins around various elements of technology and therefore it has become an indispensable part of our lives. To ensure a company’s survival it is mandatory to have an effective business continuity and disaster recovery plan. In recent years it has been observed that many organizations have suffered from multiple data breach issues due to which they have lost important and confidential data of their organization (Luftman). Thus, hindering their organization's survival in business.

To mitigate security issues and improve the chances of business continuity several software solutions are available that facilitate in not only automate but orchestrate business continuity. Spanning Backup is a software solution that provides backup and recovery for mail, contacts, and office 365 with unique capabilities ("Cloud-To-Cloud Saas Backup: G Suite, Office 365 And Salesforce"). It is the best solution for SaaS application administrators as they are responsible for maintaining compliance with intricate audit demands.

Automated and On-Demand Backups

With spanning backup, the data is automatically backed up daily in the background.

The data is backed up in its original state while also the point-in-time snapshots of folder structure are maintained.

Additional backups are performed if needed.


Not only admins but end users can also find and restore the data

Spanning backup offers unlimited storage facility along with multiple backup versions.


Spanning backup for office 365 gives admins complete visibility and control so that they can manage the backup of all data of all their respective organizations.

Restore functions

Point-in-time restore: Spanning backup software can easily access all the historical snapshots and restore with 100% accuracy.

Cross-user restores: The software also enables administrators to restore data easily from office 365 to another.

Additional features

Strong encryption: 256-bit AES and 128-bit TLs encryption

99.9% service level agreement.

HIPAA compliant

SSAE SOC 2Type ll complaint

Application-level authentication (O AUTH 2.0)


Source: https://azuremarketplace.microsoft.com/en-us/marketplace/apps/spanningcloudappsllc.spanningbackupforoffice365

Source: https://azuremarketplace.microsoft.com/en-us/marketplace/apps/spanningcloudappsllc.spanningbackupforoffice365

Works Cited

"Cloud-To-Cloud Saas Backup: G Suite, Office 365 And Salesforce". Spanning, 2019, https://spanning.com/.

Luftman, Jerry, Rajkumar Kempaiah, and Eduardo Henrique Rigoni. "Key issues for IT executives 2008." MIS Quarterly Executive 8.3 (2009).

Subject: IT

Pages: 1 Words: 300



[Name of the Writer]

[Name of the Institution]


Main Post

Cascading word is used in “Cascading style sheet” because it refers to the ability to resolve conflicts. Cascading word in “cascading style sheet” is used to describe the way of styling documents. There are three methods of cascading style sheet(CSS) which can be applied to the websites for styling (Mione, 1999). These three methods of styling are "Inline CSS," "External CSS" and "Internal or Embedded CSS." Inline CSS is used inside the Html tags in Html page and is very easy to apply. For example, you want to change the color of the paragraph you will write:

<h1 style=”color: blue”> Write text here </h1>

The style attribute is used to apply a style to HTML tag. You can also change the font size, font family, text alignment using inline styling. External CSS is used to define all the CSS style attributes in one file for a web page. You can simply define the style attribute for HTML tag in the external sheet, but you must remember that style tag is not used in external CSS. You can define the attribute in this way:

h1 { background-color: white; color: black; font-size: 20px; margin: 10px;}

Embedded or Internal CSS is also used in HTML page just like inline CSS, but embedded CSS is written inside a head tag using style tag like this:



Style attributes are defined here



Follow up 1

CSS is used to define the layout, style, and design of a web page. HTML was created to represent the content of the page and CSS was created to define how the content will be displayed on the screen. Without CSS, it is tough to design the layout of the website. CSS totally changes the look and feel of the website.

Follow up 2

Bootstrap is a framework which is used for CSS styling. It makes it easier to design a layout of a website using grids. Bootstrap allows to create a web design more responsive, and it includes new components which help in styling a document more faster. Web developers prefer these days prefer using CSS with Bootstrap to made look and feel of the website more responsive.


Mione, A. N. (1999). HTML in style: Using cascading style sheets. Digital Systems Report, 21(1), 1-7. Retrieved from https://search.proquest.com/docview/217925109?accountid=41759

Subject: IT

Pages: 1 Words: 300

Case Study

System analysis and design

Student’s Name




The goal of this paper is to provide detailed needs of system development for an organization. It analyses the operations of an organization, problems faced in the management and recommend the right system design which can be used to solve the problem. The analysis of the operations of the organization established that the organization required an automated system where clients can order products through an online platform and track the delivery process as well. The XYZ Company mostly deals with organic vegetable, which requires immediate delivery of products to customers. With Online Library system, which can be used in tracking and monitoring products from suppliers, warehouse to the delivery process would be profitable to the company and therefore, the design and development of CMR system would change the way XYZ operates and improves its efficiency as well.

In most cases, system is designed and developed to solve a problem in an organization. The problem could be related to management, operations, financial or any other issues within an organization CITATION Rus15 \l 1033 (Russell & Russell, 2015). The system analysis and designed involve various processes and at every stage or phase a specific objective or goal is achieved. In order to develop a workable system for an organization the following stages are involved to ensure that the needs and wants of an organization are met.

The Case Study

Background of the system

The Online Library system is designed to improve the working relations between customers and the company. It ensures that customers can easily reach the company, get updates on the new products and also order, track and receive products without any delay. It encompasses several users’ platforms to allow clients to use the system efficiently. The system would be helpful in reducing the overhead, time taken before delivery and improve the efficiency of the company hence profitability. Fox (2017) pointed out that Online Library system was popular during 1997, due to lack of efficient management system. However, much has not changed and several companies still use it for efficient management. It includes several components essential for running of a company. The proposed ONLINE LIBRARY system would be used to link all departments of the organization to ensure that the data are centralized for efficient management. Delivery of products is a critical component of efficient business management and with proposed ONLINE LIBRARY system, items or products ordered by clients would be delivered on time. The analysis of the data gathered indicates that XYZ Company has faced challenges related to tracking, delivery which is being done manually, and it takes time to sort out orders to send to customers. With Online Library system, customers and members can easily order the products online and receive at different part of the country without facing much difficulty. The Online Library system is designed to solve the backlog of people streaming to the library to read books.

With e-library system, it would be easier to engage lead customers, build scalable sales, sort and delivery products faster to customers. The system intends to change the way company does its business and improve efficiency as well. The XYZ e-library system would bring together all the departmental operations to ensure that a specific objective of the company is achieved. The installation of the system would also help the company to improve the performance of the company. The company would be able to collect relevant information related to customers. It would allow the company to get relevant information which can be used to develop a platform and relevant products for customers to meet their needs. The


The proposed e-library system intends to have several features to support the operations of the company. It shall have users’ interfaces for customers where customers can be able to login and make an order of any products. This will allow the company to make quick delivery of products to customers CITATION SRa14 \l 1033 (Ramakrishnan, 2014). The fact that the system is integrated with all departments makes it easier for the management of the company to be efficient. It intends to have contact management, social media management, reports and dashboards, mobile apps, email tracking, and tasks and deals. However, to make the operation of the company very efficient, different channels and points would be included such as websites, live chart, direct email, social media aspect. These will allow the company to be able to operate efficiency and build a good reputation in the market. According to Adair (2014), technology plays an important role in reaching out to customers.

Business Justification

With the expansion of XYZ Company, there is need to have a system which customers can use to reach the company. The YXZ Company sells and rent books and most of its products are magazine, books, Newsletters and research materials. This requires efficient delivery of product to the market and to customers. Again, the company is expanding to other regions and therefore, it would be important to have a system that can be used to track operations from all branches.

System requirement

The development of system for efficient operations of the company requires the understanding of the operations of the company. It will be important to understand the profile of the employees, products being sold, customers profile and model of operation of the company.

Users Diagram

The user case diagram of the e-library indicates the functionality of the system and the main purpose for the development of the system. The users diagram provides a clear description of how the system would be installed and operates as well.

Figure 1: Library management system

Class Diagram

The UML xml file


<nav class="navbar navbar-expand-lg navbar-dark primary-color">

<!-- Navbar brand -->

<a class="navbar-brand" href="#">Navbar</a>

<!-- Collapse button -->

<button class="navbar-toggler" type="button" data-toggle="collapse" data-target="#basicExampleNav"

aria-controls="basicExampleNav" aria-expanded="false" aria-label="Toggle navigation">

<span class="navbar-toggler-icon"></span>


<!-- Collapsible content -->

<div class="collapse navbar-collapse" id="basicExampleNav">

<!-- Links -->

<ul class="navbar-nav mr-auto">

<li class="nav-item active">

<a class="nav-link" href="#">Home

<span class="sr-only">(current)</span>



<li class="nav-item">

<a class="nav-link" href="#">Features</a>


<li class="nav-item">

<a class="nav-link" href="#">Pricing</a>


<!-- Dropdown -->

<li class="nav-item dropdown">

<a class="nav-link dropdown-toggle" id="navbarDropdownMenuLink" data-toggle="dropdown"

aria-haspopup="true" aria-expanded="false">Dropdown</a>

<div class="dropdown-menu dropdown-primary" aria-labelledby="navbarDropdownMenuLink">

<a class="dropdown-item" href="#">Action</a>

<a class="dropdown-item" href="#">Another action</a>

<a class="dropdown-item" href="#">Something else here</a>




<!-- Links -->

<form class="form-inline">

<div class="md-form my-0">

<input class="form-control mr-sm-2" type="text" placeholder="Search" aria-label="Search">




<!-- Collapsible content -->



Objective Diagram

Sequence Diagram

State chart diagram

Active Diagram

Component Diagram

Deployment diagram

Proposed service

Online Library: this service improves the site by providing students with e-library services including books, past papers and other learning materials options and ease of doing business with the company, with additional features such as e-library account, payment type and category.

Library Membership is more of maintenance or backend feature its assist students and other users depending with their preferred service and cluster them on the mode of business requirements; the service has sub groups of specialization, categories and membership duration.

Products: It provides users with a good option for products type such as for hire or purchase .Accessories for onetime and single buyers and lastly advertising for on sale, new arrivals and wish list.

Cost Analysis

In order to design and develop e-library system for the XYZ Company certain amount need to be factor to cover the collection of data, design and development of system and installation process of the system.




Unit price



Designing and building a website





Building e-library management system.





Voice integrated system





Email integrated platform






Gantt chart


The e-library project for the XYZ Company intends to establish a good system where clients and members can borrow and purchase books and other reading materials through its online platform. The e-library establishes a platform where books can be order and therefore, it ensures that the operations of the company are efficient. In this project, the online library addition to the system of the company added several advantages to both financial and operation of the company. The XYZ Company having a well developed website but does not have an online platform library. This was deterring learning in the XYZ Company making it difficult for the XYZ Company to provide efficient online classes to students. Using the diagrams, the links, relationship and connection of the library with other sectors of the website has been properly illustrated. The website interface has been improved as well, making the website users’ friendly. This makes it easier for students to borrow, read, and purchase learning materials through the online platform of the university.


BIBLIOGRAPHY Adair, B. (2014). CRM Features and Functionality List. https://www.selecthub.com/customer-relationship-management/crm-features-functionality-list/ , 2-34.

Dalcher, D. (2012). The nature of project management. International Journal of Managing Projects in Business , 2-15.

Fox, T. L. (2017). Systems Analysis, Design and Development Case Study: Sarah's Short Cakes Sales Order System. International Journal of Information System , 3-35.

fullerton, m. (2014). Integrated Marketing Communication Project. International Journal of communictaion , 2-15.

Ojiako, U. (2012). Facilitating the Development of Project Managers as . Reflecting on your management of the project , 2-15.

Ramakrishnan, S. (2014). System Analysis and Design. Journal of Information Technology & Software Engineering , 3-35.

Russell, J., & Russell, B. (2015). A Systems Analysis and Design Case Study for a Business Modeling Learning Experience for a Capstone CIS/IS Systems Development Class. Information Systems Education Journal (13), 2-35.

Soderlund, J. (2008). Project Management : Managers And Teams. Relating, reflecting and routinizing: Developing project , 2-15.

Sutcliffe, A. G., & Faraday, P. (2015). Designing Effective Multimedia Presentations. International Journal of communication , 2-31.

Subject: IT

Pages: 7 Words: 2100

Case Study

/2(),-._ bjbj,E,E 7XN/N/6D D 8,hTjjjEpt)



j_w0Av eeeeeee33eeeeeeeeeeeeeeeeD d RUNNING HEAD IT

Case Study

Name of the writer

Name of the institution


TOC o 1-3 h z u HYPERLINK l _Toc10000793 Why This System Should Be Developed PAGEREF _Toc10000793 h 3

HYPERLINK l _Toc10000794 Benefits That the Business Would Reap PAGEREF _Toc10000794 h 4

HYPERLINK l _Toc10000795 Project Scope PAGEREF _Toc10000795 h 5

HYPERLINK l _Toc10000796 Diagrams PAGEREF _Toc10000796 h 6

HYPERLINK l _Toc10000797 Use Case Diagram PAGEREF _Toc10000797 h 6

HYPERLINK l _Toc10000798 Sequence Diagram PAGEREF _Toc10000798 h 7

HYPERLINK l _Toc10000799 Data Flow Diagram PAGEREF _Toc10000799 h 8

HYPERLINK l _Toc10000800 Entity Relationship Diagram PAGEREF _Toc10000800 h 9

HYPERLINK l _Toc10000801 Screen Interfaces PAGEREF _Toc10000801 h 10

HYPERLINK l _Toc10000802 Gantt Chart PAGEREF _Toc10000802 h 13

HYPERLINK l _Toc10000805 References PAGEREF _Toc10000805 h 14

Case study

Why This System Should Be Developed

Air Australia, founded in 1991, is among the biggest companies that work in the domain of airlines. With the thousands of passengers travelling in and out of the country annually, the aeroplanes are equipped with all the technology needed to survive in the 21st century. The employees of Air Australia are dedicated to providing a quality service to its passengers. That is why the aircraft carrier has a high customer retention rate. With the business of the airline expanding rapidly, it gives rise to the need for a centralized database. That would not only streamline processes but also facilitate customers. Due to many collaboration pacts signed with different airlines, Air Australia has seen a surge in transactions. This surge in transactions is reflected in the expanding business of the airline. With business expanding at a rapid pace, it is getting more and more hard to manage the operation with a staff that is already working hard to facilitate the customers. To assure that customers are provided with services without any turbulence and to safeguard the business interests of the company, it is a recommendation, with the consensus of all the stakeholders, that an Air Australia Flight Management System should be implemented.

Benefits That the Business Would Reap

Undoubtedly, the benefits that the airline would get are great in number. A computerised system would assist the staff in managing all the information regarding different airlines, flights, and passengers. The computerized system would streamline operations. Streamlining operations not only helps to foster trust with customers, but it also helps to retain them (Connolly and Beg, 2015). Transparency in any system is key when it comes to maintaining a fruitful relationship with the customers. This computerised system, which Air Austalia intends to develop, would ensure high transparency. The customers would easily have access to operations from anywhere. Whether they are at home, at work, or at any remote place. Not only they could view the fares of the flight, but also it would save their precious time that was previously wasted in standing in queues. Maintaining a computerized system would mean that passengers do not have to pay extra charges for travel agents. The travel agents are charging rates of flights at will. Air Australia flight management system would provide monetary benefits to the organization. It would save the organization a huge amount of time that the staff until now are wasting by doing more than their capacity. Multiple customers have reported that they had paid their agents but their booking was not confirmed. This computerized system would plug these leakages as well. This would enhance the reputation of Air Australia.

Project Scope

During the planning phase, documenting the goals of the projects, costs, limitations and deadlines is defined as the scope of the project. In the case of an Air Australia flight management system, there are certain goals that need to be achieved in order to call the system efficient. The functionalities that the system would perform are numerous and discussed ahead. The collaborations Air Australia does with different airlines would be stored in the system with each airline having unique id, contact and focal person name. Furthermore, the information about the aircraft would be stored using the indicators as model number, unique registration number and the capacity. The flight that an aircraft fly would be indicated by a unique id, airport of departure, destination airport, departure and arrival date with time. The passengers information would be stored using unique email id, first and last name, mobile and address. A passenger would be allowed to book a single or multiple seats on a flight. Additionally, a passenger can book any number of flights. Similarly, a flight can be booked by multiple passengers. When a passenger finalises a booking, the number of seats booked and seats available would also be recorded. The amount paid by the passenger would also be recorded.


Use Case Diagram

A use case diagram is the one in which the entities having any interaction with the system is portrayed (Khurana, Chhillar and Chhillar, 2016). In this scenario, a passenger can book one or many seats. Additionally, passenger can book any number of flights.

Sequence Diagram

A sequence diagram is the one which shows the interaction of different objects of the system (Campean and Yildirim, 2017). In this system, first of all, the passenger will log onto the airline management system. Suppose, after logging in, the passenger requests for a booking on a particular flight. The system will run certain queries and will acknowledge the request made by the passenger. Once a booking is acknowledged, the passenger will close the airline management system.

Data Flow Diagram

The data flow diagram shows the flow of data in a particular system. In this system, the passenger requests for booking. The request is sent to the system server. The system books the seats requested by the user. The system updates the number of seats. The system asks the passenger to pay. Lastly, the system prompts the user to confirm the booking.

Entity Relationship Diagram

Entity relationship diagram shows the relationship between entities that are interacting together. The entities are shown with green rectangles. With their attributes being portrayed through orange circles. The primary keys are represented by underlining the attribute.

Screen Interfaces

This is the main interface of the management system.

This is an input screen.

This is a screen that will give the user a report about the action that is going to proceed.

Gantt Chart

A Gantt chart is used to track the progress of the implementation of a project. In this project, first of all, requirement gathering is done. After that, the designing phase gets started. This was the First phase of the project. In the second phase of the project, the coding of the system starts. As soon as the coding begins, testing also starts to take place in order to find any errors that might hinder the timely conclusion of the project. In the third and final phase, Deployment starts. In this phase, the system not only is deployed, but the training of the staff also takes place.


Campean, F. and Yildirim, U., 2017. Enhanced sequence diagram for function modelling of complex systems.Procedia CIRP,60, pp.273-278.

Connolly, T.M. and Beg, C.E., 2015.Database systems a practical approach to design, implementation, and management.

Khurana, N., Chhillar, R.S. and Chhillar, U., 2016. A Novel Technique for Generation and Optimization of Test Cases Using Use Case, Sequence, Activity Diagram and Genetic Algorithm.JSW,11(3), pp.242-250.



dagd mp dgd mpdEdd-.hImh6CJOJPJQJaJmHnHujhh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHuhh6CJOJQJaJmHnHu.hh0J6CJOJQJaJmHnHu 0 1 2 K L M N O P Q R S n dEdd-.hImh6CJOJPJQJaJmHnHujqhh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHu.hh0J6CJOJQJaJmHnHuhh6CJOJQJaJmHnHun o p q zzzC-hh6CJOJQJaJmHnHu.hImh6CJOJPJQJaJmHnHujghh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHu.hh0J6CJOJQJaJmHnHu yZyyB,hh6CJOJQJaJmHnHu.hImh6CJOJPJQJaJmHnHujhh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu.hh0J6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHu 3 4 5 6 7 8 9 V W yZyyB,hh6CJOJQJaJmHnHu.hImh6CJOJPJQJaJmHnHujShh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu.hh0J6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHuW X Y i j k yZyyB,hh6CJOJQJaJmHnHu.hImh6CJOJPJQJaJmHnHujIhh6CJOJQJUaJmHnHu6jhh6CJOJQJUaJmHnHu-hh6CJOJQJaJmHnHu.hh0J6CJOJQJaJmHnHu7jhh0J6CJOJQJUaJmHnHujhh0J6CJOJQJUaJmHnHu9 8 ( ) , - . / 0 1 ddgdOmpgd,Sdagd mp dgd mp


/ 0 1 _ c
























_Toc100008054Ddd 3 @A.AMP-102451 USE CASEEEER(_AX zFP(_AJFIFExifMMJib. Muhammad Haroon Hayder4646 20190529 01540420190529 015404Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T015404.456/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((( -T57Oem_ZQzbFOjwOjFFOjwOjFFOjwOjFFOjwOjFFOjwOjFFOjwOjFFOjwOjFFOjwOjFFOjwOjFFk j9kO3QwsgG


PEPEPEPEPEPSPEQB1@5OJa6v .9.6I 5xlY.dye1l.1kfOs@kNric7hl,NrqsV(V6151VUx7iiqgk)YcS4rl@B@5j7WQEB cGZEglXc v8FZ(b0S njbchv1VkYxrVMTi-wdvli2rXcY- yadHOi efMwom.HXeqqm..Zc6lDpI v lyGQwQrxQp,X7 szMej I6@lddEeGo Zl4GArp



PEPEPEPEPET2hjHLsc@MrcSKq3PUoY4Xt9vUFl( MqWE DFF@IKR4-ep3.Zg3y/a3RGJ)b_r3dAmqg47vKQvtSSwsYkeEFV

ZxOFisG5n5-htW4W/qj/.L7oUjvG,XbqAw1rFQXQ@Q@Q@Q@Q@swY_tTQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEswY_tTQEQEQEQEP- o/d15g9A@2.1zYri)99ucak )cQErIY,uoHU6XzualWHelan1Oru,dMosoosYF(,1qzzmA 8Ak9WT,(hQhVNBncv@vdcJotEnm-dugjMKrCmSF3W(NwBqr w/ Y,ngTxL bAnQ7XWIuOXlw 0vH 5iC_ZNA1oOoSZWDNS.WCELJYSF@d

oW/9 m,tvCq sPFEkV1iTJIs-Q@QEQEQEQEWzbu5o_,PEEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPzbu5o_,WE@Q@SD uyO)o1X_sNmQkuBWjO)doSizork_P m_hr lOP7D9e4fB-CO5eOSqcD-fs9(Y5KV.tQEsEsb6rNjYRu8MS-M8 9d8siQlm0k9Ok.lQE.v 6W4SEeXw kvnL d

ewux6cLwnEvXKl)6tI (2 U u7Nizh3K5EkY1h9wF. G b7( Ii.s5/cfx@n9gJ-KkX@@0KO2J(((((wY_tUkX(((((O,1Me_s,U2Z(h HBxwQmwcY4GLh@ 5 ( ( ( ( ( ( ( NMxO.rnlirW/j5sZDi-jmh,k(lA OcCAe

1ToA_RmW @ WxGW siyxQV QEaEPEPEPEVln@f39GdaJ2jpvvEDq8kE_9/m)oO_GY2k34



w1E,gf4VKYdxjA37D)9j0A,wWmycjAhCLtT0--0aVRRHMaxjmPIrjoQjt XOir2mX(pcBKV0Q1l3yHt,T6q9VnHs67v_DJtZU8 kucn Pv7gLVi

WOE t7_yJArc4(GVqXQPXQEQEQEQEWzbu5o_,PEEPEPEPEPEPwWJurynL0gD/6UhR/.m7SUsON)JQ i6ZqqkpdB56g-fVHVR5xg3mq.uRR81 nO-NLIFFz-H4rp3kj 0@((((((kztGN)O3Pz5UGXJN-Rar5 r7s_i6NDRVEXh2esCcGZi6Cmi W/jnWrh1/DSxm V JMRFIUQUVESwQU

d Idi11iqj6@XN7.Jlx

myeLM_cCX9 6Z4MZ8d_ _g_jJSuKjZsJu/7/RKEk blOaEDQ0u7yB)AXu5o_,WEE

(((((( k hzf(saAt qEuR uBcwIV73uSX8ER3bQVOmCZxPb.xG9kgTeq9ux,vU,G/W)Xx_nWty7k


P9_g7R7FFml zyGxio/OsRo5Y9B UVWRj/3OD K

seUlc8FIK1( ( ( ( ( ( (0Kvn16yX@i5g7 Ki4kCe2p x ahAer0pzfSRIke/iOJQO4L_q


6mtrYJNY9dB(eC YWtUc0JXiN( FiWzGAmrACqMvDvXr,cX2Injy1RWZB.vnOhJ4WAERkXgG

PEPEPEPEPEY WY1vV.8iRWhUjyqcp5e06t1Xx)G@q(c4QU yfK97rLQwZQh,KE/o_vMY SLLsbWEE/w /tQWG76Olbq1aOkSskubKONjGH-hXQGOAZDs.LJcGs4b4vQw_Y6uaJ Z1(C ( ( ( ( u5o_,WEE((fW,0Uk-tg4khxdu3co _3uHjFfeasvzO h iHNC UdtK7oT Gwg8-)ij (guOq/ZOn)z(5 ( ( ( ( ( ( ( (0u MKoUZs,B UQIWHr,j Ct4QEsQ@Q@G5)_RQBvuL9

cEVBntSGA5QET5oM- huk nmY(KZ)d(Vk_w8-Gv2xCNKoH kTrz/gkj_

siV9-lLAhLikziIhsa1pYhtJtW3Zqcb@AokztVxq 7 yRU0aVR8IXT2r@KvmJ-z8II89v3YwyExzEzuvmGo2Osi6pH@WWEUl/ceU6RK2FxxL6cv9iGZyFT.vu12d/k4y 6)vkiOGn@W5 G Eb.qNMWQ,LyqBRKH8F9xFZNxfvpHjrYHjb9@3N5 OBpy 8EcMyf3gYNIjc5y2)FIp6Dxz 9XQ tvNoLO5K NK5Cq4eF7w1(t

Bc, FvVc-wqhtX Z4jNf v2JSqZWFh1-i wo8i 2nF4@Nf2coVo2S x.( rmG_bM1 4B(,N92)I(Tag OorRJuWLTpxl-A4C-NI8Ju mvu dwj,ufcFr9ZqeEQZAxOukKgkEWQEQEQEQEkXgG

QEQE2iD5fv@7aKz_owVSIkNm4aI4ssStkFaQRw6-7hAu.w)uZNoUygoOqOyy7-kjUQ (C_ 5KYAoEL9revr,D

CFbKo_2Kq078DW GVdYl FLjw hY3UsXARQZF1n3((((((((V1 bYGb1V@TFt)(

G7hc-ltPyqE7urCfiivv kl83A.sjI yrxS/fo_xkmTx/2T06HgaR2RWAEVeQ@Q@Q@Q@EwQEQEU,/Vb.yY-djF(s88G_MzmYmFRL91vh6j uKaW qEsLyZ/A

sTrqNQEAaExHZ18m8)rwqiTwTtjs3szO@keQjSMlh9tXu)/efeX6 0 c2juX-cG crxKvH@Wkq, @-Tr1POwis5inctCqMWoJ3GqsBC29RU-dxQmNWIQG/L9tjxhM8wBwdpqNZxosdUrA /bQEPCAnJom9.Xw31W_fT2SNLDJZ(((((wY_tUkXWXN6PNQc BHy..UEAk2MJf461yONgKk KZjoTWzNYCuq 3nzx8RxPhu1 tTR_oUd7u4ievngdsiEg)9IQTWW1YYupaG @rjV.-5sKzp5qjqK0bOEQX-cii6uzrxSQkwO t/hVmrX08 V5i5fqV sC kGKoi@JAyWsg5kVm55M8G 86EW9QEQEQEQEQEQExMm uQN(zBZ_4iCJCN/fLWbUQ0WkiT_7(M xV402eTC9y5 uHEuAxtEtm5RPxN HyU_b_72((((ws(((( QSnuEa3zlr0 tFQsvDvvtx0Mmts3PnUu-.V-_k(z//m(5jcVYJO)u _mZV76W

gUijZdDhI7qPI2M1Aept(,6XT.8ai )Diq2zy9dFM6ND1QN2p8ZMILCu1BrgTRTu BD8b8mTQ ucAuKy Yw 8VVZUGKZEbkcCxXm4X4izZnzCXUrReDWwfx6 UBU0 ZeStFF(B((((vDWTDeMljfnop9gGse ffXg0.GrvZ4_nTbNh4 SkNoVQFFT)R g7wzW (kZ5GR/dT0

GX tQSWzzXFI,dkqQkPM4KOrS5/v-M(8R_ ((((((((((,imxIsyveTm-(QEQEQEQEQEQEQEkXgG


sj5QZRPWgK(T.Nzo7Osb4IE/n/.g2nmTH/wrhXZ//7LM6(QmgmEc9nwfdQEAaEPEPEPEPEPYkvgIO5N ybyUvzLs8wRSvwvj-oo.EwY8ZT7wpXuu mJ X399y 2uU- NSloau5V0IW (((_cImkP4BWNZWtK K-4SM.8yTkK,)ZS51ZZ,(ZPp0TN6KFd2fYZiw loTg@.03uUsVdC4hQR5hB-y4)(


3LVL_jVQX-lil-s6FI tEiYm..aILkF


5GxFxUQCAm,Mmv/QBq(T.8_lzTKi8.tpY.pUA EYna2 , OZG2X3I uynU6pUH0zmE.1QEQ@Q@Q@EwQEQEQEQEQEQU5VIXu4-sCmXuy(F1/JI KC YjSvt(mv4On9ndXsBKxA1 Q boEw9a4iK4__DSJ(Wa_YohJQK_pgHkNEEl0Z)hoO-KMV.5aiv@

a80uYR fW

/)n9 B8c(IsA.EYW((Mdfib1IETbJzmdY vz5yUur1MnHkJUCigoajp00TQVAEwHgEm.SxVkpI31NaNQZKGG,Eo,QEuQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@EwQEQEQEQEQY7M3TrPuoFd sxrGK_.VTv t732SYF7k6(fZrDyup7UtWqsY69Ym9uBtVi-eLfUvF s_e1dHCc0zqsWDPps6KITHiryq0pOGE.16)W i -Rr8TGS@k_ysZ_z3Xuenn4YgmTo15vim/210nw TUEcGP7)Gy5.Ikyj2yY.P15NYv3i6t BN_Q(2IfRHFO1yX7)Iz2yOHm3KVCX(idZ2F@NZ7jBZXF3pbssOl FsWwEeMnZHc 9A.U5icD_ GFfgQHChoc1ZxRr3gwCsOTK5dM-uRhUfcsRmblU nz(i,Su4epSapU/Ics9iW.ZwynO/aEVEPnmEIQ CPo/ Ksqv_K V7hnzAkjqIses m8nCcaH9qZQYNoQETQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEswY_tTQEQEQEQEW5@ODXw5wRbkJ7IiH2im)ERQYWvz1E2,326g6OOnPIaW9kYxk G3K@px X Ho, QrK)/jZgy@mt ECEDPIWmkm,W8UDRANVnIrN ncpyOvAsmXn.YP.03)xX tFva99JGEb.wwKoow7sTiV inb(ni/squV3V ITVAl6mv_rOw(XAUzNUtiTXQEQEQEsz(eim8fp35oIRiwvoz6ERvoT-QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEkXgG

PEPEPEPEPEPwaBmODwbwOYp/wT4xUVrNWo 7cizogefd)58ujR.ZldRrpOA1HH8-1MKb(icYEPHOyy64.uZEr91MttQg.-KUEYmtavcPerneHTQGPQ6IoqOlKH p09T/a gAHng8QTI TbG4G-HCys)c BspO.Ef8gvnD OV6zW Ypt_v9GtO RBzt6mQX1vb-HaADU5hlty p(j0q 2OSMdSob5ilMQ.xJdoayZFbdM_(8kaNKwY_tUkXs((((((((((((((((((((((u5o_,WEE(((((( 85Q05yLRpw IcL O-knck5s/3Dqu5QK8rUO9NtKCJ(J5 6L/MhWJI9k3NOPe/o5iUQ5W

mllal(j(m (((qn.sI ,M, 11(TQWByw//Ko_5QHWzbu5o_,PEEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPzbu5o_,WE@Q@Q@Q@Q@Q@Q@Q@MjV0k76Si/fb4EUEhhxUfTs db/J_ G) w_z1xsH5OQLRi.gm0iEFS_Z pwj)1z20 9MEQ@Q@aTtxz NE@95M1 C8MoN)R-K.h8,Jwy396T (wY_tUkX((((((I8sg_C2f_q2_,ZTeOxOd/2 AY) ( ( ( ( ( ( ( ( ( ( ( ( ( (9gG

Wzb(((((ss.@/5YJ-wPy//1zcWDiF1SsJ Jn/D oYxsGP)WksE8Oj)_o7/aMzm2vM.KrQcorzRcMJ0QI-Ms/NtO_J1EQEVe ,aC69Sb5-fJ lNHZcVhTQfH5D9-5xGGpglp0zim mCi)lqJxoJhVVHuCrW/_Lk3mKfXUu)4FNCVu)8YURhkYwS7jiQPWZq(WQQpDQTT3ekQYQ@swY_tTQEQEQEQEQEVlkwu1SOAAYJz,r39J1-gQ76Zop-5qafXszOScjm

k H2I2Nei-GE686qZUhsbpf7zybE7gtjZ)9_Pkp2))-(S((((((((((((((ws((((Q4 1 2Fo/1KEOFxEJOcq8. KiVi7(vvAbdmm-9P2

)TsH 3 iMK1mF8fVG6-vo8(EXct 0 MRt__.s qFqtkRjVv j@PmAX3QO7NqYfVWN4wIVf G)pz3M0oTOLFxtKL tKsgk MOZy8o.7ivmfpabI-FX1 s1SjEEii 2239vPu5S_.KYie3(Va2U Zk o9w@H1tVNopS3DUFsNMiW,2 H Zwba8eVmX R,RElgXgvA7.CISt(uKb UO6IAHN2JV7)ZHSy fdwF4,qq,ms4G@5hcmlfaE lMMLGZ-D63DmRfd SnnDIDy/IjnYeAl_w_/.vIqt @@OpJ9CWm.uOEI(ES/k/QXEPEPEw@Q@Q@Q@Q@VEIwajMqJQxXTO v6xIRo5SKfjj/_msic7Q__)I/X.7VB12zOD K



czcK9heAkRQQxO (d zq@WEKT tAWEK7

jaqrQ8sdveb)5K rsGQYMpIhzMu6C8Tw@u zIVIa12lGwF85.x7Lp9VwXA@0cO M7X1qQiTciOh2xkBCeRIqNhNk4(3Y,thjd4LRx_9 ynkmJpWnG_ro/QEuQ@Q@Q@swY_tTQEQEQA II4UCSMpF@74 L. jqWGPWTzyskSJ4doLwIfU.4wQEW gJ3WtS_8(sP(((((((((((((((ws(((((tY2dWhQZSSrh/soMoi.2B6JGQ20k aiIkF8j3r-W6G7hh4-jrimhFvoo-kx_N4Zmlj.QZ_sK4fO GxFUzN/_X7-6IIcEfco38LMiqjGOeNjKulm4X.j2KFBx J/(Z5f-ugQwgDbdQEQ@Q@Q@swY_tTQEVnXhuiUo(xh

VnaIew1d,Ue/jkKiV9 msy5zvRWDv1 .J(AEPE-cWtSSCkjsIZ6aqNILnl-w4yPFx2XS6) ((994zmt6_4q


vUVErf (((((((((((((((ws((((((((((((((((((gG

Wku-GJ-@9MNvM48gW3xrwmvRYMIzDJ68((cXAD oN/37I,JvrzjQEc)Jnw7h J ( ( asMwFtkEmlOV

t- xoA-d h4pzA IXOu.IFpey/aakXB(pU(mqd fOb.C-AYBDaPr s2XEu)OnJco/zvWFwQEsQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@EwQEQEQEQEQEQEV.HwPANGpkxwU,uefmNA68Q-4eiETBz_ sh-_xNvuQGunsrr/eRr@Ufk_OG5 OlW0iXFHzz lmmc4A0uOoJ.@6/AcxSdi/luUMUGVfQEQEQT5MjF5C94dUxLunqFAkE7)iWKXi 7V/JEv2x66Gl3IS/(SXDbu5o_,TN)Fs3P((((((((((((((((((((((ws(((((7rTPDzjl1WBOEccmGie c uEFTY9U_Y7Mdv9 (I4pX ( ( ( ( (fXnKO3EjhYi-gVsj_ETqZwIStu_gEEgZzm e_GiEN/ttJQR0,pD QMbI(j9q)DeV/2uiu1l5 G)WSpo572zsV1 .JjbTyGvwaEV@Wzbu5o_,PEEPEPEPEPEP52txuK8eoG8-nmD3DrQpGZCJ1y6ie4,Xf(Tv67nA0I-_ 5XYXn-8

sxHXF9l)E_vECRdpSxKnKc@RTga/RFB1N60s vBMZ9jO W0 WEKsq5C LcHdzjs42,BVFicnQ7lYA@JQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@EwQEQEQEQEQEs64A/OvC1tbtiVe9/jOmnr ydW6,3 r1XlkfGO,oAbsyILKr3e(7Fx.U0 fic0kXGgG5fmm MdMCNKM 5@.BGQC vcog9 ViOBvcfE7C0w(-G VzqCLWky7kQugNuNZ4o2Vf@FyJKm4OmMlfFMj93 32g106u1X

_EI/_E7iqx8z_uCgh0 enoc,YcHt8SuvvZJ/q9KmT0m)j2WiIWrHAOHG1v/s5q/Eo/v3wcIi9oddkc3phBvxkDKm/_l3OZ c/LxmFPhnnY)P68Zkfmk_nei6ccm


Q.I9bZm_z4-MUmk(G1ghuN(PdmoA/mexmO-H-JpGU5u R5gnD4QMVAERQEWzbu5o_,PEEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPzbu5o_,WE@Q@Q@Q@Q@Q@w1L/Xt5XU)OPXkvfRYSOFCjR)Sr//Uvji/ Mj (xy5zoyon QrlrG4K. ) ( ( ( ( iTfy


W7H5(Zw37mtwv6qy2C 2cZzm)mS-/RUFh fN3GW U-W)QEQEQEkXgG


PEPEPEPEPEPEPPYZCqaSMtVg2o4 JY SwxKevCZ WeEt,LRmT7m(WeI)S4vhu(xoLAkxw Gm EZu2E2S@ /R DhKHbw8wKmBoxVvHT //7ac cikXxt (Rsw) V (((((wY_tUkX(((((((((((((((((((((((wY_tUkX ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( u5o_,WEE((((((((((((((((((((((Cq


xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T024151.112/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C I 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F(((((((((((((((((((((((((((((((((((((((((((,V(MnomHhKPMXdsjVuCEAeo F9iQLAEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEP_dXOS5sttW-e8AV_yQEus

ev9F25W5Rphf0 ( ( ( (CUuqs



8X98QEuEPEPEPe 1/U3PcsNu- wI_Q RgX_bgH_MGu -azMI4 o(vz/I4 /_KgX_/(H_/QcvbgH_MGu -azMI4 o(vz/I4 /_KgX_ESJG(SZ5xZO7)Fv Bp((KgJea5ZYBHFNE,GM,hYMSv7f0M3HIo.Y PXj_O/3WdF2aOikH0F7E6VKc ((((

s Gu CMaj-nuWe46D4Ys9Kk7WI xWZHjRr205IqobCCu3x4Q,hrq3rIn/( )NsW-Ko.wVv5Ov.7c zVfkDkLaVt1jyv6Hs/POowl 0 7V ,hSWrj mJM9sWVE3Iv

xMiRBnOa@Mm2/cf ZOKiBIFK32MynATv,B3lVVDHQT4_bi )N8yi-Qn0Ak/HdM7 X1xn mn5xBPTPx@h@xXQM

5kcj1Scq-/ bC


JDd. 7X_KXG/qd8tSx ,,kUBFx FE3MVJmF4tXeGQC9-,Y9o-JN0zV.X9,Jl,P w6rINyemdgda2QpAz.aAr H JNpywW6g

hBFrvz6Xc b0JNycVw5 62)cj9qR H-lYX2HOwkSG-2(Hh 3P)jq4ZjkaH ecKVhK6QFyY

riRys mB0pwy1rDtOe

pd zs6.m4VHb U6NI5O_kKwml5gup-r_ZU.T(xZ3(n aSpTw jdc9d/H87V@n4 M129nWhy2iC0s

WWv43 AYzF63Fy0xjPm

smgt5_hz/(9((( GlGl9(vPj7LqZ3 P9-mu YX3FEW RU T0 pGR,_6J2J9-,ckGsp AL3, dvR R1sgZ54uP)4wsK7psGhkr-)XLQv 6OW((tJ73Ria((4jcjtSF(,eOZFSnoRA5EV1x.tY0vGoXI@z72G)ASEojWWTm@ZB)(QEhfQEQEQE__R_Hw,G5 Ps(H.@CQ1VoVsPFH.ZaZnQX@C4jjQEaG7uhoUF 9 GVoVsPFH.ZaZnQX@Coni_jOE0XZ/

9 OT W9 GsPFQ07(H.@CG(4G7uhro T W9 GsPFQ07(H.@CG(Y3eXD 29QK mQG(QEQEQEH-pOQI-pOW7SBQ8QEU)-uWi (iTg(Wh wd763)0VV1Cyg P1hi(6A.t od(t@R(((73RML/0 ( ( ()iQh/YUKvb5yHq5EM7G_Y(0((((((((((((DH7RkFjE(((((((((((( w,eTL,tV3.k8G3QtOy9O(Qt (9O(Qt (9Osk0/6UXJRRwfQqVzO7WAEmuzO7WAEWuzO7WAEWuzO7WAEWu36Z StQZSnUI4QZQ@Q@dXYIj ZKi H6qXkbOsaR7G


Q .0POrz TcZ2p((((((.jDbkEs(8dObBQhFG EiQ@o-Fm6Ok_LfPXxPXXtdX0hEqMt@aKYcHl -uwdljym(QOoaOhvqOVKc


((((((((((((__j.DzE u)fR (((((((((((((((7KlYDsZNQk Kq7Ls(((((((3._tBHNuQTp KkS_osCJ((/MsrhNJ2hckqypX.xEx amN5IBu ZPxSak2YTZQ6, finJy,8 4m.I5,s9n1i


Z/1bsqwU65Bzdjr m@Oxgx4-D6fKngpq

dtBGXgvES7 0NNOV)a8 5h3El3g9 YL(@CqK. mR f85mKIM3Is xNt) VR-fKxVH.GLv8_WwtKss(cRKMn tM)lx@Q@Q@Q@,,f5YKXwH2)2Ks3J50 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 82,hX(MX/T7NkF ES (((((((3._tBHNuQTp KkS_osCJ(YwFT( gCci b5mkNF)mK nh- CF 9x(3z_j1w2H-4/kWs6 uUCxMk5PH cRyc ey

o-YxIl@zW-M457GlHX 6suCv4. VV7@owwuLj2.xFTz-NVa8_v99 h pS ljQ/-4zpj59pVbRzhfGfkg 99 1qZ.dIcwC@m1fHZDPcSizu3ZZde0NGQMS(.iRXk )lHZ.feXXXOq)kZ5,D3u9Qkk

F/K K@a_YFB7 PCdfXyx,n)QQQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@PH_jKlT3r3eYSRuQZQ@Q@Q@Q@Q@Q@Q@v TGBGqqd_h rXRMtZO52eROL _hM0U7.@_JeTfF UZl3 X8(G2(gAk9J@IvZNa,rid9.@_JeP9/b SG3 eiHmEldMz.@_JeP5IUUodpB8qw7/2-ivyOG.@_ xImzQ)xVn-)U XGy1.@_JePEoc5K6nigcDXdUuctYW,2S1hxrPvi-INrXOFjtYW,256,5H1xNXz-1ke R G.@_XR@W SSUwOGJgb_ u NooxgVSb_ u tYyl3yxTT QF8

6a F@oP56Y8Y89vZu,NQ ty3C8a(-Rvq9vf(bzOGOL(((((((((((((( zO

cBAoSn-)rj(2 ( ( ( ( ( ( (3GBGEGRQEGi5K5EO4 ( ( ( ( ( ( ( ( ( ((w7Qd.zNvjwStBFQZTv.EVGQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@APZuHJdsa)FPX(((((((W)tWWnRIEUR/tGX((((((((((wStBFQZTv.EVGQ@Q@rqMN, fYG0xN/ uK, )D)P qq-OMgwr7dsW3uf V 1ysmwHfk gN VtDvrm,leGgbGQc.qyrkwx(s2v1SG4MULq2GGHf82g7ggiKI13Gm p2Wx_Hyt5Fv@fCdu0x9K/K(A,x rOp


0rNg -O 1ZmDo/VH_ A kr@ZmHhPXHm)xr.Z6WY35KZtNIEuQmPauPDu

u 5p-9epq),EjWKmm4gDHLpr3_.23Zg5i7zciWs,l y ot

w rpw4T)u2r cfOO

BYXy@ 2hn4hs) 9t@xHNnC

qRs5l kl/-dX5i42d)n)jvlYfPAT@pzl IEeh6Am

rKwzemRmZqdxAPZRksT3z(((((((( wrOEuv Ty8/AQEQ2_//ZMrRMuzjdw

(((((((((((uWI)lWdcEWP0g5FC/VgBUm@h_ 3UEbFC/VvtPD

3wgnBUh_( 3TF OC/Qv1GgnBUh_( 3TF )).Aix

1 1Ggna z(iV8Yt2pZo4eZ)iw.

S8g)JNAD(Fw(H (((((((W)tWWnRIEUR/tGX((((((((((wStBFQZTv.EVGQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@r,Wu5 3h/ORTe_ EVgQ@Q@Q@Q@Q@Q@v TGBGqqd_osRTQEAQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@s.uSC /ks@(((((((((((((WuuUBv9qfmQZ Te_ J_(0((((((3._tBHNuQTp KkS_osCJ(((((((((((oOW7p ksQEhxaPEt


(((((((((((uWI)lWdcEAscz5tQEd QEQEQEQEQEQEQEQEQEQEQEQEQEW Y_S6(uG/_QQEfQEQEQEQEQEQEnRI.WE(8K5EOJ_//ZMLETQEQEQEQEQEQEQEQEQEQEW7p wS5 z(0.OP( ( ( ( ( ( ( ( ( ( ( ( ( ( Y_WUaJksfEG/_( ( ( ( ( ( (3GBGEGRQEGi5K5EO4 ( ( ( ( ( ( ( ( ( ( .s.9_EV/ t_@EEPEPEPEPEPEPEPEPEPEPEPEPEPaJgMnr(@YEGGQEaEPEPEPEPEPEPgtBHwrOEvw(/t)i52QPzEPEPEPEPEPEPEPEPEPEPoO621EuAsc((((((((((((((gUr,)_YEVY/OHH (((((((W)tWWnRIEUR/tGX((((((((((wStBFQZTv.EVGQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@r,Wu5 3h/ORTe_ EVgQ@Q@Q@Q@Q@Q@v TGBGqqd_osRTQEAQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@s.uSC /ks@(((((((((((((WuuUBv9qfmQZ Te_ J_(0((((((3._tBHNuQTp KkS_osCJ(((((((((((oOW7p ksQEhxaPEt



Pu_QM6DF06z( hk-ZdXHe IbKi6y.Od.Lqc2HtRkIf B2g@MjQukanHv9Kq


VWFTg u5jZI_qu xw qU

jE, nf r9(5Am3amwmu6-bHHXC1jZu_BSbZuMzozqIiiHjpuJbXGN(KVt2nF/KQ D2I drCV2xr1aEPaJgMnr(@YEGGQEaEPEPEPEPEPEPgtBHwrOEvw(/t)i52QPzEmm,V.u (LcjmjmtHN0s5bV2Z4wK(Nx

(Zo,Wb(/G QEQEQEQEQEQPAk-scilJOSoO6211XUw/ks5mADG FN/a5x xO16VGZ-(Vj4GssCO

25@y3g iaqmyzyc3y@sK,oArFH Sj7t-J2yDgX,bfJotTVYWxDk2wWqEqsaGoar@

rq5WkCNRHI)0HdkhVSlu LdSpGex,n-.PkRFqw4P


5gloKxno/JekoT(3)5Q@Cs(Xr8prQ-M Pq@TwixnQ/l

l2Y/neCVR9RWiEp_gYhw(YNLdPB(R2Hk0eh(__V5BS7T-gTh@SF5Mc)Ak F4Gu2ugW_ 91p2)8Jv(((((((3._tBHNuQTp KkS_osCJ(OGEC JctKFEHsGWDSw 1@EHPt6Y-gq8zw)VHoQpNxuj ,r@BrsJaH,oc2G( KfNIl,Wn(H7tgb.0@HGt2XKy@ht

S giaTd5hZVmKUbYB2KOSPuWK. 3X5g2IvclN5ZhT8

_)WnILHwQHypOJeObfmmIX3946(YY9.y3wZo.XjxoKPYNXq PXFuvK.B- 6WiMrFlw@r/F0K7DiH H95_QmABMlG8C4RB284ag2V7sPByHdT2O@kYja4cvaRAgAakbhU28EAgs)wmVyzKRQX355Fdcj 43i-.ahTbrNc9(UT P7p wS5 z(0.OPLo t@(((((((((((((((((((((((3._tBHNuQTp KkS_FqGq Ctc1i ( 6cmwWUwrjq3 rIoKA691nkaq2pz3tZo9TbM6Iy YmSs K 0MoiuVUYQXp 5zSXoxsxk0-PwA tPmG4Gqco3XQD1@RZYCssBvH25A24pS0qo/BHM

52-IgDpd1W-m98eBnOo5MX w( )quJo6Iswe/O1Zmww(P1qX

14MJFIZ_6 Gqm//loggl3(@2j@wQj6So-JN-J rZtJ uMeaDEIiSSVyI2KIWgxs,RQ- ,Kq etqUj1j6yyjo3MXhX7m mF,-fFB t4EW7p wS5 z(0.OP( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (3GBGEGRQEGukEk1Zf IjKk-oTCry28 M6Ih5 8t_x-W_V

zQu_fk9t .abXYEp9ZPM.rs_7_LkvU4YK1-Uzi 2Te/z0xzTF1Vo_tPmVFp)(ehI-1oOjMQEhxPEt

nzQYHQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEfxEGRW)tUczMuzkKkSSGhRW-TQEQEQEQEQEQEQEQEQEQEVm.nckXcVAT8_j_ @kigL89( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (3GBGv0FEr yxJSM2XkGv@/eS_A/tv5BhdD96(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((( Ddg 3 ADFDRxUZ38cT/zFLUZ38cJFIFExifMMJib. Muhammad Haroon Hayder8181 20190529 02590220190529 025902Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T025902.809/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C d 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((()u_i_aC-QU

TuoR(((((((((((((((((((((((((((((((((((((((((((((cQ-OV6 m ES((OVzoVzo UOO.QTm m ES((OVzoVzo UOO.QTm m ES262oh(((((((((((((((((((()O--j2PWc9s2CJh4H8_u5j1Pc(6yBKGj_kRzy/s7uIVJU8g8KyW5SwKYs2MMEENIMES3sH,596kv loN)cT oMi,e1qDdADMHNrTGCYKh_mxXYad9Z6.QH (nd(((((((((((((((((((((((((Q jf@(jGMjGMri7Qi7PG@(jGMjGMri7Qi7PG@(UFMrDuXdQK@Q@Q@Cy36U5Cy36TYr_j-SPEPEPEPEPEPEPEPEP7soExToPQEQEQEWxV.uHWEiiZZ QEQEQEQQ_ng3@EfEi.l A4(WZx6v QEQEUM/UlVMyLZmK/ NqEPEPEPEP6pH2AbSWN0_zUf67,QEr.Z0k-8bji6FQM cyNG_-w)X C_ZYI0QVUQEQ@Q@Q@Q@Q@Q@lht ZsoEiNINX08GQU rWx7/ --KGo7pIq0) 3Pxc/.7X5ZNO.uW E@@ersPYErj9UGU /lKo-/a_ bs@YK,62oais





kg2HFJR0Xzi7F9p Q0


BGktK_X,v wi2K(a3wFMMTIuIGnt) Vy(o CP WkXV I2Gz_Gyj2,Z-oDQmmrY3Y1i6, (luL jN3uwiWn15v_,R6qtoY5 qvIO1D9Aq

3BQ3Dk7-v1jv6ajg chyjIb1EKk,GpHd nFqy0T5zKoKTO5 a0vTW -yRdy sYIy,JvROz,96VDqure 8 5TJDIun0u)_IUmZK5f)384QEN5n8J9ZIk,-rhk K4@@ersPYErj9QZNO.uW E@@5xTYr_52IMBGM2G--Y5GU98mdjMf.QPIkVD8HUtimZKp KqEr7 s0zi,zmjEWbR9,nrzwSt2(ZR3ipF p-viXGoMs 7OMeF_Zt15BU4vABLqtWSybzx

kA8sOWePmmnUTProI-1O@j57ds w 6s_ST6s_SPEPEPPMP_o TQX/YncTk6Zm X,p )Pq ( ( ( ( ( ( (jIcQxj UxQgsj9Q@ZNO.uP Er23Z(aYVsuW2/M(cRZt /xM fVm _Ku/


@ZFXvy41vb.Ywjn7b0cIxFa6P3(R7gZxz-Wluf0d-t4.kdAKn7 cZwKy7BfYv9o_Tg1H6 A, n@3zp1Hb 2y9 P

81YI8YKStXJ6Je2zVKZip@@iqBfPq wPKK4dfQ 0MhZjxzKVjHaGai5O pNzzfH-bHp,t-KQ7rI

qrbnn.F8C@WH,thXx)ue8vdO giV4Z L34x3w(Fz Q_W,X 9qTO-Ft9kGJ _ojZR_GniXdxZxk

xCPZhp8N zb./2kktq6nxVxzK2-hcHhou) NI)oxnnmmA Hj-nW ytFdpUOim6(fas xVEfyFO0I1zR4ViY9tjVO,crXc3_2xgiQNpn@i5DSMKmKv6x9)/oGsG.yg_i

.4hw2 .TG4DqhCEB7y_RpM8rJ- hQ E9rsZw. o7oLrSI46_nxaGxLazbrIYydifwcf9k1QGxmLeNymv ( ( ( ( ( ( ( ( ( UvGUpAKEXs wjPE ArR,GSe8 oPsTmL jOl OB(((7igDb2D9Rn.IcebPAA, hmvR3wS5SPDoE1NTztf6EitnVV di-5xTmMRHcr4g3WTE64d W8aKwiJI 9N7gCnF)IQ


Y2rBwWvPk.yb-U hzvj-EG(pg2(8ok VtlywUcGaK.R1m54c


POhL2b8o95iGkwcVrS2V,zbj 6zhD26OlU

,ll)79G/AEr (Hq4z.Py5pmWpVXxzVXXPI4iynMsJ


n46-JUg A 9JZHCI nNcP UfNjo8pvJ((tldc9H/ft_3 35Q@tXGnCi-d@ k ( ( ( ( ( l QaRNN V(9wO /u0@-Nr/

FA47xbGIf1PNx8IZ i3)V1n.nyk )i5(DLrI6T3G/ H_Cnx8 8nEPiv/ZIckjwys dpiMf6 m2lGFG8sFaqq


89@ v5TXaOW3WI6RE gQu6bQ . it L_5UgQnMk( 6cWGB.G cfgbHJvZFF5r R 8)/e)e316Z_G5LO ki4qnIjPjnR,4UH0m/u iotu Ru viZ.G4z I-XVcDvzg3Z KK_EUU666EFQRFGr.,l((,/5Ced0RJOD7u,9vCse@a/Z@dMpB Y2k ek1 GW1Z_Z.ac R@E.ve.t0vw .4ff--BW,sPE3vwwqv6O UQbk F hrY2IFX NLwIqp-WF9rjn.-/eU6d5K 2OHs0IqhKKI@2WzLB

MfUrok65,EMLf1k(-sJvFZFT TR






xQgsoExT5Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q.4p(qI09W 2bKKoo-vY(MERymj(u kb1LO7 Ne41IB


xa ZVgRzMK wR)a76f(38ImqmQ4k7uhVFpdFpF8nksu-H5 4 whaoOYth/ez

Zb9ShGqo- XsUxSi j@2zQhZj68fcr 49ew7aQxY/YEA7cl,5kMQQFd9 gfzzBi,PHbs rGQZMHXRkpvQkQiQcR48FRJ9EVyOFA(@uZN9An2 RS uULt--r(@UmGkkj,jz rqKmqguZ5H 22RNfa@DT8uP/dZ.,HY81,4B

xCG mZlrTQEQv FZzN-bBrOAgUQrlg)SB6h@zVufpMci .r2PQ@V75qs kpFEfjPk.,/4/NkJ ( ( ( ( ( (ol


9DPBqj_jps(Q@Q@Q@QMW1Z(7OJM2.mBRFX7Z( saw9n(r((2 NpA5_K/ NH



xQgsoExT5Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@(,,O0GradIrbjTlUY W4ires10Uw

V_XltvGqlzW9E.TmZZOFCF7nqoQip8(DTnVMR@-t v,

q 3 kO 5Gs-moR,kR1E4eRw7iRr45VdLFZU.u0w(4Rl5ZM,kyTo(FQx_.o733WfkyLkUk c)JVZki)tlquwmjHClze9 50X 3qtS-T T-ZAe s3PXtu3WQVSEZ-6GpxYo0cokjbEbgY,ijZ,.l mqQi6Zd9CqsQWeulkCcii. n4L1yl_QEG1FUYy63z ZO)r5W3t O@WQEd1wt(n1Mx.5QEyeWycnvatwQ hE@Ih_jz3DquOAZ7,o,1wqtAiW e.3

Ril 1C,s,yci 99Q/Osf7kMN m,uw


CWa0q1WTZkq )gUEPSw5q

6v 4CtxtV1kEedR)w/)(AStz-@ 3nPohzqn6pbgAoyps ylxKksAjBd7 okIFuPcphHsgA9wzEE5hgMYYcfqqjPOFXjAxnFfLPYzlZnhVxx0hzZZiwqkAe99kJAVX-l5sXjaiH2Gk7i5 y-(I4yAv.s9JO,sqsZO/H8n3@fwS.E)vb1cNKuUQwutbob(GnGQnmt/ f4R@@os@n15orm676/gTuFUy0Kp2ZaXUJr86IoAj iq,qyzdRsi3Yk 4SgA KtqmNhw/nH8rps6HH/sCtM4e3 Q4mrWnrBzKol gYWK3iE8esskG4B/Bz/uD(Qn9 @_kwWzn(bP)wxtmacd5nv,5- keP-3SoUw6wVTw q mgLJKEY)66V oB2xVYtxtEm4R7cVy. B,jTxn

@-5xIe7eGXvTfwvtEzAs@31VL 7EikCy (t 5GFgoaOFfkGYZMp qqaygXjc2Up

tQn PX41uc) (OCsGwn9M.

qpSG 5568.i,SGZ

oi6d0Gh-KE3rbbz,/ (((((((Mj.,l((,/5Ce((((((((-TMsPx5n(Ln Ku rQV rr hiiHOxj3r3nTuTWoj_55y U,

tikl/P(v4Q5trHRKs6i33 ufA1gq

O0nb2Cw1R8jjMp,QuRj-_Zj97dRUu -8Au P_cYjptn0hCmymmwqLABS-SU


V9qWK e@rEakVIMo,HQN5fxAicgCjcpHswzVLdQYbo23MlAZxGlTYw

6H6mHn ZqmKSXsC)m e8_j0, 04O7St 3y/ g@i3t@2.)f4r,-K)oi .il3-Ex4gju,xs

ABJL1FOyMZ@Cpjlx/zv-q (QEQEQEg.H@WJ4

r)kPVr Npzpm/J.HAox1 5KUwBSI-YkVw UGgmF,5( 9q@LUbHnqIS7efc 4p.yiklkiFF2qxBIchrHK8YeLzcIY mA8y5QVpQ@Q@Q@Q@DA


xTYMPM@Q@Q@Cy36U5Cy36TYr_j-SPEPEPEPEPEPEPEPEP7soExToPQEQEQEQEQENIf)ypU(2Y6qoGxOD Q-drrF P5Zt/1T 2zV lm0 (hl9,KIMPEoE_1K3 S-1YibDfg_EW-hdiktC0GP DPQ@Q@Q@Q@Q@p(9v28cGdM_Z_vhWWT3JQww (B(((w/yyyZ)5sJuMoO4uMN_PHjA MFY0n6tis AbIIiX3Fiyma2/lu3Lum/5 fx8E,MEktEYjsiM-ZdZescN)YiKznWj-Ed/TQL((((y- LZ8 zsT/gMmQEQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@roExTroExT5Q@Q@Q@Q@Q@Q@Q@Q@CyMPro@xT





xQgsoExT5Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@73yl b3gG9tgys5_3s((((((((((HdxuFqdWYpGUbiubQ/OEhP

QE(((((((((((((((((((((((o7-/7-(((((((( o7kjkj((-ST6_o ( ( ( ( ( ( ( (,/gmfExY@I-Cm4K27J (ZwmbiJ)q@h

5k 5 62Y(IGjB1l58QYv-sjNI ((((5Hn-I82fvHG9-QEQU.kio1gO@VkMf6@Q@Q@.0@01kFnqPOAY@),maA(e4F nLGzYtYqVWx2jrGo FkM(((((((()n_U00z5vEGsjb 9 fU60/ 5ZMJeEAm

jFk4u.jO@SsJwl@Uyi7_OuTW BO-Sd8P1ZZYHlvtU-pJN8w4T.36kKchzuW kVW6U6HeE3Y3PY1AsNZasiqn-7Hg6Q 3IzhPMrQ 2skz/iW nDEgbO85zOf )kQnD6(xwL/8qgI5M.NsT@xot.HYmj)e3_6ZfyOuQhmb99 (QEqo4.5J/m-8C-Vw5ypv@4HU,IGY0eAftW(H)UOiM.d,xccm889wOliuFGYBNJC6aJiO8A,3G(9rhwiW2QP L HR3gHM2eoQX,@O6b( U1kM

LP 1f 2(jKOxdlHlAX4/dARJ4kHMiY/ip5H)rNG1@N



oj @VW/I_EjY_ .,/g2E6stRm2HP( ( ( ( ( ( ( ( . ((oo /KMPr_j((((((((MboFIW.5YceGaZktWz)d w wwnGHdeOgTC.wk_CX9 8kAioc1)PSmb.PdetH4Ac0H dgV-t2KYX 999F5CXBxoHz-aeavCb6fP7O_SloomaNINX

_1cz jCON4VrT1VR@wcXeIPg1OAjQ2_jy7GG@Z4bjTPmxs_NyZXCiJeYq It)NkAO9./F-e@@n)mb0zjZY4YD6x


o-qYKVPK4sh b8Q )aj0oxQ1Mu8n-A1A/Y_jVV DZHXNq@97/gQ_ r1I9.Ewneeu2A9H

kTGjdi-I ,l76@Q


JgU @(Zawe1OjReQGSG4Djo1 G4rV@omGn aNZ66uk8nV4)P_xxksD

1htZ4iVPRWC-vpWjrNyVmGkwwZEoG XqisANMPkkqwARItYq8d kVu 5ko)42F39CTGoSK3uCCZR77ZWe


v8RrOjkDWm gDqi24Lp@FG5xWivi67G4

jjxv,zm0D35khPXo 4sWyZUf9ayc_4iCr @nK9ZaK7z

KLpZVBeddwMm 2SX

x(9 4 sqY_OTmtM5RO5@m isopWD2abc1_Qnx9V0N,Fj)2ibuMB rTQE(((((@(UiTdMi3kmYF3OL-hGNG,Yi (jMrx(,d P@ RX97,9)/Vr2Dq_0DZjAeMCOPKQZ(6GHcBrQu/GQ@

TyQquUmoMp VnTkZmXmztkyigIH@dvKOkjfkOmrlh0CJ wtP_j_Um-3Cn-yRj6ahgQ@uRW)tY MpU/m55f.c Z(/JqoHtC1pzx-xKmQnvFRTgQ@xo jAiksG6YAqWQEyu(fd1)gx3eI (ty lqLJLsqyiRihfP8kh1-9 3Eyrqa1m9O7_J(,RF(kb QBzQ@W_iqIgtvo uOG.tEiHT)n4/)Gs cq8 ilPrfFh1hup0k0@i6kFPY S@NCzUyeMu3Mz7ceG OOVpfdHU plPjfGpBd08xA/txH8( TU9pj3oQ@ Gt qZtPW/F4_j@_h5EbxoGK9l DDS7-(((((((( o7kjkj((-ST6_o ( ( ( ( ( ( ( (,/oP/BA z( ( ( ( ( (Qf_FPEFQG@EQEQEQEQEQEQEQEQEQEQEQEQEQEQEFVny3k UNyjE5yvQst1yjZyc8qe GyMQwjm1dOR pOGQ 4KUgOD_yW

(6 3O1qKD8 z60v3JO8.nto,kET@vO_2gw





Lb)(0SYgeJFIFExifMMJib. Muhammad Haroon Hayder0909 20190529 03564920190529 035649Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T035649.090/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC

C Y 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz ((((((((((f.EpQE ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (BAVWMcquom 7k_

3HOj .gXa(31HeN7,GLTppVWoUJWhR.0@qWzjcGzc4 MhTqSpkVCJW)lcotcEA4WbfES4dzEPEpQF(EQEQFq(((((((((((((((((((((QEQE(Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ Mm/SLKVt-3E3ly g.5j1OINa_x-5@Jjelz8xR,LZUMCrOkYIuow,_k.O

h09Myv4Jr@tKuBeOl- t5S5/cQm IkiiRmX

k50 4leDFz1znU76o6K2_ZvJw se62m,lR7hi4L4oxc)mRH_5Py_WmnaKOwu)mhM398cUmCPLyM Hq_BJP9 MO3/5kmLZSomBkWX _swKMI4wkF_3x mSg9qzv8rnR@kAbbFDw.UyRUTVj@vT7_nmo9slOWWjjrhxzGo1G)/VEmZuQO7Z.RrOf7/K mA.HKyd.7oawVe // d4-cBF_IQsmc0u8EVe85h1AEPEPEPEPEPEPEPEPE4QE((((((((( Aq8wv7,Xa)/Iy-xK)Mld-CN X6.sM)H80CFZ jeMrMA.P.f7xRGcaaaHs dUaU,ZOY5kryZ-X_c/ 23vYjx5k t


.W(x T9_opomuGl/QoVr_WtQ7QzfsKjd,_a671Xe4yV@RD)Mn1-48,mTH7skjge7gM0_4/aV6 cCU7_

Du-6 I.HyU/k)g lBna Z7)C On-5Mad9h vmgLrIW DzmO vta9Tz Z(A8/ChkAEkWeyilqcHRp

ykb7mx _ uxB_tr Hfwk8 CuWLVoZ xOxFK@HqmgIoGkxIc,GNv /xa

.Mt7rg_ozhqGhOqo._g5CG miJM8tdxO8G3/, vuU5GtzdOxollg7wcGIM

rChj_m DqTK7a.hDJif/_

i 1u_g(3((((((4I( ,IT5_v-sSb.Xg3J4j1qqxO /FVeG GuIQ-)Q7O x1dHnwJi2Q83-sS0.@ IuqWNG0SHQEQEQEQEQEQEQEPh3uN

MdY/B xvCn XOXoj8.sRoXI1OgC G-XypOIc4K3nFa.kpmk_LkIolTkaV(B00 G-khmeu sFGnW6YHodbO7JhZIOsjs3xsNO6ojxWOxsOx-dOcNPSvRt7T



I9d(MnHWUcC9OYz J(3wYICuaxOOU kllK60RhTdt2TCgEOz11yxZ

CEuK1TAkHQk byz6Q.zXvarTx@kqVcA rg_(3AunZ2CpW)uO259t__x,DO yik

OAxVpuO_iwkG7C0ZPw,uMD7(x W_/XZYk7ACQM/I-2K2HFMhWuIQOsltx)5gCM_dd7pzWlfx9AkYZbls-/ZxWCf-dMyzO,7/dwnGplgwiO/ oF,Ijkmg,smUCZ GEk3ZBltnCq0jz-1OLHlAqArOx_Kd4NWG


rgNL7OcUScmNtb5h7hO 5uzS.ODHsdnE_MSRwo3 cmcQDNxY_SFd WIkZoHcIyi5KWZlciZ

g) Ddk.kkImZNH -Lfk Dn6HW_p3( -DyoXVqogfMi dZ43QMmBmgoTIkX55zOLYiUjgS74 C)qJDwJ-ohYYLevkZ8

q.ieO z(Wy ( ( ( ( (46OR,x-sJ-EHt-cwYDgz4) zKQQRNgHQBq1_ Ky0OiJHONzSY(WAcAgivzS_t/iYG2A(_SOE8_ /_OwRXSquT,UX9BX.L x-uK, 0O-LNO5XU.(ZfQ((((((( f.k 5D X. vpa/5G4

d7cRX ,xW7Om xdFRWZG-yQ(U_xGkdwk)B_NUOOjw_MNYykQoKyd-Qxz,)xGKo3yV4Zto

iqiGB6v5OxMOtlwrb0izwVAd3mcociwwm.InSVzZZI(E-yc/pOitO3RdtwGJudtXY.yI7_v.fbMsVLOYZeGu/qQmgI,vZsFi)u-iI BxLGEDa1- jKtAWrxmDXvL b/QpNVd/XV oMKoT3cGzGL,IHABexTuWDM5_PYz I P1/G-_@SCFQ.leic)9Aj6GsOuzUKV3/Pq6xJ bK6I4 Ff_z84_JNUvI5 85G0@nEwkh 3)suaQ / MCKJ/4Q9(((PzvM3Hs5qt3AOKNBnsj_ ERqz

m5CmKEzuHguCo8aMpj-0_Vg_D@vg-kXxVGHyzH.ggui)olE C-4lRbF OQCqjvKfyslgtJTVG,zixgZssOebZqcVxfWk A gaB-dDDIDGyu HVRC_ku

VMF33sy-Z._5i@3Z/8(3yl Sf4MV-oa GL0rhhOy5tdwc4usmCs1PnvfTPy)l_

T8JXYWwJDkwi(_mC Jz(((0exDyMd3WntuY(aPEPEPEPEPEPAhjLL5tC6 O4-Oho(eePtI qOOgIi/

O5Vgmtxg5T tW_SkdcOj33/uq.@w/gZ5g qW3I3IwT7MIEvJINKg g_ 7 73u K_y@gMrxI4t.D )7mX481 6SPC9twM Z1HwN-.Kx-AsG)

Xkv8O3PYq7/W-M,K.)slz2z( ( ( ( ( ( ( (/lQm k Q,@Ax4xsJP9Tg(g F2-MQ_vO UCzym Z sy.IKPOIwEm _K4Coe

A Y TV90xIeRgqRp/FIJWieiDlDT8p3@VGwEuKa5Ry-d/gEW0iskoCq4WvCf.wLKu T SziG

Tey)BjIUKOwOWxKZy35Gy_JjZi6mw5ioj O1bYk yc pGxIntk69z6ia B3J5N0

Azbk GpkuI,0KK DGxQ)PVIF1 ( ( (5WxQ u189Gik6msM tjCEOtTqAGy_,mxYzntE1VYVw15/,KRG.R7WSRwpEnn )sd9y4o-yTjyw)o,a4/ TSWiLw6AOwSE _AIG6J6RI_Dh3.QMJdW2xu1zhXUZV


wVj_Ox W2iv4(39_

9t/yTEw1W-iGqBt(((_)j7kVeS93MLpwD((((((((r/ik Is a)WzYQrEmlC1JT-cukH4hGshiFmKxGl2k/SkKOVo(9b_IHm- c-cQcszSo bKv orXJiroBct-FHpwxTwe0tt) NLZKQ bQIls6V)efCaZ

uE1QouQz_43z)HeLWPo4VOgAa4o.4M5@Q@Q@Q@Q@Q@TZ4j@.chmX2IWM fs( Q( AEPEPq m2OiKv/QNr i



_N_2qz5bZbI p03u_StSKqyMfgkOJalu(gqd@XUNZrBjuCgL--DqblypxFDu Bu(GM_qzEJxq,h ogHMk0Iuz/)c Yoi


-)MXnatkvr4Ozl,6OZc4XyqOM6nW3 NvVoy_-ZN/zCXm0xI)as QZ((((4Q@@ARI


M3xdSz97-K273NYiKx5 qHOriAdMPyc)k(tkYhQOiz lAZ_ sHtjYxWK7sTT7@Egto/3DVo5(m GxH1OGOOz57sikZM4zQEQE/_@5Y2KU)@GwxPEPEPEPEPEPEPEPE x pgndez4 7k/uSvQxOZnm_iG O/rMZE(kK/916yWCqK 69gOaWi6Om1hkDxlkt8beGX6Pr/X(P2_SU7yhg_4iZo-wr_ 11PxUsGr )ARz9(EPxE,SkowsW6fx@HCV84,g(F/0-6 DxW NAQEQFsEpQF(E/Mqk_dBMWxPSTz2iqnz7Q@nPE ( jiV2MKjZcchWqz

Q/bN5I3bjU7)4C4iPXEieh084H(EU)jjZFx44iWfsSY_ FiKV.S41-HjzGA .pf5dFO7UZm6jOtG @9S5 qyLVUJPQQL((((((( (Q@Q@Q@Q@G4),nPkuqXJd)NOo.K_.fp X

VD-E-4QUoRWq@OG,hOF.It9WzUk MIgB R5dT7py@OQTV(@Y2-Wr@5sjfWKUio49_I0zm)GGrqWmZFPmZjJ6Jj.XsFDQEQ@Q@Q@GP@k1 xWmMGun6MK6B.KOmq_DOiU4wm-/kW@MtT7vqB4VoDvfcoUtr4sO3V 7

njO2z /gOnAqv0 Li9Df_a 85/h0YvOOuSY iln.7ySY2vDoxwgyBAsQ/ZxI8q_7uoCkeg/oyG/J20Oj8txW6NhQHo zegT2,o9U

5QzmV9l yy)7-_nOkKH4,Wl_hYg9a_(V(nAcvTmchU05j5WN8ks/c5w

S qm.1MiAjhztWAX3_NU Hn 1(rU 7xcPt_

uoF-O/H/jZAgI8hvuIaT18yx/ .Qjo9/ 2n z5oF7uD,jjpa5@ZGj axZ_

kv6k_VU_KU(85ogIlfo@nR)l7n/@Ot32RQGaVYq j9Sh e4YgFNb_.i7cb

mnYR.TmYiIeQ EOUNT1_zQ/fAcBz_FQC- SJX117oh.rGJTyWIqmXe AjjweuZVmVbpAKU_h/D PkUMtoGzOgbFMFutQl5aeNs0(((((((((((((( hz7I2


1jZUoh xvO@4-LCOgWZy47qa(iZfCpNI(c/Q4E@ o 07G4 OO

omtNtU(R_ _M/B5q(USSMtItQQ9xZ9GSc khhs/B4 8vJ.G3 ctt6NhookGboOH8GBFuF1(gZ (Q@Q@Q@

HaGXeB LbN5a9B8xItEGEsLim TgjhGJXv9_FW)uV_uNwey_ecg_NiGp( Etl.d m5 4rjS5iQka

QGe_VffgU(EofgbiH16snaH8G42Eef.t_KfuY i3j1Zprk_s-/, s_7rk1Yxhgk zJG7whEnr sjN-eVsUk 9R CEuaRZZmh,TdKZw0Ifm_g



gOqt)kmo_9fe5l1O JlcZm lI8/nxOcG 7txNW_mtI,ia9YZpyizy_OrT, XIo/ZAi-O-LW8g WKcTby r0Y.xyX R

y0GRhtiGL TnxMO@dOH02M7cHHfswIyimO5qiAt1x_swwkit/mGS9m/@ EK6i pxV)Zsl8ldOSMK/yC91


ogh8DHfGF_zZ-k)u597Goye2zKNKUcoK/a3f0VIFHON_ghst1n evDq)S SIL



XekP9xggdyCW@(((((((((((((((7bdwlRt@6 O6kMCLLAvKAWWguaGCxzMY kwx_dOWayGAYWuF5Qdr8t


RCw8sfhFAwiG/s_)k ocG_ER((((AFhz 3F)XBG1XrbickcUxG Yok

Zp1V_OzKz-VtRtA)tj_q)euWJinDK1F2DA8l7J19krJ((4f(EPEPEx_6_imp-wp RDTqxWTgaOgjxo_1zDFQ/k_NL.9oj2hKm@KZ-Rr VZh AvczWD JLuf7E.NL.-9IGt_whlojAp5r

zU Zb.HyIGyrk)pJ8QluQ@y7F7Oheg6 ZdJ/hOiZ-d3Q@W /jGmykgG9yCEOI8-wIG4QR.oc4Yb,3zLc9TqIS_Nmqx-V2SHI GromUS 2xY.GY,gKSK_UT29_qoIA-A5/o3sm-L1 ccRvYx_OF HH@Hg5ik@cizw_/j(kZ_v nHRj 1PQF@Vl7FdtQEv((((((((((((((((zxC1iu Hpc GWEr2wc3 ibhNzz/xg3futomylv_GgiZZO MRj1P(OC_ g2waGnk_7o70UmDoyejEshJ-tQEY (Q@Q@(0I4I77Wfs yw18e/i-IeFd/AT,5k-0/cyui-igob.tH/lsZ_ K14y,OEJG NOgSa7MEoTukI@Wuk8oZ9m7895

SXb-j (559wnW5D0uF.oj6hGyRM6ic(tTMGS/iy_iycUtWoZuUy GvKgAe_9kzAktWj) 5

T3nxmsm.nbp 3x1HvJg

U4K -.2wuPEPEP ki.6w0i4yNG gkCCWRN8Oz7LgRooJzI,, 52wHL Q)H78heG,4_tggx3W@y-VH0bxDH (Am@F/i6T(G Z eb16pH/4fgyEncdOExBwk_M.e g1oc


0nv1Jk ,et_GAF2Ms _s

p.cQ@JH@(f 9qX-qv1qEv/s8tIHdq Y8GFpN CtKAD AZl L_xd _ndgMvc9Md NMzOFF-C2-R9WPXCl_c5

M M qdk2uns_BiUKqZQ 8V1FTh3 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( gQ@K_OAmBJ2mjJ66._

_2Z mlo_K-2-uLb3f5cFZz_ei..mntytc((v ( ( ( ( Z(JFO4sFM47mx_gRExg0,0 sk/eZA/4BgwFGzS93mwiv5 WtMp6H_O5mFkhpIi69PyVMhF@xxR/a

4KTCS@xy_W74i yIjOgOJUT1WNkcv4GwejEF_brCJ-yH2ls9M)iN6Gkj6roetGtJ a MHyX3VocRo2_Oo3gu0sbU


@ xwxJ9 YL..)R.XlvwXzi7UnoUicIh8bVRD6vPE1EU( (((((( Q@XCK


PA,R,A4WK,K GncBgiNuc4x@ E.k9a

nuMKwR,/@XE(,p9SZisqO(vY_xHh_O NAzSipEuxWmMwB8HI4PY-C9Wf r_4MqGvjWG3GHQthn_blWsNCuykbkx-B_(KNj i9Ig,odd-ni@ ItWotPkW1bcSrvg G_b wTO GqCl4j myFKO3tXmuOgl/.nq7XZIYN6Nz1jgk-ThvQxs3jho5GK l/pPk7B c@vuHy5HVmZo_DA4x7u(3KEi3AiAvcgexXo hOgK_71G W5/k2x6P DJH -TMaCjO/fyWqmvrHhhMEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEP_/C6_C5RKKK,vI2IqaPWRofke

1so29Ei kmwSXOke0VZYEEyG@Q@Q@Q@Q@Q@Q@Q@f_sl)S1rH7TGmuYuL_a5/ eCoEg

d/T5inNiQE ix XALk n).-gSnW)i.aiOU_HVNH9c57fF.nO5MwP5CZFAt(Pyak5,doP.o/OgelOyoreSQJ(WyQEQEQEQEQEQEQEQEW-S,/@EPEPEPAxP R1K CW qlKYVw_FWLNSs(6sMyFiFxxcZkHCQgYG67Pa(7))/st_5G/V1DoN_ m1xVDzasf/EqhIbW8_)u)lUgVw,KBn_)VUcMtd/Vg.3 RjOzQyKCtNL6sZPyB((((((((((((((((((eSk_)j7hd7J(((((((((gPF((((((((((((GEiS(((((Q@8PKE1TyKhlh-P(blqG((((((((((((((((((QEh3gGxbam4XpDNkxeD2egCUXh18t

@AqNeKLTwi/sM7s(7L( ((((((((((((((((((Q@Qu.00iWOjO4 QTOSQ7 esLqWqgiSUxfjpD,kT4__qKwqWCPkcS 9/Yo3dWy)D. (G4,G)h6gscuowxx58HL(QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQLy(1 69NpuVvmgoW GfF0CW9xXYef.umF1_5ShxDOFl XDK17pynPj@ Aku



5RN)s3PWjFagxcSJ sqxrA4Uk5D URtQE ( ( ( ( ( ( ( ( ( ( ( ( ( ( (4W@uVqPoh7gbM_PE,4kIryfu55z_

@--3yR-tk_N5 ES3/, dk 1xVMCW70NQnNzmNc1k2 dDGhxxy2yjv6yg4eZh(tui_jDD WWV9,F)ci.IIDzzIpvpN8pFw 1CSnH/vOsYOe lUw Aw4Kmm8u


jKgVF(QCvsslW 4r7u .mokkI f HHkPu6.sVvOO ,9wRupm_Wf7icnsXzQ6Cn IuD8gK6IkrGPGQK52 5x(/bes4j(T(J01g6pNWK JYUo0mrThifz9Nx IOq0ut3YJ

w/ 4zs


ghVdg-EndGuH /G0OAyB5dzF

cCt6EzBywsHco /M2O I7zB@q C_t7JO0m7q0u/kPuS4_gfHOiVy q)buL EiV66 31yrxv Bi(qER4 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( c)hhi


UtMNK YISZAyajZTq7xIuEt4TO3 9UuVEkj_to/ciwqjZ1WlEwF_8mN_H

pL6U9c Ozl1Lj1Hxxb8U8J3EJAEP0((((((((((((((((QEQti0


6TeIotEv1DORR (Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@fEPEPEPEPEPEPEPEP(_)jZZyMxz 3M 0P( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( AYN_.NozQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@f (,(I-doZ0bvQ0i7n9(1VNuK/tfBXG_JZootZWl52 8ZX5 5ZzQz)QL((((((eSk_)j7hd7J((((((((((((((((((((((GE-S(((((((((((((((PxP3ZoIss,pwvF0POefCxDmkgO- c/z Ls/io

y51H 5@j/@G(S_WlhZ6jqxG qBbvoxUskiWYIYF_s/t c4gSQF-aiS


/l/It lKNOZVxZgRMWvv Ic9ovgoA.MI5f4OLqvunn)MF3 S4ZnwhywI_ 1ZXkmwqGD3DWuKki xgMBH.4g_a7A..DW)iJQYm3GMtl

6e,Sx-Mj5HO6uYeKR(OjZIP jPvcuiVM.dC,JNH9tEU(((((_)j7kVeS93MLpwD((((((((((((((((((((((ozyg8( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (wWnT32 fIZiaqWqKDf7nkp/_XcKq6l9ogqZ5U)9Gi

gg5-O cl G KQt _-EP

KddI_z9a O sG)/_zUJw/mAxJ8 SmR_ ftCOxk_

XbhodwVc /_TQ /_TWk4R93y@2O.97uEs


sm N8

OlN5gP)zZwK8OHq6G_OJ,uoi w@tJgIXEgcqDPt v7Z3iUJ0iSJ8 KoZ)YxJNh_zI(((4P (3YkoWSom B4XFUg_ s(-3(zs_oGkQ FkqaF0W)FLvEWP_X,KfHFH qVYaagmvoj9emx0/w@wMKGto4ngwqhY((.QEQEQEQEQEQEQEQEQFG(((((((((( oxg0Hu .E2 8@4W fJoMM _QD6y8CxWEgcaER8U8PIEmF-GxVEtqqVkKoJ Dmbg8zGWOWkZiX) Iteeu0 A ((@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@eKAi5.p

eoddYNxtKy5 Wdv7t8h)v/z__7z6aW Rl5/m1kmCd2Y4oDKKxqQRgNQ_25H_7YKOt8y92mCI4ziR_9I7NcVms3g._5V7u8q_AXicgyfZLmmHb.6R8oG rLGEWYDWG2c6-JoD7A(,hKGaF@GmYJ3Umn wtq5VkatHr6p F6O2fvzF

PMi qCCAgKP9 y.Qi9j0)cOio)5ExKuw,4EP//,q3IW47QxNKheKljm1K9OztVzZCumqo0WSxPE5xPJx w-/j)myKwqj7QKo_OV6uV)(IQ4)EmkfqY4.EWHowhE0f,.I

NXjaZOSG MGQ HI T_Og9QaWIxnKwI8Y@NOE L((((((qXx_KQ3A5oM KxeNbuWM07TyF5-j3.-dXcimwq o1qKvBOvf0 L

@XipEIPqS xfF1eGg ,PA,RN5h4jy,ULQ c-z)Q@Q@Q@Q@Q@ l WGiPI9eR,y

aZOS@MG HI/zr76neS



xM4KYC,BFOVxLljZNGvBg5iikm77ef UvwO472jV Xr5

DwdIGUntmSG MGUXNOzoVSQRjzuS qXPTrqQH((((((((((((((QE9vtbj


_mANO/b4K_Pv9T (SQEQEQErL3x05uPWBeCiNMJNy Y4hc,5,.OC7V7GrSsQ(u(j-SRAWn4RUujzFmHeajoes NwAZtOWB X7_,W


62i4iIZr QqR.7rZenVLMQZg,@zhONBMxo)Vv qmhiK44cMdEy54X8I@GOjGOjGOjD US6kif5e7Xr4sSW5kvfBIw( Ms1NbGVyw5(N_h ,,8YWii(6iNcvIB_,xcQiYxKTNHErFvon

tMJC6LjuG2ci2)TEcCAcqvw9oLx0EUtnKkx.x@oWZu9-cLb3Z4Eh@9pCUi3JpoJeEy54X8IHzOjzOjzOjPjcXMgf7nnvp2k uOoo28nXGB1.v@Op4/kt-.LImqiL ,FJO h2MZoFxlRKkxSl-M@ ./LQY-vF3@mz uOYNOlmc_Ogrm5gxMhme9i4aI6Ibdycc6I6KAhrWROy9jO((((((((((((Nq5sOqyV)DO98YxWQyjieGZocQmCdn0PoxbjZXEkcAW/UxZ1NNgJ MV0J5KMB,X,IoDj_5OM4FCcS344)29_(WUczD_7_xGM5/kZLl6degm5YwXtO 7yVT1GrivRO5u3UOH5K)C,Kj8,OJCG1u28TuXDkm8lgrNsMWzf9sSce5upTr4Vx6vzl P4VxWEGNtOo)OJ/xLWSu)Hgmszgu6

cZeXI_drIxmZ2Ot47Wv77EOoRf1MD 69o9o5iM-ZJHm5QplQ 5-a_ sws_jQ W4T

xjgkzFF1 XC 4d6IWQ@Cv_FH-0Ew

/PMbI5gbqPUW., dLrOygGlqJo hssonk@y6oaw6NEYP8_cW-iaUsOL_7giWnFOkx/Yd-XTvWi1Voq2

Qn@7R( Ct MTJ(/o R7INGOtJ0z6Ifvh@Sc zqFGaVRX@ 7FMV9- F@iyoSmOo8Rmu2n Ohu uRhAju/E_ivF n/-9MGK.sEdAWF1K,in5(n/8


IsKG.o2ycQq(N_i uzO 3IVQkJa (7INZR42

Qn@7R( Ct MTJ(/o RZw/o

.OHh5 vwGozjzfj6v4fE3E,3MfvOZMqga


OGIK_yu5nnhdMzNZe2Exltn,0k_xV6wrAhrWR-wIGN(((.EPEZ2EQ(((((9Eh OJ

K1M7WukRfsfwybR_TNQ UJFODr7V4F wtPxJoIn4wmlQ_xfi1.iz@Wsc4i1 ssLNhMNv/rIKo4iirwZnMwx)QgxkkWH

hjf (HLhmf7_ 0x6cM76PRI vgzuZvYgn5w4I /q5SSPUEqa1qYuQJBfa3IfZRWxMgnDZO1ZUSQiq 4Kc_FX8c j8/

/kXD8z(6xbXcMcY9sda_SQe5i 6ut-0vq6_(DhAoHt48CQWB_TK7J0J. W/NVFE)1K7X wWUQQt_ruMJB_U7wVv._fedyth_wHOZGjC@AEPEPEPEPEPF EEqOSrW 4uivjiT Guo esdV z.,OUW/5WYWMJ5oYYs@K

SIj8Jo_1F/H@9p2cwv6@i qU9g(FEPEPEPEPEP9W1KMwmglwMHWD2tt91MyNP@oUuXG,_ 83tJ.QuhY8w5yZqk6VXbQG2KxoObIFMNhy_st)KUI.rK55JNgwY(rH-Qj

2rcdtz/,_oUq0o_-wDOj mV uWhc//xS-M5D d@cWFlpi 8zQ@EIQEQ3

R@uoiZOWadh8eAD Mo 5IGv QJw68y2Em2)bjdsm7soAIbm_064 @HvczEhQWqfm@I609Y nVBQ8J2P QQ@Q@Q@Q@

o3i2KxaAL cSFq9F8 t/7h UkcKeXi

H C4Ap5jO3_hxsxRGE@f_6sU_x@maBgkrOv3P4imADso)@-VAV 44_tHEv.v/f/8ntkeNdDKo


W Py-JtyMHmg/5M

84 w qf Id EdhKe9/ylT_BFm-8 RsZ@yMoEtD q X4OB ( -yt83ONocKHMw.o)3GC3 pC C DNmXCigv(bMU((((((((((((((((Q@( ( ( ( ( ( ( ( ( (.WHw7PutEKGU546YOMjgX10GLUmCi q (gPhVeZR0De _o-75D0mZ_ORoP.m_TTsYoZyEtwO5Ov_w7SleGo4.-MelS,g4titOYS5VEKqXxwtwqkD/PPFkyv1oqY@/mK_HkjmhftIoVzORDZUs/4G/axG z7xExelojV_O 5

uNEqn3h0- r4vI


xVOKScxY /6Irdw @8_O 3ABg47 j4a8xS,aVKLjnk


h_cI8qw4WiUGO/rk)FNO4 i6j) gCaR

ZMK d HPiagnYHHOa kFGOw_G Z@YP2zwHT28Jl_WPE_r1T1F))R (Q@Q@Q@(dti6qqpTMsncnkbSiG

VGTFyJi2eQiny(3O b7xu4leBXJw9 -R WV8Hl (, QBx-4@x/ne4zKxrJmMv7wk((((((((((((((((((((((((( (4GfoN9Kq5NyYcOqtm@a6k(4kOiXEiih05,_sKsij_M3Ff ztp7HVFW./(87GnmTr.8FNOn.tj

H7vOP4gO/QY4Ozg(c0M(m8V.oiPO tWyhR_QqvKnPYajwV7B SM 962lOPr 6( 45E HzP9GUC0Fk7tnMk@ OO4MGH-i4eJuKHIk4lB cfGMxoNtyMc_

Lg2b)U53NtO3urxgm_SKW 3GW4gkMmQbZ

3w1T(-)w9ocxhkWiwwkv)rIosoCBpHccxOGssRmkHOZvB kz,2KO 7kYB_yJxjwQotWREzhpQL((((J7C owgqv. MB,9BLWVrBxXs64 sgKQ(SwGKE,X 8rZ5o 5QIDk5G JZ)(QhWomW3D n,hGOhX4 4mJMRxNdoMQ)sCRiwKJhko

MwMTXi/KKAyFV3TVekHk uKEoImwJoHCAKRjyN0Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q(Q(.QEQP4Gfo-yt83x)_t0S48u6g hl_5h-4,,mO.Qp_YZ.Qyh,(V RD(6tkj oS O7Qj@PZvPxZlizy7hxJ7x,kVoOiy OdfOxIIXSJ/Vo-FH5@,rVC_z_Z/ 7YTy6mnEACOzOOXIiGutzE-52 .3DEvSKg,RYJ93vzYYGkq/Q.MO.Nz(r@4S.Xux7/PK_O.M_Xg O,MsXL(F6WUKLzTrJZSF5-eFDXeuu9OedTSxGg_.eh ezbsO bcOG

cgDFBxQKY @qOQ_bONrNgXkck 8P qVRcooIMqe,LR.cAsQL(((Rzq D-o

nyBGtbl3i,Waqtt9GyQNUoxGnX4Kl.3w5 Ax I/o7fCZ/4 3ythrtqCZXHG iliZCtqBYmPxuCI4.WZxMUsKYoEq lbOq4_xXqe5infbR- _

,-gKdbGobu32rJ0ZWN_ NGR)QEzG2 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (.4y

MIk4FeOwcEBHyHSK4Mmceydc (O@c54p/ .-obFVtl@(w_(ZtqYXiaOx8mL6Z Hk40iFl9acmypF)6OM_PtqOtO/TrKOqm(MOo5QE@zZQmxz(jHfMgoWcRztPHY,@TuzEWvi 7BG_HBA mKu-QR5co/ hX2 Hxt7SLj1A81K





x_7p_gM)q8k4_ZIyDVLz imtUYG,w m,vw2Ie/dx@HxkkJL_wQD-B5OhrGBO. (iouW-Ed27W kpG5o9i Q@ 4tBr9qxU9F9_,lu7pac3ZBM-AQ8QEQEQEQEW3P..tNLMyajerNxl7zKeJQWH5FRhgqg8wcWIVK 7hijSoG

Rc(wTe-UXxz.wkGM6aDTa9Y)f ooQgZcJNczS AD0CfO41At@QEj0(((((((((((((((((((Pa0KKO iR2z fK_//m@176IXDNc/z DLxKJiyklF0(v89bbe/vLukk1tD4o 5xIkS YtfqQeXI (oXCObnZI9wsV u2GHku


ckvgxO7xX4Oq/12Gb6HDs(qX4MAHW fGJ1m8xojwCt7 Q8IV5a S8u-nOTVk7WTyVG_bcL(meqp81OknxK( uijHgbQ@AOo37W5Rd_4MnzUI.gwmdAqI2tPX_F_ m)F.Qmf VCh7Nf0qwyJ1_GwxwH-DB5cJ5eN9 TB0_5PfmZMBIQz8zf-oImN)v_fdjEeo qo@OzgeOGociZSzsgdO 3qtOpkOGJ3DO-Mf@_oKl-e

p2n XXZY9,-c2nfVIPwfj4)f EosXVRtjj lbGW F7s-b koxdGCadc5v5SV_ o0UlZ)5FOg(v_FOaJ0Zu((((((QEQE(Pj1EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEkgs46-RitxNjp)ESxscv9JNKN,BpxcwbV1Ft5/

-yRyrZygun OO.wm/hvdu

OFsOosGWi174-WC-IVNi7tyseZsu-j 7 DxkjukMquY4


x3L1ljL)jZyd _W fwjwfw_


5rI_VYPdDjhLYoFJH4WkuOTinfQEWsM_ffHoE)2NQFAE p_gxqc MOHZGMKn,zkvI/IuVKMcCW4Lz(fzL/w1T_zBQjPWog(WHTZ(h _V.-W


UiqO.8F)@GR Mm mXWL(kjZt2sM6ChZio7wZ9IV2CRTouQE9 r mj2ijna)Gfhbu/UrAMJ F@8RmpARu03lreiNqJEdd(p4 7GT0.zGnAVh/xgP8Ww(AiJ-alXCdq1HQZClunCOHMZo 9l(arz-L/,lchI xvGMHi GKOn,IuoVstAQE0 O_F5,qdtf0xLkm_LOkp8GjsGWcy.-A zIaRcO24h8HeQ4O5jy-UOKjI

Q z(((((((((((((((((((((((((((((((((((3Uk4gyE)v/OoYT7_Ghnu sBrZFO/B0TX Ffuk-c1vISR3NKhham(m@_I kVuN/zOvY vWzCq381M_8qgXmKBiXgmHwA o0VMZu2Cw52I Hy9O_)/cLuoW/T-M NkN_-gOgFo4vUVxOvU//l-dtt1QEHfcg5hZ@)gOoNhj2Z uycsymgqZx Id8owoZn5-

NH.8hOWiwkIcCqq tASVWI DHfid77KIIHwHb

AZXCt_OwG4HFPxO-jtvIwc7qwZou(l.SwkvZAt7sSi_cwouuGHGa xgchjQq94ZSSZYpIR@ywy4C7Y,dlJfo0Wx m m/sk4I7

BNU)O(mg4s_tq8LP2WA H3orS9JyY7ZVgv_ ._owzRVCokc5xN5


GFVniumAZuoZ3XxHMzhmqyI4bN xgwiO8k. 79t@tZ_zgxIJV9xq8Ky-sq/6wMwth7/oi/1EgOqMZ8JSl_4qv,hgvxsQIHODNdrkBJXYKI2qc OmWkuKZ.-x,mb-32ny.MI.4myubUIV/Utho o)yqT.V(((((((((((((((((((((((((((((((((A



EUOaUOjW_tCn5J /3gWusoW

0AwY Wcz


@xpdlu O/9 I cgqKuizo9.DyyuKQ4v_j/m69A6-WCWkmt9rRMLCuEwUK1 7Pu_174JYy.qI.t ebpTV7g

At6FiL,wO5uRj BcaGh_CZ_i4.tGCz1knV..zHsEr.Yj_AwAggxjagd7_My_kMNMOy917Gqm KpEf_eja1ELs8V71vGg7KuV2yqpgii)Z_IKjXO5n4YhVt5K84s7.ChYLIywMbuk80Ho

Qr7ZWZW2.Bi aHEGw.Ox77qr9 (KUjx/y,


Ew2l)OHiwBCQkMQEG1uqTcIZ.Wpz5poxO@l97pRlT30c h_8zW


e5Qc9cE19Y/EwkU.nRKe,_9uZ F/TfGGXizMCxR ytsnf

xoDxS6sv5ehuzB,6JEybNCm xVKKkys6IH.IoAessFdGkyxO/nIKoxF(K7elj)kANTRKkiowfQU83xRkqA2gxSAR)


jd(rCQ@ RAO3fzuhQohck F6cwJC_/w_OOvu-ToFedOl5YKkMk(aaJ/cuxth,iFIij0Z7wO

smqK__mMMwZTlHIgcGqWoOIsgGDHfntS)Oi2yvui70x-lt)h(E-@h@ h6 -NqsMsh.u9u572oxEOip xX_8Q URbsCK1k.)ZR,sQ/xfDcyG,Qy ZCEw7WWe.aXAUcxfD9cV_hI.dV3ITyHk(wqj1,G) Jk6C8 MZkF vXZG -Zmjm _jW7jjnSdeh(Y-fsEdZbJkZ7B8d_Ah. Kh_f9HSw2k8@5e_/AY_H6eii2A



oyx (30GD 1U QV( (((((((((((((((((((((((((((((((( o3iKxCZ8j8N( 4O(. cMm(iJ,1_SQGrYZt/XK2,Wk-Qx6sgLTwtDou4dF6vBeN_/rb14MMqZtMDmmn49_5OAu L_t.wZKS2jKm T.4



HWid2yueG PE/yu_f54q_ x,DAs5/l okzlmJLBe7_ xM7-k/hh1-7 Nir4ex l5YA7 tZwGbtsdH1IZ@4/I253 E

2MO6v/k4oMa4 0uyXZ 9jh-w/pQ5Gwm_K.fO-JM I_4u 2yygJmk_ko6_gje k HW9LOsyKM7Wgf-5H_lOE4ot)4iGi6W9dLWC0hz,)N_CQgQE((((((((((((((((((((((((((((((((((((((((((((((

( hV2MInhZwk4sxCujxPi5n5

mz2 ugM(Wsv8qyr.YuG

xUMRnv9jhCyqXN8dC4_Zc-C5MYZ9qsiWxJUhz7z_OO4 f jPjE6oOmKAZMLOo_4oxNDy2NOOi kNI

QUy8aowwI-qZ6zh kU9_Z(T_Kxbvo_RwwUWW5_S_(tW)QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQwOqqLg xWe 3R15_r,LMXlY)6zFO_DC(ruGz rsyo3R_/KGHytm23JYG6swH80B6sJoE5AEz f( ((((((((((((((((((((((((((((((((((((((((((((((((((z (QzEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE DdN 3 AMain ScreenRga(SKC4zFa(SKJFIFExifMMJib. Muhammad Haroon Hayder9393 20190529 04570220190529 045702Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T045702.931/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz Mmi sDGWOX .xQMtIIZ@bLpFNP.xQStcYAKp

N2uuvI(IfVcIF H.mG90hoxQGPxQGPxQGPxQG P/xQGMEE _18zWtjGsi-ew/K@c GW__3 .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW muq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq25mI18 AkDoD(rX xQGGo K3YE .xQV8 ) RP MwtIAF8FVbj4isPkwWz-06)bMOX8JRL XlYYvq)gK(2Oo/. vwe.-tbBtUkYlVM5X4XKd2rf6 d0.A,9RqxsTM-MJ2GxS4PFXnY gjgoiz1v(oVciX pG1hizkQFAFnGi0lV99zWVtaF5xoM3YA8AKuI454i,Q Vn)nmn,tknHa9P k(5B/4,SwlF lB6M/VXV.h533f59Kzh41fmY6b@Ie6i.e2YV9zVSdSLG gjSY)oUvF@s asD4hy22Aeg(R(QR4P0StSqfd.4L wyxYLO cBzJ(((((((((((((((((((((((((((((((((((9Xi9UOUabH1/c2/JEQEzgmz-Ugr2 56ymZx(C,72cc6sDDh T29EUFVaEmxv9/KxBErdtPF U_P_GwnjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxiunjxiGBGUQ@BGTnjxium _ ml2sWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWOGsWO5AJ5AJsWO3FNt.LwKG8 NaC_WH9_uiy./KQ4 peizEWvq-v JI5pd vZkZm5p7p,t8Fj 3itvl1E yZ_vZUxY3Qnxjr7r1pMrLdos_ iaWUWlFlaQiH_EvqCJkzNWSQumnR8GtWh-2 QxEmt0ilYsnr(NEh) Id1Hpc


jFKt6612U)RX zOI djIodJPd79yxQDsPq81jp8,X e XDwZXpNO4OXKOIG2dHMt5.NX0L Pz28QEx5GDx.9VnQDeps)ug)IGxh N2QJ w(3zh5

bLlj.YrIC,v ME-ANukppCDH1n7PhoG8xgS1meclvT995.4GK3H0T0vwQtae-t,us_@XlOYmV,xrsZM,g N Npl YF1.18lZzhZC/G 5x/BcAslzqRLwIAs.bChq6.k-tOjIoF O4kkGVsg1umoXEBU l Bg@Q@Xt n

yGXysiymgTUwqmpICLIC mapy,0s(msN6X aL_O,CnH129XkZ6gXE/0I7Z0I VR4X4skjU-g8c-u)vAwcNGNx4VV2zvSI-IcnsF9jJ.e,Qin jQEs 7PnaKcoZ6V/HbxRVVW6g78XJOEY,qiwj)Y-3r1tcH@xLl,m@3klUB

8y6yKq5.t2fyWnG)OePuYAEfVvOkeXitlY m(8Yb5ILqLywo 6q/qU0zlv 1y0Wmxr78 NsVks-,MOI2vv3WuO FVymbH Xul4tLcx@ , gEmB@L1,DKR157(tjV zu K@qlUVF k6Xv1_8nnE69Hz 9_kuAe14YdzVhEmhZYAQ 9Pk


@(NU4H-)fMObpxLWEuis5e OFOkrzoSugH1Gs( jjupz1(Wq@p9-Bc@3z44NMOkaj3s1c3bZtugj _vj zM//ysrw942mNmhpvFu

PlynZcMjwiFh.dDmqHyFWV 7a Ue/

J.f)n FHRKmhpl8QPynCuq)VSt3FKskd(((((((((((((((((bJx/XGz-iwYiuubQNC@V2.mjP703etP703etP703etP703etP703etP7kHWvgarVzjXIH -K ) ePTo IKCGUndw,KM/,Rw dICcCJQGUrd_,yzG,izNM NXXuePg6zG,INwwS IkdKMnbkwveaqC/ QKwSgsCLMyRePwCOJZwv_OnwGGg1y5FsGUzeY1y4wCn_3LM/ I(QCWgwyC_NqJ(_39LMotB fi8LMym.8weRiFI fk(CWgoC7LUyKT/zx JkWwWgmC6LUyJQG__36LU_cGo3wUJJ_Mv7Gx J1t7RmCKt7kQ fQ(__36LU_n.weNo3wToCsGU f6LUysG f_3wUBGeM_3wTkCZ_t/zgfPLUyKG C4u7jRjx J-GO3wUfQx J-GO5wUGJZ(/zZf3u7sMfQUx J-GO3wUifQUYF2nk89N_bfnsa GqCCWIEpg703etP703etP703etP703etPzoR DHV4I.FVea7_2 lFAZQEQEQEQEQEWs)I6SExz4W(Rz7Es@ J9J(AK@4)P9@RsJ)ZZrR(va78uB)Nt4H)E ) JZI)E@K4J()QKZJqv4QP(RvSPQ QtsH(q/i ZZ1z )qKIK(K4_k9JtCf(D((((ndYw6(.FVea7_2 (((((OzMy/.JCiEy KH) J(h )E 4Z(wi@ )i )P)sHP)ExSEsA,LR)h)f _jP3@ )zP8iiH@S8P)hihR Bi)GJLRjZoJN)i(bhRJ6Rtv7)i1)hj1NQG4PIZCGGjc)JQ GjisFaxUWsOdQEyQEQEQEQEea7_2 lFAZqmxRmjPEPEPEPEPEPmDOuc_laKE.JQF)h/l9BKP(-SQ-( v)_AJ(38SGZx iqFc_/RP(( RP R4 AJ)sJR uj)zFxiR41@IzRSN3Q@RE AF(Q(zbE(@)izRCE-jGjJ_z949N WWsFax9C2 ( ( ( ( (2mjVu JndYw6((((((7ESEoD16x8IR-/8qR 1)(P) SNi8 (R )q8)@Z(SEEiRj1E-0 wH) RZ3H@@iRLSH(@)iJR8(GjK O)9IGiZLqE/E8iK9LBAKfKJN) s8t0 @7IKI@ zu9/49N_b4_8QEQEQEQEQEqmxRmjPu Jnd@Q@Q@Q@Q@Q@y,.JExH-W jRAE()QK pqK()8z gP)wh@Gj(JJZZpR NR)RRJZAN4zNc(yRt) O)@zQQsG9RPh Rp)(/ZQN4RHh1)KHh(PQz1-hsFxi Wq ((((.FVea7_2 lFAZqmxR ( ( ( ( ( ZEIS sNJQ T(.(N)q/S@

pE(PJP(SZ8RRSbP)P)s@/PJ(( PzB)J((c41J(J)h)zh Q@wRb 9KQ94i9K@hw /)t(9iG(4cP3EZZcAChQ@(J14Cf_(D((((ndYw6(.FVea7_2 (((((yl.Jz SThik (sJ)BGRq@ P()K@.i4(8 @9Nu(/P(ZuSLP(Ku JAi@(.i1J@R)z( vJ(HgJNJ1THROJ)(qK)uCTw4PQG98RG@ GjJzRv@bAhG4_JtCuf_(D((((ndYw6(.FVea7_2 (((((w6Oz5y.JCxXOJoAN/zZAJ) A(RZpKuzRh ZJQ@ /j-LRRHbJ4i(bsK@E

-qH8/ )GZ@)hj1(R)GNKHtqFQw83E4@3GQh/v8B8K@H-1I@AJ(.9HbcsHzH1K8JSWCOdQEyQEQEQEQEea7_2 lFAZqmxRmjPEPEPEPEPEPsZA_JSxcN1iGJAt(G)sF(w4Pqv Q()xF(1jpGK@F

(PQq@P) J) sKI(jB QQ@ QKG(qQHZs@CAEb3Jz1EAP K@ (RI@C@-eeC ttxkiE c.KEv7A7 (J enXGIY.IIf,UdQXbN1k5adaZfMEZ.i7(Y )hpLZCH

/zWCOdQEyQEQEQEQEea7_2 lFAZqmxRmjPEPEPEPEPEPwZAKSqi ZQ@ wPsNP iqF)PZpi6BTVCx3u3S)J2hPzxROMcpYfjP ZO6NQ 4gfbh 8cu/ON-q2EujBjw3eb@)E-/h4i)E)P4R@u@@@(hJ4gniGJChzP9QZeas27SWeu asYLh9EO)

))qsJ(P1G8givNiJvceSZ9vKd2,-xw9zV8fzWAc5yTGO/Zj.RN qZlgOaWyqaKvzVF22c3bvDvV (jpv.H2h(8I_SpPZm)rrh@/t( Wq ((((.FVea7_2 lFAZqmxR ( ( ( ( ( _Abyh2Xz NJS1jZvzNcPb)G WOG4c@F,wcUVyb3lo1P2G5aZ@ZFJGiXGOO3JD.Hb l2pzb3J4MONadF

7C3/yhZAY6p6 mnYKMHjXR Jn8 N.svHujER@MAgB-p.H

eHoSRZs 6Pf.vcieCHEz.6 _Lg24OjA HD3c6fDaPCO2k_Y tu3OvFQoU t /-R@TdDrdmWkWd1nZs btSCkQmQeccgOeQ1MzXMHTqKZkms o JU3Lsf(O/FfhJDUnCfXSG4SUYWQobuC)GIFR vTW5q4eecYJ09FWOZtWF-5h84J1E/ZzbQ)vdtm.8tt 7rMvJCJoSixoX mrbp4ODV04jzFQH reJe)ZPXzMocAoSYv-Qq5jnn-O( WuyupT1k.(I,zuYnPbwzTWCMuD-wi(@4RYUFIWAF3vvcdmFKI.cOQY2,cnGRCgXjU ElXhR8inbi-td xxtYtayYZxGM2lkV35dZkvP(RVWLr27sJ)/Lmi.GZ1_pgqPhi1 4Cuf_(D((((ndYw6(.FVea7_2 (((((q_SvU7elQagHj))AqcK RRlmrRj vRSg


xjuYJ(T2-ILc k6A 15Qyuy50hfuV2H2E6h)Y,n q5ZO,VGB(PA2/jXizvg lHLFGNyomcki y@ruR(hU28AEcJTVt6w(Z-Di 01-.RGSNVNHExXOLy1gVUwIq. vi,u9F2,Y37O.2Bm_ -CHpKd8yop0KZM7eMnglwgH

qcU305SVdW8e e0G8m3mx-J9xylBP c 8ZqQN-Z FHkGL.qgD Qn2qaKc6AXEuc6nIJ7-Zxx/gX, /MXUF8Q NblUkVWTkz3p,eNXz_Ey z)mFY_tzqIip4ioX0c87 Xk

9n uX eYs q

LzIETYmZovJgJVewmFr@-5i-Y5qiynTpTx92VwQ31ge rcE5amfBWRTQs9-VnAPo2zVu2ESmIq(mVO(8N jVk5i,b_B9iZIIZxv,L,)XcJVPnUGW -QVFz11RvG9vL)BKDxYq5i3)SwL S9RfhY,3JRU5d (ZF@Tz7F9_vageoa1czc)rz3c8JGQC5wZtXGg5 N_iDPkA 9cwTY.mrwU6/KP9qFAoBS1hQlr.j U eAdhI_Vm7ywII

h/wv/0OJ0ZWCCf_(OD((((ndYw6(.FVea7_2 (((((Q7nIq6p3Xs.rTdBkqr3t,qFlvk0vV3AWV

0b4.O zfj qvdT-49Sye3Sv2Wrg0ivbSq)@5SJ.





Er5tvkn_GA5Xv85a wo TWKONPZ2.HINCxkWml hO_-3DF,

EtkRloZCpiqVm(wVEO iDO Mi(CD8ji8WCGN QX.tR,) )hne19Ry026/ZKK 4 Vme8H-@csQW65 j. x cF4TAklWLGwpICc k,2HO4TdhahYNp6 wgMU )l97d )Jy(A@jGRGgIv RhO@_rV1RsMYo.(s bu_k@3K Xby.W YAChu_vI 9cM7QY-e U3orWeGGvtbizxkuQ)aIDxdxSO2 bBfoJ)VinEHiFulhhSxSM3i3rGMnxUYgxMy)T2EISAGZ P6hu6cH2p)b4xqQGqNGmD DD4f3A.zMc(O5q16@s)ORsDpyXwpT7wtFetJnw0y-RlJys74Rq YGEh97uVYDR nO/4wl,kWyYtIafBc_7-vkKGTwxpS/IQ PHjWMqufxnLahF9q(mKQ_x K1g (B(((( lFAZqmxR2mjVu J((((( o 8_yD013tvGVkUKQ_CRH1 UL P7,CwHEe.d jj

41RkhpJQR)WqJiX2xJghZrm/XMVR6 nY6QG,Y,I7vKiOntPo47qHy1HG4z9@g,@U-58ZAJrdPHBPcuQaC_r79tVDWFuJFa1tfxY o

Fyd)NtsiVA3DZQw axXo.u PHl1_g5iNVGr xzkV2f 0gvCpjo)2A3ZfCd_YJ1CgOCyV rFk2ot/gyILHww/Mld6QaFHHHf9VzYdxjSe4zc.R2tlK92gelFURmM/RV0

YaBRvI 8NISndBWFMNjmNnO7sHKvx(OPrVpKhapr/K(t/mso1STUQj/09aV @1S

bfG.ARvO p2Ff.qH.uAf3@201G-H0BjwQaZ2ycJQuM.dI qc91,K-/,a8iNl1gIhH8YbxRV Fp1 9gST5o VeKqe IwrF(,gyzfzLi1azpHox.@y

KrMh aub8mKX1.yHao-8ZdSxKg0Vst2tYyJO-.adR-WRGOy5BQLQWmR,3@JnR 9HLow6j2bUrx g.FGPdHGZR8(THsJr)g/ W/xyC2 ( ( ( ( (2mjVu JndYw6((((((vm_ xih9_RgK H4pO.M)hB4/V6PXzB5bwI9PMj(jKA5AG,rdZ uFcdRAwq EjzLM NdS


zW G8p4LV3TTeqT7gl8U@iR@EF9afqIYfd-G(vA38A4v4uCDg(r.Env9mWsS991gCXSjoqGNHmx,Db5.cXxKk1@ZStcyv(gVn7Q5f7@chO/ny/gYgT@R9R_e Th dwXBoOISE5@ n9 t,/QkO7tS3s89 Xv4bOF_IrOWqezdqA5cbGqgT1_qOpO(8B9j3YCAUoqT)-QBa9bORQKdfNj1SS2zPZ 9RBjVA2YdVXvRH1yU1Z prw83iHM2Gjq Jb@ZGuUaxLDk nf7d)N HtQLU8bUu64C4-G7K2WQ55QEqAEPEPEPEPu Jnd@w6.FVQEQEQEQEQESk_tagaTg_JCv8. U3Oh@xYqqDa.8vKmRVV 1jxXosIi5bHgoJcVZjCxjqv 0.R)cVl0/vfB4,X(7IDLF6BScBEer9WJ(-R-. xdvv9Ks3NkBV_J5wluJ -3Gs i08.bSZXx(KOpU9TR0RQR9sP2NiHe4I(6NcNRRc(-LsK_4mK)@.RpmDue(2F.Ex(SAx8F Y2Od26pcR-

ve5)hu 0jX7dt)o5m.qQGI2yY_odyozw0( WSEuKI


@4DR(KkYxqukU,obcPr ,2MX8r(96ui Scke9X/c)ySbpG9Zdv y t5Bi)Fs @tjhPCZxXo8HZd(

(((( lFAZqmxR2mjVu J(((((1n _XVsUanKGYhJE3j)BzcyMhUdWZrjm.BB Tn)c3.TrZe_Z -x1v(aUs@Z-M dk hfqNEbF-EhBu5rpqRYzbGMncp 2Hf zR69jIlEyq 1_LY e0_R.A9RekJ6 nI@u5f8eOj2ck9FGUbP WpRHlTfhxFGPj9)LtgVKGe(SV dRlm8HqGaXq@4 D PWVppEBnFM bzUbt1vx5ONP gdn2xGV5 gW@ _m2mG fA-o9rmI P_jP j5Mr7qY,wUp8M82tk9756vTqKNz8al8vcihWQl6bwCv4DyEGM

sAG7V SJKUV0)j2KgJTQH8uNM5cVnI pR WRDt2)GN2ZwB@5JCKpF@ )AiQ1NwsYqZ484T ojG1AfD0iemUX6jHK5(hREY7q(QhDS)lTe1sMQ1M 8uGYTlQEfhQEQEQEQEea7_2 lFAZqmxRmjPEPEPEPEPEPvZoOF(ihc,Rvtd6vkQe95zRt

H b3OEZ2aTcBKymq vYcr1c5JKGwE Mb3vZreNb9OZi87JrF QVb(,bIK,9B1W@vfvW4l7DXAuaQ/lc(GBqmsWXATFFkZ2WM4gG7i-d9ys. t)IRwgJkSNg)9Ta)T9A

/opdw6eul7.xm he(rI6TAfe3yTlc9llPJHnEiE)QL f

Q/@1UJ k(ltN 1 yg, psq6S984oRch-6Zje8NdIRA/



uO2I42KVf5)FJsxv95G ekhzgvAKGm5WR@y/6M@znIczteq8OFWgskTs z7 6y

mCnK UOzdJF-U9uKWV239GFj

XSZ9 Vm mqqCP8IGcUpy8ITzxxXS(,9XFv sYzzdgAM fROB9- bNJgs6dk9EZeVEFsJHUTVJinWbsmB@ZarzZS9wT@54/aRFBT. aq 3 (BcPSqHpjkWdpSV.f Jn99PIXUqvDN9fK5(csN4jThBwqybij6kD

C8IChGiAdZHlgLZ( ( ( ( (2mjVu JndYw6((((((/sqv3Ep2NfLo0SDc_xXqM4EffMW srkB_GirO.5LCmW2HGxDGnxG9 nSKTcA.H H/vrW-qS8MJmv l k236g(bw TkIGpPTzRjosnX )Ac TmpJGR9R1WMX( 2

0.dfSfb,My HLUOv0TJPO4KqvSEWwjXW8 JOnQVfUT2AJ 1_Q sqsTF7f

c.LCwsX6p9QRW8E@9UkSQOiMZK3FoXIip8jzHIV)gOOKkp 9)Xz)dXu2fu EpgoTdeBYR)7Pnc9jVPivla@uJ/gt,HiuTXku(lXXAR@kipH5 RyCVMIZVySL.jPzPd(Sdj4RasNsrd9YTqR58 1MGTq57e1yrv9jIcTZ9cv1Y3D(zz7aqzTR),R,2iVGoB6TH9SXUTA ipp

1Cxg5YN Q (((((.FVea7_2 lFAZqmxR ( ( ( ( ( 5lU

f8MFK3s _T1 28f24 XsSj622IK /4HXp1GU8Ulo 5HeS(KWQxs7QYQ(GMSY9edWT--YaBF9sPuRCNTEu gS

/jWIjA_Am j_MO3@h2L.F96hMWO11UFCE(ZuAj,RqVZLWsVjqOnVF_SH4F21E7n4)846RV z/rUVvAD-7K,R8 Fk@H7i l_sNU5ijLG4Y UbYZbA)Z-3c8m0@sOorGTSJpUp bcq52skzbm6Y1EVmI4 U,fDow02YLu p@TnyvnHp5u HDsYEiUuWZKMEG-Xp0F@zSVJ-8jifWakE1LW8Iqr6Jh(v6H/-uGw,nSnAPCIE,BxOs6YL0 O9uRz/1dutlhd z..VdO4eBB5(4.FTReE.jc@ sFF8nZB2 ZB@

/M2ZGc84nLeBODQEQ@Q@Q@Q@w6.FVea7_2 lFAZQEQEQEQEQEVxV 3WqIhqepFVWRN3vimLVGzN 2 RkI2yR@cUIF38i7JK5oiGKgf

jhN 9Mx necEVi88F85MXzzXJpVXVM4NWk165tcZ JQb bMh/8e9RE9 HpqA iEnNP1n/01M uYH1OpvW2pFkV E0sRVJYJiV7aWs

4(v 4p_jxY pNFVM5Gh8).




gsLZfP1UBIs8ytkQVlX4p1-bpk)7InZDW_oy- k5.33KsZ02K,


2IjM0HEc.9gDYhIlmJhFX@F.U W1AZ)CVi -3G1lzUaYnpiloArpy uxmeZ VZ 5-5eU_qq VOF2pUMJRYhp7ErM.Gjy xrq(.AMTiSV juCUo 8h69biYFFuqZu GY((((( lFAZqmxR2mjVu J(((((qr_-ZRYD@z90OQezI5qVcK4jX7YIQguJZ7LR.Xd w)Dx5w.qRjE@8lipVzL SG5dSwq7a@KRhp8i8l qaXN(drpMCz3HGu2J0) 0N2LW)

0 vZI9fUVVpRimlJOn hX0rGVimo4sOiTvfVDyN0xy-9rIAVFnps)cl@wj@VY0USOgJ,1L4v9Zd3MLN5-)GjqVdd1FreIif @QpXcRyJZpoNdPfO1fnN.S l2q/J4SHdVVjeEz@wgivQH,IqcUGeppGCNxBGSU HmZ5lQ-_1JjbFMnVBa i)Si1wwttb5VQ)3o5UANq

7QE2 k MU2Cf7ijYEQ S5R.F1TU3fNTkDBti3 srym.lz51oZf)HjOqOsp9jT XQ3nPz --4hVx gmE )_m((((( lFAZqmxR2mjVu J(((((3_klqRPKdH. eBTL 9hfMk29UsyN ODgNjhHbmE9Pi ,8HQ TUA5IW8nHOoUg/mv6wy5cbeP1 r

M8R6qNpNTg@.i12 kRwyRL QpXHfxaUsSodpi@q UCfm5q24.Hk)i98R3)qh3LCkAlnfp/4mVez N1T/wj8P_kdgRJyN@GZX_LStHyjmzu6o9b89TrbJ450niWaX7ZeTPMj2iR

KLiH0RFU0(pyojyQwJN. Z)4xqR2x8wvRRx .pJ95V_4eTE. IXqFm)E@kfy H mJ_91B iv5p0 RIbOtB VuWZO9bUUfA-hjrGS,Rqy X-bGB3FqVtVgyHwocMywc

HHdXG(8-qj4 (4 ( ( ( (2mjVu JndYw6((((((/b@z/ZSPjhzgy0jE Rdwgy)jn5eaO5/ fto.9udIj8UmcH0uQ6mQjAi

2B-Qb,p 9)U4w,Ssrn9@g6pHg5hr9O15hnBHPi7gSF3 e8FQd0O0GKW)TkdTrTfs3U4OZ9N9M0hB0hmR@zUtESn8eG rQ)5qITtpO5qEft5.-TuPcBm.jY6OjWiF@mCUlXE7GX051f g-H/k85Mw,lfp/4Wb.JsUsNv(3nUh j hybNIN)1@ j)j@0ipjEPRVl

VaTqLVsJc@ O ipXkXG_jH2W@pJJI @3q(XggMs-AW,Ervzkvn305

,g.@85Rxd gVYWgKm

7O.szc9-ApGviwYfo54FjxHY_ sEXHXJ(((((ndYw6(.FVea7_2 (((((W@zq_OJ_ _jxnEkR,pHI y SAJ67p

wTHcF n1dOcUNtSFlrznC2/cl@I5KaPnYmj8ZwP9F60A7z4-Bmo-Wr, Nk2T4-7pvQ mZqJ7tV6hGFHZ4LM)q8aWsJt-zewF3

6x DI r9I4u1OsTWf7MZrzrcJ4m9RCHlqGTjV0T)u4w4anF1-5 -0E1MTH9sGTRtLf91e8pCwN RIJPdasvKrsuxkqI1UO5QW 9fGm yFu,QsEbw4RsbmZYbqYLXj.F7()qTw9Mrl3J PyIJPjM I8SA)pjUSzOPA8pDRT6RC-_1AF


Ui9 V7zTueUOZK6vM5UxUDy2 u5DwhA JK,eJ4cyHRGcL/ jjI

1DIiAljVM3qmW.0Gs(WgBIgCccV_t Tj/gwjzwjF52mW.elan0UEyjZBk Dsbrj4yjz )7kvW2Htj-QGfQEsQ@Q@Q@Q@w6.FVea7_2 lFAZQEQEQEQEQEW oE_OwUCf4,w q WMh,KzitwUz-Z8iI(jBWflG0hGQy8 m.FOXJKS6I1 sqZo.rw7jUU

CifyjNb4 iKk2oN05f9ikf4zKHXYNI3s V1x9pix5JxrzKfL B

u 28XlU3IoVhNK63QKl)ML) QV4IM46DHhQYYAO5fTQa B yrgfdc1Kain ,mn7HzKFH,Bn-jr MYIi)r9cBSqPo8j0Ksk,2C1jCcBOPE9n FidqREstffRR

eG.4_rg/kXoISsK 7QMJqBK,v9vs1AzU_ .C3W 4syZRtHizoK7WR0i3Qa

x1N rh

9.fTf TLHwS05,hz6(yqY9DMUycUeRU w zTFwAjawRSMGqj@.IxR 8/VY5N7,,ATFQN.( ldpeueGxb.GeC3UulF

jGD4k)r5ut@5xQtnVfft XdS JQtR8vaqIe9 l05nwrzuc/HOymq(UivxF_SV MrZKg 1u-t0kx6ycJ-0k(4s)82sW _MwfhQsUJqJ0xkoOv0krMr f8enfum@9A5s.vdz mDUqLI8WFQErQ@Q@Q@Q@w6.FVejnkXZ0 KB-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@sIB-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@/B-jQ@KYw3Ddq(DdP 3 ,AInput screenR RpHWUHzF RpHWUHJFIFExifMMJib. Muhammad Haroon Hayder2020 20190529 05035120190529 050351Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T050351.198/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq



/-M1,kWuI1jFy.UlE38j mE,Dcn2GjCyR gxJoIiF60/P9AHvq(y9Ti,-RTyi.


X.ymMYKb2z/Qy7Vd. TASpIt2CY5d5uoO,CNAFs4NVDkexOL7BYOydil151PL0f7dxFpDgOC )8KwemKP6,lb7 yrhni/ 2 v@041Hjno9HoxnKJmyCd7Nxo/obgDcfsmKi6oWjC

elhXKxcoDrJ7cV)D@V A.MwnGp,XV.iy0hS61nmqZjHFF.3 ig1 tZria esOZG1

_.XdANh-gUb6deic@gW_6Ih dOcONIHo.W K0BbHEPgNKWZkvxOH PmAP6o5m@flTmleHulWqzKVBp18Hom-j7xS4MH)M(Mam2RKx5DbdU96vxztVsp 82iMjmiwe as

y)PIQ@IH@(((((((((((((((((((((((((((((((((FI .t (5Mfc ubtVchfuIAv867SXF2 Yi8ESoc/,6PrY Td 1RFPIwAi.s_mUp61qs9uI hO5t_TM-th70nRz

7Fl3phS pp6LOJ4FjpzOql/WWs7sCNFqkx


A@wcIBXQzPiSQ@zhFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h@zAFHGQ4h_E(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@4Vw zGx C PEg(@cEy,FSkBY.iFgm qjZ(G


jIqKwlmmg E)h@Ns5 d(RBg__,E.9zVi/nh33)8mAGFfRzp_Z,eYV0lOj5Ly(E Ys10y

89kAdj/PBHUXq.1ZLw( 3w0)if8qpfnTIu-80br28OgpXHL681rI3zsxF2S8/MAv Posf(WuWQ,5iNUyw

qNxiqF 2Q_bPetK2I3PUY(XrB225g VxmhWrHH V6VcNaA,E Uc9jxB46F@ JxjMbS-fi0y2b k6 lp0o aoGkkE5T75/AeeiEKeYSA9,R6KOvHKERbEQpjk3MlS-Zcs/imWKdKO2J29zMMGI3l883KeCoZamktwwct2cy (aVZhbN8)sg/6Pgiw4ZVE- PpidV@pAN7d1_jeddi. NuOc DO1hW5kiceefnM22,G9 I8j(iHdC55d_NHeiK Mm8SqGk.Lr YkZL rNG kP m FH.PZiF nzPw6 Lqnrz0yiHUO23(_E9O.lkg


byF,CNRA8 u

8sO4nssoSoxjq .n7W-1v4QEk,)w9K@c E_XJpBbr o5M

mfGG,o v3kk5YJJEcUpW 2hnu94N4 Us2mDX_y5.t3gw p Gojuk

MeZl)4QGPqFRYVNAvodiQo K2BnI 9c8mK)FRc1jx/YKXofua)TG n@D.sclHpAueqN2C2@V-cYRBBa9Mj0eYKgHUE TnCrXkV6Yms6m AGU9-Uv,ccdR8LCfm ))tb31 SD3o-ua2Imd5rqyYF

VcWq-KikXs Lr TJwQGSgo5pn31FNi,qi6lQA@wYIB9F(pApxUVm1o@Q@woiy8X SEoai

ITCp18 /-mLKi,hdakkYra YHIuQSCdAuOZ6cf7 vhgKou1kYrAd.jImk FW(nG-czZKFu

nS 8DcXOIq )FGY(UQ4K6MFy..nIoYb.luTH-I7qZNKmsMkudX8lmTZu/M3C6 a@_Xh.ev7U g,79zJ(((((((((((((((((I0WqxO (Q4mYp6 O _@Oi qOhrI2YA_h.uiqysTq_x_-v ff uF


RN_3d hL@H


yz0d 9rsn


9p) at5wum36h@r@yO6moX/aym,0@j4q-gky4qpnds3Vnp_,AFjnagDec @@ES1um9/kf) 3PTmt.qGAm

OMLO5XgWFG@ika bpfVW 29,oyhgOmJmyA cE9ZtCYjwrKs-HV, c

p95(tbB B YznxFVBrP60ZnWOB .F(Gm @


J7xPDrLC) AEG PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PQ zGx C PxE_




yz0d 9rsnODn-5KkK 7ldbH xYx-wpZ- lAOSC_LP8 /ByIdpc. k57


M 8In(((((((((((((((((((((((((((( Bz7MZODiR8_gWKAL_tM4G-/hYIwsZMmQQL13.sLyzeA b EzsE6TcAYFUhubH9UkZKvKtdbOix83hMgWTNr Ckix9bprFaE5Rbcqvb58LV3W6rkmjZD-eQatCL_4D/E@H7ftD_

Rw9NyAzwalEm18Uwl35K6TiilqJW_kjWS XsFZT5bkHZEod(RUj8

OEUueR3l@Qe_/efe@(((((((((((((osrZW-(((((((((((((((((((((((((((( Bz7MZODiR8_gW-vDKIW)2 ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(ag(o8(agy8IQ-gkaU.Z0 x((((((((((((((((((((((((((((4YzOo(53H XneQuK FBUKAL(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJ(DJ5AJSZ0i,cLpkaNPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPIJ4@/k3G

prB)Au oeSB7dpfzZg.ebdiIAQ7umF0wG4-Xu(4TuZz6Vkq@rrGy(E ozLn.k6 LUngi rE

j_hn6r4sw,T1GO_TKvI JRdL6 g88ivW5webgg6ffFTOZsDaH 79ResrT0,AGZKF u tR VgAj-1XirnIsIRUJ7_YKp/w6BBz1Ry39vKTYFYSLG(lO5GEA,lnu-ZOw(.lm ij6_RyZnVWrvcOpOxkNuRZZgkdxp9O/qJcNzqfxEKiKidv,2p2p9 -tX/N-H1T5XkwSS 0A5MXo0qAStY7wn8sZuk_ EDaHKyeTn)@w5MZM4m5 0NFNvW09ez97cstlw,at0Vjls2.kNC3)9g-qIp2xZQEQEQEQEQEQEQEQEQEQEQEE_



J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(YGQ9Igs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(Rj3e mGwr5(G9G_Q

J//Qgs(4YhvPEpI) @v8ghPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPDdD 3 AReportR519BHNZzFR519BHNJFIFExifMMJib. Muhammad Haroon Hayder7575 20190529 05085920190529 050859Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T050859.746/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz mOF8WhChf jdQzqkh@q 2R2gv(WyJ(III6hX4W9w1h78QQJ3L

dX9skIxEg)sOY)wuOB/f07SxP-KQ__3OeGoik(22(otylC0@wwfvikogd,btH9jczkkO36Ysn46MQnOGkz8d omsXV@(D/

dHIT(7whZ1/ZdW41 suyvm68vkiewLlK_K iHKJ T.K (@ 6Lv-@uQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@_5CupY@ piG,@N@QQ,IEfZ1B8rFS tiXmEmx(j4isQtZ-3I .AhCPNexIl29RsyF6G)Qvyb8i@mIfKdwCnSV h42rzA( Viiw_F1PIv4,G8X9zumKBv-E8adQKO9z(cNy,u HRyQ1-k JAwNnRFlrsJ(0Sk9.DA Q1zxawkQ@Ik_Gdi01JyN7g-5eo tEei Xx 1,IWTMgM6 Mz4ktaF0N 9 Oi-6-b66ib3D eX.9KKw71z 5F0H dOMwK6IDao5EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEG4m,,0@ /V WeS (2Av MfaHgkoif8BpYs_ hE rLTPsemq6t8@PXmEmx( FN7pEqK-m@e7_A/Ts(G zGx CcwOu7GE xHMw4q0ISwfOpMUHGQRMkRNTfo(Y(y8PZA8g(WahieHh0 XtV3TCsAp PlIiK.hw

1mwqM.CnEYCrP@Q@zVVZ e1II 0NWCH/3 ,RN(W6s948oPKtDYrzxZ((ZteiR5sj,oC32x,Q@zuV WOyO8m -5gembTGqzP(G zGx CWmyNfbFs54vR_PHdP_ zGx C PsHNiMyf)-Krm7.HO l7FR8U4CAHGGFXmE3y8t77Z nX( zGx C P50F

zvr9@zA9@zAjP OLH

KV3WqyxFc 3Q@zKmGZyVhQNFOASKo2J u63 _@zAKO)zoX.5dGpuI52)QI.ti lP zGx C Pnn(6eUUIn9@zA9@zAgik_jNcdQg,y885)mSQxDUf3N HGQ-AgCW(@9cj emFh zGx C PiEWeo1E Xoorwq vA(/@zABoiVw7usu A/O8vuf(WumVyHl e9 4) .okskK9 9AzPAtb_RlCsSic/UrrRzn @zAxnIIePGZ9@zA9@zA44q5Kpx1L,Qvg8PO zGx C PInt TBzp8dom -FHCgw zGx C PMr1UtPjj iobHH 39Q@zqiMJGl_2.rqMtkrdDr 1 (G zGx C6kncwdUqIRpGoAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(oAHG(lKG5Ii8-b8 -j(rWqK,2H0mFb0 wX4.ecZ-lurr

6KHa-@ZCiG,APZT2 j3-@ BX Z/tVks2UCi@ U jX(m hBI 8emeQ2fwnB z 9xTU ,AOtK/5d-@ @r2CiG,APONh,y8xgWFSp0d_6O tYyB@9 zd,AQ 9xTB@i- fEWfNsM,AQ 9xTQ,AQ 9xTglzK5BE nMYXl b.1sX4r

WSu.8VFTUp4c P./4ymPD)R6jr

HOh0lRMf6cFqTVZj)-FyqGH, FVn.7

M 9xTUeCX6lC,)0i9/ jzX3ZO,Em7 Hc/2zkgFl0Xc5wr5s9iaF6Ccr

HaNVYZiNV-GG uUCi@UCi@ 5h7IRB .8x5j

, iYDL2 EhUCi@C6SZqy8PCZwev2he g8y7r

HWO46-dkK aB @m5h.gelXgrCiG,AP EEPpsO X4r


JX4ZxV ueG g1x


_chZlvrRIHracnml1s 9xTUC(iXmVE.g6Gh CiG,APifYGcZOrCd xtUITw q

Q_Hc/23Goh-aepr N

fjYnxL)gYm j36NNj,AQ 9xTN nYQlJ0Ambm6T3LG1lf 4

O8/cRUt0CpBcB Oor


HuZ 4hEBC)PCU X5 NS10tP06_X4r

Xm6v9ThGqxZoYFA2 X4r

-h20ZkU)I -q KukeijiqvhT1ppzUX4r

ZSq5r92s9Z, cjkx Ww7 p1ZCiG,APzT1b,k7-qkFFy

sCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APIEsCiG,APp,TU-X5wiZ gdS u-HlykeJ9oAHG_3YZSh.M@283yr/47t6B PKOg06pvZcu8RownO9 P4JsH4L4c O Pn-lp2ag9kirB)0I s(AHGHDNTbf28Txfw7@Q@zC4nuV6sz.7GJx48cAMXc9gzO@zAfRTus-@F ,.GZ_LU2vNO( zGx C PQ@ zGx C PQ@ zGx C PQ@ zGx C PQ@ zGx C P9@zA1hHGQ/1h9@zA1hHGQ/1h9@zA1hHGQ/1h9@zA1hHGQ/1h8urG0RYhssqd.OZu1hE7OZQM1hSOZu1hE7OZQM1hSOZu1hE7OZQM1hSOZu1hE7OZQM1hSOZu1hE4H9(((((((((( lFAE6aC_WH8mMa4Y5D6B7qgMxrCQdsuAn9(dD4CiZM2@lz6KkuFO9-jVlFDhLwYuq

cUD n1@hoyrs)E dPCmOLHW93c2A(1OkMMdVF8imNhRY9uy_ cqvPZfccqOjLnFcN@h@2dcoMlHaGlN3XuUwlZ5fBU@h1bTr2QEQEQESO 4y8ptgjj(ptgjj(ptgjj(ptgjj(ptgjj(ptgjj(ptgjj(ptgjj(ptgjj(M g d_ptghptghptghptghptghptghptghptghptghptghptghptghptghptghptghptghptghMBM q0P(EQEQEQEQEQEQEQEQEQEea7_2 (ndPwt

LZos2KooC_@zFN7pEqK-m@e7_AHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGQ@zAHGivMRExui(((((((((((((((((((((((((((FfFdt(((((((((ndQqmx(oTp0/J(_3YZSh.M@283yr/47t6Bhm u77F09mu

py9Og06pvZcu8RownO9xhHTEdbM-,m YkM- IQoP.I6VmrSHrG-AM4abTbxu-jVlFDhLwYuq

cUD n1lp2ag9kirB)0I s5mY/.Xe( iyVUv qH 4tk)0qmzZNtqYLlpgvmuUldPzQ3b)iYXXjO)TkU38_xx(3aGj6Q05i2gO1 NmAkoZK6FlK6acHEz2F 29Re/@dSzVQEQEQEZVj)xXAKxI,3Y

kPWdyf4R9bNEXKWP2c268YoazWt,.- YdpGxuuD0RaEX EumRtHQ2G uh4quoT,E MumsuX@xu6GwD s.kXYNo7CDgi_oI _VU1R)q21@tSV. 6L bUYxYl@)0xZi1ZtG49.k-.GsdO s ZhkMb,J a@N3PMZv.

YgrMn/Nn YM,1MGlt_h-V6kCwu,Gb,j-jIw@d8O6mim.yLT uLx8gZ.iEF1fPSo.TaqSK8(hAsXTih1Hi/Hc xWbD4Q(opX((((((((((((((((((i,I n0QjR0D20 rx7 L_z4RMwil tQVOaWqmcjQG1).99VV(EQEQEQEQEQEQEQEQEQEqmx(FQ@CXkbVyWtW7 PtW7 PtW7 PtW7 PtW7 PtW7 PtW7 PtW7 PtW7 PtW7 PtZX(QO.2k8b(3 zFGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPTzvOGPZa7Ev)lt(((((((((ndQqmx( jZ-einLv2F1sagrWq@qCCQxxZu/cbag2f-,msa GqCCVmLe@ iRhePlO 89L89L8zin)p0t3om96h102L/ay1soiCrub9L89L89L89L89LMz,3tu5Z@h((((((((((((((((((((((((((oVjo@GJ((((((((((( lFAE6aC_WH6/4Qj4P/Y_N-27F59W0r J8kh3mh21O5m CVhF-vC3,d 8

sxOy5L LFDZ5KLn@)e1EyVK3IMN-zxVi3P3Qsjs hTjq2@Q@kkVZ lIViLu3 NziwuBFIXvGzZM.kskzYosABn)u4B74ORG2 bJJ(gWu/. xeKK@



(.,3kCKapcshWcw 7ZsLc(-2q)cWo7X/xER2ROK083

Jr6@ oTbH5@Q@VvU 4QEf2D7-dIekGueMoaW4tViz22pUA@ i6Vuti1-McmCk.jE2.VP u4W59,pr9xs niLaONRUh8hGDSPiqYe0g9VuTFgTc8dgz7t6y- -PbrpM wk/iOqome7hK.XAFB@uhmRQP9c8TZ-Mk-,O Z4vnCUfp8PcEyiWVvGN_6-Fwnv8jm4z2a-FGaTZ z-VGsX@)2tW)Mj-uiWppTR XCgmerT zfOyj1sWCc6XjL6


1hT8cEhOqsznyR.6 bD8iwZxQFBuo5 wZGFmo1PynvoXhtik@gFp4mzo(Xy vd(((((((((((((oVjo@GJ((((((((((( lFAE6aC_Wv-Qc4z P/S15K 9LO,nzvwooFeQUjx@bU8sp9 rrTOhF9mCKXNOdQUjx@gnO1mr-nwF r8J5AJ_OJVm-RHY33HN@ 8/csryJ5AJ_OHehXmZwomr3_FU(DJ5AJ

mNKKH AsY,MV5sUGbFI FBTQUijNBO5zLzUyMY-wyRMz FBTQUOq1TVFrAnTnnK8j Q FBTivXFK3Mo_OWO(o_OWO(DzzXh(i61Y-t6@TyifI p)@ H5 K-3/n ZVVoN7OkY..qG4bVmrhdjya9-nG9vcCeINz-q

.(dKSxdx4.lErpCVG csnyh94k5K(p,sPx@an6

q2gW)OSzem68p16D,-S7y-TYdN6Wx, hTqtwQSLK9Oh-t94 iKK T F0

M58S4R Xm6@fviww(.rWr@wH.(/FYBrAdzTjAuEgLYt4vvaZG vvs

KYL)9-yOtb 6nxJKrvfn/TYFm8HQFNxyMF b8n@6qhf(((((((((((((((((((FfFdt(((((((((ndQqmx(FVea7_2 ((((((((((_VvP( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( q0Uq0PJ((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( 5Z@h((((((((((((((((((((((((((oVjo@GJ((((((((((( lFAE6.mjVu J((((((((((koY(((((((((((((((((((((((((((YY(t ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6(((((((((((JUf(((((((((((((((((((((((((((FfFdt(((((((((ndQqmx(FVea7_2 ((((((((((_VvP( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( q0Uq0PJ((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( 5Z@OITPO4UMIEGIiRQ@OITPO4UMIEGIiRQ@OITPO4UMIEGIiRQ@OITPO4UMIEGIiRQ@OITPO4UMIEGIiRQ@OITPO4UMIEGIiRQ@OITPO4UMIEGITsUq0PJ((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( 5Z@h(((((((((((((((((((iTFM88iOH_CQmQEQEQEQEQE-w1ZKGCoVjo@GJ((((((((((( lFAE6.mjVu J((((((((((koY((((((((((((((((((((T9mS((OLd ePcZzv6XImoep6nM2tVPN@r7m8EP Kn-rs9 m) 6u9iF2s q9u.5UV l -Oe3cb27)4hgQEwn /nR@(7m((FfFdt(((((((((ndQqmx(FVea7_2 ((((((((((_VvP( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (9/MOcxW7/UdgM WYKtWO7G)_dtWO7G)_dtWO7G)_dtWO7G)_dtWO7G)_dtWO7RbOH7



JFIFExifMMJib. Muhammad Haroon Hayder9393 20190529 04404620190529 044046Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-29T044046.932/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz y(bi/y)P/@ biE3y(bi/y)P/@ biE3y(bi/y)P/@ biE3y(bi/y)P/@ biE3y(bi/y)P/@Kb5)wOQ7@ bidQUQISVOZ6)bhgw(Z1CjznkwCrI.a5Ze5Y-fX)(Q2BAK0UAEpj3855LJm8cSthagQnITPI4_6wYFt@HBiohEomQUZkySQ3LmXVur) GK)S j y)

ozy0Yikbgd0pGqmlwL_L0Xrx)YfuI.VK nO0j3D7Z2RoYwBW14EL_OQJi-mcUzsWt0o0@d2fKbXHV . ci(IzhXZH3JvQy14Eqf.JkP.1N1Yu(t,7ZO1Fq4Qpzrq09H3YAS0q0 6Nax8PXa Ky)(Zhsi

cOL Q@tty(bi3y(bi/y)P/@ biE3y(bi/y)P/@ biE3y(bi/y)P/@ biEVdRbiAL_GOSy14EL_Oy14EgOQ(L_GOSy14EL_Oy14EgOQ(L_GOSy14EL_Oy14EgOQ(L_GOSy14EL_Oy14EgOQ(L_GOSy14EL_Oy14Eyq)n9qiZELgxqEm)41D(Zvy14Ey5dKkBxFFeqkuZle 8NN i1 WTM f nJcg3

.T4jdQUAqf-R- 00PB/t3@OQE(t_GOSyDt_OEyDgOQE(t_GOSyDt_OEyDgOQE(t_GOSyDt_OEyDgOQE(t_GOSyDt_OEyDgOQE(t_GOS3 TyD/z)PB/@-acE(t_GOSH ecU(t_GOSyDt_O2)Oz(EyDgOSl2lkzzgOQE(t_M1GKToOs,JmMg9 JEyDURWY-1 6( BZmJTd3RYD a9v2T/z)cm3@wKwI BtWQ 2avmC/z

fQ-mtka HC5-Dt_YWzP6o-K(9_nt_GOS-VUvXFHlZ BXjmV0Y2Oz( m).VTT9U

00G4gz( U)o,6rIKZw

z( 1Lw@/s urOQEJXXUbqWSt_GOUKQ, xcuRiZH-( G7OU OP5Hs,(Sz( I/z.P Ue pjb ByL04dQYNctVF BV5Kef EyD9X26t_GOUXkhga l@vzKt_GOS @_9 F /z(4QHf2Dt_Pi rJFRI EyDd_iIiMG0-Dt_U/kCh3l BR_Ewp .t_GOUyEXg/hO9 gWt1Lz( jPiVde.En.nhOQE-QO @B/0) GQOGz( O-PZ Lqi3RE/OQEZS)UMnKDnc

c /zCShdf4t_A,OVefi2401XXb/,pST I_(xkVBbfL((((((((((((((((((MOOQS(((((((zt1O(((ukLwhs9 uZWQTyLkAFx 1A@iyNYJD

8RkX4l/.5 cryj5I fAl3 h09ZX 6CNUsiqkp21Z1Uzhc_iQ7vkJu4o,.n1 zTZ_@mvslvvz(koATN_MwF 8 uX5B08 VedfCG QN_5q t-McoEsG Zor-_NSEQEIQ2 r8zCArj.4B9FOP5eoqkB-p h)7zdZ7


Eyy3-@s_L-WqcO(OSiFi3 Kdc_S)(K2HZKuBdW838SRh5kvYYQrs 2(PBILD@lf uueY78dC2__(HX7OV

b,dAbwz(zty-He_qzt1O,XX(GTG0FfEXaWC)vrsCqtUYc5q_-ctldc8G_nAh@v@8Zzt1N 4m/8KkgkiIcoP.n.Iw I8 VMvcB2.4dPBp_vB RSbumv57c8k2wgq 9Jvm7t( U/yLOcTt7I0 SySfjB@U UA1RZZ6XTdB(1HVRIf_0oG4jCqKMRksIkSLnEp8iSpL9ThRr(u(u@LPD s/xltN v8 @sUiq@ueHyL


Esm1cxP5mkfK7@P93Dv lhYyxc _H2CrYsj38WiSWI4szIJnH@Hh3I Ir719TCyenquO



m .UTg_5-/)lXyHdck_I p pTIOmQldX7d1aIKzXY C3PK.aGHyLyN9977qm/43 ymxR@ qaSa(PwgUl-iv nY4nxg-5V6 6GbAHZ_om.,leL6jtwnK3@fsAw9r5kcMq5B_DQ oXhu7_3 HX0@L@-d1GP98gErgyUHy2otmwR1HXX p@uqt/3uwS aH0/sXpUuG7-Y6QI5D gP k3qh_9cRr0Cd TyGutIVV rRAlLX)z qP UcZ 5PZq,ndDT1 )v3hQX5ioHVF2E9q4QGaeO.RpbzVxhEm./n jYIomEY D4-7OyQEQEQEQEQEQEQEITdtQEQEQEQEQEQEQE0_Oa)T7Qw98i2MPZcz0tYtRXj - 1613JL,KIX0H d dT EugI@a

LTbjlXRH7),CpAV(d6UiYe95jkfL)wAvj_/ujDO4 REN@1UMBfZw VgjOZVWjP99YENLF2cENH jb_63i Vg0lWtcZowZZkdm O xg/uj_ 6s_SVGgbJjC4N_V bSoXDQ O1 a0)_



S 27@G/_UQgENQ6@VWjRqZkjW M O1tV_jSTg( 1AOLD@K//(QTtM(JTB(Yk)_M-GzRE3_W/giPRDK(@ 4yK)_G@ 4yK)_G@ 4yK)_G@ 4yK)_G@ 4yK)_G@ 4yK)_G@ 4yK)_G@ 4yKiRITg_WyKg_WyKg_WyKg_Wk(g/gh/gh4(R)_O/gh4(R_9-0oG4yKK,,nOAVpK9gU@mGmg,aG,a@zuDmASlfs)g VPxGQ_L4xIy)

r,_COX X X,-X6 6X99 3SfTFJxwBgOU6ME,aMW_goSCBcBc2gk@mtj_YhmN6hYNaw,a7/d-2mGmV X, OkjCBGxROuAoVk@mttSn6gT Ut1LW)OhOOzL66TP3ZygLgTz_O0 BxGUWrS_TPr9OmJvxEYb)_G@kN)_B@ 4S GTyKlAgTy_W/giPYLzSJ4F_SO3QwsOV10oG4hWS.6lhmQ@qT62ExElJyG.fQxCbEeThAtPG2@YNU2jUsIH4mpR,)mlHZ-lKP-1z-A ( 5R@lgSFKFuw9o xRVL8v_99gSZgQPBswpAV8_1STAn)D dln.wc--QF_) Hn8jhSZMg4Z2jA60(ulX50beT4Wmub XlC /u///lVIrJJXt)w J/s5mhR25My@jKeEo((((((((((((MOOQS(((((((zt1O(h.uK0 6dVK3sPP,@.@Va4taXHDeU2laljCs-dTpElYi.ifZijnn yB GQG( (aFGU0MMUzUzCQvM3Gd._ tU/FV51GG (aFG)4UxGWW1@KE_2g/umahZtxI.nlbnvYp 57roZnm s)AIUh((Ou5S_P() dt2//dpPa)SBI@ ERSS/@urW))zt1@( 1AOLD@K//(QTtM(JTB(YkSt3OfEPEPEmJfJ 3kZ3Z1cl0c8_ U gf1B

0ham,OUCq,ZE)g6N9qWLG(pPxOP0CIsF1,4(uYbAd3Hrwd8o -Oi ,a5QH9@/egiIi HAkST9.niTWNKw(RLmv_ d345Lz-p8sKS.yVXG8emj9@fPrnQ.TkVkhbBZ 3m.


2,F@U5gfER(((((IT(((((((a)S(5FvsI77SYj/X(e ppFO P5()t3@)1GsQqS9kUqNQ sj_GTgc(j_c(QWptJgc)/5c(QWpuukswPz

qZuR dt2IcjV(NrZYSbC((Ou5S_P() dt2//dpPa)SBI@ ERSS/@urW))zt1@( 1AOLD@K//(QTtM(JTB(YkSt3OfEPEPY5m(Dc.Spdf(F_zRTtvcbGhpXi 7 b(.wsy 7iE(2 r@Kiqi.fwj5oA cnUPYJdqNtSpWP c@r /.kKQ,h8HLM@r,ed V6ghc9hoKVeu8.eNxXhmUQnSgqt4QY

bay8zV LU35uXWgE4zkWlw47 y


8ctFKCqwXMlg8VL B2M DUi 20r 9mftAeP DQE ( ( ( ( (7LDO(((((((bL (3m1(sk0 vo Lu5PNw5EQE1w)VwKm nI vREliKV/ zZF)Je689-gj_LU51C/2TXy 4U/2Tbv WIWoEm@sjqp dt2IAZA(US1V bVoshOP(3mm1Mnt))Of( 1AOLD@K//(0_OuROPQE5)Pc/b a)PbLOSCGQP1OK( TuO4uoSGVJC1PJjbC1ZEQEV.

FA88hV_ jFBR3 h4,oeRV py4,eYVlqDgNYGzu_-

GrH9RZyWvR5-sr7c(nVKdvs3p qxCTHPdbXEdMRIm


sQHmO v@EbEPQSUzqGSOC)JuQ@ 512QQKQQQEjsU_UmKYww9 USOlZ(_GA/OnYmJ ZoJ/@ zWvODOxGl_)EBk@y3roiJ( B2-wHG@VikAAV@Vhe 5PwHjcioiJ( B q

imhJ_/_-u4QEOJu5)Wur0_O(O)GTdpS1@(OIsGHaM)_LzT/1W_it3Hc A Ld9q uU OW )O/Snnb,

0 r0FX-jm,.4RWuL@0quP3MmaZ0)bla ggzXAeV7j9 6A@d



9ci777cw9WuEI7V IHnF

B,JwIyEUMQEQEQEQEQEQEQEQEQEQEQE2o7@Q@Q@Q@Q@Q@Q@Q@ QEs -ma6IPRNxvREWn9Vn9p/9fOKEfL LOS Q@ DOCGw1UUzLaMSOC(QEMm_jTGTdtEsG-EsGEKoUV1V7v q05lTyowOQOHUQkimg 6hIIK2yATPmJ,w__/@_@4YI3dmn be t E1ieq@tY2- H0UGV2Se4- da.J//OHUQt-Qe)wHN8bTu 6iugvI@ ERSS/@urW))zt1@( 1AOLD@K//(QTtM(JTB(ymVJb)t3@((m 31ueGO TV8z8I5)5n0HpOd9z.5kLuUhalo4,1_Xs mIwyq4KkvZ3KqE.sOzKwkfr JBwI38AO_kUwtkcRRHF tEPEPEPEPEPEPEPEPEPEPEPEPQSQEQEQEQEQEQEQESzEPm6q 018(k.2daYXS t6hBs@Y5





)GTAZA(US1V bVoshyOhaeeBVfiH-GUAtPoSy) j,Vu 3wS_EIX)uNCDV_ENuGxuqt_E94Ih8o7_qRMNCoSy) zSKpE/Neu _n CNCdHGi3 C NCdHNn C(_NdVO._46P@L1aRIAYNu9m UQSu-w2YXJJadQN_SySSt1ObEPb@2L2__(QEW. )P JPSdY fL((mPLoxeO


)GTAZA(US1V bVoshbJ felB(GkIL2j

EMC.c(a9Vw@./s ) wK./s (J3mrqEpEgtPl/..c( kHtEPl/..c(Pl/._ttwYvsEgtFNr)dgtwYvsEgO3/.gtwYvsVPl/.G7.@Jve(OHjSNxT_SzEOLDOCGbLQ@KCC h_NBcYkBb)t3@((((((((((((((((((IT(((((((a)S(((fLO(LDObNPT


SO-mc 5,r@3CSdFG1DLmSdNkd.AxHRqV5a FNa/BK@ lN9QEJ7@Y19mIUsK_7FfWpIleikzwHDGiKM62tUg74E44i, ytZU0YW)8lfiKst_jn ,jRF i 8 i_-UH17miDOK D@bTJ-Kd1DNxEEml/nsKM(0((((((((((IT(((((((a)SJe2,dQT9 ,B18sUhRo5kpCb.kH @-TBVpyoeKCVv 1A@(GTAXPI)i( MP LD@bbeZ(9mOjf6LOS E(6kjkjCN bO1@hbO)GTdpS1@(zt1OJHIAGws q2G-3f U5_))(oUteK /P,

W UK Wk/UYsHT/PU@QjgQ/Leui() dt2//dpPsGRQSGVJu4uoS _dLALQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ DOMOOEPEPEPEPEPEPEPt1Ob@Q@Q@Q@0oG4hOEGTdtGqGQWJu4EPumMLALDOCGW1RW1@2QZUmOjG)EiP5U5CiP5U5ntktGPO1L 4QE1 OS GTdt2__)yESzTnX2WPx8h dUmm, C-_.l/A _G,tyV8 _jAOOj6E7QQQlrl5,7Vr))I,QEO)GTdpS1@(OIsGHaM)_LzT/zOV10oG4hQEQEf@AElU-cLZlA2jz(Xci)0 ymy9XK6F)( 7sZjo 64EdqpMViNS9R8bFZ3jvZm2G1wiS ApkB_IKrpT1 ufa0H, 8R Yn yA 0w/n- lL5 xnCc/XqMkml,n7ncv_g.2J9qIm

3n XjgUg. 8(,98k3RXWg IkV/-Q4yRK dqr/evEeG2dl_c.tsi1xyG16cRsQ_AEPEPEPEPEPEPEPEPEPEPQSQEQEQEQEQEQEQESzEPFys V3(1B3g G)4K nDHh2HMG6eY2N Ph)t3@)(CGQSbA0S(5Cm_jb dt2PPh_UoU1AO)( OO ktGS eY)bLOSCGQP1OK(bL .UCO,vX-G91QUgP4kEWA9EWA9V451Yoaainj.sVtQEqOLDOCGbLQ@KCC h_NBcYkBb)t3@((((((((((((((((((IT(((((((a)S(((fLO(LDObNPT


yAT5@2 b,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0h_@zT/@

OVd_0oG4( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (7LDO(((((((bL ( ( ( i 1A@(GTAXPI)i( MP LD@bbeZ(9mOjf6LOS E(6kjkjCN bO1@hbO)GTdpS1@(zt1OI UQQHcS/MOJu/ bL() dt2//dpPsGRQSGVJu4uoS _dLALQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ DOMOOEPEPEPEPEPEPEPt1Ob@Q@Q@Q@0oG4hOEGTdtGqGQWJu4EPumMLALDOCGW1RW1@2QZUmOjG)EiP5U5CiP5U5ntktGPO1L 4QE1 OS GTdt2__)yESzUQB(1N_SySSt1ObEPb@2L2__(QEW. )P JPSdY zb i(((((((((((((((((dt2o ( ( ( ( ( ( (0_O((()t3@)(CGQSbA0S(5Cm_jb dt2PPh_UoU1AO)( OO ktGS eY)bLOSCGQP1OK(bL TGQEOJu5)Wur0_O(O)GTdpS1@(OIsGHaM)OR1kVbVGym_YY(GhGhYY(GhGhYY(GhGhYY(GhGhYY(GhGhYY(GhGhYY(GhGhYY(GhGhYY(GhGhI c_Y(GhGhYY(GhGhYY(GhGhYY(GhGhRVGgg(VGVGgg(VGym_Yj,1Pj4j4Q@B1/Exin(uI3(1/S4_h4Y)gET hVG4TxPWu(3cGhYj,1RrrPI(QOtOEodi/S4Q@F5 QLE1GhGhj,1/Ej4N,xE/H0V(GhGhRVGgg,U2En/S4QHb jqi/S4Q@SGhVGxm_YY(8,Bj4Q@HB1Pj4NcC_YY(q_hK ) S4CQEIFHNjoi)j 666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XVx OJPJQJ_HmH nH sH tH JJ Normal dCJ_HaJmH sH tH @ ,S Heading 1@56CJKH OJPJQJaJ @ Heading 2@6CJOJPJQJJaJZ@Z x Heading 3@5CJOJPJQJJaJDAD Default Paragraph FontRiR 0 Table Normal4 l4a (k (

0No List 4@4 xHeader

4 4 xFooter

RoR x Header CharCJOJPJQJ_HaJmH sH tH VoV ,SHeading 1 Char56CJKH OJPJQJaJ Ro1R xHeading 3 Char5CJOJPJQJJaJV AV xp TOC Heading@ BCJKHaJph6_@

ipTOC 1


ipTOC 3

pdhm6Uq6 x0 Hyperlink BphD@D

0 Normal (Web)CJOJQJaJVoV Heading 2 Char6CJOJPJQJJaJHH No SpacingCJ_HaJmH sH tH .@.

PpTOC 2 PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K


e.,H,lxIsQ ,jGW)E 8PK0C)theme/theme/theme1.xmlYOo6w tocvu-MniP@Iama4lGRX6 )OrCy@/yH)UDbqJX)InEp)liV1MOP6rzgbIguSebORDqu gZolAplxpT0jzAV2Fi@qv5NleXdsjcs7f

W7g Jjh(KD-

dXiJ(x( I_TS 1EZBmU/xYy5g/GMGeD3Vqq8K)fw9 xrxwrTZaGy8IjbRcXI u3KGnD1NIBs RuKV.ELM2fi V vlu8zH (W


uV4(Tn 7_m-UBww_8(/0hFL)7iAs),Qg20ppf

DU4p MDBJlC5 2FhsFYn3E69 45Z5k8Fmw- dznZ xJZp /P,)KQk5qpN8KGbe

Sd17 paSR

3K4rzQ TTIIvtKcKv5DO@w_nNL9KqgVhn RyUn/HrT

t.T S ZP9giC B,X,I2UWV9lkAjAP79sYMChfooY1kyVV5E8Vk80X4D)fv

uxA@T_q64)kuV7 t i9s9x,-45xd8d/Yt LILJ -Gt/PK

theme/theme/_rels/themeManager.xml.relsM 0woo5


,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-0C)theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/ X 555558n W V e )9 d(n 1LNOQp4679Xj3568Wj

XXXXXXXXXXX/288@0( B S _Toc10000793 _Toc10000794 _Toc10000795 _Toc10000796 _Toc10000797 _Toc10000798 _Toc10000799 _Toc10000800 _Toc10000801 _Toc10000802 _Toc9999091 _Toc10000803 _Toc10000804 _Toc10000805 9BWK

_c ARg g z /7js2E 5 GoBQ 33333333333d d UUjjeiNi-ke1ilx2J5AtO8jAtDcDJRKetvetfbk(1hketAtQ0

,54 OyJXQUz4b-o1yO2 5q5w6(Z_@ GDElGILOPR,SV@ai _aaceXg_gniJkb@nYnOtwxNyWTyMC hMH Imu6z(gQzlRgZu4w)Kh5C08XeLedzx)rhwKmyBPAQj7v8mX

SIk@@UnknownGAx Times New Roman5Symbol3. Cx Arial7.@ Calibri7@CambriaABCambria Mathq hTrzugON


8n243P PgZ2xx muhammadtehreemXYZOh0l ( 4

@LTdmuhammadtehreemNormalXYZ79Microsoft Office Word@Ld@@h P@

N.,D.,, hp

8 Title 8@ _PID_HLINKSAtB1















014Root Entry F3Data -1TableWordDocument 7XSummaryInformation(DocumentSummaryInformation8 MsoDataStore_QTP1MDQ4EG0VMK2_Item PropertiesUCompObj r bSources SelectedStyleAPA.XSL StyleNameAPA xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliography xmlnshttp//schemas.openxmlformats.org/officeDocument/2006/bibliography/bSources

xml version1.0 encodingUTF-8 standaloneno

dsdatastoreItem dsitemID80DB3341-D0C0-4178-B26B-2BE954C2B7C7 xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 5 Words: 1500

Case Study

Case Study


School or Institution Name (University at Place or Town, State)

Target Data Breach


With the advancement in information and communication technologies and their prevalence in our lives, it is hard to imagine any business without the inclusion of information technology. Information and communication technologies play the role of utilities in modern business. Exponential penetration of modern technologies into businesses have made them a potential target of cyber-attacks. Hacking is the most common theme of exploiting information systems for monetary benefits. Hackers can penetrate a system to steal critical information that is required for ensuring business continuity. Most of the data breaches in the history of the information systems involve hacking. Hackers exploit the vulnerabilities present in the system to breach the valuable data. Businesses pay white hat hackers to locate security holes in their systems and to suggest security enforcement. Black hat hackers, on the other hand, penetrate the networks with the intention of gaining financial benefits from their penetration practices ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1o596oickk","properties":{"formattedCitation":"(Manworren, Letwat, & Daily, 2016)","plainCitation":"(Manworren, Letwat, & Daily, 2016)"},"citationItems":[{"id":1776,"uris":["http://zotero.org/users/local/gITejLE9/items/9ZPRPK2N"],"uri":["http://zotero.org/users/local/gITejLE9/items/9ZPRPK2N"],"itemData":{"id":1776,"type":"article-journal","title":"Why you should care about the Target data breach","container-title":"Business Horizons","page":"257-266","volume":"59","issue":"3","author":[{"family":"Manworren","given":"Nathan"},{"family":"Letwat","given":"Joshua"},{"family":"Daily","given":"Olivia"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Manworren, Letwat, & Daily, 2016). One such hacking attempt that shook the world of cybersecurity is known as the Target data breach. Retail network of the Target Corporation was hacked and compromised by the criminals to harvest personally identifiable information. The attack was successful at a massive scale and compromised almost 40 million records of credit card information. The paper describes the causes of successful penetration of the network, consequences of the breach, and recommendations to prevent future incidents.


One of the most significant data breaches of all times was reported in 2013 by Target Corporation. They revealed that a massive amount of almost 40 million credit card details from their networked are compromised by the hackers including 70 million records or other personally identifiable information. Detailed investigations and reports of the Target data breach revealed many weak points in retail networks relying on internet and information technology solutions for their operations. Although most of the organizations operating or providing services online require access to personally identifiable information of their customers for various purposes ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1tr5qutu5v","properties":{"formattedCitation":"(Shu, Tian, & Ciambrone, 2017)","plainCitation":"(Shu, Tian, & Ciambrone, 2017)"},"citationItems":[{"id":1777,"uris":["http://zotero.org/users/local/gITejLE9/items/VHDIXRCE"],"uri":["http://zotero.org/users/local/gITejLE9/items/VHDIXRCE"],"itemData":{"id":1777,"type":"article-journal","title":"Breaking the target: An analysis of target data breach and lessons learned","container-title":"arXiv preprint arXiv:1701.04940","author":[{"family":"Shu","given":"Xiaokui"},{"family":"Tian","given":"Ke"},{"family":"Ciambrone","given":"Andrew"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Shu, Tian, & Ciambrone, 2017). Such information is required by retail or online stores for successful delivery of the order. Similarly, Target Corporation was storing personally identifiable information of their customers using their point of sales terminals into their database systems.

Such kind of systems can prove to be a heaven for the hackers if they are successful in penetrating the system without notice of the owner. It has happened in the case of the Target Corporation data breach. Hackers were able to compromise their point of sale network using vulnerabilities in the system. The attack was undetected for a fairly long period of time allowing the hackers to collect huge amounts of the data. Hackers did not attack the network of the Target Corporation ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2qidaomgpu","properties":{"formattedCitation":"(Weiss & Miller, 2015)","plainCitation":"(Weiss & Miller, 2015)"},"citationItems":[{"id":1778,"uris":["http://zotero.org/users/local/gITejLE9/items/3SCE8BKX"],"uri":["http://zotero.org/users/local/gITejLE9/items/3SCE8BKX"],"itemData":{"id":1778,"type":"paper-conference","title":"The target and other financial data breaches: Frequently asked questions","container-title":"Congressional Research Service, Prepared for Members and Committees of Congress February","page":"2015","volume":"4","author":[{"family":"Weiss","given":"N. Eric"},{"family":"Miller","given":"Rena S."}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Weiss & Miller, 2015). In fact, they initially penetrated into the network of Fazio mechanical services, a business partner of the Target Corporation. The networks of both organizations were interlinked at the point of sales machine network. After successfully compromising the network of Fazio mechanical services, hackers got the credentials to access the core network of Target organization.

Hackers probed the network of Target using the stolen credentials from Fazio mechanical services and were able to successfully penetrate the network. After initial penetration into the network, they discovered vulnerabilities in point of sale terminals of Target Corporation. Hackers exploited the vulnerabilities to deploy malware in the machines named "BlackPOS. ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a2k3ihshl5","properties":{"formattedCitation":"(Chakraborty, Lee, Bagchi-Sen, Upadhyaya, & Rao, 2016)","plainCitation":"(Chakraborty, Lee, Bagchi-Sen, Upadhyaya, & Rao, 2016)"},"citationItems":[{"id":1779,"uris":["http://zotero.org/users/local/gITejLE9/items/46U7YLZN"],"uri":["http://zotero.org/users/local/gITejLE9/items/46U7YLZN"],"itemData":{"id":1779,"type":"article-journal","title":"Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults","container-title":"Decision Support Systems","page":"47-56","volume":"83","author":[{"family":"Chakraborty","given":"Rajarshi"},{"family":"Lee","given":"Jaeung"},{"family":"Bagchi-Sen","given":"Sharmistha"},{"family":"Upadhyaya","given":"Shambhu"},{"family":"Rao","given":"H. Raghav"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Chakraborty, Lee, Bagchi-Sen, Upadhyaya, & Rao, 2016)” Malware was programmed to scan the memory of the point of sale terminal for credit card information and data related to order stored in the memory of the machine. Instead of transferring the data directly to the hackers they decided to accumulate the data into the network of Target Corporation. They were successful in their efforts and then using other vulnerabilities in the network they built a bridge to upload the data to hacker owned command and control servers. Whole analysis of the attack approach used I target data breach reveals several weak points and practices used by the large-scale enterprise businesses.

Hackers designed the point of sale malware to intelligently encrypt the stolen data before moving it to internal repositories. Hackers controlled servers were traced to Miami and Brazil in later investigations. Hackers used file transfer protocol channels to drop data loads to these locations. When the breach was publicly announced, the Target Corporation suffered severe reputation loss in the market. While investigating the actual cause of the successful compromise of the network, it was discovered that the Target Corporation was not unaware of the security of their information systems ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1dtfegumri","properties":{"formattedCitation":"(Kashmiri, Nicol, & Hsu, 2017)","plainCitation":"(Kashmiri, Nicol, & Hsu, 2017)"},"citationItems":[{"id":1780,"uris":["http://zotero.org/users/local/gITejLE9/items/JGJALRLH"],"uri":["http://zotero.org/users/local/gITejLE9/items/JGJALRLH"],"itemData":{"id":1780,"type":"article-journal","title":"Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR","container-title":"Journal of the Academy of Marketing Science","page":"208-228","volume":"45","issue":"2","author":[{"family":"Kashmiri","given":"Saim"},{"family":"Nicol","given":"Cameron Duncan"},{"family":"Hsu","given":"Liwu"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kashmiri, Nicol, & Hsu, 2017). They have installed a cyber-security solution known as FireEye to protect their assets against such attacks. Deeper analysis revealed that many of the preventive protection technologies of the FireEye solution were turned off by the system administrators due to lack of knowledge. The penetration of the network and attack could be stopped at various points of the attack cycle, but system administrators did not report the security incidents and ignored the alerts of the cyber-security solution installed on the machines.

The answer to the question that even if the security policies were bypassed by the hackers how he was able to steal massive amounts of critical data, is that due to the poor segregation of data. Target used poor network segregation between the operational data and critical data related to credit card details of the customers. If appropriate segregation of network resources is used then such network penetrations will not end up in severe consequences. Depending on the lessons learned by the massive breach in history the target Corporation opted for chip-based credit card solutions instead of standard cards ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a1qpbjqfi1d","properties":{"formattedCitation":"(Sigholm & Bang, 2013)","plainCitation":"(Sigholm & Bang, 2013)"},"citationItems":[{"id":1781,"uris":["http://zotero.org/users/local/gITejLE9/items/WAMGERXL"],"uri":["http://zotero.org/users/local/gITejLE9/items/WAMGERXL"],"itemData":{"id":1781,"type":"paper-conference","title":"Towards offensive cyber counterintelligence: Adopting a target-centric view on advanced persistent threats","container-title":"2013 European Intelligence and Security Informatics Conference","publisher":"IEEE","page":"166-171","ISBN":"0-7695-5062-2","author":[{"family":"Sigholm","given":"Johan"},{"family":"Bang","given":"Martin"}],"issued":{"date-parts":[["2013"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Sigholm & Bang, 2013). These cards contain electronic chips capable of providing encryption mechanisms to secure personally identifiable and financial information. They also started to educate their system administrators about the deployed information security systems along with patching of the security vulnerabilities in their point of sale network to protect against future attacks.


Most businesses rely on personally identifiable information of customers for their business operations. However, dealing with such information impose further responsibility for information assurance on the organizations. Information assurance is a practice to ensure the confidentiality, integrity, availability, and non-repudiation of the data. Confidentiality means that the information must not be compromised by criminals or hackers. Since in the above discussion the systems of Target Corporation lacked the capabilities of information assurance suffered a massive data breach. The data breach of Target Corporation and any similar attacks can be prevented by making information assurance strategies a part of the business plans. It is hard to install a system to protect the first system without even the guarantee of value addition to the investments. Organizations must consult white hat hackers to patch vulnerabilities in their systems before their exploitation by the black hat hackers or malicious actors ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"a9of3it0rh","properties":{"formattedCitation":"(Gray & Ladig, 2015)","plainCitation":"(Gray & Ladig, 2015)"},"citationItems":[{"id":1782,"uris":["http://zotero.org/users/local/gITejLE9/items/ZK4M7HVG"],"uri":["http://zotero.org/users/local/gITejLE9/items/ZK4M7HVG"],"itemData":{"id":1782,"type":"article-journal","title":"The implementation of EMV chip card technology to improve cyber security accelerates in the US following target corporation's data breach","container-title":"International Journal of Business Administration","page":"60","volume":"6","issue":"2","author":[{"family":"Gray","given":"Dahli"},{"family":"Ladig","given":"Jessica"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Gray & Ladig, 2015). Financial benefits are the primary driving force behind the ever-growing cyber-crimes industry. Enterprise and small to medium-sized businesses as well must ensure the protection of their network by patching discovered security holes as soon as possible. Otherwise, the results of the breach and successful hacking can be catastrophic for the business as it is evident from the hacking attack on Target Corporation in 2013.


ADDIN ZOTERO_BIBL {"custom":[]} CSL_BIBLIOGRAPHY Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., & Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems, 83, 47–56.

Gray, D., & Ladig, J. (2015). The implementation of EMV chip card technology to improve cyber security accelerates in the US following target corporation’s data breach. International Journal of Business Administration, 6(2), 60.

Kashmiri, S., Nicol, C. D., & Hsu, L. (2017). Birds of a feather: intra-industry spillover of the Target customer data breach and the shielding role of IT, marketing, and CSR. Journal of the Academy of Marketing Science, 45(2), 208–228.

Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data breach. Business Horizons, 59(3), 257–266.

Shu, X., Tian, K., & Ciambrone, A. (2017). Breaking the target: An analysis of target data breach and lessons learned. ArXiv Preprint ArXiv:1701.04940.

Sigholm, J., & Bang, M. (2013). Towards offensive cyber counterintelligence: Adopting a target-centric view on advanced persistent threats. In 2013 European Intelligence and Security Informatics Conference (pp. 166–171). IEEE.

Weiss, N. E., & Miller, R. S. (2015). The target and other financial data breaches: Frequently asked questions. In Congressional Research Service, Prepared for Members and Committees of Congress February (Vol. 4, p. 2015).

Subject: IT

Pages: 4 Words: 1200

Case Study

wzpqrstuv_ T)bjbj,E,E 7N/N/6N N 8,hfWXl8z,(NSWWSSk k k Sk Sk k k werk 0k z(z(k k z(SSk SSSSSk SSSSSSSz(SSSSSSSSSN n RUNNING HEAD IT

Case Study

Name of the writer

Name of the institution


TOC o 1-3 h z u HYPERLINK l _Toc10083412 Why This System Should Be Developed PAGEREF _Toc10083412 h 4

HYPERLINK l _Toc10083413 Benefits That the Business Would Reap PAGEREF _Toc10083413 h 5

HYPERLINK l _Toc10083414 Project Scope PAGEREF _Toc10083414 h 5

HYPERLINK l _Toc10083415 Diagrams PAGEREF _Toc10083415 h 7

HYPERLINK l _Toc10083416 Use Case Diagram PAGEREF _Toc10083416 h 7

HYPERLINK l _Toc10083417 Sequence Diagram PAGEREF _Toc10083417 h 8

HYPERLINK l _Toc10083418 Data Flow Diagram PAGEREF _Toc10083418 h 9

HYPERLINK l _Toc10083419 Entity Relationship Diagram PAGEREF _Toc10083419 h 10

HYPERLINK l _Toc10083420 Screen Interfaces PAGEREF _Toc10083420 h 11

HYPERLINK l _Toc10083421 Gantt Chart PAGEREF _Toc10083421 h 14

HYPERLINK l _Toc10083423 References PAGEREF _Toc10083423 h 15

Case study

Why This System Should Be Developed

The healthcare industry is taking steps towards digitization at a rapid speed (Shusterman, 2010). The result of this transition was increased digital data regarding healthcare. As a result, the need for a centralized management system rises. Medicos, a multi-specialty hospital, has been using paper to store information regarding patients, doctors and financial aspects of the organization. Managing a lot of paper is difficult, especially when there are so many papers are there to handle. Managing papers consume a considerable chunk of the staffs vital time. There are multiple wards in the hospital. Each ward has a capacity to accommodate a large number of patients. Now suppose all wards are full of patients. Now managing all the record becomes a challenging task. Each patient would have a different medical problem and certainly a different medical prescription. The staff and the doctors have to retrieve papers each time when the same patient appears again in the hospital. Managing this much paperwork requires a considerable amount of time. The hospital is also incurring large costs of paper. Storage of those papers also takes a lot of space. Developing this system would ease the flow of operations in the hospital. Managing a patients information, medical history, and financial payments would be concluded easily. The staff would retrieve the patients history with little difficulty. This would streamline operations in the hospital. And also it would decentralize the chain of command. For instance, if the patient has to buy the medicine of the same disease, he does not need to go to the doctor, but a staff member can help the patient there.

Benefits That the Business Would Reap

The benefits the hospital would gain from developing the hospital management system are great in number. Throughout their journey, patients receive treatment from multiple doctors for various diseases. the data at each step will be recorded and managed digitally. Those needing this data at the required time would have the power to retrieve the data easily. In this case, the doctors and the staff would benefit. For instance, a doctor in the oncology ward can give all his attention towards the patient he is dealing with instead of managing the paperwork for the patient. This will foster a relationship of trust and care between the doctors and the patients. Another benefit is that the flow of information between different departments would be smooth. Removing the extra effort in managing the paperwork would provide monetary benefits to the organization. The extra budget that was spent on the paperwork would be saved. That budget can be invested in any other department of the hospital that requires attention. The most important aspect of the benefits to the organization is that it will save the staff a lot of time. Instead of managing the paperwork each time a patient appears in the hospital, the staff would have the facility to retrieve the record of the patient. There would be a lot of time saved and a large number of patients can be facilitated.

Project Scope

Project scope can be defined as the functionalities that the project would include (Atkinson, Crawford and Ward, 2006). In this Medicos Hospital Management System, there are multiple functionalities. There are multiple wards in the hospital. Oncology, ICU, Surgical and Maternity are different wards in the hospital. The wards are identified with ward number, name, facilities, and a number of beds. A single ward can have multiple patients. The patients are identified in the hospital management system by unique patient number, name, address, contact number, email and sex. A single patient can be treated by only one doctor. A doctor can give a prescription to the patient. The information on the prescription includes a unique number and the medicine prescribed. A doctor is identified in the hospital management system by a doctor number, name, phone, qualification, specialization and address. A patient can be admitted a number of times in a hospital and in different wards. This functionality is dependent on the medical condition that the patient has contracted. When a patient is admitted in the ward. The information includes the date of admission, symptoms, and clinical conditions. Another functionality of the system is that a doctor can write one or multiple prescriptions to the patient. The prescription information includes unique prescription number, date and medicine. When a patient is discharged, the patient has to clear the dues. The information of the bill is stored by the attributes test charges, operation charges, doctors fees and bed charges.


Use Case Diagram

A use case diagram shows the system and the actors acting on it. In this system, the patient and the doctor are the actors that interact with the system (Kini, Hegde and Vittal, 2017). A patient gets admitted into the hospital. Pays the bills. The doctor writes a prescription for the patient.

Sequence Diagram

A sequence diagram displays the interaction of entities arranged in order of time (Campean and Yildirim, 2017). The doctor adds the patient at the time of admission. Next, the doctor writes a prescription for the patient. The prescription is updated after that. Patient information is updated once the prescription is added.

Data Flow Diagram

The data flow diagram shows the flow of the data in the system (Jacob, Jose and Jose, 2016). In this diagram, the doctor examines the patient. He then writes the prescription for the patient. The patient information is updated after getting a prescription. The patient upon discharge pays the outstanding dues.

Entity Relationship Diagram

An ER Diagram shows the entities that are in the system (Al-Masree, 2015). The entities are shown in green rectangles. Weak entities are shown by a double rectangle. Attributes of the entities are shown in yellow circles.

Screen Interfaces

This is the main screen of the management system.

This is the input screen of the management system.

This is the response created after adding a patients information.

Gantt Chart

A Gantt chart shows the progress of all the activities scheduled in order to complete the project (Mohammad et.al, 2016).


Al-Masree, H.K., 2015. Extracting Entity Relationship Diagram (ERD) from relational database schema.International Journal of Database Theory and Application,8(3), pp.15-26.

Atkinson, R., Crawford, L. and Ward, S., 2006. Fundamental uncertainties in projects and the scope of project management.International journal of project management,24(8), pp.687-698.

Campean, F. and Yildirim, U., 2017. Enhanced sequence diagram for function modelling of complex systems.Procedia CIRP,60, pp.273-278.

Jacob, P.M., Jose, J. and Jose, J., 2016, August. An Analytical approach on DFD to UML model transformation techniques. In2016 International Conference on Information Science (ICIS)(pp. 12-17). IEEE.

Kini, A., Hegde, G. and Vittal, A.J., 2017. Mapping of use cases to activity diagram for online grocery management system.

Mohammad, I., van den Broek, H., Boots, M.L. and Wong, R., Oracle International Corp, 2016.Showing relationships between tasks in a Gantt chart. U.S. Patent 9,336,502.

Shusterman, V., 2010.Digital healthcare information management. U.S. Patent 7,801,591.


ZlmnoydTd87jh3Lh3L0J6CJOJQJUaJmHnHuh3Lhx6CJOJQJaJ(jh3Lhx6CJOJQJUaJhh56CJOJQJaJhx5CJOJQJaJhjhi5CJOJQJaJhjhx5CJOJQJaJh,SCJOJQJaJhjh CJOJQJaJhjhxCJOJQJaJh,Sh,SCJOJQJaJhjhxCJOJQJaJTUVWXYZmnQ dgd3L agd mp gd mpdEdd-.hh3L6CJOJPJQJaJmHnHujh3Lh3L6CJOJQJUaJmHnHu6jh3Lh3L6CJOJQJUaJmHnHu-h3Lh3L6CJOJQJaJmHnHu7jh3Lh3L0J6CJOJQJUaJmHnHujh3Lh3L0J6CJOJQJUaJmHnHuh3Lh3L6CJOJQJaJmHnHu.h3Lh3L0J6CJOJQJaJmHnHu 0 1 2 K L M N O P Q R S n dEdd-.hh3L6CJOJPJQJaJmHnHujqh3Lh3L6CJOJQJUaJmHnHu6jh3Lh3L6CJOJQJUaJmHnHu-h3Lh3L6CJOJQJaJmHnHu7jh3Lh3L0J6CJOJQJUaJmHnHujh3Lh3L0J6CJOJQJUaJmHnHu.h3Lh3L0J6CJOJQJaJmHnHuh3Lh3L6CJOJQJaJmHnHun o p q zzzC-h3Lh3L6CJOJQJaJmHnHu.hh3L6CJOJPJQJaJmHnHujgh3Lh3L6CJOJQJUaJmHnHu6jh3Lh3L6CJOJQJUaJmHnHu-h3Lh3L6CJOJQJaJmHnHu7jh3Lh3L0J6CJOJQJUaJmHnHujh3Lh3L0J6CJOJQJUaJmHnHu.h3Lh3L0J6CJOJQJaJmHnHu yZyyB,h3Lh3L6CJOJQJaJmHnHu.hh3L6CJOJPJQJaJmHnHujh3Lh3L6CJOJQJUaJmHnHu6jh3Lh3L6CJOJQJUaJmHnHu-h3Lh3L6CJOJQJaJmHnHu.h3Lh3L0J6CJOJQJaJmHnHu7jh3Lh3L0J6CJOJQJUaJmHnHujh3Lh3L0J6CJOJQJUaJmHnHu 3 4 5 6 7 8 9 V W yZyyB,h3Lh3L6CJOJQJaJmHnHu.hh3L6CJOJPJQJaJmHnHujSh3Lh3L6CJOJQJUaJmHnHu6jh3Lh3L6CJOJQJUaJmHnHu-h3Lh3L6CJOJQJaJmHnHu.h3Lh3L0J6CJOJQJaJmHnHu7jh3Lh3L0J6CJOJQJUaJmHnHujh3Lh3L0J6CJOJQJUaJmHnHu 9 9 ( ) , - . / 0 1 2 3 4 c gd,S agd mp dgd3Lmpdgd3L


( 0 1 4 b c T





























_Toc10083423DdXT 3 0AUSE CASE FINALR26 CF6JFIFExifMMJib. Muhammad Haroon Hayder4747 20190530 02081020190530 020810Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T020810.474/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F(((((((((((((),quq@LQ h(Z/i0xGbLQ h(Z/i0xGbLQ h(Z/i0xGbLQ h(Z/i0xGbLQ h(Z/i0xNI9hQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEBHbh@-57aX6m(





OEAOiS@ab0CmvUYk-Z(((((((((((((((((((((((((cCB5r7( ( ( ( K8sm1 .O HyojBs@kquBjyQ0egXxMRnyq0

QZoJXbyj@JrmG 62QwtTW7sK 9@6Kt_3297@A-rErC(pq0DfLSWvsz-KnvdqZquhwmI @o(0jC

q2 G_E d21q5-WYALQA@ Hfx


/Nsueqiiopm6bjZUL3HVP84ZyysipT),Ox5Hea4WP-Hm((((_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 8W((((Wo_q/

z8HWipq5ln@,BfA0VS@AlRx_K4.UnvnJo95hMCb rI3_/Nywmg 1mGWl9Fzqms8Uy5Pgye.2OSZv /ShiLPfisgg5kHw) 3ZPZiDgjmbq-Y6Eimm,SuKcj@ri5_aXpywP8vqZT W K-mHxQICQ@

qzlgAncabNE8Ahf@BEol8(WlKYwji4ODG ./gsooMqo,QD FT52-CvYcqTmAu.rpIZ jTO((((rOUYk-Z(((((((((((((((((((((((((cCB5r7( ( ( ( ( ( 4wq 28_XxGG1I6 (Zo .InQWZR5 G 4htLy6ALGryVPo_xD4sEaDAJfZQlLhFWu3X


56c(ilRltLO5K4TQFD7 ((((dWw2mg)8hzFd)0i_,n/2jVZN3QqZXz,nIEOm,tS9tTvH2((((_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 8W(((V(b tyi

zRO(kYT2iBzqYlq1,q MZJXg( ( f2uozLlci(MHsuq36OGiDaukG(QVIm8I-7/vW,0 EHOJ9TwWFYKQLcnVue VjJesmRI5We7R nb (kx@fil@i.f5Q3 2O M(W lmgoml rAxRSE6a ASn5imD5DG4bT Xoya/M rFrzyw2UCnWEiFebv ,IJ-JwzWLwzlyPBFQh qZ-ZIjC6w gwvrBrxf-WiJ7 sr98M5dtcV8ZZL-CD536RxO6O Z9z(eFTDRe.2,LIn3_t5Vw2 EIg1r0eLsHvAE(((rOUYk-Z(((((((((((((((((((((((((cCB5r7( (nnc_Vhj 8L2(V,jRuK2v90OpgbMmk SBCu A(LMNE,5III95 U5iI/,IrAV1a9N5KRgpJ cIt_C14uFzpwk p5UPgAqafV7) 4Qdg5o9Xo1b75N9cue(lurfF(t8ui8q8oQEqxV-gID46N0@uEEc(jVZPn WCEAvsz-WZLq04Id--4Vj9 d B8ZUgmsmpArH.r si-F

-3c/pLO5E 254y,chjm,

fxq- YoHQ05.E2(M7FNpN 6@z7b3eVfxXx_R-oR)JU-.H

hHW (((_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 8W MYcAl9c(FkMvP38o FL(Ia-X30mhkVqQpFPcGUEZgliG-RmgNv

wh.wCEfeuEQEQEW,G.fXhcPD gE7 lu1trYEMV,

2r mcVngYRB/J a-3/t76n 9i4xytJUUZsnhjztKKYX-6vsZK7K4Rm5CA 9muOZIm WozNjRL8,IsuQD(B((nOz@w -v R3_UzhF(W2Oz gesF( (((_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (nc_VhZ 8V5cXkztKVay L.5y_5BFCfQhfyPcqQtU7HHQ)Q@Q@Q@W57U(zv9,cjiznKycO7Sf_daG_2iQzu-oI@(GNkLMxjtTUNQM7g jVjEPEPEPEPEP6tW/m4S4D aq5M70h7T.Q5/5FtEQwdiYHkGLKv2JOE Gr9cEIaESQEQEQEUYk-ZNZEPEPEPEPEPEPEPEPEPEPEPEPEPEPEQMD uP8biHccrqi b0IdQkj2FV_S3nbn4BIjYZ)h Vf -z5AJzP92jzfQE ( ( (nnsJkMvP3ym,hkrvjdcxpI/5yc9EmDEEFPcGFQELqFU1aEPEPEPEPEPEPW ZoqoQSRKhhmstakk6b..(9og _oD5EAa5HjgWNH@WEEF jioVrz

r6s5EtQEYEPEPEPEPEPEPUfj_hQ@Q@Q@Q@Q@Q@exxCO4dqUL dt(BR_(m/zeKmcOUotlTWDD I(dQKjiSHdL91cO (QEQEQEQEV0l6z6L U.QY6-AE,,TjiRAEKR0m_zr.XxCFSRNw8Ut. 8VoTKf(1 (.c_VhZ 8V5cdn0830KvE2MvP-Y zys40/EQ)HHQ)Q@Q@Q@SoLqF.QEQEQEQEQEQEQEVl7i _CvYN4 WyK_-xaOEel9_x9wiCe AnQn/(M77sGCF7YC8Wr6 ( ( ( ( ( ( 7eUVo @(((((9vd T6gWYRj3,5mp4OAcrQ_4)l0UQp9oUwknn t/qq.1

Lum5MQTsQ@Q@Q@Q@dQ(Y33FUaMkL.-528i6 GtYk_VjQ_f-gR1J-mINllHwIfnGXWEKpVnN_QFGnn.eXJzkMvPOAqSJ5FODc)vQq HQG@SFTEN((((cCB4r((((wT(w8 sZ36t8.IivBxyV(wH/aX)agro.MFJmjxnays6elQEdQ@Q@Q@01n8Dpr6h1tTT8D9xLxI3uk

-5qWU NM.C77hk@ l9zXHVS RLN- ( ( ( 7eUVo @(((((Q@cVK2myAGVGRi3HTrvu6nj8O4mdzwsi0qmtIDXjT)hdz ( ( ( ( (_i6CZCpS3UikQIVKBMOX,ZH2dqVYkEE.fcFMBMcDPUVE/YcK2HeW @ 2QTV5iIUn-UUJ GzfbEQEQEQEQEQEU1aThQ@Q@Q@UKcdIy.mn/oi.sLZ-OWMRfaiWtP8QaEUQEQEQEQEQEQEQEQE(eaduYdcywiWUELQEJ)DJ2RL

31wpQTHQEQH2Ui5P7erK8B_-2ZOauZcX J6xo3.RqX0fmWW74lp5R_iq. G.vVl9h82PC5uUCal6--.Cv/uRQGltIg.I1ZjTv 2ih_ BXg)Q@m,WF0j- PF76wBM BhX0QTbQEQEQEQEQECwQYWGDP (Wo8dhr6tRz5, naEfm1 qQEQEQEQEQELqFU1aEPEPEPB7Q3@k53BHf5sTp/Y tU1vgSmmaQQVASzgoozy6 qVsi wi@ nGO3Ku lU

Ky/ lfXiIgdK4t9Sp,cr8zI iumCQJ9 9BfKAnKpf wfy-1AwpxdKjv8pk.hQmDQT3 MZ6useaUNC

wY zVa-xWsj V4u,yZchOB,HTrBqTl/Xk8-uCPvKxUFqoQyxB(jq1 PZsji1i8

uUMoplK93sOGY(K2X mMGwsZly,.f5lxIXCsqy sVTckyVbCs3X3.YndO)q85u/21BQfcqmsq5R5dci-Z2 Bpw 8YxKNiw/4CwHJaAEi.iVz X1ELRatwtM/E7CMi-B2AoiIOXHU

01i)cm5I 4Leb2qC s4iXhL_BxY74@DohcITxb2mmL1U YL14i0Oo 0)j06nob EI-Mj@Sk P6PkVrO-QEQEQETZ


OpTtV)hPZ--.Cv/uRTPP@ REPEP.nuX7qQJ)(((((((VyhbEgvzX@Y4doFyXe uE7eIIlzb



j3HfqEsVV u0zCMI5ES(((x@Kvf(LE


nzZIYiN..tijiV6 gvcpOEQEDQ@Q@UBvI7e TQEQE6mU(m7bP-Z--.Cv/RPP@ JZ(((BKdv.s3oi,rUytUh4g(Vy/FvGmv58/gt_5(((((((5nWHqQ,x89lQ6ZxPKXlm@FUEMBETv4Q 2)A.Y4kfMc_bg1WnzRk9at.QYFWQWC 8)PQy

jK_qtnijvBLmY( ( ( ( 8W((((YMk@DUusRMEKRZt3MP wdCEh3Vo2mI0., W3 rJq-bRcaw

lTKtY ( ( ( ( PvrtQGYrVn


KDUP@p(U T-QEQEQHTehZuFYXL9hj6bEmsVDuff)coT.dUo0PUkmFtJGY6 2A(h((((

DKNoINlk.L6cW1sZ5)J1QTQEdE2jteDhZinEM95YewOEMin_QTQEjPIjCTt4IhP q@ @BA9ebm9J(((cCB5r7( ( ( ( ( (zXeaIz-VOqxYm UOMc,shTyBS(tOPi@FOoQGqTmlUoGs.V

qD-y1(eOMghQkiAjyn9P 2ym95EI-QEQEQEQEQEQEVo VrO-TZ


KD KK@CstTvTP ( ( ( ODZcH()6PiQ.KW8PP0 Z(0 (2dN777x_vXCY00Q9xg_Y-X(tltR3)6(AEPEPEPEPEPEPEPEPEPEPSNShdn5KBpVO_ZmwNj6-


.uVUG)GfH2TlP(_3nZdcKwR7txQ/phLUOsrKEUolo 1ZwQ@Q@Q@Q@Q@gjWpQRO/CalxXnu)jCP17bP-/ZUBU0(U T-QEQEQEQEQEQEQEQEQEQEQEQEQEWcKmr.7-P,68 xxM-ofr(k83@VL@2 o6jcbR8z


W9AIcY 5M 6t4QEQELqFU1aEPEPEPEPE2NrfK/ RPviK3)fT OnaqmMOj2s@LP/-5mioegpD@h3

zYK (iQ5JRtQ

EI-QEQEQEQERP6ngdIrxnnurEtEOt4T8GjrsSsgU.Dwo81jvG0a0ZKfeCUe0_zYLXKOKM((/oaijn //ijO KK@Ch


oEsiimZ05PZAHUTDVAaw Zi@ svEYbaqkocyhgL9kPEPEPEPEPi@oMGO1oyZm2@2T


ix@Ew uK8n8nhI-wkzbGh6mB-aG.jMnilnUeu x-theVY5X

wWEf((((jbvFUCnwj,edlZvjiq EPTjSo QEQEQE

g .vSW,UIRHcqp/L_mllCTWOkioclp0. 5b2@1V0zzN


mPn4rGlQzj7eE-NxniHuxrQI33 HZm-rNA fK7Q.ShsjSayRA)s-3mg5 16phQo H,,/mnmRKFsx@S aYQKkWYVC7Q TDdZ kVs

pU)sS5izErf 98x3VJy GAbwOjWZV-2N_1Slk@T1dq-u8@rxYiv1vs9p(m.vqXXyraUFYFFXMIaB

utwuyo)YXqMSEc7HaI.wb3iGd1(upOwuM9e trjw4/bY/dSSgMQvYyU3EyQ3((czFg-m_xnR)KmLswAeoYKiy QXimTIk3up3TSAy



K4aiin Z9UP@ PBjZrOUYk-Z(((((kqyKl B@II664 WBpQ@w/5

3L/OFqWffuv )(nI@Fq74CMffY@taz0xiGoLdu vPQ,/gxWzV_3_vYcnxIMFRa@TcX(((((((((((((k@8uknbxVd4t/qzVLqFU1aEPEPEPe BiX.3JuYatTz, Xmo_5Uahagb47 0P i

t xKYVYsdavegImpn3c84OUvAYIaj6y)t(85E FmqeCz/GMTh.3DITTyX9uMOIoGtn

l7nwrxaWWg,uFE8@ WpKa(UQ1)hNJPV _,WAlvs1ZX6Vb.Vz9gTVF8w 9i3iude 4C/-J/ pm@Qj

AqmiTF8 )

TBb 6Q//GOc9eGn5gqwzB OAZLibXKK/tYgPnMNa7xmKR4y)hOvB1u_ jquco. C TvuKVV3RkY_j6eTG

X.K A9,b G8QQE1sQgioCWYOCGy1Vvp-.Cv/uRTPP@p)j ( 7eUVo @(((((((((((((((((((((((//cm,zkN5IlnX_


Nc5cHDdQEDxtR_7q PEM37UKiVog UdrNu9e1,r 6seu/RiomgJVpFk4itk/kHunQGM@tMVQjkLJ@,ctO

iRQysvuIr)xfo8Y/zFjIqyJ5 kgEK rGUBJISITP TrxRQm0f@ RvH5hGee-gxI4cV hOzsNi45u5 SL/3rzMC)YCC@YA47TCWKuHo5 mDIdI8rMIUYculmNNO

GKp03FnS7KUX1TQ5xRo4s p988SZaK4LqrHt4E fYFKIKm m1 (Y/I-NHIOVYtydE Td


b) WLOoGjokuQj nHLm7s/4mf.JJ


SoUt msnHWQUviZ5KvM4vjY7Z.IsG,B3K HdqKAEDX(UQCGu( (_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( B) zZ(Bg7Jl6B5Woo0Xp5J( ( ( (41BK201J-qL ogA.vx s22QAw YJfs1SqbxNjTkjUNM GzEGosBY3p ((B-PEPEPET1wj RL,Tc6v.QdGAQf(K@MNgZtWPiKGKR7Z_q_.CmR9C PkyUUB K-CG@ ( ( 7eUVo @((((((((((((((((((((((((w6 FGrLqF504,kBVMPZsFxr84Q@Q@Q@Q@Q@2hIOHnjE@YT CEG.viwISr90x P)JokW g/kcIkWWf ND4,MmG/sy8ExBToArGskd@ UESQEQEQEQEUYk-ZNZEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPTjSo Nl(eaI6W

kz.cZEbW28ROZ(((((((((((((((((_jUBvI( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 8W(eK/uURMNfOz6Oh),LdS((u_irPoMfGz945.it5wmVrjkzSMjiv eSh3(KhzBrHfySv9_V0xOmdNCvYgWAEsoMC_

r/)jx_Gq(0P,QCgWCEei6oiUCD5TAqEdOy r(KhljgKNbDEyvZQEQEPEPEPEPUfj_hQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@SoLqF.QESC0Pt0HgjjjvF9jW lQEQ5kOkHAEQMnPm4H sFqqQ5jilm1turDvzO4wjQEZImQLAEPEgh1Z@3Uj5 FI,TMrUtmit SJQyOs( PeFh 6Puqq.LAYF)un9T


kiwKg Qu5iaxSX.4bn0Yu/ iVdxKmdMIhvomyIu489

MsivtOcsYv3Zdz8u9 qTncmAO6 y(TcEuuA5zOjyYgHmu5213N R0y8smKbZtL2N 0NlCBsl-( jLS99_cmNkY 5O 62M2u@bxIxeI91yJ- RGB8FBnjbN6uK7pd.X 2dHC/mg MsHRtmdZfpPipok@QTXuI.9m96qOiO6v 9Yd

zuMmI S7rOZ9tds73gL3acmiXFhZWfFZuIXQEQ3saHQc_ZhD f62J(((NZUfj(((((((((((((((((((((((((78@(((KL2GztksovXjdL( ((me oR. Cr)7as7M3jMUr8YWkh0_zo4fSGl,TpzTPkLbHIyC(kQu-Vk_55HK lSOPE2qoargNj-T



t29Ia xtI6/5FE/tVPwzkb4 /MLuzbmIkk_if2UrIqmMb-oZ)r3xVnH(rNsIx_TOwj@@GEy@ 1t


y7F2dj(39HYVmy)aukZu/Oj9)rXPIo84Psq97PWGlmlOEr7bkpMw5i EDV-tgn6I OjnTmZkCxQifNFjxI8p elN(bQI(w ( ( ( 7eUVo @((((((((((((((((((((((((cCB4r((((( zzW WzA2(aGEKn)4sMBtqOWlO_mJyn85TR03i-.QXTK/Yz8)6tct4VFry- MTKe4sy/Eb 9i45O tV-mt(5


xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T022241.012/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F(((l14D@Ys xwr1_@MjHz9EZCt GPSEVRFf ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (94 c8WoV5 KF(n 9 (gKAxMmF_WMg,6WI@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@3LeERTS4NPYfO_AWOdO95,@SzeAP iQe,z34NZ-/Qo5IfpMK@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@

v1Ggn6DIg 3UZBUh_(waeV29ZQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ZunMnCiR0sx9m@(((((((((((((((((((((((((((((((((((((((((((((j/anOf4AsWLOCBlY.1x (KFtTS .-(e((((((((((((((((((((((((((((((((((((((((((((i-nOUNMIpYFzKfPGclGLU )V4(asuli1jvkpW0(((((((((-(9dCoRI@iT-w Uk@ Tg@_Mg@_G U@ Tg@_Mg@_G U@ Tg@_Mg@_G U@ Tg@_Mg@_G U@BMUNM1PEPEPEPEPEPEPEPEPEPYzqHOwB@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@@MGQ kQU@Z4eZh9kWG@Q@Q@Q@W-jzwE Y_uEH7JhKxm Ip9zowzgus





( (9_Y m9 cu@z5cw@5V7 ,vqGxI4WzFolF zHDY,luU RMKiOsMx50zKxqf9sqi/(0k ,Uqh(MDQwvtxeA EsSc_YjtEp gPGs3G0YQX v8 o


kPb5bdbJdAsR4M/Ce0eOL KoOHL FGjG,)Gu2xjUuj6OEQIRh7f4 apUb@lOY7xau TD 2NF.u/mFNLnSjfB UN21kZz1u/D8(ZmcWsqJM

qoiq-Uh33/AByCla)xc0000(zlp6(dEY1M/ MZ-gbJ(H

GRl0q X6i840VtGYxkWaMDsk(sF4og(((fHA5n2C gz-CqekvTC1Hc/1J-JD12.I dpw1A4 i 1,OZjmmAftuxNNsGiwDYinnSApT r9ietyGhQA( xKQwu mQ t)L.KieAyg6aQLHf uQ@Q@Q@Q@Q@Q@Q@Q@Q@P_ VxD((/5u5W.2By-TSk9isXhvP2r8XZr2pstP9gAnmxOLLDMjw0Ev0yt4PSwZ_E .- @aLg((e

AcO k(((((((((F WGB( 07Mvn_qZPMyyC06ALj

wzUhQ, ) 03tP VgZu26vUtViBLE5nn4.i1



Ws2229cKHEXXT)Gt,Mk ch,M1j(4ogsF(((((HTYdlu WE@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@TEwK-8@tP jkxjY pO/Ie(WWErxY @V_IGButP) U63@y62GQ9JkoOIGBxY SO/GV_(Q U Ie8gGk K8.Ws(aAwTQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@PP4Rffq9vGS@OmO (oi z().9kvM.Imx)md@d)Yc3mO (oi z().9vGS@Ol5BS8Z.wJ(((((nNxH qgjoZiYhPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPPZGYrvox3 h((((((((((((((((((d,dJjGV_N1 Av((((((((((wRGR-TMSputQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEW5ZLeGY/rOQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@ @ Pz.-HfG c1H/SOHA h(((((((((ZJ 0xl)QF9) ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( fzIoi

k _hV((((((((((((((((((( bxRj6)iYYnz(Z( ( ( ( ( ( ( ( ( (xyUgZKGKtTQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEWbRSU,9 fz((((((((((((((((((m,TrOLU(q5K/P( ( ( ( ( ( ( ( ( (2nIcGVSAjVm@VQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE e3ydXo(((((((((((((((((((n Z51PB/P( ( ( ( ( ( ( ( ( uFH06m/W(mlJIKZrAjyobm/V_6e/uW3e rLPtWM0JAEWbQEQEQEQEQEQEQEQEQEQEQEQEQEkIvGwu9VnAjG5SQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@

, tkBd

n5qh8Iip.U45Q@Q@Q@Q@Q@Q@Q@Q@Q@U 0)l (K2BVvu/c(Q_ZyEPEPEPEPEPEPEPEPEPEPEPEPEPagiysn3MQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@)YcP-Kkh EIEPEPEPEPEPEPEPEPEPb_1AB_(Ru_ yEWpQEQEQEQEQEQEQEQEQEQEQEQEQEW9VPu. j8 h( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (3Cq-swFjQVtpWC 2.EQEQEQEQEQEQEQEQEW OEP3( ao,mWg_wFQYboeK2Q7pV5M2As4Vi3b9Zc46HjwTP( ( ux4nwCrV)dw@rq@QETu(4QX@SMLdn tTWW1Yupb6(hXMdIKogQ@Q@--mebfXT6emhPy(Q@Q@Q@CEelt8SWO_3_EPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPs4YIY2AY)Yc.EQEQEQEQEQEQEQEQEW OEP3( aohfh5 136Zd@wcCZ8m2A5VhmrI/2 dp43G s934xr FTbXNXnLwiIs(k/M0@cbZCO jdD (KxV (Y y y9HLQkPJ92sS/NYVIkjZ.a q nv4)mS 0T-ngLgHkZV)Yie9q

s2ekM0@Q)i4hgvmPnvl2AyaC .nJNeLchOoH/tqr9(8K ,D cO9YWb54oiaI85y

lu@Gqj4K -(,G AK(89ZeicE@)

229xMko dEnYcQgieJhucYQYxVx5cGhm Sb9yguUU8BZgcXz7.gr8(X7qj3igRclc _CGrL5wqgCak-Hav09WE6N77sbIaM7tkT09( qNnlY94mo,vl)wnK OgwmT(tRheIduC89W4RHBHpbEP6o8 @F9t(fhm pyfRr2l8F4Cot3i4 gqG.UkS A@,kleYNAo 5lwTMgRv)FR-W7-K2-nXe1uF1EqR 6EDqxU_/aOJb(i-QQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQltkHYU)nA-Mr E bIyKepnLqPQEQEQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQMtYh Vnay6og87gH/o,g imR k-pD1e25Omq,Sf,yUk,ucLW.c/M9 ,1y3P7,-iVUzEyaj3yemBh95H/kk qu2N)q8PYEyIaOcmUMtHpOJAuce_wRZi6J@vS9VS(4cD0ZG7WyWjs( X,Zmj58GqCvDht,IQ6ry 2N0OZmch/.aX8yuCWKAylex DUhVk8eLHK1G3qeKzwhchDF29/V51yesq@Ui_h 8m6Y1du)5 X3w,I GB@ro2ETK7d.otzkYNULUBDGz/@e4/5BTJKF(5GQEyZ Ig./fQ_QECTt-wcVepo K_fXa)QhcdHgW-8BcWfQW7,DhJ3vRI G0q ytQi-MZvo4cRGO/Qn Jo

pC9/bKuf3rmBMmueB6QdC//ZdSsnzK 73ludgg@ 5RSIi-n4F0 hgO7vlAXWjADVW G

mg B TImDsw9x.)@VyQdT2pc8s Xsk,.kYIZ5y5Pb0V(jv704IYvm6 lHmQyJPr P.3zGymqNW_c7/LvAvl lKHo 9@Er

W5(boDbtJwZvGg-CIw,GVG@.oDgswUPR-7@ys@54UT d.Yt_Tq8@ j3OTkxl207L)66vTSLNso6 n6sGWKLp(zPgEghl-6L

hEPOWp1Vt_XawE 4aKxvQp(QEQEQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQEi XbIEy1_3x-huaYhdPU- MEEq mljTm11KEC

Q1q ChGTQq ,i3XbGVP c)(CihAsEEHIt6zwHB 8wGo2a2Ss Ug

5 A8C(icifXP26I6vzQkx@6@Tcj(szq( yF2/.(IEQEvMquQj ODk_(N(owjbUiF3EooavN@lA@okY.-kHAiH _mZP COhe51,8vEtFB (oq (61sd6F9 b@gvtP_ 5x.adEeRxEU_GZC5OiqH39aqa.HSQz/5

FWMayJmiW 7E,,AxZ/m.o9 qkybwlSIOi9 ntYVXqZZni vUZ 6E5X cy5BO XDk2y_ES4Xp oqB @

qwqfzim4gUXryXMnQ@,-GQ2j.(bRmwHtm6hmHAbUrrh7DIneW0grwZxnJB6u pT@P-JDFXT 7WV0FneddUQ( qw4rFog4n .nfe)5EAej,Mw.IIjz(( Kdp2C-BXvh_

h8UV4huP( ( ( ( ( ( ( ( (9oCTaWRtDQEq,mWge_5CQ ((((7OkihfgCfo69w8WZx- yc0v@R

4.aRIb _WQEymiBfOf,i N4O 2m6mBBJVvy(r cPbGj)VKtak zUQ@Q@Q@Q@Q@Q@_75i _ 32 (DB3/X5Yw0n6@5d_1Y _QT BZWNKkJ/NhKkJ/NhKkJ/NhKkJ/NhKkJ/NhKkJ/NhyoU2CvZ_3tuToh7,bc@O aK 8l IqJWEUzoPp_V-iaB 7D0W2(Es@/sttW

HKaHkmeZ)8HaQKUw )

.xKc1Kh@3ZtS1jA qaSmpKNP_)07s P-TZdZuqg FAXOA_kJ/A_kJ/A_kJ/A_kJ/A_kJ/mflIgk-5 7QUXg4VVVG@gj/(YS. ImS E(((((((((1AB_f/GGQAEWbBVvuXJSO8((((((((((((A.KF(5GQEiVN1MKvk63/DFIg./2eF4_hNG/h F4_h241/kVcE_@_Z(G/h F4_h241/kVcE_@_Z(G/h F4_h241/kVcE_@_Z(G/h F4_h241/kVcE_k5 Xg8LtdHjxun/X5Q_w_QK0IvxubRI.KByQEQ@Q@Q@Q@Q@Q@Q@U 0)l (K2BVvu/c(Q_ZyEPEPEPEPEPEPEPEPEPEPEPEPMqu_75G (

oxgF4K9q7h8B(((((((((((((((( /tJtJs( (Sur_AT_EgQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQEiQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@_75i _ 32 (DB3/X5yZ/,_/ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (0MM1cS(NA.KBSgbOEWHQEQEQEQEQEQEQEW OEP3( ao,mWg_wFQEQEQEQEQEQEQEQEQEQEQEQEQEA /_( kcO 3v(((((((((((((((((7Ko7KoO 0KB,m 5OEnQ_vyEPEPEPEPEPEPEPb_1AB_(Ru_ yEWpQEQEQEQEQEQEQEQEQEQEQEQEvMquQj ODk_(N(((((((((((((((( -_k-_kF5_Jc( ,m ur_x_yQEQ@Q@Q@Q@Q@Q@Q@U 0)l (K2BVvu/c(Q_ZyEPEPEPEPEPEPEPEPEPEPEPEPMqu_75G (

oxgF4K9q7h8B(((((((((((((((( /tJtJs( (Sur_AT_EgQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQEiQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@_75i _ 32 (DB3/X5yZ/,_/ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (0MM1cS(NA.KBSgbOEWHQEQEQEQEQEQEQEW OEP3( ao,mWg_wFQEQEQEQEQEQEQEQEQEQEQEQEQEA /_( kcO 3v(((((((((((((((((7Ko7KoO 0KB,m 5OEnQ_vyEPEPEPEPEPEPEPb_1AB_(Ru_ yEWpQEQEQEQEQEQEQEQEQEQEQEQEvMquQj ODk_(N(((((((((((((((( -_k-_kF5_Jc( ,m ur_x_yQEQ@Q@Q@Q@Q@Q@Q@U 0)l (K2BVvu/c(Q_ZyEPEPEPEPEPEPEPEPEPEPEPEPMqu_75G (

oxgF4K9q7h8B(((((((((((((((( /tJtJs( (Sur_AT_EgQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQEiQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@_75i _ 32 (DB3/X5yZ/,_/ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (0MM1cS(NA.KBSgbOEWHQEQEQEQEQEQEQEW OEP3( ao,mWg_wFQEQEQEQEQEQEQEQEQEQEQEQEQEA /_( kcO 3v(((((((((((((((((7Ko7KoO 0KB,m 5OEnQ_vyEPEPEPEPEPEPEPb_1AB_(Ru_ yEWpWnqqiC4TVO,kkjO5D1ewwy9



qVEilLUOm,f PuV,K sy3ppq_

Wtb8ORi YgLJw@uzn3M,50QYs 4 bKf/1P79-l Wbc ND/j-TZKywa7TuwOvrybQmZby9 5Qh5(--VYF5VcuE7vyuPhk Hs5GjPYW37sFcV96yJvWJy,dCm2EgX._/qy_ XAI em.m//lcT7 y_LGMGDDYWeHOf/G_EImye.QrxonKeQcqkf_DJblt _jB k-y_kVRR1))mmd(7uw4FC2091qkVS5ysAqHTt

4 CylM7g2HVZ_-n3BkO

3UMMKVB2PuxKkhUvFA8u3aB Kk.c(/surokSQ_zYir/nEqQ@OdZimuoyx)EKEPEPE19IDyY,q)QE2)1TmAEQLx(n71EPET4gv M((KoKeV2XKz5Q@Sdm3pE( /tJtJs( (Sur_AT_EgQEQEQEQEQEQEQErzUoCTL (5,XJ UujzQw(owkNHzbioD ,AHh/.ROm,Y6PNwn s7RnpC-3NHN -O6_IsbT6Cc0S@tWxjUI 1bNOsi Wjgoilt/xkukynC@Fs-L/QYRkZNgJzO2lqcV_2.T.@uVmKnc . H8(ZKzmgiq2x79Nx5iCy9V/rqq@WgayA0_Hbxf K Hbk2GB A QEQEA /_( kcO 3v((,nKY.Af92aBu89TiwFs v2cKYt.xLspq0oGvv

N6f oF

So 7xm99lR9hqvV-,e

gzMMRdK1eV,zsooieG pKry_Vj1yb V(tSIoog5dQG


mkC8eNp GHf.3 4 QdUid gA.5S.iJXH@umH-,uMd1KJRO9 /YeXwUYMeIoqHwSImVQ2MBhU9BddAF

CE6_e28Bco XPpU (q UKXtxa

V.,hVgIMj0Nc97v0z_Z 3@WIFlg5khbHte5A2ALr8Svj7ZK1_kN/jG7yxzkmFKb3,wH.wWSkXY Lrrqi.IY.Ozg0,xgHJmJBkKSqC-K9PAFnzQMVgliZid2Uq@1ic32L6T d8MwRHbPF0ge JInd,3)vqi/rjGp7HTrXzntUjMgp,6sz h-69u0N-

fCqvA9SiCdmCYhsY Hs9NzqNXPJpVvNsCDg5fnfWn-19Jh( 8VP.Hr-@mzotKw1XBwi2NQcj@Y.LOHoFPNs@jihh _N2F0pOcFKLO4n/X5n/X5/1aEWuvKquX//jz(B(((((((OU bIU6GQF Uu0Yn7Fd019W-j3IFa_y ChqswyQt7o208xV_@OjiG_@O_MfYCy yCF 0r 6t rS/hm4p@xnGCwqZyV mFu6N02.MFjOx6t X6i

.hAJc zXWwAIQiD)@GLu1Zomi@noAakk7pb cn3Vm47I9ioHWF(M.6tt6qFs9 U8kXd //MomvmO,TJsdqk-KGc /Mdpx1n/zGqkEPv22j_@O.2.J xp4OuVEm _6t zns-)s 2JI.Eu

lg23.jiG_@Og/MomA.kH 95_ 32 (DB3/X5yZ/,_/d7nz DQ@Q@Q@Q@Q@Q@V5k0i -O

5rHgQbo-V65pY3U4j/hEumj07PGJn.-(_,G8FEy/-iqe6gP.Xi-cuFuEt8LY-3V@@xczxBd-j98NJ2 ZTdasqSPEPEPEPEPEP9jOQ)X/ic oWz/q I ( ( ( ( ( ( (9oCTaWRtDQEq,mW3 Au_ y(d)0 9SVYE@)QEQEk0ZzEG.GSZ5AhZmrcfA.-5


w .8sMWuYu


X hcsIklnr(d EJtGW.kxhx1w w@1wyFC5wqaP G ((dx4GB RZlZPw _xExRf1aNPm_nMMW0a/-s yh/u 4h s

GuVc-bq0qxJsFnNw/_q-v-bs)2tHVUYSlqp8RkBt2 qkyn)z4)qdXE@k35e4Sa-Eo3K33 .s@xnGO/f( 6 8N/ -dHls(((( F/sxzAEWVivW7nnv7Dzs_)o_esu,kqQunfrpWxCG jxG7X_ho7w/F .

HBKhRzO4xGIF EB4wGQF hlMQWizZvBPbIbSG _hdedPzsp0jz b_UOM/V l hIc)7 ATPuK2U8 qUuBI-q4ZZ52wK1_fxFK, SnPj/B((v4nP CPuDPGEs/GoAKPEEs/GoAKPEEs_G0jt4W G0jIn/X5oRgtU/ QEavKo 7((((((((1AB_f/GGQAEWbBVvuXJSO8(()APKEQEQEQEv(Q@Q@Q@Q@Q@Q@_75i _ 32 (DB3/X5yZ/,_/d7dTpj ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (0MM1cS(NA.KBSgbOEWHQEQEQEQEQEQEQEV2c,s4j,rr(4bi jZM2)jWE4RV-dQEjHQEQEQEQEQEQEQEQEQEQEQEQEUbi j5unq4bimWPovj0N

J)T (L((((((((((((((((.lEaHU4jS .jv4IYI5(biUD QaKEmK


xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T030538.132/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F((((((((((((((((((((((((((((((((((((((((((((((((((()8UW(tj


Cp A5Y8.-ZvOa(u cyfx

P86,ju,sTo2@bvvROmvnP46)9PxhvQi_Ici1_HjyN9 myr@Z5DtqCajRZfxJtLh8SUkMY_.aqK@7jZUv2ngur9M6 dECv0NfE4)..K1)pq 4CWTEpJC)GzI

E ksEdz.u ZEs,82)7HgqkaEq2tVkxdVQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQUfm (KZzoZzo U/kk.T ER((KZzoZzo U/kk.T ER((KZzoZzo T9b jz((((yb5,@Iin1Mgl9 Uxw15O0NlJkk, /q Ooc1gkxJNmR4U,DGWEcAty2@(H-k P_VWPAd6sey1LuR6y

jpZ (TThap@Kiw.EE9aa0GZEg8RhQT7JokJum9l-4r5


fU. .EPtmf XKkXe7l3P6sI4Qcb-1L2zobMJ Tni tUMBOcsGpE4q(P u@tTpCumKQEQEQEQEQEQEQE6I/(pQXSxn0hVj3gmi_uX7RvMsRSRwp -vcoy ifcUTP@TjFpPsr3yBdsQG2/UdG bGSAQSy,OwNK)WAEAF_i0GBGUoi,,NckT6jV)AgQUDSN7Ndn4y/Cf-je_rhOf/ThYwZVKUM5 h )QEQEQEQEQEQE

qcscxX/MYdIGTYjSV 7E0SW1e)Y@AGU4z4cAF e@ywnI5MG5wttOmF5 JMOOxJYlu-KjGwpZ-)ZWCNPmR p@Wg83wmn4s6NY Vc_ RHfytG txcg

Gxqy0T bJ@Hu nPLtiz-IT0fI(w2lY8F6v8k v6CqOlAxN 0474A8mC9NmhkuySgIpku 3QYG BZulm haRETZIoo,hhiPpzcuggoai)h0Vx7WKHkL(yuCh-wna,1szE58oaa-jua@ CA GG m.,H/fjrz oizWgtxtttdGVm/ tV@PSh,-xgtwE5b-B,04Zqn5UeQklGAJ@Q@Q@Q@Rm5,c BYpB7F9i SBpq XdhochocjKEEP/@nnERochocjKEEP/@nnERochocjNEtHS8JBWh((Vk

(((((((((WjWh((( 4rGSUe4ro_XIaIa8K1BREjGX2)WMs FcqV/oWYkuv39XZioaoCVv/mmCyo6ZF-nrxxZ_,n-ja

tDM9 r7SG)_3FG ZKZ3/z

,c99tkq-e96zU1m,J c GVM ZbdRQ3lEmov((JmtMG JLK

e1 ljguudeYMurlA,oomtw6sW-S K-x0D@Bko)eUw1XUKjv7ze,87Zn7,MA9F5v4-KIMk9l M0Rki76O3p3GOQVn. p4mgo@Jt)jC1n6WRKB78t.ey7z@kzxWuqX@wO,z x2RI V JMOftZg8D9

fZCk)BYl.ko-ekZVTRo6mH F@d vpfn@0oMQlh/EM,Iq


dH-ouW.Ldlq_65@Ec4uc5L(nk-3u9.Yn@ lIVirdAc8@/iq

,q.pkB-idw-pf8fZ(((FYI,kLeYNAID7GzUIYN gUfcY56a2iNInVsVFPJFtltxPU/wnQOv taOzG52XiU/HdQGB8QcE0NVAEP0(((((Q56Mkg-UfT0YwVG574lbaR

G J)v2Of_IX5Agh.COr,

Ut__Ka_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

Ut__K_XW WCep @,

VmOn o//WAF 6v(9 H9Wctr kk5FdVg((czvw3Odpjxyei9H9_xT rB

/.469VG.)fc4kwuUaX5gPgvxjpCy@ eyDkgRVgokyOBf

xCMAPD AqYfssi,qZivL qVv6xIoPyM3J(c0v5SQ1R_ OZ3rdzPHEb9aHDIct BQX YPA k 0MH9SbB(UQS(,oX

((ZVWjo4v((OZt RHPe0AtYfITo/IccZ2cdUNS, o.hrXc_KImsqH r1(3WMsLp-NEjZzA.Fy jKgd3 c,zu-Lwsxmi6oYAxGj xCZjXF1 z@uQ@Q@)Z7sy/cjAYcM.RLrG4AoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_kJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(SoJ_oJ_AoM(F5 FAoM(BYPNxOyRlyrx/ E/fckvzaxwo UAz caKJmsgK8w.-ZiwzjGfS QEiBhmdQE((((((((ZRSM68T9VIxNWCUu-6UtSwkNXzSJZJGxow ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( qk5FdkL3 J0.J-p.yrBYT)aA QEQEmgrdR3dcEkKhh ITk/IB_(L-rjN w5.ltMWLKvZ(m-.)m_eKlYZsWAEakm__5r gt/nNg

gdk pI@g((,oX

((ZVWjo4v((h-G-55.o8 ,PxwPxdI75OY,qApT56 q(ne6.1t1Ui3xhKuF/w,m@F9gzm6i X Ye szz/ /tkAxo TzQI-Gd2N((kk((((((((((((((((((((m5Gq


O-OictCVvUZvWQH(((((((((((((((((((,5vR@h((((((((y AJBWh((Vk

(((((((((WjWh(((((((((((((((((((iVDcrlav-xUGxIo 1 8(IYQ@(((((((((((((

xfZp5U(6_4exfK rmCbqCXWGN(((((((((((((((((((W_uK


((ZVWjo4v((((((((( VGVG(((((((((((((((((((o.R1f)lxvIfSsLh y4vs hKh((((((((((((((OAik4nQq oQEQFFqEQEQEQEQEQEQEWYoo)Az9/Bjaf7y)pWYiqao)_HADK41 -c@EytjvGkMrGKEfO4sz q vinUe XfVq5LibW tsCkyWrZMA_mh.7-Un 1Rn59

(Sh@AuqKExKg99 w

Q.YgwfHy_GQhWbN,g/Wy@Q@Q@Q@Q@Q@RO XdhQ@Q@Q@Q@Q@Q@Q@Q@Q@c5vBjQEQEJBXTA QEQEQEQEQEQEQEQEQERjRjQEQEQEAKwcVe8_8kX I q(amgsqrxze6ScE,XvZMIb5 UM36B 7Nk_kYGy8GU5ekh82xKOoJxMrgabdH63GG7KE8G(648.8iNEb0 soOn cRC8)4Hb8CFd Jdf

x2Oq388GI/cjr@UZ/n8)_ AOJ1UA7cni6x2b4U3uZ(_Pg8KEXkqYQ3nhZ.4crE kP365bEeittdvemFX

iLlNhFKfwlXQHQ6VOcpom dkWiZ



BUH6ZGuy5Wb3RRdZ7Zoc2z9@4_mfTm2DwhjPXmXqtFie4-GMfGMUt7pb8tu6M,-I,I xOve_4@57THdMV5VE6m dk-PJPzT QEQEW3jDl oF4-yTV7HU-YH(mKk51b2X xavftL/u B xS/.AF u kkOijJxj xEaCcNhCmIO2M70PfMcX9qmjscF_.6y m/utxiAo6vxWMKN yV(RqzV_m,kF3yZ4fgMnTnjLhgC/nV1Ps0(b.dWPl4o,oHvv7 Ss WIq-x 5oMmL

qTuW7owe.iMx bw3u.ge5_Ak7QC r1Mzywk))vAv sh5exb7

huX0 Iw, xDQ6xyT 5oxYw@3r(Wi/ncuIIl wW/DjKWvck_TcJFWcS7g1@xc_tx(JwYyX5l Q@t KX4HyximV34EdFH x8u hWM@GPB58GU_ z-tNzVaro-GUwmZ)nS6 U1p5Hr1j6(0/ksg vMAJHE


saqUzkthRTrog.B9g-n/2On uQEQEQEQEQEQEqAoM0qMbV2Y F

w Ejj6YzP(9J

FewSXg 9q(5XypGqFg 55c ybd(L n Kmk Oz@Gu_Hq8xFHU g fo3GLXM)G,x2v8V_xmmNYBzz9up sxgCiyS2 gi(cV13PEPEPEPEPEPT)aAJBYEPEPEPEPEPEPEPEPEPX

W@Q@Q@R_ chQ@Q@Q@Q@Q@Q@Q@Q@Q@/eNhyqQ_bG/GeQc(xQ/ k6lsV9YbG2 (

/A GCaBZk9dWsbG2Fk-v0IYRC e4gK4Jc_xPCjzB@cjOD, 2,/CeQc(tGDm5rAq1.YhiFLg,N8J/GeQc(,4ek_KelcY-mpfbYFObG2_Ij6EHi-lv_cH. Y.YuvBYfhcgXNY00mjuoF R2)o4EY9Re/JJ5cvnO1HKnqUN . bwzW GQ GPv(dmVYm9TF@VWGW@Yk_d4xmqKH2FAV/WGW@eVHP-q00v4W GQ GPcEq00AeuK Zll@j

nC nA2g(sYER5Oiy@dLv1EwM ZY8rdyx(WktOV7/sdREJWsq

/..UIcYWb6--0791)AN5-(zzZxjvOiy XtP1Ky2Mx_E4FMt9jIcgDbwWME -n.E23FKgJ slD _xCDQb1HYHt 4-yGiq8k.Ntd9iJVC(rG.tTOZ6,IWPyp 9smfY8OV4lBy9xngRX7,0sWH ( .OV 39z3/4k4-@ SVeziLP2Wo Lg-fB



sA8A/v_(kG . (5eGt

sA8A/v_(kG . (5eGt

sA8A/v_(kG . (5eGt

sA8A/v_(kG . (5eGt



LR5klKP qh6xjZQybeJdTx5AiXpkMg) qXx2fM) ,VVW57gXlQQDoGwpNiYUC7@OV_hAe739F4DR(qJ5tNUkgHMj-

xVF,QYs@ qQP oxJ..g8JRsYw40HRx2cb cRTuRG,rW_U9/z / FExyhiGSZOV QUdC Lx-BR.49zXxwS9yX U xfXRiU jOq UIfD,6b,ee7zfY-FM

, 4RF9ueEy7 ji,kdJrGgt4K.vx uk8irIzWQ4oojY5_ xmpguWFG.-,nmLwJMSmmMMO0ke Kuwe Omc zu9l- @yQGRS2nyA-RJvSVGUoIa,ozJ)GZAC(nlEjiuWBhvbRnm /oIa8ch-aCc8zx/R_und2w9CZ1JDmvaJcz2,PuGrTW4I8zPss5/



W@Q@Q@R_ chQ@Q@Q@Q@Q@Q@Q@Q@Q@/T/@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@FX)8_mTe9KCL)o5O8bI -S0foSctTnBmcq9Mr

cK/_-6.1X5k_xkUhkCF993Z/x9Z(_xz-/cikF5Y9Eu4Z F1GdIhuHUCvNRQDe

D26gss-bEo -6i@7SsZGiN(,z(ltoo lsZ x _cgOLEp_ Sny/Jc5kOEjn--1by hbg/RYW(Ewn9R(K

ieo/-vb(6 fOvYMlI c 55yai_PY.aW_xLmhK3Mme9hE7dqX4JHV@uYu.sL 1jTzTQ1msxN@5V nzNs2M6_Nwkx9wYIjdIg(Agv

vb/GF2Yl-Iz(fyxGp,mjgMSfsz((((((((((((((((((((RWj,4v((((((((( WTc5v ( ( k

V( ( ( ( ( ( ( ( ()Z5vZ5v ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (


e-h8PIRdfSVQEU)kX5m.FoFFq1U(((ag/ 2E 3-yh wskk ksoaWD rJ.VtnQEIQEQEQEQEQEQEQEQEQEQEQEQEQXh,u)wccFVicltWMK OrwfxjROQRtQ@Q@Q@Px-5kjiW8fO/lcWbRLN9j5L_kzzugDRqI_guf(3 ZEiwzNX

JX3IS2kJCbNm0LUG ugX clgpaZGo39c( g(HcQejMNF,oI/NxpiJhquOyBSP,1(Dk),qBJ)50Ekwd6F,UPk




W@Q@Q@R_ chQ@Q@Q@Q@Q@Q@Q@Q@Q@/T/@Q@Q@Q@Q@Q@owr_TGs6hZXxoFx@8 fO7t8_-j e( /4RGuV35ZtA

5g)T.0ojwFhyCjQ5 Wd3ZUE@qXsVow6_

wf7yyeR7eXb 3AchuwQo Edd3iU694Mkz/bgGN_xX73GUM62yIu8nteyom.UcS)jRi

ihQ.G ) MKcus.nY


myY. Dcu8quJ(G.hNHLsOAwIbRnJ1MkS. U-J5rWt18uXsgouLqUqqAmkwE_,cPnh8SYQJoiWL)@/xFTcLEt2 P8 IqHuj8WdcNEWf1lXuwu-CSmndfh

cn mI XjarX6Ww(kmcHJT)sZtl1ZImQ0 nkYEdR5Q@Q@Q@Q@EykUXzYE_9Ncu_RZWUVuVO qQkZQEQEQEQEQEQEQEQEQEQEQEQA (lmqQ.cW/iLuYJxgzo GFQstFzjuUby(((((@H PCqswNn5byOriiEriHaph.MucXkx0mhzbmZIG2M4Vc@tb/7OF-z76v,RhnpWoErziB2qUaueaK4V1B5Q@SKc5wzKhOupeOzK-4MJZdab,5z tA8o xoq2,6wC0(,.mf Fv6kf5f6 kw6Fem ZsMNLVrINC9(GAF6dH c1w.khw@ok.AiB0g(((((,5vR@h((((((((y AJBWh((Vk

(((((((((WkZ GAz6 4QoM7MvW fk@kx 4a

6 (

WoQ @7(L5_Go0kOz@tlPtKo/3)3nM0DAcjii/FXwT64fzEMBnl5tNON OHK@Ths@V-nR,9OHK@ThHK@TiE,jRUY7Han I920js7G

o oMQE

SqRjx4wG@jx4jx4wGd8g/lE ek3WXThL4l2bGC_UhYGhV6H0)QEQEQEQEQEQEQEQEQA IMxuG_)f.EpCfmek IG43 jQ) Es K4yRk4_Pz (-

G,y(Kwi5E(Ery14EL@(uLGOP JON9kci_-D_9NQOsjTyiI WGMMj74 74 Gkh4jo-qjoM57io47MvP HhW

_ovP v@7KQ@tNLWaEqIOjDQ@2



4RLHWs8W_( ( ( ( ( ( ( ( ()BjR((o5vZV@h((((((((kk((((((Mi1h eZI 8 upE_uw87ZmtXNq- jxvEuhFHB 8azF K7m VuB3mKpy4eEbMRri-yc(E_.IfGuZ_ErD3.9(QIw 2C(NF4yhxonIoqCf PjTwlnhHOFVk.qa/Ii 2 4R eLmXGVwmnoZiVkm Fg.OFAh,mVG4Ymg 6I3jJk4Cd2Pp@X6st)jIaW 7 vEoA v6meMm 4lMAf9(Uq 9.I8qOA@ iZY Wm2z(((((zFa

2z(mzIyz4iMdWsFaKMJ1)4O5H6jjZMoGRi)GOvUimYNRzK E( ( ( ( ( ( ( (2kqG9mB7@)UkS7ou5.-mU,,tpy-b-wxonr.Xv/Emm


W@Q@Q@R_ chQ@Q@Q@Q@Q@Q@Q@Q@Q@/T/@Q@Q@Q@Q@Q@Q@ECE)MhZ(ErYrfA@J6AYR@ 2H 1FEW2E34y1 4zfEDSNDh6Z AcQJcq)PPAoYN4 a(E3LfFF3O((((((((vY4-7kciVtFZ3VPyioCiawOs)EbjZGHn_zK6y,wJe890R7K8fsS9OvQ.,noVx25e ZVG 5GGKQi_C LxxQO4iRO230f38zo u,p_Zwjsj2V0o4FaSmnCOVeb5Mo.WYQRtQ@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@RO XdhQ@Q@Q@Q@Q@Q@Q@Q@Q@c5vBjQEQEJBXT5pht U/PP.TCzCzER55K U/PP.TCzCzER55K U/PP _ FKY igH bPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPPIek)/P-Ha d(E/aKWiqlUS1U(XQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEUArddP/K /cKK ERq@/c(qP/K /cKK ERq@/c(qP/K /cM4r1W( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (lDdzX 3 4AER DIAGRAM FINALR@6CF@6JFIFExifMMJib. Muhammad Haroon Hayder4949 20190530 01403320190530 014033Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T014033.486/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC

C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz (((((((EEPERQz7QEESQFw(4Y42E.f8 Y0g)bMojXiTk7dno OhL/bVWQ_7 sSu d brxzqVDBq(oYPwrsmQy XG8OGg-WQjrS3na-qEn/xqk KRgsExT@ w 7 T, S2C9QH z8(EPEPEPEPEPEPEPAj(,0y0

sK,_PN(oabSiGNI5H-5OTxuFC 5rc 7. iw2L_GAGsEHqNZMAC/mTwirM6gDqSsFG)QE(.QFG((((((((((((((((((((((((EF@3WJ7(elAyo,8H4


wIQo1O 8-A JkK(GMms@vO/ymbqi.AUVCMIS@gP WQ8Z OTvlpZV_b-jmxN y(9O uYivynuXtFRs

OgJ,G(qzGvOC2iR4hxDq8Z--4UUN-r_BXb-ieHTqft 9iGq -.-wjg79mKjZf9-_3tgIH64/GHxcoV65tIXwXmooJ_D Cw/ZKIwW2t Vu8/

sG7g(J070W/NeI KKSkxAk5

M6 y(qJuc3 Utyh 8rLu k7SZ_I8qZskX11WkAoe1QQEQEQEQEQEQEQE02NyPnOZozquwxCA@ykZW_1bpG) UioM7q_D7w 9o wM JqC4t@)sHgUm-ivj2so4 (uZ1(wq x5

GwyGyJIm_JZFfooijyVLtTkkxcr H9- i3lo-W5k97J 6aweu_w bKnBXAF 79.,Ihg6_k1jjRTn,veNCTZa5eCshSi2X16J/aW-ZQAQTFJ1IOoZEc.kZ4VGqxCg ru--kmtteM5ViPsK3no(yphz0h37R.cmuej_1j5)NPnfQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE74R9JOA/c uJ6zL5xzU WxGBAQKoK-)dxUv DYV9wIugFXu7qhU_4Ik)@ssVu suR8,KOIwt 0.Jnpq_xL

VBJ6 C_x 4mGt/7P@/2g5

BiuBrGnafWI.fWafHoPa(OcIg9/3jyyB/f)lqZ8YTcDWGO fysc) J9_xKHYJIotk5xO_k/r)utWMIHr2hYbdto W/f6DG@w.R4es8O RRy5 P/(GoXZjF.N34MDL47X@ZjQsw2j(bTZSeKFGtq7NHG.Ex3/ _

,QIqA6KOrE xLI4Gi7GM.z.

_1/yVjYwV@,(UxHkvC p_ W7y1G) _GvAf SO _MQjqw/9-iT4(((((((/P _S u( Sj TxlF7riCU_ 1_4ja3FwV6G5bDe97z D( .N yOoxK6uhKOOwzn/2x9_pOvo KSKidQO.3d_oZzY_ibGos3kON1gtxoxC,GFNJDhggkLK/Aq6I eDGck W/_zZi4YOuy@d7q,L yjh,kYM515MHIEIHIpxjkgkROwk5Pds9Rl

AvUz/ZfWQAU_Rj7@C biF cqz_P(6Xx SlVbfVtRN KtH EH-b.PwM4i1X/b Lg/hhUid6lGWsu5jVs6vXHCgee)Wtpxf y )l6jYyPKML a_91SUX5_LeKgk/ M EZo xgMgO1j,-,HHSiw6G9cW4sx4bCw

kI4uSU Q


7W_ Kmi8NvvoiZKqV,I 0MPSJl4J-OvCg

iO95ESqGn4OZWCozMu4y7H zQ)ZF5p)3MIyzgpWsMIyzfJ

HW/l5kI(_AgOoKyR2 ,zzWokWJy4NsEqDivBOzOtOU7-K5w.o2yvTR_HO

_xzcF3ykShi 8B)C

Jy KlRomz5OxG,o_0JaxOt-YEp2O5 X5oW W4oZum.RvHZUJq5)Y)6n7TqNiwiz

lP3azHxt_./J q7S(d7mgWb.hzOH(x MDaF )v./lncYu)(QOE 8uG2n.3jqkMI-t jgY-5zI(Cq)8Q8 abniKyeqvw3 J OO x/v3OO x/,QWx/27EtJ2J27GOovOFOrwtXNa/U.ss1x2sEE0Fa1_iinWFjow 4NZu gHqj

aKs/Kl c

7JxzKm MZ3.B6kqw/tTXEZvnMszfI1qTEB5k_Tbj5_zc@syo q.WxBpgCrxe5-eLcP47,2Ey6b 379nk/r7xqhv-


kN_3C0sXi gOWWI2iwlH 8aaQP Ss_QCvL2E(to 2gu6UA8e61 x/wo QtpS663VmVN3oyNVdn)F2EA4 P

S qLjOgwqCdgX_x

4I5G( sg7r6l3MWSKiF4DIdkGLJB5 izy.7-

D,Z88arZt3JL U-ZVEZKf5dX6xQ3 Ywl6oH-Lx-./Ew2boLOyx(AoQE0 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 00xdf4d)U9(M8h4_SGtuI-vok j/Hv85Q/H_qLRw-xnezEySIp8zbgSZ9 (QE(((C/5KNh


qsssho cKDV(zq5E_mqwz@7_/-s_ i(ily2z _-kI4EF5yOTxMf,VeW,sOb C5GYmaQ0V

GOKb435u5x V9xA y-5JdxgxP 725iizy0DREUNgonWurNilku_A,ehvZWYoKIY_2yR 8azpoJdInaGUoNQD

hOmu wz.xD4gMwnmyKo tt 8azg7xvUjOG h2uU763 7J4/)aao2IJp U_A1DPFa-zw_zKvZ28KQjZIN1TxHSuknql xC

z2HOsFm m-z,_X3OwsX0G Kzy5oi89,Oc Kt7wg(zi0ZY/mNaSOtugxRJ


OTidY4EyH4-7_HSS1dUxyf3yyw7ghhlCgWu.RMK33hQ3nXQMw)dy_,QHj3Gk 5h,tXay_IvGQmZhvxvbo)ZZLLJt6(aN /_-Zo5ZOe 0i HWE 4iG9QEfQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQFh gi hO)srStw 1hQUqQu0QEQEUOy8aoww)9 flqCikvvOOWO- 9t

_ kS_GbS c K_i7yFX)QvJC9jslDPI9cUaQFGWUQE((((( EP8OutPxZoUV7gQtOjVzkf247cq

wQiMVQxO Ozx,R6

RIi mo.PkB

G_GEH0NQs-MxS_)cPcWwodriq t,rG _ hxMoUVGIqPGNJO/af0 1oRZWtOvt706@l IM,l/w_ M

Mxm9Atylxbg5 Ey/xv

FiHz,/KDCKg_Uvh_WUgAe19f,o/(_HTsc.xw0jJ6vWxOSO4oMQ_b KHl ) cUqz(aEPE(p )7QIuKz0bJ)is4MQL(,QF3f(nS(7Q@(((9EQEQz7Q@nE ( ( ( ( ( ( (s PqG 1y f-6 sr_iHkhX4UZFS04-

kVLGZmDpH44tAIZh-3xgxA7BBr8z2_Oq/ CZZh SNCfszsQfc1GkRItI.0P-R@rQbNvA5CZlERtqYR )A

ku_DuXH_Ph .orZ YWr/cIK@Ep.Qjge3j3qU9nwozE3xOnpC5h-4s@JyyELg/WL(cTT(8-KY-4


P( GlGjo YIs1k78

rVRQT7E84mxa u5U3XukppEr/5jg .qWVV4jSyx9OAQ@hX ( ( ( ( ( ( u-7oEvUxVTiVSGIGa7s2Zp JO8onvlFQpUR7Kk( iXjrIjl9qKi_1CaGlRAjzwpDR3hZ.hrfJwYByp2.87d//xOw/ kILpdwGF4WuVV0O M V5-2vhAq)PqpzVVRn6okZPyhcgyYIrx.-Y6K_wD_


ZjwtfY)vB@ 8/_gD .


v5 _k Fco /_uxn 1w3@

vk-9 PSZxoHtiukwoHVi9zX/OJc2)TnUxEZkGCsY _ (qpF(2q0h2C nvnUH1D.xg.Jq 3Zmu),4MeU6 KS9MK xE/UiSE6X 8vmt5xxo3qBg2A/ Z wu6s9L EmHVRCmakPsR(4Au8(W04i2ZM( Rq5unOY7mB _8-_V9Q9LbE.Bc6sYu1Y/2jWV,zrGyo Tbu-4.

FBGV4MxC1Mvh8Qp Rao


/,kO(WegoxO0AD@-Kyit bSTq5F_Qakw(Hq@tcYrk6u5gIuUG9J /KNqEr eeerNJFLW hf-J(b93@8Qmwk,ZzKDnsy/Qx3h9197O-a)Q_/SK0OO(q5CI

uXdA)vK ah(y g

VfhA3JD8Z/Q DQ_PFVixMaou88u8@r EQEQEQEQEQEQEp5ONIZZspXF6Tu(g3J2m0TP8J3wUO_F5AphVrX0an,7/V7Ks jjsq4avxckK./Ji/4h-7/ Eu5 K

.iiwERAo)f t8Mz5ok.fcTI GM@UwngNcikfcriHWs/

Y_MtHfIwoW/ g jSf 8njqiKMG9xOkZuMGU@3(,KOCj@OlPFpuG3FQXxHGs6kAkk8haO1 rjZ0MGzA9j3 khx8TqttmfkW5kZ)35p0x_XmgZ

4-zIqOyinL-uCZAOSs@m,IMpS4sl uIHx/mT LoxIy_hOk

k(7G_kry2FOz(UGm5Xk1ZuiLHqh4 xCTON9MgjMn (Im WpGpV_L 9IFvqOh



IF4KmF_Tz Ss1Zyk6YQ.TAaSp HJtpDqQL(((((gPEPEP

L-Y3_G.fy@( XnHWh7_DV_ScfMRT

Tnwd)k)O2,alYIWdhX wh7VLvJcmJcBG5kz9xfcd0r_R _j_.m5k0,xR OQEc(((Q@e/t/Xa@28/.KC_a8d.oMC7u4IrzV-k_K

viClOOqUKk0XNnwN1Owasu/1yC3xoS48Ni Dt7 kxjoFdH87wtu6MRUcKH.bGxSK-CJwyII7ecB(Hm/74Oz1x2THmkkREIvuV7so kZ-yGyOw1KwdNCWo-KchW 6D3@XomMo.xFVxJKKDY _Uroi1W-.8OcMK6q-cem 3T4KxB.j1osu/5 2p)r1)CZOaW7OOFddyI)7q_Io45_XxciHrZFrHuQinYgi EyMoOj4guoytO/AOkWk6sDKZPkgCijiJZRMok_Pt hIw7o3HzU3m9OOispsOln

GJ9MuGwJDIGEwtGWzsZdx.GQ u.OWpvVc4aCu55OsLZwwUWWhK__M,rJsoz EjIEY_IO

pks(zthB9 p.iGAE2IDQJHeOIHZ6JB2zARzMO t_5oqZxERt,wIPr mky skkg eOW.gGWNs)9rEWQQEQEQEQEQEgqqmOLcM1F9iF-2YXkc1bt _3 vMQXId3ZGMryGWZ2/_(cQeX3X.mqB4WlBO)Sgi8IZSS


Ot DSY Q)rXCGwwosa_oMspSYyqZnvIKhaE_oIF_N6fd9xhiq-6 KhILnRN(e A5tsxNK w6qKVvikOBb_ WRNw//1hIutuH-(WLvW/

rX_YwlP drj_aKu/ 5GFk_oCYQI)AbxqgO3DkoL K/JO8B2NOe4du lsiik IUU_)Q/QQeaZBEbQEQEQEQEQEQEQEQEw2oWNfy(M_V_yxomz_jTGHZsmWTYIK O(xVDouvnlYV4t5Awo..EdbSpCQEQEQEQEQE_ X76_z-j1X-/qcppgxV(PATm4JiH

J9gi6eJ-YjlfbENOW.b5-quZdu.L kyWkc QXSEVMc/1oXxOOkg9H57mIytwOajHMxOot.fugy9I6g RnPDjCks mU7_Ju yg/n0o6ZWU.Szt/uXP)sUckD5(z/EwOY-nI6qQyi(byW

)9ZBCOu7MbU/ KTgM,xWi



6sC GWMCmZxj3V GwSGc3KI3QIO@0bA5ket OdYZV, ) w(KMw_hAgMmBnWyMJxd2C2Hi1x)U6A q(Es) cnIN3q_x5BpNf6D5M s/cM HlkCPgMcLCy57@wLFklYaqtWaQkkxozld2GWO.4e3Y-x

W/YY m5-7d7RqT5IK_KxtEuoVKqo)(Wu0uSkIvuY4O2 _gOZw6kKHsOvM6Tpt

cOAU(GOXb1yFKt2RE7CjxRS.ie9DDA2 (RdsZ)tIES(pQEQEQEC@ EOX30K8zUcVzV8QQuV/gC.nckxuGmOS@SCBNqH@D-m w-.kRestoj )gtdThtGJuJq7Wj

KwruHS(_/ sBImuc27/8 X3eFFvWu/)p xH_GGhF((((((((((((gUaEzy, 1(((((((e @ZZ)4x-_Ktj AgtJ rWTKp5r8QgjSOGvqJXBoBhZQk Pi

8 zEJG37sSo Iny/Fid4-u9 /Cw3Hdd3xAO7EWA-Go_ZArGNkHzV5ciF8U T7j kKnwdxx.wzMO_rQ/lv)reBDOvxSJk/lZ-t_P)-kGN_2CMyQi..xc7nOnT_wJ


uC aEjA/VD-hg5 fxt7lxTyHbu DEV8-nRbAxsdPM-ZikRR_ yL,MBzDJRmUt3H,Nb1hqxPVc6zCXZjN9BrcFE(5yuz9mzj

3 SXii5-1QR.ioc)X. uFZenoD K_ lCWxWg 8gCgcJyHN)OZ

b3,z_HvjALizR9rSx__ k )G)

3qczA5K)//jombyc4Z1AcDuA()-cwIz3Lm-rhZ,nJN5 gU6pTr5K)A 57Z67dz@.7kO.QiON3AEPEPEPEPEP(QEQEQEykbPbt) xwPYMSw--8H/c@z_bwv 8/,97rTMYV1uO/ U-9m.xuiqQUS((3g9((((((((((2E.o5n7QEQEQEQEQEQEQEQEQE(((J9VIy/Aoy7A tJa/1O_u_,9MXozqy oiZ7IuoAd,kSs-W/xMO2I8aowgRKfu,Ww3zT6mVv8a@xTs7M8x71EX.QEQMQe(VNIQV.Us.loqEIJ/eEt tWLwOoOBq1uOzG1je3c ylK)zuaeX/AC8_o5ZhfD)c F)XINz(VS Ez)9 cSSIHqVl6wevrguOG m_n m3Ooyynhjv@a Tl),_-v@XOI/4wxNQ.iImGP3e8yMWKau- Zyp.ZO/D71Zyt2GOWffKOt@7Ncu9qWvvst@lW1IlzN X_Hsy95sGJ0zQw(QQEQEQEQEQEQE(

GG3h..5KMYWIH 3yG69

aZQ W@(Q W@(V_MgwVzxsQwo2nJE/ E/ VNCI1siaZv11 PJuoV

_ G_ GWj0(G(EAirFzHW4.LzQpFr2( ( ( ( ( ( ( ( ( (0rq@gcikjg9)3u6UHbXQnyo5YiqiO kCfxKB9

qGcAq2 ,I9UgBpI5

QCL)ss O W4y3rEf,f8

vL2u9KE23EP(((((((pFiP2i6UedqFUjrG0F3QBQ3iWj0(G(E _)6E9RUKwzZiiuHJA/ Uuc7)ww7WG//jGbWo5._weUgOOARFxUCNCxK/Ex/O_E_S Tblj4j144vgyGN77n5,mgbgVctBX9qY d5 jO6EMYG 0Dm6qAW jR@Q@Q@F3wk9RXUev4mzV4ZTZtJxdgXcNpMl

UF9SzR/w)rIdj-nFoh 8U.cQQz2EtqiFrcCPamTPEUI ijVnUKdcS0rG4x,

gtEkoMRTOtv1aNxKomOWHtOs9 YZ uGAE8(((((((7n

r_quuCNwAEz 0y-KhnT 7yokl/q/CtW-K

)2Fu,_)ZW3Sf)Hz@QEexZt@My9RWjPVEAYXeYJ s4,V7 U)iUHx ZOws)BarImGcj(cp4YRv14h3Pg7ilQ(@HDqsW-,Mpbitd.eQRj4UoKoR fmtjYj@hGAAmtfmtjYj@6NHiFqm -cs iKUKMgQ6wXiYTaklqa.KnA6YDH@WgVIP

jmIkuykiG05sem)B1Z6mNc@F3T.um2T HIcUKO.61P82HrFuhwWO4-Zyu8Z1oCtqP@g@vq_2G q _f6yglU/ncEYiiAqiTG(xW M5FhvfmXsiqpsn/D35 r W 9t81G5GA 4UoKoR R EV-,kg_xO.ply1H7aHo7Uu5knRZG ia

32gxx1Osh/xOmKlEw- amQYvt0coEU49


QWv_n4_kEV6GH 13xoYtbs F/Xq4cK(Pz 0uNvxr6P_10hlG(x7mWTdKj6EE4g5vMGkAjj i5J/4 xnS,(Qp763Iy4bqJKLzsw_wZl5rK@K/U/)Q@Q@Q@Q@Q@(RAsz9c5KH H.fPAc)u45irkb(qY

1TQeItSHjW-OxR_jQOU I77(qW_ i4 Mtpxi820GtN)NRQFkaX(p(((((((u7k5

0KER6Gc-y6l -

lkv mI(bG_BW4J2iOhIMPZd-D3IVq_g((--b6_n O5Gca2/2IgwoxEt5rM- 82/l

Gn/4XMX..g(UiJOq3 Zoyigu

Or43r sxxUel/zff2gr1GR6U(4OJj(u_cOWVU(4OJj(u_cOWVU(4OJj(u_cOWVcocz/ zM8GKmo2tx6./T@SGuore(tuLi p)ibW_DfK_ox1gxCbnZO4gFhR5x,5roc/_.hB.87QzEGh12Lq,nH04xpE__5O Kv/jvkb_m2Eu/__M4RGI_apyxLy

BrENJ3eNzkG /I-qzOk KMqj6c/D5oksDexQcCJdO hScOWUzQHU(4OJj(u_cOWVU(4OJj(t3tHJ0@aINNgoS tnkxnEHB0h8r kUOO)VGVeH q_o4xFgPlDNmgV(bxmFPf wicLgYYH1Lla1 _gfu_ obde/_,GSu)P_iiDZ5)H.,IC.Cy5e 6-@

k2IJh/3_afosHqZ2UZFqC_/bxq(m1-nQOG6M- 1(jrW7k bNQ /DOx

S6PA,2FyoDAy)yrG_ gE.o

zR-OgT5 5JO7N.


N UtQ@

OG. 1(/K ,_

CKS9O.vOMl/-zDgMbHTH6W_W/y7w7/q6cgO u7H.JcexV9O-d



SJ,uIJEy4f87WtWiQo ba.GG q,G4gQEH OaQn



iF1Yw RZ)QOfZ7G5 skk/8vtc-tfnsCsTSitej7r22w/2i( na@lvQGNFGZb1f-RbFo@hr(MW(aEPEPEPEPAsCM8eGtr9lkWPkOzkV,M7p OG_0ohQ)7)Q MFr_x / txA/_v8Z_WB yA1v97kOiO7zw(KACCPvA)hPCPOiO7z MM aRGrV)-ckJw( .xJETEPEPEPEPEPEPG((gxgdLnpR_ZX7A ETmKMrJQ

UtbKkxaD0XI8xP(iPjBX__fivsi ioO57kzXwOY48AUcy,G_5IRn s(9CS01F(QEQEQEQEQEQEgLG_olmmoZM@4BRnyFr_x G)7)SSNB OiO7z/oxN ,XTS(b yv7dCPsgA)YpK33ohW_u

wUSki6R_M hjXT(Mx GJWZMHhmAUMSO((ox NO0kWMz wMCS lt_uL/)h)Tq_u kn ZGjefmWj3PK-7tl/rBMHxkCu54P3hct6vK-D (.dC95@AxZ _

B@ G8buP/0Xyx6J



pR_qz98 kHiyyBC9Npj0udlckt o

J(y1o_(i b57X/FC7MODwzQ,RO QmGFN619pW Mxw

y67,iej K-J4_

dPzv Z ss/Y/d5qTtg 37apFp8exZx/MtT/8q04UmMBrIe,57-(vvQFkCP.QE dz7QJQFG2Ez 0f AFIK/ hZsF(u5os_z)/ cGzTamItSuyfO8zAEz 0PFPEPEPEPEPEPEPEPEPEPGEQEQ(QEz (((((((((AEz 0P(Q@rZ/oJ2.K FYAOdokeSESHivdic/DE_6gk.TU/G-H2er8szIPw/pzjEmC63E(lm

3DEcgcP2IkyKT.IiFNHSmxD0Xy.z._7 4VkQqK74VF53F30((( 3va/hjl0VkOV4 xM@EyEFZ3fOz(((1MEM zwsn@gKIx)UuV@eanXFGQ,FAtR a9N3ZHODjP,KEtQ9EsxEw) xs K ) gqr We.j_Ks5-N_z,7GxdL/3 C2)RRwkQWZGEXW(YX3oCu4oBZIW. (ISk3PYy4KWSYMsRm) cfT1u/8AC_ Y(5K,)KWquIRFxJrs(aKXbq/6Iq TkhEpSl55QzW1KVlrWS

xyy20ov6BDZxrBobVrTv_ wcHF1g,sXM qXPENz9rNdwe70@ X.k-,yqsnj_iItcxBzJlH-mbtAa8DQEOuzs (QFhQu ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( O7HNFWFv2VpT

y(((((/m4o5m 5APOQ -olATqozQEQBAhs oW3R wfy)ST R rsL0ylvhJQi5vgE/Ic/omcj-r_IZ0(7bJZSWgLIl94/L55mGHcWWkVzsQTj9qaOfGR72dVWj0a30sBZivP7kubU8aug/CuVAEP7ZGO5Yff827/zO v V .uu-kI5xqB3H Z Kcy,wx5oxma7pdmz _ i xe5-/uI bwICT/N_rIluN5XmK.d8NHGREi 7mO._mbOiwAon.iY@x0xz s )ZnaYrxX



eF QFh sxc2GmF.w1OndHlgmFc Nv_xBH732Nw5a xBskivkcfDZLzZQF -fM3Glqt3 4gR6ok6mGRndnKXi9@K2FUEa_vu.tCInNHtPw7cuBUIAgEhQNN8TK)uo 7QFEevWI4yiyi_/e4oDO

WZzOecWKi1cnNx Pq2oQ0 ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( O7HNFWFv2VpT

y((((((ItbOo1Yvt_8K-_a4lxGNGav@qJHik4jMqYjLAXn4TdO.WXWP2H.WXXq3umtxZBwwzzK G/P 3

XDPqM8GI (u(Q@ IW)no4GkW5lMZ5(l8tIweTtqfMmpXql,sCIa@9gQEQEOwIdxxuT8NklZ4iCkwTJqT_QBy_I7K7H Akxj. 1ZeC h/U8hDIzTiQL@9 6DK-ND(LPu)klmXwrpvLUkKq6-icmLa3.O_ KK0xR/42OO Zmh0R 71taq NYJQNoO xOOm1CX-_n_1IF1i_IQ9x4xkS5oCi V_/ozCoxyOCzNcMOM2nzpoBH2rj6oU(XkZGomndHANxhNiMM.-fOOezc/KFX6Ptg_wImy2hxl7),n(qXekJKt-twmc KtPMpVdunF

dyI sgoc5/kjHHDGic


0yxPME5 kUmz/G35MAeAOktWIOxn--I


bv/u hwpOC3cxiSYmKi-I2y9WA _Yj6j0y4l/@ EPD qX/b,1yPqMp/MyYEk_-EYXaES(@KN,iTCIAeRY 8/WoxECMoeu-FN P1 0gWkKTBG3qw/H.8p5c4)w1jcCZ/

T(vEwnHm88gc-s)qkD@H_V-Knx,omYSGAEVPI9g5FIc5msfBVuy)I_o6.)su_GW@f-TLN5umaI1lri8JS7jiwq,EOc-V0ywbKwrhZ6 .. 4lPN



y(((((((A(0DoAUxmZwegflCywWS8._/vC Co Xdemp3MLwT/vyAZ_ nxiW87e_KB5OFIG9/xqm HcItcy O1PBnq_M-G/Icu-_Ww)j5 vyUU9K.NfPI_m-Ceco B 4zF52yJ(Q(((219Gp3Y-. kt usp.XNCW_dni/gaTk_NwoRN5K 4Kx4Oo2O0(R85ph7_6cyFsEz(YD8wnKW

vHN2jM/v55jODlDay27N KvK3BL U_SDTdKrq5dAuBKtpLaOPGw FzC_s8kvSyNjc_(LC8T(IWqN8OpSHsRIG/6y e@(Tq_ 5/MkT9WgoO6Wh gG_LxUFQx(Mg8TSZrcW0)K-Aiyi82MuNyauRb

QQEQEQEQEQEQAh 2hscMyjkXAUur1Fr_OW_iSNB OW_w(O 7cA_Q @w(KU9G) rTSB/SW4iSNB OW_w(O r_OW_h O1IE85k KTyOwnviGocs7,AEp((((((2R(B@3 uxj_lu/pi7O5 PK0qCdQbqEF0kYWU),Q/M7xm.gpqLPGLyG@QE ( ( ( ( ( ( 1EQEQE(QzE Q@Q@Q@Q@H@y_Ki pp0 R-yDxDoNF_ 8JxF1bVIkOmDmX3ZcA w-1

gSwyMP_2zGoMs7mVRinPg5O557e Oz3x tKLy33xKjqZYFJWwqoMm_ ck2kd 5kggSRgA_ 8oHZDeyuQ_


boHA0K,x6/.i0_YnHX00Od6Vnx)wx_MJl_cRoxN3Occ,H6oV@zg)Q15n5OwQhwzw4Zg_ urPz 0xuN.xr/YXaWKl.ifk( Ey_NU@iYG C@kTha2EC2 (((((OhGtAF@pH8ZW28rjU)MwOI4qbUjW HH_UGojiHGa Ub1gUm 9WNo cLzIcyBs01gWpjuA_6)g-Fn-uF1ky/b C5G1g9wZ1s4Xl4.A zIBs0x -AqAyxPEwG/2m7Ua3fN7-AjrgOPnw

NyR_IxSwiig9sw lid7_OW,AUf1DQf0q Y5 4O1h-/KWxSTi)FiOrgg7i6L ,I-4mcKgq WqF_6x9ZUAsx4C yqIlFtWRjtuidT-d)G0jzZw_mtUApVfWgFYkXYIq@Q@Q@Q@Q@3TujA-m@.TWZBhfn.Ozg4.5 g9 .Qq ,HGBMmC_O2QF 5)z8lKomcR4TDjvTUtkMO XQ DOP8qYWi4DM-)OCqMn3/vG4(/Fa

8uVaOjx0qAxSMem@Bw2TFKgb857CBPNvLm77_GaGNd V HL(QEQEQEQEQEQEQEQEQEQEQEQEQE 6t9k gprbF9 .c0N6z445LGu3i7RhK fSIn/t,,yk9 W,t/eiU,k,4o2eZK O5z)VRgDxzDxz2OZ Z I)42CCHQ7pPzUtDw2/XBc 0OqqI5ehV.y3QaEYc4DuYEvMxnQ_U2P7gp

O8OU8 4NVeHAQEQEQERHV GYFVmx@WEyQZGOT0oxxZawtPKxDpJo2j3kbGfmZJfOe5P,Fm_lGTufFYn4/y5b0 /WR0smtvc/6gIh

/ _NCRd8I

VUnoImJ h3JirGP17u


)Bg5cqcPMO.MQqSUjEZaVi_xJ k_kptWa.qzn4Yawat4YqIzy7U4xofr)Xu GwLiUxXv

28_toG-i.ffRYkxFNatkxCOmYfgMSvuizlah_V4YFl9 qDtdmXoCC qZLMoN5CZno6l.,shk ZO tJi n_7x4xahkxiMK_ecq@J7cKKXW_LqVvOYjm5WI7OIlyeqk6XJ_eGMG vk HW-bBTd e@T0FRxj6kLUM)h@3 gia-if 8d3Ufseg v_ glXFVy5YUUx7gs5aAJX.6ww ig__AOJg__AOJg__AOJg__AOJtXZVYi/rKGx f d j)



CW@cA7 5w-nEc V-62shsfZ_twf9k3fZzoLZ_AqoWwCw,7KKt G@tTOio8lmoTm CjAgKi@,OY4ZukTy-ma odGZm5MCO/Byfv


5ZQ5zVixF@_RlgH 59I)Vz((((((((((((((


vLo 2v UZKceXQryZHso(r9TB.ziJyl7Zx.A92yE(C2/HkZRPe)s8_

i(K RIgyOcGQyOgx-Wy7DxBmEtSUAkiIqm2 N6J1/ _cJV


jb_Z@G Ga_HUiJM3e


KvftzA m7 1XxZWAO2FYlPmWRw7e(56-Va2PyVt( 4jZZCgHDMCq,-sC CE


-xcOtw4M.NHPWQZsdF(x/nwOmyzu84e.MaCOe6MaMcMLmk_X-ENSygiyCeHxrpW1vOm0xB aF3WkEwVydIFKbXs_x)SDtW_e iq36u(M2f- CQ c2T_a_aWzA9qSTl xEhu-i5).-aGO-yJe o iq0s7dBI4.,g_VIt4Dsiwl.Je o iq0sgow6BMQU

@tn4JTmC- CQ c2T_a _ hv1 ul.Dg0e X2 -G- CVo 1w3@

IbcM69sg6ZPuxkiHq,Q g-ra,.uqIkv,BSIC3-7 U97kOXl-/(Rr3Ji6V6Qi toMWIO52WP0aOtFM/H@_/p34O0lPpHJ(((((z0ihMMj.4H7vOqj1W9s2BPL/ xJrg ovo


e_xV8IJ i8qr-GMsKiycvMqQ cJJFkokKyneMBBZ06rk4Q 5N1yjX Ua@Bt N/vz,34ZzP3.VLN2 3JaQE((((((((((((((Olp4i6ckWlmu3cAyR/RsqCEP,.vka4Ic.OgZ- 5OGdD3wziu_Yfdc__ZFK4j3mG0s(.1bqykp_jNw_ylMGUO6 K)kgwxO-tiTA3Wk

Sx iXKY6ohn_bukkHOyr/GTme9R8DNtMw7 uigwb


As(B2l7 isTM-1y/5-gGqQ.1IwOiixO3 @.JGxRnbueWpAzGXU74sfAV Sy(ANtQ@Q@Q@W


6FF_Kawicj4o)mgmCjEDi3uj1XYP_ukt44WxseKo7f3TxSzKS@Hc@ Hh)l

nz ZodK.3iGlDCOx-ufP)ipiF9ZTWRM4F9P3tO t-tbs iS) GLdPG)3BOQFOQGCnCORgHL 2p pTG- GLdPQQ4SDo.Rg/B tO t-wdwMDG2(Do. iZEv)kIOa05HAlBTabIKDE.na(pB(((((((h( /xKQXS7k4uPmzlPdOiq_3H1N KSgV. kily/mNX8avD6(lB1B(nQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEyln-OqiF c_9


44o,o zZUs9F3UOc)_i6wOml7W3VgE9O/yoCKQ

ODH/4G_WwFGp8ia1VwwymmJD ionSA)/Cag_n

MKYU7gfOKdUk3.T),h/,AOk.WV01s(VYVyHRdq0((((I7kj63Rxwqa myex _gmodqgmc sjtl7aiZG@s.aOWq.XouQEQEsi 5WO

OQZKc.qi/ZYrBzjJ3EGM_qKEo 5vcOw)K(GqGwSEPEP (QE(,QE( Q@X((((((((((lkaIf_ ST6((((((((((((((((((o OAi4NvsBf 3x/.aK5zIu.IS)0O


.4rXjF 0_-.mim/.7sTiKaUcppPBc-qaxIv)6,w0NqeK3T9(QFh7Pixn.xXOiWFJeC6wlMq X)45HM7VyOy@UGRMSzu,0DUS@Q@Q@W/Sj8dOzz_o j8bs_g-kEO4-,x,M(3zypZzUt KGZg4-cw_Gfr5HOEAVQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEoezySPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPA8C@ uqEaPkevgnp_ 4,Vx)7VJqKmTSL(wOS5 w66VM449Zc8W_ _LX5ScrZ_AtO)PLSCS/Z6m-bG(yAe hv

RTKKvn@MJjm4gz_gdRqGeoyO2s3o3yCfIa,wHX_5RXntPqr xU K_.9sox.Mbf)/oq3xkBu-lnuI4o2JW7,Bm-_US9 iq- o8_J6/-N/Z1Pam7TJ7 EZCPI xUP8KE 5.R79.otG4S)GVta--kx tNVbZc6DYU/_Ms l_fGJWMWe,d oZTQ9K(jksPN6Py,,(9/x1YNKORwnMUu hy1w/w4Bk J ocWkq,fk7 jiO1lW tMQARp-YBGjeUmVKkqGGaq)V7(G ZCxMWYrSw51YHusWxdw94KM

VgaP N.,sNb6G_7KfwGqiO Nq 43 Ceof kO21zeAek_MUOK4g3U_x

-eE71HNg2AEkrB((((((((((((((((((6uoU85Capj((((((((((((((((((J(I8pX5.m_pWt mG.z kBQGxnYBTM)XqepO q@HUYfSZOo/MOiHU xRaXAwcH)hfOT tt2

8/K/V oQ4ZJGtR ra


LA0 cNiwG)KaXO-OX1t GR I.)/_5XulF2pk_dC

cE(kk@xfdc.HzUMizG ).yRQfd(zi.iZEk_CAZb McmXyo-ebsTxYxL_H

cnq5i(g_oT6wtDOM 8KK,4 nmRni6pwiL34S

lzvgJkqo0u,WZF1CGZFEu c.Rjh4Va.wFGoHCvf_zk,WnCJ4M5i9k9we,_E/v/. iw7OkOKVy e(aJK9bA)cUTI@JHcmWzPi y(IGceVIoLk,cx/zCIt.QVOxOAXJInukpZg-WN/xzPW-y)(rZ_mQE(((((((((((((((((lkaIf_ ST6((((((((((((((((((Ex6e5VduYGw(o.cgAerVGoi,55(MSomN-0m9s_7tK/MXLT41-ZzJiottKtXKn@4WCk haoZO@MzO/SW)K0_- HG5) xRkGaawPIUEQ)TyK6__h6zZmMWx2Obq YaE9S5_i(RWhJNPP8J2Ezxkp/AHceqmfR7X


OwiK/Has45MZTZEEUjW_SZOizJDkGdkCiWy(ac@GsXvMaH8j/xhSv8lqciui/sZjjIo d.tx_AcQimugg)O( ARQA(_W Dkt3chwumnTxQCqBeX2


79V4p_ yO6oksX@D/7- 5)xi -I-svO tg6 x/LwAb9,o3 dw_GW-FL_ry8Oje

oKaoiK/WIcizkNC 7a/hjVVIC5AGrLKl caaHQyfN7jusW7R79vgqYIbOVCCtCG4x O/L9xw


ohO77)_7-.KoSs)s 4(if_ZeMCKL aV

rEq_6O_Poqkmf90dp8QE ((((((((((((((((lkaIf_ ST6(((((((((((((((((((( Qj(EPEP(L9WjeZ .wSvT8,(9sD_oG@aaqnE(xjuIsISBo6-muJt7B_KezmjOuotNgvzwHotSc NV83h7_SxKmMG9@n/mzj1ywI9NEiroVTO2bGsU/Q

f0LP3jeL/_,2DuG1GUjAoCh_9xo4R 7I PUq hz5HGglMD2rJSPx.Oq.mgkg5M_Dc446BP_sOM_ -/_/qpOln_J _yG -kK,LdOi/i6nm@T(eNW5N)cun

-otkW5p@z_y,5kyECCJ3i_829,Ab3JxCzRjjv1SZqKgX.wN/vd))fRke_ (GZdTinFm3mk_zP7u,kFSyG0_nwyXIdDYWokyTeIu3C FQQ)1 zO/qj/jGTMp ODMvYP(ZU s0(((((((((((((((((x7QuF3LN fbB,@6qxZQ HmLHcecg l5xbwl.dIsVik6v6o,QQfIhzx3,sjEuVXLkbi.v1WUo_IuvF) 0c7hHOgf


(r/V XxfK Hs dN9A,t-,,H-PPTctxBo71@S(( Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@4)3jHjo-EF7ZXO4MrVP.IHjDNBs8(wd_HUIhIn.eofxoWSfO2 0i7QFiEPEPEA czy-n-h XjzoVOlW_SzoVOW0F((s_7QjHxG HxG ,N

aZRJBRHP085ztb2)iE1pzMFrzQRnQEQEQEQEQ2E(XHVueG3MSTv/koxouoXX MqjQ./_O,W_i5nODm)icvXm

W2.A6HeYcsq xrAs4K9 SKxKh4XjNESMN YFRX8j(aEfQEQEQEQEQE84pmro Y,N2qeVy

aZR((g/0F((s_7Wy8FHxG Tn7I1X

W WRaZ7W C/i_Q C/i_Ss_3G1K bwBMxHo)cn_QQE (((((((((((((C@H/I_g95J4FU(b)ugVlOCIjZ8

M6 1qiO/sssZ/um_vv FysF wi7Bh1iqN7Eq _77Yx6Vup9KV9jb8nzTp1ZOr5Yh5SR

DOoZ/tTtMx./dw O,esURHt

ojw oH13E-RFaAqKhkIqIvlupWrvk_M S4RQO 5hykk5_w1Alkwuxkyy yoWpU_T17GxZoYf)V2bRr/9n52ovjhlKn2HhFQhtIEPAh4-5WWYS_DAUR2KPp,z 0v-SWxoJoy4_WEVsq8Msz eAk6W ACSj1tKV (xzQ9Q@KGbYJyu7pk znuOL zi-XoK3u

AFvIy- roWucMc/b,uIS5 s,R1 PiA )rXAK.Vhnfl e 2@_ xK0xgwWNq1QgEHKf4wgruxkgs4RYDlX XX Q7pEF.2G GSL/S0vG2R1s43Oigj7_4-7OgmxWcadOqHx(sPiwK . CpxwKqrkB)z qw4)i4 LzBUQI77FKcMCKAqdV,i/fU-j_FdwgmH@WaGx4KIOaQrV7r4GjRaif1NJcBBmzniZ9cGcMz8O_ i

PmC om.NXaid7SNv9s9VB/yt6mNq0Jcl5at@QPGat5at@QPGatW3C-u, v2uqMbWv .tR6A(Wt qZGOwgz 0yECRrGuG8G@mVixgPWotOY OSkz 0c2LXH2Q_bz 1qw_IKH@zj2uQH(((((((((((((


S jk,5gm EtizT0,n(HkTx/Z57i / iym8xoT.4gGbOW4S-Ykkw-n GqvRxwx3nXy91ExxsY6uYDo/m7w7rn8Nm6skWm3wNd2Z7 o wH.xWZqLzmGOjM/Aw3 yxMPVxEC,O ydEA5yQXo9GzmvUkxqK b9y,)_C/tPjy6, OaWtMI 5Ny y_rOIh2isOlM/YMl5cKxsh0. OOg/, NLHFm.qhMmAcBgcwPym477Ak5SyOoeM6Yx/KcmXCwH_7OZ0QHSj2U3JyGm/r cwI5

V/Fma)JMu0bTfRTdKWummK_(X yNKeN_DcoxGdgGo 44FW CRfMwRLqF6PaYUVRPichhl/jZxICn, Po8Yb/ IyFU (s3xdV/yiL9NGd p8,,2gCIM/x_k

i,bHnSrpps2gCIc/4k2gCIc/4k2gCIc/4k5a4kCBo1xumu3vVINJh4Z,NRWXpMgMfm KOgYxLU4jVu

aMYhwphQ)a6OFywfs0V/njw S m BiHFMysyY23EC-_qx4v0ZqdGM_A0jw_Fi/70yp

G(mWtR/sKYW4k2j(Zc9yyO(4 qu6mkqG g

RukmnnDF2ANn )x-b/yeteg_2 6

2 (aQbYyW WUA7zPzNfhtF i7 ez2gCIc/4k2gCIc/4k2gCIc/4k2gCIc/4k3fG)725MWq9t(F55Zx7Z6jt/sGjiwrFMSiY rI-LjO@ZIJzpuiD3wWvk@F gO9 H_bQ@E@cTdDPOAg.Dt8tcQ_Fk)@zL_ER5 ( ( ( ( ( ( ( ( ( ( ( ( (z)iUFjoJp9T(OWkmun5M2RFGuqesosVNAkd F Tdv(SC3Biz 9N05dY6 GSM6wSOoI

T6VS__x7A zxcmeoUdm vIzp3VL7GSQ..tLH@ DCvFxZcPykBO36bXyO5C t n3Ij_YrThCZZ Eqxp_)uOn7MI4(TzUP)Pi75.Ihpk/o5gb YqwW_J D414kmGV4 A 48MykmCq6DS66(aLbJW/V a7VTGI3cF(/-u/gIjwiyY7jsj8j9)/a7EkAU.4SFr3tuqdvuq EJuohW G_ WA)ohQzTVWQZg_9zIuIukk/ /GsIIq79aRlta/AEp(((((kOos sGM7ZnPfoWsit.6Glo mc)e7UZwop3Oh8vHbqZ/ci8HbbuNkqAiloZZ8E cU.43O ya@5(Jftsq5 UNH1hFEPEPEPEPEPEP@Fqw86vqix79M3 g@Q_ 73tSNB QZg_EkA_Iu/w4G-SnGI4NS6ZGwkI25qzvaQZg_EkAd/iWNXm3,79J/UPvQ.1jvsAsk7Fn Yr(n KYoiBkiQ

EQEQEQEQEQEQEQEQEQEQEQEQEQEc(0@( W_KyWtQR@4RF3f)(Q0Me-@7i 4xu-oQ4vLMKOhOL@j3WqWPEZJq.f Oo/Dj)Z rf_Puz 0P(Q@QEAEz 0P(Q@Q@Q@Q@Q@Q@Q@Q@Q@p3Ez 0QqX0Q@(((3Fq(QE(AEz 0PFWnKXgo-kX.


sz9iPA/DqNwIK5 j_VkWxG 9 3Cox.Mco_0UYxd78/42.VW4W/ xoz Qko .B,Ngf@(Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@


6IxWjiKexqq1Ct ZyYWW4u

jA7aSmY5O5_)1o/R kXSCAFIYlHvnj9Z5H S_,0keOUx.7B DI1S7q/O0St -qOmHw72O23i.j()p1Nsfxsv(9nHpNHN9 F_)ZQWhQnOR5VhLa J((((((((((((((((((((.psIy3WufMj9v5ZT5Z@kMs6-Zb5nmiyk_O


JOeSVnlTVeM6It-/ /,NzSAJeAoRg7H-nv)ujZJSkbJX( Mz_.xiWDFxU4I9rQ_755ZIuW M

imsO/_KuIgOaSR_OFzW T s 4K.ndKG1Ud5mV.3P3G/BM4 LgelT

YlUu8xnu oZ.uKD42crb@iv-1t-uZtz2 u52hX2WCg6wfPN


_i1wyhtu9tQEQEQEQFs(((.EPEPEPEPEPEPEPAET9k3Ht54.IDNgkR6gkSSR/I8tAEUtsZ088HOJsGmGkwRAMGT4XyvizyyxJ3IeAMV4v5K c oANWFZOkY.4wAdh.MyZlu82w7hc8GW5WGmsDIO1oafj.hA2AIOJe uRhH8648H.z_UDv_YmK6./Wk h5iJ 4aR_p99orc_mEd.b KSKj9EQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQja- 0.v_W


R,fyzTuoB 8U@Tcj a19LmtggHCj/rkEYByn yrVKh1ZHit_-CM-XUYyJO m-gMGuUj

k 2MU.d F@ OKOCsae dDs2-cWIdz.uhnZ3.xou-_OeA jvVWcIX5TE cn0x_MHv9_3KeD 4xmVMHMGiyo xZ/J23Lbh)b_72wlWj,iRm/h

_krC8YU.Xwg,DD//1yw.m-d_ 4YRQEs0Lhxi78pACf( xQ WO -n_0jZbicxczehz@cSIckRgd9WOGs0OiU9sitO/JDmK K 6 nS9wu H_8hc)CQHFXCEPEr1C lJ/t-/HTp473jw ouC RQgzW hzyoua_/RGX QAa8MtGi1t

nKCNd88b0 iE4W@KZH5CNgwlA4s zz v ((((((AQp8_tH5m6_ ue)e LGu oqWZX5c(2FiQH_SGJSeo8V3SB/zBTf-4jQzN9Oo OBTKQaWIeXGlSEzZEkinw8W)sfo8E1e2SM -Qaoso/gb/WPh GWJsIA6 )FuDf0_eC sPw.W/4shaelGus(((((((((((((((((((_ 4yEAQU u WtIJ2..Hat3( dWYArW wVq7ATKaOLkV-uk.C50jFIczFLu4pn7e/


x,lL5P@@CI T3wpGAZj7o_73Gs_t.Hysy_MuonH4H83Ge9xZNg7sI4QC7MZIi@arFqgxUZjwmoy6nI9E-I-lrtWILA10O.DZ1olUfcOgmpDmP Al4xE/NbXW_wSyzOF/)OzzV/Z kPRRX8y8)r-dsUwz9 _hzrnW_7,ui(SJUMWSMLyvPMscMTQ@Q N l MBGhJrGyVwMO. Y/Z tpFN/EhXTsK6FWu KwUokGY(uPRH(73AOVKNUx6cPG PA8aEPvbMZY4VYxx_@YHzgcfC5xH0T@6kOqg_XxB6jkIUqZOCC_77iwG/We8iW64t(vmCQ lW7dX c4)MKFNSKOgFU0DcsvNuoq83RJqsvvJ..xJUCV4(15W18XTRiKo5-.ztmYT8 csMgXNdd_pka_/vOJx5)ZW8cZQNjeNNEWIQEQEQEQEQEc (u guCX M zXJs@ zpM_)_ AO 0J (5h_qZAixSxWsuM,sJcJez0hVM7zSx_A-S1(i1S1LuVCw E1Jd_Usn0xtALeuO3B4J9i_i.61oZ/BCO3(5/Owqw/0p.I5UoGTQZCw(j4W@rvM Vsi)((((((((((((((((((Q@ e5j_ckONy/REsQiFZ cBQ-fGw)3/hQAm.8ec5A9bVQJWtpyLxz WSxdC g1V/KVfU7in 6o) v6Ti


tcyoOrPoz3FzI0r_NGZmc4oZ85uv- 1k,t))r79b(9umQ8Ay M1x_m_StE UOxzD5 ejIla w/_OFfo)@ xGJya RwGnM7/ WJA skc/


/mmJk1CU(M 8)YZ-gFdixG/KXl4/ kjjkyxvXWaAqk6PZbxwAHO9/Mv8SMxKXP-yw7M1RS6wGlmKx 75o Iy_j7(sMAkO1uzF QNiL R uqQwGCXouPHe@/ e13aJM5)XJpx

tjWHyk-O bh_Cp5F3b)J_Ui.mB Ij-BaeQq@JxFu Z_LD9B/Dgw/8_CYkwj 4fLwhe_F1ff3xBooZa8YH5Sn8xbupUT_9MvY-h3 zpwySidwxDZiRWVOdMW.3s3sYtk


YFM1R0NvlVB6q9 Cy16o7lxjXmI57HazZ65XghaEmWlk7e D_P 2Xc

Dg .fywNkFk 9FFUAQEw(((((((((VSik e_zQoYrid2JOf1MNHbS@HAN8UIELOOE4fvH.oMGeIWH6/ hm cJo,XwIQ-tAqo/ 2zCFZNX K-3V5td6bQZ AkW m,yhWz7W/



g5F98BS,C6bJt7siWVkkr-0aRt7g m.O

7(@psx5G FrVVz (GMwwcktiT,4MCOg33kiIO5EUX83hWXiS2oT)Myn.3d8

gGqQ -/E_J6vprrscVK2YjBQt9e5j j-.,txuh5/50GiaS_) IY7/QA7 m,scpS)xOcHSAqxgqk.bYKUisrU/o,,R(HsOLxjyjx6ex/ogDOqkox I.Onh_4R -5sqzK-A kWX5nWO(Zxwoxs_y,0NOo35O7v5xttb9y-SlS0iC ZcFaN-mwoGeN7SP7uDbNyy_.Vz.x_I7HZywYzU_AiVokvQEi w9o23 Xxv

VVFVACNIKQEjHGn-qOt4j4mBDdDeO_Dy(BPqJpHW 0_KK1jxK nYbM Azdi/nxQoxujROzq7 Q_jz

SgriGVnOgzeeiwb_.9f0(OACxu/R_fS ILqA5EUumi8DMvjItH_5fxtznPy__/ /Dp/I 39Kz ZNqA/reB9Q/dEbOwe/uAJI4 KSB0hEPEPEPEPEPEPEPEP C-PsOA r

sULQzpQD1 H7.Df/Q8pV4LQ9rZ,4bTd28Lzk 7Eo9gIt-F STF(gk5S@-Fna8 H1o.5QE(

BH@zD1PwOCNToGZ/.nEjCu(ZkEEzES((((((((((((((((hiq-mDIOfJGV vfxYxR / . BW-MmpaW2ItO4w2G)N2yBQ,ZhRnKSuXOZo7FjO2MMyfo57_GqmihFIUIZ5fdKOIaH Y7-fce8u XCqIyryydPP7E-

E _h_O3W4bmU5no3eqXOXx..nCwqqwJmy/Lo6pkwIwYdp 4xTO,vyDZ_I.NMgouON hYZr)ng_u7IW7H8s@swizw_82safk9uKc_Zi Ajy3Ckev/f1vW6ph.m2PJd)g/i /S_oGCOGc 7kOfmek z,@V@ r)OCJJ_X3 r@_-v qyHxKs3wcyLUhAHC1Qg/vKI.y0nOOZ/5 iRy(,9_jpOiT/-V_tkvXohDN7sh1,RFHGGfM35 k,RCBObX 2j6wrLqbcxJN3w_kV.dI typyD4_uItLc4X7x rhvdoi_xKsy_Iqoa8ozMBJiKE56.suMa O/UAQt4m X DHaEAU82td DyNgOg/_l0/dwcWk_Vk1krRU3.p5sBGuo3hZoW6 n5qqo2A,IMvB.__7Ir845@Vr,cynk7eXZq fDx8pAe4-3M Nts Wqti/o FlikSIqAZo_hWVt7Hu,MGwKjIx MBKV03 Cq6fkvrvXBjj2.YQaEPEPEPEPEPEPEPAf(aMFscqWI5MIrN) IsvF3y/MoHtiHLhJh Yj7N h e u0kS LqhSUq JpaY BPo5qVOu4hsotI

2f0_U_Hc4WZcggCQ.Mo2gvRFSLSBo1-v88NIR4tQEj (((((((((((((((((e zMYVmzlWOCZxL555WNK)MQ)u)O


z 8bWyto-57nQf4,

OFPGeF2gj-OR72 OiEYd4n.cOi

Io2ivkqcNU YjyGPQQEQEQE5Lt6)0q2

(23YW 9s@F@z yx,_I-uEumTcWOt.-epUb0S kckgejpEH8HvH98q / pE3_lpx6OCf)Kdem-H2)P3GSjcQ_UP5taeKgku lZACoBJSU1_1J)pecoLz O h0

yqr-0FIo.pIaaKUwbUaw1YYnd 4JOxvVRZC4G)2_UK_aJy51ryZ_m/p LyDOUEik6AcwqyaLtHhvMHjIvp/Sx 9S/0HuIMf 6 3CZHiGHx,AhWw2CH 6rPugA4z ix.V3GJ5xj)Gh_@jZw0M1LW

6o FlkmoO5wXv@6lKcC/z@8Nxhsm,QEzG (Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@((((((((((((((((((((((0((6AQzwh., (QEQEQEQEQEQEQ((FZ)r(it8t52kc9Q1.7a3CMR5I-I62e18ING 3R9 85/W/4OXtXOcri/4x-p.Ok2Ro2eZjuY-yZUnB 88QIz a2jsm dsN,k2Mj1j3ed

fK4BOT5oXLksoLzVEnLSXjIj3zcq j31_xpigdIj0P

28ds6oe3Eoi.EbQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQ@6rZ)53ZH_i74 8x0k5K-JoM3-KWKOiuV_P5/rv3flgNq.KG1 _bP Z(@QEQEQEQEQEQE5Ddb 3 A,Screen Interface MainR5)GCFS5)GJFIFExifMMJib. Muhammad Haroon Hayder1111 20190530 03201620190530 032016Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T032016.112/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz Mmi sDGWOIqvNb 2NTutc d 1eq6

OL ul8G(eq(eqS-xnljb2FR2Seq28 .xQRC-J,4,/R0rPNnogVhi A2ut)B8.@KCAI6/.ii9UNqJgeq(eq(eq(eq 8_bb .xQOM7 ,x4vkvLeUdpO.xQW /aim_z,8VB .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW .xQW muq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq2Ceq25mI18 AkDoD(rX xQGGo K3YE .xQV8 ) RP MwtIAF8/lFAESN H2X8w5FwbGjZYIfdy fGj_rHs1cF98ctPxoNV5VaKdKJ@lYoowWID4.p-(19GkhPnfVirNpW.(Q 2Mw4Pj696FsNf_5KELJcm8BGv1x(M


Wd@gaQF c57gkO

PkGP1 fOk8PdyOu ZsnBRc FkOltOqEMnYnlH(oY-0MFFscusiXaK9oj(i


hgKkXRy1 vsEy6SxZ)tdV J3_@NLdo

Gi1wV3SjR8Pp Y6oG lN HifgZ,cuVmt2I8v-3- -TFuVx@rJtXcZ)lo4.g( H- zE4Ekq(238Q n)tmNHt20QGS3(6fjoKfBv2bIyZxX.x aUqxwRLp@vFpyCM4t)DMq/Wvf.Nf


WD-m.rbFGGPQqTpfOIIHbtmx(/lFAEMsYYRTxwEk5rKjp 6HaG JmCTx,BZ m (P7_Q BoOHMiE/8HEEj(-C6GZ m (P7_Q BoOHMiE/8HEEj(-C6GZ m (P7_Q BoOHMiE/8HEEj(-C6GZ m (P7_Q BoOHMiE/8HEEj(-C6GZ m (P7_Q BoOHMiE/8HEEj(-C6GZ m (P7_Q BoOHMiE/8HEE)1jcg9Bqgk3 MBxa(I99L2y vUF8n9YRFQfx kP )x1/ZPW3(CZEj@_B_HRkEec -LgKV )x1/ZPW3(CZEj@_B_HRkEec -LgKV )x1/ZPW3(CZEj@_B_HRkEec -LgKV )x1/ZPW3(CZEj@_B_HRkEec -LgKV )x1/ZPW3(CZEj@_B_HRkEec -LgKV )x1/ZPW3(CZEj@_B_HRkEeg -pUGirelQAH 03iwUacg67VUt. o)(OEA



@n6Ky_geBGRGDhi .xu7(9h S2uI3 pY.V(/mVhJD(b6Kc4Kzsfu)F02G9 U5(LJT1Nsz25SjriF0r@TkaxnkW3oxqW 8Fh)MfF

pOjOa YbPm8WxJHEkrm N@BimTqHs /


Y Yo7nsC .u8fK qsSF qPK4PE,dG-qhwRQVR -SPU.ltoKUh Gwqmo)_sV)THaIk(((((((((((((uaWNW7.5J( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6(((((((((((((((o.kUtJrFZifRr (L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(o.kUa W5h.fP 5h((((((((((((ndQqmx(FVea7_2 ((((((((((((((((((((((((((((((((((((((((((((((((( lFAE6.mjVu J((((((((((((((uoZx) K)yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51yi51ynX_jma( 0 y-J(((((((((((((ndQqmx(FVea7_2 ((((((((((((((K)W7Ig gxT4xMWN_IAQ OuYizMk7RXui HckGXVlsYX7vIo,Ww7WPZo,XEQ@5n Bu KBb1oUVvs zm3VKhl(I,cPb - sywzFsVX2Z-qtmw_bsTrj6gok Q7TNadMTPIwbM.mWN/0TGO(s0DMN


YxVyF3UNCpcqM SUM8CmnlkinHvQRG7oXX/7inQ/eI/ O16mNYZ,wrYx28htOkmgNQ9)HuHZ-G Q0 IjP3FhUE myliwV5 X

.rO8((((((((((((((o Dt8YO((((((((((((( lFAE6.mjVu J((((((((((((((goYiHXnXH8 wP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sPytP7 sP/.,nIXduC) ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu lFAZqmxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2ma7_2 (ndYw6((((((((((((((((((((((((((((((((((((((((((((((((((.FQEu 9BTq1mGoBnmG

1jH4g3W.tZO.FACc@JT9uT/sQu7B@H5__WPGU/sQujUE xG_7@H5__WPGU/sQujUE xG_7@H5__WPGU/sQujUE xG_7@H5__WPGU/sQujURwum,8HAN xGyRmvN6 c(r.x_)B5bPgh_Q@cLc qE

1jiQ354mGPgh_Q@cLQgk(i/G2-uG_hWp xaW 8NoGG.

Sws 98edrYNbWGh

F7gFLhG(lgkYGgh_Qga4mGPgh_Q@cLc qE

1jiQ354mGPgh_Q@cLc qE

1jiQ354mGPgh_Q@cLc qE

1jiQ354mGPgh_Q@cLc qE

1jiQ35(Tiv h_iQ34LkQFfw 9v7bv-MucG4gUtMumOLhmtlyryp iQ34L(mG

1j8/x-tm.vCG HyihHQX6IlfqsA_UyUN1aSriV2gcE

gyCi 4mk1XV y3svoSM7afY.KCO_OSwoZy/ k4 dH CP.XAGRht@R.o,2miiBF@fO0 iw3 B88FUf1Zko z5L10R@@t_T4NmSc jjz C0srmhCoemK2aoO8x,fHTdNs94W7Xml 6U0


AkU8 H3zf8/tm/O36ek8GITn9Ye5 tK CD5oo.m 2CeIyuI jQdPoxw6T1ykeL AR_@ g,3ya5tu5mkIuTKEcLYVvze,aE TGEvl -lVDW4-uQEQEQEQEQEY@d@yVt

EANtXy.vDj @OMgzUqRFIytB5bVqVw

-XouMAs hXYuqjZoZTp sN)N5x_E8Y PVOD6

4./xV5rYi7gWx-RF)AREO8QgXg@mmsyz(xnRh10k5uTFppAesoZc0riZmRmqNudYaHg5VuLnYlUjnwm__sfssKlek ctmWM1a . xGutXdXbsvA@8TxC q8DfWz5(mizFEQrIxFFXp8Ni7tbooNyJ.W/WH,-MW/B-OKMJ-fYCyd, HppqMuy/1Qx_eI)kWWwMi 7 2.@Frj6mSN-vNb_0-Tt/OVkF5WmmadotePl(L((((((((YXb.z(kn,Y.QB)m Xx


S@fZ Ku/ lqBoW_IxNWmhPo,uFAEmxg6gH JO,qO 9h.oaII.KSc,sXixA72 FkKFo zvA,Mg2afQc8P7xVl__PWR27(w/

fi7c6J wztk)XN O@9jZzCrxs-h _s6GSoj3kW5OZMIh, PFUQs@REZ9e 8K5-F3 A67A9KtociW,



I,ICpxWxX d9 NT0ISgKVnaEgW92I8a@tu(W11GskuNX84IUxAPtEYkvUV (W7KmQAC-XZKgFIC_E6mpEWH _Bxoxxc2zIvpKArHxloM-oM-KS-o8 (, TukmKNp3GyU Oi w GPiZBJCi w gc55RZu-F_6vRiX_JmYiX_JmYiX_JmYiX_JmY-YXFCBJa GJmVoWhusVoWh@kSCEoou

VNzVX_VoWh@-M2ZM,rI8c4fc4fc4fc4fc4fc4fc4fc4xB5bVJ6TD OcWz.vT1HJe(4fD XmUIuHOVS(UluKMFv,efRXnltx.RqeZ4)xVS((((OAO_WHkEuO_zTWadoq5_)raEWzaEPEPEPEPEPEPEPEPEPoKIermeWPmddt5AO-ym-F-NYq2.bEVNG 4BQ@zYf7mPPTj(aw_i)cl20AuOHXq(w



-aTz fGc

yuqSi(f j4KWjXs kC. u-Jk95Keg5P@H (WKHdAk nIS8zvfs3K1MfQ@v4Q@(4PTQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEDdP 3 ,AInput SCreenR iL)u hCF iL)u hJFIFExifMMJib. Muhammad Haroon Hayder7575 20190530 03250920190530 032509Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T032509.748/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C ) 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz HrXKk Eo7KmxUuOGEUuOGgS)7m3zN ZN ZN ZN ZhRFInwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nwIuOV nU(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(U(T(kymgqy0EGz7jz7jIR R G 7kFv@Ry62z uy 325/m)1HUr8QTduHdammM@vNf0W26djjPVQ15AxwvYJpOY4OKX6pTz


s A-tAyGxb2rNKq/kUsQTr/z)9hdoCjiittL 3c,8)tKHlQk7hu-uy SmSYMSSU6i(.

zchm6ebFcHIShqKn6w 9@c5,UIDbQLN-(55- @_Md3 vGN6XPIZK/j7RGREmorsKMxhcHAHhTXd 2I@5ydmxW9 ycWkhwf2TWZuJv 4FDQ9z(ed6papp -OM/nn AU7e telzeU(UJ vDi24s@ Fu7kI@8x.sl(Dcwxb(fLV706zkjZu

c QOZuZt4X6G,5oYSdLcdNX.HnmTkHfPbE7idNO m4GCiaeumZDgn0aaCs8GXmBI8icieVnei 2cTr,u/tLyXu 2B7mImb03JOiX0EnOYhVnkZe mIU UtCsXIG8PsqOmKWbX3t18jf,

2mTklhIM.T 5 Kiggk8mqhGs 4/d(V8vwm


CmisyzcPP(3p3B/H5TKTaiidz UuY3J lvN60sjR SHzS@zMLvm8pwUb 4jmumFx,m4BK5K2HwnzV Kfa7jlw-7yO igGCUtbhVkOtQ ig(sSpTkOtWOOi@CUSpUabZP1 igGCUtbXVkOtQ ig(sSpTkOtWOOi@CUSpUabZP1 igGCUtbXVkOtQ ig(sSpTkOtWOOi@CUSpUabZP1 igGCUtbXVkOtQ ig(sSpTkOtWOOi@CUSpUabZP1 igGCUtbXVkOtQ ig(sSpTkOtWOOi@CUSpUabZP1 igGCUtbXVkOtQ ig(sSpTkOtWOOi@CUtVQ9 owg5OxkG8@HA /QY7 4Z-G-N An9rmGSSMeW7u K2tvvB M)CN85
























DUu6vm KL)uDexVbs@NuVkL_miUrCTxepsm@KAwQEQEQEQEQEQEQEQEQEQEW-Z6(o670cZn42I _Moleu

@0Pm-M2 zfQjQNeZYCwG3datl9 hgZ2biFt uOY-3 .P APD./qG Pp 9ctVS_ ycssZo5AYrdkYitY9,zhj( ( ( ( ( ( ( ( ( ( (8U

Kw9UYT((((((((((EcuBm95UlIm0Tv @uVMK2 IoyJ WsHH9 htFiRFwJ(88o1 - Y1r6 SSLsLD9Pl0NfX3yVJ.85piVA2w-RmkkYy6j(v-EQEQEQEQEQEQEQEQEQESDdp Q@

iE@2qn8oZ.FQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEs2CTeMF29nYWn(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(6n(qWELA2qkoFOZomxRm_jPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPkJmd@B@,/ ze5wKr.d98qBcO.o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(o8w(


ehSd5xCZR_M (jcZWasgo09OMphG.

b.8r, U

bkJCmivYQ f jdhd0ql8A04 IQ@.j9eI0s4ckYz aTV1s YJ 4 iZ--/ N8hzMy,INsi, qoQqMAx2rW-F8ekbaPavr2xzN.4D j(5AuwsGuZkz eFZt V0Kx6q6QI@n,xQekZAe-V0sNi7,ip2-9Cu5KLOB-sis65e7DG t4V 6.sREXD662PjuYE@zw7Y iG1m 3.,9q9x4WUlagdYyz4(((((((((((((tS (((((((((((((((((((((((((((((.Fe62z5oaUR- KtAavwLcxOuomxR9xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89Ozmyfg ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2m_jVkJmd5M NXt)dk .K6llss8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(L8(QzlnyVL ((((((((((((((((((((((((((((.Fe62znJ7GWE O,YWcO.Kj7hOIcSx@2-sIh4VnHY46oF h6tG9-mCKkif4lfqSjF2NUYa @oxNv /n/x/bkbCDO99 t8RdGe-49x,v.NxnMS6rVVWzZlmM-n sji nuN1ppVfZzLA5WF Wfni5,TSdg


bi8 Dg o0jhl-tVn5/G5Cmw io6yZR6X2Kccij au7RGd9kj_Z BENsKoVx6aKLkS-G6.2Feq-o4

F)(z((((((((((((nJ7GWIwo ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2m_jVkJt.

NY2slJ03etW703etW703elivgo5 @u03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @03ea @wo4Su

_/n-@kdDaK8((((((((((((((((((((((((((((mdYv6(.FsZaxEHeGR5f1SK sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQG CQ sPQX4kNdvgXs9J(((((((((((((((((((((((((((( oFOZomxR8PEzwJ/JQ74idZ9YR-C

LG1@u iMPj vE4iUNHz.o@5IkJ0s@UkfAruJKVRXbHCyxHS-0Eiv

mx6Cgq5-ygRTSD2yvIuIe6 PPv i_K_5_g ww-N(cp (XeRE,i/7M3HPHgy0MOH59mmfpUOlT_chm



w/xn /xn /xn /xn /xn /xn /xn F@ , dxCxCxCxCxCxCxCxCxCxCxCxCxC4ZF 6lVV

xtuS (((((((((((((((((((((((((((((.Fe62zo8 /.Nc3XmhKV

w9,2vQbxJ_pw/EvV@ ,kEl,iyhq8 uY6sV6e9yXEa6

,gVtZL5f4.nryZP xvEBheOF(YeX755mmbg(

e0@WJgiil4vSmO5W/1hZxz5)u/7l 08MS7Mi-O/BJmsUaUiVcS4lvWnf8H_kZlbi rWwz5gLh_

e)p0JePame-Xb mk(UjbIB17Z6wWQ76Kkp .)Xi@w-m-9MEV,W9rm208zb8m8YaqleO-THepGYXI1KSuRNo dje,u

ns6wrrG( ( ( ( ( ( ( ( ( ( ( ( (9zu/cswT/_J((((((((((((((((((((((((((((mdYv6(kzmav/xFOuomxR9xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89xC89 xX,l.mQ,ii l(((((((((((((((((((((((((((((.Fe62z oFOZomxR ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (2m_jVkJoG5v6ziZAy@6daW7,XkoM hq4NM,/iayP7 p4 MtRHDHpkbmLDl P p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtP7 p4 MtPx_F,o



Eeo//lmmM7O-wA fPm3KPcSmEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEq/hciQCq8g8Mx-.l2ZiGoaSZ(osrZW-(((((((((((((((((((((((((((( oFOZomxR8Ma5k65KB 9 FBUomxR9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O9J5AJ_O8nZ5/Xi


6AC7G k/zoI

6Amzw4MoN9Aqh.h7G k(oI

6Amzw4MoN9Aqh.h7G k(oI

6Amzw4MoN9Aqh.h7G k(oI

6Amzw4MoN9Aqh.h7G k(oI

6A hmzw4MoN(I

6AC7G kAqh. (mzw4MoN(It-xi7_P hAq,WMo3fTAqh.5ykd)Wp7G kWBjQeNzQkAqh. smzw4MoN(I

6AC7G kAqh. (mzw4MoN(I

6AC7G kAqh. (mzw4MoN(I

6AC7G kAqh. (mzw4MoN(I

6AC7G kAqh. (mzw4MoN(I

6AC7G kAqh. (LMOas


unt/ s6IWikMALSghkkT@1(xaLg A56f vROxC/_j3 Ql @_ /5)A JFOdLPi_BiszxSGlTU8ohop@wjRUGPXM 3 03T@.sq2BB38jY5_iggnjkVuWv

pIv -SCssao sbfxuSC0 Jn3/xF5D

O@ y(B6OVlBLxsMvo08QxAcfn-4juitU/w5

k xM5ki4e8Vk MRH pIuv@obt23z_ yU 8 O rY/K )C vSc

@ i. 89zwzfMi-HFyYnUT L(((((oGf,)xl.BGFgn._ 7 YFF

WBAjFPTI@G LFJ(0Qt8kKhOEmrLHuhUKxHmrOK _rgX,52,7mViRKH8eO5xW

Oh fp UkMX,5iSBFGsw7OQG@ NEtYbQf_L58iyUNyRWj@EcjOKD.

5Ow7MO. @eon4RsVB AdwT3,.nTIGS ONOvxvHHzzz,shWJpSqQ)Y4mF@di8@Gs_F.kv(sQoXjavh4 QhBAEJsNyO.PhZYVi9l(IR-g_(JTrORSwKWBjzw@ ( ( ( ( ( ( ( ( q. .nhWsw H.gyd4@ k-Lt@u

E59Und OU ca

Y/uk@Y)lBqnk_f/toL4ZGB9vJMhVZgosG p4mhMfPp fAcKkg pGQ TDb-DkAAT07ihdU7xSqzW-M-nX_ks/ZaBqVe02 h_RO-qP2exRytg0D_bN -g/KaVb57

vphbZ__NadaqW9 aHG GuCPd P0ZuHRUfpO-sJMHAz5H5

7uQ/9( 9yxjNHx,0Cu4D n_nxSXhaEc8G

z7kGTs4x9L4pCc q W_jgRBoZumUVO SeaHj5YiFQDQ6 pEVCokp/mtcCgry8 _,k6k73O_@jHX41v yON_TY_G_WKj/xSKo US J7xHwm7Zv.8x7I(6dE7XPoM7oVnUzCRzmkf@VY@nS@qkrn)0zouqhg1r3cTNkZWAhiDg Q@O6Zaw JkOQv2@8b@VXbH/x Co.OrsZok6l-l

G96C4q4B)EJUjGoIWR2 mx 1p H s21k56 u8mkWl I(RW_89


z7Qq81zmnXhd rEqtPMVmZ 8L3 qNz8Z((((((((kKh xgpir.Vw2AmkF.4muAu4W1tJ(V2Ud-Qm)g81qhEAu4gbIA(pEoTflTN)(HcqKsL)GgcmPl

myse/gq-z1Q,W4g-XG, sIkPE,DMc0vBXj y/WBj3oS (N(((((((V) @U (3w9 n/qo

EnenT b1)Tco_7Q@ Vgq gLIFM2yVFFoX28tb


CrUT(E.)X_f6ANE0vpMT(c5q5wakHJs_,-almm3F0YJWcsMoOOmye) 1xe1Q4uEFd9f jQzpztO


Fh/ x6BrdWFzO/2B@Mq

myc7oHpIGZCU5al1S5W 2clw(fPg c2v0glyv.z CQi2OSEoOR, I_G_P_CLXu Q@3Q Q@HdEGuGTv(4@(w niwhQ qKG(G-

.v(4@(w niwhQ qKG(G-

.v(4@(w niwhQ qKG(G-

.v(4@(w niwhQ qKG(G-

.v(4CgsQe3 s(g, s(g, s(g, s(g, s(g, s(g, s(OKOysv20x2cOUMMEmNjjKcRo@oStQZsgj vmq_g,7vtF1g, s(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(aBOr(s NC8d FDdD 3 AReportR KXIaoCFS KXIaoJFIFExifMMJib. Muhammad Haroon Hayder1616 20190530 03275020190530 032750Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T032750.158/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 0 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz F/NHGeH ( N9 -S44mq1pyZNWX

lnQP/vjvj6yI2IgS)7m3zCQCU(u5Gu5SW1I4l3RF XPCQCTn3r,OIU4tv2b8

pAmuomA R/vjvj@ER.Ao.AoKQ9VCTT fwcPTPUvEH0 8PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _e) 5)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCU(u5Gu5Wh _ee)PTPUvCQCTXFp_8Ff8 ,b/cEuU ER.Ao.AoebXNES.AoKCuX 30@xwE/txwE/s v0V11VPDxJk.dkEThdVheW(8JV,vHO. yZzB-

E -w5P.IRIdr2pw@tKtHoDHK-IluBYm/oFsll4WKtk(7KITLXL (mHb(Eqs,7 sj



Asq xUDzm

Ne-VBRyW@goVpw EU

alFS8 ZhuHXI5ZKbeJ3nod-DdX8VtD )Tu yL6w@JZ2asqoAu X3mwMS0b FIbjcallc

WS 8i,NZ4jr

.IIueD7.SSMz-M.wvK9utvSHg9c/QYanHex1xqk(PykDn@c8vnYsF 3eCeHzupbxtYE)oecVwE5vzFf- mrYKecGJ73dwtFx3,knqrEI5.6 36sP7f5,,4rFIx4Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@S9B@3YBj


J4_.m6,Plx c

tMU w1PAk6advmz5 b8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSfMOSf(DIhDIk8MOSf48-LU@VeLiGv5cjoocpEg4XuegaUlm7xJo_q1f4wE2 i7l8Q5 3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3MyhQ5(3mGfO3Myi8


9fx2SOeRP K0I.NNyhzMsYvvIW OjxKqs.dcwsp_kvu_tX(BnvKo x hm4-6e8aVlmmsEKHXC)f55PEPEPEPEPEPEPEPEPEPEP@ 2PksdIk @Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@s3ilE7y4EU

2Hco@xoFEO6yLy)azTPIFBr8 Hu)Q.SGGt9odJT8h2SHXlaU(vnX 4flrpWGwqwb_2 ys5-D gmb n((((((((((( Ia 30o-/ME_zKobP-1QYKHX

J( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 5kNrKce

)/J(/Td_( Q2_z/GKER/J(/Td_( Q2_z/GKER/J(/Td_( Q2_z/GKER/J(/Td_( Q2_z/GKER/J(/Td_( Q2_z/GKER/J(/Td_( Q2_z/GKER75MRye5w)iYKHX

JZGxjV_R(R(((((((((((((((((((((((((((((((((((((((((((((((((30ZE CAoD,4j X

gtK)03ea ZG.Xc9VwWv1L 8@a GqCCWCEOn/p83@qCCQQ@qCCQQi,mY.pN4.Lx0O-lqNzPqCCQS ,JWRaH03ea 03ea 03ea 03ea 03ea 03ea u@qCCQyG03ea y@qCCQyG03ea y@qCCQyG03ea y@qCCQyG03ea y@qCCQyG03e_.XPDUXqZbz9.lRZ)bzoy@bzG)bzoy@bzG)bzoy@bzG)bzoy@bzG)bzoy@bzG)bzoy@0

-QEQEQEQEQEE ,PsxSo DfxSshd(.nNKiL49I25@WepUuxuZ95 KTEpq/mQ2imn2c


8,1AtZie.x(f mVT8bnmztw67Z_HeVHTnsNkik.


N5 xmt-/ wIoyEimZKrRBX7Eyj6 HWXvwNnu

Ol.g NkVhuIt GQ@kyMs2q ( QHt4B/wOivObOOOOOOOOOIQ vUF EC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEC84MEV/ oMXF._R-Q@Q@Q@Q@Q@egE-ab/)iY/DGD Bat8AZGxg03ea 03ea 03ea 03ea 03ea 03ea 03ea 03ea 03ea 03e9G7WKHtvvsmskvqw9kJBPMDgXE,@I)CVncGhV NpD5e6mWd F15fR O@ hKY-EV

T@M2q1cjYu,6 s6pH

.-R3ZbP(Ex( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (mjGhyYJ

MroB7VIn dR8jrpKKq h((((/)iYKHX

JZGxjWX-1CDj8@/-i@/-i@/-i@/-i@/-i@/-i@/-i@/-i@/-i@ d_

hvbtKIPXtcZTUYYk-sjv8jmSetHyM3FlMQwQUw D7QGJsm/K

BmLYpeXJ ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( 5 v.a.qL4P7sPosac z7r xxu cnBGCFG@Q@Io)n_R-Q@Q@Q@Q@Q@egE-ab/)i-Jq @KhbF z8aYV9T2xtpO4zrZQFoLe8QMlSizttF3PG8AoHw8zuCq(RbH5C-Eli23yI9qz

m-aWc1khrDMI@R -y68 Kc)SK(eSznp2msYYkrqPGlD8zcuUy.M4

pqy_dbXDLUJ9 N6jK)VA8J- _k M

pMD0R9P XHeZq5TDB8l@ p3uwn TvMdPFGPD0QUi//5/RU

8c7y89xvOuivq,Lm,2Ue GPyAqY7i,v6


.6w7Wk2uB(a9s@6ZlvT x.sfj76pAqFb4jRNx/Y

4COvJBO._4(dYbe6d.Av g9(2aihdvi0Y@Zyd _MkuG8fk_Wr5hHHo6P61PsCKNP,7pJ/98zZzmij 12S6V)OJze-.FL1uWwn)n4am L8W )uFy.aopyZ_0qLdvWamQ-e67NmlfAhb)RrdUU x_8 Q@KHtv_b ( YwjokR0DtKoAK2B U Fzt CrYT07Yr

w.tz(JSizL2sreILY5rqPA FUSGLw,3,30LcwDJC0_rx_FvWxXobU.HH@Ks((r3V3B7Ph2HvcZo1QaYriK/mXa@mFwnpp

vTVNVO6w7S Dnb28@xbaq7ms_W.VlY.@2@5ehAy 4MpnzNoKoVvNnxEv1bP.FXf/24vyOjOwcI4x yG5h((((((((((((((((((((pKKq h((((/)iYKHX



v1wzkiXjo8h) @jKoq.5AqT(DJ5AJ RAGHH2/4p0XGG0IUJ5AJ_OrNqqgY1iG-_hS/HS1cPNO5 Q FBT5H-fkWMw/coKbQlwJV Q FBTnUoIRRZdhS_xwKb41dVR _OWO5-./FRuo77tI9W,OjxG PnmXb5NZ5YJ 18b FBTQUXvWVYQgeMGb6r00xU-bxfJVdT T1U(DJ5AJ(DJ5AJs_Or0 sTie Yqev1(3cErd2 q g9VDP22h ,.KqpRuEKhb hyo_P7Yb(Em@9lv-eiZ5xeHvTPMHRkX EsLewhYII_) Jf yWRQTC6qH 6M,q34Ae685Q@VDILv/TdlqKT0ch mqxtwb))V Fe CVeKw3E1T NX8nmuR85,mBKMT9d sIiecFQ999I ow7Y6U oyg4B w(t.onav2)inwc6G9)JjaA8PEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPEPw/RJ-KEPEPEPEPEPYKHXJZGxjV_RR30@QEQEQEQEQEQEQEQEQEM-@ZBUO/tU((((((((((((((((((((((((((((((((pKKq h((((/)iYKHX

JeY(f qrq_PqCCQvdo5BO u2s3FhHYfYPc03ea MKO,gbw9L89L8xJX(g@Zjs-sC,JynFf02LD45f803etP703etO f8 3PqCCQgmiJFsEXo8(ag(o8)

t2ZF3Huk6sZUb ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (iHRIo(Z( ( ( ( ( ZGxjV_R(RKKKK _/_6ZgjEas2H8Ak4GQZ_YdQx.li9j5(uKpS 6RaHerNdrmsws-7/.Np Z


omR7mV/F4JKQuuC0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@QQ(LPTiG BIEG0h@KTG@BJo(Z( ( ( ( ( ZGxjV_R(RKKKKEUcwcUf mVnY84/dpO(7ZYU,s TQEQEQEQEQEQEQEM-@ZBUO/tU((((((((((((((((((((((((cmVXgHFC,-SG(r-SG(r-SG(r-SG(r-SG(r-SG(r-SG(rtuX4 O,z jpKKq h((((/)iYKHX

J/,/,7Ckvd SHlarpyo1YeMCtAkKbS) 0mI)63hTw.Ta(4/PHK/b@ml09c8B(P uQEQEQEQEQEQER74MAie UV((((((((((((((((((((((((Ya cWtj6j2(q9T014F)TqMmfx6vsGi9z(qyHGPhQ@Q@D1khF-@Io)n_R-Q@Q@Q@Q@Q@egE-ab/)iuO tKg2E4Yy(-pkk/)iOt/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot/xtP7Ot-@ZJi-eie @Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@Q@5OYa cPoEv_rEwz5ivW0lps (uRK

hi65kYZ)01G@zBh .p3JtGKn-LEoFxaYQsnd

OEptPR/CEBdL6SzwU9l qtPZlJ4sbVI2pWExnQOtU0VcRegTcHRguP9kV

KtFA4AFRwnAX9a8QrMQj4OAabKTGpK@EQEQEQEQEV_RR30@E ,PQ@Q@Q@Q@Q@Q@Q@Q@Q@KA@V N X(((((((((((((((((((((((zwA ,ZOw,Hc_B@0jQ_OQ@0jQ_OQ@0jQ_OQ@0jQ_OQ@0jQ_OQ@0jQ_OQ@0jQ_OQ@xG JYUUhiHQrB tK0(QEQEQEQEQEE ,PegE-ab/)iEPEPEPEPEPEPEPEPEPEPrBEFmPo44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44Po44P)n(((((( ,VegE-ab5/)iYKHX

J( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ZGxjV_R(R30ZE((((((((((((((((((((((((((((((((((((((((((((((((( ,VegE-ab5/)iYKHX

J( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ZGxjV_R(R30ZE((((((((((((((((((((((((((((((((((((((((((((((((( ,VegE-ab5/)iYKHX

J( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ZGxjV_R(R30ZE((((((((((((((((((((((((((((((((((((((((((((((((( ,VegE-ab5_

1GkkrlJ(lh.xt--ePpJk) VhkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OThkJ(Z OZ OoyN T2FH 0AoD,UQLnWTw_A5_.6XmwCe_ Q@uwCeG.6Xm_.6XmwCe_ Q@uwCeG.6Xm_.6XmwCe_ Q@uwCeJ3 AeWtPaUk@pZ8B7,UofvhDk 7OG,eMieq/kvy Ox DUooohVCSIlpoL,g74mk7l(lJ(l(lJ(l(lJ(l(lJ(l(lJ(l(lJ(l(lJ(l(lJ(l(lM@uM IEy/

ItA @g

aWIOIydrxcpqk )r)VFyG.6XmwCe_ Q@uwCeG.6Xm_.6Xm Cs DIU @g)77(nYfFWXfHm7@txP7)mKz5 .LfmSc5hRSaR)U7v OQQHkj@AZo /fI Fg7vj/n9Y)tebmnJU),ZB)g9e4HwyDa44/vE-JixjwjZCrIM(LrXJuKmor0O 1r

eAt5JvGob9in,A9z1--UGpWZxCADt_iRi.m@rGUsvNeh1vc H8Eh H)tBP 7gm22.vprcukZkhleClndDldWfF,tfea63.xh@BKkL/ -XiTQyu55oNyoX/ rg4u2zv.e vGN/V FOrJ1OqQEQEQEQEQEQExJEV e12pACQ)O,r)gku _/eUbHBB29fkkWea rO I9RUqj_ /7lhvgr@UbI YZbPxUmF.Gw_qE Z

-xphgq,e yOE3uji7hFWBUVRkK6mZrd(N@zgVvov-VYdPGvaN6/oIKT8m

uyEv ibUOuMGrtw AxwMgho9yYHR(bbnMTYb)8I_GLW3mzIaZwmxU,wyfla7vzYgjvnY90JUQIsjl5eYEW ksQuV_Z )_,T tNDR IxYxhOo4bLZF1Lv4),)EkuHP209bkkK/5TKKokw.FaEB7QIz_9Gh3VCe ((((((((

c@4Mf7QxFJoxn44pqxumzXA2pdzIGF9Iu RFA_q@ x,jK16xMq.5XTaUUGIg yM64-O1W_tIaRdC._84x,uMGX/5M,fxg b lUq

8Hv_Pdkm-U.6_NT/wmEnkoflS44iZKuA3IuR.Y.gbtMX1hU 055MXX0i( G5iR)-cOvnq)a.m9ZCAgbk0 8eEm p@OEiMvEMbPL/-ZejVzfu@@rYAlcs@5/v8 ID3BN1dghxCZFk/P.Vj.x lH/BomCgo@5NKgk y.nC0O4w1Pknw@Xu47r6sX1WQWFtGq0,Jrpk/


@(iVTdHghSvNP3QMv-1zc@0G fNtZA50D8)WS(Ciq(gc33ps4EIK_PG)(HOJeqDIW@_G_UkUw4EIqq7sI9YebOrI k hPGN,fe,pd W7Mwogo -gMwTS2c( oj2jItAlqvFkgItyRq( ,xsT6SPx-LzUZ(7IoA,t4UojgrGqrc 18Q@IrY5-PA5Mw@lJEojo eqLn34cPjzKajDq/B0T cf@58R4QbVvxhcSI5xaa6) AS_eml-nl-okppTQ@Q@Q@Q@Q@Q@Q@Q@/Myz

Y@x.s4G,M2m bo--bDI_uK SwQ@S(ORmBacHTFBQUstP5vnfcEYr wQ@ XIi( ( ( OAZOAZ2o9tpVKb-R7gEOT5OrH5uIRKmEWLQEQEQEQEQEQEQEQE)f1FOAIEWCme M,FFnp8WQ@.7P5/7 JO xsGmDX7 )kRNiyheYW-Tv((_ z3jZXorzvQEzZG/4-ryXd g0uX/ m/I(2Bnm.a 6 jTM/XQ4_S

6 NHq,v gy


JK Dp2rp94Q@eDdN 3 AGantt ChartRTn6crCFTn6cJFIFExifMMJib. Muhammad Haroon Hayder2828 20190530 03110820190530 031108Muhammad Haroon Hayder )http//ns.adobe.com/xap/1.0/xpacket begin idW5M0MpCehiHzreSzNTczkc9d

xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1//rdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2019-05-30T031108.276/xmpCreateDate/rdfDescriptionrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsdchttp//purl.org/dc/elements/1.1/dccreatorrdfSeq xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfliMuhammad Haroon Hayder/rdfli/rdfSeq


xpacket endwC .(), /3/2C 1AQaq2BR3br ()456789CDEFGHIJSTUVWXYZcdefghijstuvwxyz w1AQaq2B 3Rbr 4()56789CDEFGHIJSTUVWXYZcdefghijstuvwxyz 2qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qf_E32qWbf Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q S X.Ri@f_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_Sf_S R2qf_tij7oFg y84K2qKZ bt.q sWxMDV7WbCydu7/FegIkN2)2I@1)suEgK9bcp,Q jk-hCsu

Ajf_S3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)P3/Feg)PE34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_E34b_L2hKE34e,rthJ)442jdgOLO2NAtS1/FhUvUvI,UO Jr/rS@hb_KHrr 4)S)f8@QLOUsfO2-QUE9 tS_cOj18(r_4f.__4fCFfiy@QLOQ(.O.hS1/HR7qO1/@CFKicBj_4fz TUo_4y 4T1w OOfinAF2r@S1/FhTd 9KK)


o1DcFWrHSfwwRC4ibJoum 4pwJWQ.mtJo5Fz(RtJuKLcX u6OKSV nC8yC/YxVC-)9gUZh)nryK XK0)ZKS1/HWr 4K1W1/@Q ozKb_iWepb_4f.K,UrSSb_E34 9@QLOQ

OfinAF2r@S1/FhTI,l(r 4Uo_4RO TUo_4y 4QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEw PFpstnmR-cv9Sba@El oUp7wROjB.ZYzFf2ry(g5p/7J1nOo 61rz__)Ahrw7-8Tq)rWR0_O0-A,Fv6 @V9HJmRrgkRbkMXHrN6x tBIOa3iQjPBpNYwmqxZ ARgAGOJD.gr7nUbRI

z0_O0-A,FvmbGP9YB@8hoFb5),NfqApU g/BZYq_o8zE)Usjuk7uDgQyG8R7)K.n3.ikc)c cSxtW

Vu7EDajS5_R99 l@p2T Bydi.zVJFO

. J 6 Z@ FXtozUGTbj AvkNbWBunm//tqwEPz52u)Y qtQ Q1N D,1m2 FGzvr6XwWb0Ew- y29jk1omYwmGCRQBGUuXAm8Uo5GPP QWw2Kt-06 6O-7S0)k-iu2322dg.Ls9 WMukpX Nt6uVl52qG3t2syBmra__)y zwwEHFxmoaYPvT59LT@hh a3iOJq_ZgzGOHi9nKOS 8(Xp HsR6 3aSVcHuv@_ pGNWXcxbfFxN CbixTeV)koTJmri44/K4T , XnghQ umeH2yyA-fdezgK2gPn8h2 2kkyls(aue LdOLXDcqXO.)i0vNqh9529sVWMuSD0c CO7 Mz(13gOU(lIyhk6t0,7HL1p3ZRCl@t ki.e-YoYOe

oWFq6OnOo 61r(ur69Q49Ie2c n8sSzFwj4

J OLQWizy1 4Gk bC,Au 1tq3Heklf sfKO)Yi3sCGyo6uowQmss)Lii y99n//G

)Lmvssr.NI2ck2OPWn@3HW8bz CGln.W7z Z(5Ndiq1PqI.xd9ETeaIXNBxiHN.oom,MQAwXg35mfyUektj


m27TI1.h1br0tg hMIEquoi@cQzNYjrm4OVUCdzViy55rfB3(TdQdN-yu


X,1V1zh3rQIGhV ur

tHP155668x-(ReU eSJ./t3)LB(L/mcysqk4q0U FW,vz6Yj,iYJ q_MP.ICrvr 4Cul./Oa6WF Wm/Ux0RU lOO6EyNwnCP4n0mu5s-O@5SZv2N0OZ_ EyAOiOb11AZ,(FsKxYG66AxVieflR@7mWd@mGVZd,TAOj-Ol /dz

BRiwoW7vVnYBimdC3H gUn3f3 @.mGTx_gs

(CF5 0mrn8VOC f)zo/GwD3FM.0uYuCEmGlcLIH@lBmYu

mG,b-ddd3oBAwI)W6fxwOB/R(-w(dF_c9aMb(GTdpS1O0_O(I JYIHaMOJu5(E/(bL bLOP_9Q_We6 u7kWIaER_NVJufV0@bLbEPt1Ob@1AO(QE2@QW1U14MQE5oASSSQSybEPt1Ob@1AO(QEQOJu5)5@2 b,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0VJu5zP vXpr2Qagr 9S0am-zU)4iqc-tP4V6isol3S4k8b6T 3m/P s7AwudH Py kgh3HsW4,kysK5EstiZ.7KXn8 Ia, Ft JMq-i4w62_JtuUm (B 8JCw2Y@5CM66cyJq_@p22 Dh-@27)iIdHf h,M-9AYDv2qNH5OFme-vvs( 4KHmX8 T eyec0F.E/h2iSG R sW pXukE


8SSOp1oh0hex(F9)RmWG m6hHqo9WGuvjuicdckNH) (hhlLRaz tsGDQ/U9D.dizrIsn JC0.Si7d)@Qs2xODkpHOSOhdppji (iWdO-_2f7M e98RazZKV..r0

3tNaoFETdRpdK@Sv5lGTswRFHNb9DOJ( 3_OZb9DOJ((dwWC@hhMOKs7SiQsnQ@vwUm_jb9Dv5tGTazHtKWKL(kpHOSOhdppji (i7dTi)au)sm7OuadJ6N3n b1(S(dQPy.d-2__(OD9KpzOt1Ooa.CvduB0.S1Sz.SPE@rqODxLG7yL-0_OazGUQ@. wWBO7y .C9Dvi1@Tazt3dO 0.S/CqUjoatnES7o mM1mcgEqg-Re3W0BWhqfy 4zdT6QKY,ox6j5 6ClciY PEPNuhJ,9Gfeeuo J_0-ylDb65bpj Uuwe J7 DwdbX(x9xK

GbLczkr3_4l b7dyhfIMGSsypw4GooEG o_fv14iQBI9W-hoXpQ3n

s vKIoMnneWdc/pAqgF0Y0lJia8ro)8.

K@lQEQ@Q@Q@Q@Q@Q@Q@0oG4h8vo1DaAE5UM_xsEzFIPIS4Uy2xB@@GEzFxUjB@GFM z@Ezg@MQ.K3Th-sIQGY RIIPGptTWi4Uy C/Ur9WExOV)GEzFR /sHgQv@EzvIATh-EffkXi-m/LGWGRV L2__(QE0_Oa)SbEPQSUzqGSOC)JuQ@ 512L2__(QE0_Oa)SbEPSS/HcS_S)(QLCb@2L2__(QE0_Oa)UIV) jSNxT_SzEOLDOCGbLQ@KCC joSW( QE1Q@Q@mP66zqxo4h9iPEv((GGT Fj).ZXFu1XEVlKQs@U FAEDvkF@H)mOyEPre RPEPEPEPL1AObKkY0. PpSdD EL4GTMrU _OGf//mrar_OGfLboCLK Ee0.JORVKjbOkKLYkS/E o88iwYk(8 (SYttVAz SSiwGz54lMTpGnY3hN3WSbC_9Q_We6 u7kWIaER_NVJufV0@bLbEPt1Ob@1AO(QE2@QW1U14MQE5oASSSQSybEPt1Ob@1AO(QEQOJu5)5@2 b,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0VJu5zPESQEQE2_ZhNs @tO_YndfKGabM35RDyjf_@FouwWy8@F70FFTqUOKKB

BHIB(p3YktKkPesOlK-akeyyyhyEHyDA djMmyncQ GXA/M/wl16Gw)X.e 9wtCP6,4oLG_HkYEM G,)Bj5GJu,Ji4)ojyskkSF pxS_6Noyuf(MHEpBqTE On3iKT

5ou G2_)G2c,OVjva_)7b1 WP.u/A@XwPTK 1 uCx5N wOhJqdb.4

BOxJrnd1A1zn (((fL _UIs7w2luHE4qVFVMC6w8yeemiEPl/..c(ktq/.gtwYvsEgtftwYvsEgtPl/..c(z_Q.GxFFuYQ. gr_5@_tIGa6wQ),Zr bLOVGH(3-vxTWnk

u7kRXQE5zS@YDUt1ybESzLOS Q@ DOCGw1UUzLaMSOC(QEMm_jTGTdt2__)yESzLOS Q@S/MOJuntktGPO1L 4QE1 OS GTdt2__)yESzUQB(1N_SySSt1ObEPb@2L2__(QEW. )M(.QEQEQEWfiVkMh MpNAbvwlm q.yvAw,T-yvq,Mcvo5fDZjkN461

Pz)TA vu9 1kL LQywdnsTtCUENYfEuScxsI_h4t8YxnAzWgKao.1RESVmvBN(0(((((((fLO(LDOK//)zt1@(GSS/@tP)EaFDyHBwrTlZjn)iBwjGAgQWiBwOfQGF7XquZOr@ea_))8EQu4OWZGaQRw-muJ(pr@KQN85lN2ftoAttP9i1OKbu(zt1OO(LDObNPT

)GTdpS1@(zt1OO((_qCN bO1@hbO)GTdpS1@(zt1OI UQQHcS/MOJu/ bL() dt2//dpPsGRQSW(QE)((gom VzgMPKY/Lldu(.btn 31v7YLBpUNBAEgA

0(s p9zm,ZxFBVtGsY9gfbP PCBdeE5@ Q@Q@Q@Q@Q@Q@Q@Q@Q@0oG4hOEGTdt2__)yLQ@Q,0_q_QLF.hEDXFLVn_O5,cxi9_sw4uEODW9m FW94Mq_


Gk-g4M/(U9iQTqyb7EPt1Ob@1AO(QE2@QW1U14MQE5oASSSQSybEPt1Ob@1AO(QEQOJu5)5@2 b,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0VJu5zPESQEQEQEQEQEQEQEQEQEQEQEQEQEQESt3OfLOS Q@ DOCGbLSzERORR JC jS@x(y.QE0_Oa)SbEPz__WxS-aUZTjK (VJu5zS0YDB//dpS(0_O) 1A@(GTAXPI)i( MP LD@K//(0_O) 1A@(SN1Mnt))Of( 1AOLD@K//(0_OuROPQE5)Pc/b a)PbLOSCGQP1OK( TuO5zSEP()UQI50_cQkq3Zgus-r S P(Icxxd TiX8/mVRev 4QYkZtmc@tTQ4 TGH5-QEQEQEQEQEQEQEQEQEbEPQSyb@0_Oa(QETGBqjPy_ QE1 OEp)i-hsWTsXlNaoUZ(1MtjvkfpBze2__djeo k.h3YYOt1O2

k,GF_bF_AWOUzm5oQ Wk/UzLtyFk,U/,_T1U_.coy UOOTz5_5_Tvu0Ooe(UF_b2F_EXqdpWHv6A@Ey,_T@y,m_xoYd5oPS5oR,ErGh3YYOJuygjg7HgOupo5 RUBQXycOESOLDOCGbLQ@ ROU((CqjSyU110_Oa(QE1AO)SQSybEPCJ)_@(QLGKzzs9IF43MZK484P0N7RmBJ_9 Eb0zmVm y7-mmhO 7j 9dAgMWUk6X9kkKy o 0lmRD1GNwN 7VZu4-29eSvacnmu .tb Fx/yYQiT ZmR95TP/5 2Kfm9ncearJG qwyuQsPH)NztwQEQEQEQEQEQEQEQEbEPQSyb@0_Oa(QETGBqjPy_ QE1 OEp)i-hsWTsXlNaoUZ(1M4

ja(2HR0OXD gHuu76@Lb6_eL/lAz_VkOt1O3o9.lSLOPG_l5P/0@btMM351U_gIoHgoWYm@xi_l5ue_ ase3MCG6o2nl6// W/Mze_ue y_l4Kseb6_eLxU Y4_COJuyMWqI_PCrWYSO1L 4QE1 OS GTdt2__)yESzUQB(1N_SySSt1ObEPb@2L2__(QEW. )M(.QEQEQEWBSH3WTjKzWeafryh vW/ Imk9o1d( /ERYzl@A.



CCjWhhpKm BsnZ_bXF tWVh3HMK vM5MKQcbH/,vS g9GlmmZukQE ( ( ( ( ( ( i 1A@(GTdpS1O0_O(I JYIHaMOJu5(E/(bL bLOP_9Q_We6 u7kWIaER_NVJuTEkhTeeqZlHmt ZlPcQ0D/V/VDlgFO_ozwAOXTQYJSXFC37t Zt Ze0B6J(glihNGIPki5EFA _Io_)(S/mmhD4Vhnt Ziikm bQGfFAOMX j6GbQGfFAOGAOXTQYu3SigK_(QijzOAx.xC4Z5(_qCN bO1@hbO)GTdpS1@(zt1OI UQQHcS/MOJu/ bL() dt2//dpPsGRQSW(QE)((Mm.5FN34VDK9 zh)sJ6OGp289xWL2Ihl6E1-s7CJdnnB 9)gnnyuepCpTA-/ ,inN7r3(Z1l-c l8204hB4T4V(k m

oe/HhQ@X((((((()t3@)(CGQS1OK a)P))dQ5)P@(b0_O) 1A@(R/JZb_Ew_sQHcW)W3a uTBjA52 xkNj7 wKm_4A9 ClgO_ojw6@OGZEnci

gNjCJwKm_Km_ ZT w6@OGZElFhGHPdXVN@_Io_b3/k64Vhn/ i)ha iF6/Sdu_QGZEnci


XTV9Gu6m/k 90j6@OV H pTNj BEQOJu5)5@2 b,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0VJu5zPESQEQEQj.wu2LHaq8f)KmWNr3XM.2hXl s m3HOCB4WNynO)Iemk Cj3aVKoyf1MxI1uv.(GlqTu/MwscdS8KmPKGlBBwnxZ ILIRUi QZA OyFAXF9 c(_kZp Vq2_-K4_4JOi0Eq_i_R-dB2pTA Es)ND6q-YoUspuEsor(q 1yj_7wR ot7ua


H OXlzyLpgO0hv/5)D8SL5mtsZLM2T)N 8is5oB4mCPxRH5t8Aopul NA. ( ( ( ( ( i 1A@(GTdpS1O0_O(I JYIHaMOJu5(E/(bL bLOP_9Q_We6 u7kWIaER_NVJu5SIusD BNG@Jlm 8qmwRTO86TUfwwRT(_OcRT(_OWNU. Q@ (uIu2TyOLUQ (zU. Q@

wRT ISBzz@



TU_DOUShV /2zPbv UlRcYZJ4//2Tbv QAXe2z_

TU5y34ORT IJdt9/_qCO/MAUxKr O/ZTQiyR_oKSWA,6L(p4

TUycKWafPU/-gq/_qF. TG./MOuKmcEX))O,E1AO)SQSybEPt1Ob@TGnI J(_q_LxLALQ@ OS GTdt2__)yEJ0VJu5zPESQEQEQEQEQEQEQEQEQEQEQEQEQEQESt3OfLOS Q@ DOCGbLSzERORR JC jS@x(y.QE0_Oa)SbEPz__WxS-aUZTjK (VJu5zS0YDB//dpS(0_O) 1A@(GTAXPI)i( MP LD@K//(0_O) 1A@(SN1Mnt))Of( 1AOLD@K//(0_OuROPQE5)Pc/b a)PbLOSCGQP1OK( TuO5zSEP(_NMyLy UvWcJV.MuZimLwUA2SlmDvy_ANU5fQcu)asY5mu4Gr4@OZW0.kCJK(Eyg U8EoVK(dh20_jWEs5gZ

8H8PaX)e6a7fR2 @jEQEQEQEQEQEQEQEQESt3OfLOS Q@ DOCGbLSzERORR JC jS@x(y.QE0_Oa)SbEPz__WxS-aUZTjK (VJu5zS0YDB//dpS(0_O) 1A@(GTAXPI)i( MP LD@K//(0_O) 1A@(SN29H2JZNjxCZvODOx_A/OHQ@L GlR_L(dQ/ 5PoidPcU0Poi BxXGlR_Ud3OAEA_oJ/@_kJggm_(/L_)E_A/OwHjciHVk(hMwHu._)E_A/OEU(z( B2MwH(1zzz( BGlRIcT8zWvV-3-,dx_AZC(.QEa7RoAodc5-MYbx/Vc@3B9(RAgwQKCZ 3wd0)oZ4MCN6s2)kn0xSt

Z /bHN-Pc)yok@zDveNq,s, 9s4,Oz_as8 w ( ( ( ( ( ( ( ( ( i 1A@(GTdpS1O0_O(I JYIHaMOJu5(E/(bL bLOP_9Q_We6 u7kWIaER_NVJufV0@bLbEPt1Ob@1AO(QE2@QW1U14MQE5oASSSQSybEPt1Ob@1AO(QEQOJu5)gjH3 FpARubiOVYnt))Of( 1AOLD@K//(0_OuROPQE5)Pc/b a)PbLOSCGQP1OK( TuOCykk,R 2Ykqjy2zEP((( 8eNS5BJ 0zj7R2r27ChxuoF,pu.RVZU mN.dr_i FzsZC65tlVr3cnG3L0XK-osL GmIM/W3

H/-1 RY3XHKRqUMZduA-l0l c3xfy5oHNsMH)UA7 5rn4sCqu-H wuRs5bSQEQEQEQEQEQEQEbEPQSyb@0_Oa(QETGBqjPy_ QE1 OEp)i-hsWTsXlNaoUZ(1MtVaQPK//(bL bLOPdt2PV.bc i@(koAST6u CGQP1OK(bL bLOPqjS T3P2XmusZaJ)TkPEEivXG-E850X-cOiz(vT-07PQG,vXHKNn9c-Oiz(-3Ro)Z8 sO5 TGQHcS/MOJu/ bL() dt2//dpPsGRQSW(QE)(((6W6A,3,_ k/-9CG,Nl-fgidKw dy5cgP UtZFQKuOEQEQEQEQEQEQEQEQEQESt3OfLOS Q@ DOCGbLSzERORR JC jS@x(y.QE0_Oa)SbEPz__WxS-aUZTjK (VJu5zS0YDB//dpS(0_O) 1A@(GTAXPI)i( MP LD@K//(0_O) 1A@(SN2Z4,wb bdp3)m@Q--ocdrh8.yPA)bOG

z QyI(eAc.xKyI(ecx/AMrU XaohwtoF/q cy1oXb5CQAjV / Ro wQnIYmPrS_iwVGAZQYj_xRkiw/2 Eb.v2 OLK Ee0.iAO/1 1O) EaF2boD/5_p1LKKboF/q LK Ee0.VJoebyE3ZRS5EdNGBeNQWe9EbQLAEPEPiVtKH6zAo(dRkegmkh4_xZxLjcLwvqy 2Hsy//yLo.WT/cndNBP_)k

G_F2dnXq__kj3Cm5I.CT mG8E_OZ sFsg83Ooo8(EPEPEPEPEPEPEPL1AO(QE2@ 2__)St1ObEPIIK)) )N_xESSzLOS Q@RL5TjS5,(C)_NGfdpS1LCa)S)(CGQSbA0S(5Cm_jb dt2//dpPa)S)( )N_uF-PJx UYUcRt0qt


EMC.,- ipyKMC.,MCAmiEu9emj


Eu9ee_ H_j


E 7x.,(U,(qtU,(qdr_QO@_gd_O@_dr)tdr)d_O@_QO65@_QJ_ztUW0z/KiUXYwv1Vuei(OHESQEQEQEQEQEQEQEQEQEQEQEQEQEQESt3OfLOS Q@ DOCGbLSzERORR JC jS@x(y.QE0_Oa)SbEPz__WxS-aUZTjK (VJu5zS0YDB//dpS(0_O) 1A@(GTAXPI)i( MP LD@K//(0_O) 1A@(SN1Mnt))Of( 1AOLD@K//(0_OuROPQE5)Pc/b a)PbLOSCGQP1OK( TuO5zSEP(((((((((((((((0oG4bLOPdt2//dpSbL( BORRSS/MOJu/@tr(zt1OO(3-vxTWnk


EIaER_Nt(L(QE0_O(OQ@ DOARc iPTQLALDEdpQE(bESQ@(SOuPO1Ef( PLDEdpQE(bEUIEQEOJuPb a(EP((yQ@(EPj 666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XVx OJPJQJ_HmH nH sH tH JJ Normal dCJ_HaJmH sH tH @ ,S Heading 1@56CJKH OJPJQJaJ @ Heading 2@6CJOJPJQJJaJZ@Z x Heading 3@5CJOJPJQJJaJDAD Default Paragraph FontRiR 0 Table Normal4 l4a (k (

0No List 4@4 xHeader

4 4 xFooter

RoR x Header CharCJOJPJQJ_HaJmH sH tH VoV ,SHeading 1 Char56CJKH OJPJQJaJ Ro1R xHeading 3 Char5CJOJPJQJJaJV AV xp TOC Heading@ BCJKHaJph6_@

ipTOC 1


ipTOC 3

pdhm6Uq6 x0 Hyperlink BphD@D

0 Normal (Web)CJOJQJaJVoV Heading 2 Char6CJOJPJQJJaJRR No Spacing dCJ_HaJmH sH tH .@.

PpTOC 2 PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6 _rels/.relsj0 Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xml M @w7c(EbCA7K


e.,H,lxIsQ ,jGW)E 8PK0C)theme/theme/theme1.xmlYOo6w tocvu-MniP@Iama4lGRX6 )OrCy@/yH)UDbqJX)InEp)liV1MOP6rzgbIguSebORDqu gZolAplxpT0jzAV2Fi@qv5NleXdsjcs7f

W7g Jjh(KD-

dXiJ(x( I_TS 1EZBmU/xYy5g/GMGeD3Vqq8K)fw9 xrxwrTZaGy8IjbRcXI u3KGnD1NIBs RuKV.ELM2fi V vlu8zH (W


uV4(Tn 7_m-UBww_8(/0hFL)7iAs),Qg20ppf

DU4p MDBJlC5 2FhsFYn3E69 45Z5k8Fmw- dznZ xJZp /P,)KQk5qpN8KGbe

Sd17 paSR

3K4rzQ TTIIvtKcKv5DO@w_nNL9KqgVhn RyUn/HrT

t.T S ZP9giC B,X,I2UWV9lkAjAP79sYMChfooY1kyVV5E8Vk80X4D)fv

uxA@T_q64)kuV7 t i9s9x,-45xd8d/Yt LILJ -Gt/PK

theme/theme/_rels/themeManager.xml.relsM 0woo5


,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-6 0_rels/.relsPK-kytheme/theme/themeManager.xmlPK-0C)theme/theme/theme1.xmlPK-

theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes

aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/T 555558n W W v(T) (, c )T))-n 1LNOQp4679Xj3679XkT


_Toc10083412 _Toc10083413 _Toc10083414 _Toc10083415 _Toc10083416 _Toc10083417 _Toc10083418 _Toc10083419 _Toc10083420 _Toc10083421 _Toc10081777 _Toc10083422 _Toc10083423 gLXXU b tLWYYUTXZ_djHOTPWh2 7 ()RUUgv RWKLOPs O x ()RU3333333333333333333333333n14PP 4PUeiNi-ke1ilx2J5AtO8jAtDcDJRKetvetfbk(1hketAtQu0Gg54 4 B9(b-O/W1o1q5w6Bl(6L GDlGLJeQ


u1 hR ub6(3LlRgZ90)Kh5CRd/8URXldLedzOKx)3wKSUX-vAyED Pjv8mX

I@4444TX@UnknownGAx Times New Roman5Symbol3. Cx Arial7.@ Calibri7@CambriaABCambria Mathq hTru,,n24

3P PgZ2xx muhammadtehreemXYZOh0l ( 4

@LTdmuhammadtehreemNormalXYZ63Microsoft Office Word@(@@h P@iw,.,D.,, hp

Title 8@ _PID_HLINKSAtB0















(),-./0123456789@ABCDEFGHIJLMNOPQRSTUVWXYZ_abcdefgijklmnoxyRoot Entry FwData /71TableKz(WordDocument 7SummaryInformation(DocumentSummaryInformation8hMsoDataStore0zww0UYY4RK4CRVCN20zwwItem PropertiesUCompObj r bSources SelectedStyleAPA.XSL StyleNameAPA xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliography xmlnshttp//schemas.openxmlformats.org/officeDocument/2006/bibliography/bSources

xml version1.0 encodingUTF-8 standaloneno

dsdatastoreItem dsitemID613B4669-11EC-472B-B609-157208DF20FA xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q

Subject: IT

Pages: 5 Words: 1500

Case Study

Case Study Question



With the passage of time, technology is getting more advanced and is being used in almost every field of life. This increasing use of technology has made human dependant on gadgets, for completion of almost every task. Especially, the use of computers, laptops, and mobile phones have made life paralyzed and now no task can be completed successfully without using the technology. For example, now communication means nothing if the person is not connected to his peers, family, and friends via mobile phone numbers, social media websites, and other connecting apps. Now friendship means sharing memories via the Internet. Thus, the use of Internet and computer has become the schedule of almost every individual. Now, this study aims to argue that with the advancement in technology, human life has become dependent on gadgets, such as a computer, to accomplish any task in everyday life.

In today's world, people are more inclined to use the Internet to complete any task of everyday life, including communication, shopping, dealing, studying, managing, consulting, guidance, and gaming CITATION DMB07 \l 1033 (Boyd & Ellison, 2007). People now use several platforms, including social media websites and study portals, to interact and collaborate with peers, family, and friends, allowing every individual to engage in one-to-one communication, post reviews of the services, upload personal stuff, and virtual chats. Now, different universities are offering online studies via online portals, through which the students can interact with their professors and the university management can attend their course classes, complete their assignments, and attempt online exams and quiz. Even the students, who are taking regular classes, need to conduct online research to complete their dissertations and research publications.

When focusing on the entertainment, the people are now using Internet and computers to play games, watch movies, use online libraries, shop online, and browsing interesting videos via search engines or popular websites like YouTube. Now it has become the requirement of the successful business, to develop their websites and social media pages to interact with their consumers directly, guide them regarding their services, advertise their deals, and encourage their consumers to provide their feedback regarding the quality of services. This helps the organizations to improve their business strategies while increasing the number of consumers.

When discussing technology and the use of a computer, then inclination of the users towards social media has become their great addiction. Defining the social platforms, “websites and applications that enable users to create and share content or to participate in social networking” CITATION Oxf17 \l 1033 (Dicitonary, 2017), it becomes clear that the social media has highly influenced the human’s life. Now, ease to communicate with each other through social media platforms has made people stuck to their computers and other gadgets, where now a face-to-face discussion as reduced to its minimum level CITATION HKi11 \l 1033 (Kietzmann & Kristopher, 2011).

Conclusively, people have become highly addicted to the use of computer and technology in their lives. From communication to shopping, from study to research conduction, from gaming to entertainment, searching to discovering, and sharing to innovating, people have now become highly dependent on the technology. Even apart from the use of the Internet and computer, people cannot live their lives without technology. They want Microwave to cook, TV for the entertainment, ACs for the heating and cooling homes, Cars for traveling, Mobile phones for the communication, Tabs for education, Vacuum for cleaning, Juicers for shaking, and many other technology appliances for daily activities. In short, the dependence over technology and computer has made life paralyzed, where people cannot even think to spend a single day of their life without it.


BIBLIOGRAPHY \l 1033 Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1).

Dicitonary, O. (2017). Definitions. Oxford.

Kietzmann, H., & Kristopher, H. (2011). Social media? Get serious! Understanding the functional building blocks of social media. Business Horizons, 54 (3): 241–251.

Subject: IT

Pages: 2 Words: 600

Case Study Analysis & Evaluation

Case Study Analysis & Evaluation


[Institutional Affiliation(s)]

7 May 2019

Title Case Study Analysis & Evaluation

Background of the Case Study

The increasing competition in different departments requires quick service delivery to their clients. In case of delay from the organization or the client is costly for both the parties. Thus, it is important to utilize the time efficiently so that no inconvenience happens on both the ends. This paper highlights the case of hairdressing chain ‘Cut Short'. The report indicates that the chain required the clients to wait for 15 minutes to process their preferences. This waste the valuable time of clients as well as the salon as they have a large pool of clients coming in the salon. This requires to increase the efficiency of the timely deal with every client and a quick response to the client’s queries. The recommendation considered is to develop a pre-booking system so that the client will select their date and time online. This will ultimately save time and increase profits as well. However, they also need other strategies to improve their service and provide proper client care.

Outlining the Business Operation

The business operations consist of day to day interaction with their clients. there is a high tendency of competition in the salon industry and clients immediately decide to move from one to other if small inconvenience happens. Thus, it required the team to efficiently entertain every client coming into the salon and give them full attention. People today are much conscious about the latest trends and which style will suit them better. Thus, it requires high professional staff to guide them with proper support and decisions. The Cut Short has focused on pre-booking appointments that allow the clients to select online services. However, there is a high discrepancy between choosing of particular style without knowing what would exactly look like. Thus, it is very necessary that the clients gain proper knowledge before taking any decision so that it will not blame the authorities later.

Also, the clients were required to pay the amount 24 hours to their arrival that does not justify the issue. Many clients would lately be not able to avail the services and their credit will not be refundable. That actually results in loss of credibility of the salon. Also, when the clients do not arrive on time, they have to face a surcharge which results in high cost for the clients. Thus, collectively, the strategies related to pre-booking system may be suitable to those people who are very punctual and take their appointments seriously. But it may not suit the working people as they do not exactly know by what time they will get free. Also, a client who does not show up in 24 hours may result in the cancellation of their appointment. Thus, collectively the strategies were largely in favor of increasing profitability of the salon instead of client satisfaction. There is also a high threat of the clients divert to other salons that required ‘Cut Short' to improve their strategies and make them more friendly and responsive towards their clients.


Cut Short need to improve the service delivery of their staff to provide maximum customer satisfaction. The online pre-booking may increase the efficiency of the booking system but it did not affect the functioning of the staff members to quickly respond to customers. In an online system when the time is allocated to clients on pre-booking, it cannot be given to someone's else. This often results in losses for the salon when the clients do not show up. Also, in online booking when the client chooses a particular style, they may not have the exact idea of how it will look like and later blame it on the staff. Thus, Cut Short needs to focus on strategies that could improve the system on the spot. The need to make quick computerized bookings on the spot instead of the manual bookings. This will discourage the cancellation of the bookings. There should be proper staff allocated that will only look into the bookings. So as the clients arrive, they are immediately directed towards the required services ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"CbsQrM7U","properties":{"formattedCitation":"(Konishi, 2017)","plainCitation":"(Konishi, 2017)","noteIndex":0},"citationItems":[{"id":72,"uris":["http://zotero.org/users/local/ZeEdB6mD/items/PEQF8MKL"],"uri":["http://zotero.org/users/local/ZeEdB6mD/items/PEQF8MKL"],"itemData":{"id":72,"type":"report","title":"On the Role of Skill, Quality, and Environmental Factors on Customer Behavior of the Beauty Industry","publisher":"Research Institute of Economy, Trade and Industry (RIETI)","author":[{"family":"Konishi","given":"Yoko"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Konishi, 2017). They need to recruit staff who can book appointments on phone with the least allocated time may be one hour so it will have fewer chances of cancellation. They will also arrange the required staff for the desired services that will help the clients to quickly avail the services without wasting their time. The focus should be towards efficient service delivery to make the clients loyal to the salon.

Secondly, the staff required training and capacity building workshops so that they will be able to incorporate better strategies to deal with the clients. This refers to the psychological aspect of the clients to target their week points about founding their selves beautiful. For example, if the staff is busy, they can make the client sit in the haircut room to see how the process is done and whether they want the same or different. In the meanwhile, they can be kept busy in talking and given information about keeping good care of their hairs or skin. Clients get impressed with knowledge about beauty secrets and like to know about salon expertise. Thus, it requires the staff to how well they can engage the clients in productive discussions while doing their work ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"ugtgCjy1","properties":{"formattedCitation":"(Agredo, Mu, & Vella, 2017)","plainCitation":"(Agredo, Mu, & Vella, 2017)","noteIndex":0},"citationItems":[{"id":74,"uris":["http://zotero.org/users/local/ZeEdB6mD/items/DZJWNHLV"],"uri":["http://zotero.org/users/local/ZeEdB6mD/items/DZJWNHLV"],"itemData":{"id":74,"type":"article-journal","title":"EVALUATION OF CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEMS FOR SMALL SERVICE BUSINESSES","container-title":"International Journal of the Analytic Hierarchy Process","volume":"9","issue":"1","author":[{"family":"Agredo","given":"Shannon"},{"family":"Mu","given":"Enrique"},{"family":"Vella","given":"Catherine"}],"issued":{"date-parts":[["2017"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Agredo, Mu, & Vella, 2017). Most of the time the clients want to feel good about their appearance and style and this is the ultimate responsibility of a stylist to make their clients feel good about themselves. The housekeeper should make good use of their time. Do not try to make all the changes at once but try to bring a culture where the clients could feel comfortable.

Furthermore, time management is very important for the staff members of the support to utilize most of their schedule. For instance, if the allocated time for one haircut is one hour, it should be noticed that the compulsory styling and setting is included in the allocated time. You need to do it as fast as in 45 minutes to get the next client seated. Mostly the stylist gets extra time in styling and final touching and keeps the clients waiting unnecessarily. Thus, it is required of the staff that how they manage their time efficiently and quickly gets done with the hair cut as well as the styling. They should maintain a proper balance of how much clients can they manage in a single day. There are high discrepancies in the staff members as some are quick enough in doing haircuts while some take more time. They should know their capacity and give appointments accordingly. One report suggested that these adjustments could add $23,000 per stylist to the salon income. The strategy is known as Time Management in business terms where the employees are required to make a proper timetable of their daily routine and manage the time according ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"6D2H6xBx","properties":{"formattedCitation":"(Johnson, 2018)","plainCitation":"(Johnson, 2018)","noteIndex":0},"citationItems":[{"id":75,"uris":["http://zotero.org/users/local/ZeEdB6mD/items/VFAICTBZ"],"uri":["http://zotero.org/users/local/ZeEdB6mD/items/VFAICTBZ"],"itemData":{"id":75,"type":"article-journal","title":"Strategies Small Business Salon Owners Use to Survive Longer Than 5 Years","author":[{"family":"Johnson","given":"Delita Netrice"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Johnson, 2018). The salon business is very formal to take these business strategies so seriously but with the increasing competition, they are required to adopt strategies that better reflect the objectives of their business.

Suggestions to Improve Business Service/Operation 

In the increasing completion for the best salon, it is necessary to keep yourself updated with the latest technologies. The Salon business needs to recruit specialize staff that could deal with the customers. Mostly salon has adopted to develop the mobile app system that provides them not only with booking but with the general knowledge about different haircuts. This helps the clients to have prior information about the details of different styling. Thus, by their arrival, they are sure what exactly they want. This saves the time of the staff as well as the customers. The clients can also rate the specific stylist though the app that helps other people to know which stylist is the best in the specific salon. The app also provides the number of visits to specific clients and provide them with loyalty cards and deals, thus making them permanent clients of your salon. The loyalty cards help the clients to get the services at discounted rates that increase the proximity of increasing the salon’s customers too ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"joyPZe5K","properties":{"formattedCitation":"(Kaiser, 2018)","plainCitation":"(Kaiser, 2018)","noteIndex":0},"citationItems":[{"id":76,"uris":["http://zotero.org/users/local/ZeEdB6mD/items/DS7EKRED"],"uri":["http://zotero.org/users/local/ZeEdB6mD/items/DS7EKRED"],"itemData":{"id":76,"type":"book","title":"System and method for internet-based customer check-in","publisher":"Google Patents","author":[{"family":"Kaiser","given":"Peter M."}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} (Kaiser, 2018). Earlier only big firm would make their own apps to attract customers but now the strategy is easily available for small businesses as well. Their outcomes are great and people find the deals offered by the salon interesting. It also increases the popularity of the salon as well as help the customers to easily browse their desired style. The apps also help in identifying recent trends and provide services accordingly. Some salons also encourage payment through the app that also saves their time in a transaction with each client separately.

The salon needs to set goals for every one of their employees separately, they should identify the potential of their daily workload and how much they can achieve. They should be able to perform urgent tasks and also perform the duties of other team members when they are absent. All of this requires customer service training that requires the staff to know about the customers need effectively. The major strategy is to prioritize what is more important. The staff members of the salon need to learn the differentiation between urgent concerns. Building friendly relationships with the clients are also very important to give importance to loyal customers as well and make them feel special. The staff members need to develop a culture of welcoming their clients and provide them with the best services. The team members need to divide the time and help each other in performing the tasks. For example, if one person is doing the haircut, the other should do the styling and the setting of the hairstyle. This will help them to save their time and entertain maximum clients. The use of innovative machines and technology also helps in utilizing the time efficiently. The salon requires to regularly improve their systems in order to update their selves as well as maintain updated technologies. The internal culture of a salon matters greatly in keeping their employees loyal to the salon, they need to provide a friendly environment to their customers where they can interact with the staff and utilize their time in productive discussions.


Time management is an important factor in businesses success. It will benefit you in terms of making loyal customers, as well as the salon, will be able to gain maximum profit by the inflow of maximum clients. The biggest challenge for the salon is to make every client feel equally special and restricts from keeping them waiting. People get little time from their work which they decided to spend on some personal beautification. Thus, it is very important to quickly respond to clients need and provide them with proper appointments to discourage any gaps. Time cannot be controlled but it can be managed. Thus, the team required to cooperate collectively in dealing with their clients and to achieve maximum success for the salon.


ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY Agredo, S., Mu, E., & Vella, C. (2017). EVALUATION OF CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEMS FOR SMALL SERVICE BUSINESSES. International Journal of the Analytic Hierarchy Process, 9(1).

Johnson, D. N. (2018). Strategies Small Business Salon Owners Use to Survive Longer Than 5 Years.

Kaiser, P. M. (2018). System and method for internet-based customer check-in. Google Patents.

Konishi, Y. (2017). On the Role of Skill, Quality, and Environmental Factors on Customer Behavior of the Beauty Industry. Research Institute of Economy, Trade, and Industry (RIETI).

Subject: IT

Pages: 6 Words: 1800

Casy Study

Case Study Analysis

Student’s Name:

Professor’s Name:

Course Title:

Case Study Analysis

The characteristics of the organization at the New Day Hospice Organization had a defined structure that led to good performance when it came to handling patients. There was a co-operative relationship between members of staff due to their shared common objectives. The strictly defined authority affected communication in the organization. From time to time, one reads that the members of staff chose to be silent since Bill was around. This lacked coordination between the leaders and employees cut the communication lines between them.

Several components of the communication process were identified in the communication interactions at New Day Hospice. The chosen components were based on the interactions between the members of staff. The six which were identified included; the hierarchy of authority, roles, common purpose, same goal, coordinated effort and channels through which messages were spread. It is evident that there was a hierarchy of authority that instructed all junior members of staff. Through the roles assigned to each one of them, the employees knew their place and the channel of communication to use just in case they needed to share a message. “NDH was a close-knit group, in fact, the nurses frequently called the NDH office, “the sorority house” (Bisel & Messersmith, 2010, p. 54). The common goal between staff members made them feel coordinated with each other and this made them talk from time to time.

The climate of the organization in the case study was daunting for staff members due to the way various things were handled by authority. This created a huge barrier to communication since the leaders at the top chain did not expect the staff members to communicate freely especially about issues that bothered them. “Now you are not to talk about this matter. I know you ladies love nothing more than to start juicy rumors. So if I hear you discussing it, you will be fired, too. Everybody get back to work” (Bisel & Messersmith, 2010, p. 55). The intonation used by the boss clearly shows that there is a hostile climate in the organization when he was around. It is evident that from how he approached them, he was dictatorial and this could be a barrier for them to communicate with him effectively. There is need for leaders and employees to have a good relationship since this boosts their communication (Richmond et al, 2013, p. 73).


Bisel, R. S., & Messersmith, A. S. (2010). How dare he try to manage our talk. In J. Keyton & P.

Shockley-Zalabak (Eds.), Case studies for organizational communication:

Understanding Communication Processes (3rd ed.; pp. 53-56). New York: Oxford

University Press. Richmond, V. P., McCroskey, J. C., & Powell, L. (2013). Organizational communication for

survival (5th ed.). New York: Allyn & Bacon.

Subject: IT

Pages: 1 Words: 300


Subject: IT

Pages: 2 Words: 600

Free Essays About Blog

If you have any queries please write to us

Invalid Email Address!
Thank you for joining our mailing list

Please note that some of the content on our website is generated using AI and it is thoroughly reviewed and verified by our team of experienced editors. The essays and papers we provide are intended for learning purposes only and should not be submitted as original work.